


default search action
RE 2014: Karlskrona, Sweden
- Tony Gorschek, Robyn R. Lutz:

IEEE 22nd International Requirements Engineering Conference, RE 2014, Karlskrona, Sweden, August 25-29, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3031-9 - Anthony I. Wasserman:

Startups and requirements (keynote). 1 - Annie I. Antón:

Now more than ever: Privacy and security are required (keynote). 2
Research Track
Empirical Studies in Elicitation
- Maya Daneva

:
How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games. 3-12 - Cynthia Putnam, Jinghui Cheng:

Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming. 13-22 - Abdulrhman Alkhanifer, Stephanie Ludi:

Towards a situation awareness design to improve visually impaired orientation in unfamiliar buildings: Requirements elicitation study. 23-32
Formal Modeling and Analysis
- Jennifer Horkoff

, Rick Salay, Marsha Chechik, Alessio Di Sandro
:
Supporting early decision-making in the presence of uncertainty. 33-42 - Antoine Cailliau, Axel van Lamsweerde:

Integrating exception handling in goal models. 43-52 - Amit K. Chopra

, Fabiano Dalpiaz, Fatma Basak Aydemir
, Paolo Giorgini
, John Mylopoulos, Munindar P. Singh
:
Protos: Foundations for engineering innovative sociotechnical systems. 53-62
Legal and Regulatory Requirements
- Morayo Adedjouma, Mehrdad Sabetzadeh

, Lionel C. Briand:
Automated detection and resolution of legal cross references: Approach and a study of Luxembourg's legislation. 63-72 - Aaron K. Massey, Richard Rutledge, Annie I. Antón, Peter P. Swire:

Identifying and classifying ambiguity for regulatory requirements. 83-92
Handling Change and Evolution
- Le Minh Sang Tran, Fabio Massacci

:
An Approach for Decision Support on the Uncertainty in Feature Model Evolution. 93-102 - Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider

, Jan Jürjens:
Maintaining requirements for long-living software systems by incorporating security knowledge. 103-112 - Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:

Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation. 113-122 - Piotr Pruski, Sugandha Lohar, Rundale Aquanette, Greg Ott, Sorawit Amornborvornwong, Alexander Rasin, Jane Cleland-Huang:

TiQi: Towards natural language trace queries. 123-132
Traceability
- Nan Niu

, Tanmay Bhowmik, Hui Liu, Zhendong Niu
:
Traceability-enabled refactoring for managing just-in-time requirements. 133-142 - Vincenzo Gervasi

, Didar Zowghi
:
Supporting traceability through affinity mining. 143-152
Discovering Requirements
- Emitza Guzman, Walid Maalej:

How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews. 153-162 - Travis D. Breaux

, Florian Schaub
:
Scaling requirements extraction to the crowd: Experiments with privacy policies. 163-172 - Alistair G. Sutcliffe, Paul Rayson

, Christopher N. Bull
, Pete Sawyer:
Discovering affect-laden requirements to achieve system acceptance. 173-182
Security and Privacy Requirements
- Maria Riaz, Jason Tyler King, John Slankas, Laurie A. Williams:

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. 183-192 - Rocky Slavin

, Jean-Michel Lehker, Jianwei Niu, Travis D. Breaux
:
Managing security requirements patterns using feature diagram hierarchies. 193-202 - Christos Tsigkanos

, Liliana Pasquale, Claudio Menghi
, Carlo Ghezzi, Bashar Nuseibeh
:
Engineering topology aware adaptive security: Preventing requirements violations at runtime. 203-212
Communicating Requirements
- Eric Knauss

, Daniela E. Damian, Alessia Knauss, Arber Borici:
Openness and requirements: Opportunities and tradeoffs in software ecosystems. 213-222 - Shinobu Saito

, Mutsuki Takeuchi, Setsuo Yamada, Mikio Aoyama:
RISDM: A requirements inspection systems design methodology: Perspective-based design of the pragmatic quality model and question set to SRS. 223-232 - Maria Pinto-Albuquerque

, Awais Rashid
:
Tackling the requirements jigsaw puzzle. 233-242
Automated Support for Eliciting Requirements
- Tanmay Bhowmik, Nan Niu

, Anas Mahmoud, Juha Savolainen:
Automated support for combinational creativity in requirements engineering. 243-252 - Mona Rahimi, Mehdi Mirakhorli, Jane Cleland-Huang:

Automated extraction and visualization of quality concerns from requirements specifications. 253-262
Requirements Management Concerns
- Leandro Antonelli, Gustavo Rossi, Julio César Sampaio do Prado Leite

, Alejandro Oliveros:
Language Extended Lexicon points: Estimating the size of an application using its language. 263-272 - David G. Gordon, Travis D. Breaux

:
The role of legal expertise in interpretation of legal requirements and definitions. 273-282 - Harri Töhönen, Marjo Kauppinen

, Tomi Männistö
:
Evaluating the business value of information technology: Case study on game management system. 283-292
Quality Goals
- Feng-Lin Li, Jennifer Horkoff

, John Mylopoulos, Renata S. S. Guizzardi, Giancarlo Guizzardi
, Alexander Borgida, Lin Liu:
Non-functional requirements as qualities, with a spice of ontology. 293-302 - Farnaz Fotrousi

, Samuel A. Fricker, Markus Fiedler:
Quality requirements elicitation based on inquiry of quality-impact relationships. 303-312 - Silvia Ingolfo, Alberto Siena, John Mylopoulos:

Nòmos 3: Reasoning about regulatory compliance of requirements. 313-314
Tool Demonstrations and Posters
- Tuong Huan Nguyen, John C. Grundy

, Mohamed Almorsy:
GUITAR: An ontology-based automated requirements analysis tool. 315-316 - Andreas Gregoriades

, Maria Pampaka
, Alistair G. Sutcliffe:
Simulation-based requirements discovery for smart driver assistive technologies. 317-318 - Eric Knauss

, Imed Hammouda:
EAM: Ecosystemability assessment method. 319-320 - Yanji Liu, Yukun Su, Xinshang Yin, Gunter Mussbacher:

Combined goal and feature model reasoning with the User Requirements Notation and jUCMNav. 321-322 - Sanjaya Kumar Saxena, Rachna Chakraborty:

Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering. 323-324 - Julia M. Badger, David Throop, Charles Claunch:

VARED: Verification and analysis of requirements and early designs. 325-326 - Xiuna Zhu, Dongyue Mou, Daniel Ratiu:

Structured multi-view modeling by tabular notation. 327-328 - Ralf Laue, Frank Hogrebe, Boris Böttcher, Markus Nüttgens:

Efficient visual notations for efficient stakeholder communication. 329-330 - Oleksandr A. Letychevskyi

, Thomas Weigert:
Symbolic verification of requirements in VRS system. 331-332 - Sören Witt, Sven Feja, Andreas Speck, Christian Hadler:

Business Application Modeler: A process model Validation and Verification tool. 333-334
Industry Track
Lightweight RE Methods
- Lars Bruun, Mikkel Bovbjerg Hansen, Jorgen Bondergaard Iversen, Jens Baek Jorgensen, Bjarne Knudsen:

Handling design-level requirements across distributed teams: Developing a new feature for 12 Danish mobile banking apps. 335-343 - Rebekka Wohlrab

, Thijmen de Gooijer, Anne Koziolek
, Steffen Becker:
Experience of pragmatically combining RE methods for performance requirements in industry. 344-353 - Daniel Rapp, Anne Hess

, Norbert Seyff, Peter Spörri, Emmerich Fuchs, Martin Glinz:
Lightweight requirements engineering assessments in software projects. 354-363
Stakeholder Collaboration
- Walid Maalej, Smita Ghaisas:

Capturing and sharing domain knowledge with business rules lessons learned from a global software vendor. 364-373 - Chris Porter, Emmanuel Letier, Martina Angela Sasse:

Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback. 374-383 - George Valença, Carina Frota Alves, Virgínia Heimann, Slinger Jansen

, Sjaak Brinkkemper:
Competition and collaboration in requirements engineering: A case study of an emerging software ecosystem. 384-393 - Amanda Rubython, Neil A. M. Maiden:

The effect of variability modeling on requirements satisfaction for the configuration and implementation of off-the-shelf software packages. 394-401
RE in Practice: Experiences from the Field I
- Camilla Bomfim, Wesley Nunes, Leticia Duboc, Marcelo Schots

:
Modelling sustainability in a procurement system: An experience report. 402-411 - Luiz Eduardo Galvão Martins, Tiago de Oliveira

:
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis. 412-419 - Tor Stålhane, Tormod Wien:

The DODT tool applied to sub-sea software. 420-427
RE in Practice: Experiences from the Field II
- Jiale Zhou, Yue Lu, Kristina Lundqvist, Henrik Lönn, Daniel Karlsson, Bo Liwang:

Towards feature-oriented requirements validation for automotive systems. 428-436 - Preethu Rose Anish, Smita Ghaisas:

Product knowledge configurator for requirements gap analysis and customizations. 437-443 - Predrag Filipovikj, Mattias Nyberg, Guillermo Rodríguez-Navas

:
Reassessing the pattern-based approach for formalizing requirements in the automotive domain. 444-450
Doctoral Symposium
- Feng Chen:

From architecture to requirements: Relating requirements and architecture for better Requirements Engineering. 451-455 - Maryam Al Hinai

:
Quantification of social sustainability in software. 456-460 - Miguel A. Teruel:

Improving collaborative and Post-WIMP systems through requirements specification. 461-466 - Tanmay Bhowmik:

Stakeholders' social interaction in requirements engineering of open source software. 467-472 - Muneera Bano

:
Aligning services and requirements with user feedback. 473-478 - Jiale Zhou:

Requirements development and management of embedded real-time systems. 479-484 - Dan Ionita

:
Context-sensitive Information security Risk identification and evaluation techniques. 485-488 - Ilze Buksa:

Business processes and regulations compliance management technology. 489-493 - Marilia Guterres Ferreira:

Creative Strategic Scenarios for preparation to requirements evolution. 494-499 - Jane Huffman Hayes, Didar Zowghi

:
Ready-set-transfer! Technology transfer in the requirements engineering domain (panel). 500-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














