Automated user-interface generation environments have been criticized for their failure to deliver rich and powerful interactive applications [18]. To specify more powerful system...
— Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. While each is well-behaved in isolation, combining the two gives...
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Abstract. This paper describes recent work concerned with the speci cation of requirements on interactive systems and the de nition of user-level properties of such systems. A form...
Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often d...