Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Requirements analysis

Known as: Requirement gathering, Requirements modeling, Software requirements analysis 
Requirements analysis in systems engineering and software engineering, encompasses those tasks that go into determining the needs or conditions to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Energy management problems associated with rapid institutional, political, technical, ecological, social and economic development… Expand
  • figure 1
  • table 1
  • table 2
  • table 12
  • table 15
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Tropos is an agent-oriented software methodology proposed in (J. Autonomous Agents Multi-Agent Syst. 8(3) (2004) 203; Inf. Syst… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Security issues for software systems ultimately concern relationships among social actors stakeholders, system users, potential… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Information systems of the future will have to perform well within ever-changing organizational enviromnents. Unfortunately… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1999
Highly Cited
1999
were proposed more than 10 years ago. The Object-Oriented Systems Analysis (OOSA) technique [12] adopts the Entity-Relationship… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Requirements analysis includes a preliminary acquisition step where a global model for the specification of the system and its… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Requirements analysis (RA) involves end users and systems analysts interacting in an effort to recognize and specify the data and… Expand
Is this relevant?
Highly Cited
1977
Highly Cited
1977
Requirements definition encompasses all aspects of system development prior to actual system design. We see the lack of an… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?