Sciweavers

5182 search results - page 11 / 1037
» COTS-Based Requirements Engineering
Sort
View
69
Voted
ICSE
2007
IEEE-ACM
15 years 9 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
99
Voted
ASWEC
2009
IEEE
14 years 7 months ago
From Requirements to Embedded Software - Formalising the Key Steps
Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often d...
Toby Myers, R. Geoff Dromey
RE
2010
Springer
14 years 4 months ago
Very Lightweight Requirements Modeling
Abstract--We argue for the creation and use of a very lightweight requirements modeling language as an alternative to textual and pictorial requirements specifications.
Martin Glinz
RE
2010
Springer
14 years 4 months ago
Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study
Companies in the software business often distribute requirements engineering responsibilities over several roles. Product management has overall product responsibility and performs...
Samuel Fricker, Martin Glinz