Sciweavers

10908 search results - page 139 / 2182
» Requirements Engineering Tasks
Sort
View
RE
2002
Springer
13 years 8 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
EMNLP
2007
13 years 10 months ago
Determining Case in Arabic: Learning Complex Linguistic Behavior Requires Complex Linguistic Features
This paper discusses automatic determination of case in Arabic. This task is an important part and major source of errors in full diacritization of Arabic. We use a goldstandard s...
Nizar Habash, Ryan Gabbard, Owen Rambow, Seth Kuli...
CIKM
2008
Springer
13 years 11 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
RE
2005
Springer
14 years 2 months ago
Identifying Contingency Requirements Using Obstacle Analysis
This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...
RE
2005
Springer
14 years 2 months ago
Using Occurrence Properties of Defect Report Data to Improve Requirements
Defect reports generated for faults found during testing provide a rich source of information regarding problematic phrases used in requirements documents. These reports indicate ...
Kimberly S. Wasson, Kendra N. Schmid, Robyn R. Lut...