A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge
暂无分享,去创建一个
[1] Axel van Lamsweerde,et al. Reasoning About Alternative Requirements Options , 2009, Conceptual Modeling: Foundations and Applications.
[2] Jaap-Henk Hoepman,et al. Privacy and Identity Management for Emerging Services and Technologies , 2013, IFIP Advances in Information and Communication Technology.
[3] Daniel M. Berry,et al. The impact of domain knowledge on the effectiveness of requirements idea generation during requirements elicitation , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).
[4] Michael Jackson,et al. Four dark corners of requirements engineering , 1997, TSEM.
[5] John Mylopoulos,et al. Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.
[6] G. Deconinck,et al. An evaluation of two-way communication means for advanced metering in Flanders (Belgium) , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.
[7] Rubén Prieto-Díaz,et al. DARE: Domain analysis and reuse environment , 1998, Ann. Softw. Eng..
[8] Aybüke Aurum,et al. Capturing implicit software engineering knowledge , 2001, Proceedings 2001 Australian Software Engineering Conference.
[9] Kyo Chul Kang,et al. Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .
[10] Bran Selic,et al. Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE: Developing Cyber-Physical Systems , 2013 .
[11] Ian F. Alexander,et al. Understanding project sociology by modeling stakeholders , 2004, IEEE Software.
[12] Felix Bachmann,et al. Quality Attribute Design Primitives , 2000 .
[13] Rubén Prieto-Díaz,et al. Domain analysis: an introduction , 1990, SOEN.
[14] Maritta Heisel,et al. A UML Profile for Requirements Analysis of Dependable Software , 2010, SAFECOMP.
[15] David Clark,et al. Safety and Security Analysis of Object-Oriented Models , 2002, SAFECOMP.
[16] Galal H. Galal-Edeen,et al. Stakeholder identification in the requirements engineering process , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.
[17] Nancy G. Leveson,et al. Integrated safety analysis of requirements specifications , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.
[18] Stephan Faßbender,et al. Optimizing Functional and Quality Requirements According to Stakeholders' Goals , 2014, Relating System Quality and Software Architecture.
[19] Lawrence D. Pohlmann Strategics Consulting. Customer-Centered Products – Creating Successful Products through Smart Requirements Management , 2015 .
[20] Mary Shaw,et al. Software architecture: the next step for object technology (panel) , 1993, OOPSLA '93.
[21] Maritta Heisel,et al. Towards Systematic Integration of Quality Requirements into Software Architecture , 2011, ECSA.
[22] Kristian Beckers,et al. A Problem-Based Approach for Computer-Aided Privacy Threat Identification , 2012, APF.
[23] Paul Clements,et al. Software architecture in practice , 1999, SEI series in software engineering.
[24] Pierre N. Robillard,et al. The role of knowledge in software development , 1999, CACM.
[25] Rene Meis,et al. Problem-Based Consideration of Privacy-Relevant Domain Knowledge , 2013, Privacy and Identity Management.
[26] G. Probst. Practical Knowledge Management : A Model That Works , 1998 .
[27] Michael A. Jackson,et al. Problem Frames - Analysing and Structuring Software Development Problems , 2000 .
[28] Axel van Lamsweerde,et al. Requirements Engineering: From System Goals to UML Models to Software Specifications , 2009 .
[29] Eric Yu,et al. Conceptual Modeling: Foundations and Applications , 2009 .
[30] Seok-Won Lee,et al. Feature-Oriented Nonfunctional Requirement Analysis for Software Product Line , 2009, Journal of Computer Science and Technology.
[31] Maritta Heisel,et al. A comparison of security requirements engineering methods , 2010, Requirements Engineering.