Sciweavers

7209 search results - page 256 / 1442
» Software Engineering for Multi-Agent Systems
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 1 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
92
Voted
RE
2008
Springer
14 years 12 months ago
Clear justification of modeling decisions for goal-oriented requirements engineering
Representation and reasoning about goals of an information system unavoidably involve the transformation of unclear stakeholder requirements into an instance of a goal model. If t...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
89
Voted
SIGSOFT
2010
ACM
14 years 10 months ago
The future of research in free/open source software development
Free/Open Source Software (FOSS) development is not the same an Software Engineering (SE). Why this is so is unclear and open to various interpretations. Both address the challeng...
Walt Scacchi
99
Voted
REFSQ
2009
Springer
15 years 7 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
111
Voted
KBSE
2006
IEEE
15 years 6 months ago
Reverse Engineering of Design Patterns from Java Source Code
Recovering design patterns can enhance existing source code analysis tools by bringing program understanding to the design level. This paper presents a new, fully automated patter...
Nija Shi, Ronald A. Olsson