Sciweavers

674 search results - page 101 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ECOOPW
1998
Springer
14 years 1 months ago
Evaluating OO-CASE Tools: OO Research Meets Practice
Current object-oriented CASE tools are useful for recording and gaining insight into OO models. They offer extensive support for especially the analysis and design of object-orien...
Danny Greefhorst, Mark van Elswijk, Mattijs Maat, ...
METRICS
2003
IEEE
14 years 2 months ago
Using Prior-Phase Effort Records for Re-estimation During Software Projects
Estimating the effort required for software process activities continues to present difficulties for software engineers, particularly given the uncertainty and subjectivity associ...
Stephen G. MacDonell, Martin J. Shepperd
OR
2010
Springer
13 years 7 months ago
Modeling organic carbon and carbon-mediated soil processes in DSSAT v4.5
Cropping systems models have evolved over the last four decades in response to the demand for modeling to address more complex questions, including issues on sustainable productio...
Cheryl H. Porter, J. W. Jones, S. Adiku, A. J. Gij...
MODELLIERUNG
2001
13 years 10 months ago
Dependency Charts as a Means to Model Inter-Scenario Dependencies
: Scenarios/use cases have gained wide-spread use over the last couple of years. In software engineering they are mainly used to capture requirements and specify a system. Many sof...
Johannes Ryser, Martin Glinz
CAV
2006
Springer
95views Hardware» more  CAV 2006»
14 years 23 days ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik