Filters








1,108,131 Hits in 6.4 sec

Aligning Requirements-driven Software Processes with IT Governance

Vu H. A. Nguyen, Manuel Kolp, Yves Wautelet, Samedi Heng
2017 Proceedings of the 12th International Conference on Software Technologies  
Requirements-driven software processes, such as (I-)Tropos, are development processes using high-level social-oriented models to drive the software life cycle both in terms of project management and forward  ...  Typically, the goal of IT Governance in software engineering is to ensure that the results of a software organization business processes meet the strategic requirements of the organization.  ...  The SD model represents the intentional level of a system that contains actors and dependencies in terms of Resource, Task, Goal, and Quality dependums.  ... 
doi:10.5220/0006431303380345 dblp:conf/icsoft/NguyenKWH17 fatcat:emso4lccefd4tjsxmqymqp2lha

Taxonomy of information security risk assessment (ISRA)

Alireza Shameli-Sendi, Rouzbeh Aghababaei-Barzegar, Mohamed Cheriet
2016 Computers & security  
In this paper, we discuss the key features of risk assessment that should be included in an information security management system.  ...  In this paper, we present a taxonomy of security risk assessment drawn from 125 papers published from 1995 to May 2014.  ...  ACKNOWLEDGMENTS This work is partly funded by Natural Sciences and Engineering Research Council of Canada Research Chair on Sustainable Smart Eco-Cloud, NSERC-950-229052 and by the NSERCCRDPJ 424371-11  ... 
doi:10.1016/j.cose.2015.11.001 fatcat:xtaqje6kpjexpn5e5gymyfvcme

A Unifying Model for Software Quality Engineering [chapter]

Ilkka Tervonen
1995 IFIP Advances in Information and Communication Technology  
The present paper introduces a unifying model which can be used for this assessing of the necessary characteristics of a method.  ...  In addition, we briefly illustrate how to apply this model to the definition of a specific review method.  ...  APPLYING THE UNIFYING MODEL TO THE DEFINITION OF A REVIEW METHOD The characteristics of a Unifying Model are now applied to the definition of a pre-review method -a quality-driven assessment method.  ... 
doi:10.1007/978-0-387-34848-3_30 fatcat:7v67j4a5nfaltd4aocqx5c57ui

A Reuse Reference Grid for Strategic Reuse Goals Assessment

L.J. Waguespack, W.T. Schiano
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
We present a reuse reference grid for managers to use as an assessment framework to help categorize and assess the cost/benefit of their current level of reuse as a prelude to considering future reuse  ...  Reuse throughout system life cycles is the most promising organizational policy for cost containment and benefit exploitation available to information system managers today.  ...  Behavior-driven modeling incorporates aspects of procedure driven and data driven modeling.  ... 
doi:10.1109/hicss.2006.27 dblp:conf/hicss/WaguespackS06 fatcat:zc4ekm7enzazpflhx62cwouzvi

Model Driven Performance Measurement and Assessment with MoDePeMART [chapter]

Marko Bošković, Wilhelm Hasselbring
2009 Lecture Notes in Computer Science  
behaviour • Response depends on stimuli and current state • Modeling constructs: -States -Transitions -Stimuli/signals Model-Driven Performance Measurement and Assessment with MoDePeMART 10  ...  -Composite -Specification of validity period Model-Driven Performance Measurement and Assessment with MoDePeMART 10/7/2009 MODELS Denver, Colorado Marko Boskovic Wilhelm Hasselbring 14/21 Outline • Software  ... 
doi:10.1007/978-3-642-04425-0_6 fatcat:6jfklqj7bfhm7feer5y6kskkdy

Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop [article]

Alexander Kott, Nikolai Stoianov, Nazife Baykal, Alfred Moller, Reginald Sawilla, Pram Jain, Mona Lange, Cristian Vidu
2016 arXiv   pre-print
The workshop participants concluded that the key to solving the mission impact assessment problem was in adopting and developing a new model-driven paradigm that creates and validates mechanisms of modeling  ...  The inexorably growing dependency on computational information processing for weapons, intelligence, communication, and logistics systems continues to increase the vulnerability of missions to various  ...  a time-dependent and dynamically changing aggregate dependency on its systems and other assets.  ... 
arXiv:1601.00912v1 fatcat:zy7o4kcxgfarjjvatogns2s344

Software Fault Injection: A Practical Perspective [chapter]

Lena Feinbube, Lukas Pirl, Andreas Polze
2018 Dependability Engineering  
Software fault injection (SFI) is an acknowledged method for assessing the dependability of software systems.  ...  We present a well-defined development methodology incorporating SFI-fault injection driven development (FIDD)-which begins by systematically constructing a dependability and failure cause model, from which  ...  Acknowledgements The authors would like to thank all participants of the student contest at HPI, during the winter semester 2016/17.  ... 
doi:10.5772/intechopen.70427 fatcat:ptbcam3cbnaividlqmtvottkoy

