Sciweavers

REFSQ
2015
Springer
8 years 5 months ago
A Model for Structuring and Reusing Security Requirements Sources and Security Requirements
Various security requirements sources need to be incorporated when developing security requirements. A challenge for teams developing security requirements is to identify and struc...
Christian Schmitt, Peter Liggesmeyer
BIRTHDAY
2015
Springer
8 years 5 months ago
Abstract Constraint Data Types
José Luiz Fiadeiro, Fernando Orejas
BIRTHDAY
2015
Springer
8 years 5 months ago
Modularity of Ontologies in an Arbitrary Institution
Abstract. The notion of module extraction has been studied extensively in the ontology community. The idea is to extract, from a large ontology, those axioms that are relevant to c...
Yazmin Angélica Ibáñez-Garc&i...
BIRTHDAY
2015
Springer
8 years 5 months ago
ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge
Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off...
Samuel Wood, James Mathewson, Joshua Joy, Mark-Oli...
BIRTHDAY
2015
Springer
8 years 5 months ago
From EU Projects to a Family of Model Checkers - From Kandinsky to KandISTI
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
BIRTHDAY
2015
Springer
8 years 5 months ago
Programming Autonomic Systems with Multiple Constraint Stores
Developing autonomic systems is a major challenge due to their distributed nature, large dimension, high dynamism, openendedness, and need of adaptation. In this paper, we tackle t...
Ugo Montanari, Rosario Pugliese, Francesco Tiezzi
BIRTHDAY
2015
Springer
8 years 5 months ago
Towards an Institutional Framework for Heterogeneous Formal Development in UML - - A Position Paper -
We present a framework for formal software development with UML. In contrast to previous approaches to equipping UML with a formal semantics, we propose an institution-based hetero...
Alexander Knapp, Till Mossakowski, Markus Roggenba...
BIRTHDAY
2015
Springer
8 years 5 months ago
Twenty-Five Years of Preferred Subtheories
In the seminal paper [6], Gerd Brewka argued that ranking a set of default rules without prerequisites, and selecting extensions according to a lexicographic refinement of the inc...
Jérôme Lang
BIRTHDAY
2015
Springer
8 years 5 months ago
Toward Compact Abstractions for Processor Pipelines
ompact abstractions for processor pipelines∗ Sebastian Hahn, Jan Reineke Informatik, Saarland University Saarbr¨ucken Reinhard Wilhelm Informatik, Saarland University and AbsInt...
Sebastian Hahn 0001, Jan Reineke, Reinhard Wilhelm
BIRTHDAY
2015
Springer
8 years 5 months ago
Weighted Boolean Formula Games
We introduce a new class of succinct games, called weighted boolean formula games. Here, each player has a set of boolean formulas he wants to get satisfied. The boolean formulas...
Marios Mavronicolas, Burkhard Monien, Klaus W. Wag...