In this paper, we present an algorithm to propagate an n-ary constraint (with n greater than 2) specifying the relative positions of points in a three-dimensional rigid group. The ...
Counterexamples explain why a desired temporal logic property fails to hold, and as such are considered to be the most useful form of output from model-checkers. Multi-valued model...
Abstract: Field studies and user requirements analysis are highly valued practices in the human-computer interaction community. However, in companies, field study methods are not w...
Sari Kujala, Marjo Kauppinen, Pia Nakari, Sanna Re...
A wireless LAN (WLAN)-based Internet service, called NESPOT, of Korea Telecom (KT), the biggest telecommunication and Internet service company in Korea, has been operational since...
Youngkyu Choi, Jeongyeup Paek, Sunghyun Choi, Go W...
We propose a new requirements elicitation method in such a domain of ERP, CRM, and SCM by using specifications of several existing package software. We have analyzed the requirem...