Risk-driven security testing using risk analysis with threat modeling approach

Maragathavalli Palanivel, Kanmani Selvadurai
2014 SpringerPlus  
Risk analysis includes identification, evaluation and assessment of risks. Threat modeling approach is identifying threats associated with the system.  ...  For experimentation, the system models namely LMS, ATM, OBS, OSS and MTRS are considered. The performance of proposed system is analyzed using Test Suite Reduction Rate (TSRR) and FSM coverage.  ...  Title Year Techniques Metrics Systems/models used 1 Risk-driven Security Testing versus Test-driven Security Risk Analysis Feb 15, 2012 Risk-driven security testing and Test-driven security  ... 
doi:10.1186/2193-1801-3-754 pmid:25674480 pmcid:PMC4320241 fatcat:5cur65i6zngk5foqlydqwa2zse

Towards Data-Driven Reliability Modeling for Cyber-Physical Production Systems

Jonas Friederich, Sanja Lazarova-Molnar
2021 Procedia Computer Science  
In this paper, we elaborate on the details of our proposed framework for data-driven reliability assessment of cyberphysical production systems.  ...  In this paper, we elaborate on the details of our proposed framework for data-driven reliability assessment of cyberphysical production systems.  ...  This case study will be used to develop and test methodologies that contribute to the overall vision of data-driven reliability modeling.  ... 
doi:10.1016/j.procs.2021.03.073 fatcat:vbxw4gsogfajdaffbms5s63sxi

Short-term real-time traffic prediction methods: A survey

Joaquim Barros, Miguel Araujo, Rosaldo J. F. Rossetti
2015 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS)  
Despite the predominance of model-driven solutions for the last years, data-driven approaches also present good results suitable for Traffic Management usage.  ...  We list, detail and compare existing model-driven and data-driven approaches that provide short-term real-time traffic predictions.  ...  In model-driven approaches, the system attempts to move vehicles or sets of vehicles throughout the network.  ... 
doi:10.1109/mtits.2015.7223248 dblp:conf/mtits/BarrosAR15 fatcat:urupgqhs4bddfcmte5objwsvq4

Author index

2013 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)  
of Open Systems Dependability du Bousquet, Lydie Single-Trace Fault Localization in Embedded Software Eberhardinger, Benedikt Model-driven Synthesis of Monitoring Infrastructure for Reliable Adaptive  ...  Standard Reliability Growth Models on Automotive Systems Nishi, Yasuharu An extended notation of FTA for risk assessment of software-intensive medical devices.  ... 
doi:10.1109/issre.2013.6698874 fatcat:vrmqtanuwzhghe52pq3n6yc3fm

Author index

2013 2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)  
of Open Systems Dependability du Bousquet, Lydie Single-Trace Fault Localization in Embedded Software Eberhardinger, Benedikt Model-driven Synthesis of Monitoring Infrastructure for Reliable Adaptive  ...  Standard Reliability Growth Models on Automotive Systems Nishi, Yasuharu An extended notation of FTA for risk assessment of software-intensive medical devices.  ... 
doi:10.1109/issrew.2013.6688827 fatcat:fezdd55oujclxoj5orb4am3iw4

A Prognostics and Health Management for Information and Electronics-Rich Systems

Michael Pecht
2010 Journal of The Japan Institute of Electronics Packaging  
In addition, the IEEE notes that information system failures are in some sense inevitable, because the current methods of assessing information systems have fundamental flaws. 8) Another and significantly  ...  The stress at each failure site is obtained as a function of loading conditions, geometry and material properties of the system. Damage models are then used to determine fault progression and RUL.  ...  For example, a Markov model of the failure or degradation process of a system depends on modeling the transition of the system in and out of various "states".  ... 
doi:10.5104/jiep.13.484 fatcat:gb3jhuwrifdpfd7dguz5qnj3be

Polynomial Response Surfaces for Probabilistic Risk Assessment and Risk Control via Robust Design [chapter]

Sergey Oladyshkin, Wolfgang Nowak
2012 Novel Approaches and Their Applications in Risk Assessment  
The solution V c of the system (7) depends on the selection of collocation points.  ...  ., 1998) deal with the characterization of uncertainties in systems describing the dependence of model output on the uncertain input parameters.  ... 
doi:10.5772/38170 fatcat:ji7x3vttkvb4hcxtkmycblibkm

Data-Driven Business Opportunity Decision Making Using Markov Chain Model

T Abiram
2020 Global Journal of Engineering Sciences  
Conflict of Interest No conflict of interest.  ...  The accomplishment of the business opportunity is dependent upon outer market factors, including economic situations for businesspeople when all is said in done and administrative systems influencing access  ...  The accomplishment of the business opportunity is dependent upon outside market factors, including economic situations for businesspeople all in all and administrative systems influencing access to customer  ... 
doi:10.33552/gjes.2020.05.000615 fatcat:ypaib3m2wrg65is6jnqgidlw6a
« Previous Showing results 1 — 15 out of 1,108,131 results