Performance Evaluation of Requirements Engineering Methodology for Automated Detection of Non Functional Requirements
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 8
Abstract
Requirement Engineering (RE) deals with the requirements of a proposed solution and handles conflicting requirements of the various stakeholders and is critical to the success of a project. Good requirement engineering methodologies should be measurable, testable and should be sufficient for system design. Another important aspect of Requirement engineering is to capture the non functional requirements which have to be considered early to avoid system level constraints, security issues and overall quality issues. Typical Non Functional Requirements (NFR) are identified in both structured as well as unstructured documents. With availability of automated tools for requirement tracing and identifying NFRs, one method to find the effectiveness of the requirement engineering methodology in automation is its capability to capture NFR in an effective manner. In this paper we investigate the effectiveness of Information Retrieval (IR) methods for identifying NFRs.
Authors and Affiliations
J. Selvakumar , Dr. M. Rajaram
Anti-Synchronization of the Hyperchaotic Liu and Hyperchaotic Qi Systems by Active Control
This paper investigates the problem of anti-synchronization of identical hyperchaotic Liu systems (2008), hyperchaotic Qi systems (2008) and non-identical hyperchaotic Liu and hyperchaotic Qi systems using active nonline...
A Recent Survey on Bloom Filters in Network Intrusion Detection Systems
Computer networks are prone to hacking, viruses and other malware; a Network Intrusion Detection System (NIDS) is needed to protect the end-user machines from threats. An effective NIDS is therefore a network security sy...
Energy Efficient Adaptive Clustering for Heterogeneous Sensor Networks with power control
Wireless sensor networks are energy constraint battery powered sensing, computing and communication infrastructure. Sensor nodes are randomly deployed and organized as clusters, and each node is responsible for transmitt...
Face Recognition Technique Using PCA, Wavelet and SVM
We present a method of face recognition in which features are extracted by applying Principal component analysis on wavelet subband. Support vector machine and nearest distance methods are used for classification. Result...
An Efficient Protocol for Resource Constrained Platforms Using ECC
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift t...