메뉴 건너뛰기




Volumn , Issue , 2007, Pages 302-323

Formalizing patterns with the user requirements notation

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77955322175     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-219-0.ch014     Document Type: Chapter
Times cited : (14)

References (33)
  • 2
    • 0038284884 scopus 로고    scopus 로고
    • Introduction to the user requirements notation: Learning by example
    • Amyot, D. (2003). Introduction to the user requirements notation: Learning by example. Computer Networks, 42(3), 285-301.
    • (2003) Computer Networks , vol.42 , Issue.3 , pp. 285-301
    • Amyot, D.1
  • 3
    • 25444524608 scopus 로고    scopus 로고
    • UCM-based generation of test purposes
    • Amyot, D., Weiss, M., & Logrippo, L. (2005). UCM-based generation of test purposes. Computer Networks, 49(5), 643-660.
    • (2005) Computer Networks , vol.49 , Issue.5 , pp. 643-660
    • Amyot, D.1    Weiss, M.2    Logrippo, L.3
  • 7
    • 3442885388 scopus 로고    scopus 로고
    • Patterns of agent interaction scenarios as use case maps
    • Part B, Cybernetics, August
    • Billard, E.A. (2004, August). Patterns of agent interaction scenarios as use case maps. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 34(4), 1933-1939.
    • (2004) IEEE Transactions On Systems, Man, and Cybernetics , vol.34 , Issue.4 , pp. 1933-1939
    • Billard, E.A.1
  • 12
    • 0003538048 scopus 로고    scopus 로고
    • Software patterns
    • Retrieved November 16, 2006, from
    • Coplien, J. (1996). Software patterns. SIGS. Retrieved November 16, 2006, from http://users.rcn.com/jcoplien/Patterns/WhitePaper/SoftwarePatterns.pdf
    • (1996) SIGS
    • Coplien, J.1
  • 14
    • 0003026194 scopus 로고    scopus 로고
    • From non-functional requirements to design through patterns
    • Gross, D., & Yu, E. (2001). From non-functional requirements to design through patterns. Requirements Engineering, 6(1), 18-36.
    • (2001) Requirements Engineering , vol.6 , Issue.1 , pp. 18-36
    • Gross, D.1    Yu, E.2
  • 15
    • 0038486642 scopus 로고    scopus 로고
    • Design pattern implementation in Java and AspectJ
    • November
    • Hannemann, J., & Kiczales, G. (2002, November). Design pattern implementation in Java and AspectJ. In Proceedings of the 17th OOPSLA (pp. 161-173).
    • (2002) Proceedings of the 17th OOPSLA , pp. 161-173
    • Hannemann, J.1    Kiczales, G.2
  • 18
    • 33646184981 scopus 로고    scopus 로고
    • Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems
    • LNCS 2716, Springer-Verlag
    • Mouratidis, H., Weiss, M., & Giorgini, P. (2005). Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems. Conceptual modeling (ER) (LNCS 2716, pp. 225-240). Springer-Verlag.
    • (2005) Conceptual Modeling (ER) , pp. 225-240
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 22
    • 33751398888 scopus 로고    scopus 로고
    • Software performance models from system scenarios in use case maps
    • LNCS 2324, Springer-Verlag
    • Petriu, D., & Woodside, M. (2002). Software performance models from system scenarios in use case maps. Computer performance evaluation / TOOLS 2002 (LNCS 2324, pp. 141-158). Springer-Verlag.
    • (2002) Computer Performance Evaluation / TOOLS 2002 , pp. 141-158
    • Petriu, D.1    Woodside, M.2
  • 29
    • 47849084790 scopus 로고    scopus 로고
    • (Tech. Rep. No. MSU-CSE-03-23). Michigan State University
    • Wassermann, R., & Cheng, B. (2003). Security patterns (Tech. Rep. No. MSU-CSE-03-23). Michigan State University.
    • (2003) Security Patterns
    • Wassermann, R.1    Cheng, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.