Exploratory Study to Assess and Evaluate Requirement Specification Techniques Using Analysis Determination Requirements Framework
暂无分享,去创建一个
[1] Matthias Jarke,et al. Interview with Fred Brooks on “Building Effective Large-Scale Requirements” , 2010, Bus. Inf. Syst. Eng..
[2] Mary Shaw,et al. Software Engineering for Self-Adaptive Systems: A Research Roadmap , 2009, Software Engineering for Self-Adaptive Systems.
[3] S. Della Sala,et al. Welcoming normative data for Wisconsin Card Sorting Test , 2000, Neurological Sciences.
[4] Ursula Faber,et al. Requirements Engineering A Good Practice Guide , 2016 .
[5] Christian Steger,et al. Idea: Simulation Based Security Requirement Verification for Transaction Level Models , 2011, ESSoS.
[6] Abderahman Rashwan,et al. Semantic Analysis of Functional and Non-Functional Requirements in Software Requirements Specifications , 2012, Canadian Conference on AI.
[7] Thomas Herrmann,et al. The Integration of Collaborative Process Modeling and Electronic Brainstorming in Co-located Meetings , 2010, CRIWG.
[8] Christiaan J. J. Paredis,et al. Virtual Verification of System Designs against System Requirements , 2010, MoDELS Workshops.
[9] S. Esakkirajan,et al. Fundamentals of relational database management systems , 2007 .
[10] John A. Hughes. The Requirements Problem , 2003 .
[11] Kristofer Johannisson. Natural Language Specifications , 2007, The KeY Approach.
[12] Luigi Lavazza,et al. Requirements-Based Estimation of Change Costs , 2000, Empirical Software Engineering.
[13] Evan W. Duggan,et al. Higher Quality Requirements: Supporting Joint Application Development with the Nominal Group Technique , 2003, Inf. Technol. Manag..
[14] Naved Ahmed,et al. Towards Security Risk-Oriented Misuse Cases , 2012, Business Process Management Workshops.
[15] Isabel M. Ramos,et al. Specification of Requirements Models , 2005 .
[16] Peter Gregor,et al. Development of a computer-based interviewing tool to enhance the requirements gathering process , 2004, Requirements Engineering.
[17] Karan Gupta,et al. Requirement checklist for blog in web application , 2012, Int. J. Syst. Assur. Eng. Manag..
[18] Juan Llorens Morillo,et al. Requirements Verification in the Industry , 2011, CSDM.
[19] William Brace,et al. CORAMOD: a checklist-oriented model-based requirements analysis approach , 2012, Requirements Engineering.
[20] Mohamed El-Attar,et al. From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design , 2014, Software & Systems Modeling.
[21] Eric C. C. Tsang,et al. Decision Table Reduction in KDD: Fuzzy Rough Based Approach , 2010, Trans. Rough Sets.
[22] Christine Choppy,et al. Activity Diagrams Patterns for Modeling Business Processes , 2013, SERA.
[23] Pao-Tiao Chuang,et al. Applying KANO Model to Exploit Service Quality for the Real Estate Brokering Industry , 2013 .
[24] Christian Schlee. Use Case Identification and Description , 2013 .
[25] Andrzej P. Wierzbicki,et al. Creativity Support in Brainstorming , 2007, Creative Environments.
[26] J. Naglieri,et al. Encyclopedia of child behavior and development , 2011 .
[27] Rajeev Jain,et al. Aesthetical design of a car profile: a Kano model-based hybrid approach , 2013 .
[28] Jeffrey C. Carver,et al. Using error abstraction and classification to improve requirement quality: conclusions from a family of four empirical studies , 2012, Empirical Software Engineering.
[29] Nawaf Alkharboush,et al. A decision table method for randomness measurement , 2012 .
[30] T. M. Rajkumar,et al. Comparison of analysis techniques for information requirement determination , 1988, CACM.