A significant number of failures in e-voting systems have arisen because of poorly specified requirements, combined with an ad-hoc approach to engineering multiple variations of si...
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
The Call Processing Language (CPL) is one of the best known approaches developed for creating telephony services in Internet telephony. Its XML-based structure makes it a flexible ...
Abstract. The idea of feature-oriented programming is to map requirements to features, concepts that can be composed to form a software product. Change-oriented programming (ChOP),...
Peter Ebraert, Andreas Classen, Patrick Heymans, T...
Abstract. Current generative programming approaches use configuration knowledge to automatically manufacture an end product given a particular requirements specification. Such conf...
One of the most difficult tasks in software development is that features are implemented by changing the code of other features. This problem cannot be solved with existing general...
Abstract. This paper presents an online detection and resolution method for feature interactions among integrated services in home network systems. To achieve reasonable online det...
Abstract. We explore and discuss different ways of expressing service specifications in the context of home automation systems implemented on OSGiTM. We found that the approach use...
Lydie du Bousquet, Ajitha Rajan, Catherine Oriat, ...
Policies are convenient means to modify system behaviour at run-time. Nowadays, policies are created in great numbers by different actors, ranging from system administrators to lay...
Maurice H. ter Beek, Stefania Gnesi, Carlo Montang...