default search action
24th RE 2016: Beijing, China - Workshops
- 24th IEEE International Requirements Engineering Conference, RE 2016, Beijing, China, September 12-16, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4121-3
Third International Workshop on Artificial Intelligence for Requirements Engineering (AIRE)
- Fabiano Dalpiaz, Henning Femmer, Jin Guo:
Welcome to the Third International Workshop on Artificial Intelligence for Requirements Engineering (AIRE'16). 1 - Lorijn van Rooijen, Heiko Hamann:
Requirements Specification-by-Example Using a Multi-objective Evolutionary Algorithm. 3-9 - Joseph Gillain, Ivan Jureta, Stéphane Faulkner:
Planning Optimal Agile Releases via Requirements Optimization. 10-16 - Özgür Kafali, Nirav Ajmeri, Munindar P. Singh:
Formal Understanding of Tradeoffs among Liveness and Safety Requirements. 17-18 - Jaspreet Bhatia, Morgan C. Evans, Sudarshan Wadkar, Travis D. Breaux:
Automated Extraction of Regulated Information Types Using Hyponymy Relations. 19-25 - Brian Arendse, Garm Lucassen:
Toward Tool Mashups: Comparing and Combining NLP RE Tools. 26-31 - Luis Hernán García Paucar, Nelly Bencomo:
The Reassessment of Preferences of Non-functional Requirements for Better Informed Decision-Making in Self-Adaptation. 32-38 - Jonas Winkler, Andreas Vogelsang:
Automatic Classification of Requirements Based on Convolutional Neural Networks. 39-45 - Eya Ben Charrada:
Which One to Read? Factors Influencing the Usefulness of Online Reviews for RE. 46-52
Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
- Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). 53 - Lin Liu:
Security and Privacy Requirements Engineering Revisited in the Big Data Era (Keynote). 55
Security Requirements for Guidelines and Policies
- Manuel Rudolph, Cornelius Moucha, Denis Feth:
A Framework for Generating User-and Domain-Tailored Security Policy Editors. 56-61 - Maria Riaz, Sarah Elder, Laurie A. Williams:
Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements. 62-67 - Mohsen Ahmadvand, Amjad Ibrahim:
Requirements Reconciliation for Scalable and Secure Microservice (De)composition. 68-73
Tools and Technology Based Security and Privacy Requirements
- Dan Ionita, Roeland H. P. Kegel, Andrei Baltuta, Roel J. Wieringa:
ArgueSecure: Out-of-the-Box Security Risk Assessment. 74-79 - Zeineb Zhioua, Yves Roudier, Stuart Short, Rabéa Ameur-Boulifa:
Security Guidelines: Requirements Engineering for Verifying Code Quality. 80-85 - Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo:
Literature Survey on Technologies for Developing Privacy-Aware Software. 86-91
First Workshop on Requirements Engineering for Investigating and Countering Crime (iRENIC)
- Dalal Alrajeh, Liliana Pasquale:
Welcome to the First Workshop on Requirements Engineering for Investigating and Countering Crimes (iRENIC 2016). 92
Short Papers
- Hashem Dehghanniri, Hervé Borrion:
Toward a More Structured Crime Scripting Method. 94-97 - Nesrin Hussein, Wentao Wang, Joseph L. Nedelec, Xuetao Wei, Nan Niu:
Unified Profiling of Attackers via Domain Modeling. 98-101 - Thein Than Tun, Blaine A. Price, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. 102-105
Long Papers
- Jean-Christophe Deprez, Christophe Ponsard, Nikolaos Matskanis:
A Goal-Oriented Requirements Analysis for the Collection, Use and Exchange of Electronic Evidence across EU Countries. 106-113 - Joshua Gray, Virginia N. L. Franqueira, Yijun Yu:
Forensically-Sound Analysis of Security Risks of Using Local Password Managers. 114-121
Sixth International Workshop on Model-Driven Requirements Engineering (MoDRE)
- Ana Moreira, Gunter Mussbacher, João Araújo, Pablo Sánchez:
Welcome to the Sixth International Workshop on Model-Driven Requirements Engineering (MoDRE). 122
Goal Modelling & Security
- Aprajita, Gunter Mussbacher:
TimedGRL: Specifying Goal Models Over Time. 125-134 - Liang Xiao, John Fox:
Goal Modelling in Clinical Decision Support. 135-144 - Cristiano De Faveri, Ana Moreira, João Araújo, Vasco Amaral:
Towards Security Modeling of e-Voting Systems. 145-154 - Mattia Salnitri, Elda Paja, Paolo Giorgini:
Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution. 155-164
