• No se han encontrado resultados

Software Requirements

IEEE Recommended Practice for Software Requirements SpeciÞcations

IEEE Recommended Practice for Software Requirements SpeciÞcations

... The software may contain essentially all the functionality of the project or it may be part of a larger ...its software portion, and will place external performance and functionality requirements ...

37

IEEE Recommended Practice for Software Requirements SpeciÞcations

IEEE Recommended Practice for Software Requirements SpeciÞcations

... The software may contain essentially all the functionality of the project or it may be part of a larger ...its software portion, and will place external performance and functionality requirements ...

37

Quality Properties Evaluation for Software Requirements Specifications: An Exploratory Analysis

Quality Properties Evaluation for Software Requirements Specifications: An Exploratory Analysis

... Most software problems arise from deficiencies in the manner in which software requirements are elicited and ...ware Requirements Specification document (SRS) has the necessary quality is ...

14

MDDCLOUD: Framework for enterprise web applications MDD according specification software requirements

MDDCLOUD: Framework for enterprise web applications MDD according specification software requirements

... desarrollo software que permite establecer una relación entre las fases de modelación y construcción, incluso existen implementaciones MDD para la ingeniería de requisitos, es decir la posibilidad de la generación ...

9

Updating a Systematic Review about Selection of Software Requirements Elicitation Techniques

Updating a Systematic Review about Selection of Software Requirements Elicitation Techniques

... Systematic Review (SR) is a technique employed in Evidence-Based Software Engineering (EBSE) [24], whose aim is to pool together the results obtained in different empirical studies an[r] ...

8

In search of requirements analyst characteristics that influence requirements elicitation effectiveness: a quasi-experiment

In search of requirements analyst characteristics that influence requirements elicitation effectiveness: a quasi-experiment

... and requirements; their academic qualifications, the familiarity with problem domain and the time spent during the elicitation session in the effectiveness of the elicitation and subsequent consolidation of ...

10

Desarrollo del juego del Backgammon con integración de técnicas de aprendizaje por refuerzo

Desarrollo del juego del Backgammon con integración de técnicas de aprendizaje por refuerzo

... [16] Sutton, R. 2º), Reinforcement Learning: An Introduction. London: The MIT Press. [17] IEEE Computer Society. IEEE Recommended Practice for Software Requirements Specifications. In[r] ...

175

La noción de stakeholder en la Ingeniería de Requerimientos

La noción de stakeholder en la Ingeniería de Requerimientos

... “Requirements Engineering: Setting the Context,” in Engineering and Managing Software Requirements , Berlin Heidelberg: Springer-Verlag, 2005.. Coulin,.[r] ...

5

Convergence of Industry 4 0 and Regenerative Engineering to boost development of scaffolds created by hybrid additive manufacturing

Convergence of Industry 4 0 and Regenerative Engineering to boost development of scaffolds created by hybrid additive manufacturing

... This emerging field of research in the manufacture of scaffolds as a support for tissue regeneration aims to develop to the level of an established and functional industry. The current industry requires short response ...

146

Aspects and requirements domains applied to computer security

Aspects and requirements domains applied to computer security

... system requirements with the following goals: a) knowing the relevant requirements, achieving a consensus among the stakeholders about these requirements, documenting them according to given ...

6

Tracing complexity from requirements to implementation

Tracing complexity from requirements to implementation

... from requirements (use cases) to implementation (source code) of a target software ...the requirements were implemented or not, and how they were ...from requirements to ...

10

Defining security requirements through misuse actions

Defining security requirements through misuse actions

... security requirements is difficult and there is no generally accepted way [1], [2], [3], [4], ...security requirements is the listing of the possible threats to the ...

15

Policy Monitoring on Accessible Technology for Inclusive Education – Research Findings and Requirements for a Software Tool

Policy Monitoring on Accessible Technology for Inclusive Education – Research Findings and Requirements for a Software Tool

... presents requirements for a web-based tool for monitoring a public policy for the use of AT to ensure inclusive education and access to information for persons with visual and hearing impairments in ...

9

Systematizing requirements elicitation technique selection

Systematizing requirements elicitation technique selection

... Training in Elicitation Techniques Elicitation Experience Experience Elicitation Techniques Familiarity with Domain People per Session Consensus Informants Informant Inte[r] ...

26

Technology in the Translation Class: Introducing CAT Tools to Hungarian Translation Students

Technology in the Translation Class: Introducing CAT Tools to Hungarian Translation Students

... A large majority of translators in Hungary are freelancers: this is not expected to change over the next 5–6 years. Freelancers are practically left alone in more than one sense. Firstly, they have no company or team to ...

12

Estudio, propuesta e implementación de un proceso mejorado para el levantamiento de requerimientos dentro de la fase de análisis de un proyecto de TI

Estudio, propuesta e implementación de un proceso mejorado para el levantamiento de requerimientos dentro de la fase de análisis de un proyecto de TI

... of requirements elicitation designed for a SMB it is possible to diminish unpaid modifications, delays and improve the perceived quality by the ...for requirements elicitation was designed: PROSER, which ...

125

Grid metadata management: requirements and architecture

Grid metadata management: requirements and architecture

... • Access to metadata may need to be secured with different levels of granularity and different access control policies. The proposed S-OGSA architecture provides a generic and application-agnostic solution to address ...

8

Towards practical runtime verification and validation of self adaptive software systems

Towards practical runtime verification and validation of self adaptive software systems

... component structure is modified as a result of the adaptation, the SCA struc- tural conformance property must be verified at runtime on the resulting system. Second, changes in viability zones (e.g., changes in variables’ ...

27

QFD - Customer-Needs___Kano-Garvin-&-QFD.ppt

QFD - Customer-Needs___Kano-Garvin-&-QFD.ppt

... QFD Flowdown Customer Wants Technical Requirements Part Characteristics Manufacturing Process Production Requirements Manufacturing Environment Manufacturing Environment Customer Wants P[r] ...

42

Show all 8027 documents...

Related subjects