Author of the publication

SaPeer and ReverseSaPeer: teaching requirements elicitation interviews with role-playing and role reversal.

, , , and . Requir. Eng., 25 (4): 417-438 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterising Requirements Volatility: An Empirical Case Study., , and . ISESE, page 427-436. IEEE Computer Society, (2005)Utilizing TOPSIS: A Multi Criteria Decision Analysis Technique for Non-Functional Requirements Conflicts., , and . APRES, volume 432 of Communications in Computer and Information Science, page 31-44. Springer, (2014)A model-driven approach to reengineering processes in cloud computing., , , , , and . Inf. Softw. Technol., (2022)User Involvement in Software Development: The Good, the Bad, and the Ugly., , and . IEEE Softw., 35 (6): 8-11 (2018)Machine Learning in Requirements Engineering: A Mapping Study., , and . RE Workshops, page 116-125. IEEE, (2021)An evolutionary model of requirements correctness with early aspects., , and . IWPSE, page 67-70. ACM, (2007)Automated Service Selection Using Natural Language Processing., , , , and . APRES, volume 558 of Communications in Computer and Information Science, page 3-17. Springer, (2015)Sizing Use Cases: How to Create a Standard Metrical Approach., , , and . OOIS, volume 2425 of Lecture Notes in Computer Science, page 409-421. Springer, (2002)An investigation into the notion of non-functional requirements., , and . SAC, page 311-317. ACM, (2010)Conflict characterization and Analysis of Non Functional Requirements: An experimental approach., , and . SoMeT, page 83-91. IEEE, (2013)