Exploratory Study to Assess and Evaluate Requirement Specification Techniques Using Analysis Determination Requirements Framework

Various requirements engineering techniques have been proposed to enhance the quality of requirement as well as the implemented software and to growth customer satisfaction with the product. However the large number of requirement techniques makes the choosing between them complicated and confusing. Consequently, this study purposes to present an exploratory study to evaluate requirement techniques and illuminate their key features, limitations and strength.

[1]  Matthias Jarke,et al.  Interview with Fred Brooks on “Building Effective Large-Scale Requirements” , 2010, Bus. Inf. Syst. Eng..

[2]  Mary Shaw,et al.  Software Engineering for Self-Adaptive Systems: A Research Roadmap , 2009, Software Engineering for Self-Adaptive Systems.

[3]  S. Della Sala,et al.  Welcoming normative data for Wisconsin Card Sorting Test , 2000, Neurological Sciences.

[4]  Ursula Faber,et al.  Requirements Engineering A Good Practice Guide , 2016 .

[5]  Christian Steger,et al.  Idea: Simulation Based Security Requirement Verification for Transaction Level Models , 2011, ESSoS.

[6]  Abderahman Rashwan,et al.  Semantic Analysis of Functional and Non-Functional Requirements in Software Requirements Specifications , 2012, Canadian Conference on AI.

[7]  Thomas Herrmann,et al.  The Integration of Collaborative Process Modeling and Electronic Brainstorming in Co-located Meetings , 2010, CRIWG.

[8]  Christiaan J. J. Paredis,et al.  Virtual Verification of System Designs against System Requirements , 2010, MoDELS Workshops.

[9]  S. Esakkirajan,et al.  Fundamentals of relational database management systems , 2007 .

[10]  John A. Hughes The Requirements Problem , 2003 .

[11]  Kristofer Johannisson Natural Language Specifications , 2007, The KeY Approach.

[12]  Luigi Lavazza,et al.  Requirements-Based Estimation of Change Costs , 2000, Empirical Software Engineering.

[13]  Evan W. Duggan,et al.  Higher Quality Requirements: Supporting Joint Application Development with the Nominal Group Technique , 2003, Inf. Technol. Manag..

[14]  Naved Ahmed,et al.  Towards Security Risk-Oriented Misuse Cases , 2012, Business Process Management Workshops.

[15]  Isabel M. Ramos,et al.  Specification of Requirements Models , 2005 .

[16]  Peter Gregor,et al.  Development of a computer-based interviewing tool to enhance the requirements gathering process , 2004, Requirements Engineering.

[17]  Karan Gupta,et al.  Requirement checklist for blog in web application , 2012, Int. J. Syst. Assur. Eng. Manag..

[18]  Juan Llorens Morillo,et al.  Requirements Verification in the Industry , 2011, CSDM.

[19]  William Brace,et al.  CORAMOD: a checklist-oriented model-based requirements analysis approach , 2012, Requirements Engineering.

[20]  Mohamed El-Attar,et al.  From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design , 2014, Software & Systems Modeling.

[21]  Eric C. C. Tsang,et al.  Decision Table Reduction in KDD: Fuzzy Rough Based Approach , 2010, Trans. Rough Sets.

[22]  Christine Choppy,et al.  Activity Diagrams Patterns for Modeling Business Processes , 2013, SERA.

[23]  Pao-Tiao Chuang,et al.  Applying KANO Model to Exploit Service Quality for the Real Estate Brokering Industry , 2013 .

[24]  Christian Schlee Use Case Identification and Description , 2013 .

[25]  Andrzej P. Wierzbicki,et al.  Creativity Support in Brainstorming , 2007, Creative Environments.

[26]  J. Naglieri,et al.  Encyclopedia of child behavior and development , 2011 .

[27]  Rajeev Jain,et al.  Aesthetical design of a car profile: a Kano model-based hybrid approach , 2013 .

[28]  Jeffrey C. Carver,et al.  Using error abstraction and classification to improve requirement quality: conclusions from a family of four empirical studies , 2012, Empirical Software Engineering.

[29]  Nawaf Alkharboush,et al.  A decision table method for randomness measurement , 2012 .

[30]  T. M. Rajkumar,et al.  Comparison of analysis techniques for information requirement determination , 1988, CACM.