Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
RE
RE 2014
Generate Citations
2014 IEEE 22nd International Requirements Engineering Conference (RE)
Aug. 25 2014 to Aug. 29 2014
Karlskrona, Sweden
Table of Contents
Contents
Freely available from IEEE.
pp. 1-5
Message from the chairs
Freely available from IEEE.
pp. iii-iv
by
Robyn Lutz
,
Tony Gorschek
,
Sarah Gregory
,
Marjo Kauppinen
Organization committee
Freely available from IEEE.
pp. v-x
Startups and requirements (keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Anthony I. Wasserman
Now more than ever: Privacy and security are required (keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-2
by
Annie I. Antón
How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-12
by
Maya Daneva
Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-22
by
Cynthia Putnam
,
Jinghui Cheng
Towards a situation awareness design to improve visually impaired orientation in unfamiliar buildings: Requirements elicitation study
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-32
by
Abdulrhman Alkhanifer
,
Stephanie Ludi
Supporting early decision-making in the presence of uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-42
by
Jennifer Horkoff
,
Rick Salay
,
Marsha Chechik
,
Alessio Di Sandro
Integrating exception handling in goal models
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-52
by
Antoine Cailliau
,
Axel van Lamsweerde
Protos: Foundations for engineering innovative sociotechnical systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-62
by
Amit K. Chopra
,
Fabiano Dalpiaz
,
F. Basak Aydemir
,
Paolo Giorgini
,
John Mylopoulos
,
Munindar P. Singh
Automated detection and resolution of legal cross references: Approach and a study of Luxembourg's legislation
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-72
by
Morayo Adedjouma
,
Mehrdad Sabetzadeh
,
Lionel C. Briand
Goal-oriented compliance with multiple regulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Sepideh Ghanavati
,
Andre Rifaut
,
Eric Dubois
,
Daniel Amyot
Identifying and classifying ambiguity for regulatory requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-92
by
Aaron K. Massey
,
Richard L. Rutledge
,
Annie I. Anton
,
Peter P. Swire
An Approach for Decision Support on the Uncertainty in Feature Model Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-102
by
Le Minh Sang Tran
,
Fabio Massacci
Maintaining requirements for long-living software systems by incorporating security knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-112
by
Stefan Gartner
,
Thomas Ruhroth
,
Jens Burger
,
Kurt Schneider
,
Jan Jurjens
Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-122
by
Wenyi Qian
,
Xin Peng
,
Bihuan Chen
,
John Mylopoulos
,
Huanhuan Wang
,
Wenyun Zhao
TiQi: Towards natural language trace queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-132
by
Piotr Pruski
,
Sugandha Lohar
,
Rundale Aquanette
,
Greg Ott
,
Sorawit Amornborvornwong
,
Alexander Rasin
,
Jane Cleland-Huang
Traceability-enabled refactoring for managing just-in-time requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-142
by
Nan Niu
,
Tanmay Bhowmik
,
Hui Liu
,
Zhendong Niu
Supporting traceability through affinity mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-152
by
Vincenzo Gervasi
,
Didar Zowghi
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-162
by
Emitza Guzman
,
Walid Maalej
Scaling requirements extraction to the crowd: Experiments with privacy policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-172
by
Travis D. Breaux
,
Florian Schaub
Discovering affect-laden requirements to achieve system acceptance
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-182
by
Alistair Sutcliffe
,
Paul Rayson
,
Christopher N. Bull
,
Pete Sawyer
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-192
by
Maria Riaz
,
Jason King
,
John Slankas
,
Laurie Williams
Managing security requirements patterns using feature diagram hierarchies
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-202
by
Rocky Slavin
,
Jean-Michel Lehker
,
Jianwei Niu
,
Travis D. Breaux
Engineering topology aware adaptive security: Preventing requirements violations at runtime
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-212
by
Christos Tsigkanos
,
Liliana Pasquale
,
Claudio Menghi
,
Carlo Ghezzi
,
Bashar Nuseibeh
Openness and requirements: Opportunities and tradeoffs in software ecosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-222
by
Eric Knauss
,
Daniela Damian
,
Alessia Knauss
,
Arber Borici
RISDM: A requirements inspection systems design methodology: Perspective-based design of the pragmatic quality model and question set to SRS
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-232
by
Shinobu Saito
,
Mutsuki Takeuchi
,
Setsuo Yamada
,
Mikio Aoyama
Tackling the requirements jigsaw puzzle
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-242
by
Maria Pinto-Albuquerque
,
Awais Rashid
Automated support for combinational creativity in requirements engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-252
by
Tanmay Bhowmik
,
Nan Niu
,
Anas Mahmoud
,
Juha Savolainen
Automated extraction and visualization of quality concerns from requirements specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-262
by
Mona Rahimi
,
Mehdi Mirakhorli
,
Jane Cleland-Huang
Language Extended Lexicon points: Estimating the size of an application using its language
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-272
by
Leandro Antonelli
,
Gustavo Rossi
,
Julio Cesar Sampaio do Prado Leite
,
Alejandro Oliveros
The role of legal expertise in interpretation of legal requirements and definitions
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-282
by
David G. Gordon
,
Travis D. Breaux
Evaluating the business value of information technology: Case study on game management system
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-292
by
Harri Tohonen
,
Marjo Kauppinen
,
Tomi Mannisto
Non-functional requirements as qualities, with a spice of ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-302
by
Feng-Lin Li
,
Jennifer Horkoff
,
John Mylopoulos
,
Renata S. S. Guizzardi
