


default search action
24th RE 2016: Beijing, China - Workshops
- 24th IEEE International Requirements Engineering Conference, RE 2016, Beijing, China, September 12-16, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4121-3

Third International Workshop on Artificial Intelligence for Requirements Engineering (AIRE)
- Fabiano Dalpiaz, Henning Femmer

, Jin Guo:
Welcome to the Third International Workshop on Artificial Intelligence for Requirements Engineering (AIRE'16). 1 - Lorijn van Rooijen, Heiko Hamann:

Requirements Specification-by-Example Using a Multi-objective Evolutionary Algorithm. 3-9 - Joseph Gillain, Ivan Jureta, Stéphane Faulkner:

Planning Optimal Agile Releases via Requirements Optimization. 10-16 - Özgür Kafali, Nirav Ajmeri

, Munindar P. Singh
:
Formal Understanding of Tradeoffs among Liveness and Safety Requirements. 17-18 - Jaspreet Bhatia, Morgan C. Evans, Sudarshan Wadkar, Travis D. Breaux:

Automated Extraction of Regulated Information Types Using Hyponymy Relations. 19-25 - Brian Arendse, Garm Lucassen:

Toward Tool Mashups: Comparing and Combining NLP RE Tools. 26-31 - Luis Hernán García Paucar, Nelly Bencomo:

The Reassessment of Preferences of Non-functional Requirements for Better Informed Decision-Making in Self-Adaptation. 32-38 - Jonas Winkler, Andreas Vogelsang:

Automatic Classification of Requirements Based on Convolutional Neural Networks. 39-45 - Eya Ben Charrada:

Which One to Read? Factors Influencing the Usefulness of Online Reviews for RE. 46-52
Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
- Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:

Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). 53 - Lin Liu:

Security and Privacy Requirements Engineering Revisited in the Big Data Era (Keynote). 55
Security Requirements for Guidelines and Policies
- Manuel Rudolph, Cornelius Moucha, Denis Feth:

A Framework for Generating User-and Domain-Tailored Security Policy Editors. 56-61 - Maria Riaz, Sarah Elder, Laurie A. Williams:

Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements. 62-67 - Mohsen Ahmadvand, Amjad Ibrahim:

Requirements Reconciliation for Scalable and Secure Microservice (De)composition. 68-73
Tools and Technology Based Security and Privacy Requirements
- Dan Ionita, Roeland H. P. Kegel, Andrei Baltuta, Roel J. Wieringa:

ArgueSecure: Out-of-the-Box Security Risk Assessment. 74-79 - Zeineb Zhioua, Yves Roudier, Stuart Short, Rabéa Ameur-Boulifa:

Security Guidelines: Requirements Engineering for Verifying Code Quality. 80-85 - Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo:

Literature Survey on Technologies for Developing Privacy-Aware Software. 86-91
First Workshop on Requirements Engineering for Investigating and Countering Crime (iRENIC)
- Dalal Alrajeh, Liliana Pasquale:

Welcome to the First Workshop on Requirements Engineering for Investigating and Countering Crimes (iRENIC 2016). 92
Short Papers
- Hashem Dehghanniri, Hervé Borrion:

Toward a More Structured Crime Scripting Method. 94-97 - Nesrin Hussein, Wentao Wang, Joseph L. Nedelec, Xuetao Wei, Nan Niu:

Unified Profiling of Attackers via Domain Modeling. 98-101 - Thein Than Tun, Blaine A. Price, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:

Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. 102-105
Long Papers
- Jean-Christophe Deprez

, Christophe Ponsard, Nikolaos Matskanis:
A Goal-Oriented Requirements Analysis for the Collection, Use and Exchange of Electronic Evidence across EU Countries. 106-113 - Joshua Gray, Virginia N. L. Franqueira

, Yijun Yu
:
Forensically-Sound Analysis of Security Risks of Using Local Password Managers. 114-121
Sixth International Workshop on Model-Driven Requirements Engineering (MoDRE)
- Ana Moreira

, Gunter Mussbacher, João Araújo
, Pablo Sánchez
:
Welcome to the Sixth International Workshop on Model-Driven Requirements Engineering (MoDRE). 122
Goal Modelling & Security
- Aprajita, Gunter Mussbacher:

TimedGRL: Specifying Goal Models Over Time. 125-134 - Liang Xiao, John Fox:

Goal Modelling in Clinical Decision Support. 135-144 - Cristiano De Faveri, Ana Moreira

, João Araújo
, Vasco Amaral
:
Towards Security Modeling of e-Voting Systems. 145-154 - Mattia Salnitri, Elda Paja, Paolo Giorgini:

Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution. 155-164
Traceability and Synchronization
- Stefan Kugele, Daniel Antkowiak:

Visualization of Trace Links and Change Impact Analysis. 165-169 - Weize Zhao, Haiyan Zhao, Zhenjiang Hu:

A Framework for Synchronization Between Feature Configurations and Use Cases Based on Bidirectional Programming. 170-179
Empirical Research
- Chuan He, Gunter Mussbacher:

Model-Driven Engineering and Elicitation Techniques: A Systematic Literature Review. 180-189 - Raphaël Faudou, Jean-Michel Bruel:

An Industrial Feedback on Model-Based Requirements Engineering in Systems Engineering Context. 190-199
Sustainability Track
- Christophe Ponsard, Renaud De Landtsheer, Gustavo Ospina:

Towards a Quantitative Assessment of Supply Chain Sustainability Using Queries over Model Simulations. 200-207 - José María Conejero, Isabel Sofia Brito

, Ana Moreira
, Jácome Cunha
, João Araújo
:
Modeling the Impact of UAVs in Sustainability. 208-216
Ninth International Workshop on Requirements Engineering and Law (RELAW)
- Daniel Amyot

, Sepideh Ghanavati
, Aaron K. Massey, Wei-Tek Tsai:
Welcome to the Ninth International Workshop on Requirements Engineering and Law (RELAW). 217
Traceability, Compliance, and Effectiveness in Industry
- Dagny Hauksdottir, Brian Ritsing, Jens Christian Andersen, Niels Henrik Mortensen

:
Establishing Reusable Requirements Derived from Laws and Regulations for Medical Device Development. 220-228 - Lamartine da Silva Barboza, Gilberto A. de A. Cysneiros Filho, Ricardo A. C. de Souza:

Towards Legal Compliance in IT Procurement Planning in Brazil's Federal Public Administration. 229-238 - Carlos Henrique C. Duarte

:
The Influence of Tax Incentive and Market Regulation Requirements on IT Companies: Empirical Evidence from the Brazilian Industry. 239-248
Modeling and Analysis
- Robert Muthuri, Guido Boella, Joris Hulstijn, Llio Humphreys:

Argumentation-Based Legal Requirements Engineering: The Role of Legal Interpretation in Requirements Acquisition. 249-258 - Özgür Kafali, Nirav Ajmeri

, Munindar P. Singh
:
Normative Requirements in Sociotechnical Systems. 259-260
Privacy
- Richard Rutledge, Aaron K. Massey, Annie I. Antón:

Privacy Impacts of IoT Devices: A SmartTV Case Study. 261-270 - Michael Colesky, Sepideh Ghanavati:

Privacy Shielding by Design - A Strategies Case for Near-Compliance. 271-275
Sixth International Workshop on Requirements Patterns (RePa)
- Lawrence Chung, Sylwia Kopczynska

, Julio César Sampaio do Prado Leite, Sam Supakkul, Liping Zhao:
Welcome to the Sixth International Workshop on Requirements Patterns (RePa). 276 - Pericles Loucopoulos:

Capability Modeling as a Strategic Analysis Tool: Keynote Extended Abstract. 278-280 - Ye Wang, Bo Jiang, Ting Wang:

Using Workflow Patterns to Model and Validate Service Requirements. 281-288 - Feng Chen, Norah Power, J. J. Collins:

A Stakeholder Contribution Pattern in Requirements Decision-Making: An Empirical Study in Enterprise Development. 289-295 - Xiaohong Chen, Li Han, Jing Liu, Haiying Sun:

Using Safety Requirement Patterns to Elicit Requirements for Railway Interlocking Systems. 296-303 - Roxana Lisette Quintanilla Portugal, Julio César Sampaio do Prado Leite

:
Extracting Requirements Patterns from Software Repositories. 304-307 - Jonas Eckhardt, Andreas Vogelsang, Henning Femmer:

An Approach for Creating Sentence Patterns for Quality Requirements. 308-315 - Jingjing Ji, Rong Peng:

An Analysis Pattern Driven Requirements Modeling Method. 316-319
Ninth International Workshop on Software Product Management (IWSPM)
- Garm Lucassen, Farnaz Fotrousi, Andrey Maglyas:

Welcome to the Ninth International Workshop on Software Product Management (IWSPM 2016). 320 - David Callele

, Krzysztof Wnuk:
A Process for Product and Service Definition. 322-327 - Samuel A. Fricker:

Systematic Mapping of Technology-Enabled Product Innovations. 328-333 - Zahra Shakeri Hossein Abad

, Alex Shymka, Susant Pant, Ashley Currie, Guenther Ruhe:
What are Practitioners Asking about Requirements Engineering? An Exploratory Analysis of Social Q&A Sites. 334-343 - Johan Linåker

, Krzysztof Wnuk:
Requirements Analysis and Management for Benefiting Openness. 344-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














