23,907 Hits in 5.7 sec

Requirement Elicitation Methods for Cloud Providers in IT Industry

Muhammad Imran Manzoor, Department of Computer Science and IT University of Lahore, Pakpattan Campus, Pakistan, Momina Shaheen, Hudaibia Khalid, Aimen Anum, Nisar Hussain, M. Rehan Faheem
2018 International Journal of Modern Education and Computer Science  
This study would be beneficial for cloud providers adequately gather their consumer requirements and enhance the knowledge of elicitation techniques that are used by cloud providers.  ...  We have used semi-structured interviews and questionnaires to gather information about the elicitation techniques that are used by cloud providers to elicit consumer requirements.  ...  However, those Cloud provider companies which use the interface analysis technique and it is proven to be an unsatisfactory technique for requirement elicitation.  ... 
doi:10.5815/ijmecs.2018.10.05 fatcat:s3pmxeqqdney7hqtkyut3uadsa

Noise reveals visual mechanisms of detection and discrimination

Joshua A. Solomon
2002 Journal of Vision  
Experiment 4 suggests that observers use optimally tuned detection templates for orientation discrimination.  ...  When performance is limited by stochastically defined masks, (psychophysical) reverse correlation has proven to be an especially efficient tool for estimating the templates used by detection and discrimination  ...  Approximate p values for each of these 12 tests are given in Table 1 . As a guide to reading Figure 1 . 2AFC blob-detection.  ... 
doi:10.1167/2.1.7 pmid:12678599 fatcat:onwnrmnil5ezrpwwghvf75p3vm

Distributed Requirements Elicitation Using a Spatial Hypertext Wiki

Carlos Solis, Nour Ali
2010 2010 5th IEEE International Conference on Global Software Engineering  
This paper presents the Spatial Hypertext Wiki as a collaborative tool for supporting creativity in the RE process.  ...  The Requirements Elicitation (RE) process is a clear example where this kind of support is needed in the software development process.  ...  In requirements elicitation, diverse methods are used such as interviews, workshops, brainstorming, and protocol analysis [6] .  ... 
doi:10.1109/icgse.2010.35 dblp:conf/icgse/SolisA10 fatcat:3dw4s4fu2fhwbbhobm3hjekpjm

Identifying Possible Requirements using Personas - A Qualitative Study

Bruna Ferreira, Gleison Santos, Tayana Conte
2017 Proceedings of the 19th International Conference on Enterprise Information Systems  
However, in the current context of software development, having users involved in the requirements elicitation is difficult due to factors such as: lack of paying customers; users' unavailability for validations  ...  ; and budget and time restrictions for applying traditional techniques, such as interviews and questionnaires.  ...  The analysis of the personas showed that the technique helps identifying possible requirements for the application, such as functionalities and user interface details.  ... 
doi:10.5220/0006311600640075 dblp:conf/iceis/FerreiraSC17 fatcat:4njxmbcbg5ejdjrsd6rfzvy75u

A Goal based Framework by adopting SQUARE Process for Privacy and Security Requirement Engineering

Baber Hayat, Ribha Shakoor, Sahrish Mubarak, Komal Basharat
2017 International Journal of Computer Applications  
For this different privacy requirement engineering approaches has been proposed such as security quality requirement engineering (SQUARE) which provide a step for elicitation of requirements in terms of  ...  Privacy requirement gathering is remain the challenge for software engineers for distributed and complex software.  ...  There are many structured and un-structured techniques can be used to for requirement prioritization.  ... 
doi:10.5120/ijca2017914873 fatcat:ha5ddxcnujhhhbmjcvxcksfwny

Applying System Families Concepts to Requirements Engineering Process Definition [chapter]

Amador Durán, David Benavides, Jesus Bermejo
2004 Lecture Notes in Computer Science  
end up applying requirements engineering techniques like glossaries, scenarios or conflict resolu-tion for the definition of the requirements engineering process itself.  ...  One of the most interesting experiences from our point of view is that, al-though the definition process was started using a top-down approach and well-know techniques like data flow diagrams, we eventually  ...  Elicitation Techniques Variability One of the first features identified as variants were elicitation techniques, requirements documents templates and (single) requirements templates.  ... 
doi:10.1007/978-3-540-24667-1_11 fatcat:angtgdgbtnasvn65pboaigzrla

Empathy and Criativity in Privacy Requirements Elicitation: Systematic Literature Review

Angélica Toffano Seidel Calazans, Anderson Jefferson Cerqueira, Edna Dias Canedo
2020 Workshop em Engenharia de Requisitos  
Thus, we investigated whether the literature already has reports on the use of these techniques as facilitators in the process of privacy requirements elicitation.  ...  As a result of the SLR, we found few papers related to the use of Empathy in privacy requirements elicitation and no papers that relate Creativity to the elicitation of privacy requirements.  ...  We classified the data extracted in this SLR as Creativity and Empathy techniques for requirements elicitation.  ... 
dblp:conf/wer/CalazansCC20 fatcat:b65xstcbfrfkdc76krysxose3u

Knowledge Elicitation and Modeling for E-government [chapter]

Paolo Bresciani, Paolo Donzelli, Sara Ferrari, Fabrizio Sannicolò
2004 Lecture Notes in Computer Science  
We show how Requirements Engineering can be valuable in Knowledge Management for eGovernment, by means of some results from an on-going project about the extraction and analysis of the knowledge embedded  ...  Knowledge assumes different forms: explicit, encoded for example as laws, decrees, standards, policies, and tacit, embedded in the procedures and routines implicitly enacted by the communities of knowledge  ...  The elicitation template.  ... 
doi:10.1007/978-3-540-24683-1_18 fatcat:25lctyxpsnd77jsbww5bw27btq

Requirements reuse and requirement patterns: a state of the practice survey

Cristina Palomares, Carme Quer, Xavier Franch
2016 Empirical Software Engineering  
However, participants who apply reuse more often tend to use more elaborate techniques.  ...  Opinions of respondents about the use of requirement patterns show that they can be expected to mitigate problems related to the quality of the resulting requirements, such as lack of uniformity, inconsistency  ...  Acknowledgments We want to thank Claudia Ayala and Birgit Penzenstadler for their comments and suggestions. This work has been partially funded by the Spanish project TIN2013-44641-P.  ... 
doi:10.1007/s10664-016-9485-x fatcat:7zxw7armwrbadgpkie3zr53sii

A semi-automated approach for generating natural language requirements documents based on business process models

Banu Aysolmaz, Henrik Leopold, Hajo A. Reijers, Onur Demirörs
2018 Information and Software Technology  
Context: The analysis of requirements for business-related software systems is often supported by using business process models.  ...  Possible inconsistencies between process models and requirements represent a serious threat for the successful development of the software system and may require the repetition of process analysis activities  ...  We used the existing requirements as a benchmark and performed a delta analysis for the generated requirements.  ... 
doi:10.1016/j.infsof.2017.08.009 fatcat:of4sqtetxjbc3hut2bgbkxo3te

Exploring Impact of Requirements Engineering on Other IT Project Areas – Case Study

Aleksander Jarzębowicz, Katarzyna Poniatowska
2020 Computer Science  
were used to demonstrate the impact of different RE techniques.  ...  Requirements Engineering (RE) is recognized as one of the most important (yet difficult) areas of software engineering that has a significant impact on other areas of IT projects and their final outcomes  ...  As for requirements documentation ("Req. documentation" row of Table 1 ), the following techniques were used: • Table -a tabular requirement template with the following fields: ID, type (functionality  ... 
doi:10.7494/csci.2020.21.3.3618 fatcat:vdx2zjjzkzfdjf3yhbko3koa4a

Appropriating Arguments: Academic Reading and Writing

John Corbett
1993 The TESL Canada Journal  
This article describes various techniques for promoting academic competence by helping students to summarize, synthesize and evaluate prescribed readings legitimately.  ...  Tertiary education courses, especially those in the arts and social sciences, generally require students to write compositions based on prescribed readings.  ...  Activities utilising the Problem-Solution pattern provide students with at least one useful and generalisable "attack skill" for reading many academic texts, as well as a useful model for summaries and  ... 
doi:10.18806/tesl.v10i2.620 fatcat:kgq3hssdjvgnbo7admseny5sl4

The ReqWiki Approach for Collaborative Software Requirements Engineering with Integrated Text Analysis Support

Bahar Sateli, Elian Angius, Rene Witte
2013 2013 IEEE 37th Annual Computer Software and Applications Conference  
We know that requirements engineering has a large impact on the success of a project, yet sophisticated tool support, especially for small to mid-size enterprises, is still lacking.  ...  The requirements engineering phase within a software project is a heavily knowledge-driven, collaborative process that typically involves the analysis and creation of a large number of textual artifacts  ...  ACKNOWLEDGMENT We thank the Concordia software engineering students that participated in the evaluation of ReqWiki and Srinivasan Rajivelu for his contributions to the implementation of ReqWiki.  ... 
doi:10.1109/compsac.2013.68 dblp:conf/compsac/SateliAW13 fatcat:6b4sz7iqmzb43oojdsr7wqp7im

Revisiting Requirements Elicitation Techniques

Shreta Sharma, S. K. Pandey
2013 International Journal of Computer Applications  
Literature reveals various elicitation techniques, which can be used for the purpose depending upon the nature of project/s.  ...  Such a review would enable the concerned stakeholders to understand and select the most appropriate technique to be used for their project/s.  ...  Templates are also a part of this procedure that provides an easier way to requirements elicitation.  ... 
doi:10.5120/13166-0889 fatcat:gnopplpm2naifahhhrn7hjkwnm

User-guided interictal spike detection

Mahmoud El-Gohary, James McNames, Siegward Elsas
2008 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society  
In the diagnosis and treatment of epilepsy, long-term monitoring may be required to document and study interictal activities such as interictal spikes.  ...  We use the annotations to build a template that captures the relevant features of spikes, and then use Mean Squared Error (MSE) test to detect all of the other spikes in the recording.  ...  The second stage reads the list and uses rules incorporating knowledge elicited from the EEG expert to confirm or exclude each of the possible spikes.  ... 
doi:10.1109/iembs.2008.4649280 pmid:19162783 pmcid:PMC2882069 fatcat:ast6xeyxl5dnbbde3qhvphdumy
« Previous Showing results 1 — 15 out of 23,907 results