Keynote | |
Keynote Talk Piecing Together the Requirements Jigsaw-Puzzle | p. 1 |
Decision-Making in Requirements Engineering | |
Understanding the Scope of Uncertainty in Dynamically Adaptive Systems | p. 2 |
Use of Personal Values in Requirements Engineering - A Research Preview | p. 17 |
Requirements and Systems Architecture Interaction in a Prototypical Project: Emerging Results | p. 23 |
Scanarious and Elicitation | |
Videos vs. Use Cases: Can Videos Capture More Requirements under Time Pressure | p. 30 |
Supporting the Consistent Specification of Scenarios across Multiple Abstraction Levels | p. 45 |
Product Families I | |
Requirements Value Chains: Stakeholder Management and Requirements Engineering in Software Ecosystems | p. 60 |
Binary Priority List for Prioritizing Software Requirements | p. 67 |
Requirements Patterns | |
Towards a Framework for Specifying Software Robustness Requirements Based on Patterns | p. 79 |
A Metamodel for Software Requirement Patterns | p. 85 |
Validation of the Effectiveness of an Optimized EPMcreate as an Aid for Creative Requirements Elicitation | p. 91 |
Product Families II | |
Towards Multi-view Feature-Based Configuration | p. 106 |
Evaluation of a Method for Proactively Managing the Evolving Scope of a Software Product Line | p. 113 |
Requirements Engineering in Practice | |
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context | p. 128 |
On the Perception of Software Quality Requirements during the Project Lifecycle | p. 143 |
Lessons Learned from Integrating Specification Templates, Collaborative Workshops, and Peer Reviews | p. 158 |
A Case Study on Tool-Supported Multi-level Requirements Management in Complex Product Families | p. 173 |
Natural Language | |
A Domain Ontology Building Process for Guiding Requirements Elicitation | p. 188 |
Tackling Semi-automatic Trace Recovery for Large Specifications | p. 203 |
Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources | p. 218 |
Ambiguity in Natural Language Software Requirements: A Case Study | p. 233 |
Security Requirements | |
On the Role of Ambiguity in RE | p. 248 |
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations | p. 255 |
Visualizing Cyber Attacks with Misuse Case Maps | p. 262 |
Poster | |
How Do Software Architects consider Non-Functional Requirements: A Survey | p. 276 |
Author Index | p. 279 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.