2017 IEEE 25th International Requirements Engineering Conference (RE)

4-8 Sept. 2017

Filter Results

Displaying Results 1 - 25 of 93
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (3860 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (249 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - xii
    Request permission for commercial reuse | |PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Welcome Message from the Chairs

    Publication Year: 2017, Page(s):xiii - xv
    Request permission for commercial reuse | |PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s):xvi - xix
    Request permission for commercial reuse | |PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2017, Page(s):xx - xxiv
    Request permission for commercial reuse | |PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Keynote Speakers

    Publication Year: 2017, Page(s):xxv - xxviii
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (143 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Donors and Sponsors

    Publication Year: 2017, Page(s):xxix - xxx
    Request permission for commercial reuse | |PDF file iconPDF (239 KB)
    Freely Available from IEEE
  • Mining Twitter Feeds for Software User Requirements

    Publication Year: 2017, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (307 KB) | HTML iconHTML

    Twitter enables large populations of end-users of software to publicly share their experiences and concerns about software systems in the form of micro-blogs. Such data can be collected and classified to help software developers infer users' needs, detect bugs in their code, and plan for future releases of their systems. However, automatically capturing, classifying, and presenting useful tweets i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Little Bird Told Me: Mining Tweets for Requirements and Software Evolution

    Publication Year: 2017, Page(s):11 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (500 KB) | HTML iconHTML

    Twitter is one of the most popular social networks. Previous research found that users employ Twitter to communicate about software applications via short messages, commonly referred to as tweets, and that these tweets can be useful for requirements engineering and software evolution. However, due to their large number---in the range of thousands per day for popular applications---a manual analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SAFE: A Simple Approach for Feature Extraction from App Descriptions and App Reviews

    Publication Year: 2017, Page(s):21 - 30
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (421 KB) | HTML iconHTML

    A main advantage of app stores is that they aggregate important information created by both developers and users. In the app store product pages, developers usually describe and maintain the features of their apps. In the app reviews, users comment these features. Recent studies focused on mining app features either as described by developers or as reviewed by users. However, extracting and matchi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Canary: Extracting Requirements-Related Information from Online Discussions

    Publication Year: 2017, Page(s):31 - 40
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (232 KB) | HTML iconHTML

    Online discussions about software applications generate a large amount of requirements-related information. This information can potentially be usefully applied in requirements engineering; however currently, there are few systematic approaches for extracting such information. To address this gap, we propose Canary, an approach for extracting and querying requirements-related information in online... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Improving the Verifiability of Visual Notation Design Grounded in the Physics of Notations

    Publication Year: 2017, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (497 KB) | HTML iconHTML

    This paper proposes a systematic framework for applying the Physics of Notations (PoN), a theory for the design of cognitively effective visual notations. The PoN consists of nine principles, but not all principles lend themselves equally to a clear and unambiguous operationalization. As a result, many visual notations designed according to the PoN apply it in different ways. The proposed framewor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews

    Publication Year: 2017, Page(s):51 - 60
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (403 KB) | HTML iconHTML

    The requirements elicitation process often starts with an interview between a customer and a requirements analyst. During these interviews, ambiguities in the dialogic discourse may reveal the presence of tacit knowledge that needs to be made explicit. It is therefore important to understand the nature of ambiguities in interviews and to provide analysts with cognitive tools to identify and allevi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining User Rationale from Software Reviews

    Publication Year: 2017, Page(s):61 - 70
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (299 KB) | HTML iconHTML

    Rationale refers to the reasoning and justification behind human decisions, opinions, and beliefs. In software engineering, rationale management focuses on capturing design and requirements decisions and on organizing and reusing project knowledge. This paper takes a different view on rationale written by users in online reviews. We studied 32,414 reviews for 52 software applications in the Amazon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feedback Gathering from an Industrial Point of View

    Publication Year: 2017, Page(s):71 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (265 KB) | HTML iconHTML

    Feedback communication channels allow end-users to express their needs, which can be considered in software development and evolution. Although feedback gathering and analysis have been identified as an important topic and several researchers have started their investigation, information is scarce on how software companies currently elicit end-user feedback. In this study, we explore the experienc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Users — The Hidden Software Product Quality Experts?: A Study on How App Users Report Quality Aspects in Online Reviews

    Publication Year: 2017, Page(s):80 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (196 KB) | HTML iconHTML

    [Context and motivation] Research on eliciting requirements from a large number of online reviews using automated means has focused on functional aspects. Assuring the quality of an app is vital for its success. This is why user feedback concerning quality issues should be considered as well [Question/problem] But to what extent do online reviews of apps address quality characteristics? And how mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Requirements Knowledge Do Developers Need to Manage Change in Safety-Critical Systems?

    Publication Year: 2017, Page(s):90 - 99
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (455 KB) | HTML iconHTML

    Developers maintaining safety-critical systems need to assess the impact a proposed change would have upon existing safety controls. By leveraging the network of traceability links that are present in most safety-critical systems, we can push timely information about related hazards, environmental assumptions, and safety requirements to developers. In this work we take a design science approach to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Questions do Requirements Engineers Ask?

    Publication Year: 2017, Page(s):100 - 109
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (615 KB) | HTML iconHTML

    Requirements Engineering (RE) is comprised of various tasks related to discovering, documenting, and maintaining different kinds of requirements. To accomplish these tasks, a Requirements Engineer or Business Analyst needs to retrieve and combine information from multiple sources such as use case models, interview scripts, and business rules. However, collecting and analyzing all the required data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Datasets from Fifteen Years of Automated Requirements Traceability Research: Current State, Characteristics, and Quality

    Publication Year: 2017, Page(s):110 - 121
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (818 KB) | HTML iconHTML

    Software datasets play a crucial role in advancing automated software traceability research. They can be used by researchers in different ways to develop or validate new automated approaches. The diversity and quality of the datasets within a research community have a significant impact on the accuracy, generalizability, and reproducibility of the results and consequently on the usefulness and pra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Trouble with Security Requirements

    Publication Year: 2017, Page(s):122 - 133
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB) | HTML iconHTML

    Manifold approaches to security requirements engineering have been proposed, yet there is no consensus how to elicit, analyze, or express security needs. This perspective paper systematizes the problem space of security requirements engineering. Security needs result from the interplay of three dimensions: threats, security goals, and system design. Elementary statements can be made in each dimens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety-Focused Security Requirements Elicitation for Medical Device Software

    Publication Year: 2017, Page(s):134 - 143
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (466 KB) | HTML iconHTML

    Security attacks on medical devices have been shown to have potential safety concerns. Because of this, stakeholders (device makers, regulators, users, etc.) have increasing interest in enhancing security in medical devices. An effective means to approach this objective is to integrate systematic security requirements elicitation and analysis into the design and evaluation of medical device softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reinforcing Security Requirements with Multifactor Quality Measurement

    Publication Year: 2017, Page(s):144 - 153
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (265 KB) | HTML iconHTML

    Choosing how to write natural language scenarios is challenging, because stakeholders may over-generalize their descriptions or overlook or be unaware of alternate scenarios. In security, for example, this can result in weak security constraints that are too general, or missing constraints. Another challenge is that analysts are unclear on where to stop generating new scenarios. In this paper, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.