Sciweavers

1460 search results - page 16 / 292
» Very Lightweight Requirements Modeling
Sort
View
RE
2001
Springer
15 years 6 months ago
Virtual Environment Modeling for Requirements Validation of High Consequence Systems
An essential type of “evidence”of the correctness of the requirements formalization process can be provided by human-based calculation. Human calculation can be significantly ...
Victor L. Winter, Dejan Desovski, Bojan Cukic
119
Voted
RCIS
2010
14 years 11 months ago
A conceptual model and process for client-driven agile requirements prioritization
Continuous customer-centric requirements reprioritization is essential in successfully performing agile software development. Yet, in the agile RE literature, very little is known ...
Zornitza Racheva, Maya Daneva, Andrea Herrmann, Ro...
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
15 years 7 months ago
Requirements Elicitation and Elicitation Technique Selection: A Model for Two Knowledge-Intensive Software Development Processes
By its very nature, software development consists of many knowledge-intensive processes. One of the most difficult to model, however, is requirements elicitation. This paper prese...
Ann M. Hickey, Alan M. Davis
100
Voted
ICSE
2004
IEEE-ACM
16 years 1 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
121
Voted
TIT
2008
187views more  TIT 2008»
15 years 1 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer