Transforming and tracing reused requirements models to home automation models
Information and Software Technology
ECSA'13 Proceedings of the 7th European conference on Software Architecture
Hi-index | 0.00 |
As information technology has spread into all kinds of systems, vulnerabilities in critical infrastructure have increased. Reasons for failing systems vary from the technical issues of new technology to the human aspects. Developing dependable complex ...