Buscar
Mostrando ítems 11-20 de 187117
Support Tool to the Validation Process of Functional Requirements
(Institute of Electrical and Electronics Engineers (IEEE), 2011-09-01)
The activity of validating identified requirements for an information system helps to improve the quality of a requirements specification document and, consequently, the success of a project. Although various different ...
Influence of Process Models on Requirement Volatility, and Strategies for its Management: An Empirical Investigation
(Centro Latinoamericano de Estudios en Informática, 2011)
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Aspects and requirements domains applied to computer security
(Universidad Inca Garcilaso de la Vega, 2014-10)
Consider developing safety critical systems is a very complex problem yet. Consider safety aspects in requirements
engineering can be an interesting solution. The aim of this paper is to present a methodology of requirements ...
Support Tool to the Validation Process of Functional Requirements
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Requirements engineering: Ontological analysis of its development in the literature Ingeniería de requerimientos: Análisis ontológico de su desarrollo en la literatura
(Associacao Iberica de Sistemas e Tecnologias de Informacao, 2019)
The Requirements Engineering activities have been considered as keys to the success of the Information Systems (IS) projects. A literary review of the IR would identify which areas of the discipline have been covered (birght ...
A Risk Identification Technique for Requirements Assessment
(Universidade Federal de Pernambuco, 2015)
Computational support for the process of software requirement specification
(Ieee, 2012-01-01)
The software industry has become more and more concerned with the appropriate application of activities that composes requirement engineering as a way to improve the quality of its products. In order to support these ...