Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2012
- Assia Alexandrova:
Business requirements analysis and development for legacy system replacement projects in government organizations. RE 2012: 337-340 - David Ameller, Claudia P. Ayala, Jordi Cabot, Xavier Franch:
How do software architects consider non-functional requirements: An exploratory study. RE 2012: 41-50 - David Ameller, Oriol Collell, Xavier Franch:
ArchiTech: Tool support for NFR-guided architectural decision-making. RE 2012: 315-316 - Daniel Amyot, Stéphane Leblanc, Jason Kealey, Jörg Kienzle:
Concern-driven development with jUCMNav. RE 2012: 319-320 - Silky Arora, Prahladavaradan Sampath, S. Ramesh:
Resolving uncertainty in automotive feature interactions. RE 2012: 21-30 - Willem Bekkers, Sjaak Brinkkemper, Lucas van den Bemd, Frederik Mijnhardt, Christoph Wagner, Inge van de Weerd:
Evaluating the Software Product Management Maturity Matrix. RE 2012: 51-60 - Brian Berenbach, Florian Schneider, Helmut Naughton:
The use of a requirements modeling language for industrial applications. RE 2012: 285-290 - Antoine Cailliau, Axel van Lamsweerde:
A probabilistic framework for goal-oriented risk analysis. RE 2012: 201-210 - Eya Ben Charrada, Anne Koziolek, Martin Glinz:
Identifying outdated requirements based on source code changes. RE 2012: 61-70 - Yuri Chernak:
Requirements Composition Table explained. RE 2012: 273-278 - Jane Cleland-Huang, Patrick Mäder, Mehdi Mirakhorli, Sorawit Amornborvornwong:
Breaking the big-bang practice of traceability: Pushing timely trace recommendations to project stakeholders. RE 2012: 231-240 - Alessio Ferrari, Stefania Gnesi:
Using collective intelligence to detect pragmatic ambiguities. RE 2012: 191-200 - Lingxiao Fu, Xin Peng, Yijun Yu, John Mylopoulos, Wenyun Zhao:
Stateful requirements monitoring for self-repairing socio-technical systems. RE 2012: 121-130 - Arbi Ghazarian:
Characterization of functional software requirements space: The law of requirements taxonomic growth. RE 2012: 241-250 - David G. Gordon, Travis D. Breaux:
Reconciling multi-jurisdictional legal requirements: A case study in requirements water marking. RE 2012: 91-100 - Orlena Gotel, Jane Cleland-Huang, Jane Huffman Hayes, Andrea Zisman, Alexander Egyed, Paul Grünbacher, Giuliano Antoniol:
The quest for Ubiquity: A roadmap for software and systems traceability research. RE 2012: 71-80 - Joel Greenyer, Amir Molzam Sharifloo, Maxime Cordy, Patrick Heymans:
Efficient consistency checking of scenario-based product-line specifications. RE 2012: 161-170 - Anne Gross, Jörg Dörr:
What you need is what you get!: The vision of view-based requirements specifications. RE 2012: 171-180 - Dagny Hauksdottir, Arne Vermehren, Juha Savolainen:
Requirements reuse at Danfoss. RE 2012: 309-314 - Axel Hoffmann:
A Pattern-based approach for analysing requirements in socio-technical systems engineering. RE 2012: 341-344 - Alessia Knauss:
On the usage of context for requirements elicitation: End-user involvement in IT ecosystems. RE 2012: 345-348 - Eric Knauss, Daniela E. Damian, Germán Poo-Caamaño, Jane Cleland-Huang:
Detecting and classifying patterns of requirements clarifications. RE 2012: 251-260 - Wei-Keat Kong, Jane Huffman Hayes, Alex Dekhtyar, Olga Dekhtyar:
Process improvement for traceability: A study of human fallibility. RE 2012: 31-40 - Nupul Kukreja, Barry W. Boehm, Sheetal Swaroop Payyavula, Srinivas Padmanabhuni:
Selecting an appropriate framework for value-based requirements prioritization. RE 2012: 303-308 - Long Li, Haiyan Zhao, Wei Zhang:
MbFM: A matrix-based tool for modeling and configuring feature models. RE 2012: 325-326 - Sotirios Liaskos, Rina Jalman, Jorge Aranda:
On eliciting contribution measures in goal models. RE 2012: 221-230 - Robyn R. Lutz, Jack H. Lutz, James I. Lathrop, Titus H. Klinge, Divita Mathur, Donald M. Stull, Taylor Bergquist, Eric R. Henderson:
Requirements analysis for a product family of DNA nanodevices. RE 2012: 211-220 - Andrey Maglyas, Uolevi Nikula, Kari Smolander:
What do practitioners mean when they talk about product management? RE 2012: 261-266 - Jeremy C. Maxwell, Annie I. Antón, Peter P. Swire:
Managing changing compliance requirements by predicting regulatory evolution. RE 2012: 101-110 - Odorico Machado Mendizabal, Martin Spier, Rodrigo Saad:
Log-based approach for performance requirements elicitation and prioritization. RE 2012: 297-302
skipping 22 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 01:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint