Results 21 to 30 of about 2,621,905 (214)

Requirements engineering and continuous deployment [PDF]

open access: yes, 2018
This article summarizes the RE in the Age of Continuous Deployment panel at the 25th IEEE International Requirements Engineering Conference. It highlights two synergistic points (user stories and linguistic tooling) and one challenge (nonfunctional ...
Brinkkemper, Sjaak   +4 more
core   +2 more sources

FOSSILIZATION, COMMUNICATIVE RATIONALITY AND COMMUNICATION STRATEGIES IN SECOND LANGUAGE LEARNING

open access: yesRUDN Journal of Language Studies, Semiotics and Semantics, 2019
Fossilization was first defined in 1972 as a failure, or an ultimate attainment in adult second language acquisition that falls short of native-speaker competence. It represents a final stage in the interlanguage development of the individual learner and
Zhanna Evgenievna Vavilova   +1 more
doaj   +1 more source

Robust adaptive anti-synchronization control of multiple uncertain chaotic systems of different orders

open access: yesAutomatika, 2020
The precise anti-synchronization control of uncertain chaotic systems has always remained an interesting problem. The anti-synchronization control of multiple different orders uncertain chaotic systems increases the complexity and enhances the security ...
Israr Ahmad, Muhammad Shafiq
doaj   +1 more source

Archimate-Based Approach to Requirements Engineering [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2019
Requirements engineering represents the most crucial stage in the complex systems development process. Contemporary methods of requirements engineering assume a wide application of models (described, for example, with such languages as SysML or OPM ...
K. Gaydamaka
doaj   +1 more source

Rationale Management Challenges in Requirements Engineering [PDF]

open access: yes, 2010
Rationale and rationale management have been playing an increasingly prominent role in software system development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially for large and complex systems.
Avgeriou, Paris,   +2 more
core   +3 more sources

A framework for security requirements engineering [PDF]

open access: yes, 2006
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.   +3 more
core   +1 more source

Goal sketching: towards agile requirements engineering [PDF]

open access: yes, 2007
This paper describes a technique that can be used as part of a simple and practical agile method for requirements engineering. The technique can be used together with Agile Programming to develop software in internet time. We illustrate the technique and
Boness, Kenneth Duncan, Harrison, Rachel
core   +1 more source

BERT-Based Approach for Greening Software Requirements Engineering Through Non-Functional Requirements

open access: yesIEEE Access, 2023
The incorporation of sustainability principles during the requirements engineering phase of the development life cycle constitutes greening software requirements.
Ahmad F. Subahi
doaj   +1 more source

Design science, engineering science and requirements engineering [PDF]

open access: yes, 2008
For several decades there has been a debate in the computing sciences about the relative roles of design and empirical research, and about the contribution of design and research methodology to the relevance of research results.
Heerkens, J.M.G., Wieringa, R.J.
core   +2 more sources

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

open access: yesComplex Systems Informatics and Modeling Quarterly, 2015
This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security ...
Christian Schmitt, Peter Liggesmeyer
doaj   +1 more source

Home - About - Disclaimer - Privacy