Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
This paper discusses automatic determination of case in Arabic. This task is an important part and major source of errors in full diacritization of Arabic. We use a goldstandard s...
Nizar Habash, Ryan Gabbard, Owen Rambow, Seth Kuli...
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...
Defect reports generated for faults found during testing provide a rich source of information regarding problematic phrases used in requirements documents. These reports indicate ...
Kimberly S. Wasson, Kendra N. Schmid, Robyn R. Lut...