The information that is made available through the semantic web will be accessed through complex programs (web-services, sensors, etc.) that may interact in sophisticated ways. Com...
Ronny Siebes, David Dupplaw, Spyros Kotoulas, Adri...
The transfer of entire projects to offshore locations, the aging and renewal of core developers in legacy products, the recruiting in fast growing Internet companies, and the part...
Eliciting requirements is well known to be a difficult task. Several strategies exist that makes it possible to elicit information from different information sources. These strate...
Julio Cesar Sampaio do Prado Leite, Edson Andrade ...
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
This paper introduces UK-SpecIAL, a simple independent open learner model to raise learner awareness of their progress towards learning outcomes across components of their degree. ...