Default Cover Image

2014 IEEE 22nd International Requirements Engineering Conference (RE)

Aug. 25 2014 to Aug. 29 2014

Karlskrona, Sweden

Table of Contents

ContentsFreely available from IEEE.pp. 1-5
Organization committeeFreely available from IEEE.pp. v-x
Startups and requirements (keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 1-1
Now more than ever: Privacy and security are required (keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 2-2
Supporting early decision-making in the presence of uncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 33-42
Integrating exception handling in goal modelsFull-text access may be available. Sign in or learn about subscription options.pp. 43-52
Goal-oriented compliance with multiple regulationsFull-text access may be available. Sign in or learn about subscription options.pp. 73-82
Identifying and classifying ambiguity for regulatory requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 83-92
An Approach for Decision Support on the Uncertainty in Feature Model EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 93-102
TiQi: Towards natural language trace queriesFull-text access may be available. Sign in or learn about subscription options.pp. 123-132
Traceability-enabled refactoring for managing just-in-time requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 133-142
Supporting traceability through affinity miningFull-text access may be available. Sign in or learn about subscription options.pp. 143-152
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App ReviewsFull-text access may be available. Sign in or learn about subscription options.pp. 153-162
Scaling requirements extraction to the crowd: Experiments with privacy policiesFull-text access may be available. Sign in or learn about subscription options.pp. 163-172
Discovering affect-laden requirements to achieve system acceptanceFull-text access may be available. Sign in or learn about subscription options.pp. 173-182
Managing security requirements patterns using feature diagram hierarchiesFull-text access may be available. Sign in or learn about subscription options.pp. 193-202
Openness and requirements: Opportunities and tradeoffs in software ecosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 213-222
Tackling the requirements jigsaw puzzleFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
Automated support for combinational creativity in requirements engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 243-252
Automated extraction and visualization of quality concerns from requirements specificationsFull-text access may be available. Sign in or learn about subscription options.pp. 253-262
The role of legal expertise in interpretation of legal requirements and definitionsFull-text access may be available. Sign in or learn about subscription options.pp. 273-282
Evaluating the business value of information technology: Case study on game management systemFull-text access may be available. Sign in or learn about subscription options.pp. 283-292
Quality requirements elicitation based on inquiry of quality-impact relationshipsFull-text access may be available. Sign in or learn about subscription options.pp. 303-312
Nòmos 3: Reasoning about regulatory compliance of requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 313-314
GUITAR: An ontology-based automated requirements analysis toolFull-text access may be available. Sign in or learn about subscription options.pp. 315-316
Simulation-based requirements discovery for smart driver assistive technologiesFull-text access may be available. Sign in or learn about subscription options.pp. 317-318
EAM: Ecosystemability assessment methodFull-text access may be available. Sign in or learn about subscription options.pp. 319-320
Combined goal and feature model reasoning with the User Requirements Notation and jUCMNavFull-text access may be available. Sign in or learn about subscription options.pp. 321-322
Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 323-324
VARED: Verification and analysis of requirements and early designsFull-text access may be available. Sign in or learn about subscription options.pp. 325-326
Structured multi-view modeling by tabular notationFull-text access may be available. Sign in or learn about subscription options.pp. 327-328
Efficient visual notations for efficient stakeholder communicationFull-text access may be available. Sign in or learn about subscription options.pp. 329-330
Symbolic verification of requirements in VRS systemFull-text access may be available. Sign in or learn about subscription options.pp. 331-332
Business Application Modeler: A process model Validation and Verification toolFull-text access may be available. Sign in or learn about subscription options.pp. 333-334
Lightweight requirements engineering assessments in software projectsFull-text access may be available. Sign in or learn about subscription options.pp. 354-363
Capturing and sharing domain knowledge with business rules lessons learned from a global software vendorFull-text access may be available. Sign in or learn about subscription options.pp. 364-373
Modelling sustainability in a procurement system: An experience reportFull-text access may be available. Sign in or learn about subscription options.pp. 402-411
A case study using a protocol to derive safety functional requirements from Fault Tree AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 412-419
The DODT tool applied to sub-sea softwareFull-text access may be available. Sign in or learn about subscription options.pp. 420-427
Towards feature-oriented requirements validation for automotive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 428-436
Product knowledge configurator for requirements gap analysis and customizationsFull-text access may be available. Sign in or learn about subscription options.pp. 437-443
From architecture to requirements: Relating requirements and architecture for better Requirements EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 451-455
Quantification of social sustainability in softwareFull-text access may be available. Sign in or learn about subscription options.pp. 456-460
Improving collaborative and Post-WIMP systems through requirements specificationFull-text access may be available. Sign in or learn about subscription options.pp. 461-466
Stakeholders' social interaction in requirements engineering of open source softwareFull-text access may be available. Sign in or learn about subscription options.pp. 467-472
Aligning services and requirements with user feedbackFull-text access may be available. Sign in or learn about subscription options.pp. 473-478
Requirements development and management of embedded real-time systemsFull-text access may be available. Sign in or learn about subscription options.pp. 479-484
Context-sensitive Information security Risk identification and evaluation techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 485-488
Business processes and regulations compliance management technologyFull-text access may be available. Sign in or learn about subscription options.pp. 489-493
Creative Strategic Scenarios for preparation to requirements evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 494-499
Ready-set-transfer! Technology transfer in the requirements engineering domain (panel)Full-text access may be available. Sign in or learn about subscription options.pp. 500-501
Showing 70 out of 70