skip to main content
Skip header Section
Problem frames: analyzing and structuring software development problemsNovember 2000
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-201-59627-4
Published:01 November 2000
Pages:
390
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

This book is a must-have for all IT professionals facing software development problems on a daily basis. If you are a systems analyst or requirements engineer it will provide an essential, practical guide from the task of identifying the problem to making the descriptions needed to resolve it.

Cited By

  1. Stock S, Mashkoor A and Egyed A Validation-Driven Development Formal Methods and Software Engineering, (191-207)
  2. Gudaparthi H, Niu N, Yang Y, Van Doren M and Johnson R (2023). Deep learning's fitness for purpose, CAAI Transactions on Intelligence Technology, 8:2, (343-354), Online publication date: 22-Jun-2023.
  3. ACM
    Jones C and Thomas M (2022). The Development and Deployment of Formal Methods in the UK, Formal Aspects of Computing, 34:1, (1-21), Online publication date: 31-Mar-2022.
  4. Bartels N and Gordijn J A Business Model Construction Kit for Platform Business Models - Research Preview Requirements Engineering: Foundation for Software Quality, (175-182)
  5. Akiki P and Maalouf H (2021). CHECKSUM: tracking changes and measuring contributions in cooperative systems modeling, Software and Systems Modeling (SoSyM), 20:4, (1079-1122), Online publication date: 1-Aug-2021.
  6. ACM
    Junaid W Evaluating the Effectiveness of Problem Frames for Contextual Modeling of Cyber-Physical Systems: a Tool Suite with Adaptive User Interfaces Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering, (284-287)
  7. Ferreyra N, Tessier P, Pedroza G and Heisel M PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements Data Privacy Management, Cryptocurrencies and Blockchain Technology, (161-177)
  8. Sutcliffe A, Sawyer P, Stringer G, Couth S, Brown L, Gledson A, Bull C, Rayson P, Keane J, Zeng X and Leroi I (2018). Known and unknown requirements in healthcare, Requirements Engineering, 25:1, (1-20), Online publication date: 1-Mar-2020.
  9. Nagoya F A Case Study on Combining Agile Requirements Development and SOFL Structured Object-Oriented Formal Language and Method, (23-33)
  10. Gleirscher M, Foster S and Nemouchi Y Evolution of Formal Model-Based Assurance Cases for Autonomous Robots Software Engineering and Formal Methods, (87-104)
  11. ACM
    Wirtz R and Heisel M Managing security risks Proceedings of the 24th European Conference on Pattern Languages of Programs, (1-13)
  12. Liu Z, Bowen J, Liu B, Tyszberowicz S and Zhang T Software Abstractions and Human-Cyber-Physical Systems Architecture Modelling Engineering Trustworthy Software Systems, (159-219)
  13. ACM
    Abdelmadjid L and Mimoun M Requirements customized recommendation in a decision-making system Proceedings of the 7th International Conference on Software Engineering and New Technologies, (1-5)
  14. Hallerstede S, Larsen P and Fitzgerald J A Non-unified View of Modelling, Specification and Programming Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (52-68)
  15. ACM
    Tun T, Yang M, Bandara A, Yu Y, Nhlabatsi A, Khan N, Khan K and Nuseibeh B Requirements and specifications for adaptive security Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, (161-171)
  16. Hall J, Rapanotti L and Markov G A Phenomenal Basis for Hybrid Modelling 2017 IEEE International Conference on Information Reuse and Integration (IRI), (291-297)
  17. ACM
    Meis R and Heisel M Aspect Frames Proceedings of the 22nd European Conference on Pattern Languages of Programs, (1-28)
  18. Zagouras P, Kalloniatis C and Gritzalis S Managing User Experience: Usability and Security in a New Era of Software Supremacy Human Aspects of Information Security, Privacy and Trust, (174-188)
  19. Hall J and Rapanotti L (2017). A design theory for software engineering, Information and Software Technology, 87:C, (46-61), Online publication date: 1-Jul-2017.
  20. Bjørner D (2017). Manifest domains: analysis and description, Formal Aspects of Computing, 29:2, (175-225), Online publication date: 1-Mar-2017.
  21. Kaiya H (2016). Modelling Goal Dependencies and Domain Model Together, Procedia Computer Science, 96:C, (791-800), Online publication date: 1-Oct-2016.
  22. Souag A, Mazo R, Salinesi C and Comyn-Wattiau I (2016). Reusable knowledge in security requirements engineering, Requirements Engineering, 21:2, (251-283), Online publication date: 1-Jun-2016.
  23. ACM
    Hall J and Rapanotti L Parameterising a theory of software problem solving Proceedings of the 5th International Workshop on Theory-Oriented Software Engineering, (22-25)
  24. ACM
    Jackson D Towards a theory of conceptual design for software 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!), (282-296)
  25. ACM
    Rifaut A, Feltus C, Turki S and Khadraoui D Analysis of the impact of ethical issues on the management of the access rights Proceedings of the 8th International Conference on Security of Information and Networks, (12-19)
  26. ACM
    Alebrahim A, Fassbender S, Filipczyk M, Goedicke M and Heisel M Towards systematic selection of architectural patterns with respect to quality requirements Proceedings of the 20th European Conference on Pattern Languages of Programs, (1-20)
  27. ACM
    Alebrahim A and Heisel M Applying performance patterns for requirements analysis Proceedings of the 20th European Conference on Pattern Languages of Programs, (1-15)
  28. Paja E, Dalpiaz F and Giorgini P (2015). Modelling and reasoning about security requirements in socio-technical systems, Data & Knowledge Engineering, 98:C, (123-143), Online publication date: 1-Jul-2015.
  29. ACM
    Alhosban A, Hashmi K, Malik Z, Medjahed B and Benbernou S (2015). Bottom-Up Fault Management in Service-Based Systems, ACM Transactions on Internet Technology, 15:2, (1-40), Online publication date: 24-Jun-2015.
  30. Van Landuyt D and Joosen W On the role of early architectural assumptions in quality attribute scenarios Proceedings of the Fifth International Workshop on Twin Peaks of Requirements and Architecture, (9-15)
  31. Staples M The unending quest for valid, useful software engineering theories Proceedings of the Fourth SEMAT Workshop on General Theory of Software Engineering, (47-58)
  32. Tun T, Lutz R, Nakayama B, Yu Y, Mathur D and Nuseibeh B The role of environmental assumptions in failures of DNA nanosystems Proceedings of the First International Workshop on Complex faUlts and Failures in LargE Software Systems, (27-33)
  33. ACM
    Beckers K, paluno M, Moyano F and Fernandez-Gago C Engineering trust- and reputation-based security controls for future internet systems Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1344-1349)
  34. ACM
    Harrison N, van Heesch U, Sobernig S, Sommerlad P, Filipczyk M, Fülleborn A, Musil A and Musil J (2015). Software Architecture Patterns: Reflection and Advances, ACM SIGSOFT Software Engineering Notes, 40:1, (30-34), Online publication date: 6-Feb-2015.
  35. Wieringa R (2014). Empirical research methods for technology validation, Journal of Systems and Software, 95, (19-31), Online publication date: 1-Sep-2014.
  36. ACM
    Beckers K, Faßbender S, Heisel M and Suppan S A meta-pattern and pattern form for context-patterns Proceedings of the 19th European Conference on Pattern Languages of Programs, (1-23)
  37. ACM
    Beckers K, Faßbender S and Heisel M Deriving a pattern language syntax for context-patterns Proceedings of the 19th European Conference on Pattern Languages of Programs, (1-25)
  38. ACM
    Alebrahim A and Heisel M Problem-oriented security patterns for requirements engineering Proceedings of the 19th European Conference on Pattern Languages of Programs, (1-17)
  39. ACM
    Thomas K, Bandara A, Price B and Nuseibeh B Distilling privacy requirements for mobile applications Proceedings of the 36th International Conference on Software Engineering, (871-882)
  40. ACM
    Li Z and Chen L System-level testing of cyber-physical systems based on problem concerns Proceedings of the 2014 3rd International Workshop on Evidential Assessment of Software Technologies, (60-62)
  41. Alebrahim A, Faβbender S, Heisel M and Meis R Problem-Based Requirements Interaction Analysis Proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality - Volume 8396, (200-215)
  42. Li Y, Runde R and Stølen K Towards a pattern language for security risk analysis of web applications Proceedings of the 20th Conference on Pattern Languages of Programs, (1-17)
  43. Tun T, Laney R, Yu Y and Nuseibeh B (2013). Specifying software features for composition, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:12, (2454-2464), Online publication date: 1-Aug-2013.
