Requirements Engineering: Foundation for Software Quality
Springer Berlin (Verlag)
978-3-642-14191-1 (ISBN)
Keynote.- Keynote Talk Piecing Together the Requirements Jigsaw-Puzzle.- Decision-Making in Requirements Engineering.- Understanding the Scope of Uncertainty in Dynamically Adaptive Systems.- Use of Personal Values in Requirements Engineering - A Research Preview.- Requirements and Systems Architecture Interaction in a Prototypical Project: Emerging Results.- Scenarios and Elicitation.- Videos vs. Use Cases: Can Videos Capture More Requirements under Time Pressure?.- Supporting the Consistent Specification of Scenarios across Multiple Abstraction Levels.- Product Families I.- Requirements Value Chains: Stakeholder Management and Requirements Engineering in Software Ecosystems.- Binary Priority List for Prioritizing Software Requirements.- Requirements Patterns.- Towards a Framework for Specifying Software Robustness Requirements Based on Patterns.- A Metamodel for Software Requirement Patterns.- Validation of the Effectiveness of an Optimized EPMcreate as an Aid for Creative Requirements Elicitation.- Product Families II.- Towards Multi-view Feature-Based Configuration.- Evaluation of a Method for Proactively Managing the Evolving Scope of a Software Product Line.- Requirements Engineering in Practice.- Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context.- On the Perception of Software Quality Requirements during the Project Lifecycle.- Lessons Learned from Integrating Specification Templates, Collaborative Workshops, and Peer Reviews.- A Case Study on Tool-Supported Multi-level Requirements Management in Complex Product Families.- Natural Language.- A Domain Ontology Building Process for Guiding Requirements Elicitation.- Tackling Semi-automatic Trace Recovery for Large Specifications.- Ambiguity Detection: Towards aTool Explaining Ambiguity Sources.- Ambiguity in Natural Language Software Requirements: A Case Study.- Security Requirements.- On the Role of Ambiguity in RE.- Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.- Visualizing Cyber Attacks with Misuse Case Maps.- Poster.- How Do Software Architects Consider Non-Functional Requirements: A Survey.
| Erscheint lt. Verlag | 17.6.2010 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Programming and Software Engineering |
| Zusatzinfo | XII, 280 p. 62 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Informatik ► Software Entwicklung ► Requirements Engineering |
| Schlagworte | ADA • NATURAL • natural language • privacy • quality requirements • Requirements Engineering • requirements management • security • Service Management • Software engineering • Systems Architecture • Validation • verification |
| ISBN-10 | 3-642-14191-9 / 3642141919 |
| ISBN-13 | 978-3-642-14191-1 / 9783642141911 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich