Learn More
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements. The system context is described using a problem-oriented notation, then is validated(More)
We have validated ECG-gated emission tomography using technetium-99m methoxyisobutylisonitrile for the assessment of regional ventricular function by comparing it with cine magnetic resonance imaging (MRI). Gated tomography was performed at rest in 24 patients referred for myocardial perfusion imaging [17 males and seven females with a mean age of 58 years,(More)
(2010). A comparative evaluation of algorithms for discovering translational patterns in Baroque keyboard works. In: Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online's data policy on reuse of materials please consult the policies page.(More)
Problem Frames are a systematic approach to the decomposition of problems that allows us to relate requirements, domain properties, and machine specifications. Having decomposed a problem, one approach to solving it is through a process of composing solutions to sub-problems. In this paper, we contribute to supporting such a process by providing a way to(More)
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, whether implicit or explicit, affect the scope of the analysis, derivation of security requirements, and in some cases how functionality is realized. This paper presents trust(More)
UniPad is a face-to-face, digital simulation for use in classroom settings that runs on shared tablets and a wall display. The goal is to encourage students to talk, collaborate and make decisions together in real-time, by switching between working on shared 'small group' devices and a 'whole classroom' public display - instead of working by themselves(More)
Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build secure systems by(More)
Stylistic composition is a creative musical activity, in which students as well as renowned composers write according to the style of another composer or period. We describe and evaluate two computational models of stylistic composition, called Racchman-Oct2010 and Racchmaninof-Oct2010. The former is a constrained Markov model and the latter embeds this(More)
In this paper, we describe a playable musical interface for tablets and multi-touch tables. The interface is a generalized keyboard, inspired by the Thummer, and consists of an array of virtual buttons. On a generalized keyboard, any given interval always has the same shape (and therefore fingering); furthermore, the fingering is consistent over a broad(More)