Verification of i* models using alloy
| Main Authors: | Oluoch Ating'a, Peter, Krishna, Aneesh |
|---|---|
| Other Authors: | J Porkorny |
| Format: | Conference Paper |
| Published: |
Springer
2011
|
| Online Access: | http://hdl.handle.net/20.500.11937/3129 |
Similar Items
Sensitivity Analysis of the i* Optimisation Model
by: Subramanian, C., et al.
Published: (2016)
by: Subramanian, C., et al.
Published: (2016)
Finger vein verification
by: Krishna Veni, Selvan.
Published: (2009)
by: Krishna Veni, Selvan.
Published: (2009)
Formal verification of RFID system using model verification agent
by: Lockman, Muhammad Tarmizi
Published: (2012)
by: Lockman, Muhammad Tarmizi
Published: (2012)
Combining i* and BPMN for Business Process Model Lifecycle
by: Ghose, A., et al.
Published: (2007)
by: Ghose, A., et al.
Published: (2007)
Requirements elicitation using goal-based organizational model
by: Krishna, Aneesh, et al.
Published: (2008)
by: Krishna, Aneesh, et al.
Published: (2008)
A process oriented approach to model non-functional requirements proposition extending UML
by: Krishna, Aneesh
Published: (2011)
by: Krishna, Aneesh
Published: (2011)
Optimal reasoning of goals in the i* framework
by: Subramanian, C., et al.
Published: (2015)
by: Subramanian, C., et al.
Published: (2015)
Reasoning about goal satisfaction for early requirements engineering in the i* framework using inter-actor dependency
by: Subramanian, C., et al.
Published: (2015)
by: Subramanian, C., et al.
Published: (2015)
Extending UML with non-functional requirements modelling
by: Krishna, Aneesh, et al.
Published: (2011)
by: Krishna, Aneesh, et al.
Published: (2011)
Voice verification using i-vectors and neural networks with limited training data
by: Mamyrbayev, Orken Zh., et al.
Published: (2019)
by: Mamyrbayev, Orken Zh., et al.
Published: (2019)
Evaluating effectiveness of risk identification and management using organisational models
by: Bhuiyan, M., et al.
Published: (2011)
by: Bhuiyan, M., et al.
Published: (2011)
Tuning hyperparameters for gene interaction models in genome-wide association studies
by: Uppu, S., et al.
Published: (2017)
by: Uppu, S., et al.
Published: (2017)
Integrated authentication model: face verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Quantitative Reasoning of Goal Satisfaction in the i* Framework
by: Subramanian, C., et al.
Published: (2015)
by: Subramanian, C., et al.
Published: (2015)
Optimal Requirements-Dependent Model-Driven Agent Development, Transforming Healthcare Through Information Systems
by: Krishna, A., et al.
Published: (2016)
by: Krishna, A., et al.
Published: (2016)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Optimal requirements-dependent model-driven agent development
by: Goncalves, J., et al.
Published: (2015)
by: Goncalves, J., et al.
Published: (2015)
Dynamic Non-Functional Requirements Based Model-Driven Agent Development
by: Goncalves, J., et al.
Published: (2015)
by: Goncalves, J., et al.
Published: (2015)
Consistency preserving co-evolution of formal specifications and agent-oriented conceptual models
by: Krishna, Aneesh, et al.
Published: (2009)
by: Krishna, Aneesh, et al.
Published: (2009)
Incorporating Change Management Within Dynamic Requirements-Based Model-Driven Agent Development
by: Goncalves, J., et al.
Published: (2017)
by: Goncalves, J., et al.
Published: (2017)
Managing Business Process Risk Using Rich Organizational Models
by: Bhuiyan, M., et al.
Published: (2007)
by: Bhuiyan, M., et al.
Published: (2007)
Evaluation of associative classification-based multifactor dimensionality reduction in the presence of noise
by: Krishna, Aneesh
Published: (2016)
by: Krishna, Aneesh
Published: (2016)
A review on methods for detecting SNP interactions in high-dimensional genomic data
by: Krishna, Aneesh
Published: (2016)
by: Krishna, Aneesh
Published: (2016)
A framework to assess the effectiveness of quality assessment model developed using class level metrics
by: Kumar, L., et al.
Published: (2016)
by: Kumar, L., et al.
Published: (2016)
WAsP model performance verification using lidar data
by: Indasi, V., et al.
Published: (2016)
by: Indasi, V., et al.
Published: (2016)
Co-evolution of Agent Oriented Conceptual Models and Use Case Diagrams
by: Bhuiyan, M., et al.
Published: (2006)
by: Bhuiyan, M., et al.
Published: (2006)
Duplicate bug report detection using clustering
by: Gopalan, Raj, et al.
Published: (2014)
by: Gopalan, Raj, et al.
Published: (2014)
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Development Of Simple I3c Controller Bus Functional Modeling For Internal Test Card Verification
by: Puan , Chia Kian
Published: (2016)
by: Puan , Chia Kian
Published: (2016)
Co-evolution of Agent-Oriented Conceptual Models and CASO Agent Programs
by: Dasgupta, A., et al.
Published: (2006)
by: Dasgupta, A., et al.
Published: (2006)
ICRAR Contributions to the Aperture Array Verification Program
by: Hall, Peter
Published: (2009)
by: Hall, Peter
Published: (2009)
Integration of Agent-Oriented Conceptual Models and UML Activity Diagrams Using Effect Annotations
by: Bhuiyan, M., et al.
Published: (2007)
by: Bhuiyan, M., et al.
Published: (2007)
Verification of tree induced suction with numerical model
by: Mohd Fakhrurrazi, Ishak, et al.
Published: (2021)
by: Mohd Fakhrurrazi, Ishak, et al.
Published: (2021)
Verification of RISC-V design with Universal Verification Methodology (UVM)
by: Liew, You Hong
Published: (2022)
by: Liew, You Hong
Published: (2022)
Voter Verification Using Rubik's Cube
by: Moayed, Majid Javid
Published: (2009)
by: Moayed, Majid Javid
Published: (2009)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Risk Framework for Open Source Applications Using Agent Oriented Modelling
by: Teh, J., et al.
Published: (2016)
by: Teh, J., et al.
Published: (2016)
Improving strategy for discovering interacting genetic variants in association studies
by: Uppu, S., et al.
Published: (2016)
by: Uppu, S., et al.
Published: (2016)
Customer requirement patterns for software vendors
by: Kousik, S., et al.
Published: (2013)
by: Kousik, S., et al.
Published: (2013)
Similar Items
-
Sensitivity Analysis of the i* Optimisation Model
by: Subramanian, C., et al.
Published: (2016) -
Finger vein verification
by: Krishna Veni, Selvan.
Published: (2009) -
Formal verification of RFID system using model verification agent
by: Lockman, Muhammad Tarmizi
Published: (2012) -
Combining i* and BPMN for Business Process Model Lifecycle
by: Ghose, A., et al.
Published: (2007) -
Requirements elicitation using goal-based organizational model
by: Krishna, Aneesh, et al.
Published: (2008)