4Dwyer M,Avrunin G,Corbett J.Patterns in property specifications for finite-state verification[C] //Proc of ICSE99.Washington,DC:IEEE Computer Society,1999:411-420.
5Wang Qianxiang,Li Min,Meng Na,et al.A pattern-based constraint description approach for Web services[C] //Proc of QSIC07.Washington,DC:IEEE Computer Society,2007:60-69.
6Wang Qianxiang,Mathur A.Interceptor based constraint violation detection[C] //Proc of ECBS05.Washington,DC:IEEE Computer Society,2005:457-464.
7Avizienis A,Laprie J,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing[J].IEEE Trans on Dependable and Secure Computing,2004,1(1):11-33.
8Dawson D,Desmarais R,Kienle H,et al.Monitoring in adaptive systems using reflection[C] //Proc of the 2008 Int Workshop on Software Engineering for Adaptive and Self-Managing Systems.New York:ACM,2008:81-88.
9IEEE Computer Society Professional Practices Committee.Guide to the Software Engineering Body of Knowledge[EB/OL].[2008-09-15].http://www.swebok.org/ironman/pdf/SWEBOK_Guide_2004.pdf.
10Zave P.Classification of research efforts in requirements engineering[C] //Proc of RE95.Washington,DC:IEEE,1995:214-216.