Software Systems
暂无分享,去创建一个
[1] James H. Cross,et al. Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.
[2] Robert J. Hall. Feature combination and interaction detection via foreground/background models , 2000, Comput. Networks.
[3] Rahul Telang,et al. An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price , 2007, IEEE Transactions on Software Engineering.
[4] P.S. Yu,et al. Performance Analysis of Concurrency Control Using Locking with Deferred Blocking , 1993, IEEE Trans. Software Eng..
[5] Joanne M. Atlee,et al. Reachability analysis of feature interactions: a progress report , 1996, ISSTA '96.
[6] Joanne M. Atlee,et al. Composing features and resolving interactions , 2000, SIGSOFT '00/FSE-8.
[7] Muffy Calder,et al. Feature interaction detection by pairwise analysis of LTL properties—A case study , 2006, Formal Methods Syst. Des..
[8] Eric Cheung,et al. An open architecture for next-generation telecommunication services , 2004, TOIT.
[9] Lucas Bordeaux,et al. Propositional Satisfiability and Constraint Programming: A comparative survey , 2006, CSUR.
[10] Mario Kolberg,et al. Feature interaction: a critical review and considered forecast , 2003, Comput. Networks.
[11] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[12] Andreas Metzger,et al. Feature interactions in embedded control systems , 2004, Comput. Networks.
[13] S. L. Kryvyi,et al. Formal Methods of Analysis of System Properties , 2003 .
[14] Andreas Metzger,et al. Feature Interaction Detection in Building Control Systems by Means of a Formal Product Model , 2003, FIW.
[15] Erik T. Mueller,et al. Event calculus and temporal action logics compared , 2006, Artif. Intell..
[16] Murray Shanahan,et al. The Event Calculus Explained , 1999, Artificial Intelligence Today.
[17] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[18] William N. Robinson,et al. Requirements interaction management , 2003, CSUR.
[19] Yow-Jian Lin,et al. A feature-interaction benchmark for IN and beyond , 1993, IEEE Communications Magazine.
[20] Robert J. Hall,et al. Fundamental Nonmodularity in Electronic Mail , 2004, Automated Software Engineering.
[21] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[22] Mario Kolberg,et al. Managing feature interactions between distributed SIP call control services , 2007, Comput. Networks.
[23] Kenneth J. Turner. Formalising the Chisel Feature Notation , 2000, FIW.
[24] Michael Gelfond,et al. Representing Action and Change by Logic Programs , 1993, J. Log. Program..
[25] Mary Beth Rosson,et al. The task-artifact cycle , 1991 .
[26] Alessandra Russo,et al. Using event calculus to formalise policy specification and analysis , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[27] Pierre Dupont,et al. Generating annotated behavior models from end-user scenarios , 2005, IEEE Transactions on Software Engineering.
[28] Gang Wei,et al. Managing feature interactions in telecommunications systems by temporal colored Petri nets , 2001, Proceedings Seventh IEEE International Conference on Engineering of Complex Computer Systems.
[29] Nancy A. Day,et al. Template Semantics for Model-Based Notations , 2003, IEEE Trans. Software Eng..
[30] Michael Jackson,et al. Conjunction as composition , 1993, TSEM.
[31] Bashar Nuseibeh,et al. A framework for security requirements engineering , 2006, SESS '06.
[32] Mira Mezini,et al. Using aspects for security engineering of Web service compositions , 2005, IEEE International Conference on Web Services (ICWS'05).
[33] Ken-ichi Matsumoto,et al. Feature Interactions in Integrated Services of Networked Home Appliances: An Object-Oriented Approach , 2005, FIW.
[34] Jameleddine Hassine,et al. Feature Interaction Filtering with Use Case Maps at Requirements Stage , 2000, FIW.
[35] H. Velthuijsen,et al. Feature interactions in telecommunications systems , 1993, IEEE Communications Magazine.
[36] Jens Chr. Godskesen. A Formal Framework for Feature Interaction with Emphasis on Testing , 1995, FIW.
[37] Eugene C. Freuder,et al. Dynamic Constraint Satisfaction for Feature Interaction , 1998 .
[38] Henning Schulzrinne,et al. Handling feature interactions in the language for end system services , 2007, Comput. Networks.
[39] Joanne M. Atlee,et al. A hybrid model for specifying features and detecting interactions , 2000, Comput. Networks.
[40] Simon N. Foley,et al. A soft constraint-based approach to the cascade vulnerability problem , 2005, J. Comput. Secur..
[41] Tom Gray,et al. Policy-enabled mechanisms for feature interactions: reality, expectations, challenges , 2004, Comput. Networks.
[42] Mario Kolberg,et al. Compatibility issues between services supporting networked appliances , 2003, IEEE Commun. Mag..
[43] Michael A. Jackson,et al. Problem Frames - Analysing and Structuring Software Development Problems , 2000 .
[44] Muffy Calder,et al. Using SPIN for feature interaction analysis—a case study , 2001, SPIN '01.
[45] Pamela Zave. Requirements for evolving systems: a telecommunications perspective , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[46] Tatsuhiro Tsuchiya,et al. Feature Interaction Detection by Bounded Model Checking , 2003 .