Sciweavers

2062 search results - page 30 / 413
» A Concern-Oriented Requirements Engineering Model
Sort
View
RE
2002
Springer
13 years 7 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
RE
2002
Springer
13 years 7 months ago
Converging on the Optimal Attainment of Requirements
Planning for the optimal attainment of requirements is an important early lifecycle activity. However, such planning is difficult when dealing with competing requirements, limited...
Martin S. Feather, Tim Menzies
AAAI
2000
13 years 9 months ago
The Systems Engineering Process Activities (SEPA) Methodology and Tool Suite
or cone, abstraction is chosen to represent a spectrum of user inputs/requirements that are narrowed, refined, and structured into a system design. User inputs require refinement f...
K. Suzanne Barber, Thomas J. Graser, Paul Grisham,...
RE
2002
Springer
13 years 7 months ago
Automating Speculative Queries through Event-Based Requirements Traceability
Posing speculative questions about a software system is an important yet often unsupported activity. Current impact analysis techniques tend to focus upon the functionality of the...
Jane Cleland-Huang, Carl K. Chang, Gaurav Sethi, K...
RE
2008
Springer
13 years 7 months ago
Rule-Based Maintenance of Post-Requirements Traceability Relations
An accurate set of traceability relations between software development artifacts is desirable to support evolutionary development. However, even where an initial set of traceabili...
Patrick Mäder, Orlena Gotel, Ilka Philippow