-
1
-
-
0036980638
-
Your 802.11 wireless network has no clothes
-
W. Arbaugh, N. Shankar, and Y. Wan. Your 802.11 wireless network has no clothes. Wireless Communications, IEEE, 9(6):44-51, 2002.
-
(2002)
Wireless Communications, IEEE
, vol.9
, Issue.6
, pp. 44-51
-
-
Arbaugh, W.1
Shankar, N.2
Wan, Y.3
-
2
-
-
31044441861
-
Requirements engineering for e-business advantage
-
S. Bleistein, K. Cox, J. Verner, and K. Phalp. Requirements engineering for e-business advantage. Requirements Engineering, 11(1):4-16, 2006.
-
(2006)
Requirements Engineering
, vol.11
, Issue.1
, pp. 4-16
-
-
Bleistein, S.1
Cox, K.2
Verner, J.3
Phalp, K.4
-
5
-
-
30744462605
-
The turnaround of the London Ambulance Service Computer-Aided Despatch system (LASCAD)
-
G. Fitzgerald and N. Russo. The turnaround of the London Ambulance Service Computer-Aided Despatch system (LASCAD). European Journal of Information Systems, 14(3):244, 2005.
-
(2005)
European Journal of Information Systems
, vol.14
, Issue.3
, pp. 244
-
-
Fitzgerald, G.1
Russo, N.2
-
6
-
-
1542680561
-
-
Elsevier Science Ltd. Oxford, UK, UK
-
S. Greenspan, A. Borgida, and J. Mylopoulos. A requirements modeling language and its logic. Elsevier Science Ltd. Oxford, UK, UK, 1986.
-
(1986)
A requirements modeling language and its logic
-
-
Greenspan, S.1
Borgida, A.2
Mylopoulos, J.3
-
7
-
-
0034188338
-
A Reference Model for Requirements and Specifications
-
C. Gunter, E. Gunter, M. Jackson, and P. Zave. A Reference Model for Requirements and Specifications. IEEE Software, pages 37-43, 2000.
-
(2000)
IEEE Software
, pp. 37-43
-
-
Gunter, C.1
Gunter, E.2
Jackson, M.3
Zave, P.4
-
11
-
-
72949114857
-
A Meta-model for the Problem Frames Approach
-
M. Lencastre, J. Botelho, P. Clericuzzi, and J. Araújo. A Meta-model for the Problem Frames Approach. Workshop in Soft. Model Eng., at MODELS, 2005.
-
(2005)
Workshop in Soft. Model Eng., at MODELS
-
-
Lencastre, M.1
Botelho, J.2
Clericuzzi, P.3
Araújo, J.4
-
13
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett. Introducing abuse frames for analysing security requirements. RE Conf., 2003. Proc. 11th IEEE Intl., pages 371-372, 2003.
-
(2003)
RE Conf., 2003. Proc. 11th IEEE Intl
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
16
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
J. Mylopoulos, L. Chung, and B. A. Nixon. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Trans. on Soft. Eng., 18(6):483-497, 1992.
-
(1992)
IEEE Trans. on Soft. Eng
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.A.3
-
17
-
-
72949119927
-
-
got a problem, Website
-
NASA. Apollo 13 "we've got a problem.". Website. http://er.jsc.nasa.gov/seh/apollo13.pdf.
-
13 we've
-
-
-
19
-
-
0017417131
-
Structural Analysis For Requirements Definition. Special Issue on Req. Analysis
-
D. Ross and K. Schoman Jr. Structural Analysis For Requirements Definition. Special Issue on Req. Analysis, IEEE Trans. Soft. Eng., pages 6-15, 1977.
-
(1977)
IEEE Trans. Soft. Eng
, pp. 6-15
-
-
Ross, D.1
Schoman Jr., K.2
-
20
-
-
41149133022
-
Requirement progression in problem frames applied to a proton therapy system
-
R. Seater and D. Jackson. Requirement progression in problem frames applied to a proton therapy system. 14th IEEE Intl. Req. Eng. Conf.(RE'06), pages 169-178, 2006.
-
(2006)
14th IEEE Intl. Req. Eng. Conf.(RE'06)
, pp. 169-178
-
-
Seater, R.1
Jackson, D.2
-
21
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10:34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
22
-
-
29844451321
-
The Tropos Metamodel and its Use
-
A. Susi, A. Perini, and J. Mylopoulos. The Tropos Metamodel and its Use. Informatica, 29(4):401-408, 2005.
-
(2005)
Informatica
, vol.29
, Issue.4
, pp. 401-408
-
-
Susi, A.1
Perini, A.2
Mylopoulos, J.3
-
23
-
-
72949088389
-
-
The National Institute of Health. http://www.nlm.nih.gov/medlineplus/ safety.html.
-
-
-
-
24
-
-
17744386105
-
From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering
-
A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens. From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. Proc. of RHAS at RE'03, 3:49-56, 2003.
-
(2003)
Proc. of RHAS at RE'03
, vol.3
, pp. 49-56
-
-
van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
-
25
-
-
72949113201
-
-
Website
-
Wikipedia. Problem. Website. http://en.wikipedia.org/wiki/Problem.
-
Problem
-
-
-
26
-
-
0028166447
-
Understanding why in software process modelling, analysis, and design
-
May 16-21
-
E. Yu and J. Mylopoulos. Understanding why in software process modelling, analysis, and design. In Proc. 16th Intl. Conf. on Soft. Eng., pages 159-168, May 16-21, 1994.
-
(1994)
Proc. 16th Intl. Conf. on Soft. Eng
, pp. 159-168
-
-
Yu, E.1
Mylopoulos, J.2
|