Sciweavers

1407 search results - page 14 / 282
» Using Use Cases in Executable Z
Sort
View
FAC
2008
70views more  FAC 2008»
14 years 9 months ago
Mondex , an electronic purse: specification and refinement checks with the Alloy model-finding method
This paper explains how the Alloy model-finding method has been used to check the specification of an electronic purse (also called smart card) system, called the Mondex case study...
Tahina Ramananandro
EMISA
2007
Springer
15 years 3 months ago
On Industrial Use of Requirements Engineering Techniques
We discuss two experiments in which requirements engineering techniques has been used and evaluated. In the first experiment a technique called Executable Use Cases is applied in t...
Lars Bækgaard, Jens Bæk Jørgens...
67
Voted
BIS
2006
105views Business» more  BIS 2006»
14 years 11 months ago
Describing Business Processes with Use Cases
Business processes can be described with diagrams, e.g. BPMN diagrams, or as text. Use cases are a text-based notation. They are semiformal: a business process is expressed as a s...
Jerzy R. Nawrocki, Tomasz Nedza, Miroslaw Ochodek,...
ISOLA
2010
Springer
14 years 8 months ago
Worst-Case Analysis of Heap Allocations
In object oriented languages, dynamic memory allocation is a fundamental concept. When using such a language in hard real-time systems, it becomes important to bound both the worst...
Wolfgang Puffitsch, Benedikt Huber, Martin Schoebe...
JMLR
2006
132views more  JMLR 2006»
14 years 9 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof