Sciweavers

489 search results - page 31 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
115
Voted
IS
1998
15 years 3 days ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
PRDC
2007
IEEE
15 years 6 months ago
Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time
Model-based development has become state of the art in software engineering. Unfortunately, the used code generators often focus on the pure application functionality. Features li...
Christian Buckl, Matthias Regensburger, Alois Knol...
96
Voted
MKWI
2008
145views Business» more  MKWI 2008»
15 years 1 months ago
Bringing Developers and Users Closer Together: The OpenProposal Story
: Even though end-user participation in requirements engineering (RE) is highly important, it is at present not frequently used. Reasons can be found in the large expenditure of ti...
Asarnusch Rashid, Jan Wiesenberger, David Meder, J...
CONCUR
1997
Springer
15 years 4 months ago
Modularity for Timed and Hybrid Systems
Abstract. In a trace-based world, the modular speci cation, veri cation, and control of live systems require each module to be receptive that is, each module must be able to meet i...
Rajeev Alur, Thomas A. Henzinger
ICSE
2000
IEEE-ACM
15 years 4 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine