Various security requirements sources need to be incorporated when developing security requirements. A challenge for teams developing security requirements is to identify and struc...
Abstract. The notion of module extraction has been studied extensively in the ontology community. The idea is to extract, from a large ontology, those axioms that are relevant to c...
Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off...
Samuel Wood, James Mathewson, Joshua Joy, Mark-Oli...
Developing autonomic systems is a major challenge due to their distributed nature, large dimension, high dynamism, openendedness, and need of adaptation. In this paper, we tackle t...
We present a framework for formal software development with UML. In contrast to previous approaches to equipping UML with a formal semantics, we propose an institution-based hetero...
Alexander Knapp, Till Mossakowski, Markus Roggenba...
In the seminal paper [6], Gerd Brewka argued that ranking a set of default rules without prerequisites, and selecting extensions according to a lexicographic refinement of the inc...
ompact abstractions for processor pipelines∗ Sebastian Hahn, Jan Reineke Informatik, Saarland University Saarbr¨ucken Reinhard Wilhelm Informatik, Saarland University and AbsInt...
Sebastian Hahn 0001, Jan Reineke, Reinhard Wilhelm
We introduce a new class of succinct games, called weighted boolean formula games. Here, each player has a set of boolean formulas he wants to get satisfied. The boolean formulas...
Marios Mavronicolas, Burkhard Monien, Klaus W. Wag...