Articles

Showing 22 articles tagged with Analysis, Security, Software Quality or Verification [max. 4 tags]

  • Methods
  • Cross-discipline
ReqInspector
An Approach for the Inspection of the Completeness of individual Software Requirements Specifications by Semantic Analysis of the Argument Structures
  • Methods
Is there something missing?
Using verbs’ valency to improve requirements’ quality
  • Methods
  • Opinions
Challenges in the elicitation and determination of precise requirements from animal stakeholders
How to use requirements gathering techniques to determine product requirements from non-verbal subjects
  • Practice
  • Methods
Discover Quality Requirements with the Mini-QAW
A short and fun elicitation workshop for Agile teams and architects
  • Methods
Tracing Change Requests
From Requirements to Code
  • Practice
  • Cross-discipline
Biased Toddlers
How bias will affect even the simplest of specifications
  • Methods
KCycle: Knowledge-Based & Agile Software Quality Assurance
An approach for iterative and requirements-based quality assurance in DevOps
  • Methods
  • Practice
Modeling Requirements and Context as a means for Automated Requirements Validation
An Example from the Automation Industry
  • Practice
  • Opinions
Managing the Invisible
Ensuring Software Quality beyond Micromanagement
  • Methods
  • Studies and Research
How Requirements Engineering can benefit from crowds
Driving innovation with crowd-based techniques
  • Methods
  • Skills
The Genius Toddler Challenge
How to create awareness for some of the difficulties requirements engineers face
  • Studies and Research
RE in Agile Projects: Survey Results
Results of research project announced in a previous issue.
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Methods
A Finite State Machine Model for Requirements Engineering
How can the standard UML FSM be improved to better serve the requirements engineer?
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Practice
Agility and Obligation
Part 2: The Art of Assigning Software Development
  • Practice
Agility and Obligation
Part 1: Why Fixed Price Projects Fail
  • Methods
Advance
Verification and Validation of System Requirements by Animation and Automated Formal Analysis.
  • Methods
Rigorous Verification
A new approach for requirements validation and rigorous verification.
  • Practice
Product Management
Effective product management is the critical success factor to make a product successful – across its life-cycle and across markets.
  • Methods
Automated Quality Assurance
Automated Quality Assurance of Software Requirements. The following contribution deals with the automated assurance of software requirements quality.
  • Methods
  • Practice
A key technique
Delegation of requirement verification. A key technique for more mature requirements management.