Nome |
# |
From Secure Business Process Modeling to Design-Level Security Verification, file e3835194-3a6e-72ef-e053-3705fe0ad821
|
436
|
Gamification Solutions via Software Engineering and Organizational Studies: A Comparative Study, file e3835193-470d-72ef-e053-3705fe0ad821
|
228
|
Towards a real-time BDI model for ROS 2, file e3835195-cd48-72ef-e053-3705fe0ad821
|
188
|
Multi-objective reasoning with constrained goal models, file e3835195-2994-72ef-e053-3705fe0ad821
|
158
|
Design Thinking and Acceptance Requirements for Gamification Design. A Research Preview., file e3835194-541b-72ef-e053-3705fe0ad821
|
150
|
Towards an integrated platform for adaptive socio-technical systems for smart spaces, file e3835193-7522-72ef-e053-3705fe0ad821
|
149
|
Modeling and reasoning on requirements evolution with constrained goal models, file e3835193-e101-72ef-e053-3705fe0ad821
|
140
|
Developing BDI-Based Robotic Systems with ROS2, file b4cadbf0-7612-4f72-9229-18172706e911
|
123
|
Goal-oriented requirements engineering: an extended systematic mapping study, file e3835195-cd3f-72ef-e053-3705fe0ad821
|
104
|
COPri - A Core Ontology for Privacy Requirements Engineering, file e3835197-8a88-72ef-e053-3705fe0ad821
|
98
|
From Secure Business Process Models to Secure Artifact-Centric Specifications, file e3835192-1c5c-72ef-e053-3705fe0ad821
|
91
|
Requirements evolution and evolution requirements with constrained goal models, file e3835193-7186-72ef-e053-3705fe0ad821
|
84
|
Requirements Engineering for Trust Management: Model, Methodology, and Reasoning, file e3835191-cc54-72ef-e053-3705fe0ad821
|
51
|
PACAS: A gamified platform for participatory change management in ATM systems, file e3835195-3b42-72ef-e053-3705fe0ad821
|
37
|
A holistic approach for privacy requirements analysis: An industrial case study, file e3835197-d440-72ef-e053-3705fe0ad821
|
32
|
Consent Verification Monitoring, file 4d688379-d9d7-42bf-8faa-57fc481f42da
|
29
|
RT-BDI: A Real-Time BDI Model, file e3835197-9c25-72ef-e053-3705fe0ad821
|
25
|
Applying Social Norms to Implicit Negotiation among Non-Player Characters in Serious Games, file e3835193-727c-72ef-e053-3705fe0ad821
|
23
|
The architecture of VisiOn privacy platform, file e3835197-8a8a-72ef-e053-3705fe0ad821
|
23
|
A Demonstration of BDI-Based Robotic Systems with ROS2, file d9f0646a-f691-4082-960a-ad0010fe8bb7
|
22
|
A Formal Definition of Culture, file 063affe4-e0ee-4325-81ce-1fb831020d60
|
21
|
Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security, file e3835197-a789-72ef-e053-3705fe0ad821
|
15
|
Transforming Socio-Technical Security Requirements in SecBPMN Security Policies, file e3835192-2e1d-72ef-e053-3705fe0ad821
|
13
|
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques, file e3835194-2141-72ef-e053-3705fe0ad821
|
13
|
Real-Time BDI Agents: A Model and Its Implementation, file 50136698-006b-484c-b969-a652679aabc4
|
10
|
Modeling structured and unstructured processes: An empirical evaluation, file e3835193-72d1-72ef-e053-3705fe0ad821
|
10
|
From security-by-design to the identification of security-critical deviations in process executions, file e3835195-3a04-72ef-e053-3705fe0ad821
|
8
|
Modeling and reasoning about privacy-consent requirements, file e3835195-3a06-72ef-e053-3705fe0ad821
|
8
|
Requirement Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard, file 2f0d7bc0-369a-4666-9ebc-27f65a998c70
|
7
|
TROPOS: An Agent-Oriented Software Development Methodology, file 9721cef2-24eb-4f85-997c-0dd0cff4d77f
|
7
|
A Knowledge Level Software Engineering Methodology for Agent Oriented Programming, file df84a850-61d1-4766-aef9-b9398eab1f56
|
7
|
Applying the Tropos Methodology for Analysing Web Services Requirements and Reasoning about Qualities of Services, file 38c59916-9958-4cfa-835b-970f74ee1458
|
6
|
