LEADER 05862nam 22007095 450 001 996418222503316 005 20200703164350.0 010 $a3-030-44429-5 024 7 $a10.1007/978-3-030-44429-7 035 $a(CKB)4100000010770684 035 $a(DE-He213)978-3-030-44429-7 035 $a(MiAaPQ)EBC6141912 035 $a(PPN)243222890 035 $a(EXLCZ)994100000010770684 100 $a20200318d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRequirements Engineering: Foundation for Software Quality$b[electronic resource] $e26th International Working Conference, REFSQ 2020, Pisa, Italy, March 24?27, 2020, Proceedings /$fedited by Nazim Madhavji, Liliana Pasquale, Alessio Ferrari, Stefania Gnesi 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XV, 308 p. 85 illus., 48 illus. in color.) 225 1 $aProgramming and Software Engineering ;$v12045 311 $a3-030-44428-7 320 $aIncludes bibliographical references and index. 327 $aRequirements Specification -- How do Quantifiers Affect the Quality of Requirements? -- Generation of Formal Requirements from Structured Natural Language -- Using Eye Tracking Data to Improve Requirements Specification Use -- Requirements Documentation -- Hearing the Voice of Software Practitioners on Causes, Effects, and Practices to Deal with Documentation Debt -- Innovation Workshop Documentation for Following Software Engineering Activities -- Industrial Practices on Requirements Reuse: An Interview-based Study -- Privacy and Legal Requirements -- Disambiguating Requirements through Syntax-Driven Semantic Analysis of Information Types -- On Understanding How Developers Perceive and Interpret Privacy Requirements Research Preview -- A Methodology for Implementing the Formal Legal-GRL Framework: A Research Preview -- Stakeholders Feedback and Training -- Towards Integrating Data-Driven Requirements Engineering into the Software Development Process: A Vision Paper -- Identifying and Classifying User Requirements in Online Feedback via Crowdsourcing -- Designing a Virtual Client for Requirements Elicitation Interviews -- Agile Methods and Requirements Comprehension -- Explicit Alignment of Requirements and Architecture in Agile Development -- Applying Distributed Cognition Theory to Agile Requirements Engineering -- Automatic Word Embeddings-Based Glossary Term Extraction from Large-Sized Software Requirement -- Requirements Modelling -- Conceptualizing Requirements Using User Stories and Use Cases: A Controlled Experiment -- A Semi-Automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix -- Evaluating the Effects of Different Requirements Representations on Writing Test Case -- Requirements Visualization -- Vision Meets Visualization: Are Animated Videos an Alternative? -- Requirements Assessment in Smart City Districts: A Motivation Concept for Citizens -- Visualizing Feature-Level Evolution in Product Lines: A Research Preview. 330 $aThis book constitutes the proceedings of the 26th International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2020, which was due to be held in Pisa, Italy, in March 2020. Due to the COVID-19 pandemic the conference was held virtually in June 2020. The 14 full papers and 7 short papers in this volume were carefully reviewed and selected from 84 submissions. The papers are organized in the following topical sections: requirements specification; requirements documentation; privacy and legal requirements; stakeholders feedback and training; agile methods and requirements comprehension; requirements modelling; requirements visualization. 410 0$aProgramming and Software Engineering ;$v12045 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aApplication software 606 $aUser interfaces (Computer systems) 606 $aComputer organization 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aUser interfaces (Computer systems). 615 0$aComputer organization. 615 14$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aComputer Systems Organization and Communication Networks. 676 $a005.1 702 $aMadhavji$b Nazim$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPasquale$b Liliana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFerrari$b Alessio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGnesi$b Stefania$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418222503316 996 $aRequirements Engineering: Foundation for Software Quality$9771998 997 $aUNISA LEADER 04089nam 22008295 450 001 996465767803316 005 20200630020539.0 010 $a3-642-33272-2 024 7 $a10.1007/978-3-642-33272-2 035 $a(CKB)3400000000085783 035 $a(SSID)ssj0000746100 035 $a(PQKBManifestationID)11410831 035 $a(PQKBTitleCode)TC0000746100 035 $a(PQKBWorkID)10860145 035 $a(PQKB)10172959 035 $a(DE-He213)978-3-642-33272-2 035 $a(MiAaPQ)EBC3070877 035 $a(PPN)168323990 035 $a(EXLCZ)993400000000085783 100 $a20120822d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security$b[electronic resource] $e6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings /$fedited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIII, 337 p. 11 illus.) 225 1 $aSecurity and Cryptology ;$v7496 300 $aInternational conference proceedings. 311 $a3-642-33271-4 320 $aIncludes bibliographical references and author index. 327 $asignature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security. 410 0$aSecurity and Cryptology ;$v7496 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aOperating systems (Computers) 606 $aApplication software 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOperating systems (Computers). 615 0$aApplication software. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aOperating Systems. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$aComputers and Society. 676 $a005.8 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guilin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aQin$b Zhiguang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJiang$b Shaoquan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYu$b Yong$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465767803316 996 $aProvable Security$9772128 997 $aUNISA