Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Requirements Engineering
Springer-Verlag
 
   
 
Options:
 
  1-10 of 25 reviews Date Reviewed 
  Mending the patchwork of requirements from multiple standards using participative goal modelling: a case in the food industry
Barata J., Cunha P. Requirements Engineering 23(4): 425-441, 2018.  Type: Article

It is a truth, especially in Europe and the US, that with the emergence of new regulations such as eIDAS (EU 910/2014), the General Data Protection Regulation (GDPR, EU 679/2016), and the Health Insurance Portability and Accountability...

Jan 18 2019
  Understanding requirement prioritization artifacts: a systematic mapping study
Thakurta R. Requirements Engineering 22(4): 491-526, 2017.  Type: Article

Requirement prioritization is important in software development for several reasons. First and foremost, software products are created to fulfill some intended purpose characterized in terms of business goals or mission objectives. Typ...

Jun 6 2018
  Agile requirements handling in a service-oriented taxonomy of capabilities
Hannay J., Brathen K., Mevassvik O. Requirements Engineering 22(2): 289-314, 2017.  Type: Article

Enterprises often grow through mergers and acquisitions in response to the needs created by prevalent market conditions. While mergers may strategically position an organization to meet the market needs, the organization also inherits ...

Jan 29 2018
  Validation of formal specifications through transformation and animation
Mashkoor A., Jacquot J. Requirements Engineering 22(4): 433-451, 2017.  Type: Article

A validation check between a design and its implementation is usually done in order to validate the correctness of the requirements for any system. It is crucial to check that the requirements are correct when the system is developed. ...

Jan 18 2018
  An automated framework for detection and resolution of cross references in legal texts
Sannier N., Adedjouma M., Sabetzadeh M., Briand L. Requirements Engineering 22(2): 215-237, 2017.  Type: Article

What can we do when faced with many documents, often while trying to explore or make new documents related to existing ones? It is especially significant in the legislative process. Cross referencing various yet-to-be-published documen...

Aug 21 2017
  Repetition between stakeholder (user) and system requirements
Ellis-Braithwaite R., Lock R., Dawson R., King T. Requirements Engineering 22(2): 167-190, 2017.  Type: Article

While stakeholder or user requirements (URs) should have corresponding system requirements (SysR), the purpose of these requirements is fundamentally different. URs are focused more on defining the problem, while SysR define the soluti...

Aug 10 2017
  Analyzing and predicting software integration bugs using network analysis on requirements dependency network
Wang J., Wang Q. Requirements Engineering 21(2): 161-184, 2016.  Type: Article

When estimating software development projects, most companies are good at computing how much time and money to spend for the design, implementation, and unit test phases. However, when it comes to planning the integration and system te...

Aug 5 2016
  Reusable knowledge in security requirements engineering: a systematic mapping study
Souag A., Mazo R., Salinesi C., Comyn-Wattiau I. Requirements Engineering 21(2): 251-283, 2016.  Type: Article

Data breaches, zero-day vulnerabilities, and attacks exploiting components core to global information technology (IT) infrastructure have become a mainstay of technology news over the last couple years. Researchers and practitioners al...

Jul 22 2016
  Finding and resolving security misusability with misusability cases
Faily S., Fléchais I. Requirements Engineering 21(2): 209-223, 2016.  Type: Article

Scenarios are used in both security design and usability design, but these two do not necessarily overlap. Usability design scenarios are concerned more with the personal and occupational goals of legitimate system users. Security scen...

Jul 21 2016
  Exploring cognitive style and task-specific preferences for process representations
Figl K., Recker J. Requirements Engineering 21(1): 63-85, 2016.  Type: Article

Modeling a business process can help one understand the process; it can also be used to communicate the process. Later on, the model can be used to execute the process, to derive a software implementation for it, or to enhance the proc...

Jun 20 2016
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy