Sciweavers

5668 search results - page 132 / 1134
» Overlaps in Requirements Engineering
Sort
View
WOSP
2000
ACM
14 years 3 months ago
Expressing meaningful processing requirements among heterogeneous nodes in an active network
Active Network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, nonhomogeneous processing can ...
Virginie Galtier, Kevin L. Mills, Yannick Carlinet...
SE
2008
14 years 1 days ago
Collaborative Development of Knowledge Bases in Distributed Requirements Elicitation
: One of the main challenges in distributed software development is the elicitation and management of knowledge regarding system requirements. Due to spatial distribution of involv...
Steffen Lohmann, Thomas Riechert, Sören Auer
SIGSOFT
2003
ACM
14 years 11 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
SCESM
2006
ACM
262views Algorithms» more  SCESM 2006»
14 years 4 months ago
Scenario-driven modeling and validation of requirements models
Requirements models for large systems typically cannot be developed in a single step, but evolve in a sequence of iterations. We have developed such an iterative modeling process ...
Christian Seybold, Silvio Meier, Martin Glinz
INFOCOM
2003
IEEE
14 years 3 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...