default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 3,892 matches
- 2025
- Oleksandr Kosenkov, Parisa Elahidoost, Tony Gorschek, Jannik Fischbach, Daniel Méndez, Michael Unterkalmsteiner, Davide Fucci, Rahul Mohanani:
Systematic mapping study on requirements engineering for regulatory compliance of software systems. Inf. Softw. Technol. 178: 107622 (2025) - Yi Wang, Chetan Arora, Xiao Liu, Thuong Hoang, Vasudha Malhotra, Ben Cheng, John C. Grundy:
Who uses personas in requirements engineering: The practitioners' perspective. Inf. Softw. Technol. 178: 107609 (2025) - 2024
- Thorsten Koch:
Specification and verification of security protocols and their utilization in scenario-based requirements engineering. Paderborn University, Germany, 2024 - Angela Borchert:
Software Development for Supporting Trustworthiness Assessment in Computer-Mediated Introduction: A Requirements Engineering Approach. University of Duisburg-Essen, Germany, 2024 - Philipp G. Hoffmann:
Data-driven requirements elicitation: an automated end-user feedback analytics approach and implications for enterprise software requirements engineering. University of Mannheim, Germany, 2024, pp. 1-222 - Melanie Schmedes:
Praxisorientierte Ansätze für die Erstellung und Anpassung von Vision Videos zur Unterstützung der Visionskommunikation im Requirements Engineering. Leibniz University Hannover, Germany, Logos Verlag Berlin 2024, ISBN 978-3-8325-5777-5, pp. 1-168 - Steven Schmidt:
Entwicklung eines generischen Requirements Engineering Frameworks für digitale Services unter Berücksichtigung der Rolle der Vertrauenswürdigkeit. Otto-von-Guericke University Magdeburg, Germany, Shaker 2024, ISBN 978-3-8440-9523-4, pp. 1-218 - Sajid Anwer, Lian Wen, Mahmood Ul Hassan, Zhe Wang, Amin A. Al-Awady, Yahya Ali Abdelrahman Ali:
BERDD: A Behaviour Engineering-Based Approach for Requirements Defects Detection. IEEE Access 12: 24368-24386 (2024) - Muhammad Binsawad, Bilal Khan:
FEPP: Advancing Software Risk Prediction in Requirements Engineering Through Innovative Rule Extraction and Multi-Class Integration. IEEE Access 12: 59851-59860 (2024) - Asma Fariha, Sanaa A. Alwidian, Akramul Azim:
A Systematic Literature Review on Requirements Engineering and Maintenance for Embedded Software. IEEE Access 12: 114263-114279 (2024) - Guntur Budi Herwanto, Fajar J. Ekaputra, Gerald Quirchmayr, A Min Tjoa:
Toward a Holistic Privacy Requirements Engineering Process: Insights From a Systematic Literature Review. IEEE Access 12: 47518-47542 (2024) - Guntur Budi Herwanto, Gerald Quirchmayr, A Min Tjoa:
Leveraging NLP Techniques for Privacy Requirements Engineering in User Stories. IEEE Access 12: 22167-22189 (2024) - Thiago Medeiros de Menezes, Ana Carolina Salgado:
Using Logs to Reduce the Impact of Process Variability and Dependence on Practitioners in Requirements Engineering for Traditional Business Process Automation Software. IEEE Access 12: 192874-192893 (2024) - Johan Fanas Rojas, Pritesh Patil, Alexandra M. Masterson, Thomas H. Bradley, Ali Riza Ekti, Zachary D. Asher:
Automated Vehicle Lane Centering System Requirements Informed by Resilience Engineering and a Solution Using Infrastructure-Based Sensors. IEEE Access 12: 97605-97620 (2024) - Christina Antoniou, Nick Bassiliades:
Α tool for requirements engineering using ontologies and boilerplates. Autom. Softw. Eng. 31(1): 5 (2024) - Roxana Lisette Quintanilla Portugal, Leandro Antonelli, Sabrina Marczak, Graciela Dora Susana Hadad, Jaelson Castro, Julio César Sampaio P. Leite:
Requirements Engineering in Latin America: The Case of the WER. Commun. ACM 67(8): 47-48 (2024) - Yongbing Feng, Guohua Gao, Pengyu Wang, Mengyu Fu, Zihua Zhang:
Towards model-based requirements engineering: Construction method of stakeholder value networks model based on MBSE. Comput. Ind. Eng. 195: 110398 (2024) - Farkhanda Qamar, Naveed Ikram:
Improving monitoring and evaluation of undergraduate curriculum: A case of Software Requirements Engineering course. Educ. Inf. Technol. 29(11): 13683-13711 (2024) - Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Ingo Mueller:
The Impact of Personality on Requirements Engineering Activities: A Mixed-Methods Study. Empir. Softw. Eng. 29(1): 32 (2024) - Nuno Marques, Rodrigo Rocha Silva, Jorge Bernardino:
Using ChatGPT in Software Requirements Engineering: A Comprehensive Review. Future Internet 16(6): 180 (2024) - Damjan Fujs:
Concurrent Consideration of Technical and Human Aspects in Security Requirements Engineering. Informatica (Slovenia) 48(2) (2024) - Tong Li, Xinran Zhang, Yunduo Wang, Qixiang Zhou, Yiting Wang, Fangqi Dong:
Machine learning for requirements engineering (ML4RE): A systematic literature review complemented by practitioners' voices from Stack Overflow. Inf. Softw. Technol. 172: 107477 (2024) - Shahrokh Vahabi, Amir Hozhabri:
Automatic use case classification based on topic grouping for requirements engineering. Innov. Syst. Softw. Eng. 20(1): 85-96 (2024) - Gretchen Torres de Macedo, Awdren de Lima Fontão, Bruno Gadelha:
Building soft skills through a role-play based approach for Requirements Engineering remote education. J. Braz. Comput. Soc. 30(1): 1-16 (2024) - Khan Mohammad Habibullah, Hans-Martin Heyn, Gregory Gay, Jennifer Horkoff, Eric Knauss, Markus Borg, Alessia Knauss, Håkan Sivencrona, Polly Jing Li:
Requirements and software engineering for automotive perception systems: an interview study. Requir. Eng. 29(1): 25-48 (2024) - Chin Khor, Robyn R. Lutz:
Enhancing the requirements engineering of configurable systems by the ongoing use of variability models. Requir. Eng. 29(3): 303-328 (2024) - Claudia Negri-Ribalta, Marius Lombard-Platet, Camille Salinesi:
Understanding the GDPR from a requirements engineering perspective - a systematic mapping study on regulatory data protection requirements. Requir. Eng. 29(4): 523-549 (2024) - Muhammad Aminu Umar, Kevin Lano:
Advances in automated support for requirements engineering: a systematic literature review. Requir. Eng. 29(2): 177-207 (2024) - Umm-e-Habiba, Markus Haug, Justus Bogner, Stefan Wagner:
How mature is requirements engineering for AI-based systems? A systematic mapping study on practices, challenges, and future research directions. Requir. Eng. 29(4): 567-600 (2024) - Saima Zareen, Syed Muhammad Anwar:
BPMN extension evaluation for security requirements engineering framework. Requir. Eng. 29(2): 261-278 (2024)
skipping 3,862 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-15 11:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint