default search action
RE 2014: Karlskrona, Sweden
- Tony Gorschek, Robyn R. Lutz:
IEEE 22nd International Requirements Engineering Conference, RE 2014, Karlskrona, Sweden, August 25-29, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3031-9 - Anthony I. Wasserman:
Startups and requirements (keynote). 1 - Annie I. Antón:
Now more than ever: Privacy and security are required (keynote). 2
Research Track
Empirical Studies in Elicitation
- Maya Daneva:
How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games. 3-12 - Cynthia Putnam, Jinghui Cheng:
Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming. 13-22 - Abdulrhman Alkhanifer, Stephanie Ludi:
Towards a situation awareness design to improve visually impaired orientation in unfamiliar buildings: Requirements elicitation study. 23-32
Formal Modeling and Analysis
- Jennifer Horkoff, Rick Salay, Marsha Chechik, Alessio Di Sandro:
Supporting early decision-making in the presence of uncertainty. 33-42 - Antoine Cailliau, Axel van Lamsweerde:
Integrating exception handling in goal models. 43-52 - Amit K. Chopra, Fabiano Dalpiaz, Fatma Basak Aydemir, Paolo Giorgini, John Mylopoulos, Munindar P. Singh:
Protos: Foundations for engineering innovative sociotechnical systems. 53-62
Legal and Regulatory Requirements
- Morayo Adedjouma, Mehrdad Sabetzadeh, Lionel C. Briand:
Automated detection and resolution of legal cross references: Approach and a study of Luxembourg's legislation. 63-72 - Aaron K. Massey, Richard Rutledge, Annie I. Antón, Peter P. Swire:
Identifying and classifying ambiguity for regulatory requirements. 83-92
Handling Change and Evolution
- Le Minh Sang Tran, Fabio Massacci:
An Approach for Decision Support on the Uncertainty in Feature Model Evolution. 93-102 - Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens:
Maintaining requirements for long-living software systems by incorporating security knowledge. 103-112 - Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:
Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation. 113-122 - Piotr Pruski, Sugandha Lohar, Rundale Aquanette, Greg Ott, Sorawit Amornborvornwong, Alexander Rasin, Jane Cleland-Huang:
TiQi: Towards natural language trace queries. 123-132
Traceability
- Nan Niu, Tanmay Bhowmik, Hui Liu, Zhendong Niu:
Traceability-enabled refactoring for managing just-in-time requirements. 133-142 - Vincenzo Gervasi, Didar Zowghi:
Supporting traceability through affinity mining. 143-152
Discovering Requirements
- Emitza Guzman, Walid Maalej:
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews. 153-162 - Travis D. Breaux, Florian Schaub:
Scaling requirements extraction to the crowd: Experiments with privacy policies. 163-172 - Alistair G. Sutcliffe, Paul Rayson, Christopher N. Bull, Pete Sawyer:
Discovering affect-laden requirements to achieve system acceptance. 173-182
Security and Privacy Requirements
- Maria Riaz, Jason Tyler King, John Slankas, Laurie A. Williams:
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. 183-192 - Rocky Slavin, Jean-Michel Lehker, Jianwei Niu, Travis D. Breaux:
Managing security requirements patterns using feature diagram hierarchies. 193-202 - Christos Tsigkanos, Liliana Pasquale, Claudio Menghi, Carlo Ghezzi, Bashar Nuseibeh:
Engineering topology aware adaptive security: Preventing requirements violations at runtime. 203-212
Communicating Requirements
- Eric Knauss, Daniela E. Damian, Alessia Knauss, Arber Borici:
Openness and requirements: Opportunities and tradeoffs in software ecosystems. 213-222 - Shinobu Saito, Mutsuki Takeuchi, Setsuo Yamada, Mikio Aoyama:
RISDM: A requirements inspection systems design methodology: Perspective-based design of the pragmatic quality model and question set to SRS. 223-232 - Maria Pinto-Albuquerque, Awais Rashid:
Tackling the requirements jigsaw puzzle. 233-242
Automated Support for Eliciting Requirements
- Tanmay Bhowmik, Nan Niu, Anas Mahmoud, Juha Savolainen:
Automated support for combinational creativity in requirements engineering. 243-252 - Mona Rahimi, Mehdi Mirakhorli, Jane Cleland-Huang:
Automated extraction and visualization of quality concerns from requirements specifications. 253-262
Requirements Management Concerns
- Leandro Antonelli, Gustavo Rossi, Julio César Sampaio do Prado Leite, Alejandro Oliveros:
Language Extended Lexicon points: Estimating the size of an application using its language. 263-272 - David G. Gordon, Travis D. Breaux:
The role of legal expertise in interpretation of legal requirements and definitions. 273-282 - Harri Töhönen, Marjo Kauppinen, Tomi Männistö:
Evaluating the business value of information technology: Case study on game management system. 283-292
Quality Goals
- Feng-Lin Li, Jennifer Horkoff, John Mylopoulos, Renata S. S. Guizzardi, Giancarlo Guizzardi, Alexander Borgida, Lin Liu:
Non-functional requirements as qualities, with a spice of ontology. 293-302 - Farnaz Fotrousi, Samuel A. Fricker, Markus Fiedler:
Quality requirements elicitation based on inquiry of quality-impact relationships. 303-312 - Silvia Ingolfo, Alberto Siena, John Mylopoulos:
Nòmos 3: Reasoning about regulatory compliance of requirements. 313-314
Tool Demonstrations and Posters
- Tuong Huan Nguyen, John C. Grundy, Mohamed Almorsy:
GUITAR: An ontology-based automated requirements analysis tool. 315-316 - Andreas Gregoriades, Maria Pampaka, Alistair G. Sutcliffe:
Simulation-based requirements discovery for smart driver assistive technologies. 317-318 - Eric Knauss, Imed Hammouda:
EAM: Ecosystemability assessment method. 319-320 - Yanji Liu, Yukun Su, Xinshang Yin, Gunter Mussbacher:
Combined goal and feature model reasoning with the User Requirements Notation and jUCMNav. 321-322 - Sanjaya Kumar Saxena, Rachna Chakraborty:
Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering. 323-324 - Julia M. Badger, David Throop, Charles Claunch:
VARED: Verification and analysis of requirements and early designs. 325-326 - Xiuna Zhu, Dongyue Mou, Daniel Ratiu:
Structured multi-view modeling by tabular notation. 327-328 - Ralf Laue, Frank Hogrebe, Boris Böttcher, Markus Nüttgens:
Efficient visual notations for efficient stakeholder communication. 329-330 - Oleksandr A. Letychevskyi, Thomas Weigert:
Symbolic verification of requirements in VRS system. 331-332 - Sören Witt, Sven Feja, Andreas Speck, Christian Hadler:
Business Application Modeler: A process model Validation and Verification tool. 333-334
Industry Track
Lightweight RE Methods
- Lars Bruun, Mikkel Bovbjerg Hansen, Jorgen Bondergaard Iversen, Jens Baek Jorgensen, Bjarne Knudsen:
Handling design-level requirements across distributed teams: Developing a new feature for 12 Danish mobile banking apps. 335-343 - Rebekka Wohlrab, Thijmen de Gooijer, Anne Koziolek, Steffen Becker:
Experience of pragmatically combining RE methods for performance requirements in industry. 344-353 - Daniel Rapp, Anne Hess, Norbert Seyff, Peter Spörri, Emmerich Fuchs, Martin Glinz:
Lightweight requirements engineering assessments in software projects. 354-363
Stakeholder Collaboration
- Walid Maalej, Smita Ghaisas:
Capturing and sharing domain knowledge with business rules lessons learned from a global software vendor. 364-373 - Chris Porter, Emmanuel Letier, Martina Angela Sasse:
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback. 374-383 - George Valença, Carina Frota Alves, Virgínia Heimann, Slinger Jansen, Sjaak Brinkkemper:
Competition and collaboration in requirements engineering: A case study of an emerging software ecosystem. 384-393 - Amanda Rubython, Neil A. M. Maiden:
The effect of variability modeling on requirements satisfaction for the configuration and implementation of off-the-shelf software packages. 394-401
RE in Practice: Experiences from the Field I
- Camilla Bomfim, Wesley Nunes, Leticia Duboc, Marcelo Schots:
Modelling sustainability in a procurement system: An experience report. 402-411 - Luiz Eduardo Galvão Martins, Tiago de Oliveira:
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis. 412-419 - Tor Stålhane, Tormod Wien:
The DODT tool applied to sub-sea software. 420-427
RE in Practice: Experiences from the Field II
- Jiale Zhou, Yue Lu, Kristina Lundqvist, Henrik Lönn, Daniel Karlsson, Bo Liwang:
Towards feature-oriented requirements validation for automotive systems. 428-436 - Preethu Rose Anish, Smita Ghaisas:
Product knowledge configurator for requirements gap analysis and customizations. 437-443 - Predrag Filipovikj, Mattias Nyberg, Guillermo Rodríguez-Navas:
Reassessing the pattern-based approach for formalizing requirements in the automotive domain. 444-450
Doctoral Symposium
- Feng Chen:
From architecture to requirements: Relating requirements and architecture for better Requirements Engineering. 451-455 - Maryam Al Hinai:
Quantification of social sustainability in software. 456-460 - Miguel A. Teruel:
Improving collaborative and Post-WIMP systems through requirements specification. 461-466 - Tanmay Bhowmik:
Stakeholders' social interaction in requirements engineering of open source software. 467-472 - Muneera Bano:
Aligning services and requirements with user feedback. 473-478 - Jiale Zhou:
Requirements development and management of embedded real-time systems. 479-484 - Dan Ionita:
Context-sensitive Information security Risk identification and evaluation techniques. 485-488 - Ilze Buksa:
Business processes and regulations compliance management technology. 489-493 - Marilia Guterres Ferreira:
Creative Strategic Scenarios for preparation to requirements evolution. 494-499 - Jane Huffman Hayes, Didar Zowghi:
Ready-set-transfer! Technology transfer in the requirements engineering domain (panel). 500-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.