A Reuse-Oriented Approach for the Construction of Scenario Based Methods
نویسندگان
چکیده
Despite the recent interest in scenarios, the development of new methods and tools for Requirements Engineering integrating scenario based approaches has been limited. This paper reports on four different processes developed from research undertaken as part of the CREWS project which the authors believe will improve scenario use and make it more systematic. Furthermore CREWS aims to integrate these approaches into a method for scenariobased requirements engineering. To achieve this objective and be able to include existing approaches such as use case analysis we develop a component based approach which reflects a shift towards a reuse-centric approach to method engineering. The paper presents CREWS method and metamethod knowledge through the implementation of an SGML database to store, retrieve and dynamically compose chunks of CREWS processes.
منابع مشابه
Dwarf Frankenstein is still in your memory: tiny code reuse attacks
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
متن کاملAn integrated simulation-DEA approach to multi-criteria ranking of scenarios for execution of operations in a construction project
The purpose of this study is to examine different scenarios for implementing operations in the pre-construction phase of a project, based on several competing criteria with different importance levels in order to achieve a more efficient execution plan. This paper presents a new framework that integrates discrete event simulation (DES) and data envelopment analysis (DEA) to rank different scena...
متن کاملAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
متن کاملانتخاب بهترین روش مدیریتی دفع نخالههای ساختمانی شهر تهران با دیدگاه توسعه پایدار براساس تکنیک تحلیل سلسله مراتبی
Background and Objective: Environmental pollution due to dumping construction and demolition wastes has adverse effects on public health. This study aimed to select the best method for managing construction and demolition wastes disposal in Tehran by AHP. Materials and Methods: This research was a descriptive study. The study population consisted of environmental health experts in the field of...
متن کاملDeveloping an analytical model for the formation of a design scenario in research-based design processes in architecture
Although many attempts have been made in presenting systematic models for design processes, most projects have been implemented by non-systematic methods, which seems that too much emphasis on the description of the final project (product) and the lack of attention to the design process are to be blamed for this. In this paper, a specific pattern of design scenario formation in the framework of...
متن کامل