Model inspections in the engineering of collaborative cyber‐physical systems with instance‐level review diagrams
Abstract
Graphical Abstract
References
Recommendations
Do Instance-level Review Diagrams Support Validation Processes of Cyber-Physical System Specifications: Results from a Controlled Experiment
ICSSP '20: Proceedings of the International Conference on Software and System ProcessesIn the field of safety-critical systems, manual reviews are important to ensure high-quality software and to satisfy legal obligations. When applying model-based engineering approaches, no longer are only textual requirements specifications or software ...
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks
Understanding the social engineering threat is important in requirements engineering for security-critical information systems. Mal-activity diagrams have been proposed as being better than misuse cases for this purpose, but without any empirical ...
How are UML class diagrams built in practice? A usability study of two UML tools: Magicdraw and Papyrus
Highlights- This paper analyzes how UML class diagrams are built by analyzing 12 h of video recordings of students using MagicDraw and Papyrus to draw example class ...
AbstractSoftware modeling is a key activity in software development, especially when following any kind of Model Driven Software Engineering (MDSE) process. In this context, standard modeling languages, like the Unified Modeling Language (UML),...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
John Wiley & Sons, Inc.
United States
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in