You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book systematically identifies the lack of methodological support for development of requirements and software architecture in the state-of-the-art. To overcome this deficiency, the QuaDRA framework is proposed as a problem-oriented approach. It provides an instantiation of the Twin Peaks model for supporting the intertwining relationship of requirements and software architecture. QuaDRA includes several structured methods which guide software engineers in quality- and pattern-based co-development of requirements and early design alternatives in an iterative and concurrent manner.
The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimarães, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.
From driverless cars to vehicular networks, recent technological advances are being employed to increase road safety and improve driver satisfaction. As with any newly developed technology, researchers must take care to address all concerns, limitations, and dangers before widespread public adoption. Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications addresses current trends in transportation technologies, such as smart cars, green technologies, and infrastructure development. This multivolume book is a critical reference source for engineers, computer scientists, transportation authorities, students, and practitioners in the field of transportation systems management.
Trustworthiness is a key success factor in the acceptance and adoption of cyber-physical systems. The author first discusses various existing definitions of trust and trustworthiness and extends them to cyber-physical systems. A comprehensive framework is proposed, including methods that cover all phases of development: requirements engineering, system design, trustworthiness evaluation, run-time maintenance, and evidence-based assurance. To support a smooth integration of the methods into development projects, these methods are provided in the form of so-called capability patterns. A running example from the ambient assisted living domain is used to demonstrate the application of the methods. About the Author: Nazila Gol Mohammadi is currently working as an associate researcher at paluno – The Ruhr Institute for Software Technology in Essen, Germany. Her research interests include software engineering, requirements engineering, digitalization, cloud computing, cyber-physical systems, and trustworthiness of software systems.
This book constitutes the thoroughly refereed proceedings of five international workshops held in Thessaloniki, Greece, in conjunction with the 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, in June 2014. The 24 full and eight short papers were carefully selected from 63 submissions. The five workshops were the First International Workshop on Advanced Probability and Statistics in Information Systems (APSIS), the First International Workshop on Advances in Services Design Based on the Notion of Capability, the Second International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE), the Third Workshop on New Generation Enterprise and Business Innovation Systems (NGEBIS), and the 4th International Workshop on Information Systems Security Engineering (WISSE).
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
This book constitutes the refereed proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2014, held in Essen, Germany, in April 2014. The 23 papers presented were carefully reviewed and selected from 89 submissions. The REFSQ conference is organised as a three-day symposium with two days devoted to scientific papers presentation with a one-day industry track in-between. Both the industry and scientific presentations concern a variety of topics, which shows the liveliness of the requirements engineering domain. These topics are for instance: scalability in RE, communication issues, compliance with law and regulations, RE for self adaptive systems, requirements traceability, new sources of requirements, domain specific RE, Natural Language issues and of course games. 'Games for RE and RE for Games' was the special topic of REFSQ 2014. This is materialized by a plenary session at the conference, and by a keynote given by Catherine Rolland, a serious games expert and project manager at KTM Advance, a French company specialized in serious games.
This book constitutes the refereed proceedings of the 5th European Conference on Software Architecture, ECSA 2011, held in Essen, Germany, in September 2011. The 13 revised full papers presented together with 24 emerging research papers, and 7 research challenge poster papers were carefully reviewed and selected from over 100 submissions. The papers are organized in topical sections on requirements and software architectures; software architecture, components, and compositions; quality attributes and software architectures; software product line architectures; architectural models, patterns and styles; short papers; process and management of architectural decisions; software architecture run-time aspects; ADLs and metamodels; and services and software architectures.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013. The 21 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: economic, ethical, legal, multilingual, organizational and social aspects; context-oriented information integration; data/information management as a service; context-oriented information integration and location-aware computing; security and privacy; risk management and business continuity; and security and privacy and location based applications. Also included are 15 papers from a special session on Human-Computer Interaction and Knowledge Discovery (HCI-KDD 2013).