Sciweavers

5668 search results - page 51 / 1134
» Overlaps in Requirements Engineering
Sort
View
110
Voted
RE
2002
Springer
15 years 3 months ago
Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach
José Ambrosio Toval Álvarez, Joaqu&i...
110
Voted
SSIRI
2010
15 years 1 months ago
Model-Based Argument Analysis for Evolving Security Requirements
Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar...
151
Voted
RE
2011
Springer
14 years 10 months ago
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Mina Deng, Kim Wuyts, Riccardo Scandariato, Bart P...
120
Voted
ICSE
2010
IEEE-ACM
15 years 5 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...
109
Voted
RE
2004
Springer
15 years 9 months ago
Requirements for Requirements Management Tools
Tools for managing systems requirements help keeping specifications consistent, up-to-date and accessible. Since the requirements for complex systems are themselves complex inform...
Matthias Hoffmann, Nikolaus Kühn, Matthias We...