Buscar
Mostrando ítems 1-10 de 78846
Support Tool to the Validation Process of Functional Requirements
(Institute of Electrical and Electronics Engineers (IEEE), 2011-09-01)
The activity of validating identified requirements for an information system helps to improve the quality of a requirements specification document and, consequently, the success of a project. Although various different ...
Requirements Elicitation for Geo-information Solutions
(2017-01-02)
Geo-information solutions can achieve a higher level of quality if they are developed in accordance with a user-centred design that requires definition of the user requirements in the first step of solution construction. ...
Requirements engineering: Ontological analysis of its development in the literature Ingeniería de requerimientos: Análisis ontológico de su desarrollo en la literatura
(Associacao Iberica de Sistemas e Tecnologias de Informacao, 2019)
The Requirements Engineering activities have been considered as keys to the success of the Information Systems (IS) projects. A literary review of the IR would identify which areas of the discipline have been covered (birght ...
Aspects and requirements domains applied to computer security
(Universidad Inca Garcilaso de la Vega, 2014-10)
Consider developing safety critical systems is a very complex problem yet. Consider safety aspects in requirements
engineering can be an interesting solution. The aim of this paper is to present a methodology of requirements ...
The Iceberg Effect: Behind the User Interface of Mobile Collaborative Systems
(GRAZ UNIV TECHNOLGOY, INST INFORMATION SYSTEMS COMPUTER MEDIA-IICM, 2011)
Advances in mobile technologies are opening new possibilities to support collaborative activities through mobile devices. Unfortunately, mobile collaborative systems have been difficult to conceive, design and implement. ...
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Support Tool to the Validation Process of Functional Requirements
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2011)
The activity of validating identified requirements for an information system helps to improve the quality of a requirements specification document and, consequently, the success of a project. Although various different ...
Support Tool to the Validation Process of Functional Requirements
(Institute of Electrical and Electronics Engineers (IEEE), 2011-09-01)
The activity of validating identified requirements for an information system helps to improve the quality of a requirements specification document and, consequently, the success of a project. Although various different ...
Influence of Process Models on Requirement Volatility, and Strategies for its Management: An Empirical Investigation
(Centro Latinoamericano de Estudios en Informática, 2011)