Social Modeling and i*
ES Yu - … modeling: Foundations and applications: Essays in …, 2009 - Springer
Many different types of models are used in various scientific and engineering fields,
reflecting the subject matter and the kinds of understanding that is sought in each field …
reflecting the subject matter and the kinds of understanding that is sought in each field …
[PDF][PDF] Goal-oriented requirements engineering: An overview of the current research
A Lapouchnian - University of Toronto, 2005 - edisciplinas.usp.br
The main measure of the success of a software system is the degree to which it meets its
purpose. Therefore, identifying this purpose must be one of the main activities in the …
purpose. Therefore, identifying this purpose must be one of the main activities in the …
Feature selection for clustering-a filter solution
M Dash, K Choi, P Scheuermann… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
Processing applications with a large number of dimensions has been a challenge for the
KDD community. Feature selection, an effective dimensionality reduction technique, is an …
KDD community. Feature selection, an effective dimensionality reduction technique, is an …
Security and privacy requirements analysis within a social setting
Security issues for software systems ultimately concern relationships among social actors
stakeholders, system users, potential attackers-and the software acting on their behalf. We …
stakeholders, system users, potential attackers-and the software acting on their behalf. We …
A comparison of security requirements engineering methods
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …
security requirements elicitation and analysis. This conceptual framework establishes a …
Ontologies for knowledge management: an information systems perspective
Abstract Knowledge management research focuses on concepts, methods, and tools
supporting the management of human knowledge. The main objective of this paper is to …
supporting the management of human knowledge. The main objective of this paper is to …
From requirements to code with PASSI methodology
M Cossentino - Agent-oriented methodologies, 2005 - igi-global.com
Abstract A Process for Agent Societies Specification and Implementation (PASSI) is a step-
by-step requirement-to-code methodology for designing and developing multi-agent …
by-step requirement-to-code methodology for designing and developing multi-agent …
Reusable knowledge in security requirements engineering: a systematic mapping study
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …
system development. Over the last two decades, researchers and engineers have …
[PDF][PDF] Designing a multi-agent solution for a bookstore with the PASSI methodology.
P Burrafato, M Cossentino - AOIS@ CAiSE, 2002 - pa.icar.cnr.it
PASSI (a Process for Agent Societies Specification and Implementation) is a step-by-step
requirement-to-code methodology for designing and developing multi-agent societies …
requirement-to-code methodology for designing and developing multi-agent societies …
Deriving security requirements from crosscutting threat descriptions
CB Haley, RC Laney, B Nuseibeh - Proceedings of the 3rd international …, 2004 - dl.acm.org
It is generally accepted that early determination of the stakeholder requirements assists in
the development of systems that better meet the needs of those stakeholders. General …
the development of systems that better meet the needs of those stakeholders. General …