G Boella, L Humphreys, R Muthuri… - 2014 IEEE 7th …, 2014 - ieeexplore.ieee.org
This paper reviews existing approaches to representing legal knowledge for legal requirements engineering. Legal requirement methodologies are rarely developed together …
Context A hairy requirements engineering (RE) task involving natural language (NL) documents is (1) a non-algorithmic task to find all relevant answers in a set of documents …
TD Breaux, T Norton - 2022 IEEE 30th International …, 2022 - ieeexplore.ieee.org
Software and hardware innovation has led to new consumer products and services with significant benefits to consumers and society. These advances, however, can come with …
P Rempel, P Mäder, T Kuschke… - Proceedings of the 36th …, 2014 - dl.acm.org
Many guidelines for safety-critical industries such as aeronautics, medical devices, and railway communications, specify that traceability must be used to demonstrate that a …
Depth cameras have helped commoditize 3D digitization of the real-world. It is now feasible to use a single Kinect-like camera to scan in an entire building or other large-scale scenes …
Context: Digital and physical trails of user activities are collected over the use of software applications and systems. As software becomes ubiquitous, protecting user privacy has …
Attempts to utilize information retrieval techniques to fully automate the creation of traceability links have been hindered by terminology mismatches between source and target …
F Kammüller, CW Probst - 2013 IEEE Security and Privacy …, 2013 - ieeexplore.ieee.org
Insider threats are a major threat to many organisations. Even worse, insider attacks are usually hard to detect, especially if an attack is based on actions that the attacker has the …
A Sleimi, M Ceci, M Sabetzadeh… - 2020 IEEE 28th …, 2020 - ieeexplore.ieee.org
Context: In legal requirements elicitation, requirements analysts need to extract obligations from legal texts. However, legal texts often express obligations only indirectly, for example …