Abstract is missing.
- Mining Twitter Feeds for Software User RequirementsGrant Williams, Anas Mahmoud. 1-10 [doi]
- A Little Bird Told Me: Mining Tweets for Requirements and Software EvolutionEmitza Guzman, Mohamed Ibrahim, Martin Glinz. 11-20 [doi]
- SAFE: A Simple Approach for Feature Extraction from App Descriptions and App ReviewsTimo Johann, Christoph Stanik, Alireza M. Alizadeh B., Walid Maalej. 21-30 [doi]
- Canary: Extracting Requirements-Related Information from Online DiscussionsGeorgi M. Kanchev, Pradeep K. Murukannaiah, Amit K. Chopra, Pete Sawyer. 31-40 [doi]
- A Framework for Improving the Verifiability of Visual Notation Design Grounded in the Physics of NotationsDirk van der Linden, Anna Zamansky, Irit Hadar. 41-50 [doi]
- Using Argumentation to Explain Ambiguity in Requirements Elicitation InterviewsYehia Elrakaiby, Alessio Ferrari, Paola Spoletini, Stefania Gnesi, Bashar Nuseibeh. 51-60 [doi]
- Mining User Rationale from Software ReviewsZijad Kurtanovic, Walid Maalej. 61-70 [doi]
- Feedback Gathering from an Industrial Point of ViewMelanie J. C. Stade, Farnaz Fotrousi, Norbert Seyff, Oliver Albrecht. 71-79 [doi]
- Users - The Hidden Software Product Quality Experts?: A Study on How App Users Report Quality Aspects in Online ReviewsEduard C. Groen, Sylwia Kopczynska, Marc P. Hauer, Tobias D. Krafft, Jörg Dörr. 80-89 [doi]
- What Requirements Knowledge Do Developers Need to Manage Change in Safety-Critical Systems?Micayla Goodrum, Jane Cleland-Huang, Robyn R. Lutz, Jinghui Cheng, Ronald A. Metoyer. 90-99 [doi]
- What Questions do Requirements Engineers Ask?Sugandha Malviya, Michael Vierhauser, Jane Cleland-Huang, Smita Ghaisas. 100-109 [doi]
- Datasets from Fifteen Years of Automated Requirements Traceability Research: Current State, Characteristics, and QualityWaleed Zogaan, Palak Sharma, Mehdi Mirakhorli, Venera Arnaoudova. 110-121 [doi]
- The Trouble with Security RequirementsSven Türpe. 122-133 [doi]
- Safety-Focused Security Requirements Elicitation for Medical Device SoftwareMikael Lindvall, Madeline Diep, Michele Klein, Paul L. Jones, Yi Zhang, Eugene Vasserman. 134-143 [doi]
- Reinforcing Security Requirements with Multifactor Quality MeasurementHanan Hibshi, Travis D. Breaux. 144-153 [doi]
- "SHORT"er Reasoning About Larger Requirements ModelsGeorge Mathew, Tim Menzies, Neil A. Ernst, John Klein. 154-163 [doi]
- Modeling and Reasoning with Changing Intentions: An ExperimentAlicia M. Grubb, Marsha Chechik. 164-173 [doi]
- Does Goal-Oriented Requirements Engineering Achieve Its Goal?Alistair Mavin, Philip Wilkinson, Sabine Teufl, Henning Femmer, Jonas Eckhardt, Jakob Mund. 174-183 [doi]
- New Frontiers for Requirements EngineeringDavid Callele, Krzysztof Wnuk, Birgit Penzenstadler. 184-193 [doi]
- How Much Undocumented Knowledge is there in Agile Software Development?: Case Study on Industrial Project Using Issue Tracking System and Version Control SystemShinobu Saito, Yukako Iimura, Aaron K. Massey, Annie I. Antón. 194-203 [doi]
- Software Requirements Analyst Profile: A Descriptive Study of Brazil and MexicoAngélica Toffano Seidel Calazans, Roberto Avila Paldes, Eloisa Toffano Seidel Masson, Isabel Sofia Brito, Kiane Fialho Rezende, Emeli Braosi, Nathacia Indayara Pereira. 204-212 [doi]
- Improving the Identification of Hedonic Quality in User Requirements - A Controlled ExperimentAndreas Maier, Daniel M. Berry. 213-222 [doi]
- Usability Insights for Requirements Engineering Tools: A User Study with Practitioners in AeronauticsHélène Gaspard-Boulinc, Stéphane Conversy. 223-232 [doi]
- Detecting Vague Words & Phrases in Requirements Documents in a Multilingual EnvironmentBreno Dantas Cruz, Bargav Jayaraman, Anurag Dwarakanath, Collin McMillan. 233-242 [doi]
- A Case Study on Evaluating the Relevance of Some Rules for Writing Requirements Through an Online SurveyMaxime Warnier, Anne Condamines. 243-252 [doi]
- A Case Study on a Specification Approach Using Activity Diagrams in Requirements DocumentsMartin Beckmann 0002, Andreas Vogelsang, Christian Reuter 0002. 253-262 [doi]
- A Formalization Method to Process Structured Natural Language to Logic Expressions to Detect Redundant Specification and Test StatementsBenedikt Walter, Jakob Hammes, Marco Piechotta, Stephan Rudolph. 263-272 [doi]
- Do Words Make a Difference? An Empirical Study on the Impact of Taxonomies on the Classification of RequirementsKim Lauenroth, Erik Kamsties, Oliver Hehlert. 273-282 [doi]
- Requirements Capture and Analysis in ASSERT(TM)Andrew W. Crapo, Abha Moitra, Craig McMillan, Daniel Russell. 283-291 [doi]
- Mining Associations Between Quality Concerns and Functional RequirementsXiaoli Lian, Jane Cleland-Huang, Li Zhang. 292-301 [doi]
- Legal Markup Generation in the Large: An Experience ReportNicolas Sannier, Morayo Adedjouma, Mehrdad Sabetzadeh, Lionel C. Briand, John Dann, Marc Hisette, Pascal Thill. 302-311 [doi]
- An Evaluation of Constituency-Based Hyponymy Extraction from Privacy PoliciesMorgan C. Evans, Jaspreet Bhatia, Sudarshan Wadkar, Travis D. Breaux. 312-321 [doi]
- Gamifying Collaborative Prioritization: Does Pointsification Work?Fitsum Meshesha Kifetew, Denisse Muñante, Anna Perini, Angelo Susi, Alberto Siena, Paolo Busetta, Danilo Valerio. 322-331 [doi]
- Behind Points and Levels - The Influence of Gamification Algorithms on Requirements PrioritizationMartina Z. Huber Kolpondinos, Martin Glinz. 332-341 [doi]
- Task Interruptions in Requirements Engineering: Reality Versus Perceptions!Zahra Shakeri Hossein Abad, Guenther Ruhe, Mike Bauer. 342-351 [doi]
- Requirements Engineering Challenges in Large-Scale Agile System DevelopmentRashidah Kasauli, Grischa Liebel, Eric Knauss, Swathi Gopakumar, Benjamin Kanagwa. 352-361 [doi]
- What do Support Analysts Know About Their Customers? On the Study and Prediction of Support Ticket Escalations in Large Software OrganizationsLloyd Montgomery, Daniela Damian. 362-371 [doi]
- Piggybacking on an Autonomous Hauler: Business Models Enabling a System-of-Systems Approach to Mapping an Underground MineMarkus Borg, Thomas Olsson, John Svensson. 372-381 [doi]
- How do Practitioners Perceive the Relevance of Requirements Engineering Research? An Ongoing StudyXavier Franch, Daniel Méndez Fernández, Marc Oriol, Andreas Vogelsang, Rogardt Heldal, Eric Knauss, Guilherme Horta Travassos, Jeffrey C. Carver, Oscar Dieste, Thomas Zimmermann 0001. 382-387 [doi]
- Optimized Functionality for Super Mobile AppsMaleknaz Nayebi, Guenther Ruhe. 388-393 [doi]
- A Data Purpose Case Study of Privacy PoliciesJaspreet Bhatia, Travis D. Breaux. 394-399 [doi]
- Interview Review: Detecting Latent Ambiguities to Improve the Requirements Elicitation ProcessAlessio Ferrari, Paola Spoletini, Beatrice Donati, Didar Zowghi, Stefania Gnesi. 400-405 [doi]
- Pushing Boundaries of RE: Requirement Elicitation for Non-human UsersAnna Zamansky, Dirk van der Linden, Sofya Baskin. 406-411 [doi]
- Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat ModelingNancy Mead, Forrest Shull, Janine Spears, Stefan Heibl, Sam Weber, Jane Cleland-Huang. 412-417 [doi]
- A Gamified Tutorial for Learning About Security Requirements EngineeringDaniel Alami, Fabiano Dalpiaz. 418-423 [doi]
- Exploiting User Feedback in Tool-Supported Multi-criteria Requirements PrioritizationItzel Morales-Ramirez, Denisse Muñante, Fitsum Meshesha Kifetew, Anna Perini, Angelo Susi, Alberto Siena. 424-429 [doi]
- Juggling Preferences in a World of UncertaintyLuis Hernán García Paucar, Nelly Bencomo, Kevin Kam Fung Yuen. 430-435 [doi]
- Identifying Conflicting Requirements in Systems of SystemsThiago Viana, Andrea Zisman, Arosha K. Bandara. 436-441 [doi]
- A Visual Narrative Path from Switching to Resuming a Requirements Engineering TaskZahra Shakeri Hossein Abad, Alex Shymka, Jenny Le, Noor Hammad, Guenther Ruhe. 442-447 [doi]
- UCAnalyzer: A Tool to Analyze Use Case Textual DescriptionsSaurabh Tiwari, Mayank Laddha. 448-449 [doi]
- Let's Hear it from RETTA: A Requirements Elicitation Tool for TrAffic Management SystemsMohammad Noaeen, Zahra Shakeri Hossein Abad, Behrouz Homayoun Far. 450-451 [doi]
- ECrits - Visualizing Support Ticket Escalation RiskLloyd Montgomery, Emma Reading, Daniela Damian. 452-455 [doi]
- Deploying a Template and Pattern Library for Improved Reuse of Requirements Across ProjectsRobert Darimont, Wei Zhao, Christophe Ponsard, Arnaud Michot. 456-457 [doi]
- ARRoW: Tool Support for Automatic Runtime Reappraisal of WeightsLuis Hernán García Paucar, Nelly Bencomo. 458-461 [doi]
- Choosing Requirements for Experimentation with User Interfaces of Requirements Modeling ToolsParisa Ghazi, Zahra Shakeri Hossein Abad, Martin Glinz. 462-463 [doi]
- CoSTest: A Tool for Validation of Requirements at Model LevelMaria Fernanda Granda, Nelly Condori-Fernández, Tanja E. J. Vos, Oscar Pastor. 464-467 [doi]
- DMGame: A Gamified Collaborative Requirements Prioritisation ToolFitsum Meshesha Kifetew, Denisse Muñante, Anna Perini, Angelo Susi, Alberto Siena, Paolo Busetta. 468-469 [doi]
- Canary: An Interactive and Query-Based Approach to Extract Requirements from Online ForumsGeorgi M. Kanchev, Pradeep K. Murukannaiah, Amit K. Chopra, Pete Sawyer. 470-471 [doi]
- A Demonstration of Respecify: A Requirements Authoring Tool Harnessing CNLMichael Ledger. 472-473 [doi]
- The Right-Hand Side Problem: Research Topics in REMichael Anthony Jackson. 474-475 [doi]
- Requirements Elicitation: A Look at the Future Through the Lenses of the PastPaola Spoletini, Alessio Ferrari. 476-477 [doi]
- The Vision: Requirements Engineering in SocietyGuenther Ruhe, Maleknaz Nayebi, Christof Ebert. 478-479 [doi]
- Requirements Engineering Since the Year One ThousandRoel Wieringa. 480-481 [doi]
- RE at 50, with a Focus on the Last 25 YearsRobyn R. Lutz. 482-483 [doi]
- RE Data Challenge: Requirements Identification with Word2Vec and TensorFlowAlex Dekhtyar, Vivian Fong. 484-489 [doi]
- Automatically Classifying Functional and Non-functional Requirements Using Supervised Machine LearningZijad Kurtanovic, Walid Maalej. 490-495 [doi]
- What Works Better? A Study of Classifying RequirementsZahra Shakeri Hossein Abad, Oliver Karras, Parisa Ghazi, Martin Glinz, Guenther Ruhe, Kurt Schneider. 496-501 [doi]
- PURE: A Dataset of Public Requirements DocumentsAlessio Ferrari, Giorgio Oronzo Spagnolo, Stefania Gnesi. 502-505 [doi]
- A Domain-Independent Model for Identifying Security RequirementsNuthan Munaiah, Andrew Meneely, Pradeep K. Murukannaiah. 506-511 [doi]
- Toward Automating Crowd REPradeep K. Murukannaiah, Nirav Ajmeri, Munindar P. Singh. 512-515 [doi]
- The IlmSeven DatasetMichael Rath, Patrick Rempel, Patrick Mäder. 516-519 [doi]
- Towards a Bayesian Decision Model for Release Planning in Incremental DevelopmentOlawole Oni. 520-525 [doi]
- An Approach to Support the Specification of Agile Artifacts in the Development of Safety-Critical SystemsAna Isabella Muniz Leite. 526-531 [doi]
- Reusable Goal ModelsMustafa Berk Duran. 532-537 [doi]
- Towards an Adaptive Framework for Goal-Oriented Strategic Decision-MakingJacek Dabrowski. 538-543 [doi]
- Dealing with Conflicts Between Non-functional Requirements of UbiComp and IoT ApplicationsRainara Maia Carvalho. 544-549 [doi]
- Awareness Driven Software ReengineeringAna Maria da Mota Moura. 550-555 [doi]
- Verifying Cyber-Physical System Behavior in the Context of Cyber-Physical System-NetworksJennifer Brings. 556-561 [doi]
- Improving the Elicitation of Delightful Context-Aware Features: A Data-Based ApproachRodrigo Meneses Porto Falcao. 562-567 [doi]
- RE in the Age of Continuous DeploymentNan Niu. 568-569 [doi]
- Panel: Context-Dependent Evaluation of Tools for NL RE Tasks: Recall vs. Precision, and BeyondDaniel M. Berry, Jane Cleland-Huang, Alessio Ferrari, Walid Maalej, John Mylopoulos, Didar Zowghi. 570-573 [doi]