Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)

12-16 Sept. 2016

Filter Results

Displaying Results 1 - 25 of 64
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1584 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Welcome to the Workshops at the 24th IEEE International Requirements Engineering Conference

    Publication Year: 2016, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Welcome to the Third International Workshop on Artificial Intelligence for Requirements Engineering (AIRE'16)

    Publication Year: 2016, Page(s):1 - i
    Request permission for commercial reuse | PDF file iconPDF (355 KB)
    Freely Available from IEEE
  • Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)

    Publication Year: 2016, Page(s):53 - i
    Request permission for commercial reuse | PDF file iconPDF (350 KB)
    Freely Available from IEEE
  • Welcome to the First Workshop on Requirements Engineering for Investigating and Countering Crimes (iRENIC 2016)

    Publication Year: 2016, Page(s):92 - i
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Welcome to the Sixth International Workshop on Model-Driven Requirements Engineering (MoDRE)

    Publication Year: 2016, Page(s):122 - ii
    Request permission for commercial reuse | PDF file iconPDF (361 KB)
    Freely Available from IEEE
  • Welcome to the Ninth International Workshop on Requirements Engineering and Law (RELAW)

    Publication Year: 2016, Page(s):217 - ii
    Request permission for commercial reuse | PDF file iconPDF (351 KB)
    Freely Available from IEEE
  • Welcome to the Sixth International Workshop on Requirements Patterns (RePa)

    Publication Year: 2016, Page(s):276 - i
    Request permission for commercial reuse | PDF file iconPDF (340 KB)
    Freely Available from IEEE
  • Welcome to the Ninth International Workshop on Software Product Management (IWSPM 2016)

    Publication Year: 2016, Page(s):320 - i
    Request permission for commercial reuse | PDF file iconPDF (351 KB)
    Freely Available from IEEE
  • Donors and sponsors

    Publication Year: 2016, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • Requirements Specification-by-Example Using a Multi-objective Evolutionary Algorithm

    Publication Year: 2016, Page(s):3 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    A task at the beginning of the software development process is the creation of a requirements specification. The requirements specification is usually created by a software engineering expert. We try to substitute this expert by a domain expert (the user) and formulate the problem of creating requirements specifications as a search-based software engineering problem. The domain expert provides onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning Optimal Agile Releases via Requirements Optimization

    Publication Year: 2016, Page(s):10 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    This paper focuses on improving requirements quality in agile projects by determining requirements prioritization. Current methods suggest to take into account business value in order to determine the requirements priority rank. In practice it was observed that many other factors enter into the equation, such as implementation cost and functionality dependencies. Since agile methods suggest that p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Understanding of Tradeoffs among Liveness and Safety Requirements

    Publication Year: 2016, Page(s):17 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    Understanding tradeoffs among stakeholder requirements regarding liveness (something good happens) and safety (nothing bad happens) is crucial for designing sociotechnical systems (STSs). Safety-focused specifications restrict agents' actions to avoid undesired executions. However, such restrictions hinder liveness. We formalize such tradeoffs using the elements of an STS specification to understa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Extraction of Regulated Information Types Using Hyponymy Relations

    Publication Year: 2016, Page(s):19 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Requirements analysts can model regulated data practices to identify and reason about risks of non-compliance. If terminology is inconsistent or ambiguous, however, these models and their conclusions will be unreliable. To study this problem, we investigated an approach to automatically construct an information type ontology by identifying information type hyponymy in privacy policies using Tregex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Tool Mashups: Comparing and Combining NLP RE Tools

    Publication Year: 2016, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Over 50 papers present natural language processing tools for improving the quality of requirements. However, few of these are adopted by industry. Even worse, most of them are no longer publicly available or supported by their creators. The few available and actively maintained tools exhibit some outstanding features, but also include sub-optimal functionalities. In this paper, we compare the perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reassessment of Preferences of Non-functional Requirements for Better Informed Decision-Making in Self-Adaptation

    Publication Year: 2016, Page(s):32 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1004 KB) | HTML iconHTML

    Decision-making requires the quantification and trade-off of multiple non-functional requirements (NFRs) and the analysis of costs and benefits between alternative solutions. Different techniques have been used to specify utility preferences for NFRs and decision-making strategies of self-adaptive systems (SAS). These preferences are defined during design-time. It is well known that correctly iden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Classification of Requirements Based on Convolutional Neural Networks

    Publication Year: 2016, Page(s):39 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    The results of the requirements engineering process are predominantly documented in natural language requirements specifications. Besides the actual requirements, these documents contain additional content such as explanations, summaries, and figures. For the later use of requirements specifications, it is important to be able to differentiate between legally relevant requirements and other auxili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Which One to Read? Factors Influencing the Usefulness of Online Reviews for RE

    Publication Year: 2016, Page(s):46 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Reviews for software products contain much information about the users' requirements and preferences, which can be very useful to the requirements engineer. However, taking advantage of this information is not easy due to the large and overwhelming number of reviews that is posted in various channels. Machine learning and opinion mining techniques have therefore been used to process the reviews au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and Privacy Requirements Engineering Revisited in the Big Data Era

    Publication Year: 2016, Page(s): 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    The world is witnessing exploding interests in big data and its analytics, which makes data a critical and relevant asset more than ever for today's organizations. However, without a proper understanding to security and privacy requirements, data might hardly be used to its full power. Data owners and users can be in risk in terms of information security and privacy when sharing their data and run... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Generating User-and Domain-Tailored Security Policy Editors

    Publication Year: 2016, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (851 KB) | HTML iconHTML

    In modern enterprises, incorrect or inconsistent security policies can lead to massive damage, e.g., through unintended data leakage. As policy authors have different skills and background knowledge, usable policy editors have to be tailored to the author's individual needs and to the corresponding application domain. However, the development of individual policy editors and the customization of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements

    Publication Year: 2016, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB)

    The security community has established a number of knowledge sources, including security catalogues and controls, that capture security expertise and can support elicitation of security requirements. Providing additional guidance on how and when to leverage the security information available in the existing knowledge sources in the context of the given system can support security requirements engi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.