Bijan et al., 2011 - Google Patents
6.6. 1 Using MBSE with SysML Parametrics to Perform Requirements AnalysisBijan et al., 2011
- Document ID
- 14820161964841534319
- Author
- Bijan Y
- Yu J
- Graves H
- Stracener J
- Woods T
- Publication year
- Publication venue
- INCOSE International Symposium
External Links
Snippet
Requirements are attributed as a common cause of failure in system development. Not only are text requirements ambiguous, the domain conditions under which they are to be satisfied are vague. Until operating conditions and requirements are formally captured, they will …
- 238000004458 analytical method 0 title description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/36—Software reuse
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/10—Requirements analysis; Specification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zoughbi et al. | Modeling safety and airworthiness (RTCA DO-178B) information: conceptual model and UML profile | |
Hilderman et al. | Avionics certification: a complete guide to DO-178 (software), DO-254 (hardware) | |
Giammarco et al. | Verification and validation of behavior models using lightweight formal methods | |
Gough et al. | Employing model-based systems engineering (MBSE) on a NASA aeronautic research project: a case study | |
Cardoso et al. | A review of verification and validation for space autonomous systems | |
Daw et al. | Overarching properties as means of compliance: An industrial case study | |
Croxford et al. | Breaking through the V and V bottleneck | |
Bijan et al. | 6.6. 1 Using MBSE with SysML Parametrics to Perform Requirements Analysis | |
Panchal et al. | Comprehensive Overview of a Process-Oriented Build Tool for Airborne Safety-Critical Software Development | |
Tietz et al. | Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? | |
Hoffmann | 5.3. 3 SysML‐Based Systems Engineering Using a Model‐Driven Development Approach | |
Miller | Bridging the gap between model-based development and model checking | |
Tietz et al. | Why the Use of Domain-specific Modeling in Airworthy Software Requires New Methods and How these Might Look Like?(extended version) | |
Frank et al. | The challenge of configuring model-based space mission planners | |
Basagiannis | Software certification of airborne cyber-physical systems under DO-178C | |
Halvorson et al. | Architecture Framework Standardization for Satellite Software Generation Using MBSE and F Prime | |
Boydston et al. | Joint common architecture (JCA) demonstration architecture centric virtual integration process (ACVIP) shadow effort | |
Dabney et al. | Using assume-guarantee contracts in autonomous spacecraft | |
Chakraborty et al. | A model based system engineering approach to design Avionics systems: Present and Future prospect | |
Erkkinen | Production code generation for safety-critical systems | |
Clement et al. | The challenge of grounding planning in simulation with an interactive model development environment | |
Kausch et al. | Applied Model-Based Co-Development for Zero-Emission Flight Systems Based on SysML | |
Yuan et al. | Man‐Machine Modeling and Safety Analysis Method for Landing Process Based on SysML and Simulink | |
Kiran et al. | Autopilot mode transitions and voter logic validation using model checking: a design study of formal methods | |
Micouin et al. | Property model methodology: a first assessment in the avionics domain |