Sciweavers

5180 search results - page 94 / 1036
» Requirements Engineering
Sort
View
AOSD
2004
ACM
15 years 8 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
RE
2001
Springer
15 years 7 months ago
Reconciling Software Requirements and Architectures: The CBSP Approach
Little guidance and few methods are available to refine a set of software requirements into an architecture satisfying those requirements. Part of the challenge stems from the fac...
Paul Grünbacher, Alexander Egyed, Nenad Medvi...
IWPC
2000
IEEE
15 years 6 months ago
Tracing Object-Oriented Code into Functional Requirements
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual page...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
ICSE
1993
IEEE-ACM
15 years 6 months ago
Expressing the Relationships Between Multiple Views in Requirements Specification
Composite systems generally comprise heterogeneous components whose specifications are developed by many development participants. The requirements of such systems are invariably ...
Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein
RE
2005
Springer
15 years 8 months ago
Identifying Contingency Requirements Using Obstacle Analysis
This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...