Control case approach to record and model non-functional requirements
暂无分享,去创建一个
[1] Roel Wieringa,et al. Design methods for reactive systems - Yourdon, Statemate, and the UML , 2003 .
[2] Ivar Jacobson,et al. The unified modeling language reference manual , 2010 .
[3] Ivar Jacobson,et al. Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series) , 2005 .
[4] Ivar Jacobson,et al. Use cases – Yesterday, today, and tomorrow , 2004, Software & Systems Modeling.
[5] John Mylopoulos,et al. Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.
[6] I. Alexander,et al. Misuse cases help to elicit non-functional requirements , 2003 .
[7] D. Redmond-Pyle,et al. A Standard for Architecture Description , 1999, IBM Syst. J..
[8] Connie U. Smith,et al. Performance solutions: a practical guide to creating responsive , 2001 .
[9] K. Saleh,et al. CAPTURING NON-FUNCTIONAL SOFTWARE REQUIREMENTS USING THE USER REQUIREMENTS NOTATION , 2004 .
[10] Christopher J. Pavlovski,et al. Modeling Architectural Non Functional Requirements: From Use Case to Control Case , 2006, 2006 IEEE International Conference on e-Business Engineering (ICEBE'06).
[11] Geri Schneider,et al. Applying Use Cases: A Practical Guide , 1998 .
[12] Kenneth W. Boyer,et al. Advanced use case modeling: software systems , 2002, SOEN.
[13] John Mylopoulos,et al. Towards requirements-driven information systems engineering: the Tropos project , 2002, Inf. Syst..
[14] John Mylopoulos,et al. Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..
[15] Ivar Jacobson,et al. Object-oriented software engineering - a use case driven approach , 1993, TOOLS.
[16] Wei-Tek Tsai,et al. Pi4SOA: A Policy Infrastructure for Verification and Control of Service Collaboration , 2006, 2006 IEEE International Conference on e-Business Engineering (ICEBE'06).
[17] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[18] P. Krutchen,et al. The Rational Unified Process: An Introduction , 2000 .
[19] Philippe Krutchen,et al. Architectural blueprints--the '4+1' view model of software architecture , 1995 .
[20] Ivar Jacobson,et al. Object Oriented Development in an Industrial Environment , 1987, OOPSLA.
[21] Philippe Kruchten,et al. Architecture blueprints—the “4+1” view model of software architecture , 1995, TRI-Ada '95.
[22] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[23] MylopoulosJohn,et al. Towards requirements-driven information systems engineering , 2002 .
[24] S. Mohan,et al. Performance Solutions: A Practical Guide to Creating Responsive, Scalable Software [Book Review] , 2003, IEEE Software.
[25] Philippe Kruchten,et al. The 4+1 View Model of Architecture , 1995, IEEE Softw..
[26] Julio Cesar Sampaio do Prado Leite,et al. On Non-Functional Requirements in Software Engineering , 2009, Conceptual Modeling: Foundations and Applications.
[27] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[28] M. Brenner,et al. Classifying ITIL Processes; A Taxonomy under Tool Support Aspects , 2006, 2006 IEEE/IFIP Business Driven IT Management.
[29] Paul Clements,et al. Software Architecture: An Executive Overview , 1996 .
[30] Zhixiong Liu,et al. Towards Modeling Non-Functional Requirements in Software Architecture , 2005 .
[31] Alistair Cockburn,et al. Patterns for Effective Use Cases , 2002 .