  44. ACM
    Beckers K, Fassbender S and Heisel M A meta-model for context-patterns Proceedings of the 18th European Conference on Pattern Languages of Program, (1-15)
  45. ACM
    Konersmann M, Durdik Z, Goedicke M and Reussner R Towards architecture-centric evolution of long-living systems (the ADVERT approach) Proceedings of the 9th international ACM Sigsoft conference on Quality of software architectures, (163-168)
  46. Letier E and Heaven W Requirements modelling by synthesis of deontic input-output automata Proceedings of the 2013 International Conference on Software Engineering, (592-601)
  47. ACM
    Beckers K, Faßbender S, Hatebur D, Heisel M and Côté I Common criteria compliant software development (CC-CASD) Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1298-1304)
  48. Jones C, Freitas L and Velykis A Ours is to reason why Theories of Programming and Formal Methods, (227-243)
  49. ACM
    Bin Y, Zhi J and Xiaohong C An approach for selecting implementation strategies of non-functional requirements Proceedings of the Fourth Asia-Pacific Symposium on Internetware, (1-7)
  50. Beckers K, Faβbender S, Heisel M and Meis R A Problem-Based Approach for Computer-Aided Privacy Threat Identification Revised Selected Papers of the First Annual Privacy Forum on Privacy Technologies and Policy - Volume 8319, (1-16)
  51. ACM
    Alebrahim A and Heisel M Supporting quality-driven design decisions by modeling variability Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures, (43-48)
  52. ACM
    Alebrahim A, Côté I, Heisel M, Choppy C and Hatebur D Designing architectures from problem descriptions by interactive model transformation Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1256-1258)
  53. ACM
    Asif M and krogstie J Identifying problem frames for location-based services Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-6)
  54. Beckers K, Faßbender S, Heisel M, Küster J and Schmidt H Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches Proceedings of the 4th international conference on Engineering Secure Software and Systems, (14-21)
  55. Beckers K, Faßbender S, Heisel M and Meis R Pattern-Based context establishment for service-oriented architectures Software Service and Application Engineering, (81-101)
  56. Chen X, Liu J and Ding Z On constructing software environment ontology for time-continuous environment Proceedings of the 5th international conference on Knowledge Science, Engineering and Management, (148-159)
  57. Yu Y, Tun T and Nuseibeh B Specifying and detecting meaningful changes in programs Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (273-282)
  58. Gmehlich R, Grau K, Hallerstede S, Leuschel M, Lösch F and Plagge D On fitting a formal method into practice Proceedings of the 13th international conference on Formal methods and software engineering, (195-210)
  59. ACM
    Hauge A and Stølen K SACS Proceedings of the 18th Conference on Pattern Languages of Programs, (1-22)
  60. Doumi K, Baïna S and Baïna K Modeling approach using goal modeling and enterprise architecture for business IT alignment Proceedings of the First international conference on Model and data engineering, (249-261)
  61. Kofod-Petersen A and Cassens J Modelling with problem frames Proceedings of the 7th international and interdisciplinary conference on Modeling and using context, (145-158)
  62. Alebrahim A, Hatebur D and Heisel M Towards systematic integration of quality requirements into software architecture Proceedings of the 5th European conference on Software architecture, (17-25)
  63. ACM
    Mori M A software lifecycle process for context-aware adaptive systems Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, (412-415)
  64. Andrade J, Ares J, García R, Martínez M, Rodríguez S and Suárez S About theory in software development Proceedings of the 11th WSEAS international conference on Signal processing, computational geometry and artificial vision, and Proceedings of the 11th WSEAS international conference on Systems theory and scientific computation, (256-261)
  65. Peng X, Yu Y and Zhao W (2011). Analyzing evolution of variability in a software product line, Information and Software Technology, 53:7, (707-721), Online publication date: 1-Jul-2011.
  66. Schmidt H and Jürjens J Connecting security requirements analysis and secure design using patterns and UMLsec Proceedings of the 23rd international conference on Advanced information systems engineering, (367-382)
  67. Tran L and Massacci F Dealing with known unknowns Proceedings of the 23rd international conference on Advanced information systems engineering, (62-76)
  68. ACM
    Durdik Z Towards a process for architectural modelling in agile software development Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS, (183-192)
  69. Zhang W, Zhao H, Jin Z and Mei H Towards a more fundamental explanation of constraints in feature models Proceedings of the 12th international conference on Top productivity through software reuse, (36-51)
  70. Colombo P, Khendek F and Lavazza L Generating early design models from requirements analysis artifacts using problem frames and SysML Proceedings of the 7th European conference on Modelling foundations and applications, (97-114)
  71. ACM
    McNeile A Two paradigms of composition Proceedings of the Third Workshop on Behavioural Modelling, (25-32)
  72. ACM
    Nakagawa H, Ohsuga A and Honiden S gocc Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (40-49)
  73. ACM
    Gleirscher M Hazard-based selection of test cases Proceedings of the 6th International Workshop on Automation of Software Test, (64-70)
  74. ACM
    Near J, Milicevic A, Kang E and Jackson D A lightweight code analysis and its role in evaluation of a dependability case Proceedings of the 33rd International Conference on Software Engineering, (31-40)
  75. Maiden N Delivering requirements research into practice Proceedings of the 17th international working conference on Requirements engineering: foundation for software quality, (1-3)
  76. Hatebur D, Heisel M, Jürjens J and Schmidt H Systematic development of UMLsec design models based on security requirements Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software, (232-246)
  77. ACM
    Nakagawa H, Yoshioka N, Ohsuga A and Honiden S IMPULSE Proceedings of the 2011 ACM Symposium on Applied Computing, (1411-1418)
  78. Heyman T, Yskout K, Scandariato R, Schmidt H and Yu Y The security twin peaks Proceedings of the Third international conference on Engineering secure software and systems, (167-180)
  79. Hatebur D and Heisel M Making pattern- and model-based software development more rigorous Proceedings of the 12th international conference on Formal engineering methods and software engineering, (253-269)
  80. ACM
    Souer J and Joor D An approach to identify commonalities in web application engineering for a web content management system Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (558-565)
  81. ACM
    Shaw M Research toward an engineering discipline for software Proceedings of the FSE/SDP workshop on Future of software engineering research, (337-342)
  82. ACM
    Wang B, Zhao H, Zhang W, Jin Z and Mei H A problem-driven collaborative approach to eliciting requirements of internetwares Proceedings of the Second Asia-Pacific Symposium on Internetware, (1-3)
  83. Hatebur D and Heisel M A UML profile for requirements analysis of dependable software Proceedings of the 29th international conference on Computer safety, reliability, and security, (317-331)
  84. Dao T and Kang K Mapping features to reusable components Proceedings of the 14th international conference on Software product lines: going beyond, (377-392)
  85. Ubayashi N, Nakajima S and Hirayama M Context-dependent product line practice for constructing reliable embedded systems Proceedings of the 14th international conference on Software product lines: going beyond, (1-15)
  86. Colombo P, Khendek F and Lavazza L Requirements analysis and modeling with problem frames and SysML Proceedings of the 6th European conference on Modelling Foundations and Applications, (74-89)
  87. ACM
    Faily S and Fléchais I A meta-model for usable secure requirements engineering Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, (29-35)
  88. Reggio G, Astesiano E, Ricca F and Leotta M A problem frame-based approach to evolvability Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (157-175)
  89. McNeile A and Roubtsova E Aspect-oriented development using protocol modeling Transactions on aspect-oriented software development VII, (115-150)
  90. McNeile A and Roubtsova E Aspect-oriented development using protocol modeling Transactions on aspect-oriented software development VII, (115-150)
  91. Donyina A and Heckel R Formal Visual Modelling of Human Agents in Service Oriented Systems Proceedings of the 2009 Fourth South-East European Workshop on Formal Methods, (25-32)
  92. ACM
    Supakkul S, Hill T, Chung L and Oladimeji E Goal-oriented security threat mitigation patterns Proceedings of the 16th Conference on Pattern Languages of Programs, (1-15)
  93. Than Tun T, Boucher Q, Classen A, Hubaux A and Heymans P Relating requirements and feature configurations Proceedings of the 13th International Software Product Line Conference, (201-210)
  94. ACM
    Jackson D (2009). A direct path to dependable software, Communications of the ACM, 52:4, (78-88), Online publication date: 1-Apr-2009.
