Sciweavers

5668 search results - page 138 / 1134
» Overlaps in Requirements Engineering
Sort
View
TSE
2008
128views more  TSE 2008»
15 years 3 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
117
Voted
ISORC
2009
IEEE
15 years 10 months ago
From Requirements to Code Revisited
In his article entitled "From Play-In Scenarios to Code: An Achievable Dream", David Harel presented a development schema that makes it possible to go from high-level us...
Tewfik Ziadi, Xavier Blanc, Amine Raji
144
Voted
AAMAS
2000
Springer
15 years 3 months ago
Synthesizing Coordination Requirements for Heterogeneous Autonomous Agents
Abstract. As agents move into ever more important applications, there is a natural growth in interest in techniques for synthesizing multiagent systems. We describe an approach for...
Munindar P. Singh
REFSQ
2007
Springer
15 years 9 months ago
Optimal-Constraint Lexicons for Requirements Specifications
Abstract. Constrained Natural Languages (CNLs) are becoming an increasingly popular way of writing technical documents such as requirements specifications. This is because CNLs aim...
Stephen Boyd, Didar Zowghi, Vincenzo Gervasi
108
Voted
POLICY
2005
Springer
15 years 9 months ago
Embedding Policy Rules for Software-Based Systems in a Requirements Context
Policy rules define what behavior is desired in a softwarebased system, they do not describe the corresponding action and event sequences that actually “produce” desired (“...
Mark Strembeck