Abstract is missing.
- Decision Support for Security-Control Identification Using Machine LearningSeifeddine Bettaieb, Seung Yeob Shin, Mehrdad Sabetzadeh, Lionel C. Briand, Grégory Nou, Michael Garceau. 3-20 [doi]
- Is the SAFE Approach Too Simple for App Feature Extraction? A Replication StudyFaiz Ali Shah, Kairit Sirts, Dietmar Pfahl. 21-36 [doi]
- Enabling Users to Specify Correct Privacy RequirementsManuel Rudolph, Svenja Polst, Jörg Dörr. 39-54 [doi]
- RE-SWOT: From User Feedback to Requirements via Competitor AnalysisFabiano Dalpiaz, Micaela Parente. 55-70 [doi]
- Increasing Precision of Automatically Generated Trace LinksPaul Hübner, Barbara Paech. 73-89 [doi]
- Impact of Gamification on Trace Link Vetting: A Controlled ExperimentSalome Maro, Emil Sundklev, Carl-Oscar Persson, Grischa Liebel, Jan-Philipp Steghöfer. 90-105 [doi]
- Refinement of User Stories into Backlog Items: Linguistic Structure and Action Verbs - Research PreviewLaurens Müter, Tejaswini Deoskar, Max Mathijssen, Sjaak Brinkkemper, Fabiano Dalpiaz. 109-116 [doi]
- Requirements Engineering for Innovative Software Ecosystems: A Research PreviewKarina Villela, Shashank Kedlaya, Jörg Dörr. 117-123 [doi]
- Assessment of the Quality of Safety Cases: A Research PreviewJose Luis de la Vara, Gabriel Jiménez, Roy Mendieta, Eugenio Parra. 124-131 [doi]
- Refining Vision VideosKurt Schneider, Melanie Busch, Oliver Karras, Maximilian Schrapel, Michael Rohs. 135-150 [doi]
- A Lightweight Multilevel Markup Language for Connecting Software Requirements and SimulationsFlorian Pudlitz, Andreas Vogelsang, Florian Brokhausen. 151-166 [doi]
- Supporting Feature Model Evolution by Lifting Code-Level Dependencies: A Research PreviewDaniel Hinterreiter, Kevin Feichtinger, Lukas Linsbauer, Herbert Prähofer, Paul Grünbacher. 169-175 [doi]
- Identifying Requirements in Requests for Proposal: A Research PreviewAndreas A. Falkner, Cristina Palomares, Xavier Franch, Gottfried Schenner, Pablo Aznar, Alexander Schoerghuber. 176-182 [doi]
- Finding and Analyzing App Reviews Related to Specific Features: A Research PreviewJacek Dabrowski 0001, Emmanuel Letier, Anna Perini, Angelo Susi. 183-189 [doi]
- Supporting the Selection of Constraints for Requirements Monitoring from Automatically Mined Constraint CandidatesThomas Krismayer, Peter Kronberger, Rick Rabiser, Paul Grünbacher. 193-208 [doi]
- Combining Monitoring and Autonomous Feedback Requests to Elicit Actionable Knowledge of System UseDustin Wüest, Farnaz Fotrousi, Samuel Fricker. 209-225 [doi]
- Selecting Open Source Projects for Traceability Case StudiesMichael Rath 0002, Mihaela Todorova Tomova, Patrick Mäder. 229-242 [doi]
- Crowd Intelligence in Requirements Engineering: Current Status and Future DirectionsJaved Ali Khan, Lin Liu, Lijie Wen, Raian Ali. 245-261 [doi]
- Towards a Meta-model for Requirements-Driven Information for Internal StakeholdersIbtehal Noorwali, Nazim H. Madhavji, Darlan Arruda, Remo Ferrari. 262-278 [doi]
- Towards a Catalogue of Mobile Elicitation Techniques - Research PreviewNitish Patkar, Pascal Gadient, Mohammad Ghafari, Oscar Nierstrasz. 281-288 [doi]
- Towards the Next Generation of Scenario Walkthrough Tools - A Research PreviewNorbert Seyff, Michael Vierhauser, Michael Schneider, Jane Cleland-Huang. 289-296 [doi]
- A Research Preview on TAICOS - Tailoring Stakeholder Interests to Task-Oriented Functional RequirementsPhilipp Haindl, Reinhold Plösch, Christian Körner. 297-303 [doi]