,
Giancarlo Guizzardi
,
Alexander Borgida
,
Lin Liu
Quality requirements elicitation based on inquiry of quality-impact relationships
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-312
by
Farnaz Fotrousi
,
Samuel A. Fricker
,
Markus Fiedler
Nòmos 3: Reasoning about regulatory compliance of requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-314
by
Silvia Ingolfo
,
Alberto Siena
,
John Mylopoulos
GUITAR: An ontology-based automated requirements analysis tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-316
by
Tuong Huan Nguyen
,
John Grundy
,
Mohamed Almorsy
Simulation-based requirements discovery for smart driver assistive technologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-318
by
Andreas Gregoriades
,
Maria Pampaka
,
Alistair Sutcliffe
EAM: Ecosystemability assessment method
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-320
by
Eric Knauss
,
Imed Hammouda
Combined goal and feature model reasoning with the User Requirements Notation and jUCMNav
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-322
by
Yanji Liu
,
Yukun Su
,
Xinshang Yin
,
Gunter Mussbacher
Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-324
by
Sanjaya Kumar Saxena
,
Rachna Chakraborty
VARED: Verification and analysis of requirements and early designs
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-326
by
Julia Badger
,
David Throop
,
Charles Claunch
Structured multi-view modeling by tabular notation
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-328
by
Xiuna Zhu
,
Dongyue Mou
,
Daniel Ratiu
Efficient visual notations for efficient stakeholder communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-330
by
Ralf Laue
,
Frank Hogrebe
,
Boris Bottcher
,
Markus Nuttgens
Symbolic verification of requirements in VRS system
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-332
by
Oleksandr Letychevskyi
,
Thomas Weigert
Business Application Modeler: A process model Validation and Verification tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-334
by
Soren Witt
,
Sven Feja
,
Andreas Speck
,
Christian Hadler
Handling design-level requirements across distributed teams: Developing a new feature for 12 Danish mobile banking apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-343
by
Lars Bruun
,
Mikkel Bovbjerg Hansen
,
Jorgen Bondergaard Iversen
,
Jens Baek Jorgensen
,
Bjarne Knudsen
Experience of pragmatically combining RE methods for performance requirements in industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-353
by
Rebekka Wohlrab
,
Thijmen de Gooijer
,
Anne Koziolek
,
Steffen Becker
Lightweight requirements engineering assessments in software projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-363
by
Daniel Rapp
,
Anne Hess
,
Norbert Seyff
,
Peter Sporri
,
Emmerich Fuchs
,
Martin Glinz
Capturing and sharing domain knowledge with business rules lessons learned from a global software vendor
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-373
by
Walid Maalej
,
Smita Ghaisas
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-383
by
Chris Porter
,
Emmanuel Letier
,
M. Angela Sasse
Competition and collaboration in requirements engineering: A case study of an emerging software ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-393
by
George Valenca
,
Carina Alves
,
Virginia Heimann
,
Slinger Jansen
,
Sjaak Brinkkemper
The effect of variability modeling on requirements satisfaction for the configuration and implementation of off-the-shelf software packages
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-401
by
Amanda Rubython
,
Neil Maiden
Modelling sustainability in a procurement system: An experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-411
by
Camilla Bomfim
,
Wesley Nunes
,
Leticia Duboc
,
Marcelo Schots
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-419
by
Luiz Eduardo Galvao Martins
,
Tiago de Oliveira
The DODT tool applied to sub-sea software
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-427
by
Tor Stalhane
,
Tormod Wien
Towards feature-oriented requirements validation for automotive systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-436
by
Jiale Zhou
,
Yue Lu
,
Kristina Lundqvist
,
Henrik Lonn
,
Daniel Karlsson
,
Bo Liwang
Product knowledge configurator for requirements gap analysis and customizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-443
by
Preethu Rose Anish
,
Smita Ghaisas
Reassessing the pattern-based approach for formalizing requirements in the automotive domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-450
by
Predrag Filipovikj
,
Mattias Nyberg
,
Guillermo Rodriguez-Navas
From architecture to requirements: Relating requirements and architecture for better Requirements Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 451-455
by
Feng Chen
Quantification of social sustainability in software
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-460
by
Maryam Al Hinai
Improving collaborative and Post-WIMP systems through requirements specification
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-466
by
Miguel A. Teruel
Stakeholders' social interaction in requirements engineering of open source software
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-472
by
Tanmay Bhowmik
Aligning services and requirements with user feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-478
by
Muneera Bano
Requirements development and management of embedded real-time systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 479-484
by
Jiale Zhou
Context-sensitive Information security Risk identification and evaluation techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-488
by
Dan Ionita
Business processes and regulations compliance management technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 489-493
by
Ilze Buksa
Creative Strategic Scenarios for preparation to requirements evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-499
by
Marilia Guterres Ferreira
Ready-set-transfer! Technology transfer in the requirements engineering domain (panel)
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-501
by
Jane Huffman Hayes
,
Didar Zowghi
Showing 70 out of 70