Sciweavers

10908 search results - page 164 / 2182
» Requirements Engineering Tasks
Sort
View
IUI
1998
ACM
14 years 1 months ago
U-TEL: A Tool for Eliciting User Task Models from Domain Experts
Eliciting user-task models is a thorny problem in modelbased user interface design, and communicating domainspecific knowledge from an expert to a knowledge engineer is a continui...
R. Chung-Man Tam, David Maulsby, Angel R. Puerta
SIGSOFT
2003
ACM
14 years 10 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
ISSRE
2010
IEEE
13 years 7 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
SCESM
2006
ACM
262views Algorithms» more  SCESM 2006»
14 years 3 months ago
Scenario-driven modeling and validation of requirements models
Requirements models for large systems typically cannot be developed in a single step, but evolve in a sequence of iterations. We have developed such an iterative modeling process ...
Christian Seybold, Silvio Meier, Martin Glinz
INFOCOM
2003
IEEE
14 years 2 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...