  95. ACM
    Supakkul S and Chung L Extending Problem Frames to deal with stakeholder problems Proceedings of the 2009 ACM symposium on Applied Computing, (389-394)
  96. ACM
    Winbladh K, Ziv H and Richardson D Eliciting required characteristics for usable requirements engineering approaches Proceedings of the 2009 ACM symposium on Applied Computing, (360-364)
  97. ACM
    Avgeriou P, Lago P and Kruchten P (2009). Towards using architectural knowledge, ACM SIGSOFT Software Engineering Notes, 34:2, (27-30), Online publication date: 28-Feb-2009.
  98. Sutcliffe A (2008). The socio-economics of software architecture, Automated Software Engineering, 15:3-4, (343-363), Online publication date: 1-Dec-2008.
  99. Jackson M The Name and Nature of Software Engineering Advances in Software Engineering, (1-38)
  100. ACM
    Forward A and Lethbridge T A taxonomy of software types to facilitate search and evidence-based software engineering Proceedings of the 2008 conference of the center for advanced studies on collaborative research: meeting of minds, (179-191)
  101. Woodcock J The miracle of reactive programming Proceedings of the 2nd international conference on Unifying theories of programming, (202-217)
  102. Babar A, Cox K, Tosic V, Bleistein S and Verner J (2008). Integrating B-SCP and MAP to manage the evolution of strategic IT requirements, Information and Software Technology, 50:7-8, (815-831), Online publication date: 1-Jun-2008.
  103. ACM
    Kaminski D, Hall J and Wermelinger M Relating problem oriented engineering to current development processes Proceedings of the 3rd international workshop on Applications and advances of problem frames, (78-81)
  104. ACM
    Classen A, Laney R, Tun T, Heymans P and Hubaux A Using the event calculus to reason about problem diagrams Proceedings of the 3rd international workshop on Applications and advances of problem frames, (74-77)
  105. ACM
    Marincic J, Mader A, Wupper H and Wieringa R Non-monotonic modelling from initial requirements Proceedings of the 3rd international workshop on Applications and advances of problem frames, (67-73)
  106. ACM
    Colombo P, del Bianco V and Lavazza L Using problem frames to model the requirements ofa system for monitoring dangerous goods transportation Proceedings of the 3rd international workshop on Applications and advances of problem frames, (60-66)
  107. ACM
    Li Z Progressing problems from requirements to specifications in problem frames Proceedings of the 3rd international workshop on Applications and advances of problem frames, (53-59)
  108. ACM
    Babar A, Zowghi D, Cox K, Tosic V, Bleistein S and Verner J Problem frames and business strategy modelling Proceedings of the 3rd international workshop on Applications and advances of problem frames, (48-51)
  109. ACM
    Lavazza L and del Bianco V Functional size measurement based on problem frames Proceedings of the 3rd international workshop on Applications and advances of problem frames, (44-47)
  110. ACM
    Chen X and Jin Z An ontology-guided process for developing problem frame specification Proceedings of the 3rd international workshop on Applications and advances of problem frames, (36-39)
  111. ACM
    Wang J, He K, Gong P, Wang C, Peng R and Li B RGPS Proceedings of the 3rd international workshop on Applications and advances of problem frames, (29-35)
  112. ACM
    Cai G, Jin Z and Feng Z A method for web service description by using problem frames approach Proceedings of the 3rd international workshop on Applications and advances of problem frames, (23-28)
  113. ACM
    Vincent M Communicating requirements for business Proceedings of the 3rd international workshop on Applications and advances of problem frames, (16-22)
  114. ACM
    Mannering D Implementable requirements in problem orientation Proceedings of the 3rd international workshop on Applications and advances of problem frames, (9-15)
  115. ACM
    Colombo P, del Bianco V and Lavazza L Towards the integration of sysml and problem frames Proceedings of the 3rd international workshop on Applications and advances of problem frames, (1-8)
  116. ACM
    Ubayashi N, Seto T, Kanagawa H, Taniguchi S, Yoshida J, Sumi T and Hirayama M A context analysis method for constructing reliable embedded systems Proceedings of the 2008 international workshop on Models in software engineering, (57-62)
  117. ACM
    Müller H, Pezzè M and Shaw M Visibility of control in adaptive systems Proceedings of the 2nd international workshop on Ultra-large-scale software-intensive systems, (23-26)
  118. ACM
    Tun T, Hall J, Rapanotti L, Cox K and Jin Z 3rd international workshop on advances and applications of problem frames Companion of the 30th international conference on Software engineering, (1029-1030)
  119. Classen A, Heymans P and Schobbens P What's in a feature Proceedings of the Theory and practice of software, 11th international conference on Fundamental approaches to software engineering, (16-30)
  120. ACM
    Babar A, Zowghi D, Cox K and Tosic V Three integration approaches for map and B-SCP requirements engineering techniques Proceedings of the 2008 ACM symposium on Applied computing, (650-655)
  121. ACM
    Yu Y, do Prado Leite J, Lapouchnian A and Mylopoulos J Configuring features with stakeholder goals Proceedings of the 2008 ACM symposium on Applied computing, (645-649)
  122. Chen X, Jin Z and Yi L An ontology of problem frames for guiding problem frame specification Proceedings of the 2nd international conference on Knowledge science, engineering and management, (384-395)
  123. Chen X, Jin Z and Yi L An Ontology of Problem Frames for Guiding Problem Frame Specification Knowledge Science, Engineering and Management, (384-395)
  124. Specker M and Wentzlaff I Exploring usability needs by human-computer interaction patterns Proceedings of the 6th international conference on Task models and diagrams for user interface design, (254-260)
  125. Habli I, Wu W, Attwood K and Kelly T Extending argumentation to goal-oriented requirements engineering Proceedings of the 2007 conference on Advances in conceptual modeling: foundations and applications, (306-316)
  126. Amálio N, Polack F and Stepney S (2007). Frameworks Based on Templates for Rigorous Model-driven Development, Electronic Notes in Theoretical Computer Science (ENTCS), 191, (3-23), Online publication date: 1-Oct-2007.
  127. Côté I, Heisel M and Wentzlaff I Pattern-based evolution of software architectures Proceedings of the First European conference on Software Architecture, (29-43)
  128. Mannering D, Hall J and Rapanotti L Safety process improvement with POSE and alloy Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (252-257)
  129. Desmet B, Vallejos J, Costanza P, De Meuter W and D'Hondt T Context-oriented domain analysis Proceedings of the 6th international and interdisciplinary conference on Modeling and using context, (178-191)
  130. Seater R, Jackson D and Gheyi R (2007). Requirement progression in problem frames: deriving specifications from requirements, Requirements Engineering, 12:2, (77-102), Online publication date: 1-Apr-2007.
  131. Mannering D, Hall J and Rapanotti L Towards normal design for safety-critical systems Proceedings of the 10th international conference on Fundamental approaches to software engineering, (398-411)
  132. ACM
    Gross M, Herbsleb J, Finger S and Shaw M Strategies for research about design Proceedings of the 2007 Symposium on Science of Design, (4-6)
  133. ACM
    Babar A, Cox K, Bleistein S and Verner J Towards evolution of strategic IT requirements Proceedings of the 2007 ACM symposium on Applied computing, (1220-1227)
  134. ACM
    Bastani B (2007). A requirements analysis framework for open systems requirements engineering, ACM SIGSOFT Software Engineering Notes, 32:2, (1-19), Online publication date: 1-Mar-2007.
