Sciweavers

RE
2008
Springer
13 years 11 months ago
Information Brokers in Requirement-Dependency Social Networks
Requirements interdependencies create technical dependencies among project members that generally belong to different functional groups in an organization, but who need to coordin...
Sabrina Marczak, Daniela Damian, Ulrike Stege, Adr...
RE
2008
Springer
13 years 11 months ago
Extracting and Modeling Product Line Functional Requirements
We introduce an extractive approach to building a product line's requirements assets. We define the functional requirements profiles (FRPs) according to the linguistic charac...
Nan Niu, Steve M. Easterbrook
RE
2008
Springer
13 years 11 months ago
Requirements Prioritization Based on Benefit and Cost Prediction: An Agenda for Future Research
In early phases of the software cycle, requirements prioritization necessarily relies on the specified requirements and on predictions of benefit and cost of individual requiremen...
Andrea Herrmann, Maya Daneva
RE
2007
Springer
13 years 11 months ago
Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, C...
TSE
1998
129views more  TSE 1998»
13 years 12 months ago
Inferring Declarative Requirements Specifications from Operational Scenarios
—Scenarios are increasingly recognized as an effective means for eliciting, validating, and documenting software requirements. This paper concentrates on the use of scenarios for...
Axel van Lamsweerde, Laurent Willemet
TSE
1998
115views more  TSE 1998»
13 years 12 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
TSE
1998
131views more  TSE 1998»
13 years 12 months ago
Experiences Using Lightweight Formal Methods for Requirements Modeling
—This paper describes three case studies in the lightweight application of formal methods to requirements modeling for spacecraft fault protection systems. The case studies diffe...
Steve M. Easterbrook, Robyn R. Lutz, Richard Covin...
RE
2002
Springer
13 years 12 months ago
Effective Communication in Requirements Elicitation: A Comparison of Methodologies
The elicitation or communication of user requirements comprises an early and critical but highly error-prone stage in system development. Socially-oriented methodologies provide m...
Jane Coughlan, Robert D. Macredie
RE
2002
Springer
13 years 12 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
RE
2002
Springer
13 years 12 months ago
Exploring the Relationship between Project Selection and Requirements Analysis: An Empirical Study of the New Millennium Program
The relationship between project selection and requirements analysis is important, yet has not received much attention. The decisions made during project selection directly affect...
Mark Bergman, Gloria Mark