Sciweavers

674 search results - page 33 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ER
2004
Springer
106views Database» more  ER 2004»
15 years 3 months ago
Use of Tabular Analysis Method to Construct UML Sequence Diagrams
A sequence diagram in UML is used to model interactions among objects that participate in a use case. Developing a sequence diagram is complex; our experience shows that novice dev...
Margaret Hilsbos, Il-Yeol Song
JCS
2006
157views more  JCS 2006»
14 years 9 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
AAI
2004
114views more  AAI 2004»
14 years 9 months ago
Model Checking A Knowledge Exchange Scenario
We are interested in applying model checking techniques to the verification of communication protocols which require safe communication. Typically, in such scenarios, one desires ...
Sieuwert van Otterloo, Wiebe Der, Michael Wooldrid...
IASSE
2004
14 years 11 months ago
A Rationale-based Analysis Tool
The Rationale-based Analysis Tool (RAT) supports analysts, developers, clients and end users during the objectoriented requirements analysis activity. The tool enables different s...
Timo Wolf, Allen H. Dutoit