default search action
25th RE 2017: Lisbon, Portugal
- Ana Moreira, João Araújo, Jane Hayes, Barbara Paech:
25th IEEE International Requirements Engineering Conference, RE 2017, Lisbon, Portugal, September 4-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3191-1
Research Track
Research/Industry 1: Simplicity through Social Media? Mining Tweets and App Info
- Grant Williams, Anas Mahmoud:
Mining Twitter Feeds for Software User Requirements. 1-10 - Emitza Guzman, Mohamed Ibrahim, Martin Glinz:
A Little Bird Told Me: Mining Tweets for Requirements and Software Evolution. 11-20 - Timo Johann, Christoph Stanik, Alireza M. Alizadeh B., Walid Maalej:
SAFE: A Simple Approach for Feature Extraction from App Descriptions and App Reviews. 21-30
Research/Industry 2: Canary in a Coalmine: Argumentation and Rationale Alive and Well?
- Georgi M. Kanchev, Pradeep K. Murukannaiah, Amit K. Chopra, Pete Sawyer:
Canary: Extracting Requirements-Related Information from Online Discussions. 31-40 - Dirk van der Linden, Anna Zamansky, Irit Hadar:
A Framework for Improving the Verifiability of Visual Notation Design Grounded in the Physics of Notations. 41-50 - Yehia Elrakaiby, Alessio Ferrari, Paola Spoletini, Stefania Gnesi, Bashar Nuseibeh:
Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews. 51-60
Research/Industry 3: Complementarity Achieved? Mining User Feedback
- Zijad Kurtanovic, Walid Maalej:
Mining User Rationale from Software Reviews. 61-70 - Melanie J. C. Stade, Farnaz Fotrousi, Norbert Seyff, Oliver Albrecht:
Feedback Gathering from an Industrial Point of View. 71-79 - Eduard C. Groen, Sylwia Kopczynska, Marc P. Hauer, Tobias D. Krafft, Jörg Dörr:
Users - The Hidden Software Product Quality Experts?: A Study on How App Users Report Quality Aspects in Online Reviews. 80-89
Research/Industry 4: Simplicity through Knowledge and Association?: Traceability
- Micayla Goodrum, Jane Cleland-Huang, Robyn R. Lutz, Jinghui Cheng, Ronald A. Metoyer:
What Requirements Knowledge Do Developers Need to Manage Change in Safety-Critical Systems? 90-99 - Sugandha Malviya, Michael Vierhauser, Jane Cleland-Huang, Smita Ghaisas:
What Questions do Requirements Engineers Ask? 100-109 - Waleed Zogaan, Palak Sharma, Mehdi Mirakhorli, Venera Arnaoudova:
Datasets from Fifteen Years of Automated Requirements Traceability Research: Current State, Characteristics, and Quality. 110-121
Research/Industry 5: Secure AND Supportive?
- Sven Türpe:
The Trouble with Security Requirements. 122-133 - Mikael Lindvall, Madeline Diep, Michele Klein, Paul L. Jones, Yi Zhang, Eugene Y. Vasserman:
Safety-Focused Security Requirements Elicitation for Medical Device Software. 134-143 - Hanan Hibshi, Travis D. Breaux:
Reinforcing Security Requirements with Multifactor Quality Measurement. 144-153
Research/Industry 6: Complexity Reduction via Goals and Reasoning?
- George Mathew, Tim Menzies, Neil A. Ernst, John Klein:
"SHORT"er Reasoning About Larger Requirements Models. 154-163 - Alicia M. Grubb, Marsha Chechik:
Modeling and Reasoning with Changing Intentions: An Experiment. 164-173 - Alistair Mavin, Philip Wilkinson, Sabine Teufl, Henning Femmer, Jonas Eckhardt, Jakob Mund:
Does Goal-Oriented Requirements Engineering Achieve Its Goal? 174-183
Research/Industry 7: Complimentary and Simple Requirements via Social Factors?
