-
2
-
-
0031074857
-
Fast planning through planning graph analysis
-
A. Blum and M. L. Furst. Fast Planning Through Planning Graph Analysis. Artif. Intell., 90(1-2):281-300, 1997.
-
(1997)
Artif. Intell.
, vol.90
, Issue.1-2
, pp. 281-300
-
-
Blum, A.1
Furst, M.L.2
-
3
-
-
33746035716
-
Requirements analysis for socio-technical systems: Exploring and evaluating alternatives
-
Submitted to
-
V. Bryl, P. Giorgini, and J. Mylopoulos. Requirements Analysis for Socio-technical Systems: Exploring and Evaluating Alternatives, 2006. Submitted to RE'06.
-
(2006)
RE'06
-
-
Bryl, V.1
Giorgini, P.2
Mylopoulos, J.3
-
4
-
-
33746077132
-
Designing security requirements models through planning
-
University of Trento
-
V. Bryl, F. Massacci, J. Mylopoulos, and N. Zannone. Designing Security Requirements Models through Planning. Technical Report DIT-06-003, University of Trento, 2006.
-
(2006)
Technical Report
, vol.DIT-06-003
-
-
Bryl, V.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
5
-
-
0031353036
-
Moving proofs-as-programs into practice
-
IEEE Press
-
J. Caldwell. Moving Proofs-as-Programs into Practice. In Proc. of ASE'97, pages 10-17. IEEE Press, 1997.
-
(1997)
Proc. of ASE'97
, pp. 10-17
-
-
Caldwell, J.1
-
7
-
-
0036721855
-
Towards requirements-driven information systems engineering: The tropos project
-
J. Castro, M. Kolp, and J. Mylopoulos. Towards Requirements-Driven Information Systems Engineering: The Tropos Project. Inform. Sys., 27(6):365-389, 2002.
-
(2002)
Inform. Sys.
, vol.27
, Issue.6
, pp. 365-389
-
-
Castro, J.1
Kolp, M.2
Mylopoulos, J.3
-
8
-
-
0342520920
-
ConGolog, a concurrent programming language based on the situation calculus
-
G. de Giacomo, Y. Lespérance, and H. J. Levesque. ConGolog, a concurrent programming language based on the situation calculus. Artif. Intell., 121(1-2):109-169, 2000.
-
(2000)
Artif. Intell.
, vol.121
, Issue.1-2
, pp. 109-169
-
-
De Giacomo, G.1
Lespérance, Y.2
Levesque, H.J.3
-
10
-
-
25144522234
-
Pddl2.2: The language for the classical part of the 4th international planning competition
-
University of Freiburg
-
S. Edelkamp and J. Hoffmann. Pddl2.2: The language for the classical part of the 4th international planning competition. Technical Report 195, University of Freiburg, 2004.
-
(2004)
Technical Report
, vol.195
-
-
Edelkamp, S.1
Hoffmann, J.2
-
11
-
-
84941146970
-
Specification and synthesis of hybrid automata for physics-based animation
-
T. Ellman. Specification and Synthesis of Hybrid Automata for Physics-Based Animation. In Proc. of ASE'03, pages 80-93, 2003.
-
(2003)
Proc. of ASE'03
, pp. 80-93
-
-
Ellman, T.1
-
12
-
-
0035643160
-
Striking a balance between trust and control in a virtual organization: A content analysis of open source software case studies
-
M. J. Gallivan. Striking a balance between trust and control in a virtual organization: a content analysis of open source software case studies. ISJ, 11(2):277, 2001.
-
(2001)
ISJ
, vol.11
, Issue.2
, pp. 277
-
-
Gallivan, M.J.1
-
14
-
-
27644432492
-
Modeling the impact of trust and distrust in agent networks
-
G. Gans, M. Jarke, S. Kethers, and G. Lakemeyer. Modeling the Impact of Trust and Distrust in Agent Networks. In Proc. of AOIS'01, pages 45-58, 2001.
-
(2001)
Proc. of AOIS'01
, pp. 45-58
-
-
Gans, G.1
Jarke, M.2
Kethers, S.3
Lakemeyer, G.4
-
15
-
-
35048866111
-
PDDL - The planning domain definition language
-
M. Ghallab, A. Howe, C. Knoblock, D. McDermott, A. Ram, M. Veloso, D. Weld, and D. Wilkins. PDDL - The Planning Domain Definition Language. In Proc. of AIPS'98, 1998.
-
(1998)
Proc. of AIPS'98
-
-
Ghallab, M.1
Howe, A.2
Knoblock, C.3
McDermott, D.4
Ram, A.5
Veloso, M.6
Weld, D.7
Wilkins, D.8
-
16
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
IEEE Press
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of RE'05, pages 167-176. IEEE Press, 2005.
-
(2005)
Proc. of RE'05
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
17
-
-
24944578244
-
Modelling social and individual trust in requirements engineering methodologies
-
Springer-Verlag
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modelling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05, LNCS 3477, pages 161-176. Springer-Verlag, 2005.
-
(2005)
Proc. of ITrust'05, LNCS
, vol.3477
, pp. 161-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
18
-
-
32044457421
-
Using trust assumptions with security requirements
-
C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh. Using Trust Assumptions with Security Requirements. Requirements Eng. J., 11:138-151, 2006.
-
(2006)
Requirements Eng. J.
