Results 31 to 40 of about 2,053,904 (198)

An Analytical Hierarchy Process-Based Technique for Software Requirements Prioritization

open access: yesIEEE Access
Software requirements prioritization is a crucial step in the requirements engineering process. It is applied to define the ordering of specific requirements according to schedule and budget constraints.
Thamer Ahmad Al-Rawashdeh   +2 more
doaj   +1 more source

Design and Verification of Multi-Agent Systems with the Use of Bigraphs

open access: yesApplied Sciences, 2021
Widespread access to low-cost, high computing power allows for increased computerization of everyday life. However, high-performance computers alone cannot meet the demands of systems such as the Internet of Things or multi-agent robotic systems.
Piotr Cybulski, Zbigniew Zieliński
doaj   +1 more source

SPEEDING UP NON FUNCTIONAL REQUIREMENTS ELICITATION [PDF]

open access: yes, 2020
Considerando la disponibilidad de Big Data para la ingeniería de software, como el caso de GitHub, la semiautomatización de la obtención de requisitos no funcionales (NFRs) es una estrategia clave hacia la definición de requisitos. Como tal, la obtención de NFRs, dentro de la automatización de la lectura de documentos, puede gestionar la masa de ...
openaire   +2 more sources

Constructing a Software Requirements Tool Based on the Reusability Attribute

open access: yesIEEE Access
The use of requirements as a tool to help users identify, review, and organize the requirements of software systems is growing in popularity in the research community.
Rasha Alsarraj Gh.   +2 more
doaj   +1 more source

Tradeoff Analysis for Conflicting Software Non-Functional Requirements

open access: yesIEEE Access, 2019
The need for particular software non-functional requirements (NFRs) leads a project team to use specific design strategies to fulfill these NFRs. However, some of the strategies may cause deficiencies in other software NFRs.
Xuan Zhang, Xu Wang
doaj   +1 more source

Information Technology of Software Architecture Structural Synthesis of Information System [PDF]

open access: yes, 2016
Information technology of information system software architecture structural synthesis is proposed. It is used for evolutionary models of the software lifecycle, which provides configuration and formation of software to control the realization and ...
Chainikov, S. (Sergey)   +1 more
core   +2 more sources

A Review Of Middleware Platforms In Internet Of Things: A Non – Functional Requirements Approach

open access: yesJISR on Computing, 2020
Internet of things is like an umbrella that covers all connected things through the internet. The main objective behind all these connected devices is to share data, collect data and information, in the existing ecosystem (people, system, devices, etc.)
Hafiz Wahab Raza   +2 more
doaj   +1 more source

A reference measurement framework of software security product quality (SPQNFSR)

open access: yesIET Information Security, 2021
Currently, the customer's demands have expressively amplified their expectations of getting software at a high‐quality level. However, the non‐functional requirements of the software products attention have been expanded in both the academic and the ...
Khalid T. Al‐Sarayreh   +3 more
doaj   +1 more source

Non-Functional Requirements (Usability, security)

open access: yesJournal of Innovative Computing and Emerging Technologies, 2021
Ideally the use of software is determined by the performance of both its functionality, such as its usefulness, flexibility, functionality, synergy, security. However, there has been a third-party emphasis on software performance, even if the functionality is not helpful or used without he necessary non-functional features.
openaire   +1 more source

An Evaluation of Quantitative Non-Functional Requirements Assurance Using ArchiMate

open access: yesIEEE Access, 2020
Goal-oriented NFR (Non-Functional Requirement) assurance approaches were used to qualitatively evaluate software architectures. Assurance cases using quantitative method have not been applied to evaluate NFR assurance for software architectures.
Zhengshu Zhou   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy