Sciweavers

489 search results - page 30 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
ICSE
2007
IEEE-ACM
14 years 10 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
IJCAI
1989
13 years 11 months ago
A Model for Projection and Action
In designing autonomous agents that deal competently with issues involving time and space, there is a tradeoff to be made between guaranteed response-time reactions on the one han...
Keiji Kanazawa, Thomas Dean
KBSE
2008
IEEE
14 years 4 months ago
MTSA: The Modal Transition System Analyser
Modal Transition Systems (MTS) are operational models that distinguish between required and proscribed behaviour of the system to be and behaviour which it is not yet known whethe...
Nicolás D'Ippolito, Dario Fischbein, Marsha...
ICSE
1994
IEEE-ACM
14 years 2 months ago
Applying Formal Methods for Human Error Tolerant Design
Abstract. This paper describes recent work concerned with the speci cation of requirements on interactive systems and the de nition of user-level properties of such systems. A form...
Bob Fields, Peter C. Wright, Michael D. Harrison
IUI
2010
ACM
14 years 4 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka