This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, C...
Small companies form a large part of the software industry, but have mostly been overlooked by the requirements engineering research community. We know very little about the techn...
Requirements elicitation involves the construction of large sets of conceptual models. An important step in the analysis of these models is checking their consistency. Existing re...
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Scenarios are widely and successfully used to discover requirements for software-intensive systems. Recent advances in mobile computing technologies mean that mobile tools can sup...
Trading-off is a familiar element in requirements practice, but it generally assumes a set of independent requirements competing for resources. Choosing a tram route depends inste...