Sciweavers

760 search results - page 103 / 152
» Modeling the Functionality of Multi-Functional Software Syst...
Sort
View
INFORMATICALT
2006
75views more  INFORMATICALT 2006»
14 years 9 months ago
Repository for Business Rules Based IS Requirements
The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express tho...
Kestutis Kapocius, Rimantas Butleris
ASM
2010
ASM
15 years 1 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
MSS
2000
IEEE
100views Hardware» more  MSS 2000»
15 years 2 months ago
Project 1244: IEEE Storage System Standards
Approaching its tenth anniversary, the IEEE Storage System Standards effort is in the process of balloting Media Management System (MMS) standards. These represent the first stand...
John L. Cole
DAC
1998
ACM
15 years 10 months ago
Rate Derivation and Its Applications to Reactive, Real-Time Embedded Systems
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
Ali Dasdan, Dinesh Ramanathan, Rajesh K. Gupta
ICST
2009
IEEE
15 years 4 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya