Nome |
# |
Gamification Solutions via Software Engineering and Organizational Studies: A Comparative Study, file e3835193-470d-72ef-e053-3705fe0ad821
|
228
|
Finding Related Forum Posts through Content Similarity over Intention-Based Segmentation, file e3835194-2b4e-72ef-e053-3705fe0ad821
|
184
|
Multi-objective reasoning with constrained goal models, file e3835195-2994-72ef-e053-3705fe0ad821
|
158
|
Design Thinking and Acceptance Requirements for Gamification Design. A Research Preview., file e3835194-541b-72ef-e053-3705fe0ad821
|
150
|
Planning with strategic goals, file e3835195-299d-72ef-e053-3705fe0ad821
|
148
|
Modeling and reasoning on requirements evolution with constrained goal models, file e3835193-e101-72ef-e053-3705fe0ad821
|
140
|
Goal-oriented requirements engineering: an extended systematic mapping study, file e3835195-cd3f-72ef-e053-3705fe0ad821
|
104
|
COPri - A Core Ontology for Privacy Requirements Engineering, file e3835197-8a88-72ef-e053-3705fe0ad821
|
98
|
Towards an Ontological Analysis of Value Propositions, file e3835194-7a5e-72ef-e053-3705fe0ad821
|
95
|
Requirements evolution and evolution requirements with constrained goal models, file e3835193-7186-72ef-e053-3705fe0ad821
|
84
|
From Legal Contracts to Formal Specifications: A Systematic Literature Review, file e3835199-f1f2-72ef-e053-3705fe0ad821
|
77
|
Semantic Annotation of Legal Contracts with ContrattoA, file 6577de30-e7b0-4850-849b-99ea728ca4c7
|
74
|
Automating the extraction of rights and obligations for regulatory compliance, file e3835191-ca0a-72ef-e053-3705fe0ad821
|
73
|
Requirements Engineering for Trust Management: Model, Methodology, and Reasoning, file e3835191-cc54-72ef-e053-3705fe0ad821
|
51
|
Experimenting with Linguistic Tools for Conceptual Modelling: Quality of the models and critical features, file e3835191-ce33-72ef-e053-3705fe0ad821
|
27
|
Automating the Generation of Semantic Annotation Tools Using a Clustering Technique, file e3835191-c7e4-72ef-e053-3705fe0ad821
|
25
|
A lightweight approach to semantic annotation of research papers, file e3835191-c994-72ef-e053-3705fe0ad821
|
24
|
Applying software analysis technology to lightweight semantic markup of document text, file e3835191-c9b7-72ef-e053-3705fe0ad821
|
23
|
From Legal Contracts to Formal Specifications: A Progress Report, file e3835198-8885-72ef-e053-3705fe0ad821
|
14
|
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques, file e3835194-2141-72ef-e053-3705fe0ad821
|
13
|
Annotating Accomodation Advertisement using CERNO, file e3835191-c995-72ef-e053-3705fe0ad821
|
12
|
Improving the Quality of Conceptual Models with NLP Tools: An Experiment, file e3c12640-88b1-410a-be4c-12a3b4db763a
|
11
|
Modeling structured and unstructured processes: An empirical evaluation, file e3835193-72d1-72ef-e053-3705fe0ad821
|
10
|
Data Management for Peer-to-Peer Computing: A Vision, file ec1b8b7a-57f2-494f-aadf-55c0a31550cf
|
8
|
Requirement Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard, file 2f0d7bc0-369a-4666-9ebc-27f65a998c70
|
7
|
TROPOS: An Agent-Oriented Software Development Methodology, file 9721cef2-24eb-4f85-997c-0dd0cff4d77f
|
7
|
Awareness Requirements for Adaptive Systems, file c95e63a2-ef58-473e-a443-eebb4fe7c363
|
7
|
Designing Security Requirements Models through Planning, file d56bfe2d-fa0d-4be0-b24c-4c7005888dfa
|
7
|
A Knowledge Level Software Engineering Methodology for Agent Oriented Programming, file df84a850-61d1-4766-aef9-b9398eab1f56
|
7
|
Cerno: Light-weight tool support for semantic annotation of textual documents, file e3835191-ce60-72ef-e053-3705fe0ad821
|
7
|
A Multi-View Framework for Organizational Patterns, file e61e22fe-307c-426b-9719-2281fb2e7846
|
7
|
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments, file d92c210b-c405-4acd-a4e4-2b92dd38498a
|
6
|
Semi-automatic semantic annotations for web documents, file e3835191-ca03-72ef-e053-3705fe0ad821
|
6
|
Designing Sociotechnical Systems with Protos, file e3835192-3238-72ef-e053-3705fe0ad821
|
6
|
GaiusT 2.0: Evolution of a framework for annotating legal documents, file e3835192-e833-72ef-e053-3705fe0ad821
|
6
|
COPri v.2 — A core ontology for privacy requirements, file e3835199-4a3d-72ef-e053-3705fe0ad821
|
6
|
NLP-Based Requirements Modeling: Experiments on the Quality of the models, file f1b21a34-57f7-40db-8a68-843a76bd9f65
|
6
|
Talos: An Architecture for Self-Configuration, file 30af73a5-4bcd-4a1f-bc7a-fe61bc07cd8a
|
5
|
Local Relational Model: a logical formalization of database coordination, file 6ecb687e-d21e-498b-92d4-e02a2edc302d
|
5
|
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments, file 7c9e94bf-de06-4393-8ba0-3e45d3ef1375
|
5
|
An Architecture for Requirements-driven Self-reconfiguration, file bdb40207-6917-480e-8c19-cabf55405460
|
5
|
GaiusT: Supporting the Extraction of Rights and Obligations for Regulatory Compliance, file e3835192-5644-72ef-e053-3705fe0ad821
|
5
|
Goal-Oriented Requirements Engineering: A Systematic Literature Map, file e3835193-702f-72ef-e053-3705fe0ad821
|
5
|
Goal models for acceptance requirements analysis and gamification design, file e3835194-3939-72ef-e053-3705fe0ad821
|
5
|
Annotating legal documents with GaiusT 2.0, file e3835195-ae3b-72ef-e053-3705fe0ad821
|
5
|
Applying Tropos Methodology to a real case study: Complexity and Criticality Analysis, file f513468a-7e17-461e-a930-5386ab6322d2
|
5
|
Requirements Analysis for Socio-technical Systems: Exploring and Evaluating Alternatives, file 489f62f8-6fab-4671-bb5c-5dcdcff626af
|
4
|
Specifying Business Processes with Azzurra, file a2c5de8b-e8c4-4ffb-a294-d751a4b7a7bc
|
4
|
Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures, file b0aece1a-8fe1-43d1-b23d-084ef006d05c
|
4
|
Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning, file bacf5737-9933-4bf5-929a-96ae02169897
|
4
|
A lightweight approach to semantic tagging, file e3835191-c799-72ef-e053-3705fe0ad821
|
4
|
TROPOS: an agent-oriented software development methodology, file e3835191-cd49-72ef-e053-3705fe0ad821
|
4
|
Annotating legal documents with GaiusT 2.0, file e3835193-e85e-72ef-e053-3705fe0ad821
|
4
|
Multi-objective reasoning with constrained goal models, file e3835195-8d53-72ef-e053-3705fe0ad821
|
4
|
Risk Modelling and Reasoning in Goal Models, file 05df7a60-c048-449a-b5d3-a79a12eb58e2
|
3
|
The Local Relational Model: Model and Proof Theory, file bbb91cd4-a2d4-4197-9cc9-bcd2074ec460
|
3
|
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation, file c2889aed-b944-46af-88fd-993d83b2ee5a
|
3
|
COPri v.2 — A core ontology for privacy requirements, file c41b8155-31ca-4d74-bd2f-e717f418ebac
|
3
|
Applying GaiusT for Extracting Requirements from Legal Documents, file e3835191-c893-72ef-e053-3705fe0ad821
|
3
|
The goal behind the action: Toward goal-aware systems and applications, file e3835193-5bbc-72ef-e053-3705fe0ad821
|
3
|
Acceptance Requirements and Their Gamification Solutions, file e3835193-7123-72ef-e053-3705fe0ad821
|
3
|
Analysis of information quality requirements in business processes, revisited, file e3835195-3a6d-72ef-e053-3705fe0ad821
|
3
|
Planning with strategic goals, file e3835196-ff26-72ef-e053-3705fe0ad821
|
3
|
Goal-Oriented Requirements Engineering: A Systematic Literature Map, file fcdbaa04-712f-499e-a222-ff5ad46f4dec
|
3
|
Modeling Social and Individual Trust in Requirements Engineering Methodologies, file 032e2b31-8cca-4016-940c-8c2731edc950
|
2
|
Specification and analysis of legal contracts with Symboleo, file 099f698f-39b7-4234-beb2-e6f25e73a59c
|
2
|
The Tropos Software Development Methodology: Processes, Models and Diagrams, file 0ff24048-7819-4944-8e3d-a9d7580040eb
|
2
|
Semantic Annotation as Design Recovery, file 4051486a-64c3-4391-866c-9e59d147e773
|
2
|
Model-checking legal contracts with SymboleoPC, file 568e4300-1e36-4b6c-86ff-f74350d5a28b
|
2
|
Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations, file 9a043f13-0b6e-408f-964c-15e2ab5d0c59
|
2
|
Modeling Security Requirements Through Ownership, Permission and Delegation, file ab00163f-9e30-4895-8523-92a93e808ab2
|
2
|
TBIM: A Language for Modeling and Reasoning about Business Plans, file cf7d51b3-59aa-47d6-965e-e5e7f2794b3d
|
2
|
Annotating Regulations Using Cerno: an Application to Italian Documents, file e3835191-c7eb-72ef-e053-3705fe0ad821
|
2
|
Exploring Alternative Designs of Socio-Technical Systems, file e3835192-2d9b-72ef-e053-3705fe0ad821
|
2
|
Protos: Foundations for Engineering Innovative Socio-Technical Systems, file e3835192-2e22-72ef-e053-3705fe0ad821
|
2
|
Goal-driven risk assessment in requirements engineering, file e3835192-2ef8-72ef-e053-3705fe0ad821
|
2
|
Taking Goal Models Downstream: A Systematic Roadmap, file e3835192-e641-72ef-e053-3705fe0ad821
|
2
|
Non-Functional Requirements as Qualities, with a Spice of Ontology, file e3835192-e6f7-72ef-e053-3705fe0ad821
|
2
|
The next release problem revisited: A new avenue for goal models, file e3835195-3a08-72ef-e053-3705fe0ad821
|
2
|
ContracT – from Legal Contracts to Formal Specifications: Preliminary Results, file e3835197-6f74-72ef-e053-3705fe0ad821
|
2
|
An Ontology for Privacy Requirements via a Systematic Literature Review, file e3835197-88de-72ef-e053-3705fe0ad821
|
2
|
Contratto – A Method for Transforming Legal Contracts into Formal Specifications, file e3835199-8f49-72ef-e053-3705fe0ad821
|
2
|
Requirements Engineering for Trust Management: Model, Methodology, and Reasoning, file 13c09a61-e059-4ed8-aec5-f2f58eb799c7
|
1
|
Symboleo2SC: From Legal Contract Specifications to Smart Contracts, file 1ef43e2c-281f-4f49-8af5-d18d4f91862e
|
1
|
Extracting Rights and Obligations from Regulations: Towards a Tool-Supported Process, file 776817d6-59fb-4fb7-b45c-fac10737402e
|
1
|
Annotating Regulations Using Cerno: an Application to Italian Documents, file a6003093-2fff-4def-9ff9-b3c929c0e36e
|
1
|
Multi-Agent Architectures as Organizational Structures, file e3835191-cc45-72ef-e053-3705fe0ad821
|
1
|
Text mining through semi automatic semantic annotation, file e3835191-ce31-72ef-e053-3705fe0ad821
|
1
|
Computer-aided Support for Secure Tropos, file e3835191-ce95-72ef-e053-3705fe0ad821
|
1
|
Design of a Tool for Requirements Extraction from Legal Documents, file e3835191-cf6f-72ef-e053-3705fe0ad821
|
1
|
Evaluating Modeling Languages: An Example from the Requirements Domain, file e3835191-d35e-72ef-e053-3705fe0ad821
|
1
|
Goals in Social Media, information retrieval and intelligent agents, file e3835192-2aaf-72ef-e053-3705fe0ad821
|
1
|
From Intentions to Social Commitments: Adaptation in Multiagent Systems, file e3835192-2f04-72ef-e053-3705fe0ad821
|
1
|
Adaptive Socio-Technical Systems: a Requirements-driven Approach, file e3835192-8e94-72ef-e053-3705fe0ad821
|
1
|
Multi-objective risk analysis with goal models, file e3835193-6d82-72ef-e053-3705fe0ad821
|
1
|
Solving the next adaptation problem with prometheus, file e3835193-7437-72ef-e053-3705fe0ad821
|
1
|
Evaluation of MUSER, a holistic security requirements analysis framework, file e3835193-edc6-72ef-e053-3705fe0ad821
|
1
|
Towards an Ontology for Privacy Requirements via a Systematic Literature Review, file e3835194-3cfb-72ef-e053-3705fe0ad821
|
1
|
An Ontological Analysis of Value Propositions, file e3835194-7e58-72ef-e053-3705fe0ad821
|
1
|
NómosT: Building Large Models of Law with a Tool-Supported Process, file e3835194-f916-72ef-e053-3705fe0ad821
|
1
|
Totale |
2.077 |