skip to main content
Skip header Section
Requirements Engineering: Processes and TechniquesSeptember 1998
Publisher:
  • Wiley Publishing
ISBN:978-0-471-97208-2
Published:16 September 1998
Pages:
294
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Requirements Engineering Processes and Techniques Why this book was written The value of introducing requirements engineering to trainee software engineers is to equip them for the real world of software and systems development. What is involved in Requirements Engineering? As a discipline, newly emerging from software engineering, there are a range of views on where requirements engineering starts and finishes and what it should encompass. This book offers the most comprehensive coverage of the requirements engineering process to date - from initial requirements elicitation through to requirements validation. How and Which methods and techniques should you use? As there is no one catch-all technique applicable to all types of system, requirements engineers need to know about a range of different techniques. Tried and tested techniques such as data-flow and object-oriented models are covered as well as some promising new ones. They are all based on real systems descriptions to demonstrate the applicability of the approach. Who should read it? Principally written for senior undergraduate and graduate students studying computer science, software engineering or systems engineering, this text will also be helpful for those in industry new to requirements engineering. Accompanying Website: http: //www.comp.lancs.ac.uk/computing/resources/re Visit our Website: http://www.wiley.com/college/wws

Cited By

  1. Sadovykh A, Said B, Truscan D and Bruneliere H (2024). An iterative approach for model-based requirements engineering in large collaborative projects, Science of Computer Programming, 232:C, Online publication date: 1-Jan-2024.
  2. ACM
    Vilela J and Silva C An Experience Report on the use of Problem-based learning and Design Thinking in a Requirements Engineering Postgraduate Course Proceedings of the XXXVII Brazilian Symposium on Software Engineering, (432-441)
  3. Kemell K, Nguyen-Duc A, Suoranta M and Abrahamsson P (2023). StartCards — A method for early-stage software startups, Information and Software Technology, 160:C, Online publication date: 1-Aug-2023.
  4. Mahaju S, Carver J and Bradshaw G (2023). Human error management in requirements engineering, Information and Software Technology, 160:C, Online publication date: 1-Aug-2023.
  5. ACM
    Huber F, Eigler T, Hagel G and Wolff C From Difficulties to Functional Requirements - Deriving Requirements from Literature about Tool-supported Teaching of UML Diagrams in Software Engineering Education Proceedings of the 5th European Conference on Software Engineering Education, (184-188)
  6. Pacheco C, Garcia I, Calvo-Manzano J and Reyes M (2023). Measuring and improving software requirements elicitation in a small-sized software organization: a lightweight implementation of ISO/IEC/IEEE 15939:2017—systems and software engineering—measurement process, Requirements Engineering, 28:2, (257-281), Online publication date: 1-Jun-2023.
  7. ACM
    Nasir S, Guerra E, Zaina L and Melegati J An Exploratory Study About Non-functional Requirements Documentation Practices in Agile Teams Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, (1009-1017)
  8. ACM
    Krasniqi R and Do H Automatically Capturing Quality-Related Concerns in Bug Report Descriptions for Efficient Bug Triaging Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering, (10-19)
  9. ACM
    kaneshige Y, Satake S, Kanda T and Imai M How to Overcome the Difficulties in Programming and Debugging Mobile Social Robots? Proceedings of the 2021 ACM/IEEE International Conference on Human-Robot Interaction, (361-369)
  10. ACM
    Albuquerque D, Guimaraes E, Perkusich M, Costa A, Dantas E, Ramos F and Almeida H Defining agile requirements change management Proceedings of the 35th Annual ACM Symposium on Applied Computing, (1421-1424)
  11. Vilela J, Castro J, Martins L and Gorschek T (2020). Safety Practices in Requirements Engineering: The Uni-REPM Safety Module, IEEE Transactions on Software Engineering, 46:3, (222-250), Online publication date: 1-Mar-2020.
  12. Levy M, Hadar I and Aviv I (2019). A requirements engineering methodology for knowledge management solutions: integrating technical and social aspects, Requirements Engineering, 24:4, (503-521), Online publication date: 1-Dec-2019.
  13. ACM
    Sousa A, Uchôa A, Fernandes E, Bezerra C, Monteiro J and Andrade R REM4DSPL Proceedings of the XVIII Brazilian Symposium on Software Quality, (129-138)
  14. Chituc C, Herrmann M, Schiffner D and Rittberger M Towards the Design and Deployment of an Item Bank: An Analysis of the Requirements Elicited Advances in Web-Based Learning – ICWL 2019, (155-162)
  15. Sturdee M, Everitt A, Lindley J, Coulton P and Alexander J Visual Methods for the Design of Shape-Changing Interfaces Human-Computer Interaction – INTERACT 2019, (337-358)
  16. Melegati J, Wang X and Abrahamsson P Hypotheses engineering Proceedings of the Joint 4th International Workshop on Rapid Continuous Software Engineering and 1st International Workshop on Data-Driven Decisions, Experimentation and Evolution, (16-19)
  17. Jantunen S, Dumdum R and Gause D Towards new requirements engineering competencies Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, (131-134)
  18. ACM
    Anwer S, Wen L and Wang Z A Systematic Approach for Identifying Requirement Change Management Challenges Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering, (230-235)
  19. ACM
    Masin M, Palumbo F, Adriaanse J, Myrhaug H, Regazzoni F, Sanchez M and Zedda K Elicitation of technical requirements in large research projects Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (1629-1632)
  20. ACM
    Rein P Reading logic as code or as natural language text Companion Proceedings of the 3rd International Conference on the Art, Science, and Engineering of Programming, (1-3)
  21. (2019). A road map for digital forensics research, International Journal of Electronic Security and Digital Forensics, 11:2, (194-224), Online publication date: 1-Jan-2019.
  22. Jayatilleke S, Lai R and Reed K (2018). A method of requirements change analysis, Requirements Engineering, 23:4, (493-508), Online publication date: 1-Nov-2018.
  23. Canedo E and Parente da Costa R The Use of Design Thinking in Agile Software Requirements Survey: A Case Study Design, User Experience, and Usability: Theory and Practice, (642-657)
  24. Bevan N, Carter J, Earthy J, Geis T and Harker S What Are User Requirements? Developing an ISO Standard Human-Computer Interaction. Theories, Methods, and Human Issues, (3-13)
  25. ACM
    Tiwari S, Ameta D, Singh P and Sureka A Teaching requirements engineering concepts using case-based learning Proceedings of the 2nd International Workshop on Software Engineering Education for Millennials, (8-15)
  26. ACM
    Penzenstadler B, Betz S, Venters C, Chitchyan R, Porras J, Seyff N, Duboc L and Becker C Everything is INTERRELATED Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training, (153-162)
  27. ACM
    Fhang M and Tong W Why a Good Process Fail? Proceedings of the 2018 7th International Conference on Software and Computer Applications, (40-45)
  28. (Weber) Dupree J, Lank E and Berry D (2018). A case study of using grounded analysis as a requirement engineering method, Science of Computer Programming, 152:C, (1-37), Online publication date: 15-Jan-2018.
  29. Jayatilleke S and Lai R (2018). A systematic review of requirements change management, Information and Software Technology, 93:C, (163-185), Online publication date: 1-Jan-2018.
  30. Daneva M (2017). Striving for balance, Journal of Systems and Software, 134:C, (54-75), Online publication date: 1-Dec-2017.
  31. Sutcliffe A Conflict, Costs and Trade-Offs in User Interface Design Global Thoughts, Local Designs, (71-82)
  32. ACM
    Pivatelli J and do Prado Leite J The clash between requirements volatility and software contracts Proceedings of the XXXI Brazilian Symposium on Software Engineering, (144-153)
  33. ACM
    Aaramaa S, Dasanayake S, Oivo M, Markkula J and Saukkonen S Requirements volatility in software architecture design: an exploratory case study Proceedings of the 2017 International Conference on Software and System Process, (40-49)
  34. Tolmer C (2017). Improving the Use of BIM Using System Engineering for Infrastructure Projects, International Journal of 3-D Information Modeling, 6:3, (17-32), Online publication date: 1-Jul-2017.
  35. Venters C, Seyff N, Becker C, Betz S, Chitchyan R, Duboc L, McIntyre D and Penzenstadler B Characterising sustainability requirements Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track, (3-12)
  36. ACM
    Hermans F and Aldewereld M Programming is Writing is Programming Companion Proceedings of the 1st International Conference on the Art, Science, and Engineering of Programming, (1-8)
  37. Alenljung B, Lindblom J, Andreasson R and Ziemke T (2017). User Experience in Social Human-Robot Interaction, International Journal of Ambient Computing and Intelligence, 8:2, (12-31), Online publication date: 1-Apr-2017.
  38. Ryan M and Wheatcraft L (2017). On a Cohesive Set of Requirements Engineering Terms, Systems Engineering, 20:2, (118-130), Online publication date: 1-Mar-2017.
  39. ACM
    Basri S, Kama N, Haneem F and Ismail S Predicting effort for requirement changes during software development Proceedings of the 7th Symposium on Information and Communication Technology, (380-387)
  40. ACM
    Manikyam R, McDonald J, Mahoney W, Andel T and Russ S Comparing the effectiveness of commercial obfuscators against MATE attacks Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, (1-11)
  41. ACM
    Delatorre P and Salguero A Training to capture software requirements by role playing Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, (811-818)
  42. Dermeval D, Vilela J, Bittencourt I, Castro J, Isotani S, Brito P and Silva A (2016). Applications of ontologies in requirements engineering, Requirements Engineering, 21:4, (405-437), Online publication date: 1-Nov-2016.
  43. ACM
    Burnay C (2016). Are Stakeholders the Only Source of Information for Requirements Engineers? Toward a Taxonomy of Elicitation Information Sources, ACM Transactions on Management Information Systems, 7:3, (1-29), Online publication date: 18-Oct-2016.
  44. Mahmoud A and Williams G (2016). Detecting, classifying, and tracing non-functional software requirements, Requirements Engineering, 21:3, (357-381), Online publication date: 1-Sep-2016.
  45. Wheatcraft L, Ryan M and Dick J (2016). On the Use of Attributes to Manage Requirements, Systems Engineering, 19:5, (448-458), Online publication date: 1-Sep-2016.
  46. ACM
    Vilela J, Goncalves E, Holanda A, Castro J and Figueiredo B (2016). A retrospective analysis of SAC requirements, ACM SIGAPP Applied Computing Review, 16:2, (26-41), Online publication date: 29-Aug-2016.
  47. Ramachandran M (2016). Software security requirements management as an emerging cloud computing service, International Journal of Information Management: The Journal for Information Professionals, 36:4, (580-590), Online publication date: 1-Aug-2016.
  48. Tehrani S, Zschaler S and Lano K Requirements Engineering in Model-Transformation Development Proceedings of the 9th International Conference on Theory and Practice of Model Transformations - Volume 9765, (123-137)
  49. Trindade G and Lucena M Requirements Traceability in Agile Methodologies: A Exploratory Survey Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (478-485)
  50. ACM
    Avery D, Dam H, Savarimuthu B and Ghose A Externalization of software behavior by the mining of norms Proceedings of the 13th International Conference on Mining Software Repositories, (223-234)
  51. ACM
    Misra J, Sengupta S and Podder S Topic cohesion preserving requirements clustering Proceedings of the 5th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, (22-28)
  52. ACM
    Noorwali I, Arruda D and Madhavji N Understanding quality requirements in the context of big data systems Proceedings of the 2nd International Workshop on BIG Data Software Engineering, (76-79)
  53. ACM
    Vilela J, Gonçalves E, Holanda A, Figueiredo B and Castro J Retrospective, relevance, and trends of SAC requirements engineering track Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1264-1269)
  54. Becker J, Delfmann P, Dietrich H, Steinhorst M and Eggert M (2016). Business process compliance checking --- applying and evaluating a generic pattern matching approach for conceptual models in the financial sector, Information Systems Frontiers, 18:2, (359-405), Online publication date: 1-Apr-2016.
  55. Carrillo de Gea J, Nicolás J, Fernández Alemán J, Toval A, Ouhbi S and Idri A (2016). Co-located and distributed natural-language requirements specification, Journal of Software: Evolution and Process, 28:3, (205-227), Online publication date: 1-Mar-2016.
  56. Pernstål J, Gorschek T, Feldt R and Florén D (2015). Requirements communication and balancing in large-scale software-intensive product development, Information and Software Technology, 67:C, (44-64), Online publication date: 1-Nov-2015.
  57. ACM
    Abu-Salma R, Sasse M, Bonneau J and Smith M POSTER Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1623-1625)
  58. ACM
    Bhowmik T, Niu N, Singhania P and Wang W (2015). On the Role of Structural Holes in Requirements Identification, ACM Transactions on Management Information Systems, 6:3, (1-30), Online publication date: 1-Oct-2015.
  59. Nguyen T, Grundy J and Almorsy M Integrating goal-oriented and use case-based requirements engineering Proceedings of the 18th International Conference on Model Driven Engineering Languages and Systems, (328-337)
  60. Plachkinova M, Peffers K and Moody G Communication Artifacts for Requirements Engineering Proceedings of the 10th International Conference on New Horizons in Design Science: Broadening the Research Agenda - Volume 9073, (104-118)
  61. Peña M and Valerdi R (2015). Characterizing the Impact of Requirements Volatility on Systems Engineering Effort, Systems Engineering, 18:1, (59-70), Online publication date: 1-Jan-2015.
  62. ACM
    Kaur N and Kaur P (2014). Mitigation of SQL Injection Attacks using Threat Modeling, ACM SIGSOFT Software Engineering Notes, 39:6, (1-6), Online publication date: 9-Dec-2014.
  63. Flüchter K and Wortmann F Implementing the connected e-bike Proceedings of the First International Conference on IoT in Urban Space, (7-12)
  64. ACM
    de O. Souza R, de Oliveira A and do Nascimento R ModelER Proceedings of the 7th Euro American Conference on Telematics and Information Systems, (1-7)
  65. Nakatani T and Tsumaki T Predicting requirements changes by focusing on the social relations Proceedings of the Tenth Asia-Pacific Conference on Conceptual Modelling - Volume 154, (65-70)
  66. ACM
    Rahman A Requirements engineering approach for real-time and embedded systems Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, (1-5)
  67. Shuhud M, Richter A and Ahmad A Supporting Requirements Elicitation Practices Proceedings of the 19th International Conference on Collaboration and Technology - Volume 8224, (306-321)
  68. Baca D and Petersen K (2013). Countermeasure graphs for software security risk assessment, Journal of Systems and Software, 86:9, (2411-2428), Online publication date: 1-Sep-2013.
  69. Pitangueira A, Maciel R, Oliveira Barros M and Andrade A A Systematic Review of Software Requirements Selection and Prioritization Using SBSE Approaches Proceedings of the 5th International Symposium on Search Based Software Engineering - Volume 8084, (188-208)
  70. Terawaki Y Framework for quantitatively evaluating the quality requirements of software system Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction design - Volume Part I, (383-392)
  71. Callele D, Wnuk K and Borg M Confounding factors when conducting industrial replications in requirements engineering Proceedings of the 1st International Workshop on Conducting Empirical Studies in Industry, (55-58)
  72. Herrmann A Requirements engineering in practice Proceedings of the 19th international conference on Requirements Engineering: Foundation for Software Quality, (347-361)
  73. Noorwali I and Madhavji N Maps of lessons learnt in requirements engineering Proceedings of the 19th international conference on Requirements Engineering: Foundation for Software Quality, (119-124)
  74. ACM
    Buarque A, Castro J and Alencar F The role of NFRs when transforming i* requirements models into OO-method models Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1305-1306)
  75. Sakamoto S, da Silva L and de Miranda L Identificando barreiras de acessibilidade web em dispositivos móveis Proceedings of the 11th Brazilian Symposium on Human Factors in Computing Systems, (23-32)
  76. ACM
    Macasaet R, Noguera M, Rodríguez M, Garrido J, Supakkul S and Chung L Micro-business behavior patterns associated with components in a requirements approach Proceedings of the Second Edition of the International Workshop on Experiences and Empirical Studies in Software Modelling, (1-6)
  77. dos Santos Soares M and Cioquetta D Analysis of techniques for documenting user requirements Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV, (16-28)
  78. Danylenko A and Löwe W Context-aware recommender systems for non-functional requirements Proceedings of the Third International Workshop on Recommendation Systems for Software Engineering, (80-84)
  79. Mohebzada J, Ruhe G and Eberlein A Systematic mapping of recommendation systems for requirements engineering Proceedings of the International Conference on Software and System Process, (200-209)
  80. ACM
    Corral-García J, Cortés-Polo D, Gómez-Martín C and González-Sánchez J Methodology and framework for the development of scientific applications with high-performance computing through web services Proceedings of the 6th Euro American Conference on Telematics and Information Systems, (173-180)
  81. Hussain R, Lockett H and Annamalai Vasantha G (2012). A framework to inform PSS Conceptual Design by using system-in-use data, Computers in Industry, 63:4, (319-327), Online publication date: 1-May-2012.
  82. Broy M, Cengarle M and Geisberger E Cyber-physical systems Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management, (1-28)
  83. Wang J, Li J, Wang Q, Zhang H and Wang H A simulation approach for impact analysis of requirement volatility considering dependency change Proceedings of the 18th international conference on Requirements Engineering: foundation for software quality, (59-76)
  84. ACM
    Kumari P and Pretschner A Deriving implementation-level policies for usage control enforcement Proceedings of the second ACM conference on Data and Application Security and Privacy, (83-94)
  85. Ghazarian A A formal scheme for systematic translation of software requirements to source code Proceedings of the 13th IASME/WSEAS international conference on Mathematical Methods and Computational Techniques in Electrical Engineering conference on Applied Computing, (44-49)
  86. ACM
    Kumar R, Khatter K and Kalia A (2011). Measuring software reliability, ACM SIGSOFT Software Engineering Notes, 36:6, (1-6), Online publication date: 14-Nov-2011.
  87. Del Sagrado J, Del Águila I and Orellana F Architecture for the use of synergies between knowledge engineering and requirements engineering Proceedings of the 14th international conference on Advances in artificial intelligence: spanish association for artificial intelligence, (213-222)
  88. ACM
    Rahman S Credibility in TV news Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, (291-294)
  89. Bonifacio G, Marmo P, Orazzo A, Petrone I, Velardi L and Venticinque A Improvement of processes and methods in testing activities for safety-critical embedded systems Proceedings of the 30th international conference on Computer safety, reliability, and security, (369-382)
  90. ACM
    Lochmann K and Goeb A A unifying model for software quality Proceedings of the 8th international workshop on Software quality, (3-10)
  91. ACM
    Abdullah N, Honiden S, Sharp H, Nuseibeh B and Notkin D Communication patterns of agile requirements engineering Proceedings of the 1st Workshop on Agile Requirements Engineering, (1-4)
  92. Terawaki Y Supporting of requirements elicitation for ensuring services of information systems used for education Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I, (58-65)
  93. ACM
    Macasaet R, Chung L, Garrido J, Noguera M and Rodríguez M An agile requirements elicitation approach based on NFRs and business process models for micro-businesses Proceedings of the 12th International Conference on Product Focused Software Development and Process Improvement, (50-56)
  94. Farfeleder S, Moser T, Krall A, Stålhane T, Omoronyia I and Zojer H Ontology-driven guidance for requirements elicitation Proceedings of the 8th extended semantic web conference on The semanic web: research and applications - Volume Part II, (212-226)
  95. ACM
    Varela P, Araújo J, Brito I and Moreira A Aspect-oriented analysis for software product lines requirements engineering Proceedings of the 2011 ACM Symposium on Applied Computing, (667-674)
  96. ACM
    Mohan S and Chenoweth S Teaching requirements engineering to undergraduate students Proceedings of the 42nd ACM technical symposium on Computer science education, (141-146)
  97. Kaariainen J and Valimaki A (2011). Get a grip on your distributed software development with application lifecycle management, International Journal of Computer Applications in Technology, 40:3, (181-190), Online publication date: 1-Mar-2011.
  98. Wind S and Schrödl H Requirements engineering for cloud computing Proceedings of the 2010 international conference on Web information systems engineering, (404-415)
  99. Bartolini C, Breitman K, Barbosa S, Salle M, Berardi R, Campos G and Eidt E Understanding IT organizations Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I, (488-501)
  100. ACM
    Kumar K and Prabhakar T Pattern-oriented knowledge model for architecture design Proceedings of the 17th Conference on Pattern Languages of Programs, (1-21)
  101. Onarheim B and Wiltschnig S Opening and constraining Proceedings of the 1st DESIRE Network Conference on Creativity and Innovation in Design, (83-89)
  102. ACM
    Zhang Y, Alba E, Durillo J, Eldh S and Harman M Today/future importance analysis Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1357-1364)
  103. ACM
    Yrjönen A and Merilinna J Tooling for the full traceability of non-functional requirements within model-driven development Proceedings of the 6th ECMFA Traceability Workshop, (15-22)
  104. Stock D, Wortmann F and Mayer J Use cases for business metadata – a viewpoint-based approach to structuring and prioritizing business needs Proceedings of the 5th international conference on Global Perspectives on Design Science Research, (546-549)
  105. Zickert F and Beck R Assessing project effort in requirements engineering Proceedings of the 5th international conference on Global Perspectives on Design Science Research, (490-505)
  106. Cleven A, Wortmann F and Winter R Process performance management – identifying stereotype problem situations as a basis for effective and efficient design research Proceedings of the 5th international conference on Global Perspectives on Design Science Research, (302-316)
  107. ACM
    Seyff N, Graf F and Maiden N End-user requirements blogging with iRequire Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, (285-288)
  108. ACM
    Kumar K and Prabhakar T Design decision topology model for pattern relationship analysis Proceedings of the 1st Asian Conference on Pattern Languages of Programs, (1-9)
  109. Simonette M, Sanches F and Spina E Beyond human factors Proceedings of the 3rd International Conference on Communications and information technology, (240-244)
  110. Ferreira S, Collofello J, Shunk D and Mackulak G (2009). Understanding the effects of requirements volatility in software engineering by using analytical modeling and software process simulation, Journal of Systems and Software, 82:10, (1568-1577), Online publication date: 1-Oct-2009.
  111. Gallardo J, Giacaman G, Meneses C and Marbán Ó Framework for decisional business modeling and requirements modeling in data mining projects Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (268-275)
  112. Machado R, Borges M and Gomes J Supporting the System Requirements Elicitation through Collaborative Observations Groupware: Design, Implementation, and Use, (364-379)
  113. Hashim K and Khairuddin N A framework for software requirements engineering Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems, (117-120)
  114. Shaban-Nejad A, Ormandjieva O, Kassab M and Haarslev V (2009). Managing requirement volatility in an ontology-driven clinical LIMS using category theory, International Journal of Telemedicine and Applications, 2009, (1-14), Online publication date: 1-Jan-2009.
  115. ACM
    Janssen M and Feenstra R Socio-technical design of service compositions Proceedings of the 2nd international conference on Theory and practice of electronic governance, (323-330)
  116. ACM
    Khan Z, Odeh M, Solomonides T and Oquendo F The BPMSOA Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, (232-239)
  117. Ghazarian A Traceability patterns Proceedings of the 8th conference on Applied computer scince, (236-241)
  118. Rosemberg C, Schilling A, Bastos C and Araripe R Prototipação de software e design participativo Proceedings of the VIII Brazilian Symposium on Human Factors in Computing Systems, (312-315)
  119. Holland D Using Data Mining to Build Integrated Discrete Event Simulations Proceedings of the 8th industrial conference on Advances in Data Mining: Medical Applications, E-Commerce, Marketing, and Theoretical Aspects, (323-329)
  120. Tran Q and Low G (2008). MOBMAS, Information and Software Technology, 50:7-8, (697-722), Online publication date: 1-Jun-2008.
  121. Pavlovski C and Zou J Non-functional requirements in business process modeling Proceedings of the fifth Asia-Pacific conference on Conceptual Modelling - Volume 79, (103-112)
  122. Galster M, Eberlein A and Moussavi M Atomic requirements for software architecting Proceedings of the 11th IASTED International Conference on Software Engineering and Applications, (143-148)
  123. Ang A Improving the quality of knowledge representation for requirements engineering through natural language requirements patterns Proceedings of the 11th IASTED International Conference on Software Engineering and Applications, (102-107)
  124. Aburub F, Odeh M and Beeson I (2007). Modelling non-functional requirements of business processes, Information and Software Technology, 49:11-12, (1162-1171), Online publication date: 1-Nov-2007.
