ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
50
views
8
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,837
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer and Information Sciences – ISCIS 2006
Requirements Engineering as a Key to Holistic Software Quality
other
Author(s):
Manfred Broy
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Wikipedia Quality
Most cited references
8
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Challenges in automotive software engineering
Manfred Broy
(2006)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Specification and Development of Interactive Systems
Manfred Broy
,
Ketil Stølen
(2001)
0
comments
Cited
14
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A formal model of services
Manfred Broy
,
Ingolf Krüger
,
Michael Meisinger
(2007)
0
comments
Cited
10
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 24-34
DOI:
10.1007/11902140_3
SO-VID:
331e167f-3cf3-4afc-88e6-efead9e4e235
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Analysis of Automated Auctions
pp. 13
Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications
pp. 24
Requirements Engineering as a Key to Holistic Software Quality
pp. 35
Problems and Challenges of Image-Guided Neurosurgical Navigation and Intervention
pp. 36
Information and Communication Technologies in the EU’s Seventh Framework Programme
pp. 37
The Greedy Prepend Algorithm for Decision List Induction
pp. 47
Heuristics for Minimum Brauer Chain Problem
pp. 55
Dispatching Rules for Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards
pp. 65
Heuristic Approach to Schedule Crew for a Regional Airline
pp. 75
Automatic Segmentation of the Liver in CT Images Using a Model of Approximate Contour
pp. 85
Unambiguous 3D Measurements by a Multi-period Phase Shift Method
pp. 95
Hybrid Techniques for Dynamic Optimization Problems
pp. 105
Minimizing the Search Space for Shape Retrieval Algorithms
pp. 115
Decision Support for Packing in Warehouses
pp. 125
A Fast Partial Distortion Elimination Algorithm Using Selective Matching Scan
pp. 134
Variable Neighborhood Search for the Orienteering Problem
pp. 144
Extracting Gene Regulation Information from Microarray Time-Series Data Using Hidden Markov Models
pp. 154
Asymptotical Lower Limits on Required Number of Examples for Learning Boolean Networks
pp. 165
Modified Association Rule Mining Approach for the MHC-Peptide Binding Problem
pp. 174
Prediction and Classification for GPCR Sequences Based on Ligand Specific Features
pp. 182
An Efficient Algorithm for the Identification of Repetitive Variable Motifs in the Regulatory Sequences of Co-expressed Genes
pp. 192
An Intelligent Shopping Agent for Optimal Purchasing Decision on the Semantic Web
pp. 202
Adapting the Pyramid Technique for Indexing Ontological Data
pp. 212
Comparison of Different Neural Networks Performances on Motorboat Datasets
pp. 221
Dynamic Role Assignment for Multi-agent Cooperation
pp. 230
Lexical Ambiguity Resolution for Turkish in Direct Transfer Machine Translation Models
pp. 239
Design of a Feature Set for Face Recognition Problem
pp. 248
Low-Cost Microarchitectural Techniques for Enhancing the Prediction of Return Addresses on High-Performance Trace Cache Processors
pp. 258
Recovery Logics for Speculative Update Global and Local Branch History
pp. 267
An ILP Formulation for Task Scheduling on Heterogeneous Chip Multiprocessors
pp. 277
Hardware Designs for Local Alignment of Protein Sequences
pp. 286
A New Model of BAM: Alpha-Beta Bidirectional Associative Memories
pp. 296
PARM: Data Structure for Efficient Volume Ray Casting
pp. 306
Triangle Propagation for Mass-Spring Chain Algorithm
pp. 316
Hardware Acceleration of Terrain Visualization Using ef-Buffers
pp. 325
Computer Simulation of Woven Fabric Defects Based on Faulty Yarn Photographs
pp. 334
Bidirectional Distancemap for Efficient Volume Ray Casting
pp. 343
Segmenting Free-Form 3D Objects by a Function Representation in Spherical Coordinates
pp. 353
Applying Natural Neighbor Coordinates for Electromagnetic Tracker Calibration
pp. 363
Minkowski Sum Based Octree Generation for Triangular Meshes
pp. 374
Hardware-Oriented Visualisation of Trees
pp. 384
A Multi-resolution Technique for Real-time Animation of Large Crowds
pp. 394
A Framework for Working with Digitized Cultural Heritage Artifacts
pp. 401
On the Stability of Application-Layer Multicast Tree
pp. 413
Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks
pp. 424
A New Function for Optimization of Working Paths in Survivable MPLS Networks
pp. 434
HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes
pp. 445
Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time Communication
pp. 455
A Model of a Packet Aggregation System
pp. 464
On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network Traffic
pp. 474
Throughput Analysis of UDP and VPN Traffic in 802.11g Networks
pp. 483
Path Loss Rate Driven Burst Assembly in OBS Networks
pp. 493
Pixel Domain Spatio-temporal Denoising for Archive Videos
pp. 503
Fast Sub-pixel Motion Estimation by Means of One-Bit Transform
pp. 511
Neighborhood Decomposition of Convex Structuring Elements for Mathematical Morphology on Hexagonal Grid
pp. 522
Block Motion Estimation Using Modified Two-Bit Transform
pp. 532
3D Face Tracking Using Appearance Registration and Robust Iterative Closest Point Algorithm
pp. 542
Video as Input: Spiral Search with the Sparse Angular Sampling
pp. 553
An Adept Segmentation Algorithm and Its Application to the Extraction of Local Regions Containing Fiducial Points
pp. 563
Lossless Compression of Volumetric Medical Data
pp. 572
Identification of Luminal and Medial Adventitial Borders in Intravascular Ultrasound Images Using Level Sets
pp. 583
Prediction of Moving Object Location Based on Frequent Trajectories
pp. 593
A Framework for Visualizing Association Mining Results
pp. 603
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources
pp. 613
Evaluating Proposals in Web Services Negotiation
pp. 622
Nested Bitemporal Relational Algebra
pp. 645
Migrating a Hierarchical Legacy Database Application onto an XML-Based Service-Oriented Web Platform
pp. 655
Power-Aware Processors for Wireless Sensor Networks
pp. 665
Effects of Asynchronism and Neighborhood Size on Clustering in Self-propelled Particle Systems
pp. 677
Virtual-ROM: A New Demand Paging Component for RTOS and NAND Flash Memory Based Mobile Devices
pp. 687
Model-Driven Development of RTOS-Based Embedded Software
pp. 697
A Target Oriented Agent to Collect Specific Information in a Chat Medium
pp. 707
Algorithms for Within-Cluster Searches Using Inverted Files
pp. 717
Effect of Inverted Index Partitioning Schemes on Performance of Query Processing in Parallel Text Retrieval Systems
pp. 726
Exploiting Social Networks Dynamics for P2P Resource Organisation
pp. 735
Security Considerations in e-Cognocracy
pp. 745
A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol Performance
pp. 755
A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing
pp. 765
Camera-Based Virtual Environment Interaction on Mobile Devices
pp. 774
A Cost Model for an Adaptive Cell-Based Index Structure
pp. 783
Positioning Method for Outdoor Systems in Wireless Sensor Networks
pp. 793
Formal Description of a Runtime Infrastructure for Automatic Distribution of Programs
pp. 803
Super-Peer Selection Based Framework Using Dynamic Capacity and Similarity
pp. 813
A General Graph Model for Representing Exact Communication Volume in Parallel Sparse Matrix–Vector Multiplication
pp. 825
Safety of Rollback-Recovery Protocol Maintaining WFR Session Guarantee
pp. 834
3-D Parallel Implementation of the Wave-Equation PML Algorithm Using Distributed System
pp. 844
Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM
pp. 854
jEQN a Java-Based Language for the Distributed Simulation of Queueing Networks
pp. 866
Exact Performance Measures for Peer-to-Peer Epidemic Information Diffusion
pp. 877
A Leader Election Protocol for Timed Asynchronous Distributed Systems
pp. 887
Computing the Steady-State Distribution of G-networks with Synchronized Partial Flushing
pp. 897
Worst-Case Analysis of Router Networks with Rival Queueing Models
pp. 908
An Anomaly Intrusion Detection Approach Using Cellular Neural Networks
pp. 918
A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers
pp. 924
Improved Merkle Cryptosystem (IMC)
pp. 935
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing
pp. 943
Capture Resilient ElGamal Signature Protocols
pp. 952
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks
pp. 963
A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps
pp. 972
A Non-committing Encryption Scheme Based on Quadratic Residue
pp. 981
Biometric Cryptosystem Using Online Signatures
pp. 991
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography
pp. 1002
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity
pp. 1011
Deterministic Analysis of Balancedness in Symmetric Cryptography
pp. 1021
Test Suite Reduction Based on Dependence Analysis
pp. 1031
Realism in Project-Based Software Engineering Courses: Rewards, Risks, and Recommendations
pp. 1040
Problems of Adiabatic Quantum Program Design
pp. 1050
Modified Cognitive Complexity Measure
pp. 1060
Coverage-Based, Prioritized Testing Using Neural Network Clustering
pp. 1072
Component Oriented Design Based on Axiomatic Design Theory and COSEML
Similar content
1,837
DAISY:A n automated invertebrate identification system using holistic vision techniques
Authors:
Mark O'Neill
Holistic processing, contact, and the other-race effect in face recognition
Authors:
Mintao Zhao
,
William Hayward
,
Isabelle Bülthoff
Public service motivation, workplace spirituality and employee well-being: a holistic approach
Authors:
S. HASSAN
,
N. Ansari
,
A. Rehman
See all similar
Cited by
8
Naming the Pain in Requirements Engineering: A Design for a Global Family of Surveys and First Results from Germany
Authors:
D. Méndez Fernández
,
S. Wagner
Naming the Pain in Requirements Engineering: Comparing Practices in Brazil and Germany
Authors:
Daniel Méndez Fernández
,
Stefan Wagner
,
Marcos Kalinowski
…
Field study on requirements engineering: Investigation of artefacts, project parameters, and execution strategies
Authors:
D. Méndez Fernández
,
S. Wagner
,
K. Lochmann
…
See all cited by