Software Systems

[1]  James H. Cross,et al.  Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.

[2]  Robert J. Hall Feature combination and interaction detection via foreground/background models , 2000, Comput. Networks.

[3]  Rahul Telang,et al.  An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price , 2007, IEEE Transactions on Software Engineering.

[4]  P.S. Yu,et al.  Performance Analysis of Concurrency Control Using Locking with Deferred Blocking , 1993, IEEE Trans. Software Eng..

[5]  Joanne M. Atlee,et al.  Reachability analysis of feature interactions: a progress report , 1996, ISSTA '96.

[6]  Joanne M. Atlee,et al.  Composing features and resolving interactions , 2000, SIGSOFT '00/FSE-8.

[7]  Muffy Calder,et al.  Feature interaction detection by pairwise analysis of LTL properties—A case study , 2006, Formal Methods Syst. Des..

[8]  Eric Cheung,et al.  An open architecture for next-generation telecommunication services , 2004, TOIT.

[9]  Lucas Bordeaux,et al.  Propositional Satisfiability and Constraint Programming: A comparative survey , 2006, CSUR.

[10]  Mario Kolberg,et al.  Feature interaction: a critical review and considered forecast , 2003, Comput. Networks.

[11]  Andreas L. Opdahl,et al.  Eliciting security requirements with misuse cases , 2004, Requirements Engineering.

[12]  Andreas Metzger,et al.  Feature interactions in embedded control systems , 2004, Comput. Networks.

[13]  S. L. Kryvyi,et al.  Formal Methods of Analysis of System Properties , 2003 .

[14]  Andreas Metzger,et al.  Feature Interaction Detection in Building Control Systems by Means of a Formal Product Model , 2003, FIW.

[15]  Erik T. Mueller,et al.  Event calculus and temporal action logics compared , 2006, Artif. Intell..

[16]  Murray Shanahan,et al.  The Event Calculus Explained , 1999, Artificial Intelligence Today.

[17]  Duminda Wijesekera,et al.  Scalable, graph-based network vulnerability analysis , 2002, CCS '02.

[18]  William N. Robinson,et al.  Requirements interaction management , 2003, CSUR.

[19]  Yow-Jian Lin,et al.  A feature-interaction benchmark for IN and beyond , 1993, IEEE Communications Magazine.

[20]  Robert J. Hall,et al.  Fundamental Nonmodularity in Electronic Mail , 2004, Automated Software Engineering.

[21]  Cynthia A. Phillips,et al.  A graph-based system for network-vulnerability analysis , 1998, NSPW '98.

[22]  Mario Kolberg,et al.  Managing feature interactions between distributed SIP call control services , 2007, Comput. Networks.

[23]  Kenneth J. Turner Formalising the Chisel Feature Notation , 2000, FIW.

[24]  Michael Gelfond,et al.  Representing Action and Change by Logic Programs , 1993, J. Log. Program..

[25]  Mary Beth Rosson,et al.  The task-artifact cycle , 1991 .

[26]  Alessandra Russo,et al.  Using event calculus to formalise policy specification and analysis , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[27]  Pierre Dupont,et al.  Generating annotated behavior models from end-user scenarios , 2005, IEEE Transactions on Software Engineering.

[28]  Gang Wei,et al.  Managing feature interactions in telecommunications systems by temporal colored Petri nets , 2001, Proceedings Seventh IEEE International Conference on Engineering of Complex Computer Systems.

[29]  Nancy A. Day,et al.  Template Semantics for Model-Based Notations , 2003, IEEE Trans. Software Eng..

[30]  Michael Jackson,et al.  Conjunction as composition , 1993, TSEM.

[31]  Bashar Nuseibeh,et al.  A framework for security requirements engineering , 2006, SESS '06.

[32]  Mira Mezini,et al.  Using aspects for security engineering of Web service compositions , 2005, IEEE International Conference on Web Services (ICWS'05).

[33]  Ken-ichi Matsumoto,et al.  Feature Interactions in Integrated Services of Networked Home Appliances: An Object-Oriented Approach , 2005, FIW.

[34]  Jameleddine Hassine,et al.  Feature Interaction Filtering with Use Case Maps at Requirements Stage , 2000, FIW.

[35]  H. Velthuijsen,et al.  Feature interactions in telecommunications systems , 1993, IEEE Communications Magazine.

[36]  Jens Chr. Godskesen A Formal Framework for Feature Interaction with Emphasis on Testing , 1995, FIW.

[37]  Eugene C. Freuder,et al.  Dynamic Constraint Satisfaction for Feature Interaction , 1998 .

[38]  Henning Schulzrinne,et al.  Handling feature interactions in the language for end system services , 2007, Comput. Networks.

[39]  Joanne M. Atlee,et al.  A hybrid model for specifying features and detecting interactions , 2000, Comput. Networks.

[40]  Simon N. Foley,et al.  A soft constraint-based approach to the cascade vulnerability problem , 2005, J. Comput. Secur..

[41]  Tom Gray,et al.  Policy-enabled mechanisms for feature interactions: reality, expectations, challenges , 2004, Comput. Networks.

[42]  Mario Kolberg,et al.  Compatibility issues between services supporting networked appliances , 2003, IEEE Commun. Mag..

[43]  Michael A. Jackson,et al.  Problem Frames - Analysing and Structuring Software Development Problems , 2000 .

[44]  Muffy Calder,et al.  Using SPIN for feature interaction analysis—a case study , 2001, SPIN '01.

[45]  Pamela Zave Requirements for evolving systems: a telecommunications perspective , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.

[46]  Tatsuhiro Tsuchiya,et al.  Feature Interaction Detection by Bounded Model Checking , 2003 .