  125. Ahn S and Chong K Requirements change management on feature-oriented requirements tracing Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II, (296-307)
  126. Pacheco C and Tovar E Stakeholder identification as an issue in the improvement of software requirements quality Proceedings of the 19th international conference on Advanced information systems engineering, (370-380)
  127. Kamthan P (2007). Towards a systematic approach for the credibility of humancentric web applications, Journal of Web Engineering, 6:2, (99-120), Online publication date: 1-Jun-2007.
  128. ACM
    Ahmed T and Tripathi A (2007). Specification and verification of security requirements in a programming model for decentralized CSCW systems, ACM Transactions on Information and System Security, 10:2, (7-es), Online publication date: 1-May-2007.
  129. Ang A and Hartley M Object oriented knowledge representation framework for requirements engineering Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology, (477-482)
  130. Corriveau J Testable requirements for offshore outsourcing Proceedings of the 1st international conference on Software engineering approaches for offshore and outsourced development, (27-43)
  131. Guo Y, Qasem A, Pan Z and Heflin J (2007). A Requirements Driven Framework for Benchmarking Semantic Web Knowledge Base Systems, IEEE Transactions on Knowledge and Data Engineering, 19:2, (297-309), Online publication date: 1-Feb-2007.
  132. ACM
    Berander P and Jönsson P A goal question metric based approach for efficient measurement framework definition Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering, (316-325)
  133. ACM
    Berntsson-Svensson R and Aurum A Successful software project and products Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering, (144-153)
  134. Bhat J, Gupta M and Murthy S (2006). Overcoming Requirements Engineering Challenges, IEEE Software, 23:5, (38-44), Online publication date: 1-Sep-2006.
  135. Frederiks P and van der Weide T (2006). Information modeling, Data & Knowledge Engineering, 58:1, (4-20), Online publication date: 1-Jul-2006.
  136. Chamberlain S, Sharp H and Maiden N Towards a framework for integrating agile development and user-centred design Proceedings of the 7th international conference on Extreme Programming and Agile Processes in Software Engineering, (143-153)
  137. ACM
    Mutchalintungkul A, Oonhawat J, Pholpipatanaphong K, Sutivong D and Prompoon N Experience from applying RIM to educational ERP development Proceedings of the 28th international conference on Software engineering, (620-623)
  138. ACM
    Haley C, Moffett J, Laney R and Nuseibeh B A framework for security requirements engineering Proceedings of the 2006 international workshop on Software engineering for secure systems, (35-42)
  139. Mellado D, Fernández-Medina E and Piattini M A comparative study of proposals for establishing security requirements for the development of secure information systems Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (1044-1053)
  140. ACM
    Ranjan P and Misra A (2006). A hybrid model for agent based system requirements analysis, ACM SIGSOFT Software Engineering Notes, 31:3, (1-7), Online publication date: 1-May-2006.
  141. ACM
    Sharp H, Biddle R, Gray P, Miller L and Patton J Agile development CHI '06 Extended Abstracts on Human Factors in Computing Systems, (32-35)
  142. Chan Z and Paige R Designing a domain-specific contract language Proceedings of the First European conference on Model Driven Architecture: foundations and Applications, (175-189)
  143. Sivertsen T, Fredriksen R, Thunem A, Holmberg J, Valkonen J, Ventä O and Andersson J The TACO approach for traceability and communication of requirements Proceedings of the 24th international conference on Computer Safety, Reliability, and Security, (317-329)
  144. Bosse T, Jonker C and Treur J Requirements analysis of an agent’s reasoning capability Proceedings of the 7th international conference on Agent-Oriented Information Systems III, (48-63)
  145. Moon M, Yeom K and Seok Chae H (2005). An Approach to Developing Domain Requirements as a Core Asset Based on Commonality and Variability Analysis in a Product Line, IEEE Transactions on Software Engineering, 31:7, (551-569), Online publication date: 1-Jul-2005.
  146. Popova V and Treur J A specification language for organisational performance indicators Proceedings of the 18th international conference on Innovations in Applied Artificial Intelligence, (667-677)
  147. Cortesi A and Logozzo F Abstract interpretation-based verification of non-functional requirements Proceedings of the 7th international conference on Coordination Models and Languages, (49-62)
  148. Rindebäck C and Gustavsson R Why trust is hard – challenges in e-mediated services Trusting Agents for Trusting Electronic Societies, (180-199)
  149. Kim H and Sheldon F (2004). Testing Software Requirements with Z and Statecharts Applied to an Embedded Control Systemt0t1, Software Quality Journal, 12:3, (231-264), Online publication date: 1-Sep-2004.
  150. ACM
    Hoorn J, van Dam S, Fambach G, van Nieuwland A and van der Veer G Looking for win/win solutions between lab-work and hands-on experience in IT research Proceedings of the conference on Dutch directions in HCI
  151. Andrade J, Ares J, García R, Pazos J, Rodríguez S and Silva A (2004). A Methodological Framework for Viewpoint-Oriented Conceptual Modeling, IEEE Transactions on Software Engineering, 30:5, (282-294), Online publication date: 1-May-2004.
  152. ACM
    Lee S and Rine D Missing requirements and relationship discovery through proxy viewpoints model Proceedings of the 2004 ACM symposium on Applied computing, (1513-1518)
  153. Damian D, Zowghi D, Vaidyanathasamy L and Pal Y (2004). An Industrial Case Study of Immediate Benefits of Requirements Engineering Process Improvement at the Australian Center for Unisys Software, Empirical Software Engineering, 9:1-2, (45-75), Online publication date: 1-Mar-2004.
  154. Richards D (2003). Merging individual conceptual models of requirements, Requirements Engineering, 8:4, (195-205), Online publication date: 1-Nov-2003.
  155. van Lamsweerde A Goal-oriented requirements engineering Proceedings of the 25th International Conference on Software Engineering, (744-745)
  156. Stierna E and Rowe N (2003). Applying information-retrieval methods to software reuse, Information Processing and Management: an International Journal, 39:1, (67-74), Online publication date: 1-Jan-2003.
  157. Sindre G, Opdahl A and Brevik G Generalization/specialization as a structuring mechanism for misuse cases Proceedings of the 3rd Symposium on Requirements Engineering for Information Security, (1-16)
  158. ACM
    Svahnberg M, Wohlin C, Lundberg L and Mattsson M A method for understanding quality attributes in software architecture structures Proceedings of the 14th international conference on Software engineering and knowledge engineering, (819-826)
  159. ACM
    Neumann G and Strembeck M A scenario-driven role engineering process for functional RBAC roles Proceedings of the seventh ACM symposium on Access control models and technologies, (33-42)
  160. ACM
    Wong Y Use of software inspection inputs in practice Proceedings of the 24th International Conference on Software Engineering, (725-726)
  161. Brazier F, Jonker C and Treur J (2002). Principles of component-based design of intelligent agents, Data & Knowledge Engineering, 41:1, (1-27), Online publication date: 1-Apr-2002.
  162. ACM
    Lee S Proxy Viewpoints Model-based Requirements engineering Proceedings of the 2002 ACM symposium on Applied computing, (1004-1008)
  163. O'Neal J Analyzing the Impact of Changing Requirements Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
  164. ACM
    Jonker C, Treur J and de Vries W External attribution of intentional notions to explain and predict agent behaviour Proceedings of the fifth international conference on Autonomous agents, (41-42)
  165. ACM
    Rosa N, Justo G and Cunha P A framework for building non-functional software architectures Proceedings of the 2001 ACM symposium on Applied computing, (141-147)
  166. Britton C and Jones S (2018). The untrained eye, Human-Computer Interaction, 14:1, (191-244), Online publication date: 1-Mar-1999.
  167. Dawson L and Swatman P The use of object-oriented models in requirements engineering Proceedings of the 20th international conference on Information Systems, (260-273)
Contributors
  • University of St Andrews
  • University of St Andrews

Recommendations