Traceability and Synchronization
- Stefan Kugele, Daniel Antkowiak:
Visualization of Trace Links and Change Impact Analysis. 165-169 - Weize Zhao, Haiyan Zhao, Zhenjiang Hu:
A Framework for Synchronization Between Feature Configurations and Use Cases Based on Bidirectional Programming. 170-179
Empirical Research
- Chuan He, Gunter Mussbacher:
Model-Driven Engineering and Elicitation Techniques: A Systematic Literature Review. 180-189 - Raphaël Faudou, Jean-Michel Bruel:
An Industrial Feedback on Model-Based Requirements Engineering in Systems Engineering Context. 190-199
Sustainability Track
- Christophe Ponsard, Renaud De Landtsheer, Gustavo Ospina:
Towards a Quantitative Assessment of Supply Chain Sustainability Using Queries over Model Simulations. 200-207 - José María Conejero, Isabel Sofia Brito, Ana Moreira, Jácome Cunha, João Araújo:
Modeling the Impact of UAVs in Sustainability. 208-216
Ninth International Workshop on Requirements Engineering and Law (RELAW)
- Daniel Amyot, Sepideh Ghanavati, Aaron K. Massey, Wei-Tek Tsai:
Welcome to the Ninth International Workshop on Requirements Engineering and Law (RELAW). 217
Traceability, Compliance, and Effectiveness in Industry
- Dagny Hauksdottir, Brian Ritsing, Jens Christian Andersen, Niels Henrik Mortensen:
Establishing Reusable Requirements Derived from Laws and Regulations for Medical Device Development. 220-228 - Lamartine da Silva Barboza, Gilberto A. de A. Cysneiros Filho, Ricardo A. C. de Souza:
Towards Legal Compliance in IT Procurement Planning in Brazil's Federal Public Administration. 229-238 - Carlos Henrique C. Duarte:
The Influence of Tax Incentive and Market Regulation Requirements on IT Companies: Empirical Evidence from the Brazilian Industry. 239-248
Modeling and Analysis
- Robert Muthuri, Guido Boella, Joris Hulstijn, Llio Humphreys:
Argumentation-Based Legal Requirements Engineering: The Role of Legal Interpretation in Requirements Acquisition. 249-258 - Özgür Kafali, Nirav Ajmeri, Munindar P. Singh:
Normative Requirements in Sociotechnical Systems. 259-260
Privacy
- Richard Rutledge, Aaron K. Massey, Annie I. Antón:
Privacy Impacts of IoT Devices: A SmartTV Case Study. 261-270 - Michael Colesky, Sepideh Ghanavati:
Privacy Shielding by Design - A Strategies Case for Near-Compliance. 271-275
Sixth International Workshop on Requirements Patterns (RePa)
- Lawrence Chung, Sylwia Kopczynska, Julio César Sampaio do Prado Leite, Sam Supakkul, Liping Zhao:
Welcome to the Sixth International Workshop on Requirements Patterns (RePa). 276 - Pericles Loucopoulos:
Capability Modeling as a Strategic Analysis Tool: Keynote Extended Abstract. 278-280 - Ye Wang, Bo Jiang, Ting Wang:
Using Workflow Patterns to Model and Validate Service Requirements. 281-288 - Feng Chen, Norah Power, J. J. Collins:
A Stakeholder Contribution Pattern in Requirements Decision-Making: An Empirical Study in Enterprise Development. 289-295 - Xiaohong Chen, Li Han, Jing Liu, Haiying Sun:
Using Safety Requirement Patterns to Elicit Requirements for Railway Interlocking Systems. 296-303 - Roxana Lisette Quintanilla Portugal, Julio César Sampaio do Prado Leite:
Extracting Requirements Patterns from Software Repositories. 304-307 - Jonas Eckhardt, Andreas Vogelsang, Henning Femmer:
An Approach for Creating Sentence Patterns for Quality Requirements. 308-315 - Jingjing Ji, Rong Peng:
An Analysis Pattern Driven Requirements Modeling Method. 316-319
Ninth International Workshop on Software Product Management (IWSPM)
- Garm Lucassen, Farnaz Fotrousi, Andrey Maglyas:
Welcome to the Ninth International Workshop on Software Product Management (IWSPM 2016). 320 - David Callele, Krzysztof Wnuk:
A Process for Product and Service Definition. 322-327 - Samuel A. Fricker:
Systematic Mapping of Technology-Enabled Product Innovations. 328-333 - Zahra Shakeri Hossein Abad, Alex Shymka, Susant Pant, Ashley Currie, Guenther Ruhe:
What are Practitioners Asking about Requirements Engineering? An Exploratory Analysis of Social Q&A Sites. 334-343 - Johan Linåker, Krzysztof Wnuk:
Requirements Analysis and Management for Benefiting Openness. 344-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.