Proceedings of the 35th Annual Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.2002.994468
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring software requirements using instrumented code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 52 publications
(48 citation statements)
references
References 28 publications
0
48
0
Order By: Relevance
“…Monitoring events with the goal to verify certain properties has been investigated in several domains, e.g., in the context of requirements engineering [15,31,32] and program monitoring [16,19,20]. It is also interesting to note the possible applications of such techniques in the context of monitoring web services.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Monitoring events with the goal to verify certain properties has been investigated in several domains, e.g., in the context of requirements engineering [15,31,32] and program monitoring [16,19,20]. It is also interesting to note the possible applications of such techniques in the context of monitoring web services.…”
Section: Related Workmentioning
confidence: 99%
“…The work Robinson [31,32] on requirements engineering is highly related. He suggests the use of LTL for the verification of properties.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Feather, Fickas, and Robinson [7,8,16] developed frameworks for run-time monitoring of software requirements that support the instrumentation, diagnosis, and reconfiguration of the system. To leverage these frameworks, a requirements engineer must first model the system's requirements through a goal-based modeling language, such as KAOS [5], and identify assumptions and constraints that could become violated.…”
Section: Requirements Monitoringmentioning
confidence: 99%
“…This monitoring information enables a DAS to detect both requirements violations, as well as conditions conducive to their occurrence [7,8,16]. Utility functions have been successfully applied for self-assessment purposes in DASs [3,9,15,17].…”
Section: Introductionmentioning
confidence: 99%