Sciweavers

674 search results - page 25 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ISSRE
2010
IEEE
14 years 8 months ago
A Large-Scale Industrial Case Study on Architecture-Based Software Reliability Analysis
—Architecture-based software reliability analysis methods shall help software architects to identify critical software components and to quantify their influence on the system r...
Heiko Koziolek, Bastian Schlich, Carlos G. Bilich
GI
2009
Springer
14 years 7 months ago
Automated GUI Testing Validation guided by Annotated Use Cases
Abstract: This paper presents a new approach to Automatic GUI Test Case Generation and Validation: a use case-guided technique to reduce the effort required in GUI modeling and tes...
Pedro Luis Mateo Navarro, Diego Sevilla Ruiz, Greg...
CHI
2008
ACM
15 years 10 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
RE
2007
Springer
15 years 3 months ago
Improving Performance Requirements Specifications from Field Failure Reports
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Chih-Wei Ho, Laurie Williams, Annie I. Antó...
MASA
2001
Springer
15 years 2 months ago
Motivated Agent Behaviour and Requirements Applied to Virtual Emergencies
Virtual environments provide a rich and varied domain for intelligent agents, but questions of design and development in this context are still to be answered. An agent with multip...
Sorabain Wolfheart de Lioncourt, Michael Luck