- Methods
- Practice
By search term
By topic
By tag
- Testing (9)
- Agile (29)
- Approaches (42)
- Attributes (4)
- Business Analysis (21)
- Elicitation (27)
- Estimation (5)
- Prioritization (7)
- Team (17)
- User Story (11)
- Template (3)
- Framework (10)
- Goals (8)
- Reuse (2)
- Software Engineering (9)
- Traceability (9)
- Perception (10)
- Management (14)
- Verification (6)
- Study (15)
- Development (12)
- CPRE (5)
- Automation (6)
- Documentation (20)
- Software Quality (10)
- ReqIF (1)
- Standards (6)
- Analysis (19)
- Business Value (10)
- Metrics (5)
- Validation (10)
- Modeling (14)
- Security (3)
- SysML (3)
- Stakeholder (12)
- Big Data (4)
- Opinion (15)
- Literature (4)
By author
- Howard Podeswa (3)
- Rainer Grau (2)
- Erik van Veenendaal (1)
- Cristina Palomares (1)
- Carme Quer (1)
- Xavier Franch (2)
- Mats Wessberg (1)
- Kim Lauenroth (2)
- Joseph Aracic (1)
- IREB (1)
- Jens Schirpenbach (1)
- Alexander Rachmann (1)
- Jesko Schneider (1)
- Frank Engel (1)
- Dr. Ralph R. Young (2)
- Maria-Therese Teichmann (1)
- Eva Gebetsroither (1)
- Corinna Unterfurtner (1)
- Alexandra Kreuzeder (1)
- Harry Sneed (2)
Articles
Showing 23 articles tagged with Modeling, Reuse, Security or Verification [max. 4 tags]
Strategies for building manageable requirements hierarchies in complex problem domains
- Methods
- Skills
Endeavours to improve the situation are finally rewarded
- Practice
- Cross-discipline
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
- Opinions
- Cross-discipline
This system is your system. This system is my system.
- Methods
An application of the IREB Handbook of Requirements Modeling
- Methods
- Practice
How applying Lean Startup, Design Thinking, and others, impact the task of modeling requirements
- Practice
- Methods
It seems evident to test designs or prototypes of software with end-users. But what about requirements?
- Opinions
Views of a real RE pioneer
- Methods
- Cross-discipline
The Future How Viewpoint.
- Practice
- Methods
‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
- Methods
- Skills
Evaluating Business Analysts‘ role in the Data Driven Economy
- Methods
- Practice
Smart use of constraints leads to cleaner requirements that are easy to test
- Methods
- Practice
An Example from the Automation Industry
- Practice
- Methods
Hands-on guidance for developing and managing security requirements
- Methods
How can the standard UML FSM be improved to better serve the requirements engineer?
- Methods
How modeling can be useful to better define and trace requirements
- Practice
Eliciting security requirements needs a different process
- Methods
Reverse Modeling and Up-To-Date Evolution of Functional Requirements in Alignment with Tests
- Methods
Verification and Validation of System Requirements by Animation and Automated Formal Analysis.
- Methods
A new approach for requirements validation and rigorous verification.
- Methods
Re-Use of Requirements via Libraries:
Opportunities & Approaches
Opportunities & Approaches
- Methods
- Practice
Delegation of requirement verification. A key technique for more mature requirements management.
- Studies and Research
Requirements Reuse with the PABRE Framework