This paper presents an interaction taxonomy for classifying and identifying requirement interactions in software systems. The proposed taxonomy is in the form of a four-layered py...
Mohamed Shehata, Armin Eberlein, Abraham O. Fapoju...
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as network...
This paper proposes a methodology to compute quadratic performance bounds when the closed loop poles of a discrete-time multivariable control loop are confined to a disk, centred ...
Although the role of lateral inhibition in edge (contrast) enhancement is well known, it has not been parametrized. This paper investigates the imbalance between the lateral inhib...