Sciweavers

6978 search results - page 47 / 1396
» Reframing Requirements Analysis
Sort
View
AOSD
2004
ACM
14 years 3 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
14 years 3 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
RE
2005
Springer
14 years 3 months ago
Multi-Dimensional Separation of Concerns in Requirements Engineering
Existing requirements engineering approaches manage broadly scoped requirements and constraints in a fashion that is largely two-dimensional, where functional requirements serve a...
Ana Moreira, Awais Rashid, João Araú...
RE
2007
Springer
14 years 4 months ago
Improving Performance Requirements Specifications from Field Failure Reports
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Chih-Wei Ho, Laurie Williams, Annie I. Antó...
WER
2004
Springer
14 years 3 months ago
A pattern language to join early and late requirements
At present, the early phase of Requirements Engineering is a new research area in the Software Engineering field. This phase is concerned with the analysis of the organizational c...
Alicia Martínez, Oscar Pastor, Hugo Estrada