Abstract is missing.
- Welcome from the OrganizersSepideh Ghanavati, Nan Niu, Gunter Mussbacher, João Araújo 0001, Pablo Sánchez 0002. 1-2 [doi]
- Model-based Method to Utilize a Catalogue of Quality Requirements in Software DevelopmentLukas Strey, Christian Hein, Tom Ritter. 3-10 [doi]
- Automated Glossary Extraction from Collaborative Requirements ModelsSalih Göktug Köse, Fatma Basak Aydemir. 11-15 [doi]
- A Model-based Conceptualization of Requirements for Compliance Checking of Data Processing against GDPROrlando Amaral, Sallam Abualhaija, Mehrdad Sabetzadeh, Lionel C. Briand. 16-20 [doi]
- Dash+: Extending Alloy with Hierarchical States and Replicated Processes for Modelling Transition SystemsTamjid Hossain, Nancy A. Day. 21-29 [doi]
- Towards Efficient Use Case Modeling with Automated Domain Classification and Term RecommendationZewen Qi, Tiexin Wang, Tao Yue. 30-38 [doi]
- Generating Sequence Diagram from Natural Language RequirementsMunima Jahan, Zahra Shakeri Hossein Abad, Behrouz H. Far. 39-48 [doi]
- Welcome to the Fifth International Workshop on Learning from Other Disciplines for Requirements Engineering (D4RE'21)Anne Hess, Marcus Trapp, Oliver Karras, Norbert Seyff. 49-50 [doi]
- Keep Your Stakeholders Engaged: Interactive Vision Videos in Requirements EngineeringLukas Nagel, Oliver Karras. 51-57 [doi]
- Eigth International Workshop on Artificial Intelligence and Requirements Engineering (AIRE'21)Nelly Bencomo, Rachel Harrison, Daniel Rodriguez. 58-59 [doi]
- Fine-Grained Causality Extraction From Natural Language Requirements Using Recursive Neural Tensor NetworksJannik Fischbach, Tobias Springer, Julian Frattini, Henning Femmer, Andreas Vogelsang, Daniel Méndez 0001. 60-69 [doi]
- Knowledge-based Sense Disambiguation of Multiword Expressions in Requirements DocumentsTobias Hey, Jan Keim, Walter F. Tichy. 70-76 [doi]
- CATE: CAusality Tree Extractor from Natural Language RequirementsNoah Jadallah, Jannik Fischbach, Julian Frattini, Andreas Vogelsang. 77-79 [doi]
- Transfer Learning for Mining Feature Requests and Bug Reports from Tweets and App Store ReviewsPablo Restrepo Henao, Jannik Fischbach, Dominik Spies, Julian Frattini, Andreas Vogelsang. 80-86 [doi]
- Evaluating Unsupervised Text Embeddings on Software User FeedbackPeter Devine, Yun Sing Koh, Kelly Blincoe. 87-95 [doi]
- Automated Identification and Deconstruction of Penalty Clauses in RegulationPreethu Rose Anish, Pratik Sonar, Prashant Lawhatre, Smita Ghaisas. 96-105 [doi]
- Machine Learning-based Estimation of Story Points in Agile Development: Industrial Experience and Lessons LearnedMacarious Abadeer, Mehrdad Sabetzadeh. 106-115 [doi]
- Machine Learning in Requirements Engineering: A Mapping StudyKareshna Zamani, Didar Zowghi, Chetan Arora 0002. 116-125 [doi]
- Issue Link Label Recovery and Prediction for Open Source SoftwareAlexander Nicholson, Jin L. C. Guo. 126-135 [doi]
- Is BERT the New Silver Bullet? - An Empirical Investigation of Requirements Dependency ClassificationGouri Deshpande, Behnaz Sheikhi, Saipreetham Chakka, Dylan Lachou Zotegouon, Mohammad Navid Masahati, Guenther Ruhe. 136-145 [doi]
- Towards Technology Acceptance: a Bayesian Network of soft requirements, the case of the NHS COVID-19 Test and Trace AppLuis Hernán García Paucar, Nelly Bencomo, Alistair G. Sutcliffe. 146-152 [doi]
- Detecting Requirements Smells With Deep Learning: Experiences, Challenges and Future WorkMohammad Kasra Habib, Stefan Wagner 0001, Daniel Graziotin. 153-156 [doi]
- Welcome to the First International Workshop on Requirements Engineering for Explainable Systems (RE4ES)Wasja Brunotte, Larissa Chazette, Verena Klös, Eric Knauss, Timo Speith, Andreas Vogelsang. 157-158 [doi]
- Towards Perspicuity RequirementsSarah Sterz, Kevin Baum, Anne Lauber-Rönsberg, Holger Hermanns. 159-163 [doi]
- Explainability Auditing for Intelligent Systems: A Rationale for Multi-Disciplinary PerspectivesMarkus Langer, Kevin Baum, Kathrin Hartmann, Stefan Hessel, Timo Speith, Jonas Wahl. 164-168 [doi]
- On the Relation of Trust and Explainability: Why to Engineer for TrustworthinessLena Kästner, Markus Langer, Veronika Lazar, Astrid Schomäcker, Timo Speith, Sarah Sterz. 169-175 [doi]
- Can Explanations Support Privacy Awareness? A Research RoadmapWasja Brunotte, Larissa Chazette, Kai Korte. 176-180 [doi]
- Cases for Explainable Software Systems: Characteristics and ExamplesMersedeh Sadeghi, Verena Klös, Andreas Vogelsang. 181-187 [doi]
- Holistic Explainability Requirements for End-to-End Machine Learning in IoT Cloud SystemsMy-Linh Nguyen, Thao Phung, Duong-Hai Ly, Hong Linh Truong. 188-194 [doi]
- A Quest of Self-Explainability: When Causal Diagrams meet Autonomous Urban Traffic ManoeuvresMaike Schwammberger. 195-199 [doi]
- Preface of the Workshop OrganizersAnh Nguyen Duc, Varun Gupta, Chetan Arora 0002, Pekka Abrahamsson, Jan Bosch. 200-201 [doi]
- To which degree do Software Startups focus on Sustainability in their planning work?Dimitris Polychronopoulos, Yngve Dahle. 202-205 [doi]
- Prototyping Practices in Software Startups: Initial Case Study ResultsElizabeth Bjarnason. 206-211 [doi]
- Provide Direction Despite Uncertainty: Workshops for Creating a Compelling Product VisionStefan Trieflinger, Jürgen Münch, Bastian Roling, Yvonne Voigt, Dominic Lang. 212-215 [doi]
- Exploring Non-Functional Requirements for Blockchain-Oriented SystemsMohamad Kassab. 216-219 [doi]
- How Requirements Engineering is Performed in Small Businesses?Mohamad Kassab. 220-223 [doi]
- Governance of Ethical and Trustworthy Al Systems: Research Gaps in the ECCOLA MethodMamia Agbese, Hanna-Kaisa Alanen, Jani Antikainen, Erika Halme, Hannakaisa Isomäki, Marianna Jantunen, Kai-Kristian Kemell, Rebekah Rousi, Heidi Vainio-Pekka, Ville Vakkuri. 224-229 [doi]
- A Deployment Model to Extend Ethically Aligned AI Implementation Method ECCOLAJani Antikainen, Mamia Agbese, Hanna-Kaisa Alanen, Erika Halme, Hannakaisa Isomäki, Marianna Jantunen, Kai-Kristian Kemell, Rebekah Rousi, Heidi Vainio-Pekka, Ville Vakkuri. 230-235 [doi]
- REWBAH 2021: Second International Workshop on Requirements Engineering for Well-Being, Aging, and Health : Welcome from the OrganizersEric S. K. Yu, Lin Liu, Meira Levy, Daniel Amyot. 236-238 [doi]
- Senior DT - A Design Thinking Method to Improve Requirements Engineering for Elderly CitizensAlexandra Jussli, Heiko Gewald. 240-247 [doi]
- Requirements Engineering for the Ageing Population: a Teaching PerspectiveAmélie Lachapelle-Dagenais, Sébastien Mosser 0001, Anne-Marie Pinna-Dery, Mireille Blay-Fornarino. 248-257 [doi]
- Guidelines for Validation Interviews with Senior CitizensEduard C. Groen, Svenja Polst. 258-267 [doi]
- Creating Mobile Self-Triage Applications: Requirements and Usability PerspectivesMir Kamyar Ziabari, Daniel Amyot, Wojtek Michalowski, El Mostafa Bouattane, Nassoh Hafez. 268-277 [doi]
- Eliciting Smartphone App Requirements for Helping Senior People: A Questionnaire ApproachJulie R. Rauer, Kirthy Kolluri, Lawrence Chung, Cong Liu, Tom Hill. 278-287 [doi]
- Welcome to the Fifth International Workshop on Crowd-Based Requirements Engineering (CrowdRE'21)Muneera Bano, Eduard C. Groen, Irit Hadar, Norbert Seyff. 288-290 [doi]
- On the Value of CrowdRE in Research and PracticeFabiano Dalpiaz. 291-292 [doi]
- The Use of Sub-forums in Software Product ForumsHechen Wang, Peter Devine, James Tizard, Seyed Reza Shahamiri, Kelly Blincoe. 293-297 [doi]
- The Potential of Using Vision Videos for CrowdRE: Video Comments as a Source of FeedbackOliver Karras, Eklekta Kristo, Jil Klünder. 298-305 [doi]
- Viewing Vision Videos Online: Opportunities for Distributed StakeholdersLukas Nagel, Jianwei Shi, Melanie Busch. 306-312 [doi]
- When the Developers Become the (Micro) Crowd: An Educational Case Study on Multidisciplinary Requirements EngineeringMeira Levy, Irit Hadar, Assaf Krebs, Idit Barak. 313-319 [doi]
- Researcher or Crowd Member? Why not both! The Open Research Knowledge Graph for Applying and Communicating CrowdRE ResearchOliver Karras, Eduard C. Groen, Javed Ali Khan, Sören Auer. 320-327 [doi]
- Voice of the Users: A study of software feedback differences between Germany and ChinaJames Tizard, Tim Rietz, Xuanhui Liu, Kelly Blincoe. 328-335 [doi]
- Requirements for Online User Feedback Management in RE TasksMaurizio Astegher, Paolo Busetta, Anna Perini, Angelo Susi. 336 [doi]
- Towards Trust in Complex Cloud-based ERP Systems by Informing Users about the System StatusMarkus Nöbauer, Norbert Seyff. 337-341 [doi]
- Applying Transfer Learning to Sentiment Analysis in Social MediaAriadna de Arriba, Marc Oriol, Xavier Franch. 342-348 [doi]
- Welcome from the Organizers FormReq 2021Sophie Ebersold, Régine Laleau, Manuel Mazzara. 349 [doi]
- A Natural Language Processing Technique for Formalization of Systems Requirement SpecificationsViktoria Koscinski, Celeste Gambardella, Estey Gerstner, Mark Zappavigna, Jennifer Cassetti, Mehdi Mirakhorli. 350-356 [doi]
- Security Requirements as Code: Example from VeriDevOps ProjectKhaled Ismaeel, Alexandr Naumchev, Andrey Sadovykh, Dragos Truscan, Eduard Paul Enoiu, Cristina Seceleanu. 357-363 [doi]
- Survey and Consistency Checking of Formal Requirements AnimationsChristophe Ponsard, Jean-Christophe Deprez. 364-370 [doi]
- From Textual to Verbal Communication: Towards Applying Sentiment Analysis to a Software Project MeetingMarc Herrmann, Jil Klünder. 371-376 [doi]
- Explainable Persuasion in Interactive DesignDeniz Cemiloglu, Maris Catania, Raian Ali. 377-382 [doi]
- Theory of Constructed Emotion Meets REKuldar Taveter, Tahira Iqbal. 383-386 [doi]
- Welcome to the Eighth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'21)Duncan Ki-Aries, Seok-Won Lee, Mattia Salnitri. 387 [doi]
- Self-Adaptive Security for SLA Based Smart ContractIrish Singh, Seok-Won Lee. 388-393 [doi]
- Lattice-based Contextual Integrity Analysis of Social Network Privacy PoliciesStephen Kaplan, Dylan Bulmer, Avery Gosselin, Sepideh Ghanavati. 394-399 [doi]
- Multi-perspective APT Attack Risk Assessment Framework using Risk-Aware Problem Domain OntologySihn-hye Park, Ji-Wook Jung, Seok-Won Lee. 400-405 [doi]
- A Named Entity Recognition Based Approach for Privacy Requirements EngineeringGuntur Budi Herwanto, Gerald Quirchmayr, A Min Tjoa. 406-411 [doi]
- D-REQs: Determination of security & safety requirements in workshops based on the use of model-based systems engineeringSergej Japs, Harald Anacker, Lydia Kaiser, Jörg Holtmann, Roman Dumitrescu, Frank Kargl. 412-414 [doi]
- Towards Norm Classification: An Initial Analysis of HIPAA BreachesVedarsh Shah, Zedong Peng, Ganesh Malla, Nan Niu. 415-420 [doi]
- An RE'21 Workshop on Environment-Driven Requirements Engineering (EnviRE'21)Zhi Jin, Nan Niu, Yijun Yu. 421 [doi]
- Environment Model based Requirements Consistency Verification: An ExampleQianqian Liu, Xiaohong Chen, Zhi Jin. 422-427 [doi]
- An Extended Meta-Model of Problem Frames for Enriching Environmental DescriptionsHongbin Xiao, Zhi Li, Yilong Yang 0001, Jie Deng, Shangfeng Wei. 428-434 [doi]
- The Role of Environmental Deviations in Engineering Robust SystemsEunsuk Kang. 435-438 [doi]
- Specifying Autonomous Driving ScenariosYue Yu, Tiexin Wang, Tao Yue. 439-444 [doi]
- Security Requirements Classification into Groups Using NLP TransformersVasily Varenov, Aydar Gabdrahmanov. 444-450 [doi]