Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
The variety of design artefacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper pro...
In the development of software with evolving requirements, activities of requirements-engineering and management are present through the whole software development process and aff...
Jewgenij Botaschanjan, Andreas Fleischmann, Markus...
Goal-oriented methods have increasingly been recognised as an effective means for eliciting, elaborating, analysing and specifying software requirements. A key activity in these a...
Alessandra Russo, Dalal Alrajeh, Jeff Kramer, Seba...
This paper discusses the requirements and a generic framework for the integration of architectural and codebased reengineering tools. This framework is needed because there is a l...
Rick Kazman, Steven S. Woods, S. Jeromy Carri&egra...