共 50 条
- [31] Reuse of formal verification efforts of incomplete models at the requirements specification stage [J]. COMPONENT-BASED SOFTWARE QUALITY: METHODS AND TECHNIQUES, 2003, 2693 : 326 - 351
- [32] UML based Security Function Policy Verification Method for Requirements Specification [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 832 - 833
- [34] Reuse of formal verification efforts of incomplete models at the requirements specification stage [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2693 : 326 - 351
- [35] A Semantic Driven Approach for Requirements Verification [J]. INTELLIGENT DISTRIBUTED COMPUTING VIII, 2015, 570 : 427 - 436
- [36] Enterprise modelling and verification approach for characterizing and checking organizational interoperability [J]. ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3, 2007, : 839 - +
- [38] Formal specification and verification of the SET/A protocol with an integrated approach [J]. CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2004, : 229 - 235
- [39] RETRACTION: Structured approach to property specification and verification of HWIP [J]. RSP 2007: 18TH IEEE/IFIP INTERNATIONAL WORKSHOP ON RAPID SYSTEM PROTOTYPING, PROCEEDINGS, 2007, : 161 - +
- [40] Behavioral requirements specification approach for interactive multimedia applications [J]. ASWEC 2008: 19TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2008, : 696 - 699