Sciweavers

631 search results - page 8 / 127
» Deriving Specifications from Requirements: An Example
Sort
View
ICCAD
2005
IEEE
127views Hardware» more  ICCAD 2005»
14 years 3 months ago
Hardware synthesis from guarded atomic actions with performance specifications
We present a new hardware synthesis methodology for guarded atomic actions (or rules), which satisfies performance-related scheduling specifications provided by the designer. The ...
Daniel L. Rosenband
RE
2004
Springer
14 years 1 days ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
RE
2006
Springer
13 years 6 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 6 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...
ECMDAFA
2009
Springer
127views Hardware» more  ECMDAFA 2009»
13 years 4 months ago
Derivation and Refinement of Textual Syntax for Models
Textual Syntax (TS) as a form of model representation has made its way to the Model-Driven Software Development community and is considered a viable alternative to graphical repres...
Florian Heidenreich, Jendrik Johannes, Sven Karol,...