Designing Secure Socio-Technical Systems with STS-ml, file e3835192-2e26-72ef-e053-3705fe0ad821
|
6
|
Analysing Information Integrity Requirements in Safety Critical Systems, file e3835192-2e84-72ef-e053-3705fe0ad821
|
6
|
Designing Sociotechnical Systems with Protos, file e3835192-3238-72ef-e053-3705fe0ad821
|
6
|
COPri v.2 — A core ontology for privacy requirements, file e3835199-4a3d-72ef-e053-3705fe0ad821
|
6
|
Personal Agents for Implicit Culture Support, file 25bcc5ce-4719-40b4-9ce4-37c206573a7d
|
5
|
Implict Culture-based Personal Agents for Knowledge Management, file 29797ad4-8533-4003-ab20-3bdc085e777b
|
5
|
Security Requirements Engineering via Commitments, file 2a6b532a-451c-4e78-b3fc-ac080411267b
|
5
|
Talos: An Architecture for Self-Configuration, file 30af73a5-4bcd-4a1f-bc7a-fe61bc07cd8a
|
5
|
Uncertainty Dimensions of Risks in Secure and Dependable Domain, file 33a39ff6-7264-4ae5-b6d9-e04937ed5eec
|
5
|
Reasoning with Goal Models, file 3f7a1341-1641-451e-8bf5-d43b3645f368
|
5
|
Implicit: An Agent-Based Recommendation System for Web Search, file 713e361e-1370-4371-9920-96c8f36bdc8c
|
5
|
A framework for information quality requirements engineering, file b2f6fde8-63a4-4c56-8df8-b710eb9af2e6
|
5
|
Implicit culture: an approach for experiential reasoning, file b3ba70ad-a22f-44d1-a120-3ec866b5feea
|
5
|
A goal-based approach for automated specification of Information Quality policies, file e3835192-2745-72ef-e053-3705fe0ad821
|
5
|
Modeling and Reasoning about Information Quality Requirements in Business Processes, file e3835192-2747-72ef-e053-3705fe0ad821
|
5
|
Goal-Oriented Requirements Engineering: A Systematic Literature Map, file e3835193-702f-72ef-e053-3705fe0ad821
|
5
|
Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform, file e3835193-75fe-72ef-e053-3705fe0ad821
|
5
|
Goal models for acceptance requirements analysis and gamification design, file e3835194-3939-72ef-e053-3705fe0ad821
|
5
|
Applying Tropos Methodology to a real case study: Complexity and Criticality Analysis, file f513468a-7e17-461e-a930-5386ab6322d2
|
5
|
Implicit Culture Framework for Behavior Transfer, file 25737baf-255d-4a0d-ad4b-0b0f532d1ebe
|
4
|
An Implemented Prototype of Bluetooth-Based Multi-Agent System, file 38dac4e6-40d7-425e-bc64-07b58b67b2ce
|
4
|
Modeling and Analyzing Contextual Requirements, file 557ee42d-6d82-41e6-be85-51087d0c611e
|
4
|
Implicit: a recommender system that uses implicit knowledge to produce suggestions, file 6fa87215-2686-45ab-ad7b-2bb9e7d453ac
|
4
|
IC-Service: A Service-Oriented Approach to the Development of Recommendation Systems, file 715d0310-56e5-4b53-a556-aaf6cdc9e73b
|
4
|
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments, file 7c9e94bf-de06-4393-8ba0-3e45d3ef1375
|
4
|
Reasoning about Contextual Requirements for Mobile Information Systems: a Goal-based Approach, file 8e69ed0e-830e-43d1-98a7-913c4385c609
|
4
|
BarterCell: an Agent-based Bartering Service for Users of Pocket Computing Devices, file 92a0b415-e6ba-419e-8b78-846b9cff1c9a
|
4
|
Specifying Business Processes with Azzurra, file a2c5de8b-e8c4-4ffb-a294-d751a4b7a7bc
|
4
|
A Multi-Agent System for Choosing Software Patterns, file ad825b6c-2661-436a-887a-fdf0e5dc0d35
|
4
|
Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures, file b0aece1a-8fe1-43d1-b23d-084ef006d05c
|
4
|
Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning, file bacf5737-9933-4bf5-929a-96ae02169897
|
4
|
Collaborative Case Retrieval within the Implicit Culture Framework, file c9de0631-90f8-4d06-81e7-d8d53ddcc01f
|
4
|
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments, file d92c210b-c405-4acd-a4e4-2b92dd38498a
|
4
|
Identifying Conflicts in Security Requirements with STS-ml, file dbd9107e-9ac1-4371-80f2-fdeff86738b5
|
4
|
A NFR-based Framework for User-Centered Adaptation, file e0997f12-874d-4ddb-af9d-0d37a37c6f6a