- David Callele, Krzysztof Wnuk, Birgit Penzenstadler:
New Frontiers for Requirements Engineering. 184-193 - Shinobu Saito, Yukako Iimura, Aaron K. Massey, Annie I. Antón:
How Much Undocumented Knowledge is there in Agile Software Development?: Case Study on Industrial Project Using Issue Tracking System and Version Control System. 194-203 - Angélica Toffano Seidel Calazans, Roberto Ávila Paldês, Eloisa Toffano Seidel Masson, Isabel Sofia Brito, Kiane Mabel Fialho Rezende, Emeli Braosi, Nathacia Indayara Pereira:
Software Requirements Analyst Profile: A Descriptive Study of Brazil and Mexico. 204-212
Research/Industry 8: Users: The Rosetta Stone of RE?
- Andreas Maier, Daniel M. Berry:
Improving the Identification of Hedonic Quality in User Requirements - A Controlled Experiment. 213-222 - Hélène Gaspard-Boulinc, Stéphane Conversy:
Usability Insights for Requirements Engineering Tools: A User Study with Practitioners in Aeronautics. 223-232
Research/Industry 9: QUALITY, Simplicity, Complementarity: Pick Two?
- Breno Dantas Cruz, Bargav Jayaraman, Anurag Dwarakanath, Collin McMillan:
Detecting Vague Words & Phrases in Requirements Documents in a Multilingual Environment. 233-242 - Maxime Warnier, Anne Condamines:
A Case Study on Evaluating the Relevance of Some Rules for Writing Requirements Through an Online Survey. 243-252 - Martin Beckmann, Andreas Vogelsang, Christian Reuter:
A Case Study on a Specification Approach Using Activity Diagrams in Requirements Documents. 253-262
Research/Industry 10: Specification: When Words Get in the Way?
- Benedikt Walter, Jakob Hammes, Marco Piechotta, Stephan Rudolph:
A Formalization Method to Process Structured Natural Language to Logic Expressions to Detect Redundant Specification and Test Statements. 263-272 - Kim Lauenroth, Erik Kamsties, Oliver Hehlert:
Do Words Make a Difference? An Empirical Study on the Impact of Taxonomies on the Classification of Requirements. 273-282 - Andrew W. Crapo, Abha Moitra, Craig McMillan, Daniel Russell:
Requirements Capture and Analysis in ASSERT(TM). 283-291
Research/Industry 11: Easier Said than Done?: Mastering Domain Complexity through NLP
- Xiaoli Lian, Jane Cleland-Huang, Li Zhang:
Mining Associations Between Quality Concerns and Functional Requirements. 292-301 - Nicolas Sannier, Morayo Adedjouma, Mehrdad Sabetzadeh, Lionel C. Briand, John Dann, Marc Hisette, Pascal Thill:
Legal Markup Generation in the Large: An Experience Report. 302-311 - Morgan C. Evans, Jaspreet Bhatia, Sudarshan Wadkar, Travis D. Breaux:
An Evaluation of Constituency-Based Hyponymy Extraction from Privacy Policies. 312-321
Research/Industry 12: Better Process and Requirements through Fun or Less Interruptions?
- Fitsum Meshesha Kifetew, Denisse Muñante, Anna Perini, Angelo Susi, Alberto Siena, Paolo Busetta, Danilo Valerio:
Gamifying Collaborative Prioritization: Does Pointsification Work? 322-331 - Martina Z. Kolpondinos-Huber, Martin Glinz:
Behind Points and Levels - The Influence of Gamification Algorithms on Requirements Prioritization. 332-341 - Zahra Shakeri Hossein Abad, Guenther Ruhe, Mike Bauer:
Task Interruptions in Requirements Engineering: Reality Versus Perceptions! 342-351
Research/Industry 13: Large Software: Beautiful and Simple?
- Rashidah Kasauli, Grischa Liebel, Eric Knauss, Swathi Gopakumar, Benjamin Kanagwa:
Requirements Engineering Challenges in Large-Scale Agile System Development. 352-361 - Lloyd Montgomery, Daniela E. Damian:
What do Support Analysts Know About Their Customers? On the Study and Prediction of Support Ticket Escalations in Large Software Organizations. 362-371 - Markus Borg, Thomas Olsson, John Svensson:
Piggybacking on an Autonomous Hauler: Business Models Enabling a System-of-Systems Approach to Mapping an Underground Mine. 372-381
Re@Next!
Re@Next! 1: Relevance & Releases & Privacy
- Xavier Franch, Daniel Méndez Fernández, Marc Oriol, Andreas Vogelsang, Rogardt Heldal, Eric Knauss, Guilherme Horta Travassos, Jeffrey C. Carver, Oscar Dieste, Thomas Zimmermann:
How do Practitioners Perceive the Relevance of Requirements Engineering Research? An Ongoing Study. 382-387 - Maleknaz Nayebi, Guenther Ruhe:
Optimized Functionality for Super Mobile Apps. 388-393 - Jaspreet Bhatia, Travis D. Breaux:
A Data Purpose Case Study of Privacy Policies. 394-399
RE@Next! 2: Elicitation & Security
- Alessio Ferrari, Paola Spoletini, Beatrice Donati, Didar Zowghi, Stefania Gnesi:
Interview Review: Detecting Latent Ambiguities to Improve the Requirements Elicitation Process. 400-405 - Anna Zamansky, Dirk van der Linden, Sofya Baskin:
Pushing Boundaries of RE: Requirement Elicitation for Non-human Users. 406-411 - Nancy Mead, Forrest Shull, Janine L. Spears, Stefan Heibl, Sam Weber, Jane Cleland-Huang:
Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat Modeling. 412-417 - Daniel Alami, Fabiano Dalpiaz:
A Gamified Tutorial for Learning About Security Requirements Engineering. 418-423
RE@Next! 3: Managing Requirements
- Itzel Morales-Ramirez, Denisse Muñante, Fitsum Meshesha Kifetew, Anna Perini, Angelo Susi, Alberto Siena:
Exploiting User Feedback in Tool-Supported Multi-criteria Requirements Prioritization. 424-429 - Luis Hernán García Paucar, Nelly Bencomo, Kevin Kam Fung Yuen:
Juggling Preferences in a World of Uncertainty. 430-435 - Thiago Viana, Andrea Zisman, Arosha K. Bandara:
Identifying Conflicting Requirements in Systems of Systems. 436-441 - Zahra Shakeri Hossein Abad, Alex Shymka, Jenny Le, Noor Hammad, Guenther Ruhe:
A Visual Narrative Path from Switching to Resuming a Requirements Engineering Task. 442-447
Posters and Demos
- Saurabh Tiwari, Mayank Laddha:
UCAnalyzer: A Tool to Analyze Use Case Textual Descriptions. 448-449 - Mohammad Noaeen, Zahra Shakeri Hossein Abad, Behrouz Homayoun Far:
Let's Hear it from RETTA: A Requirements Elicitation Tool for TrAffic Management Systems. 450-451 - Lloyd Montgomery, Emma Reading, Daniela E. Damian:
ECrits - Visualizing Support Ticket Escalation Risk. 452-455 - Robert Darimont, Wei Zhao, Christophe Ponsard, Arnaud Michot:
Deploying a Template and Pattern Library for Improved Reuse of Requirements Across Projects. 456-457 - Luis Hernán García Paucar, Nelly Bencomo:
ARRoW: Tool Support for Automatic Runtime Reappraisal of Weights. 458-461 - Parisa Ghazi, Zahra Shakeri Hossein Abad, Martin Glinz:
Choosing Requirements for Experimentation with User Interfaces of Requirements Modeling Tools. 462-463 - María Fernanda Granda, Nelly Condori-Fernández, Tanja E. J. Vos, Oscar Pastor:
CoSTest: A Tool for Validation of Requirements at Model Level. 464-467 - Fitsum Meshesha Kifetew, Denisse Muñante, Anna Perini, Angelo Susi, Alberto Siena, Paolo Busetta:
DMGame: A Gamified Collaborative Requirements Prioritisation Tool. 468-469 - Georgi M. Kanchev, Pradeep K. Murukannaiah, Amit K. Chopra, Pete Sawyer:
Canary: An Interactive and Query-Based Approach to Extract Requirements from Online Forums. 470-471 - Michael Ledger:
A Demonstration of Respecify: A Requirements Authoring Tool Harnessing CNL. 472-473
Silver Jubilee
- Michael Anthony Jackson:
The Right-Hand Side Problem: Research Topics in RE. 474-475 - Paola Spoletini, Alessio Ferrari:
Requirements Elicitation: A Look at the Future Through the Lenses of the Past. 476-477 - Guenther Ruhe, Maleknaz Nayebi, Christof Ebert:
The Vision: Requirements Engineering in Society. 478-479 - Roel J. Wieringa:
Requirements Engineering Since the Year One Thousand. 480-481 - Robyn R. Lutz:
RE at 50, with a Focus on the Last 25 Years. 482-483
Data Track
Data Track 1: Functional vs Non-Functional: Can Both Win?
- Alex Dekhtyar, Vivian Fong:
RE Data Challenge: Requirements Identification with Word2Vec and TensorFlow. 484-489 - Zijad Kurtanovic, Walid Maalej:
Automatically Classifying Functional and Non-functional Requirements Using Supervised Machine Learning. 490-495 - Zahra Shakeri Hossein Abad, Oliver Karras, Parisa Ghazi, Martin Glinz, Guenther Ruhe, Kurt Schneider:
What Works Better? A Study of Classifying Requirements. 496-501 - Alessio Ferrari, Giorgio Oronzo Spagnolo, Stefania Gnesi:
PURE: A Dataset of Public Requirements Documents. 502-505
Data Track 2: Simplicity through Specialization?
- Nuthan Munaiah, Andrew Meneely, Pradeep K. Murukannaiah:
A Domain-Independent Model for Identifying Security Requirements. 506-511 - Pradeep K. Murukannaiah, Nirav Ajmeri, Munindar P. Singh:
Toward Automating Crowd RE. 512-515 - Michael Rath, Patrick Rempel, Patrick Mäder:
The IlmSeven Dataset. 516-519
Doctoral Symposium
- Olawole Oni:
Towards a Bayesian Decision Model for Release Planning in Incremental Development. 520-525 - Ana Isabella Muniz Leite:
An Approach to Support the Specification of Agile Artifacts in the Development of Safety-Critical Systems. 526-531 - Mustafa Berk Duran:
Reusable Goal Models. 532-537 - Jacek Dabrowski:
Towards an Adaptive Framework for Goal-Oriented Strategic Decision-Making. 538-543 - Rainara Maia Carvalho:
Dealing with Conflicts Between Non-functional Requirements of UbiComp and IoT Applications. 544-549 - Ana Maria da Mota Moura:
Awareness Driven Software Reengineering. 550-555 - Jennifer Brings:
Verifying Cyber-Physical System Behavior in the Context of Cyber-Physical System-Networks. 556-561 - Rodrigo Meneses Porto Falcão:
Improving the Elicitation of Delightful Context-Aware Features: A Data-Based Approach. 562-567
Panel
- Nan Niu:
RE in the Age of Continuous Deployment. 568-569 - Daniel M. Berry, Jane Cleland-Huang, Alessio Ferrari, Walid Maalej, John Mylopoulos, Didar Zowghi:
Panel: Context-Dependent Evaluation of Tools for NL RE Tasks: Recall vs. Precision, and Beyond. 570-573
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.