, vol.11
, pp. 138-151
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
19
-
-
0002303187
-
Planning as satisfiability
-
John Wiley & Sons, Inc.
-
H. Kautz and B. Selman. Planning as satisfiability. In Proc. of ECAI'92, pages 359-363. John Wiley & Sons, Inc., 1992.
-
(1992)
Proc. of ECAI'92
, pp. 359-363
-
-
Kautz, H.1
Selman, B.2
-
20
-
-
20344363679
-
Reasoning about partial goal satisfaction for requirements and design engineering
-
E. Letier and A. van Lamsweerde. Reasoning about partial goal satisfaction for requirements and design engineering. ACM SIGSOFT Software Eng. Notes, 29(6):53-62, 2004.
-
(2004)
ACM SIGSOFT Software Eng. Notes
, vol.29
, Issue.6
, pp. 53-62
-
-
Letier, E.1
Van Lamsweerde, A.2
-
22
-
-
84976781844
-
A deductive approach to program synthesis
-
Z. Manna and R. Waldinger. A Deductive Approach to Program Synthesis. TOPLAS, 2(1):90-121, 1980.
-
(1980)
TOPLAS
, vol.2
, Issue.1
, pp. 90-121
-
-
Manna, Z.1
Waldinger, R.2
-
23
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
F. Massacci, M. Prest, and N. Zannone. Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation. Comp. Standards & Interfaces, 27(5):445-455, 2005.
-
(2005)
Comp. Standards & Interfaces
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
24
-
-
33746078483
-
Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the Allied Irish bank
-
University of Trento
-
F. Massacci and N. Zannone. Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. Technical Report DIT-06-002, University of Trento, 2006.
-
(2006)
Technical Report
, vol.DIT-06-002
-
-
Massacci, F.1
Zannone, N.2
-
25
-
-
0347269217
-
Strategies of structural synthesis of programs and its extensions
-
M. Matskin and E. Tyugu. Strategies of Structural Synthesis of Programs and Its Extensions. Comp. and Informatics, 20:1-25, 2001.
-
(2001)
Comp. and Informatics
, vol.20
, pp. 1-25
-
-
Matskin, M.1
Tyugu, E.2
-
26
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
IEEE Press
-
J. McDermott and C. Fox. Using Abuse Case Models for Security Requirements Analysis. In Proc. of ACSAC'99, pages 55-66. IEEE Press, 1999.
-
(1999)
Proc. of ACSAC'99
, pp. 55-66
-
-
McDermott, J.1
Fox, C.2
-
27
-
-
0003586779
-
-
July
-
Object Management Group. Model Driven Architecture (MDA). http://www.omg.org/docs/ormsc/01-07-01.pdf, July 2001.
-
(2001)
Model Driven Architecture (MDA)
-
-
-
28
-
-
33745757810
-
Web service composition as AI planning - A survey
-
University of St. Gallen
-
J. Peer. Web Service Composition as AI Planning - a Survey. Technical report, University of St. Gallen, 2005.
-
(2005)
Technical Report
-
-
Peer, J.1
-
29
-
-
23744501343
-
Automated procedure construction for deductive synthesis
-
S. Roach and J. Baalen. Automated Procedure Construction for Deductive Synthesis. ASE, 12(4):393-414, 2005.
-
(2005)
ASE
, vol.12
, Issue.4
, pp. 393-414
-
-
Roach, S.1
Baalen, J.2
-
30
-
-
33746042607
-
What is model driven architecture?
-
Department of Informatics, University of Oslo, March
-
R. K. Runde and K. Stølen. What is model driven architecture? Technical Report UIO-IFI-RR304, Department of Informatics, University of Oslo, March 2003.
-
(2003)
Technical Report
, vol.UIO-IFI-RR304
-
-
Runde, R.K.1
Stølen, K.2
-
32
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Eng. J., 10(1):34-44, 2005.
-
(2005)
Requirements Eng. J.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
33
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens. From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In Proc. of RHAS'03, pages 49-56, 2003.
-
(2003)
Proc. of RHAS'03
, pp. 49-56
-
-
Van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
-
34
-
-
0032633177
-
Recent advances in AI planning
-
D. S. Weld. Recent Advances in AI Planning. AI Magazine, 20(2):93-123, 1999.
-
(1999)
AI Magazine
, vol.20
, Issue.2
, pp. 93-123
-
-
Weld, D.S.1
-
35
-
-
29044443325
-
Trust, contract and relationship development
-
R. K. Woolthuis, B. Hillebrand, and B. Nooteboom. Trust, Contract and Relationship Development. Organization Studies, 26(6):813-840, 2005.
-
(2005)
Organization Studies
, vol.26
, Issue.6
, pp. 813-840
-
-
Woolthuis, R.K.1
Hillebrand, B.2
Nooteboom, B.3
-
36
-
-
84942921136
-
Modelling trust for system design using the i* strategic actors framework
-
Springer-Verlag
-
E. S. K. Yu and L. Liu. Modelling Trust for System Design Using the i* Strategic Actors Framework. In Proc. of the Workshop on Deception, Fraud, and Trust in Agent Societies, LNCS 2246, pages 175-194. Springer-Verlag, 2001.
-
(2001)
Proc. of the Workshop on Deception, Fraud, and Trust in Agent Societies, LNCS
, vol.2246
, pp. 175-194
-
-
Yu, E.S.K.1
Liu, L.2
|