Engineering and verifying agent-oriented requirements augmented by business constraints with $${\mathcal{B}}$$-Tropos
暂无分享,去创建一个
Paola Mello | Marco Montali | Paolo Torroni | Volha Bryl | Nicola Zannone | Volha Bryl | Paolo Torroni | Nicola Zannone | M. Montali | P. Mello
[1] Ioannis Xanthakos. Semantic integration of information by abduction , 2003 .
[2] Ivar Jacobson,et al. The object advantage - business process reengineering with object technology , 1994 .
[3] Wil M. P. van der Aalst,et al. DecSerFlow: Towards a Truly Declarative Service Flow Language , 2006, WS-FM.
[4] Raymond J. A. Buhr,et al. Use Case Maps as Architectural Entities for Complex Systems , 1998, IEEE Trans. Software Eng..
[5] Wil M. P. van der Aalst,et al. Workflow Patterns , 2004, Distributed and Parallel Databases.
[6] Franco Zambonelli,et al. Developing multiagent systems: The Gaia methodology , 2003, TSEM.
[7] Michael Fisher,et al. Implementing Temporal Logics: Tools for Execution and Proof (Tutorial Paper) , 2005, CLIMA.
[8] M. Ould. Business Processes: Business Processes: Modelling and Analysis for Re-Engineering and Improvement , 1995 .
[9] Paola Mello,et al. -Tropos , 2008, CLIMA.
[10] Pericles Loucopoulos. The S3 (Strategy-Service-Support) Framework for Business Process Modelling , 2003, CAiSE Workshops.
[11] Michael Luck,et al. Methodologies and Software Engineering for Agent Systems , 2004, Multiagent Systems, Artificial Societies, and Simulated Organizations.
[12] Federico Chesani,et al. Verification of Choreographies During Execution Using the Reactive Event Calculus , 2008, WS-FM.
[13] Paul Johannesson,et al. Beyond Goal Representation: Checking Goal-Satisfaction by Temporal Reasoning with Business Processes , 1999, CAiSE.
[14] John Mylopoulos,et al. Designing Security Requirements Models Through Planning , 2006, CAiSE.
[15] Evelina Lamma,et al. Verifiable agent interaction in abductive logic programming: The SCIFF framework , 2008, TOCL.
[16] Robert A. Kowalski,et al. The Iff Proof Procedure for Abductive Logic Programming , 1997, J. Log. Program..
[17] Carlos Angel Iglesias,et al. A Survey of Agent-Oriented Methodologies , 1998, ATAL.
[18] Fabio Massacci,et al. From Early Requirements Analysis towards Secure Workflows , 2007, IFIPTM.
[19] Henry A. Kautz,et al. Constraint propagation algorithms for temporal reasoning: a revised report , 1989 .
[20] Robert Padulo,et al. Business Process Reengineering: BreakPoint Strategies for Market Dominance , 1994, J. Inf. Technol..
[21] Leslie Lamport. How to write a long formula , 2005, Formal Aspects of Computing.
[22] Heinrich C. Mayr,et al. Business Process Modeling and Requirements Modeling , 2007, First International Conference on the Digital Society (ICDS'07).
[23] Paola Mello,et al. B-tropos : agent-oriented requirements engineering meets computational logic for declarative business process modeling and verification , 2008 .
[24] Evelina Lamma,et al. A Verifiable Logic-Based Agent Architecture , 2006, ISMIS.
[25] Evelina Lamma,et al. Abductive Logic Programming as an Effective Technology for the Static Verification of Declarative Business Processes , 2010, Fundam. Informaticae.
[26] Raman Kazhamiakin,et al. A framework for integrating business processes and business requirements , 2004, Proceedings. Eighth IEEE International Enterprise Distributed Object Computing Conference, 2004. EDOC 2004..
[27] Wil M. P. van der Aalst,et al. Workflow Patterns , 2003, Distributed and Parallel Databases.
[28] John Mylopoulos,et al. An ontology for secure socio-technical systems , 2007 .
[29] Paola Mello,et al. Commitment Tracking via the Reactive Event Calculus , 2009, IJCAI.
[30] Evelina Lamma,et al. Security Protocols Verification in Abductive Logic Programming: A Case Study , 2005, ESAW.
[31] Annie I. Antón,et al. The use of goals to surface requirements for evolving systems , 1998, Proceedings of the 20th International Conference on Software Engineering.
[32] Paolo Mancarella,et al. Abductive Logic Programming , 1992, LPNMR.
[33] John Mylopoulos,et al. Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.
[34] Michael J. Maher,et al. Constraint Logic Programming: A Survey , 1994, J. Log. Program..
[35] Keith Phalp,et al. Requirements engineering for e-business advantage , 2005, Requirements Engineering.
[36] Jason Rubens. Business analysis and requirements engineering: the same, only different? , 2007, Requirements Engineering.
[37] Michael A. Jackson,et al. Problem Frames - Analysing and Structuring Software Development Problems , 2000 .
[38] A. John Pendlebury,et al. Business Process Reengineering: Breakpoint Strategies for Market Dominance , 1993 .
[39] John Mylopoulos,et al. Specifying and analyzing early requirements in Tropos , 2004, Requirements Engineering.
[40] Lars Johansson,et al. Experiences integrating requirements engineering and business analysis. An empirical study of operations and management system procurement projects , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.
[41] Juan Sánchez Díaz,et al. Business process-driven requirements engineering : a goal-based approach , 2007 .
[42] Evelina Lamma,et al. Verification from Declarative Specifications Using Logic Programming , 2008, ICLP.
[43] Marco Montali. Specification and Verification of Declarative Open Interaction Models: A Logic-Based Approach , 2010 .
[44] Wil M. P. van der Aalst,et al. Towards a Taxonomy of Process Flexibility , 2008, CAiSE Forum.
[45] Fausto Giunchiglia,et al. Tropos: An Agent-Oriented Software Development Methodology , 2004, Autonomous Agents and Multi-Agent Systems.
[46] Wil M.P. van der Aalst,et al. Declarative Specification and Verification of Service Choreographies , 2009 .
[47] Wil M. P. van der Aalst,et al. A Declarative Approach for Flexible Business Processes Management , 2006, Business Process Management Workshops.
[48] Evelina Lamma,et al. COMPLIANCE VERIFICATION OF AGENT INTERACTION: A LOGIC-BASED SOFTWARE TOOL , 2006, Appl. Artif. Intell..
[49] Scott A. DeLoach,et al. An Overview of the Multiagent Systems Engineering Methodology , 2000, AOSE.
[50] Evelina Lamma,et al. Università degli Studi di Bologna DEIS On the automatic verification of interaction protocols using g − S CIFF , 2004 .
[51] Marco Montali,et al. Specification and Verification of Declarative Open Interaction Models - A Logic-based framework , 2009 .
[52] Brian Henderson-Sellers,et al. Agent-oriented methodologies , 2005 .
[53] Stephen Fickas,et al. Goal-Directed Requirements Acquisition , 1993, Sci. Comput. Program..
[54] Evelina Lamma,et al. Computational Logic for Run-Time Verification of Web Services Choreographies: Exploiting the SOCS-SI Tool , 2006, WS-FM.
[55] Jorge J. Gómez-Sanz,et al. The Message Methodology , 2004 .
[56] Eric Yu,et al. From Requirements to Architectural Design –Using Goals and Scenarios , 2001 .
[57] Paola Mello,et al. Declarative specification and verification of service choreographiess , 2010, TWEB.