ID | Paper | Track |
---|---|---|
R01 |
Mining Associations between Quality Concerns and Functional Requirements Xiaoli Lian, Jane Cleland-Huang and Li Zhang |
Research |
R02 |
Requirements Engineering Challenges in Large-Scale Agile System Development Rashidah Kasauli, Grischa Liebel, Eric Knauss, Swathi Gopakumar and Benjamin Kanagwa |
Research |
R03 |
What do support analysts know about their customers? On the study and prediction of support ticket escalations in large software organizations Lloyd Montgomery and Daniela Damian |
Research |
R04 |
Shorter Reasoning About Larger Requirements Models George Mathew, Tim Menzies, Neil Ernst and John Klein |
Research |
R05 |
Modeling and Reasoning with Changing Intentions: An Experiment Alicia M. Grubb and Marsha Chechik |
Research |
R06 |
Improving the Identification of Hedonic Quality in User Requirements - A Controlled Experiment Andreas Maier and Daniel Berry |
Research |
R07 |
Canary: Extracting Requirements-Related Information from Online Discussions Georgi Kanchev, Pradeep Murukannaiah, Amit Chopra and Pete Sawyer |
Research |
R08 |
Gamifying Collaborative Prioritization: Does Pointsification Work? Fitsum Meshesha Kifetew, Denisse Munante, Anna Perini, Angelo Susi, Alberto Siena, Paolo Busetta and Danilo Valerio |
Research |
R09 |
What Requirements Knowledge do Developers Need to Manage Change in Safety-Critical Systems? Micayla Goodrum, Jinghui Cheng, Ronald Metoyer, Jane Cleland-Huang and Robyn Lutz |
Research |
R10 |
Mining Twitter Feeds for Software User Requirements Grant Williams and Anas Mahmoud |
Research |
R11 |
A Little Bird Told Me: Mining Tweets for Requirements and Software Evolution Emitza Guzman, Mohamed Ibrahim and Martin Glinz |
Research |
R12 |
What Questions do Requirements Engineers Ask? Sugandha Malviya, Michael Vierhauser, Jane Cleland-Huang and Smita Ghaisas |
Research |
R13 |
Mining User Rationale from Software Reviews Zijad Kurtanović and Walid Maalej |
Research |
R14 |
Behind Points and Levels - The Influence of Gamification Algorithms on Requirements Prioritization Martina Kolpondinos-Huber and Martin Glinz |
Research |
R15 |
Do words make a difference? An Empirical Study on the Impact of Taxonomies on the Identification of Requirements Kim Lauenroth, Erik Kamsties and Oliver Hehlert |
Research |
R16 |
Evaluating the Relevance of Some Rules for Writing Requirements through an Online Survey Maxime Warnier and Anne Condamines |
Research |
R17 |
Usability Insights for Requirements Engineering Tools: A User Study with Practitioners in Aeronautics Hélène Gaspard-Boulinc and Stéphane Conversy |
Research |
R18 |
A framework for improving the verifiability of visual notation design grounded in the Physics of Notations Dirk van der Linden, Anna Zamansky and Irit Hadar |
Research |
R19 |
Task Interruptions in Requirements Engineering: Reality versus Perceptions! Zahra Shakeri, Guenther Ruhe and Mike Bauer |
Research |
R20 |
SAFE: A Simple Approach for Feature Extraction from App Descriptions and App Reviews Timo Johann, Christoph Stanik, Alireza M.Alizadeh B. and Walid Maalej |
Research |
R21 |
Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews Yehia Elrakaiby, Alessio Ferrari, Paola Spoletini, Stefania Gnesi and Bashar Nuseibeh |
Research |
R22 |
The Trouble With Security Requirements Sven Türpe |
Research |
R23 |
Reinforcing Security Requirements with Multifactor Quality Measurement Hanan Hibshi and Travis D. Breaux |
Research |
R24 |
New Horizons for Requirements Engineering David Callele, Krzysztof Wnuk and Birgit Penzenstadler |
Research |
R25 |
Users - The Hidden Software Product Quality Experts? A Study on How Software Users Report Non-Functional Aspects in Online Reviews Eduard C. Groen, Sylwia Kopczyńska, Marc Hauer, Tobias Krafft and Jörg Dörr |
Research |
R26 |
Datasets from Fifteen Years of Automated Software Traceability Research (Current State, Characteristics and Quality) Waleed Zogaan, Palak Sharma, Mehdi Mirakhorli and Venera Arnaoudova |
Research |
R27 |
An Evaluation of Constituency-based Hypernymy Extraction from Privacy Policies Morgan C. Evans, Jaspreet Bhatia, Sudarshan Wadkar and Travis D. Breaux |
Research |
I01 |
Legal Markup Generation in the Large: An Experience Report Nicolas Sannier, Morayo Adedjouma, Mehrdad Sabetzadeh, Lionel Briand, John Dann, Marc Hisette and Pascal Thill |
Industry |
I02 |
Detecting Vague Words & Phrases in Requirements Documents in a Multilingual Environment Breno Cruz, Bargav Jayaraman, Anurag Dwarakanath and Collin McMillan |
Industry |
I03 |
Piggybacking on an Autonomous Hauler: Business Models Enabling a System-of-Systems Approach to Mapping an Underground Mine Markus Borg, Thomas Olsson and John Svensson |
Industry |
I04 |
Feedback Gathering from an Industrial Point of View Melanie Stade, Farnaz Fotrousi, Norbert Seyff and Oliver Albrecht |
Industry |
I05 |
Requirements Capture and Analysis in ASSERT™ Andrew Crapo, Abha Moitra, Craig McMillan and Dan Russell |
Industry |
I06 |
Does Goal-Oriented Requirements Engineering Achieve its Goal? Alistair Mavin, Philip Wilkinson, Sabine Teufl, Henning Femmer, Jonas Eckhardt and Jakob Mund |
Industry |
I07 |
Safety-Focused Security Requirements Elicitation for Medical Device Software Mikael Lindvall, Madeline Diep, Michele Klein, Paul Jones, Yi Zhang and Eugene Vasserman |
Industry |
I08 |
A Case Study on a Specification Approach using Activity Diagrams in Requirements Documents Martin Beckmann, Andreas Vogelsang and Christian Reuter |
Industry |
I09 |
How Much Undocumented Knowledge is there in Agile Software Development? Shinobu Saito, Yukako Iimura, Aaron Massey and Annie Antón |
Industry |
I10 |
A Formalization Method to Process Structured Natural Language to Logic Expressions to Detect Redundant Specification and Test Statements Benedikt Walter, Jakob Hammes, Marco Piechotta and Stephan Rudolph |
Industry |
I11 |
Software Requirements Analyst Profile: a descriptive study of Brazil and Mexico Angelica Toffano Seidel Calazans, Roberto Avila Paldês, Kiane Mabel Rezende, Emeli Braosi, Nathácia Indayara Pereira, Isabel Sofia Sousa Brito and Eloisa Toffano Seidel Masson |
Industry |
D01 |
RE Data Challenge: Requirements Identification with Word2Vec and TensorFlow Alex Dekhtyar and Vivian Fong |
Data |
D02 |
Automatically Classifying Functional and Non-Functional Requirements Using Supervised Machine Learning Zijad Kurtanović and Walid Maalej |
Data |
D03 |
PURE: a Dataset of Public Requirements Documents Alessio Ferrari, Giorgio Oronzo Spagnolo and Stefania Gnesi |
Data |
D04 |
Toward Automating Crowd RE Pradeep Kumar Murukannaiah, Nirav Ajmeri and Munindar Singh |
Data |
D05 |
A Domain-independent Model for Identifying Security Requirements Nuthan Munaiah, Andrew Meneely and Pradeep K. Murukannaiah |
Data |
D06 |
The IlmSeven Dataset Michael Rath and Patrick Maeder |
Data |
D07 |
What Works Better? A Study of Classifying Requirements Zahra Shakeri, Oliver Karras, Parisa Ghazi, Martin Glinz, Guenther Ruhe and Kurt Schneider |
Data |
PD01 |
UCAnalyzer: A Tool to Analyze Use Case Textual Descriptions Saurabh Tiwari and Mayank Laddha |
Posters and Demos |
PD02 |
Let's Hear it From RETTA: A Requirements Elicitation Tool For Traffic Management Systems Mohammad Noaeen and Behrouz Homayoun Far |
Posters and Demos |
PD03 |
ÉCrits - Visualizing Support Ticket Escalation Risk Lloyd Montgomery, Emma Reading and Daniela Damian |
Posters and Demos |
PD04 |
Deploying a Template and Pattern Library for Improved Reuse of Requirements across Projects Robert Darimont, Wei Zhao, Christophe Ponsard and Arnaud Michot |
Posters and Demos |
PD05 |
Tool support for Automatic Runtime Reappraisal of Weights Luis Garcia Paucar and Nelly Bencomo |
Posters and Demos |
PD06 |
Choosing Requirements for Experimentation with User Interfaces of Requirements Modeling Tools Parisa Ghazi, Zahra Shakeri Hossein Abad and Martin Glinz |
Posters and Demos |
PD07 |
CoSTest: A tool for Validation of Requirements at Model Level Maria Fernanda Granda, Nelly Condori-Fernández, Tanja Vos and Oscar Pastor |
Posters and Demos |
PD08 |
DMGame: A Gamified Collaborative Requirements Prioritisation Tool Fitsum Kifetew, Denisse Munante, Anna Perini, Angelo Susi, Alberto Siena and Paolo Busetta |
Posters and Demos |
PD09 |
Canary: An Interactive and Query-Based Approach to Extract Requirements from Online Forums Georgi Kanchev, Pradeep Murukannaiah, Amit Chopra and Pete Sawyer |
Posters and Demos |
PD10 |
A demonstration of Respecify: a requirements authoring tool harnessing CNL Michael Ledger |
Posters and Demos |
N01 |
Pushing Boundaries of RE: Requirement Elicitation for Non-Human Users Anna Zamansky, Dirk van der Linden and Sofya Baskin |
RE@Next! |
N02 |
Interview Review: Detecting Latent Ambiguities to Improve the Requirements Elicitation Process Alessio Ferrari, Paola Spoletini, Beatrice Donati, Didar Zowghi and Stefania Gnesi |
RE@Next! |
N03 |
Search for Super App Functionality Maleknaz Nayebi and Guenther Ruhe |
RE@Next! |
N04 |
Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat Modeling Nancy Mead, Forrest Shull, Janine Spears, Stefan Hiebl, Sam Weber and Jane Cleland-Huang |
RE@Next! |
N05 |
Juggling Preferences in a World of Uncertainty Luis Garcia Paucar, Nelly Bencomo and Kevin Kam Fung Yue |
RE@Next! |
N06 |
A Data Purpose Case Study of Privacy Policies Jaspreet Bhatia and Travis D. Breaux |
RE@Next! |
N07 |
Exploiting User Feedback in Tool-supported Multi-criteria Requirements Prioritization Itzel Morales-Ramirez, Denisse Muñante, Fitsum Meshesha Kifetew, Anna Perini, Angelo Susi and Alberto Siena |
RE@Next! |
N08 |
How do Practitioners Perceive the Relevance of Requirements Engineering Research? An Ongoing Study Xavier Franch, Daniel Méndez Fernández, Marc Oriol Hilari, Andreas Vogelsang, Rogardt Heldal, Eric Knauss, Guilherme Travassos, Jeffrey C. Carver, Oscar Dieste and Thomas Zimmermann |
RE@Next! |
N09 |
A Gamified Tutorial for Learning about Security Requirements Engineering Daniel Alami Cabezas and Fabiano Dalpiaz |
RE@Next! |
N10 |
A Visual Narrative Path From Switching to Resuming an RE Task Zahra Shakeri, Alex Shymka, Jenny Le, Noor Hammad and Guenther Ruhe |
RE@Next! |
N11 |
Identifying Conflicting Requirements in Systems of Systems Thiago Viana, Andrea Zisman and Arosha K. Bandara |
RE@Next! |
SJ01 |
The Right-Hand Side Problem: Research Topics in RE Michael Jackson |
Silver Jubilee |
SJ02 |
Requirements Elicitation: A Look at the Future through the Lenses of the Past Paola Spoletini and Alessio Ferrari |
Silver Jubilee |
SJ03 |
The Vision: Requirements Engineering in Society Guenther Ruhe, Maleknaz Nayebi and Christof Ebert |
Silver Jubilee |
SJ04 |
Requirements Engineering in the Year Thousand Roel Wieringa |
Silver Jubilee |
SJ05 |
RE at 50, with a focus on the last 25 years Robyn Lutz |
Silver Jubilee |
DS01 |
Towards a Bayesian Decision Model for Agile Release Planning Olawole Oni |
Doctoral Symposium |
DS02 |
Improving the Elicitation of Delightful Context-Aware Features: a Data-Based Approach Rodrigo Falcão |
Doctoral Symposium |
DS03 |
An Approach to Support the Specification of Agile Artifacts in the Development of Safety-Critical Systems Ana Isabella Muniz Leite |
Doctoral Symposium |
DS04 |
Reusable Goal Models Mustafa Berk Duran |
Doctoral Symposium |
DS05 |
Dealing with Conflicts between Non-Functional Requirements of Ubicomp and IoT Applications Rainara Carvalho, Rossana Andrade and Kathia Oliveira |
Doctoral Symposium |
DS06 |
Verifying Cyber-Physical System Behavior in the Context of Cyber-Physical System-Networks Jennifer Brings |
Doctoral Symposium |
DS07 |
Towards an adaptive framework for goal-oriented strategic decision-making Jacek Dąbrowski |
Doctoral Symposium |
DS08 |
Awareness Driven Software Reengineering Ana M. M. Moura |
Doctoral Symposium |
PN01 |
RE in the age of continuous deployment Nan Niu |
Panel |
PN02 |
Context-Dependent Evaluation of Tools for NL RE Tasks: Recall vs. Precision, and Beyond Daniel Berry |
Panel |