By Topic

Requirements Patterns (RePa), 2011 First International Workshop on

Date 29-29 Aug. 2011

Filter Results

Displaying Results 1 - 11 of 11
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (11 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • 2011 First International Workshop on Requirements Patterns

    Publication Year: 2011 , Page(s): ii - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (151 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Exactly the information your subcontractor needs: DeSyRe — Decomposing system requirements

    Publication Year: 2011 , Page(s): 1 - 10
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (778 KB) |  | HTML iconHTML  

    In software systems development, the increasing size and complexity of systems is handled by decomposition. Companies additionally sign up different subcontractors for subsystems. For distributed development and smooth integration, a major challenge is to deduce subsystem specifications from system specifications in order to deliver them to the subcontractors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysing security requirements patterns based on problems decomposition and composition

    Publication Year: 2011 , Page(s): 11 - 20
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (402 KB) |  | HTML iconHTML  

    Security requirements analysis for business information systems in today's networked organization is difficult due to the complexity of the systems and the frequent change in the environment. Thus, it requires security knowledge to be explicitly represented, and well understood by system analysts and designer, which in turn being applied in feasible problem contexts. System requirements are often ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pattern language for evolving scenarios into multi-perspective models for requirements specification

    Publication Year: 2011 , Page(s): 21 - 27
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (120 KB) |  | HTML iconHTML  

    Scenarios have been widely used for discovering requirements in requirements engineering. Yet, requirements directly obtained from scenarios are often incomplete and inaccurate due to their inherent limitations. This paper presents a pattern language which takes a scenario obtained in the early stages of requirements analysis and transforms it into a rich set of multi-perspective models. These mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pay to play or requirements prioritization in collectives

    Publication Year: 2011 , Page(s): 28 - 31
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (63 KB) |  | HTML iconHTML  

    This paper presents two patterns for requirements prioritization in a collective. A collective is a group of stakeholders with a common need. The stakeholders join the collective to create an infrastructure that they can leverage to develop their own products more effectively. This new organizational model differs from the traditional value chain, and changes the way requirements are identified an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing transparency-related requirements patterns through argumentation

    Publication Year: 2011 , Page(s): 32 - 41
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1580 KB) |  | HTML iconHTML  

    Transparency is a critical concern to democratic societies. As software permeates our social lives, Software Transparency is becoming a quality criterion that demands more attention from software developers. We present in this paper our approach to capture transparency-related requirements patterns through argumentation. We represented initial transparency knowledge as requirements patterns. These... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a generalised framework for classifying and retrieving requirements patterns

    Publication Year: 2011 , Page(s): 42 - 51
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (124 KB) |  | HTML iconHTML  

    Reuse has received much attention in the Software Engineering literature [1], primarily as a means of improving software quality while minimising the financial and temporal costs of software development. Within requirements engineering, various approaches have been proposed to requirements reuse. However, there is huge variation in the contents, form and intended purpose of these reusable requirem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2011 , Page(s): 52
    Save to Project icon | Request Permissions | PDF file iconPDF (10 KB)  
    Freely Available from IEEE