Reusable knowledge in security requirements engineering: a systematic map** study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

NDA: Near-DRAM acceleration architecture leveraging commodity DRAM devices and standard memory modules

A Farmahini-Farahani, JH Ahn… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
Energy consumed for transferring data across the processor memory hierarchy constitutes a
large fraction of total system energy consumption, and this fraction has steadily increased …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

Using hybrid branch predictors to improve branch prediction accuracy in the presence of context switches

M Evers, PY Chang, YN Patt - ACM SIGARCH Computer Architecture …, 1996 - dl.acm.org
Pipeline stalls due to conditional branches represent one of the most significant
impediments to realizing the performance potential of deeply pipelined, superscalar …

A systematic review and analytical evaluation of security requirements engineering approaches

MN Anwar Mohammad, M Nazir, K Mustafa - Arabian Journal for Science …, 2019 - Springer
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …

Engineering requirements for adaptive systems

M Morandini, L Penserini, A Perini… - Requirements …, 2017 - Springer
The increasing demand for complex and distributed software calls for novel software
engineering methods and techniques, to create systems able to autonomously adapt to …

A goal oriented approach for modeling and analyzing security trade-offs

G Elahi, E Yu - Conceptual Modeling-ER 2007: 26th International …, 2007 - Springer
In designing software systems, security is typically only one design objective among many. It
may compete with other objectives such as functionality, usability, and performance. Too …

Swarm coordination of mini-UAVs for target search using imperfect sensors

AL Alfeo, MGCA Cimino… - Intelligent Decision …, 2018 - content.iospress.com
Abstract Unmanned Aerial Vehicles (UAVs) have a great potential to support search tasks in
unstructured environments. Small, lightweight, low speed and agile UAVs, such as …

Model driven development of multi-agent systems

J Pavón, J Gómez-Sanz, R Fuentes - European Conference on Model …, 2006 - Springer
From a software engineering point of view, the agent paradigm has shown its potential for
modelling in different domains. However, moving from agent models to implementation is …

Business and model-driven development of BDI multi-agent systems

Y Wautelet, M Kolp - Neurocomputing, 2016 - Elsevier
Abstract Model-driven development allows IT professionals to specify the system
functionality, organization and behavior in a logical or platform-independent manner …