Sciweavers

OOIS
2001
Springer
14 years 4 months ago
Guiding Use Case Driven Requirements Elicitation and Analysis
Use cases are often perceived as an integral part of an objectoriented approach to software development, yet despite claims that objects fall naturally from the use case descripti...
Keith Phalp, Karl Cox
OOIS
2001
Springer
14 years 4 months ago
An Object-Oriented Framework for Developing Information Retrieval Applications
Abstract. Design and development of information retrieval IR systems is a complex and expensive process. In the process of building an IR system, developers need to explore a lar...
Joemon M. Jose, David G. Hendry, David J. Harper
OOIS
2001
Springer
14 years 4 months ago
Analysis of Software Engineering Data Using Computational Intelligence Techniques
The accurate estimation of software development effort has major implications for the management of software development in the industry. Underestimates lead to time pressures tha...
Gabriel Jarillo, Giancarlo Succi, Witold Pedrycz, ...
OOIS
2001
Springer
14 years 4 months ago
Towards a Model-Driven Approach to Reuse
A model-driven reuse approach that is based on an organization’s Enterprise Architecture (EA) and on the Unified Modeling Language (UML) is proposed. The framework embodying th...
Robert B. France, Sudipto Ghosh, Daniel E. Turk
OOIS
2001
Springer
14 years 4 months ago
From Use Cases to Objects: An Industrial Information Systems Case Study Analysis
Identifying the objects that constitute a software system is a critical task for any object-oriented system development and several techniques have already been introduced to tack...
João M. Fernandes, Ricardo Jorge Machado
OOIS
2001
Springer
14 years 4 months ago
Towards a Requirements Engineering Process Model
The creation of a development process is a challenging task. The application, customization and refinement of generic process models into fine-grained process steps suitable for a...
Armin Eberlein, Li Jiang
MMMACNS
2001
Springer
14 years 4 months ago
Future Directions in Role-Based Access Control Models
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
Ravi S. Sandhu
MMMACNS
2001
Springer
14 years 4 months ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman
MMMACNS
2001
Springer
14 years 4 months ago
Open Issues in Formal Methods for Cryptographic Protocol Analysis
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
Catherine Meadows