Sciweavers

ASE
2007
121views more  ASE 2007»
13 years 11 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
ASE
2007
83views more  ASE 2007»
13 years 11 months ago
How knowledge representation meets software engineering (and often databases)
This paper surveys a selection of personal research projects which addressed problems related to Software Engineering, and whose solution was inspired by ideas from the field of K...
Alexander Borgida
ASE
2007
70views more  ASE 2007»
13 years 11 months ago
JDiff: A differencing technique and tool for object-oriented programs
Taweesup Apiwattanapong, Alessandro Orso, Mary Jea...
ASE
2007
143views more  ASE 2007»
13 years 11 months ago
Composition inference for UML class diagrams
Knowing which associations are compositions is important in a tool for the reverse engineering of UML class diagrams. Firstly, recovery of composition relationships bridges the ga...
Ana Milanova