Sciweavers

12670 search results - page 178 / 2534
» Requirements Modeling
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 4 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
124
Voted
JUCS
2008
105views more  JUCS 2008»
15 years 3 months ago
ITS Domain Modelling with Ontology
: Authoring ITS domain models is a difficult task requiring many skills. We explored whether modeling ontology reduces the problem by giving the students of an e-learning summer sc...
Brent Martin, Antonija Mitrovic, Pramuditha Surawe...
133
Voted
WETICE
1998
IEEE
15 years 7 months ago
How to Coordinate Internet Applications based on Mobile Agents
The paper surveys the possible coordination models for mobile agent applications and evaluates them in the context of a widely distributed application in the area of WWW informati...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
117
Voted
CONTEXT
2007
Springer
15 years 9 months ago
Context-Oriented Domain Analysis
Context-aware systems are software systems which adapt their behaviour according to the context of use. The requirements engineering phase is recognized as a primordial step to dev...
Brecht Desmet, Jorge Vallejos, Pascal Costanza, Wo...
129
Voted
KBSE
2000
IEEE
15 years 8 months ago
New Visual Interface for Engineering Use Case Models
This paper describes a new approach to visualization of scenarios within the use case-based engineering of functional requirements – the so-called Video Camera metaphor. The Vid...
Nikolai Mansurov, Dmitri Vasura