Sciweavers

171 search results - page 21 / 35
» Precise Documentation of Critical Software
Sort
View
ICSE
2000
IEEE-ACM
13 years 11 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
CGO
2006
IEEE
13 years 11 months ago
Profiling over Adaptive Ranges
Modern computer systems are called on to deal with billions of events every second, whether they are instructions executed, memory locations accessed, or packets forwarded. This p...
Shashidhar Mysore, Banit Agrawal, Timothy Sherwood...
ADC
2006
Springer
130views Database» more  ADC 2006»
14 years 1 months ago
A two-phase rule generation and optimization approach for wrapper generation
Web information extraction is a fundamental issue for web information management and integrations. A common approach is to use wrappers to extract data from web pages or documents...
Yanan Hao, Yanchun Zhang
EDOC
2002
IEEE
14 years 25 days ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...
UML
1998
Springer
14 years 2 days ago
Literate Modelling - Capturing Business Knowledge with the UML
At British Airways, we have found during several large OO projects documented using the UML that non-technical end-users, managers and business domain experts find it difficult to ...
Jim Arlow, Wolfgang Emmerich, John Quinn