Sciweavers

3555 search results - page 107 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
B
2007
Springer
15 years 7 months ago
Time Constraint Patterns for Event B Development
Distributed applications are based on algorithms which should be able to deal with time constraints. It is mandatory to express time constraints in (mathematical) models and the cu...
Dominique Cansell, Dominique Méry, Joris Re...
SEAA
2008
IEEE
15 years 7 months ago
Evaluating RUP Software Development Processes Through Visualization of Effort Distribution
In this exploratory case study, effort distribution visualizations of industrial software development projects are made in order to assess to what extent patterns can be found tha...
Werner Heijstek, Michel R. V. Chaudron
AAMAS
2004
Springer
15 years 1 months ago
Tropos: An Agent-Oriented Software Development Methodology
Our goal in this paper is to introduce and motivate a methodology, called Tropos,1 for building agent oriented software systems. Tropos is based on two key ideas. First, the notion...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
WSC
1998
15 years 2 months ago
Model-based Systems Analysis Using CSIM18
Achieving the best possible cost performance for a system is often the goal of the manager of that system. This is true for large systems (such as an entire railroad system) as we...
Herbert D. Schwetman
116
Voted
OTM
2009
Springer
15 years 8 months ago
Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems
The need for semantics preserving integration of complex data has been widely recognized in the healthcare domain. While standards such as Health Level Seven (HL7) have been develo...
Antoine Zimmermann, Ratnesh Sahay, Ronan Fox, Axel...