Sciweavers

5668 search results - page 113 / 1134
» Overlaps in Requirements Engineering
Sort
View
WER
2001
Springer
14 years 2 months ago
Using the Language Extended Lexicon to Support Non-Functional Requirements Elicitation
Although Non-Functional Requirements (NFR) have been present in many software development methods, they have been faced as a second or even third class type of requirement, frequen...
Luiz Marcio Cysneiros, Julio Cesar Sampaio do Prad...
ICRE
1998
IEEE
14 years 2 months ago
Safety Analysis of Requirements for a Product Family
A safety analysis was performed on the software requirements for a family of ight instrumentation displays of commercial aircraft. First, an existing Safety Checklist was extended...
Robyn R. Lutz, Guy G. Helmer, Michelle M. Moseman,...
REFSQ
2010
Springer
14 years 2 months ago
Binary Priority List for Prioritizing Software Requirements
Product managers in software companies are confronted with a continuous stream of incoming requirements. Due to limited resources they have to make a selection of those that can be...
Thomas Bebensee, Inge van de Weerd, Sjaak Brinkkem...
ASWEC
2010
IEEE
13 years 10 months ago
Scenario-Based Validation: Beyond the User Requirements Notation
—A quality-driven approach to software development and testing demands that, ultimately, the requirements of stakeholders be validated against the actual behavior of an implement...
Dave Arnold, Jean-Pierre Corriveau, Wei Shi
RE
2002
Springer
13 years 10 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...