Sciweavers

5668 search results - page 131 / 1134
» Overlaps in Requirements Engineering
Sort
View
153
Voted
ICSOC
2010
Springer
15 years 1 months ago
A Requirement-Centric Approach to Web Service Modeling, Discovery, and Selection
Service-Oriented Computing (SOC) has gained considerable popularity for implementing Service-Based Applications (SBAs) in a flexible and effective manner. The basic idea of SOC i...
Maha Driss, Naouel Moha, Yassine Jamoussi, Jean-Ma...
115
Voted
RE
2008
Springer
15 years 2 months ago
Examining the Relationships between Performance Requirements and "Not a Problem" Defect Reports
Missing or imprecise requirements can lead stakeholders to make incorrect assumptions. A "Not a Problem" defect report (NaP) describes a software behavior that a stakeho...
Chih-Wei Ho, Laurie Williams, Brian Robinson
135
Voted
RE
2010
Springer
14 years 10 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
130
Voted
ICSE
1999
IEEE-ACM
15 years 7 months ago
CHIME: Customizable Hyperlink Insertion and Maintenance Engine for Software Engineering Environments
Source code browsing is an important part of program comprehension. Browsers expose semantic and syntactic relationships (such as between object references and definitions) in GU...
Premkumar T. Devanbu, Yih-Farn Chen, Emden R. Gans...
APSEC
2003
IEEE
15 years 8 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun