0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Requirements Engineering: Foundation for Software Quality - 24th International Working Conference, REFSQ 2018, Utrecht, The... Requirements Engineering: Foundation for Software Quality - 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

This book constitutes the proceedings of the 24th International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2018, held in Utrecht, The Netherlands, in March 2018. The 23 full and 2 invited talks papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers were organized in topical sections named: RE in Industrial Practice; NLP in Theory and Practice; Empirical Insights into Traceability; Taming Ambiguity; Large-Scale RE; Quality Requirements; User and Job Stories; Requirements Alignment; RE Previews and Visions; Big Data; Mindmapping and Requirements Modeling.

Engineering Multi-Agent Systems - Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected... Engineering Multi-Agent Systems - Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Fabiano Dalpiaz, Jurgen Dix, M. Birna van Riemsdijk
R2,749 Discovery Miles 27 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Engineering Multi-Agent Systems, EMAS 2014, held in Paris, France, in May 2014. The 22 full papers were carefully reviewed and selected from 41 submissions. The focus of the papers is on following topics: intelligent agents, multi-agent systems, software design engineering, model-driven software engineering, reasoning about belief and knowledge, cooperation and coordination, constraint and logic programming, software verification, design patterns.

Requirements Engineering:  Foundation  for Software Quality - 27th International Working Conference, REFSQ 2021, Essen,... Requirements Engineering: Foundation for Software Quality - 27th International Working Conference, REFSQ 2021, Essen, Germany, April 12-15, 2021, Proceedings (Paperback, 1st ed. 2021)
Fabiano Dalpiaz, Paola Spoletini
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the proceedings of the 27th International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2021, which was due to be held in Essen, Germany, in April 2021. Due to the COVID-19 pandemic the conference was held virtually in April 2021. The special focus of this year`s REFSQ 2021 conference are contributions emphasizing the importance of human values, such as privacy and fairness, when designing software-intensive systems as well as the challenges that intelligent and autonomous systems pose due to the tight interplay with humans.

Research Challenges in Information Science - 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23-25, 2020,... Research Challenges in Information Science - 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23-25, 2020, Proceedings (Paperback, 1st ed. 2020)
Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos
R1,582 Discovery Miles 15 820 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th International Conference on Research Challenges in Information Sciences, RCIS 2020, held in Limassol, Cyprus, during September 23-25, 2020. The conference was originally scheduled for May 2020, but the organizing committee was forced to postpone the conference due to the outbreak of the COVID-19 pandemic. The scope of RCIS 2020 is summarized by the thematic areas of information systems and their engineering; user-oriented approaches; data and information management; business process management; domain-specific information systems engineering; data science; information infrastructures, and reflective research and practice. The 26 full papers and 3 work in progress papers presented in this volume were carefully reviewed and selected from 106 submissions. They were organized in topical sections named: Data Analytics and Business Intelligence; Digital Enterprise and Technologies; Human Factors in Information Systems; Information Systems Development and Testing; Machine Learning and Text Processing; and Security and Privacy. The volume also contains 12 poster and demo-papers, and 4 Doctoral Consortium papers.

Security Requirements Engineering - Designing Secure Socio-Technical Systems (Hardcover): Fabiano Dalpiaz, Elda Paja, Paolo... Security Requirements Engineering - Designing Secure Socio-Technical Systems (Hardcover)
Fabiano Dalpiaz, Elda Paja, Paolo Giorgini
R1,506 R1,346 Discovery Miles 13 460 Save R160 (11%) Ships in 9 - 15 working days

A novel, model-driven approach to security requirements engineering that focuses on socio-technical systems rather than merely technical systems. Security requirements engineering is especially challenging because designers must consider not just the software under design but also interactions among people, organizations, hardware, and software. Taking this broader perspective means designing a secure socio-technical system rather than a merely technical system. This book presents a novel, model-driven approach to designing secure socio-technical systems. It introduces the Socio-Technical Modeling Language (STS-ML) and presents a freely available software tool, STS-Tool, that supports this design approach through graphical modeling, automated reasoning capabilities to verify the models constructed, and the automatic derivation of security requirements documents. After an introduction to security requirements engineering and an overview of computer and information security, the book presents the STS-ML modeling language, introducing the modeling concepts used, explaining how to use STS-ML within the STS method for security requirements, and providing guidelines for the creation of models. The book then puts the STS approach into practice, introducing the STS-Tool and presenting two case studies from industry: an online collaborative platform and an e-Government system. Finally, the book considers other methods that can be used in conjunction with the STS method or that constitute an alternative to it. The book is suitable for course use or as a reference for practitioners. Exercises, review questions, and problems appear at the end of each chapter.

Secure and Trustworthy Service Composition - The Aniketos Approach (Paperback, 2014 ed.): Achim Brucker, Fabiano Dalpiaz, Paolo... Secure and Trustworthy Service Composition - The Aniketos Approach (Paperback, 2014 ed.)
Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Hakon Meland, Erkuden Rios
R2,163 Discovery Miles 21 630 Ships in 10 - 15 working days

The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing. This state-of-the-art survey illustrates the results of the Aniketos - Secure and Trustworthy Composite Services - project (funded under the EU 7th Research Framework Programme). The papers included in the book describe the solutions developed during the 4-year project to establish and maintain trustworthiness and secure behavior in a constantly changing service environment. They provide service developers and providers with a secure service development framework that includes methods, tools, and security services supporting the design-time creation and run-time composition of secure dynamic services, where both the services and the threats are evolving. The 16 chapters are organized in the following thematic sections: state of the art of secure and trustworthy composite services; the Aniketos platform; design-time support framework; run-time support framework; and case studies and evaluation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Man Alone - Mandela's Top Cop, Exposing…
Caryn Dolley Paperback R310 R225 Discovery Miles 2 250
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R250 Discovery Miles 2 500
Comfort
Yotam Ottolenghi, Helen Goh Hardcover R795 R570 Discovery Miles 5 700
The Super Cadres - ANC Misrule In The…
Pieter du Toit Paperback R330 R220 Discovery Miles 2 200
Revisit The Old Mill - Its Creation…
W. Leon Smith Hardcover R655 Discovery Miles 6 550
Wicked Women of Missouri
Larry Wood Paperback R587 R491 Discovery Miles 4 910
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke Paperback R330 R220 Discovery Miles 2 200
East Bay Hills - A Brief History
Amelia Sue Marshall Paperback R656 R561 Discovery Miles 5 610
Kanker Schmanker!
Madelein Rust Paperback R320 R275 Discovery Miles 2 750
Expensive Poverty - Why Aid Fails And…
Greg Mills Paperback R360 R309 Discovery Miles 3 090

 

Partners