Sciweavers

98 search results - page 8 / 20
» re 2006
Sort
View
RE
2006
Springer
14 years 9 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
MMM
2006
Springer
111views Multimedia» more  MMM 2006»
15 years 3 months ago
Real-time 3D fire simulation using a spring-mass model
We present a method for real-time simulation of 3dimensional fire inspired by an old mechanical trick known as the “silk torch”. Motivated by the proven illusive effect of si...
Murat Balci, Hassan Foroosh
JAL
2002
86views more  JAL 2002»
14 years 9 months ago
Exploiting structure in quantified formulas
We study the computational problem "find the value of the quantified formula obtained by quantifying the variables in a sum of terms." The "sum" can be based o...
Richard Edwin Stearns, Harry B. Hunt III
RE
2006
Springer
14 years 9 months ago
Requirements quality control: a unifying framework
Literature tends to discuss software (and system) requirements quality control, which includes validation and verification, as a heterogeneous process using a great variety of rel...
Artem Katasonov, Markku Sakkinen
RE
2006
Springer
14 years 9 months ago
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
In goal-oriented requirements engineering (GORE), one usually proceeds from a goal analysis to a requirements specification, usually of IT systems. In contrast, we consider the us...
Jaap Gordijn, Michaël Petit, Roel Wieringa