A Review and Comparison of the Traditional Collaborative and Online Collaborative Techniques for Requirement Elicitation
Journal Title: Journal of Independent Studies and Research - Computing - Year 2018, Vol 16, Issue 1
Abstract
Requirement elicitation is one of the major phases of the software development life cycle. As per authors knowledge, among many reviews, there is no review available on a comparison between Online Collaborative Requirement Engineering (OCRE) and Traditional Collaborative Requirement Engineering (TCRE) techniques. In this review paper, OCRE and TCRE techniques are reviewed in terms of research methods employed in the related research. In addition, the techniques are compared in terms of software tools used in elicitation of the requirements and the types of software developed by using these techniques. The advantages and disadvantages mentioned in the literature are also highlighted in this research. The relevant papers were selected in a systematic way and data is extracted into the excel files for analysis. The results revealed some interesting findings like the most important techniques in both OCRE and TCRE are literature review followed by experimentation.
Authors and Affiliations
Asif Iqbal, Iftikhar Ahmed Khan
Implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python
This paper presents implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python computer programming language. The Fourier Transform is a fundamental signal processing tool whereas th...
Improving ATM User Interface (UI) of Pakistani Banks Using Keystroke Level Modelling (KLM)
The ATM connotes as Automated Teller Machine or Cash Machine. This machine has earned its currency on a larger scale in our modern society. However, unfortunately, most users have met bad experiences. For instance, reins...
Comparative Analysis of Collaborative Filtering on GraphLab, MLlib and Mahout
Recommendation systems are used to recommend items or products to the user based on their previous purchases, visits, interests, ratings, wish-lists or reviews to develop interest and to display the accurate and suitable...
Performance Analysis of TCP and UDP over Mobile Ad hoc Network
In the network computing domain, mobile ad hoc networks (MANETs) have gained promi- nence during the recent years. These networks have been used in almost all domains of today’s life; especially in military and emergency...
Extracting patterns from Global Terrorist Dataset (GTD) Using Co-Clustering approach
Global Terrorist Dataset (GTD) is a vast collection of terrorist activities reported around the globe. The terrorism database incorporates more than 27,000 terrorism incidents from 1968 to 2014. Every record has spatial...