Sciweavers

6978 search results - page 10 / 1396
» Reframing Requirements Analysis
Sort
View
RE
2002
Springer
13 years 7 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
JOT
2008
108views more  JOT 2008»
13 years 7 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati
CHI
2006
ACM
14 years 8 months ago
Whither or whether HCI: requirements analysis for multi-sited, multi-user cyberinfrastructures
Cyberinfrastructures bring together distributed resources to support scientific discoveries. Cyberinfrastructures currently under development are intended to enable the cooperativ...
Ann Zimmerman, Bonnie A. Nardi
IWPSE
2007
IEEE
14 years 2 months ago
Modification analysis support at the requirements level
Modification analysis is part of most maintenance processes and includes among other activities, early prediction of potential change impacts, feasibility studies, cost estimation...
Maryam Shiri, Jameleddine Hassine, Juergen Rilling
DAGSTUHL
2006
13 years 9 months ago
A Model-Based Approach To Requirements Analysis
A major task in designing systems development is the systematic elaboration of functional system requirements and their integration into the environment of the overall technical s...
Bernhard Schätz, Eva Geisberger, Johannes Gr&...