We discuss two experiments in which requirements engineering techniques has been used and evaluated. In the first experiment a technique called Executable Use Cases is applied in t...
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
Goal models have been found to be effective for representing and analyzing variability at the early requirements level, by comprehensibly representing all alternative ways by whic...
Sotirios Liaskos, Lei Jiang, Alexei Lapouchnian, Y...
Various characteristics of the problem domain define the context in which the system is to operate and thus impact heavily on its requirements. However, most requirements specifica...
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence networks...
Guido Boella, Leendert van der Torre, Serena Villa...