-
1
-
-
42449151043
-
-
R. Accorsi, C. Areces, W. Bouma, and M.d. Rijke, Features as Constraints, in Feature Interactions in Telecommunications and Software Systems, M. Calder and E. Magill, Editors. IOS Press: Amsterdam, pp. 210-225 , 2000.
-
R. Accorsi, C. Areces, W. Bouma, and M.d. Rijke, Features as Constraints, in Feature Interactions in Telecommunications and Software Systems, M. Calder and E. Magill, Editors. IOS Press: Amsterdam, pp. 210-225 , 2000.
-
-
-
-
2
-
-
42449094354
-
Special issue on the feature interactions in telecommunications systems
-
I.F. Akyildiz, H. Rudin, L.G. Bouma, N. Griffeth, and K. Kimbler, "Special issue on the feature interactions in telecommunications systems" Computer Networks, vol. 32, no. 4, 2000.
-
(2000)
Computer Networks
, vol.32
, Issue.4
-
-
Akyildiz, I.F.1
Rudin, H.2
Bouma, L.G.3
Griffeth, N.4
Kimbler, K.5
-
3
-
-
1542727587
-
A Tool Package Supporting the Use of Colored Nets
-
K. Albert, K. Jensen, and R. Shapiro, "A Tool Package Supporting the Use of Colored Nets." Petri Net Newsletter, vol. 32, pp. 22-35, 1989.
-
(1989)
Petri Net Newsletter
, vol.32
, pp. 22-35
-
-
Albert, K.1
Jensen, K.2
Shapiro, R.3
-
4
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis." Proceedings of the 9th ACM conference on Computer and communications security, pp. 217-224, 2002.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
5
-
-
7744222444
-
Use Case Maps as a Feature Description Notation
-
S. Gilmore and M. Ryan, Editors, Springer, Berlin
-
D. Amyot, "Use Case Maps as a Feature Description Notation," in Language Constructs for Describing Features, S. Gilmore and M. Ryan, Editors. 2001, Springer, Berlin.
-
(2001)
Language Constructs for Describing Features
-
-
Amyot, D.1
-
6
-
-
2942722405
-
Special issue: Directions in feature interaction research
-
D. Amyot and L. Logrippo, "Special issue: Directions in feature interaction research." Computer Networks, vol. 45, no. 5, 2004.
-
(2004)
Computer Networks
, vol.45
, Issue.5
-
-
Amyot, D.1
Logrippo, L.2
-
8
-
-
17744389340
-
A requirements taxonomy for reducing Web site privacy vulnerabilities
-
A.I. Antón, and J.B, Earp, "A requirements taxonomy for reducing Web site privacy vulnerabilities." Journal of Requirements Engineering, vol. 9, no. 3, 2004.
-
(2004)
Journal of Requirements Engineering
, vol.9
, Issue.3
-
-
Antón, A.I.1
Earp, J.B.2
-
11
-
-
28844454313
-
A soft constraint-based approach to the cascade vulnerability problem
-
S. Bistarelli, "A soft constraint-based approach to the cascade vulnerability problem." Journal of Computer Security, vol. 13, no. 5, pp. 699-720, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.5
, pp. 699-720
-
-
Bistarelli, S.1
-
13
-
-
2942748958
-
An Open Architecture for Next-Generation Telecommunication Services
-
G.W. Bond, E. Cheung, K.H. Purdy, P. Zave, and C. Ramming, "An Open Architecture for Next-Generation Telecommunication Services." ACM Transactions on Internet Technology (TOIT), vol. 4, no. 1, pp. 83-123, 2004.
-
(2004)
ACM Transactions on Internet Technology (TOIT)
, vol.4
, Issue.1
, pp. 83-123
-
-
Bond, G.W.1
Cheung, E.2
Purdy, K.H.3
Zave, P.4
Ramming, C.5
-
14
-
-
33846008036
-
Propositional Satisfiability and Constraint Programming: A comparative survey
-
L. Bordeaux, Y. Hamadi, and L. Zhang, "Propositional Satisfiability and Constraint Programming: A comparative survey." ACM Computing Surveys, vol. 38, no. 4, p. 12, 2006.
