Studying the release-time activities of a software project — that is, activities that occur around the time of a major or minor release — can provide insights into both the de...
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
Requirements engineering and software architecting are two key activities in software life cycle. Researchers have paid much attention to mapping and transformation from requireme...
With the emergence of cooperative applications it turned out that traditional transaction concepts are not suitable for these scenarios. Isolation of transactions, as guaranteed b...
Marek Rusinkiewicz, Wolfgang Klas, Thomas Tesch, J...
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...