Sciweavers

2835 search results - page 69 / 567
» Imperfect Requirements in Software Development
Sort
View
WWW
2003
ACM
14 years 8 months ago
Revealing Web User Requirements through e-Prototyping
Web Engineering projects face problems when it comes to reveal the Web users' requirements. This is due to the fact that users ? the clients of a Web application ? have diffi...
Martti Jeenicke, Wolf-Gideon Bleek, Ralf Klischews...
JOT
2008
108views more  JOT 2008»
13 years 7 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati
ICDCIT
2004
Springer
14 years 1 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland
REFSQ
2009
Springer
14 years 2 months ago
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies
[Context and motivation] In market-driven product development of software intensive products large numbers of requirements threaten to overload the development organization. It is ...
Mahvish Khurum, Tony Gorschek, Lefteris Angelis, R...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine