Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,788,148 papers from all fields of science
Search
Sign In
Create Free Account
Requirement prioritization
Known as:
Prioritizing Requirements using a Cost-Value Approach
, Value-based Prioritization
Requirement prioritization is used in Software product management for determining which candidate requirements of a software product should be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Requirement
Requirements elicitation
Requirements management
Sjaak Brinkkemper
Expand
Broader (1)
Software requirements
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Characterization of quality degradation during chilled shrimp (Litopenaeus vannamei) supply chain.
A. Imran
,
J. Chawalit
,
K. Somrote
2013
Corpus ID: 80713987
Loss of quality in white shrimps (Litopenaeus vannamei) during a cold supply chain (0-8oC for 96 hours) was measured and modeled…
Expand
2012
2012
A Resource Discovery with Data Dissemination over Unstructured Mobile P2P Networks
Kyoungsoo Bok
,
Dong-Won Kwak
,
Jaesoo Yoo
KSII Transactions on Internet and Information…
2012
Corpus ID: 45658266
Recently, along with the innovative development of wireless communication techniques and mobile devices, mobile P2P services in…
Expand
2011
2011
Process Mapping and Management
Sue A. Conger
2011
Corpus ID: 86630325
As the economy moves toward a services orientation, companies are struggling with how to improve their offerings. Process…
Expand
Review
2011
Review
2011
Predictive mobile-oriented channel reservation schemes in wireless cellular networks
Vassily Abdulova
,
Isik Aybay
Wirel. Networks
2011
Corpus ID: 18891546
Provision of seamless service to multimedia applications in cellular wireless networks largely depends on the way calls are…
Expand
2010
2010
SWEATSHOP LIABILITY: CORPORATE CODES OF CONDUCT AND THE GOVERNANCE OF LABOR STANDARDS IN THE INTERNATIONAL SUPPLY CHAIN
Debra Cohen Maryanov
2010
Corpus ID: 167886566
Outsourcing the manufacture of apparel to suppliers in developing countries is a common practice among multinational corporations…
Expand
2010
2010
Conflicting Logics in Teaching Critical Thinking
Yoram Harpaz
2010
Corpus ID: 55635014
The article aims at (1) organizing the theoretical ideas of critical thinking on the basis of an overall and systematic…
Expand
2010
2010
Out-of-order issue logic using sorting networks
Siddhesh S. Mhambrey
,
L. Clark
,
Satendra Kumar Maurya
,
Krzysztof S. Berezowski
ACM Great Lakes Symposium on VLSI
2010
Corpus ID: 12994423
A fundamental property of superscalar architectures is the execution of multiple instructions per cycle. To accomplish this, the…
Expand
Highly Cited
2009
Highly Cited
2009
Design, implementation and evaluation of an efficient opportunistic retransmission protocol
Mei-Hsuan Lu
,
P. Steenkiste
,
Tsuhan Chen
ACM/IEEE International Conference on Mobile…
2009
Corpus ID: 8756736
This paper presents an efficient opportunistic retransmission protocol (PRO, Protocol for Retransmitting Opportunistically) to…
Expand
2006
2006
Impact of Recipient MELD Score on Resource Utilization
W. K. Washburna
,
B. H. Pollockb
,
L. Nicholsa
,
K. V. Speega
,
G. Halffa
2006
Corpus ID: 5579556
The model for end stage liver disease (MELD) system prioritizes deceased donor organs to the sickest patients who historically…
Expand
1989
1989
Improvement in norm-reducing Newton methods for circuit simulation
H. R. Yeager
,
R. Dutton
IEEE Trans. Comput. Aided Des. Integr. Circuits…
1989
Corpus ID: 36056782
The general convergence problems encountered when applying Newton's method to the circuit simulation domain are discussed. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE