2013
DOI: 10.1007/978-3-642-39742-4_15
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review of Software Requirements Selection and Prioritization Using SBSE Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 46 publications
0
15
0
Order By: Relevance
“…Table 3 also shows that the following topics are addressed in two studies each: user participation, stakeholder identification, goal-oriented RE, and requirements elicitation while all other topics were addressed in only one study each. (Herrmann & Daneva, 2008;Pitangueira et al, 2013;Rinkelevic et al, 2013;Pergher & Rossi, 2013) 4 Requirements specification techniques/notations (Teka et al, 2012;Da Silva et al, 2011;Condori-Fernandez et al, 2009;Amyot & Mussbacher, 2011) 4 Security requirements (Iankoulova & Daneva, 2012;Souag et al, 2012;Mellado, 2009;Goudarzi et al, 2013;) M a n u s c r i p t Creativity techniques for RE (Saha et al, 2012;Lemos et al, 2012;Nguyen, 2009) 3 User participation and client involvement (Bano & Zowghi, 2013;Abelein & Paech, 2013) 2 Stakeholder identification (Pecheco & Garcia, 2012;Cala & Ivan, 2008) 2 Goal-oriented RE frameworks (Ghanavati et al, 2011;Horkoff et al, 2014) 2 Requirements triage and selection (Khurumet et al, 2012) 2 Requirements elicitation techniques (Davis et al, 2006;Ouhbi et al, 2013) 2 Requirements analysis techniques (Yue et al, 2011;Aguilar et al, 2010) 2 Automated requirements elicitation techniques (Meth et al, 2013) 1 Requirements modelling and analysis techniques for self-adaptive systems (Yang et al, 2014) 1 Tracing techniques (Torkar et al, 2012) 1 Generation of requirements specification from SE models (Nicolas & Toral, 2009) (Yang et al, 2014), cloud systems in two reviews (Mellado, 2009;Iankoulova & Daneva, 2012), service-...…”
Section: Topics and Theoretical Perspectivesmentioning
confidence: 98%
“…Table 3 also shows that the following topics are addressed in two studies each: user participation, stakeholder identification, goal-oriented RE, and requirements elicitation while all other topics were addressed in only one study each. (Herrmann & Daneva, 2008;Pitangueira et al, 2013;Rinkelevic et al, 2013;Pergher & Rossi, 2013) 4 Requirements specification techniques/notations (Teka et al, 2012;Da Silva et al, 2011;Condori-Fernandez et al, 2009;Amyot & Mussbacher, 2011) 4 Security requirements (Iankoulova & Daneva, 2012;Souag et al, 2012;Mellado, 2009;Goudarzi et al, 2013;) M a n u s c r i p t Creativity techniques for RE (Saha et al, 2012;Lemos et al, 2012;Nguyen, 2009) 3 User participation and client involvement (Bano & Zowghi, 2013;Abelein & Paech, 2013) 2 Stakeholder identification (Pecheco & Garcia, 2012;Cala & Ivan, 2008) 2 Goal-oriented RE frameworks (Ghanavati et al, 2011;Horkoff et al, 2014) 2 Requirements triage and selection (Khurumet et al, 2012) 2 Requirements elicitation techniques (Davis et al, 2006;Ouhbi et al, 2013) 2 Requirements analysis techniques (Yue et al, 2011;Aguilar et al, 2010) 2 Automated requirements elicitation techniques (Meth et al, 2013) 1 Requirements modelling and analysis techniques for self-adaptive systems (Yang et al, 2014) 1 Tracing techniques (Torkar et al, 2012) 1 Generation of requirements specification from SE models (Nicolas & Toral, 2009) (Yang et al, 2014), cloud systems in two reviews (Mellado, 2009;Iankoulova & Daneva, 2012), service-...…”
Section: Topics and Theoretical Perspectivesmentioning
confidence: 98%
“…We describe a systematic literature review and, as a result, present a consolidated prioritization criteria model which consists of around 280 criteria. Several systematic literature reviews have already been performed in the context of requirements prioritization (e.g., [6] [7][8] [9]). In contrast to these studies, the goal of our work is not to identify certain prioritization approaches but to identify the criteria that are discussed in the prioritization literature.…”
Section: Introductionmentioning
confidence: 99%
“…This means that there exists no polynomial time algorithm to solve this problem unless P ¼ NP. Consequently several papers have investigated the use of heuristic methods to address the single-objective NRP [4]. Of course, the probable non-existence of a polynomial time algorithm does not imply that exact methods cannot perform well in practice.…”
Section: The Nrp With One Objectivementioning
confidence: 99%
“…Research on the NRP has mainly been concerned with search based software engineering approaches [4] probably because initial efforts to use Integer Linear Programming (ILP), which is an exact approach, proved inconclusive beyond small problem instances because of large run times [1]. In this paper we revisit ILP in the light of much improved solvers to see if, and how, it can be used to address the NRP with one and two objectives.…”
Section: Introductionmentioning
confidence: 98%