default search action
Requirements Engineering, Volume 21
Volume 21, Number 1, March 2016
- Mohamed El-Attar, Hezam Akram Abdul-Ghani:
Using security robustness analysis for early-stage validation of functional security requirements. 1-27 - Jennifer Horkoff, Eric S. K. Yu:
Interactive goal model analysis for early requirements engineering. 29-61 - Kathrin Figl, Jan Recker:
Exploring cognitive style and task-specific preferences for process representations. 63-85 - Rachida Djouab, Alain Abran, Ahmed Seffah:
An ASPIRE-based method for quality requirements identification from business goals. 87-106 - Abraham Nieva de la Hidalga, Alex R. Hardisty, Andrew C. Jones:
SCRAM-CK: applying a collaborative requirements engineering process for designing a web based e-science toolkit. 107-129 - Jennifer Baldwin, Alvin Teh, Elisa L. A. Baniassad, Dirk Van Rooy, Yvonne Coady:
Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements. 131-159
Volume 21, Number 2, June 2016
- Junjie Wang, Qing Wang:
Analyzing and predicting software integration bugs using network analysis on requirements dependency network. 161-184 - Ahmet Serkan Karatas, Halit Oguztüzün:
Attribute-based variability in feature models. 185-208 - Shamal Faily, Ivan Flechais:
Finding and resolving security misusability with misusability cases. 209-223 - Eduardo B. Fernández, Raúl Monge, Keiko Hashizume:
Building a security reference architecture for cloud systems. 225-249 - Amina Souag, Raúl Mazo, Camille Salinesi, Isabelle Comyn-Wattiau:
Reusable knowledge in security requirements engineering: a systematic mapping study. 251-283 - Jameleddine Hassine, Daniel Amyot:
A questionnaire-based survey methodology for systematically validating goal-oriented models. 285-308
Volume 21, Number 3, September 2016
- Didar Zowghi, Vincenzo Gervasi:
Introduction to the special issue of best papers from RE2015 conference. 309-310 - Walid Maalej, Zijad Kurtanovic, Hadeer Nabil, Christoph Stanik:
On the automatic classification of app reviews. 311-331 - Alessio Ferrari, Paola Spoletini, Stefania Gnesi:
Ambiguity and tacit knowledge in requirements elicitation interviews. 333-355 - Anas Mahmoud, Grant Williams:
Detecting, classifying, and tracing non-functional software requirements. 357-381 - Garm Lucassen, Fabiano Dalpiaz, Jan Martijn E. M. van der Werf, Sjaak Brinkkemper:
Improving agile requirements: the Quality User Story framework and tool. 383-403
Volume 21, Number 4, November 2016
- Diego Dermeval, Jéssyka Vilela, Ig Ibert Bittencourt, Jaelson Castro, Seiji Isotani, Patrick Henrique da S. Brito, Alan Silva:
Applications of ontologies in requirements engineering: a systematic review of the literature. 405-437 - Luz-María Priego-Roche, Agnès Front, Dominique Rieu:
A framework for virtual organization requirements. 439-460 - Isabel María del Águila, José del Sagrado:
Bayesian networks for enhancement of requirements engineering: a literature review. 461-480 - Liliana Pasquale, Paola Spoletini, Mazeiar Salehie, Luca Cavallaro, Bashar Nuseibeh:
Automating trade-off analysis of security requirements. 481-504 - Hans Heerkens, Leo van der Wegen, Beatrice van der Heijden:
Designing and assessing a course on prioritization and importance assessment in strategic non-routine requirements engineering processes. 505-520 - Samuel A. Fricker, Kurt Schneider, Farnaz Fotrousi, Christoph Thuemmler:
Workshop videos for requirements communication. 521-552 - John L. Dargan, James S. Wasek, Enrique Campos-Náñez:
Systems performance prediction using requirements quality attributes classification. 553-572
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.