Sciweavers

410 search results - page 18 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
RE
2004
Springer
14 years 29 days ago
Composing Requirements Using Problem Frames
Problem Frames are a systematic approach to the decomposition of problems that allows us to relate requirements, domain properties, and machine specifications. Having decomposed a...
Robin C. Laney, Leonor Barroca, Michael Jackson, B...
RE
2010
Springer
13 years 2 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
MIA
2011
135views more  MIA 2011»
12 years 10 months ago
A comprehensive study of stent visualization enhancement in X-ray images by image processing means
In this work we propose a comprehensive study of Digital Stent Enhancement (DSE), from the analysis of requirements to the validation of the proposed solution. First, we derive th...
Vincent Bismuth, Régis Vaillant, Fran&ccedi...
FSEN
2009
Springer
13 years 11 months ago
Specification and Validation of Behavioural Protocols in the rCOS Modeler
The rCOS modeler implements the requirements modelling phase of a model driven component-based software engineering process. Components are specified in rCOS, a relational calculus...
Zhenbang Chen, Charles Morisset, Volker Stolz
INFSOF
1998
72views more  INFSOF 1998»
13 years 7 months ago
Validation of measurement software as an application of slicing and constraint solving
We show how to combine program slicing and constraint solving in order to obtain better slice accuracy. The method is used in the VALSOFT slicing system. One particular applicatio...
Jens Krinke, Gregor Snelting