메뉴 건너뛰기




Volumn , Issue , 2006, Pages 336-337

Use case-based modeling and analysis of failsafe fault-tolerance

Author keywords

Fault tolerance; Formal methods; Safety; Use case modeling

Indexed keywords

FORMAL METHODS; OPERATING COSTS; SECURITY OF DATA;

EID: 41149147242     PISSN: 1090705X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RE.2006.70     Document Type: Conference Paper
Times cited : (8)

References (9)
  • 1
    • 0037299044 scopus 로고    scopus 로고
    • Misuse cases help to elicit non-functional requirements
    • I. Alexander. Misuse cases help to elicit non-functional requirements. IEE CCEJ, 14(1):40-45, 2003.
    • (2003) IEE CCEJ , vol.14 , Issue.1 , pp. 40-45
    • Alexander, I.1
  • 2
    • 0027699702 scopus 로고
    • Closure and convergence: A foundation of fault-tolerant computing
    • A. Arora and M. G. Gouda. Closure and convergence: A foundation of fault-tolerant computing. IEEE Transactions on Software Engineering, 19(11):1015-1027, 1993.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.11 , pp. 1015-1027
    • Arora, A.1    Gouda, M.G.2
  • 5
    • 27644596280 scopus 로고    scopus 로고
    • Complexity issues in automated synthesis of failsafe fault-tolerance
    • July-September
    • S. S. Kulkarni and A. Ebnenasir. Complexity issues in automated synthesis of failsafe fault-tolerance. IEEE Transactions on Dependable and Secure Computing, 2(3):201-215, July-September 2005.
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 201-215
    • Kulkarni, S.S.1    Ebnenasir, A.2
  • 7
    • 14744294087 scopus 로고    scopus 로고
    • Exception handling in the development of dependable component-based systems
    • C. M. F. Rubira and et al. Exception handling in the development of dependable component-based systems. Software Practice and Experience, 35:195-236, 2005.
    • (2005) Software Practice and Experience , vol.35 , pp. 195-236
    • Rubira, C.M.F.1    and et, al.2
  • 8
    • 33646174026 scopus 로고    scopus 로고
    • Exceptional use cases
    • Proceedings of 8th International Conference on Model Driven Engineering Languages and Systems MoD-ELS, of
    • A. Shui, S. Mustafiz, J. Kienzle, and C. Dony. Exceptional use cases. In Proceedings of 8th International Conference on Model Driven Engineering Languages and Systems (MoD-ELS), volume 3713 of Lecture Notes in Computer Science, pages 568-583, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3713 , pp. 568-583
    • Shui, A.1    Mustafiz, S.2    Kienzle, J.3    Dony, C.4
  • 9
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • November
    • G. Sindre and A. L. Opdahl. Eliciting security requirements by misuse cases. In Proceedings of TOOLS Pacific, pages 120 -131, November 2000.
    • (2000) In Proceedings of TOOLS Pacific , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.