Sciweavers

489 search results - page 55 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
IEE
2008
115views more  IEE 2008»
15 years 17 days ago
Faithful mapping of model classes to mathematical structures
ion techniques are indispensable for the specification and verification of functional behavior of programs. In object-oriented ation languages like JML, a powerful abstraction tec...
Ádám Darvas, Peter Müller
XPU
2010
Springer
14 years 11 months ago
Auto-tagging Emails with User Stories Using Project Context
Abstract. In distributed agile teams, people often use email as a knowledge sharing tool to clarify the project requirements (aka user stories). Knowledge about the project include...
S. M. Sohan, Michael M. Richter, Frank Maurer
128
Voted
KBSE
1995
IEEE
15 years 4 months ago
A Model for Decision Maintenance in the WinWin Collaboration Framework
Cost-effective engineering and evolution of complex software must involve the different stakeholders concurrently and collaboratively. The hard problem is providing computer suppo...
Prasanta K. Bose
112
Voted
CSMR
1998
IEEE
15 years 4 months ago
Towards Mature Measurement Programs
Many organizations are using measurement as a means to improve their software development and maintenance processes. A reasonable consensus has been reached about the main success...
Frank Niessink, Hans van Vliet
SIGSOFT
1994
ACM
15 years 4 months ago
Data Flow Analysis for Verifying Properties of Concurrent Programs
In this paper we present an approach, based on data ow analysis, that can provide cost-e ective analysis of concurrent programs with respect to explicitly stated correctness prope...
Matthew B. Dwyer, Lori A. Clarke