Sciweavers

1460 search results - page 16 / 292
» Very Lightweight Requirements Modeling
Sort
View
RE
2001
Springer
13 years 12 months ago
Virtual Environment Modeling for Requirements Validation of High Consequence Systems
An essential type of “evidence”of the correctness of the requirements formalization process can be provided by human-based calculation. Human calculation can be significantly ...
Victor L. Winter, Dejan Desovski, Bojan Cukic
RCIS
2010
13 years 5 months ago
A conceptual model and process for client-driven agile requirements prioritization
Continuous customer-centric requirements reprioritization is essential in successfully performing agile software development. Yet, in the agile RE literature, very little is known ...
Zornitza Racheva, Maya Daneva, Andrea Herrmann, Ro...
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
14 years 25 days ago
Requirements Elicitation and Elicitation Technique Selection: A Model for Two Knowledge-Intensive Software Development Processes
By its very nature, software development consists of many knowledge-intensive processes. One of the most difficult to model, however, is requirements elicitation. This paper prese...
Ann M. Hickey, Alan M. Davis
ICSE
2004
IEEE-ACM
14 years 7 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
TIT
2008
187views more  TIT 2008»
13 years 7 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer