Facilitating Requirements Engineering of Semantic Applications
نویسندگان
چکیده
This paper presents a detailed Requirements Engineering process for the development of semantic applications. It presents the activities for requirements elicitation and analysis and shows how to follow these activities in an example case study. To facilitate its use by software engineers that are not experts in semantic technologies, several resources are provided, namely a comprehensive collection of the characteristics of semantic applications and two catalogues of use cases and
منابع مشابه
Addressing Semantic Geographic Information Systems
The progressive consolidation of information technologies on a large scale has been facilitating and progressively increasing the production, collection, and diffusion of geographic data, as well as facilitating the integration of a large amount of external information into geographic information systems (GIS). Traditional GIS is transforming into a consolidated information infrastructure. This...
متن کاملSemantic annotation of requirements for automatic UML class diagram generation
The increasing complexity of software engineering requires effective methods and tools to support requirements analysts’ activities. While much of a company’s knowledge can be found in text repositories, current content management systems have limited capabilities for structuring and interpreting documents. In this context, we propose a tool for transforming text documents describing users’ req...
متن کاملGuidelines for the Specification and Design of Large-Scale Semantic Applications
This paper presents a set of guidelines to help software engineers with the specification and design of large-scale semantic applications by defining new processes for Requirements Engineering and Design for semantic applications. To facilitate its use to software engineers not experts in semantic technologies, several techniques are provided, namely, a characterization of large-scale semantic ...
متن کاملAnalysis of disassembled executable codes by abstract interpretation
The aim of this paper is to dene the abstract domain, abstract operator, abstract semantic, the environments and states of disassembled executable codes as well as a way to analysis the disassembled executable codes. Nowadays, static analysis on disassembled code going to grow. Reverse engineering and malware analysis use this technique. Thus, we tried to perform pluralization the requirements ...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008