By Topic

2013 21st IEEE International Requirements Engineering Conference (RE)

15-19 July 2013

Filter Results

Displaying Results 1 - 25 of 74
  • [Front and back cover]

    Publication Year: 2013, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2013, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2013, Page(s):iii - v
    Request permission for commercial reuse | PDF file iconPDF (1155 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2013, Page(s):vi - x
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Sponsors & supporters

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (4431 KB)
    Freely Available from IEEE
  • Requirements engineering as information search and idea discovery (keynote)

    Publication Year: 2013, Page(s): 1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB)

    Creativity has been the subject of considerable research over the last 60 years. This keynote will argue that most requirements work is creative but not recognized as such. It will summarize recent applications of creativity theories and techniques to requirements work, then posit the general case that most requirements activities involve information search and idea discovery, and hence can be cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Starchitects and Jack-Hammers: Requirements engineering challenges and practices in the construction industry (keynote)

    Publication Year: 2013, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB)

    Our built environment is a marvel of engineering. It is the continuously evolving product of collaboration between civil engineers, mechanical engineers, electrical engineers, architects, owners, governments, voters, contractors and more. Many of the requirements-related challenges that are commonly encountered in the engineering of software systems have been around for centuries in the constructi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Brasilian perspectives on software production (keynote panel)

    Publication Year: 2013, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB)

    This keynote panel will explore different perspectives on software production from three very experienced leaders in large companies in Brasil. The panelists will present a blend of industrial research and industrial development experiences, and their requirements engineering challenges will be dis-cussed. The keynote panel will be moderated by Julio Cesar Leite of PUC-Rio, the General Chair of RE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated text mining for requirements analysis of policy documents

    Publication Year: 2013, Page(s):4 - 13
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Businesses and organizations in jurisdictions around the world are required by law to provide their customers and users with information about their business practices in the form of policy documents. Requirements engineers analyze these documents as sources of requirements, but this analysis is a time-consuming and mostly manual process. Moreover, policy documents contain legalese and present rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal analysis of privacy requirements specifications for multi-tier applications

    Publication Year: 2013, Page(s):14 - 23
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2358 KB) | HTML iconHTML

    Companies require data from multiple sources to develop new information systems, such as social networking, e-commerce and location-based services. Systems rely on complex, multi-stakeholder data supply-chains to deliver value. These data supply-chains have complex privacy requirements: privacy policies affecting multiple stakeholders (e.g. user, developer, company, government) regulate the collec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical investigation of software engineers' ability to classify legal cross-references

    Publication Year: 2013, Page(s):24 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Requirements engineers often have to develop software for regulated domains. These regulations often contain cross-references to other laws. Cross-references can introduce exceptions or definitions, constrain existing requirements, or even conflict with other compliance requirements. To develop compliant software, requirements engineers must understand the impact these cross-references have on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting requirements traceability through refactoring

    Publication Year: 2013, Page(s):32 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Modern traceability tools employ information retrieval (IR) methods to generate candidate traceability links. These methods track textual signs embedded in the system to establish relationships between software artifacts. However, as software systems evolve, new and inconsistent terminology finds its way into the system's taxonomy, thus corrupting its lexical structure and distorting its traceabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Foundations for an expert system in domain-specific traceability

    Publication Year: 2013, Page(s):42 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB) | HTML iconHTML

    Attempts to utilize information retrieval techniques to fully automate the creation of traceability links have been hindered by terminology mismatches between source and target artifacts. Therefore, current trace retrieval algorithms tend to produce imprecise and incomplete results. In this paper we address this mismatch by proposing an expert system which integrates a knowledge base of domain con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of reinforcement learning to requirements engineering: requirements tracing

    Publication Year: 2013, Page(s):52 - 61
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    We posit that machine learning can be applied to effectively address requirements engineering problems. Specifically, we present a requirements traceability method based on the machine learning technique Reinforcement Learning (RL). The RL method demonstrates a rather targeted generation of candidate links between textual requirements artifacts (high level requirements traced to low level requirem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On requirements verification for model refinements

    Publication Year: 2013, Page(s):62 - 71
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1101 KB) | HTML iconHTML

    Conventional formal verification techniques rely on the assumption that a system's specification is completely available so that the analysis can say whether or not a set of properties will be satisfied. On the contrary, modern development lifecycles call for agileincremental and iterativeapproaches to tame the boosting complexity of modern software systems and reduce development risks. We focus h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributing refinements of a system-level partial behavior model

    Publication Year: 2013, Page(s):72 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    Early in a system's life cycle, a system's behavior is typically partially specified using scenarios, invariants, and temporal properties. These specifications prohibit or require certain behaviors, while leaving other behaviors uncategorized into either of those. Engineers refine the specification by eliciting more requirements to finally arrive at a complete behavioral description. Partial-behav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mode-based pattern for feature requirements, and a generic feature interface

    Publication Year: 2013, Page(s):82 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1148 KB) | HTML iconHTML

    In this paper, we propose a pattern for decomposing and structuring the model of a feature's behavioural requirements, based on modes of operation (e.g., Active, Inactive, Failed) that are common to features in multiple domains. Interestingly, the highest-level modes of the pattern can serve as a generic behavioural interface for all features that adhere to the pattern. We have applied the pattern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements elicitation: Towards the unknown unknowns

    Publication Year: 2013, Page(s):92 - 104
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Requirements elicitation research is reviewed using a framework categorising the relative `knowness' of requirements specification and Common Ground discourse theory. The main contribution of this survey is to review requirements elicitation from the perspective of this framework and propose a road map of research to tackle outstanding elicitation problems involving tacit knowledge. Elicitation te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How cloud providers elicit consumer requirements: An exploratory study of nineteen companies

    Publication Year: 2013, Page(s):105 - 114
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    Requirements elicitation is widely seen as a crucial step towards delivering successful software. In the context of emerging cloud systems, the question is whether and how the elicitation process differs from that used for traditional systems, and if the current methods suffice. We interviewed 19 cloud providers to gain an in-depth understanding of the state of practice with regard to the adoption... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual notation design 2.0: Towards user comprehensible requirements engineering notations

    Publication Year: 2013, Page(s):115 - 124
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    The success of requirements engineering depends critically on effective communication between business analysts and end users, yet empirical studies show that business stakeholders understand RE notations very poorly. This paper proposes a novel approach to designing RE visual notations that actively involves naïve users in the process. We use i*, one of the most influential RE ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User feedback in the appstore: An empirical study

    Publication Year: 2013, Page(s):125 - 134
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3389 KB) | HTML iconHTML

    Application distribution platforms - or app stores - such as Google Play or Apple AppStore allow users to submit feedback in form of ratings and reviews to downloaded applications. In the last few years, these platforms have become very popular to both application developers and users. However, their real potential for and impact on requirements engineering processes are not yet well understood. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning from evolution history to predict future requirement changes

    Publication Year: 2013, Page(s):135 - 144
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (759 KB) | HTML iconHTML

    Managing the costs and risks of evolution is a challenging problem in the RE community. The challenge lies in the difficulty of analyzing and assessing the proneness to requirement changes across multiple versions, especially when the scale of requirements is large. In this paper, we define a series of metrics to characterize historic evolution information, and propose a novel method for predictin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing regulatory change through legal requirements coverage modeling

    Publication Year: 2013, Page(s):145 - 154
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4781 KB) | HTML iconHTML

    Developing global markets offer companies new opportunities to manufacture and sell information technology (IT) products in ways unforeseen by current laws and regulations. This innovation leads to changing requirements due to changes in product features, laws, or the locality where the product is sold or manufactured. To help developers rationalize these changes, we introduce a preliminary framew... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.