Sciweavers

HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
13 years 10 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
QSIC
2006
IEEE
13 years 11 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
CSMR
2006
IEEE
13 years 11 months ago
A Metric of Confidence in Requirements Gathered from Legacy Systems: Two Industrial Case Studies
It is known that well over 50% of replacement projects fail. Requirements gathering go someway to contributing to this statistic; if the requirements we gather for the new system ...
James Marchant, Christos Tjortjis, Michael Turega
WER
2007
Springer
13 years 11 months ago
An Approach to Requirements Encapsulation with Clustering
Requirements encapsulation means organizing software requirements into a set of requirements clusters with tight cohesion along with external interfaces such that each cluster can...
Zude Li, Quazi Abidur Rahman, Nazim H. Madhavji
RE
2007
Springer
13 years 11 months ago
Requirements in the wild: How small companies do it
Small companies form a large part of the software industry, but have mostly been overlooked by the requirements engineering research community. We know very little about the techn...
Jorge Aranda, Steve M. Easterbrook, Greg Wilson
RE
2007
Springer
13 years 11 months ago
Improving Performance Requirements Specifications from Field Failure Reports
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Chih-Wei Ho, Laurie Williams, Annie I. Antó...
KSEM
2007
Springer
13 years 11 months ago
A Merging-Based Approach to Handling Inconsistency in Locally Prioritized Software Requirements
Abstract. It has been widely recognized that the relative priority of requirements can help developers to resolve inconsistencies and make some necessary trade-off decisions. Howe...
Kedian Mu, Weiru Liu, Zhi Jin, Ruqian Lu, Anbu Yue...
ER
2007
Springer
106views Database» more  ER 2007»
13 years 11 months ago
Extending Argumentation to Goal-Oriented Requirements Engineering
A key goal in safety-critical system development is to provide assurance that the critical requirements are sufficiently addressed. This goal is typically refined into three sub-go...
Ibrahim Habli, Weihang Wu, Katrina Attwood, Tim Ke...
AINA
2007
IEEE
13 years 11 months ago
Comparative Evaluation of Converged Service-Oriented Architectures
In this paper we evaluate and compare five commercial off-the-shelf platforms for building converged serviceoriented architectures in an ambient computing environment. To this en...
Davy Preuveneers, Julien Pauty, Dimitri Van Landuy...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
13 years 11 months ago
Dynamic Supply Chain Integration through Intelligent Agents
The success of supply chains depends on the match between the requirements and offerings that deliver the services. It can be ensured by separating requirements from the means of ...
Minhong Wang, Huaiqing Wang, Jiming Liu