|
4
|
TROPOS: an agent-oriented software development methodology, file e3835191-cd49-72ef-e053-3705fe0ad821
|
4
|
Multi-objective reasoning with constrained goal models, file e3835195-8d53-72ef-e053-3705fe0ad821
|
4
|
Analyzing Risk-Countermeasure in Organizations: a Quantitative Approach, file e56e80f7-1723-4594-9207-52aa6fc6a8b7
|
4
|
Sweeper-Agent Recommendations-Tree Early Scheme, file f19e7ac4-eb97-4bc4-96cf-d0637af07590
|
4
|
Risk Modelling and Reasoning in Goal Models, file 05df7a60-c048-449a-b5d3-a79a12eb58e2
|
3
|
Detecting Conflicts in Information Quality Requirements: the May 6, 2010 Flash Crash, file 07e8e1b3-d464-425f-b8c5-1bf96fbd9dbd
|
3
|
Choosing the right design pattern: an implicit culture approach, file 2a859e3b-ca66-4f40-9fc4-5918cc5a83c4
|
3
|
Requirements Analysis for Socio-technical Systems: Exploring and Evaluating Alternatives, file 489f62f8-6fab-4671-bb5c-5dcdcff626af
|
3
|
From Trust to Dependability through Risk Analysis, file 4a3e0566-d1ec-44ab-8ad1-52ea8c39cad3
|
3
|
A Formal Definition of Culture of a Set of Agents: The Version without States, file 4fab139a-49db-49a9-9db2-703fd0f97695
|
3
|
A Goal-based Framework for Contextual Requirements Modeling and Analysis, file 56988e3d-bda9-47db-9da3-45aaafdcba1c
|
3
|
Reasoning about Risk in Agent's Deliberation Process: a Jadex Implementation, file 5e926dd0-4a1f-453e-95a2-edc1f1250234
|
3
|
Semi-Heuristic Negotiation Protocol for Agent-based Mobile Service Application, file 77be1307-3346-4526-85ef-a9e042ed7063
|
3
|
Locating Agents in RFID Architectures, file 7cac602a-f675-4f9e-8afb-d4075f6686bb
|
3
|
Design Patterns to Enable Agent-based Mobile Service Application Development., file 955ef4a5-6768-4863-922c-8b4a7ea33062
|
3
|
Smart Ride Seeker (SRS) An Introductory Plan, file 98bf7b31-e9be-4822-9ee0-4d8db81f85ea
|
3
|
Implicit Culture as a Tool for Social Navigation, file a4fdabeb-11b9-4767-8915-4594b8243530
|
3
|
Location-based Modeling and Analysis: Tropos-based Approach, file bc95f8c5-6b0e-4771-b227-99ac67ff3a34
|
3
|
An Architecture for Requirements-driven Self-reconfiguration, file bdb40207-6917-480e-8c19-cabf55405460
|
3
|
COPri v.2 — A core ontology for privacy requirements, file c41b8155-31ca-4d74-bd2f-e717f418ebac
|
3
|
ANDIAMO: A Multiagent System to Provide a Mobile-based Rideshare Service, file ce8e555b-6088-4cff-811b-f99efedba15a
|
3
|
A Multi-Agent System that Facilitates Scientific Publications Search, file d4711e53-7c5a-490d-873e-cccbc49cab15
|
3
|
Risk Analysis as part of the Requirements Engineering Process, file d89c64c9-0269-4ee2-a4ae-fbbd5524e3de
|
3
|
Security and Trustworthiness Threats To Composite Services: Taxonomy, Countermeasures, And Research Directions, file e3835192-2c85-72ef-e053-3705fe0ad821
|
3
|
Preserving Compliance with Security Requirements in Socio-Technical Systems, file e3835192-2e10-72ef-e053-3705fe0ad821
|
3
|
Trust-Based Specification of Sociotechnical Systems, file e3835192-2e8e-72ef-e053-3705fe0ad821
|
3
|
Requirements-Driven Deployment: Customizing the Requirements Model for the Host Environment, file e3835192-3530-72ef-e053-3705fe0ad821
|
3
|
Acceptance Requirements and Their Gamification Solutions, file e3835193-7123-72ef-e053-3705fe0ad821
|
3
|
Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution, file e3835193-72c7-72ef-e053-3705fe0ad821
|
3
|
A holistic approach for privacy protection in e-government, file e3835194-3b1f-72ef-e053-3705fe0ad821
|
3
|
Analysis of information quality requirements in business processes, revisited, file e3835195-3a6d-72ef-e053-3705fe0ad821
|
3
|
A data-driven, goal-oriented framework for process-focused enterprise re-engineering, file e3835199-6737-72ef-e053-3705fe0ad821
|
3
|
ToothAgent: Brushing on Your Behalf, file e917d352-7109-47e1-b766-43deac951591
|
3
|
Totale |
2.582 |