00984nam0-2200301---450-99000835272040332120111128194717.088-238-4103-8000835272FED01000835272(Aleph)000835272FED0100083527220060627d2005----km-y0itay50------baitaITy-------001yyNuovo diritto societario e analisi economica del dirittoseminario di studio - Università Bocconi 21 maggio 2004-11 giugno 2004atti raccolti da Marco VentoruzzoMilanoEgea2005409 p.24 cmCollana di diritto dell'economiadiretta da Piergaetano Marchetti1Ventoruzzo,MarcoITUNINARICAUNIMARCBK99000835272040332113-CA-16114117DDCPDDCPNuovo diritto societario e analisi economica del diritto721732UNINA01476oam 2200409 a 450 991069877290332120100128095325.0(CKB)5470000002396126(OCoLC)317877587(EXLCZ)99547000000239612620090406d2007 ua 0engurbn||||a||||txtrdacontentcrdamediacrrdacarrierEnergy efficiency[electronic resource] can tax incentives reduce consumption? : hearing before the Subcommittee on Energy, Natural Resources, and Infrastructure of the Committee on Finance, United States Senate, One Hundred Tenth Congress, first session, May 24, 2007Washington :U.S. G.P.O.,2007.iii, 94 pages digital, PDF fileS. hrg. ;110-733Title from title screen (viewed on Apr. 6, 2009).Paper version available for sale by the Supt. of Docs., U.S. G.P.O.Includes bibliographical references.Energy efficiency Energy consumptionUnited StatesEnergy tax creditsUnited StatesTax incentivesUnited StatesEnergy consumptionEnergy tax creditsTax incentivesGPOGPOGPOBOOK9910698772903321ENergy Efficiency768876UNINA08592nam 2200493 450 99646440170331620231110232400.03-030-73128-6(CKB)4100000011867287(MiAaPQ)EBC6533364(Au-PeEL)EBL6533364(OCoLC)1245674918(PPN)255289383(EXLCZ)99410000001186728720211022d2021 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierRequirements engineering: foundation for software quality 27th international working conference, refsq 2021, essen, germany, april 12-15, 2021, proceedings /edited by Fabiano Dalpiaz, Paola SpoletiniCham, Switzerland :Springer,[2021]©20211 online resource (241 pages) illustrationsLecture Notes in Computer Science ;v.126853-030-73127-8 Includes bibliographical references and index.Intro -- Preface -- Organization -- Keynotes -- Practicing (Whose?) Values: Requirements Engineering as a Catalyst for Technology Justice -- The Challenge(s) of Teaching Requirements Engineering -- What Makes Intelligent Visual Analytics Tools Really Intelligent? -- Contents -- Natural Language Processing and Machine Learning -- Is Requirements Similarity a Good Proxy for Software Similarity? An Empirical Investigation in Industry -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Study Context -- 3.2 Objective and Research Questions -- 3.3 Data Collection -- 3.4 Language Models for Requirements Similarity -- 3.5 Software Similarity Pipeline -- 3.6 Execution -- 3.7 Data Analysis -- 4 Results -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusion and Future Work -- References -- Automatic Detection of Causality in Requirement Artifacts: The CiRA Approach -- 1 Introduction -- 2 Terminology -- 3 Case Study: Causality in Requirement Documents -- 3.1 Research Questions -- 3.2 Study Objects -- 3.3 Study Design -- 3.4 Study Results -- 3.5 Implications for Causality Detection and Extraction -- 3.6 Threats to Validity -- 4 Approach: Detecting Causal Requirements -- 4.1 Methods -- 4.2 Evaluation Procedure -- 4.3 Experimental Results -- 5 Related Work -- 6 Conclusion and Next Steps -- References -- Improving Trace Link Recovery Using Semantic Relation Graphs and Spreading Activation -- 1 Introduction -- 2 Background -- 2.1 Trace Link Recovery -- 2.2 Knowledge Representation -- 2.3 Existing Approach -- 3 Datasets: Characteristics of Requirements -- 4 Approach Revisions -- 4.1 Knowledge Base Construction -- 4.2 Semantic Search -- 5 Evaluation -- 5.1 Metrics -- 5.2 Results for Datasets -- 5.3 Limitations -- 6 Discussion -- 7 Conclusion -- References -- CORG: A Component-Oriented Synthetic Textual Requirements Generator -- 1 Introduction.2 Background -- 3 CORG Formal Grammar -- 4 CORG -- 4.1 Content Determination -- 4.2 Textual Structuring -- 4.3 Sentence Aggregation -- 4.4 Lexicalisation -- 4.5 Realisation -- 4.6 Requirements Checking -- 5 Evaluation -- 5.1 Generation Coverage -- 5.2 Time Performance -- 5.3 Diversity Evaluation -- 5.4 Correctness Evaluation -- 5.5 Realisticness Evaluation -- 5.6 Strengths and Limitations -- 6 Related Work -- 7 Conclusion -- References -- Automatically Classifying Non-functional Requirements with Feature Extraction and Supervised Machine Learning Techniques: A Research Preview -- 1 Introduction -- 2 Related Work -- 2.1 Analysis -- 3 Research Investigation -- 3.1 Datasets -- 3.2 Research Methodology -- 4 Preliminary Evaluation -- 4.1 Preliminary Analysis -- 4.2 Preliminary Validation -- 5 Conclusion and Future Work -- References -- RE for AI-Enabled Systems -- AdaptationExplore - A Process for Elicitation, Negotiation, and Documentation of Adaptive Requirements -- 1 Introduction -- 2 Related Work -- 3 Process Overview -- 4 Running Example -- 5 Initial Phase -- 6 Exploration Phase -- 6.1 Situation -- 6.2 Identification of Situations -- 6.3 Situation Analysis with Trigger Questions -- 7 Integration Phase -- 7.1 Situation Integration -- 7.2 Adaptation Analysis and Documentation -- 8 Discussion -- 9 Pilot Study -- 10 Conclusion -- References -- Trustworthy AI Services in the Public Sector: What Are Citizens Saying About It? -- 1 Introduction -- 2 Related Work -- 3 Research Methods -- 3.1 Overview of the Qualitative Study -- 3.2 Study Participants -- 3.3 Data Collection -- 3.4 Data Analysis -- 4 Results -- 4.1 Transparency -- 4.2 Purpose -- 4.3 Data -- 4.4 Core AI Process -- 4.5 Human Involvement -- 4.6 Service Overview -- 5 Discussion -- 5.1 Transparency -- 5.2 Other Requirements -- 5.3 Study Limitations -- 6 Conclusions -- References.Defining Utility Functions for Multi-stakeholder Self-adaptive Systems -- 1 Introduction -- 2 Proposed Approach -- 3 Empirical Study -- 4 Related Work -- 5 Discussion, Conclusion, and Future Work -- References -- Risk-Driven Compliance Assurance for Collaborative AI Systems: A Vision Paper -- 1 Introduction -- 2 Illustrative Example -- 3 Research Challenges -- 4 Research Roadmap -- 5 Conclusion -- References -- From Software to Systems and Services -- Requirements Engineering in the Planning Phase of a Software Ecosystem -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Software Ecosystems -- 2.2 Requirements Engineering in Software Ecosystems -- 3 Research Methods -- 3.1 Research Question -- 3.2 Description of Case SECO -- 3.3 Research Process -- 4 Results -- 4.1 Overview of the Conceptualization Process of Digital Services -- 4.2 High-Level Conceptualization of Digital Services -- 4.3 Detailed Conceptualization of Digital Services -- 4.4 RE Activities of the Conceptualization Process of Digital Services -- 4.5 Challenges in the Conceptualization Process -- 5 Discussion -- 5.1 Requirement Engineering in the Planning Phase of a Software Ecosystem -- 5.2 Threats to Validity -- 6 Conclusions -- References -- Power and Privacy in Software Ecosystems: A Study on Data Breach Impact on Tech Giants -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Software Ecosystems -- 2.2 Power -- 3 Research Method -- 4 Results -- 4.1 Case 1 - YouTube (Google Ecosystem) -- 4.2 Case 2 - Alexa (Amazon Ecosystem) -- 4.3 Case 3 - Instagram (Facebook Ecosystem) -- 4.4 Case 4 - Siri (Apple Ecosystem) -- 5 Discussion and Conclusion -- 5.1 Implications for Research and Practice -- 5.2 Threats to Validity -- 5.3 Related Work -- 5.4 Future Work -- References -- Iterative and Scenario-Based Requirements Specification in a System of Systems Context -- 1 Introduction.2 Background -- 2.1 System of Systems Engineering (SoSE) -- 2.2 Example of Application -- 2.3 Scenario Modeling Language for Kotlin (SMLK) -- 3 Scenario-Based Requirements Specification in a System of Systems Context -- 3.1 Inter-system Scenarios -- 3.2 Intra-system Scenarios -- 3.3 Specification Method -- 4 Proof of Concept -- 5 Related Work -- 6 Summary and Outlook -- References -- Specifying Requirements for Data Collection and Analysis in Data-Driven RE. A Research Preview -- 1 Introduction -- 2 Background and Related Work -- 3 Case Study -- 4 User Feedback Requirements and Related Tasks -- 5 Conclusion -- References -- Analysts' Competence and Training -- SaPeer Approach for Training Requirements Analysts: An Application Tailored to a Low-resource Context -- 1 Introduction -- 2 Related Work and Background -- 3 Tailored SaPeer -- 3.1 The SaPeer Approach -- 3.2 Rationale for Tailoring the SaPeer Approach -- 3.3 The Tailored SaPeer Approach -- 4 Research Design -- 4.1 Research Questions -- 4.2 Data Collection and Analysis Procedures -- 4.3 Threats to Validity -- 5 Results -- 6 Conclusions and Further Research -- References -- On Understanding the Relation of Knowledge and Confidence to Requirements Quality -- 1 Introduction -- 2 Background and Related Work -- 3 Research Methodology and Data Collection -- 4 Results of Data Analysis -- 5 Conclusions and Future Work -- Appendix -- References -- Author Index.Lecture Notes in Computer Science Artificial intelligenceArtificial intelligence.005.1Dalpiaz FabianoSpoletini PaolaMiAaPQMiAaPQMiAaPQBOOK996464401703316Requirements Engineering2143744UNISA