Requirement traceability is intended to ensure continued alignment between stakeholders’ requirements and various outputs of the system development process. Therefore a process f...
Rosa Candida Pinto, Carla T. L. L. Silva, Jaelson ...
Distance between stakeholders working on a global software development project introduces problems in communication and control. Processes like requirements elicitation, where comm...
There are a significant number of proposals for modelling and developing Web Applications, but very few of them state rigorously how to elicit and represent requirements, and how t...
Abstract. We present an analysis to verify abstract set specifications for programs that use object field values to determine the membership of objects in abstract sets. In our a...
When a system fails to satisfy its specification, the model checker produces an error trace (or counter-example) that demonstrates an undesirable behavior, which is then used in d...
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Abstract. We present a context-sensitive compositional analysis of information flow for full (mono-threaded) Java bytecode. Our idea consists in transforming the Java bytecode int...
Abstract. The paper presents methods for model checking a class of possibly infinite state concurrent programs using various types of bi-simulation reductions. The proposed method...
Abstract. It is a hotly researching topic to eliminate irrelevant variables from counterexample, to make it easier to be understood. K Ravi proposes a two-stages counterexample min...