Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,859 papers from all fields of science
Search
Sign In
Create Free Account
Requirement
Known as:
Software requirement
, Required
, BUFQI
Expand
In product development and process optimization, a requirement is a singular documented physical and functional need that a particular design…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Arcadia (engineering)
Architecturally significant requirements
Aspect-oriented software development
Atomicity (database systems)
Expand
Broader (1)
Software requirements
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Head-Related Transfer Function and Virtual Auditory Display: E-Book
Bo-sun Xie
2013
Corpus ID: 53672385
Head-Related Transfer Function and Virtual Auditory Display: E-Book , Head-Related Transfer Function and Virtual Auditory Display…
Expand
Review
2009
Review
2009
Hydraulic Fracturing Considerations for Natural Gas Wells of the Marcellus Shale
J. Arthur
,
B. Bohm
,
M. Layne
2009
Corpus ID: 17602506
The issue of hydraulic fracturing has raised many concerns from the public as well as government officials. This paper will…
Expand
Highly Cited
2009
Highly Cited
2009
BodyMAC: Energy efficient TDMA-based MAC protocol for Wireless Body Area Networks
Gengfa Fang
,
E. Dutkiewicz
9th International Symposium on Communications and…
2009
Corpus ID: 17838338
Wireless Body Area Networks (WBANs) enable placement of tiny biomedical sensors on or inside the human body to monitor vital body…
Expand
Highly Cited
2006
Highly Cited
2006
Towards Performance Modeling of IEEE 802.11 Based Wireless Networks: A Unified Framework and Its Applications
K. Medepalli
,
F. Tobagi
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 16318622
We present a simple analytical model for IEEE 802.11 based wireless networks that effectively captures the important network…
Expand
Highly Cited
2004
Highly Cited
2004
An approach to security and privacy of RFID system for supply chain
Xingxin Gao
,
Zhe Xiang
,
Hao Wang
,
Jun Shen
,
Jian Huang
,
Song Song
IEEE International Conference on E-Commerce…
2004
Corpus ID: 15916460
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items…
Expand
Highly Cited
2004
Highly Cited
2004
LS-SCTP: a bandwidth aggregation technique for stream control transmission protocol
A. A. E. Al
,
T. Saadawi
,
Myung J. Lee
Computer Communications
2004
Corpus ID: 17717042
Review
2003
Review
2003
Knowledge strategy planning: methodology and case
Young-Gul Kim
,
Sung-Ho Yu
,
Jang-Hwan Lee
Expert systems with applications
2003
Corpus ID: 46171776
Highly Cited
1998
Highly Cited
1998
Guiding the Construction of Textual Use Case Specifications
C. Rolland
,
C. Salinesi
Data & Knowledge Engineering
1998
Corpus ID: 2680986
Highly Cited
1988
Highly Cited
1988
An improved protocol reachability analysis technique
G. Holzmann
Software, Practice & Experience
1988
Corpus ID: 9044940
An automated analysis of all reachable states in a distributed system can be used to trace obscure logical errors that would be…
Expand
Highly Cited
1972
Highly Cited
1972
Automatic computation of exponentials, logarithms, ratios and square roots
T. C. Chen
1972
Corpus ID: 6881449
It is shown how a relatively simple device can evaluate exponentials, logarithms, ratios and square roots for fraction arguments…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE