By search term

By author

Articles

Showing 15 articles tagged with ReqIF, Reuse, Security or Software Quality [max. 4 tags]

  • Methods
Automated Quality Assurance
Automated Quality Assurance of Software Requirements. The following contribution deals with the automated assurance of software requirements quality.
  • Methods
KCycle: Knowledge-Based & Agile Software Quality Assurance
An approach for iterative and requirements-based quality assurance in DevOps
  • Methods
Opportunities & Approaches
Re-Use of Requirements via Libraries:
Opportunities & Approaches
  • Methods
Tracing Change Requests
From Requirements to Code
  • Practice
Agility and Obligation
Part 1: Why Fixed Price Projects Fail
  • Practice
Agility and Obligation
Part 2: The Art of Assigning Software Development
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
  • Methods
Discover Quality Requirements with the Mini-QAW
A short and fun elicitation workshop for Agile teams and architects
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Practice
  • Opinions
Managing the Invisible
Ensuring Software Quality beyond Micromanagement
  • Practice
  • Opinions
Mastering Business Requirements
Insights for 13 crucial challenges
  • Practice
  • Cross-discipline
Mission Possible
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
  • Practice
Open Up
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
  • Studies and Research
Requirements Reuse
Requirements Reuse with the PABRE Framework
Title Topic Author Date Reading time

Automated Quality Assurance

Methods
21 minutes

KCycle: Knowledge-Based & Agile Software Quality Assurance

Methods
16 minutes

Opportunities & Approaches

Methods
9 minutes

Tracing Change Requests

Methods
26 minutes

Interview with John Mylopoulos

Opinions
4 minutes

Agility and Obligation

Practice
12 minutes

Agility and Obligation

Practice
10 minutes

Cyber Security Requirements Engineering

Practice Methods
14 minutes

Discover Quality Requirements with the Mini-QAW

Practice Methods
15 minutes

Building in security instead of testing it in

Practice
14 minutes

Managing the Invisible

Practice Opinions
13 minutes

Mastering Business Requirements

Practice Opinions
2 minutes

Mission Possible

Practice Cross-discipline
11 minutes

Open Up

Practice
21 minutes

Requirements Reuse

Studies and Research
22 minutes