Sciweavers

410 search results - page 20 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
RE
2008
Springer
13 years 7 months ago
Design Science, Engineering Science and Requirements Engineering
For several decades there has been a debate in the computing sciences about the relative roles of design and empirical research, and about the contribution of design and research ...
Roel Wieringa, J. M. G. Heerkens
ASE
2007
121views more  ASE 2007»
13 years 7 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
JOT
2006
113views more  JOT 2006»
13 years 7 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
CCE
2011
13 years 2 months ago
Development and validation of a dynamic model for regeneration of passivating baths using membrane contactors
Selective liquid membranes have been traditionally employed for liquid/liquid and gas/liquid mass transfer in a wide range of applications. In particular, the Emulsion Pertraction...
Eugenio Bringas, Rosa Mediavilla, Ana María...
OOPSLA
2000
Springer
13 years 11 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...