Sciweavers

RE
2007
Springer
14 years 6 months ago
Technique Integration for Requirements Assessment
Alex Dekhtyar, Jane Huffman Hayes, Senthil Karthik...
RE
2007
Springer
14 years 6 months ago
Tracing and Validating Goal Aspects
Aspects promote a clear separation of concerns so that tangled and scattered concerns are modularized throughout software development. We propose a framework to trace aspects iden...
Yijun Yu, Nan Niu, Bruno González-Baixauli,...
RE
2007
Springer
14 years 6 months ago
Value-Based Requirements Traceability: Lessons Learned
Abstract. Traceability from requirements to code is mandated by numerous software development standards. These standards, however, are not explicit about the appropriate level of q...
Alexander Egyed, Paul Grünbacher, Matthias He...
RE
2007
Springer
14 years 6 months ago
Specifying Monitoring and Switching Problems in Context
Context-aware applications monitor changes in their operating environment and switch their behaviour to keep satisfying their requirements. Therefore, they must be equipped with th...
Mohammed Salifu, Yijun Yu, Bashar Nuseibeh
RE
2007
Springer
14 years 6 months ago
Goal-Oriented Conceptual Database Design
We present details of a goal-oriented process for database requirements analysis. This process consists of a number of steps, spanning the spectrum from high-level stakeholder goa...
Lei Jiang, Thodoros Topaloglou, Alexander Borgida,...
RE
2007
Springer
14 years 6 months ago
Scenarios: Identifying Missing Objects and Actions by Means of Computational Linguistics
In industrial requirements documents natural language is the main presentation means. In such documents, system behavior is specified in the form of scenarios, written as a seque...
Leonid Kof
RE
2007
Springer
14 years 6 months ago
On Non-Functional Requirements
Although the term ‘non-functional requirement’ has been in use for more than 20 years, there is still no consensus in the requirements engineering community what non-functiona...
Martin Glinz
RE
2007
Springer
14 years 6 months ago
RE Theory Meets Software Practice: Lessons from the Software Development Trenches
Based on our recent experience in four projects, each focused on either security-critical or safety-critical software, this paper evaluates several notions, widely held by RE rese...
Constance L. Heitmeyer, Ralph D. Jeffords, Ramesh ...