CRAMP 发表于 2025-3-25 05:55:31
http://reply.papertrans.cn/83/8277/827679/827679_21.png贪婪的人 发表于 2025-3-25 11:29:45
Conference proceedings 2024irements; explainability with and in requirements engineering; artificial intelligence for requirements engineering; natural language processing for requirements engineering; requirements engineering for artificial intelligence; crowd-based requirements engineering; and emerging topics and challenges in requirements engineering..meretricious 发表于 2025-3-25 13:59:34
http://reply.papertrans.cn/83/8277/827679/827679_23.png爱哭 发表于 2025-3-25 16:00:47
http://reply.papertrans.cn/83/8277/827679/827679_24.png欢笑 发表于 2025-3-25 21:40:45
Natural2CTL: A Dataset for Natural Language Requirements and Their CTL Formal Equivalentstry experts, inter-rater reliability assessments, and practical verification using UPPAAL case studies. These validation efforts underscore the dataset’s reliability and its potential applicability in both research and educational domains within Requirements Engineering (RE) and formal methods.芭蕾舞女演员 发表于 2025-3-26 01:54:38
How Explainable Is Your System? Towards a Quality Model for Explainabilitytems is steadily growing. Thus, understanding how these systems function becomes increasingly difficult. At the same time, stakeholders rely on these systems in an expanding number of crucial areas, such as medicine and finance. . While a lot of research focuses on how to make AI algorithms explainaMonocle 发表于 2025-3-26 06:43:54
Identifying Relevant Factors of Requirements Quality: An Industrial Case Studys statements can result in incomplete or wrong features and even lead to budget overrun or project failure. .: Attempts at measuring the impact of requirements quality have been held back by the vast amount of interacting factors. Requirements quality research lacks an understanding of which factors挑剔小责 发表于 2025-3-26 11:14:06
Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requircommunication between different stakeholders involved in system security evaluation, and they are formal enough to be verified, e.g., with model checkers.. While the quality of this notation has been primarily assessed quantitatively, its understandability has never been evaluated despite being ment整顿 发表于 2025-3-26 13:35:38
http://reply.papertrans.cn/83/8277/827679/827679_29.png隐语 发表于 2025-3-26 20:22:41
A New Usability Inspection Method: Experience-Based Analysisy stage of the project, therefore for the early stage of the development, Usability Inspection Methods (UIM) are widely used where the evaluation is performed by experts. For the later phase, Summative Usability Testing (SUT) methods with end user involvement are used. However, UIMs have some drawba