Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2015
- Raian Ali, Nan Jiang, Keith Phalp, Sarah Muir, John McAlaney:
The Emerging Requirement for Digital Addiction Labels. REFSQ 2015: 198-213 - Richard Berntsson-Svensson, Björn Regnell:
A Case Study Evaluation of the Guideline-Supported QUPER Model for Elicitation of Quality Requirements. REFSQ 2015: 230-246 - Kai Breiner, Michael Gillmann, Axel Kalenborn, Christian Müller:
Requirements Engineering in the Bidding Stage of Software Projects - A Research Preview. REFSQ 2015: 270-276 - Sergio Canchi, Juan Eduardo Durán:
Functional Requirements Modelling for Interactive TV Applications. REFSQ 2015: 254-261 - Marian Daun, Thorsten Weyer, Klaus Pohl:
Detecting and Correcting Outdated Requirements in Function-Centered Engineering of Embedded Systems. REFSQ 2015: 65-80 - Chuan Duan, Horatiu Dumitru, Jane Cleland-Huang, Bamshad Mobasher:
User-Constrained Clustering in Online Requirements Forums. REFSQ 2015: 284-299 - Mohamad Gharib, Paolo Giorgini:
Modeling and Reasoning About Information Quality Requirements. REFSQ 2015: 49-64 - Parisa Ghazi, Norbert Seyff, Martin Glinz:
FlexiView: A Magnet-Based Approach for Visualizing Requirements Artifacts. REFSQ 2015: 262-269 - Martina de Gramatica, Katsiaryna Labunets, Fabio Massacci, Federica Paci, Alessandra Tedeschi:
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals. REFSQ 2015: 98-114 - Eduard C. Groen, Jörg Dörr, Sebastian Adam:
Towards Crowd-Based Requirements Engineering A Research Preview. REFSQ 2015: 247-253 - Maaike Harbers, Christian Detweiler, Mark A. Neerincx:
Embedding Stakeholder Values in the Requirements Engineering Process. REFSQ 2015: 318-332 - Heli Hiisilä, Marjo Kauppinen, Sari Kujala:
Challenges of the Customer Organization's Requirements Engineering Process in the Outsourced Environment - A Case Study. REFSQ 2015: 214-229 - Eric Knauss, Andreas Andersson, Michael Rybacki, Erik Israelsson:
Research Preview: Supporting Requirements Feedback Flows in Iterative System Development. REFSQ 2015: 277-283 - Feng-Lin Li, Jennifer Horkoff, Alexander Borgida, Giancarlo Guizzardi, Lin Liu, John Mylopoulos:
From Stakeholder Requirements to Formal Specifications Through Refinement. REFSQ 2015: 164-180 - Tong Li, Jennifer Horkoff, John Mylopoulos:
Analyzing and Enforcing Security Mechanisms on Requirements Specifications. REFSQ 2015: 115-131 - Wenbin Li, Jane Huffman Hayes, Miroslaw Truszczynski:
Towards More Efficient Requirements Formalization: A Study. REFSQ 2015: 181-197 - Olga Liskin:
How Artifacts Support and Impede Requirements Communication. REFSQ 2015: 132-147 - Olesia Oliinyk, Kai Petersen, Manfred Schoelzke, Martin Becker, Sören Schneickert:
Metrics for the Evaluation of Feature Models in an Industrial Context: A Case Study at Opel. REFSQ 2015: 33-48 - Maryam Razavian, Jaap Gordijn:
Consonance Between Economic and IT Services: Finding the Balance Between Conflicting Requirements. REFSQ 2015: 148-163 - Patrick Rempel, Patrick Mäder:
Estimating the Implementation Risk of Requirements in Agile Software Development Projects with Traceability Metrics. REFSQ 2015: 81-97 - Norman Riegel, Jörg Dörr:
A Systematic Literature Review of Requirements Prioritization Criteria. REFSQ 2015: 300-317 - Bastian Tenbergen, Thorsten Weyer, Klaus Pohl:
Supporting the Validation of Adequacy in Requirements-Based Hazard Mitigations. REFSQ 2015: 17-32 - Eelco Vriezekolk, Sandro Etalle, Roel J. Wieringa:
Experimental Validation of a Risk Assessment Method. REFSQ 2015: 1-16 - Samuel A. Fricker, Kurt Schneider:
Requirements Engineering: Foundation for Software Quality - 21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings. Lecture Notes in Computer Science 9013, Springer 2015, ISBN 978-3-319-16100-6 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 23:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint