Little guidance and few methods are available to refine a set of software requirements into an architecture satisfying those requirements. Part of the challenge stems from the fac...
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
A recurring difficulty for organizations that employ a product-line approach to development is that when a new product is added to an existing product line, there is currently no a...
This paper addresses the conflicting dimension of groupware, seeking the reconciliation of two very different assumptions about the users' attitudes using groupware tools: use...
A scenario can be used to describe a possible instantiation of a given business use case and can be expressed for example as a list of steps written in natural language, or by an ...