A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Rich-Media Scenarios for Discovering Requirements
2005
IEEE Software
Previous uses of rich media in requirements engineering The last 10 years have seen sporadic use of Rich-Media Scenarios for Discovering Requirements W alking through scenarios is an effective technique ...
Eurocontrol applied ART-SCENE to generate and walk through 10 scenarios to discover requirements for CORA-2, a conflict resolution system. ...
His research interests include requirements engineering and scenario-driven approaches to software development. He received his PhD in computer science from City University. ...
doi:10.1109/ms.2005.134
fatcat:65qkzgrkfngrphbq54psvrwlte
A Method for Extracting and Stating Software Requirements that a User Interface Prototype Contains
2000
Requirements Engineering
A user interface and requirements prototype is built during the requirements engineering phase of a software system development. ...
This paper presents an approach for avoiding this difficulty. It demonstrates the approach by showing its application to parts of a real software development. ...
Ephi Pinski from the Missile Division Electro Optical department at Rafael, who made it possible to publish the work done for the TSG project. ...
doi:10.1007/pl00010352
fatcat:gxd3oj2tqbgs5dth5lv6li7fyu
Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment
2007
15th IEEE International Requirements Engineering Conference (RE 2007)
We elaborate on methodological support to discover an exhaustive set of applicable certification requirements in a given operational scenario of the target software system. ...
In this paper we outline our approach to discover and understand multi-dimensional correlations among regulatory security certification requirements in the context of a complex software system. ...
To this end, for a given scenario of the target system, our approach is to discover an exhaustive set of applicable security C&A requirements and construct a model of potential correlations among them. ...
doi:10.1109/re.2007.46
dblp:conf/re/GandhiL07
fatcat:ey3jfzjwjvhmvah7ksumgghyl4
Guiding goal modeling using scenarios
1998
IEEE Transactions on Software Engineering
Whereas existing techniques use scenarios to concretize goals, we use them to discover goals. ...
Even though goal modeling is an effective approach to requirements engineering, it is known to present a number of difficulties in practice. ...
CREWS stands for Cooperative Requirements Engineering with Scenarios. ...
doi:10.1109/32.738339
fatcat:k7bw4zsndndgpcdxccctucfkha
Determining Stakeholder Needs in the Workplace: How Mobile Technologies Can Help
2007
IEEE Software
The authors thank Rick Rabiser and Andreas Ströbitzer for their contributions to the development of the MSP. ...
Acknowledgments This research was funded in part by a grant from the British Council, the UK EPSRC's GRN10707 SIMP project, and the Christian Doppler Laboratory for Automated Software Engineering at Johannes ...
4 In another study, we used the MSP to discover requirements for a London bus stop information system. ...
doi:10.1109/ms.2007.40
fatcat:ej7662j6p5badnzn4qisobyqii
Exploring how to use scenarios to discover requirements
2009
Requirements Engineering
Results revealed both qualitative and quantitative differences in discovered requirements that have potential implications for models of scenario-based requirements discovery and the design of scenario ...
The first specified requirements on a new aircraft management system at a regional UK airport to reduce its environmental impact. ...
engineers, systems developers and consultants working for chambers of commerce in Germany. ...
doi:10.1007/s00766-009-0077-9
fatcat:jd4yskkxuvdrjiuszifzxsppjm
Mission Analysis of Sample Return from Jovian Trojan Asteroid by Solar Power Sail
2014
TRANSACTIONS OF THE JAPAN SOCIETY FOR AERONAUTICAL AND SPACE SCIENCES AEROSPACE TECHNOLOGY JAPAN
In this weight, fuel for trajectory and attitude control, sampling mechanism, re-entry capsule, and other systems required to return to the Earth are included. ...
Three scenarios for sampling are proposed; sampling with a 3000 m 2 solar power sail, with a detachable small solar power sail using electric propulsion systems and with a small probe using chemical propulsion ...
The required V is 9.33 km/s and the required fuel is 191 kg (Table 4 ). This trajectory designed is used for an estimation of the required fuel for attitude control later. ...
doi:10.2322/tastj.12.pk_43
fatcat:s2xsr27dzfevdkjohb2mwx6smy
Using a Residential Environment Domain Ontology for Discovering and Integrating Smart Objects in Complex Scenarios
2014
Procedia Computer Science
In order to meet this requirement, we propose a domain ontology to discover, search, use and share information and services of residential environment devices. ...
These devices and their associated services, however, cannot be easily integrated to create new composite applications, such as controlling different home devices for saving energy or enhancing user comfort ...
virtual one and (2) a generic process language to control such environment which allows for describing different scenarios using a precise vocabulary without having to program intricacies such as services ...
doi:10.1016/j.procs.2014.05.524
fatcat:mnzpnsdrnbaghc4w2ael2l5psy
Introduction to systems engineering with use cases
2002
Computing & control engineering journal
Use cases are organised collections of scenarios, used to define the purposes of systems and software. They are well established in software engineering but more controversial for systems. ...
A companion article will look at how use cases may help to elicit and analyse nonfunctional requirements such as for safety, security, and reliability.8 COMPUTING & CONTROL ENGINEERING JOURNAL DECEMBER ...
doi:10.1049/cce:20020607
fatcat:cmdrdzk7t5gtnm5wqmow2etc3q
Holistic security requirements analysis: An attacker's perspective
2015
2015 IEEE 23rd International Requirements Engineering Conference (RE)
Based on the results of our attack analysis, appropriate security controls can be selected to effectively tackle potential attacks. ...
The ever-growing complexity of systems makes their protection more challenging, as a single vulnerability or exposure of any component of the system can lead to serious security breaches. ...
Acknowledgements This work was supported by ERC advanced grant 267856, titled "Lucretius: Foundations for Software Evolution". ...
doi:10.1109/re.2015.7320439
dblp:conf/re/LiPMHB15
fatcat:n537fecjxjel5cs5v4o7kjmrfy
Automated software architecture security risk analysis using formalized signatures
2013
2013 35th International Conference on Software Engineering (ICSE)
Using formal signatures we analyse a target system to locate signature matches (for attack scenarios), or to take measurements (for security metrics). ...
We introduce a new approach to support architecture security analysis using security scenarios and metrics. ...
System-Security Mappings: Engineers map security entities (objectives, requirements, controls) on system entities (features, components, classes). ...
doi:10.1109/icse.2013.6606612
dblp:conf/icse/AlmorsyGI13
fatcat:7t7nnvut4rbvpcd6fwfv2moigi
A Framework and its Associated Process-Oriented Domain Specific Language for Managing Smart Residential Environments
2013
International Journal of Smart Home
As a consequence, services composition and orchestration research is exploring ways to combine available services and smart components to work together for solving complex problems such as energy control ...
The proposed solution consists first in defining a generic ontology of such environments and then in using it within a Domain Specific Language (DSL) for designing and controlling different environment ...
The upper part shows the reaction of the system (Smart Home) according to the action scenarios. List showers = discover(Shower); 6 ... ...
doi:10.14257/ijsh.2013.7.6.37
fatcat:3xbuucbworecjol5yiq5rlgh64
Linking Business Modelling to Socio-technical System Design
[chapter]
1999
Lecture Notes in Computer Science
Domain scenarios describing the system and its context are used to create an environment model based on the i* notation. ...
The method is illustrated with a case study of a service engineer support system. ...
Acknowledgements This research is funded by the European Commission ESPRIT 21903 'CREWS' (Cooperative Requirements Engineering With Scenarios) long-term research project. ...
doi:10.1007/3-540-48738-7_7
fatcat:cdeteznbezbbjc5izwuff5vnie
Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk
2011
ACM Transactions on Software Engineering and Methodology
for risk due to non-compliance during system operation. ...
This work contributes a novel approach to understand the level of compliance with regulatory requirements in terms of the potential for risk during system operation. ...
ACKNOWLEDGEMENTS This work is partially supported by the grant (Contract# N65236-05-P-3672) from the Critical Infrastructure Protection Center, Space and Naval Warfare (SPAWAR) Systems Center, US Department ...
doi:10.1145/2000799.2000802
fatcat:cr3ysz6ymfgc3d2pltdxyr2jba
Escaping the Streetlight Effect
2019
Proceedings of the 9th International Conference on the Internet of Things - IoT 2019
The search engine crawls dynamic WoT environments to discover and index device metadata described with the W3C WoT Thing Description, and exposes a SPARQL endpoint that agents can use for approximate search ...
To this end, we developed a search engine for the WoT that allows autonomous agents to perform approximate search queries in order to find relevant resources in their environment in (weak) real time. ...
If the W3C WoT TD provides multiple hypermedia controls for the same action type, the first hypermedia control is used. ...
doi:10.1145/3365871.3365901
dblp:conf/iot/BienzCMGC19
fatcat:aiu5ldgge5bzhghlyi5trb7dfi
« Previous
Showing results 1 — 15 out of 157,286 results