


default search action
16. REFSQ 2010: Essen, Germany
- Roel J. Wieringa, Anne Persson:

Requirements Engineering: Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings. Lecture Notes in Computer Science 6182, Springer 2010, ISBN 978-3-642-14191-1
Keynote
- Ian Alexander:

Keynote Talk Piecing Together the Requirements Jigsaw-Puzzle. 1
Decision-Making in Requirements Engineering
- Kristopher Welsh, Peter Sawyer:

Understanding the Scope of Uncertainty in Dynamically Adaptive Systems. 2-16 - Rumyana Proynova, Barbara Paech, Andreas Wicht, Thomas Wetter:

Use of Personal Values in Requirements Engineering - A Research Preview. 17-22 - Remo Ferrari, Oliver Sudmann, Christian Henke, Jens Geisler

, Wilhelm Schäfer, Nazim H. Madhavji:
Requirements and Systems Architecture Interaction in a Prototypical Project: Emerging Results. 23-29
Scenarios and Elicitation
- Olesia Brill, Kurt Schneider, Eric Knauss

:
Videos vs. Use Cases: Can Videos Capture More Requirements under Time Pressure? 30-44 - Ernst Sikora, Marian Daun

, Klaus Pohl:
Supporting the Consistent Specification of Scenarios across Multiple Abstraction Levels. 45-59
Product Families I
- Samuel Fricker:

Requirements Value Chains: Stakeholder Management and Requirements Engineering in Software Ecosystems. 60-66 - Thomas Bebensee, Inge van de Weerd

, Sjaak Brinkkemper:
Binary Priority List for Prioritizing Software Requirements. 67-78
Requirements Patterns
- Ali Shahrokni, Robert Feldt:

Towards a Framework for Specifying Software Robustness Requirements Based on Patterns. 79-84 - Xavier Franch, Cristina Palomares

, Carme Quer
, Samuel Renault
, François De Lazzer:
A Metamodel for Software Requirement Patterns. 85-90 - Victoria Sakhnini, Daniel M. Berry, Luisa Mich

:
Validation of the Effectiveness of an Optimized EPMcreate as an Aid for Creative Requirements Elicitation. 91-105
Product Families II
- Arnaud Hubaux, Patrick Heymans, Pierre-Yves Schobbens

, Dirk Deridder:
Towards Multi-view Feature-Based Configuration. 106-112 - Karina Villela, Jörg Dörr, Isabel John

:
Evaluation of a Method for Proactively Managing the Evolving Scope of a Software Product Line. 113-127
Requirements Engineering in Practice
- Giedre Sabaliauskaite

, Annabella Loconsole, Emelie Engström
, Michael Unterkalmsteiner, Björn Regnell
, Per Runeson
, Tony Gorschek, Robert Feldt:
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context. 128-142 - Neil A. Ernst

, John Mylopoulos:
On the Perception of Software Quality Requirements during the Project Lifecycle. 143-157 - Marko Komssi, Marjo Kauppinen

, Kimmo Toro, Raimo Soikkeli, Eero J. Uusitalo:
Lessons Learned from Integrating Specification Templates, Collaborative Workshops, and Peer Reviews. 158-172 - Margot Bittner, Mark-Oliver Reiser, Matthias Weber:

A Case Study on Tool-Supported Multi-level Requirements Management in Complex Product Families. 173-187
Natural Language
- Inah Omoronyia, Guttorm Sindre

, Tor Stålhane, Stefan Biffl, Thomas Moser
, Wikan Danar Sunindyo
:
A Domain Ontology Building Process for Guiding Requirements Elicitation. 188-202 - Jörg Leuser, Daniel Ott:

Tackling Semi-automatic Trace Recovery for Large Specifications. 203-217 - Benedikt Gleich, Oliver Creighton, Leonid Kof:

Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources. 218-232 - Fabian de Bruijn, Hans L. Dekkers:

Ambiguity in Natural Language Software Requirements: A Case Study. 233-247
Security Requirements
- Vincenzo Gervasi

, Didar Zowghi
:
On the Role of Ambiguity in RE. 248-254 - Shareeful Islam, Haralambos Mouratidis

, Stefan Wagner
:
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. 255-261 - Péter Kárpáti, Guttorm Sindre

, Andreas L. Opdahl
:
Visualizing Cyber Attacks with Misuse Case Maps. 262-275
Poster
- David Ameller

, Xavier Franch:
How Do Software Architects Consider Non-Functional Requirements: A Survey. 276-277

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














