//]]>
Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 005.1 (Browse Shelf) Not for loan

Keynote -- Keynote Talk Piecing Together the Requirements Jigsaw-Puzzle -- Decision-Making in Requirements Engineering -- Understanding the Scope of Uncertainty in Dynamically Adaptive Systems -- Use of Personal Values in Requirements Engineering – A Research Preview -- Requirements and Systems Architecture Interaction in a Prototypical Project: Emerging Results -- Scenarios and Elicitation -- Videos vs. Use Cases: Can Videos Capture More Requirements under Time Pressure? -- Supporting the Consistent Specification of Scenarios across Multiple Abstraction Levels -- Product Families I -- Requirements Value Chains: Stakeholder Management and Requirements Engineering in Software Ecosystems -- Binary Priority List for Prioritizing Software Requirements -- Requirements Patterns -- Towards a Framework for Specifying Software Robustness Requirements Based on Patterns -- A Metamodel for Software Requirement Patterns -- Validation of the Effectiveness of an Optimized EPMcreate as an Aid for Creative Requirements Elicitation -- Product Families II -- Towards Multi-view Feature-Based Configuration -- Evaluation of a Method for Proactively Managing the Evolving Scope of a Software Product Line -- Requirements Engineering in Practice -- Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context -- On the Perception of Software Quality Requirements during the Project Lifecycle -- Lessons Learned from Integrating Specification Templates, Collaborative Workshops, and Peer Reviews -- A Case Study on Tool-Supported Multi-level Requirements Management in Complex Product Families -- Natural Language -- A Domain Ontology Building Process for Guiding Requirements Elicitation -- Tackling Semi-automatic Trace Recovery for Large Specifications -- Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources -- Ambiguity in Natural Language Software Requirements: A Case Study -- Security Requirements -- On the Role of Ambiguity in RE -- Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations -- Visualizing Cyber Attacks with Misuse Case Maps -- Poster -- How Do Software Architects Consider Non-Functional Requirements: A Survey.

This volume constitutes the refereed proceedings of the International Working Conference REFSQ 2010, held in Essen, Germany, in June/July 2010.

There are no comments for this item.

Log in to your account to post a comment.

Languages: 
English |
العربية