Share This Author
Guiding Goal Modeling Using Scenarios
The proposal is to define enactable rules which form the basis of a software environment called L'Ecritoire to guide the requirements elicitation process through interleaved goal modeling and scenario authoring to overcome difficulties in practice.
Guiding the Construction of Textual Use Case Specifications
Dynamic adaptation of service compositions with variability models
Guiding use case authoring: results of an empirical study
- C. Salinesi, C. Rolland, C. Souveyet, N. Maiden
- MedicineProceedings IEEE International Symposium on…
- 7 June 1999
Results indicate that the authoring guidelines improve the overall quality of the use case prose and the different guidelines work differently and with different levels of efficiency; and use cases are never entirely correctly written; thus, they can be systematically corrected.
Requirements Engineering: Foundation for Software Quality
The results suggest that in game development business practicalities and drive for “fun” dominate the areas associated with requirements engineering.
A proposal for a scenario classification framework
The paper is an attempt to explore some of the issues underlying scenario-based approaches in requirements engineering and to propose a framework for their classification, a four-dimensional framework which advocates that a scenario- based approach can be well defined by its form, content, purpose and life cycle.
A Requirement-driven Approach for Designing Data Warehouses
A method for guiding DW analyst in the elicitation of decisions-makers requirements and in their operationalization into a DW model, called CADWA, which shifts the focus from where information from on how they should be structured and why they are needed.
Supervised intentional process models discovery using Hidden Markov models
- G. Khodabandelou, Charlotte Hug, R. Deneckère, C. Salinesi
- Computer ScienceResearch Challenges in Information Science
- 29 May 2013
The aim of this paper is to propose the use of probabilistic models to evaluate the most likely intentions behind traces of activities, namely Hidden Markov Models (HMMs).
A Security Ontology for Security Requirements Elicitation
- Amina Souag, C. Salinesi, R. Mazo, I. Comyn-Wattiau
- Computer ScienceEngineering Secure Software and Systems
- 4 March 2015
The proposed security ontology was evaluated by checking its validity and completeness compared to other ontologies, and a controlled experiment with end-users was performed to evaluate its usability.
Eliciting gaps in requirements change
The approach is to define a generic typology of gaps to facilitate a precise definition of change requirements and shows how to customise the generic gap typology to this specific requirements representation formalism.