-
(2006)
ACM Computing Surveys
, vol.38
, Issue.4
, pp. 12
-
-
Bordeaux, L.1
Hamadi, Y.2
Zhang, L.3
-
16
-
-
35048828410
-
-
J. Bredereke, On Feature Orientation and on Requirements Encapsulation Using Families of Requirements, in Objects, Agents, and Features, J.-J.C.M. Mark D. Ryan, Hans-Dieter Ehrich, Ed. Springer-Verlag, Berlin Heidelberg, pp. 26-44, 2004.
-
J. Bredereke, "On Feature Orientation and on Requirements Encapsulation Using Families of Requirements," in Objects, Agents, and Features, J.-J.C.M. Mark D. Ryan, Hans-Dieter Ehrich, Ed. Springer-Verlag, Berlin Heidelberg, pp. 26-44, 2004.
-
-
-
-
17
-
-
0037437627
-
Feature interaction: A critical review and considered forecast
-
M. Calder, M. Kolberg, E. Magill, and S. ReiffMarganiec, "Feature interaction: A critical review and considered forecast." Comput. Networks, vol. 41, no. 1, pp. 115-141, 2003.
-
(2003)
Comput. Networks
, vol.41
, Issue.1
, pp. 115-141
-
-
Calder, M.1
Kolberg, M.2
Magill, E.3
ReiffMarganiec, S.4
-
19
-
-
33745460373
-
Feature interaction detection by pairwise analysis of LTL properties: A case study
-
M. Calder and A. Miller, "Feature interaction detection by pairwise analysis of LTL properties: a case study." Formal Methods in System Design, vol. 28, no. 3, pp. 213-261, 2006.
-
(2006)
Formal Methods in System Design
, vol.28
, Issue.3
, pp. 213-261
-
-
Calder, M.1
Miller, A.2
-
20
-
-
84958808707
-
Using SPIN for Feature Interaction Analysis - A Case Study
-
Toronto, Ontario, Canada, Springer-Verlag New York, Inc
-
M. Calder, and A. Miller, "Using SPIN for Feature Interaction Analysis - A Case Study." in Proceedings of the 8th international SPIN workshop on Model checking of software. Toronto, Ontario, Canada, Springer-Verlag New York, Inc. 2001.
-
(2001)
Proceedings of the 8th international SPIN workshop on Model checking of software
-
-
Calder, M.1
Miller, A.2
-
21
-
-
0027561151
-
A feature-interaction benchmark for IN and beyond
-
E.J. Cameron, N. Griffeth, Y.-J. Lin, M.E. Nilson, W.K. Schnure, and H. Velthuijsen, "A feature-interaction benchmark for IN and beyond." IEEE Communications Magazine, vol. 31, no 3, pp. 64-69, 1993.
-
(1993)
IEEE Communications Magazine
, vol.31
, Issue.3
, pp. 64-69
-
-
Cameron, E.J.1
Griffeth, N.2
Lin, Y.-J.3
Nilson, M.E.4
Schnure, W.K.5
Velthuijsen, H.6
-
22
-
-
84943675832
-
Feature interactions in telecommunications systems
-
E.J. Cameron and H. Velthuijsen, "Feature interactions in telecommunications systems." IEEE Communications Magazine, vol. 31, no. 8, pp. 18-23, 1993.
-
(1993)
IEEE Communications Magazine
, vol.31
, Issue.8
, pp. 18-23
-
-
Cameron, E.J.1
Velthuijsen, H.2
-
24
-
-
33750711412
-
Test generation for interaction detection in feature-rich communication systems
-
C. Chi and R. Hao, "Test generation for interaction detection in feature-rich communication systems." Journal of Computer Networks: Special Issue on Feature Interaction, vol. 51, no. 2, pp. 426-438, 2007.
-
(2007)
Journal of Computer Networks: Special Issue on Feature Interaction
, vol.51
, Issue.2
, pp. 426-438
-
-
Chi, C.1
Hao, R.2
-
25
-
-
33947175105
-
Generating annotated behavior models from end-user scenarios
-
C. Damas, B. Lambeau, P. Dupont, and A. van Lamsweerde, "Generating annotated behavior models from end-user scenarios." IEEE Trans. Softw. Eng., vol. 31, no. 12, pp. 1056-1073, 2005.
-
(2005)
IEEE Trans. Softw. Eng
, vol.31
, Issue.12
, pp. 1056-1073
-
-
Damas, C.1
Lambeau, B.2
Dupont, P.3
van Lamsweerde, A.4
-
26
-
-
2942701913
-
Policy-enabled mechanisms for feature interactions: Reality, expectations, challenges
-
P. Dini, A. Clemm, T. Gray, F.J. Lin, L. Logrippo, and S. Reiff-Marganiec, "Policy-enabled mechanisms for feature interactions: reality, expectations, challenges." Comput. Networks, vol. 45, no. 5, pp. 585-603, 2004.
-
(2004)
Comput. Networks
, vol.45
, Issue.5
, pp. 585-603
-
-
Dini, P.1
Clemm, A.2
Gray, T.3
Lin, F.J.4
Logrippo, L.5
Reiff-Marganiec, S.6
-
27
-
-
0032118698
-
Dynamic constraint satisfaction for feature interaction
-
C.D. Elfe, E.C. Freuder, and D. Lesaint, "Dynamic constraint satisfaction for feature interaction." BT Technology Journal, vol. 16, no 3, 1998.
-
(1998)
BT Technology Journal
, vol.16
, Issue.3
-
-
Elfe, C.D.1
Freuder, E.C.2
Lesaint, D.3
-
28
-
-
2442474190
-
Feature specification and automated conflict detection
-
A.P. Felty and K.S. Namjoshi, "Feature specification and automated conflict detection." ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 12, no. 1, pp. 3-27, 2003.
-
(2003)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.12
, Issue.1
, pp. 3-27
-
-
Felty, A.P.1
Namjoshi, K.S.2
-
29
-
-
0033704852
-
Feature interaction detection: A LOTOS-based approach
-
Q. Fu, P. Harnois, L. Logrippo, and J. Sincennes, "Feature interaction detection: a LOTOS-based approach." Comput. Networks, vol. 32, no. 4, pp. 433-448, 2000.
-
(2000)
Comput. Networks
, vol.32
, Issue.4
, pp. 433-448
-
-
Fu, Q.1
Harnois, P.2
Logrippo, L.3
Sincennes, J.4
-
30
-
-
0027694534
-
Representing action and change by logic programs
-
M. Gelfond and V. Lifschitz, "Representing action and change by logic programs." The Journal of Logic Programming, vol. 17, no. 2-4, pp. 301-321, 1993.
-
(1993)
The Journal of Logic Programming
, vol.17
, Issue.2-4
, pp. 301-321
-
-
Gelfond, M.1
Lifschitz, V.2
-
31
-
-
77954472004
-
Fluent model checking for event-based systems
-
ACM Press, Helsinki, Finland, pp
-
D. Giannakopoulou and J. Magee, "Fluent model checking for event-based systems," in Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering. ACM Press, Helsinki, Finland, pp. 257-266, 2003.
-
(2003)
Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering
, pp. 257-266
-
-
Giannakopoulou, D.1
Magee, J.2
-
32
-
-
0342696466
-
A Formal Framework for Feature Interaction with Emphasis on Testing
-
K.E. Cheng and T. Ohta, Editors. IOS Press. pp
-
J.C. Godskesen, "A Formal Framework for Feature Interaction with Emphasis on Testing," in Feature Interactions in Telecommunications Systems III, K.E. Cheng and T. Ohta, Editors. IOS Press. pp. 21-30, 1995.
-
(1995)
Feature Interactions in Telecommunications Systems III
, pp. 21-30
-
-
Godskesen, J.C.1
-
33
-
-
33745130351
-
Formal Detection of Feature Interactions with Logic Programming and LOTOS
-
N. Gorse, L. Logrippo, and J. Sincennes, "Formal Detection of Feature Interactions with Logic Programming and LOTOS." Jornal of Software and Systems Modeling, vol. 5, no. 2, p. 135, 2006.
-
(2006)
Jornal of Software and Systems Modeling
, vol.5
, Issue.2
, pp. 135
-
-
Gorse, N.1
Logrippo, L.2
Sincennes, J.3
-
34
-
-
70350130621
-
A framework for security requirements engineering
-
ACM, Shanghai, China, pp
-
C.B. Haley, J.D. Moffett, R. Laney, and B. Nuseibeh, "A framework for security requirements engineering," in Proceedings of the 2006 international workshop on Software engineering for secure systems. ACM, Shanghai, China, pp. 35-42, 2006.
-
(2006)
Proceedings of the 2006 international workshop on Software engineering for secure systems
, pp. 35-42
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
35
-
-
0033689084
-
Feature combination and interaction detection via foreground/background models
-
R.J. Hall, "Feature combination and interaction detection via foreground/background models." Comput. Networks, vol. 32, no. 4, pp. 449-469, 2000.
-
(2000)
Comput. Networks
, vol.32
, Issue.4
, pp. 449-469
-
-
Hall, R.J.1
-
36
-
-
0006786379
-
Feature Interaction in Electronic Mail
-
M. Calder and E.H. Magill, Editors. IOS Press, Glasgow, Scotland, UK
-
R.J. Hall, Feature Interaction in Electronic Mail, in Feature Interactions in Telecommunications and Software Systems VI, M. Calder and E.H. Magill, Editors. IOS Press, Glasgow, Scotland, UK, 2000.
-
(2000)
Feature Interactions in Telecommunications and Software Systems VI
-
-
Hall, R.J.1
-
37
-
-
18744405767
-
Fundamental Nonmodularity in Electronic Mail
-
1, pp
-
R.J. Hall, "Fundamental Nonmodularity in Electronic Mail." Autom. Softw. Eng., vol. 12, vol. 1, pp. 41-79, 2005.
-
(2005)
Autom. Softw. Eng
, vol.12
, pp. 41-79
-
-
Hall, R.J.1
-
38
-
-
33645337636
-
Taxonomy of conflicts in network security policies
-
H. Hamed and E. Al-Shaer, "Taxonomy of conflicts in network security policies." Communications Magazine, IEEE, vol. 44, no. 3, pp. 134-141, 2006.
-
(2006)
Communications Magazine, IEEE
, vol.44
, Issue.3
, pp. 134-141
-
-
Hamed, H.1
Al-Shaer, E.2
-
39
-
-
0034450138
-
Composing Features and Resolving Interactions
-
J.D. Hay and A.J. M., "Composing Features and Resolving Interactions." ACM SIGSOFT Software Engineering Notes, vol. 25, Issue 6, pp. 110-119, 2000.
-
(2000)
ACM SIGSOFT Software Engineering Notes
, vol.25
, Issue.6
, pp. 110-119
-
-
Hay, J.D.1
Atlee, J.M.2
-
41
-
-
0032179535
-
Distributed Feature Composition: A Virtual Architecture for Telecommunications Services
-
M. Jackson and P. Zave, "Distributed Feature Composition: A Virtual Architecture for Telecommunications Services." Software Engineering, IEEE Transactions on, vol. 24, no. 10, pp. 831-847, 1998.
-
(1998)
Software Engineering, IEEE Transactions on
, vol.24
, Issue.10
, pp. 831-847
-
-
Jackson, M.1
Zave, P.2
-
42
-
-
0242579171
-
Template semantics for model-based notations
-
N. Jianwei, J.M. Atlee, and N.A. Day, "Template semantics for model-based notations." IEEE Transactions on Software Engineering, vol. 29, no. 10, pp. 866-882, 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.10
, pp. 866-882
-
-
Jianwei, N.1
Atlee, J.M.2
Day, N.A.3
-
43
-
-
27644532470
-
A scenario-based approach for requirements engineering: Experience in a telecommunication software development project
-
H. Kaindl, "A scenario-based approach for requirements engineering: Experience in a telecommunication software development project." Systems Engineering, vol. 8, no. 3, pp. 197-210, 2005.
-
(2005)
Systems Engineering
, vol.8
, Issue.3
, pp. 197-210
-
-
Kaindl, H.1
-
44
-
-
0032181540
-
The Feature and Service Interaction Problem in Telecommunications Systems: A Survey
-
D.O. Keck and P.J. Kuehn, "The Feature and Service Interaction Problem in Telecommunications Systems: A Survey." IEEE Trans. on Softw. Eng., vol. 24, no. 10, pp. 779-796, 1998.
-
(1998)
IEEE Trans. on Softw. Eng
, vol.24
, Issue.10
, pp. 779-796
-
-
Keck, D.O.1
Kuehn, P.J.2
-
45
-
-
33750742299
-
Managing feature interactions between distributed SIP call control services
-
M. Kolberg and E.H. Magill, "Managing feature interactions between distributed SIP call control services." Journal of Computer Networks: Special Issue on Feature Interaction, vol. 51, no. 2, pp. 536-557, 2007.
-
(2007)
Journal of Computer Networks: Special Issue on Feature Interaction
, vol.51
, Issue.2
, pp. 536-557
-
-
Kolberg, M.1
Magill, E.H.2
-
46
-
-
0242695839
-
Compatibility Issues between Services Supporting Networked Appliances
-
M. Kolberg, E.H. Magill, and M. Wilson, "Compatibility Issues between Services Supporting Networked Appliances." IEEE Commun. Mag., vol. 41, no. 11, pp. 136-147, 2003.
-
(2003)
IEEE Commun. Mag
, vol.41
, Issue.11
, pp. 136-147
-
-
Kolberg, M.1
Magill, E.H.2
Wilson, M.3
-
47
-
-
42449161273
-
Formal Methods of Analysis of System Properties
-
S.L. Kryvyi and L.Y. Matveyeva, "Formal Methods of Analysis of System Properties." Journal of Cybernetics and Systems Analysis, vol.39, no. 2, pp. 174-191, 2003.
-
(2003)
Journal of Cybernetics and Systems Analysis
, vol.39
, Issue.2
, pp. 174-191
-
-
Kryvyi, S.L.1
Matveyeva, L.Y.2
-
48
-
-
42449153052
-
-
The Open University: Milton Keynes, U.K
-
R., Laney, M. Jackson, and B. Nuseibeh, Composing Problems: Deriving specifications from inconsistent requirements. The Open University: Milton Keynes, U.K., 2005.
-
(2005)
Composing Problems: Deriving specifications from inconsistent requirements
-
-
Laney, R.1
Jackson, M.2
Nuseibeh, B.3
-
49
-
-
84881629314
-
Composing Features by Managing Inconsistent Requirements
-
Grenoble, France
-
R. Laney, T.T. Tun, M. Jackson, and B. Nuseibeh, Composing Features by Managing Inconsistent Requirements, in 9th International Conference on Feature Interactions in Software and Communication Systems. Grenoble, France, 2007.
-
(2007)
9th International Conference on Feature Interactions in Software and Communication Systems
-
-
Laney, R.1
Tun, T.T.2
Jackson, M.3
Nuseibeh, B.4
-
50
-
-
0030690751
-
-
X. Liu, H. Yang, and H. Zedan, Formal methods for the re-engineering of computing systems: a comparison. in Computer Software and Applications Conference, 1997. COMPSAC '97. Proceedings, The Twenty-First Annual International. 1997
-
X. Liu, H. Yang, and H. Zedan, "Formal methods for the re-engineering of computing systems: a comparison." in Computer Software and Applications Conference, 1997. COMPSAC '97. Proceedings., The Twenty-First Annual International. 1997.
-
-
-
-
51
-
-
2942734003
-
Special issue on feature interactions in telecommunications software
-
L. Logrippo, "Special issue on feature interactions in telecommunications software." Comput. Networks and ISDN Systems, vol. 30, no. 15, 1998.
-
(1998)
Comput. Networks and ISDN Systems
, vol.30
, Issue.15
-
-
Logrippo, L.1
-
52
-
-
42449106745
-
Modelling Feature Interaction Patterns in Nokia Mobila Phones using Coloured Petri Nets
-
Adelaide, Australia, Springer-Verlag Berlin Heidelberg
-
L. Lorentsen, A.-P. Tuovinen, and J. Xu, "Modelling Feature Interaction Patterns in Nokia Mobila Phones using Coloured Petri Nets," in 23th International Conference on Application and Theory of Petri Nets. Adelaide, Australia, Springer-Verlag Berlin Heidelberg, 2002.
-
(2002)
23th International Conference on Application and Theory of Petri Nets
-
-
Lorentsen, L.1
Tuovinen, A.-P.2
Xu, J.3
-
53
-
-
0034875247
-
Managing feature interactions in telecommunications systems by Temporal Colored Petri nets
-
Skovde, Sweden
-
Y. Lu, G. Wei, and T.-Y Cheung, "Managing feature interactions in telecommunications systems by Temporal Colored Petri nets." in Proceedings of the Seventh IEEE International Conference on Engineering of Complex Computer Systems, 2001. Skovde, Sweden, 2001.
-
(2001)
Proceedings of the Seventh IEEE International Conference on Engineering of Complex Computer Systems, 2001
-
-
Lu, Y.1
Wei, G.2
Cheung, T.-Y.3
-
54
-
-
2942724265
-
Feature interactions in embedded control systems
-
A. Metzger, "Feature interactions in embedded control systems." Computer Networks, vol. 45, no. 5, pp. 625-644, 2004.
-
(2004)
Computer Networks
, vol.45
, Issue.5
, pp. 625-644
-
-
Metzger, A.1
-
55
-
-
2942734415
-
Feature Interaction Detection in Building Control Systems by Means of a Formal Product Model
-
Ottawa, Canada, IO Press
-
A. Metzger and C. Webel, "Feature Interaction Detection in Building Control Systems by Means of a Formal Product Model." in Feature Interactions in Telecommunications and Software Systems VII. Ottawa, Canada, IO Press, 2003.
-
(2003)
Feature Interactions in Telecommunications and Software Systems VII
-
-
Metzger, A.1
Webel, C.2
-
56
-
-
33745864790
-
Event calculus and temporal action logics compared
-
E.T. Mueller, "Event calculus and temporal action logics compared." Artificial Intelligence, vol. 170, no. 11, pp. 1017-1029, 2006.
-
(2006)
Artificial Intelligence
, vol.170
, Issue.11
, pp. 1017-1029
-
-
Mueller, E.T.1
-
58
-
-
0008601172
-
Feature Interaction Filtering with Use Case Maps at Requirements Stage
-
M. Calder and E. Magill, Editors. IOS Press
-
M. Nakamura, T. Kikuno, J. Hassine, and L. Logrippo, "Feature Interaction Filtering with Use Case Maps at Requirements Stage," in Feature Interactions in Telecommunications and Software Systems VI, M. Calder and E. Magill, Editors. IOS Press, 2000.
-
(2000)
Feature Interactions in Telecommunications and Software Systems VI
-
-
Nakamura, M.1
Kikuno, T.2
Hassine, J.3
Logrippo, L.4
-
62
-
-
42449096142
-
Reachability analysis of feature interactions: A progress report
-
San Diego, California, United States: ACM Press New York, NY, USA
-
K.P. Pomakis and J.M. Atlee, "Reachability analysis of feature interactions: a progress report." in Proceedings of the 1996 ACM SIGSOFT international symposium on Software testing and analysis. San Diego, California, United States: ACM Press New York, NY, USA. 1996.
-
(1996)
Proceedings of the 1996 ACM SIGSOFT international symposium on Software testing and analysis
-
-
Pomakis, K.P.1
Atlee, J.M.2
-
63
-
-
42449102853
-
Model-based analysis of configuration vulnerabilities
-
C. Ramakrishnan and R. Sekar, Model-based analysis of configuration vulnerabilities. Intrusion Detection, 2002.
-
(2002)
Intrusion Detection
-
-
Ramakrishnan, C.1
Sekar, R.2
-
64
-
-
33746022977
-
Policies: Giving Users Control over Calls
-
M.D. Ryan, J.-J.C. Meyer, and H.-D. Ehrlich, Ed. Springer Verlag, Berlin, pp
-
S. Reiff-Marganiec, "Policies: Giving Users Control over Calls," in Agents, Objects and Features, M.D. Ryan, J.-J.C. Meyer, and H.-D. Ehrlich, Ed. Springer Verlag, Berlin, pp. 189-208, 2004.
-
(2004)
Agents, Objects and Features
, pp. 189-208
-
-
Reiff-Marganiec, S.1
-
66
-
-
33750685013
-
Guest Editorial
-
S. Reiff-Marganiec and M.D. Ryan, "Guest Editorial." Journal of Computer Networks: Special Issue on Feature Interaction, vol. 51, no. 2, pp. 357-358, 2007.
-
(2007)
Journal of Computer Networks: Special Issue on Feature Interaction
, vol.51
, Issue.2
, pp. 357-358
-
-
Reiff-Marganiec, S.1
Ryan, M.D.2
-
67
-
-
2942748195
-
Feature Interaction in Policies
-
S. Reiff-Marganiec and K.J. Turner, "Feature Interaction in Policies." Comput. Networks: The International Journal of Computer and Telecommunications Networking, vol. 45, no. 5, pp. 569-584, 2004.
-
(2004)
Comput. Networks: The International Journal of Computer and Telecommunications Networking
, vol.45
, Issue.5
, pp. 569-584
-
-
Reiff-Marganiec, S.1
Turner, K.J.2
-
68
-
-
0345530000
-
Requirements Interaction Management
-
W.N. Robinson, S.D. Pawlowski, and V. Volkov, "Requirements Interaction Management." ACM Computi. Surv., vol. 35, no. 2, pp. 132-190, 2003.
-
(2003)
ACM Computi. Surv
, vol.35
, Issue.2
, pp. 132-190
-
-
Robinson, W.N.1
Pawlowski, S.D.2
Volkov, V.3
-
69
-
-
1642497296
-
The Event Calculus Explained
-
Springer: Berlin, Heidelberg, p
-
M. Shanahan, "The Event Calculus Explained," in Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, p. 409, 1999.
-
(1999)
Lecture Notes in Computer Science
, pp. 409
-
-
Shanahan, M.1
-
70
-
-
33750720983
-
A taxonomy for identifying requirement interactions in software systems
-
M. Shehata, A. Eberlein, and A.O. Fapojuwo, "A taxonomy for identifying requirement interactions in software systems." Journal of Computer Networks: Special Issue on Feature Interaction, vol. 51, no. 2, pp. 398-425, 2007.
-
(2007)
Journal of Computer Networks: Special Issue on Feature Interaction
, vol.51
, Issue.2
, pp. 398-425
-
-
Shehata, M.1
Eberlein, A.2
Fapojuwo, A.O.3
-
71
-
-
0033688067
-
A hybrid model for specifying features and detecting interactions
-
S. Siddiqi and J.M. Atlee, "A hybrid model for specifying features and detecting interactions." Comput. Networks, vol. 32, no. 4, pp. 471-485, 2000.
-
(2000)
Comput. Networks
, vol.32
, Issue.4
, pp. 471-485
-
-
Siddiqi, S.1
Atlee, J.M.2
-
72
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
vo
-
G. Sindre and A.L. Opdahl, "Eliciting security requirements with misuse cases." Journal of Requirements Engineering, vo, 10, no. 1, pp. 34-44, 2005.
-
(2005)
Journal of Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
73
-
-
33747106192
-
Non Intrusive Monitoring of Service Based Systems
-
G. Spanoudakis and K. Mahbub, "Non Intrusive Monitoring of Service Based Systems." International Journal of Cooperative Information Systems, vol. 15, no. 3, pp. 325-358, 2006.
-
(2006)
International Journal of Cooperative Information Systems
, vol.15
, Issue.3
, pp. 325-358
-
-
Spanoudakis, G.1
Mahbub, K.2
-
74
-
-
34547100991
-
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price
-
R. Telang and S. Wattal, "An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price." Software Engineering, IEEE Transactions on, vol. 33, no. 8, pp. 544-557, 2007.
-
(2007)
Software Engineering, IEEE Transactions on
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
75
-
-
34547287849
-
A Case Study in Applying a Product Line Approach for Car Periphery Supervision Systems
-
Detroit, Michigan, USA
-
S. Thiel, S. Ferber, T. Fischer, A. Hein, and M. Schlick, "A Case Study in Applying a Product Line Approach for Car Periphery Supervision Systems," in Proceedings of In-Vehicle Software 2001 (SP-1587). Detroit, Michigan, USA. 2001.
-
(2001)
Proceedings of In-Vehicle Software 2001 (SP-1587)
-
-
Thiel, S.1
Ferber, S.2
Fischer, T.3
Hein, A.4
Schlick, M.5
-
76
-
-
0342647317
-
A Conceptual basis for feature engineering
-
C.R. Turner, A. Fuggetta, L. Lavazza, and A.L. Wolf, "A Conceptual basis for feature engineering." The Journal of Systems and Software, vol. 49, no. 1, pp. 3-15, 1999.
-
(1999)
The Journal of Systems and Software
, vol.49
, Issue.1
, pp. 3-15
-
-
Turner, C.R.1
Fuggetta, A.2
Lavazza, L.3
Wolf, A.L.4
-
77
-
-
0006785823
-
Formalising the Chisel Feature Notation
-
M.H. Calder and E.H. Magill, Ed. IOS Press Amsterdam, Amsterdam, pp
-
K.J. Turner, "Formalising the Chisel Feature Notation," in Proceedings of the Feature Interactions in Telecommunications Networks VI, M.H. Calder and E.H. Magill, Ed. IOS Press Amsterdam, Amsterdam, pp. 241-256, 2000.
-
(2000)
Proceedings of the Feature Interactions in Telecommunications Networks VI
, pp. 241-256
-
-
Turner, K.J.1
-
78
-
-
33751258307
-
Policies and conflicts in call control
-
K.J. Turner and L. Blair, "Policies and conflicts in call control." Journal of Computer Networks: Special Issue on Feature Interaction, vol.51, no. 2, pp. 496-514, 2007.
-
(2007)
Journal of Computer Networks: Special Issue on Feature Interaction
, vol.51
, Issue.2
, pp. 496-514
-
-
Turner, K.J.1
Blair, L.2
-
83
-
-
33744959794
-
-
M. Weiss, B. Esfandiari, and Y. Luo, Towards a Classification of Web Service Feature Interactions. in Proceedings Third International Conference ServiceOriented Computing - ICSOC 2005.Amsterdam, The Netherlands: Springer Berlin/Heidelberg. 2005.
-
M. Weiss, B. Esfandiari, and Y. Luo, "Towards a Classification of Web Service Feature Interactions." in Proceedings Third International Conference ServiceOriented Computing - ICSOC 2005.Amsterdam, The Netherlands: Springer Berlin/Heidelberg. 2005.
-
-
-
-
84
-
-
33750688238
-
Towards a classification of web service feature interactions
-
M., Weiss, B. Esfandiari, and Y Luo, 'Towards a classification of web service feature interactions." Journal of Computer Networks: Special Issue on Feature Interaction, vol. 51, no. 2, pp. 359-381, 2007.
-
(2007)
Journal of Computer Networks: Special Issue on Feature Interaction
, vol.51
, Issue.2
, pp. 359-381
-
-
Weiss, M.1
Esfandiari, B.2
Luo, Y.3
-
85
-
-
33750743782
-
Handling feature interactions in the language for end system services
-
X. Wu and H. Schulzrinne, "Handling feature interactions in the language for end system services." Journal of Computer Networks: Special Issue on Feature Interaction, vol. 51, no. 2, pp. 515-535, 2007.
-
(2007)
Journal of Computer Networks: Special Issue on Feature Interaction
, vol.51
, Issue.2
, pp. 515-535
-
-
Wu, X.1
Schulzrinne, H.2
-
86
-
-
0842267265
-
Feature Interaction Detection by Bounded Model Checking
-
T. Yokogawa, T. Tsuchiya, M. Nakamura, and T. Kikuno, "Feature Interaction Detection by Bounded Model Checking." IEICE Transactions on Information and Systems 2003, vol. E86-D, no. 12, pp. 2579-2587, 2003.
-
(2003)
IEICE Transactions on Information and Systems 2003
, vol.E86-D
, Issue.12
, pp. 2579-2587
-
-
Yokogawa, T.1
Tsuchiya, T.2
Nakamura, M.3
Kikuno, T.4
-
87
-
-
0027685302
-
Performance analysis of concurrency control using locking with deferred blocking
-
P.S. Yu and D.M. Dias, "Performance analysis of concurrency control using locking with deferred blocking." Software Engineering, IEEE Transactions on, vol. 19, no. 10, pp. 982-996, 1993.
-
(1993)
Software Engineering, IEEE Transactions on
, vol.19
, Issue.10
, pp. 982-996
-
-
Yu, P.S.1
Dias, D.M.2
-
89
-
-
0027680647
-
Conjunction as composition
-
P. Zave and M. Jackson, "Conjunction as composition." ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 2, no. 4, pp. 379-411, 1993.
-
(1993)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.2
, Issue.4
, pp. 379-411
-
-
Zave, P.1
Jackson, M.2
-
90
-
-
0030834984
-
Four dark corners of requirements engineering
-
P. Zave and M. Jackson, "Four dark corners of requirements engineering." ACM Trans. Softw. Eng. Methodol. (TOSEM), vol. 6, no. 1, pp. 1-30, 1997.
-
(1997)
ACM Trans. Softw. Eng. Methodol. (TOSEM)
, vol.6
, Issue.1
, pp. 1-30
-
-
Zave, P.1
Jackson, M.2
|