default search action
Search dblp for Publications
export results for "toc:db/conf/re/relaw2009.bht:"
@inproceedings{DBLP:conf/re/Abu-NimehM09, author = {Saeed Abu{-}Nimeh and Nancy R. Mead}, title = {Privacy Risk Assessment in Privacy Requirements Engineering}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {17--18}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.10}, doi = {10.1109/RELAW.2009.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/Abu-NimehM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/AlspaughS09, author = {Thomas A. Alspaugh and Walt Scacchi}, title = {Heterogeneously-Licensed System Requirements, Acquisition and Governance}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {13--14}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.5}, doi = {10.1109/RELAW.2009.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/AlspaughS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/AtaullahT09, author = {Ahmed A. Ataullah and Frank Wm. Tompa}, title = {Records Retention in Relational Database Systems: Bridging the Gap between Laws and Enforcement Actions}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {15--16}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.11}, doi = {10.1109/RELAW.2009.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/AtaullahT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HassanL09, author = {Wa{\"{e}}l Hassan and Luigi Logrippo}, title = {Governance Requirements Extraction Model for Legal Compliance Validation}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.4}, doi = {10.1109/RELAW.2009.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/HassanL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/IshikawaIH09, author = {Fuyuki Ishikawa and Rihoko Inoue and Shinichi Honiden}, title = {Modeling, Analyzing and Weaving Legal Interpretations in Goal-Oriented Requirements Engineering}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {39--44}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.8}, doi = {10.1109/RELAW.2009.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/IshikawaIH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/Kaur09, author = {Gurleen Kaur}, title = {Analyzing Email Archives to Better Understand Legal Requirements}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {21--26}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.2}, doi = {10.1109/RELAW.2009.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/Kaur09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/KrausovaMS09, author = {Alzbeta Krausov{\'{a}} and Fabio Massacci and Ayda Sa{\"{\i}}dane}, title = {Legal Patterns Implement Trust in {IT} Requirements: When Legal Means are the "Best" Implementation of {IT} Technical Goals}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {33--38}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.7}, doi = {10.1109/RELAW.2009.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/KrausovaMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/MasseyOA09, author = {Aaron K. Massey and Paul N. Otto and Annie I. Ant{\'{o}}n}, title = {Prioritizing Legal Requirements}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {27--32}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.9}, doi = {10.1109/RELAW.2009.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/MasseyOA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/MaxwellA09a, author = {Jeremy C. Maxwell and Annie I. Ant{\'{o}}n}, title = {Checking Existing Requirements for Compliance with Law Using a Production Rule Model}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.3}, doi = {10.1109/RELAW.2009.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/MaxwellA09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/SienaPSM09, author = {Alberto Siena and Anna Perini and Angelo Susi and John Mylopoulos}, title = {A Meta-Model for Modelling Law-Compliant Requirements}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {45--51}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.1}, doi = {10.1109/RELAW.2009.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/SienaPSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/YoungA09, author = {Jessica D. Young and Annie I. Ant{\'{o}}n}, title = {Identifying Commitment-Based Software Requirements to Thwart Unfair and Deceptive Practices}, booktitle = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, pages = {19--20}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RELAW.2009.6}, doi = {10.1109/RELAW.2009.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/YoungA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2009relaw, title = {Second International Workshop on Requirements Engineering and Law, {RELAW} 2009, Atlanta, Georgia, USA, September 1, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5458387/proceeding}, isbn = {978-0-7695-4102-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/2009relaw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.