Verification and Validation in Systems Engineering Assessing UML/Sys

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investi

  • PDF / 9,224,710 Bytes
  • 261 Pages / 439.37 x 666.142 pts Page_size
  • 50 Downloads / 231 Views

DOWNLOAD

REPORT


Mourad Debbabi · Fawzi Hassaïne · Yosr Jarraya · Andrei Soeanu · Luay Alawneh

Verification and Validation in Systems Engineering Assessing UML/SysML Design Models

123

Dr. Mourad Debbabi Computer Security Laboratory Concordia Institute for Information Systems Engineering (CIISE) Faculty of Engineering and Computer Science Concordia University 1455, Boulevard de Maisonneuve West, EV 7-642 Montreal, Quebec, H3G 1M8 Canada [email protected]

Dr. Fawzi Hassaïne Capabilities for Asymmetric and Radiological Defence and Simulation Defence Research and Development Canada – Ottawa 3701 Carling Avenue Ottawa, ON, Canada K1A 0Z4 [email protected]

Dr. Yosr Jarraya Computer Security Laboratory Concordia Institute for Information Systems Engineering (CIISE) Faculty of Engineering and Computer Science Concordia University 1455, Boulevard de Maisonneuve West, EV 7-642 Montreal, Quebec, H3G 1M8 Canada [email protected]

Andrei Soeanu Computer Security Laboratory Concordia Institute for Information Systems Engineering (CIISE) Faculty of Engineering and Computer Science Concordia University 1455, Boulevard de Maisonneuve West, EV 7-642 Montreal, Quebec, H3G 1M8 Canada [email protected]

Luay Alawneh Department of Electrical and Computer Engineering Faculty of Engineering and Computer Science Concordia University 1455, Boulevard de Maisonneuve West, EV 13-173 Montreal, Quebec, H3G 1M8 Canada [email protected]

ISBN 978-3-642-15227-6 e-ISBN 978-3-642-15228-3 DOI 10.1007/978-3-642-15228-3 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2010936711 ACM Codes: D.2, C.4, K.6 c Springer-Verlag Berlin Heidelberg 2010  This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: KuenkelLopka GmbH, Heidelberg Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

To our families and friends!

Preface

At the dawn of the 21st century and the information age, communication and computing power are becoming ever increasingly available, virtually pervading almost every aspect of modern socio-economical interactions. Consequently, the potential for realizing a significantly greater number of technology-mediated activities has e

Data Loading...