Ibrahim and Hassan Ali (IBM Egypt), Hany Ouda,
(Etisalat Egypt Telecommunications), and Mohamed
Hassan Abdelrahman (Vodafone Egypt
Telecommunications).
REFERENCES
Chakraborty, A. et al, 2012. The Role of Requirement
Engineering in Software Development Life Cycle. In
Journal of Emerging Trends in Computing and
Information Sciences. vol 3. 2012.
Computing and Information Sciences. vol 3. 2012.A Guide
to the Business Analysis Body of Knowledge, Release
1.6. International Institute of Business Analysis
(2006). http://www.theiiba.org
Khaled, O. M., et al, 2016. A Pervasive Computing
Business Reference Architecture: The Basic
Requirements Model, vol. 10, issue 1, pp. 17-46. In
International Journal of Software Engineering (IJSE).
Liu, J. et al., 2014. Research on the reengineering of
warehousing process based on Internet of Things.
Progress in Informatics and Computing (PIC), 2014
International Conference on, Shanghai, 2014, pp. 567-
571.
Salado, A. and Nilchiani, R., 2016. The Concept of Order
of Conflict in Requirements Engineering. in IEEE
Systems Journal, vol. 10, no. 1, pp. 25-35, March
2016.
Kolos-Mazuryk, L., et al., 2005. Requirements
Engineering for Pervasive Services. In Workshop on
Building Software for Pervasive Computing, OOPSLA
2005.
Afridi, A. H. and Gul, S., 2008. Method Assisted
Requirements Elicitation for Context Aware
Computing for the Field Force. Proceedings of the
International MultiConference of Engineers and
Computer Scientists 2008.
Muñoz, J., Pelechano, V., 2006. Building a Software
Factory for Pervasive Systems Development. 8th
International Conference on Enterprise Information
Systems (ICEIS 2006), Paphos (Cyprus) 23 - 27, May
2006. pags: 337.
Pérez, F. and Valderas, P., 2009. Allowing End-Users to
Actively Participate within the Elicitation of Pervasive
System Requirements through Immediate
Visualization. In Proceedings of the 2009 Fourth
International Workshop on Requirements Engineering
Visualization (REV '09). IEEE Computer Society,
Washington, DC, USA, 31-40.
Salado, A. and Nilchiani, R., 2014. The Tension Matrix
and the Concept of Elemental Decomposition:
Improving Identification of Conflicting Requirements.
in IEEE Systems Journal, vol.PP, no.99, pp.1-12
Sadana, V. and Liu, X. F., 2007. Analysis of Conflicts
among Non-Functional Requirements Using
Integrated Analysis of Functional and Non-Functional
Requirements. Computer Software and Applications
Conference, 2007. COMPSAC 2007. 31st Annual
International, Beijing, 2007, pp. 215-218.
Oster, Z. J. et al., 2015. Scalable modeling and analysis of
requirements preferences: A qualitative approach
using CI-Nets. 2015 IEEE 23rd International
Requirements Engineering Conference (RE), Ottawa,
ON, 2015, pp. 214-219.
Spinola, R., and Travassos, G., 2012. Towards a
framework to characterize ubiquitous software
projects. Information and Software Technology, v. 54,
2012, pp. 759-785.
Yang, H. and Helal, A., 2008. Safety Enhancing
Mechanisms for Pervasive Computing Systems in
Intelligent Environments. Sixth Annual IEEE
International Conference on Pervasive Computing and
Communications.
Dobson, S., et al., 2010. Fulfilling the Vision of
Autonomic Computing. In Computer, vol.43, no.1,
pp.35-41, Jan. 2010.
Coulouris, G., et al., 2012. Distributed Systems Concepts
and Design. Fifth Edition. Addison-Wesley Publishing
Company.
Internet of Things Architecture IoT-A Project Deliverable
D6.2 – Updated Requirements. http://www.iot-a.eu.
Date: January 31, 2011.
Viana, J. R. M., et al., 2014. A Systematic Review on
Software Engineering in Pervasive Games
Development. 2014 Brazilian Symposium on
Computer Games and Digital Entertainment, Porto
Alegre, 2014, pp. 51-60.
Khaled, Osama M. et al., 2015. On the Road to a
Reference Architecture for Pervasive Computing. In
the 5th International Joint Conference on Pervasive
and Embedded Computing and Communication
Systems, Feb 11-13, 2015, Angers, France.
Sommerville, I, 2011. Software Engineering. Ninth
Edition. Addison-Wesley Publishing Company.
Purao, S. et al., 2007. Understanding enterprise integration
project risks: A focus group study. Database and
Expert Systems Applications. DEXA ’07. 18th
International Conference on, pages 850–854, 3-7 Sept.
2007.
Nosrati, M. et al., 2012. Mobile Computing: Principles,
Devices and Operating Systems. World Applied
Programming, Vol (2), Issue (7), July 2012. 399-408.
Joinson, Adam N. et al., 2010. Privacy, Trust, and Self-
Disclosure Online. HUMAN–COMPUTER
INTERACTION, Volume 25, pp. 1–2.
Kostakos, V., et al., 2006. Designing Urban Pervasive
Systems. Computer, v.39 n.9, p.52-59, September
2006.
Wang, X. et al., 2015. Dynamic Low-Power
Reconfiguration of Real-Time Systems With Periodic
and Probabilistic Tasks. In IEEE Transactions on
Automation Science and Engineering, vol. 12, no. 1,
pp. 258-271, Jan. 2015.
Ray, A. and Cleaveland, R., 2014. An analysis method for
medical device security. In Proceedings of the 2014
Symposium and Bootcamp on the Science of Security