Results 41 to 50 of about 57,405 (292)
Causes and Mitigation Practices of Requirement Volatility in Agile Software Development
One of the main obstacles in software development projects is requirement volatility (RV), which is defined as uncertainty or changes in software requirements during the development process.
Abdulghafour Mohammad +1 more
doaj +1 more source
Managing contextual information in semantically-driven temporal information systems [PDF]
Context-aware (CA) systems have demonstrated the provision of a robust solution for personalized information delivery in the current content-rich and dynamic information age we live in.
Isiaq, SO, Osman, T, Peytchev, E
core +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
The quality of unmanned aerial vehicle flight control and management system (UAV FCMS) software is crucial to guaranteeing the quality of UAVs. Software requirement elicitation (SRE) is an important part of the UAV FCMS software development process ...
Xuan Hu, Jie Liu
doaj +1 more source
Fuzzy Specification in Real Estate Market Decision Making [PDF]
In this paper we present a software tool designed as a decision aid system for all actors being involved when buying or selling real state, client and realtor, where a main objective for the commercial is to concentrate the client preferences into few ...
Victoria Lopez +2 more
doaj +1 more source
STORE: Security Threat Oriented Requirements Engineering Methodology
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more ...
Md Tarique Jamal Ansari +2 more
doaj +1 more source
Questionnaire based approach to measure security in requirement engineering [PDF]
The aim of this paper is to measure security in requirement engineering using questionnaire based approach. The questionnaire is applied in the four stages of requirement engineering (Elicitation, analyses, validation, management).
Besrour, Souhaib, Ghani, Imran
core +1 more source
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Influence of Context on Decision Making during Requirements Elicitation [PDF]
Requirements engineers should strive to get a better insight into decision making processes. During elicitation of requirements, decision making influences how stakeholders communicate with engineers, thereby affecting the engineers' understanding of ...
Burnay, Corentin +2 more
core +2 more sources
Anticipating Requirements Changes-Using Futurology in Requirements Elicitation
It is well known that requirements changes in a later phase of software developments is a major source of software defects and costs. Thus, the need of techniques to control or reduce the amount of changes during software development projects. The authors advocate the use of foresight methods as a valuable input to requirements elicitation, with the ...
Pimentel, João Henrique +3 more
openaire +3 more sources

