Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,308 papers from all fields of science
Search
Sign In
Create Free Account
Requirement prioritization
Known as:
Prioritizing Requirements using a Cost-Value Approach
, Value-based Prioritization
Requirement prioritization is used in Software product management for determining which candidate requirements of a software product should be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Requirement
Requirements elicitation
Requirements management
Sjaak Brinkkemper
Expand
Broader (1)
Software requirements
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Facilitating public participation in water resources management: reflections from Tanzania
J. Kabogo
,
E. Anderson
,
Pendo Hyera
,
Godfred Kajanja
2017
Corpus ID: 53311838
Access to adequate quantity and quality of fresh water is critical to the well-being of Tanzania’s human population, currently…
Expand
Review
2016
Review
2016
Maximizing Science in the Era of LSST: A Community-Based Study of Needed US Capabilities
J. Najita
,
B. Willman
,
+48 authors
A. V. D. Linden
2016
Corpus ID: 118566586
The Large Synoptic Survey Telescope (LSST) will be a discovery machine for the astronomy and physics communities, revealing…
Expand
2011
2011
Process Mapping and Management
Sue A. Conger
2011
Corpus ID: 86630325
As the economy moves toward a services orientation, companies are struggling with how to improve their offerings. Process…
Expand
2010
2010
Methodological considerations in reserve system selection: A case study of Malagasy lemurs
K. Fiorella
,
K. Fiorella
,
A. Cameron
,
W. Sechrest
,
R. Winfree
,
C. Kremen
2010
Corpus ID: 3668803
Highly Cited
2009
Highly Cited
2009
Design, implementation and evaluation of an efficient opportunistic retransmission protocol
Mei-Hsuan Lu
,
P. Steenkiste
,
Tsuhan Chen
ACM/IEEE International Conference on Mobile…
2009
Corpus ID: 8756736
This paper presents an efficient opportunistic retransmission protocol (PRO, Protocol for Retransmitting Opportunistically) to…
Expand
2009
2009
In-network query processing in mobile P2P databases
Bo Xu
,
Fatemeh Vafaee
,
O. Wolfson
ACM SIGSPATIAL International Workshop on Advances…
2009
Corpus ID: 3742772
The in-network query processing paradigm in sensor networks postulates that a query is routed among sensors and collects the…
Expand
2009
2009
Real-Time Control of I/O COTS Peripherals for Embedded Systems
Stanley Bak
,
E. Betti
,
R. Pellizzoni
,
M. Caccamo
,
L. Sha
IEEE Real-Time Systems Symposium
2009
Corpus ID: 5851149
Real-time embedded systems are increasingly being built using commercial-off-the-shelf (COTS) components such as mass-produced…
Expand
Highly Cited
2008
Highly Cited
2008
A continuous analysis framework for the solution of location-allocation problems with dense demand
A. Murat
,
V. Verter
,
G. Laporte
Computers & Operations Research
2008
Corpus ID: 17829002
2006
2006
Impact of Recipient MELD Score on Resource Utilization
W. K. Washburna
,
B. H. Pollockb
,
L. Nicholsa
,
K. V. Speega
,
G. Halffa
2006
Corpus ID: 5579556
The model for end stage liver disease (MELD) system prioritizes deceased donor organs to the sickest patients who historically…
Expand
Review
2004
Review
2004
Call Admission Control in Mobile Cellular Networks : A Comprehensive Survey
Majid Ghaderi
,
R. Boutaba
2004
Corpus ID: 1297982
Call admission control is a key element in the provision of guaranteed quality of service in wireless networks. The design of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE