Sciweavers

674 search results - page 114 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
DOCENG
2010
ACM
13 years 10 months ago
Linking data and presentations: from mapping to active transformations
Modern GUI toolkits, and especially RIA ones, propose the concept of binding to dynamically link domain data and their presentations. Bindings are very simple to use for predefine...
Olivier Beaudoux, Arnaud Blouin
TSE
2002
99views more  TSE 2002»
13 years 8 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...
COMPULOG
1999
Springer
14 years 1 months ago
Decomposable Constraints
Many constraint satisfaction problems can be naturally and efficiently modelled using non-binary constraints like the “all-different” and “global cardinality” constraints...
Ian P. Gent, Kostas Stergiou, Toby Walsh
TASE
2007
IEEE
14 years 3 months ago
Realizing Live Sequence Charts in SystemVerilog
The design of an embedded control system starts with an investigation of properties and behaviors of the process evolving within its environment, and an analysis of the requiremen...
Hai H. Wang, Shengchao Qin, Jun Sun 0001, Jin Song...
IAT
2007
IEEE
14 years 3 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...