Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

Proceedings IEEE Joint International Conference on Requirements Engineering

9-13 Sept. 2002

Filter Results

Displaying Results 1 - 25 of 54
  • Proceedings IEEE Joint International Conference on Requirements Engineering

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (322 KB)
    Freely Available from IEEE
  • Managing (requirements) evolutions of high assurance systems

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Summary form only given. Long lifetime high assurance systems (HAS) present, among others, a peculiar property: evolutions are numerous. Because current standards for producing such HAS are not accurate enough regarding evolutions, we have considered that all the artefacts, which are produced during their development, should be recorded. Recording artefacts means developing an IS. By applying well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model based requirements engineering for embedded software

    Publication Year: 2002
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB)

    Summary form only given. Software and systems development within the embedded area is dominated by model based design techniques. These techniques are commonly aligned to standard. modeling languages such as UML. Along with software and systems design techniques the concern of requirements management methodologies has been continuously increasing, with the aim of improving the overall development ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements management in a product line scenario

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB)

    Summary form only given. The product line approach is a major reuse concept that has shown concrete commercial results over the past years. Product lines achieve reuse in the functionality and solution space, and thus improve quality, cycle time and cost. They are specifically promising in cases where many variants are produced almost simultaneously, such as in telecommunication systems. Though ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of stakeholders' geographical distribution on managing requirements in a multi-site organization

    Publication Year: 2002, Page(s):319 - 328
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (935 KB) | HTML iconHTML

    The increasing globalization of software industry demands an investigation of requirements engineering (RE) in multisite software development organizations. Requirements engineering is a task difficult enough when done locally-but it is even more difficult when cross-functional stakeholder groups specify requirements across cultural, language and time zone boundaries. This paper reports on a field... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):357 - 358
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Analyzing Website privacy requirements using a privacy goal taxonomy

    Publication Year: 2002, Page(s):23 - 31
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Privacy has recently become a prominent issue in the context of electronic commerce websites. Increasingly, Privacy policies posted on such websites are receiving considerable attention from the government and consumers. We have used goal-mining, to extract pre-requirements goals from post-requirements text artifacts, as a technique for analyzing privacy policies. The identified goals are useful f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AGORA: attributed goal-oriented requirements analysis method

    Publication Year: 2002, Page(s):13 - 22
    Cited by:  Papers (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    This paper presents an extended version of the goal-oriented requirements analysis method called AGORA, where attribute values, e.g. contribution values and preference matrices, are added to goal graphs. An analyst attaches contribution values and preference values to edges and nodes of a goal graph respectively during the process for refining and decomposing the goals. The contribution value of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering: how do you know how good you are?

    Publication Year: 2002, Page(s):194 - 195
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Organisations are seeking to improve the way they undertake engineering activities. There are numerous ways of doing this, one of which is to undertake an on-going process, or capability, enhancement activity. Praxis Critical Systems Limited provides support for such activity based primarily around the REVEAL® requirements engineering method. By providing customised training and coaching in RE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing product requirements for medical IT products

    Publication Year: 2002, Page(s):341 - 349
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    In this paper we shall describe our experiences over several years in improving the product requirements management process in an industrial environment where information technology products are made for use in hospitals and clinics. Central to our approach is that we have introduced an improved product requirements management process and supporting tools on a step-by-step basis. This policy of "e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk management in challenging business software projects

    Publication Year: 2002, Page(s):8 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Today's business processes are dealing with sophisticated business-to-business relationships and elaborate software integrations in order to allow all application systems along the process chain to communicate and cooperate with each other. This makes business software projects increasingly complex and creates risks ranging from overspending to project failure. During the last few years several me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reference Point Method: requirements-based ICT convergence solution development

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    The Reference Point Method has been developed by T-Systems as an overall approach for making the complexity in developing ICT convergence solutions manageable. It is based heavily on requirements engineering at the level of business process architecture, technology neutral architecture, technology specific architecture, and telecom architecture. The integration of all these architecture levels is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The product line mapping approach to defining and structuring product portfolios

    Publication Year: 2002, Page(s):219 - 226
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    A key activity in product line development is to define and structure the product portfolio which shall be the basis for product line development. We present an approach that aims at supporting this activity. This approach also provides a conceptual structuring of the product line in terms of the features and technical domains that are relevant to it. This structure then provides a basis for the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-faceted requirements modeling

    Publication Year: 2002, Page(s):112 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Modern systems engineering mandates the integration of heterogeneous models in systems design and analysis. Analysis of modern, mixed technology systems requires the horizontal integration of heterogeneous models for predictive analysis. The ever increasing role of performance constraints such as power, cost and throughput requires vertical integration of heterogeneous component models describing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering in automotive development-experiences and challenges

    Publication Year: 2002, Page(s):331 - 340
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    This paper summarizes problems, solutions and challenges of requirements engineering gained from the development of software-based automotive systems at DaimlerChrysler. The technical domains covered include telematics and entertainment, body electronics and chassis control for both passenger cars and commercial vehicles. Experiences include domain-specific issues, which are related to the differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Converging on the optimal attainment of requirements

    Publication Year: 2002, Page(s):263 - 270
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Planning for the optimal attainment of requirements is an important early lifecycle activity. However, such planning is difficult when dealing with competing requirements, limited resources, and the incompleteness of information available at requirements time. A novel approach to requirements optimization is described. A requirements interaction model is executed to randomly sample the space of op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing requirements engineering: how to make a cultural change happen in practice

    Publication Year: 2002, Page(s):43 - 51
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Introducing requirements engineering appears to involve a cultural change in organizations. Such a cultural change requires that requirements are defined and managed systematically, not only from a technical point of view, but also from the customers' and users' points of view. This paper describes experiences gained from four Finnish organizations that have started to introduce requirements engin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements, architectures and risks

    Publication Year: 2002, Page(s):6 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Modern software development processes, like the Rational Unified Process, prescribe an iterative approach to software development. A fundamental assumption of an iterative process is that system requirements don't have to be completely understood to commence development. At first glance the assumption that one can start developing a system without completely understanding its requirements seems pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool-based risk management made practical

    Publication Year: 2002
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Risk management has become one of the buzz words in the IT industry. The reasons can especially be found in the current economic crisis. While risk management is highly accepted in safety-critical industries (aerospace, healthcare), more and more branches (Web agencies, e-commerce, software in general) see the value of establishing risk management processes. As risk management seems to be clear fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis beyond UML

    Publication Year: 2002
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB)

    In spite of being a de facto standard for analysis and design, UML has some obvious shortcomings: the UML definition is at best semi-formal, the set of result types is far too large and heterogeneous, the tool-support is not satisfactory. If this is true how do people get on with UML? How do they use it in their every day work? At sd&m (a medium size software company in Munich, Germany) we conduct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quality-model-based approach for describing and evaluating software packages

    Publication Year: 2002, Page(s):104 - 111
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Selection of software packages from user requirements is a central task in software engineering. Selection of inappropriate packages may compromise business processes and may interfere negatively in the functioning of the involved organization. Success of package selection is endangered because of many factors, one of the most important being the absence of structured descriptions of both package ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements patterns for embedded systems

    Publication Year: 2002, Page(s):127 - 136
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    In software engineering, design patterns propose solution skeletons for common design problems. The solution skeleton is described in such a way that the design can be used for other projects, where each application tailors the design to specific project constraints. This paper describes research into investigating how a similar approach to reuse can be applied to requirements specifications, whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validating functional system requirements with scenarios

    Publication Year: 2002, Page(s):181 - 188
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    This paper addresses the problem of requirements engineering for complex socio-technical systems where an optimal set of technology components and human operators have to be selected to achieve system goals. Goals are achieved by tasks that are expressed as operational scenarios with variations in environmental conditions. The approach taken is to develop a probabilistic model of system reliabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ambiguity and what to do about it [requirements engineering]

    Publication Year: 2002
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB)

    A major concern of most software customers, managers, and requirements engineers is to remove ambiguity in communication of requirements and specifications. The most obvious solution is to try to anticipate all possible misunderstandings and write the requirements perfectly precisely. In practice, this does not work. This talk explains why it does not work, and offers easy, inexpensive methods for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using maturity assessments to understand the ERP requirements engineering process

    Publication Year: 2002, Page(s):255 - 262
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Applying standard requirements engineering (RE) processes is a major trend in today's enterprise resource planning (ERP) software engineering. It emerged five years ago with the promise to provide a mechanism helping ERP project organizations deliver their business requirements timely and within budget. This paper looks in depth at a standard ERP RE process and seeks answers to four questions: how... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.