慌张 发表于 2025-4-1 05:34:01
Supporting Requirements Engineers in Recognising Security Issuesned with domain specific data and documents from previous projects. . We show how the ability to identify security-relevant requirements can be integrated in a workflow of requirements analysis and reuse of experience. In practice, this can increase security awareness within the software developmentNeuralgia 发表于 2025-4-1 07:49:21
Discovering Sustainability Requirements: An Experience Reports that, while a lot of work remains to be done, small and easy steps may already lead us to more sustainable systems. It also contributes to the agenda of requirements engineering researchers concerned with sustainability.Recess 发表于 2025-4-1 10:37:33
http://reply.papertrans.cn/83/8277/827681/827681_63.pngHiatus 发表于 2025-4-1 15:29:05
Requirements for a Nutrition Education Demonstrator apply a theory-based model of behavioural change and are constructed in two phases. The first phase scenarios specify an indicative description reflecting the use of the transtheoretical model of behavioural change. In the second phase, a handshake protocol adds elements of optative system-oriented起来了 发表于 2025-4-1 22:01:42
http://reply.papertrans.cn/83/8277/827681/827681_65.png关节炎 发表于 2025-4-1 23:20:32
http://reply.papertrans.cn/83/8277/827681/827681_66.png斜 发表于 2025-4-2 05:15:38
http://reply.papertrans.cn/83/8277/827681/827681_67.pngconvulsion 发表于 2025-4-2 09:17:12
Mining Requirements Linkses to an industrial case study, and test to what degree common hypothesis hold in our case. . Reshaping traceability data into knowledge can contribute to more effective automatic tools to suggest candidates for linking, to inform improvements in writing style, and at the same time provide some insiDeference 发表于 2025-4-2 12:23:54
http://reply.papertrans.cn/83/8277/827681/827681_69.png