  135. Ostroff J and Torshizi F Testable requirements and specifications Proceedings of the 1st international conference on Tests and proofs, (17-40)
  136. Jones C, Hayes I and Jackson M Deriving specifications for systems that are connected to the physical world Formal methods and hybrid real-time systems, (364-390)
  137. Fiadeiro J (2007). Designing for Software's Social Complexity, Computer, 40:1, (34-39), Online publication date: 1-Jan-2007.
  138. ACM
    Fairbanks G, Bierhoff K and D'Souza D Software architecture at a large financial firm Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, (815-823)
  139. ACM
    Mahfouz A, Barroca L, Laney R and Nuseibeh B Patterns for service-oriented information exchange requirements Proceedings of the 2006 conference on Pattern languages of programs, (1-10)
  140. ACM
    Wirfs-Brock R, Taylor P and Noble J Problem frame patterns Proceedings of the 2006 conference on Pattern languages of programs, (1-19)
  141. Santen T Stepwise development of secure systems Proceedings of the 25th international conference on Computer Safety, Reliability, and Security, (142-155)
  142. ACM
    Wentzlaff I and Specker M Pattern-based development of user-friendly web applications Workshop proceedings of the sixth international conference on Web engineering, (2-es)
  143. Hatebur D, Heisel M and Schmidt H Security engineering using problem frames Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security, (238-253)
  144. Maibaum T On specifying systems that connect to the physical world Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06, (71-83)
  145. Lee Y and Zhao W Domain requirements elicitation and analysis - an ontology-based approach Proceedings of the 6th international conference on Computational Science - Volume Part IV, (805-813)
  146. ACM
    Tun T and Hall J Developer requirements in the PF approach Proceedings of the 2006 international workshop on Advances and applications of problem frames, (87-90)
  147. ACM
    Seater R and Jackson D Problem frame transformations Proceedings of the 2006 international workshop on Advances and applications of problem frames, (71-80)
  148. ACM
    Li Z, Hall J and Rapanotti L From requirements to specifications Proceedings of the 2006 international workshop on Advances and applications of problem frames, (65-70)
  149. ACM
    Lencastre M, Araujo J, Moreira A and Castro J Analyzing crosscutting in the problem frames approach Proceedings of the 2006 international workshop on Advances and applications of problem frames, (59-64)
  150. ACM
    Jørgensen J Addressing problem frame concerns via coloured petri nets and graphical animation Proceedings of the 2006 international workshop on Advances and applications of problem frames, (49-58)
  151. ACM
    Jin Z and Liu L Towards automatic problem decomposition Proceedings of the 2006 international workshop on Advances and applications of problem frames, (41-48)
  152. ACM
    Jha A Problem frames approach to web services requirements Proceedings of the 2006 international workshop on Advances and applications of problem frames, (33-40)
  153. ACM
    Del Bianco V and Lavazza L Enhancing problem frames with scenarios and histories Proceedings of the 2006 international workshop on Advances and applications of problem frames, (25-32)
  154. ACM
    Brier J, Rapanotti L and Hall J Problem-based analysis of organisational change Proceedings of the 2006 international workshop on Advances and applications of problem frames, (13-18)
  155. ACM
    Cox K, Bleistein S, Reynolds P and Thorogood A A contingency view of organizational infrastructure requirements engineering Proceedings of the 2006 ACM symposium on Applied computing, (1497-1504)
  156. Lavazza L and Del Bianco V Combining problem frames and UML in the description of software requirements Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering, (199-213)
  157. Bleistein S, Cox K and Verner J (2006). Validating strategic alignment of organizational IT requirements using goal modeling and problem diagrams, Journal of Systems and Software, 79:3, (362-378), Online publication date: 1-Mar-2006.
  158. Sutcliffe A, Papamargaritis G and Zhao L (2006). Comparing requirements analysis methods for developing reusable component libraries, Journal of Systems and Software, 79:2, (273-289), Online publication date: 1-Feb-2006.
  159. Aaltonen T, Katara M, Kurki-Suonio R and Mikkonen T On horizontal specification architectures and their aspect-oriented implementations Transactions on Aspect-Oriented Software Development II, (1-29)
  160. Jackson D and Jackson M Separating concerns in requirements analysis Rigorous Development of Complex Fault-Tolerant Systems, (210-225)
  161. Coleman J Determining the specification of a control system Rigorous Development of Complex Fault-Tolerant Systems, (114-132)
  162. Meyer B Dependable software Dependable Systems, (1-33)
  163. Noble J and Biddle R Postmodern prospects for conceptual modelling Proceedings of the 3rd Asia-Pacific conference on Conceptual modelling - Volume 53, (11-20)
  164. Hou L and Jin Z FECT Proceedings of the 6th international conference on Advances in Web-Age Information Management, (320-332)
  165. Hatebur D and Heisel M Problem frames and architectures for security problems Proceedings of the 24th international conference on Computer Safety, Reliability, and Security, (390-404)
  166. ACM
    Liu W, Chen C, Lakshminarayanan V and Perry D (2005). A design for evidence - based soft research, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  167. ACM
    Liu W, Chen C, Lakshminarayanan V and Perry D A design for evidence - based soft research Proceedings of the 2005 workshop on Realising evidence-based software engineering, (1-7)
  168. Cañete J and Galán F Towards a theory on the role of ontologies in software engineering problem solving Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (205-219)
  169. ACM
    Bleistein S, Cox K and Verner J Strategic alignment in requirements analysis for organizational IT Proceedings of the 2005 ACM symposium on Applied computing, (1300-1307)
  170. ACM
    Ourusoff N (2004). Reinvigorating the software engineering curriculum with Jackson's methods and ideas, ACM SIGCSE Bulletin, 36:2, (93-96), Online publication date: 1-Jun-2004.
  171. Andrade J, Ares J, García R, Pazos J, Rodríguez S and Silva A (2004). A Methodological Framework for Viewpoint-Oriented Conceptual Modeling, IEEE Transactions on Software Engineering, 30:5, (282-294), Online publication date: 1-May-2004.
  172. Papamargaritis G and Sutcliffe A (2004). Applying the Domain Theory to Design for Reuse, BT Technology Journal, 22:2, (104-115), Online publication date: 1-Apr-2004.
  173. ACM
    Greenfield J and Short K Software factories Companion of the 18th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (16-27)
  174. Jackson M (2003). Why software writing is difficult and will remain so, Information Processing Letters, 88:1-2, (13-25), Online publication date: 17-Oct-2003.
  175. Mikkonen T Experiences on developing and using a tool support for formal specification Proceedings of the 8th Ada-Europe international conference on Reliable software technologies, (297-308)
  176. Del Bianco V and Sassaroli G Agile teaching of an agile software process Proceedings of the 4th international conference on Extreme programming and agile processes in software engineering, (402-405)
  177. ACM
    Rashid A, Moreira A and Araújo J Modularisation and composition of aspectual requirements Proceedings of the 2nd international conference on Aspect-oriented software development, (11-20)
  178. Antón A and Potts C (2003). Functional Paleontology, IEEE Transactions on Software Engineering, 29:2, (151-166), Online publication date: 1-Feb-2003.
  179. ACM
    Letier E and van Lamsweerde A Deriving operational software specifications from system goals Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, (119-128)
  180. ACM
    Letier E and van Lamsweerde A (2002). Deriving operational software specifications from system goals, ACM SIGSOFT Software Engineering Notes, 27:6, (119-128), Online publication date: 1-Nov-2002.
  181. ACM
    Letier E and van Lamsweerde A Agent-based tactics for goal-oriented requirements elaboration Proceedings of the 24th International Conference on Software Engineering, (83-93)
  182. Noble J, Biddle R and Tempero E (2002). Metaphor and metonymy in object-oriented design patterns, Australian Computer Science Communications, 24:1, (187-195), Online publication date: 1-Jan-2002.
  183. Noble J, Biddle R and Tempero E Metaphor and metonymy in object-oriented design patterns Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4, (187-195)
  184. Shaw M The coming-of-age of software architecture research Proceedings of the 23rd International Conference on Software Engineering
Contributors
  • The Open University

Recommendations