The 32nd IEEE International Requirements Engineering Conference (RE’24) will continue the successful tutorial program of the RE conference series. RE’24 tutorials will focus on various requirements-related topics of interest to industry, academia, and government. Tutorial attendees can expect to leave a tutorial with new ideas and skills applicable to their profession or research area.

We invite you to submit proposals for full-day (approx. 7-hour) or half-day (approx. 3.5-hour) tutorials.

Call for Tutorial Proposals

We welcome tutorial proposals related to requirements engineering and business requirements analysis, including but not limited to the topics below:

  • Requirements elicitation, analysis, documentation, verification, and validation
  • Requirements management, traceability, viewpoints, prioritization, and negotiation
  • Evolution of requirements over time and across product families
  • Requirements specification languages, methods, processes, and tools
  • Prototyping, simulation, visualization, and animation of requirements
  • Requirements alignment with business goals, architecture, design, implementation, and testing
  • Social, cultural, global, personal, and cognitive factors
  • Domain-specific problems, experiences, and solutions
  • Managing requirements-related complexity (e.g., problem complexity, solution complexity, organizational complexity, etc.)
  • Requirements engineering as part of agile or DevOps development processes
  • Requirements engineering for service-oriented and cloud/fog computing systems
  • Requirements related to safety, reliability, security, privacy, ethics, and digital forensics
  • Requirements engineering for Digital Twins, IoT, or Blockchain
  • Requirements engineering for Big Data, Artificial Intelligence, Machine Learning
  • Requirements engineering for data sharing/data lakes/data mesh
  • Data/process mining for requirements engineering
  • Requirements engineering for sustainability
  • Distributed requirements engineering
  • OpenScience initiatives in Requirements engineering
  • Improving requirements engineering practices with large language models (LLMs)

Tutorial Proposal Evaluation Criteria

Evaluation criteria include the quality of the proposal, the tutorial’s anticipated benefit for prospective participants, its fit within the program as a whole, and the qualification and experience of the presenter(s).

Important Dates

Tutorial Submission deadline - 9th February, 2024

Tutorial notification - 1st March, 2024

Submission Instructions

Tutorial proposals should not exceed two pages (not counting appendices) and must be submitted via EasyChair submission page in PDF. Tutorial proposals should contain the following information:

Title and Abstract:

The abstract should be between 140 and 250 words. If the proposal is accepted, the title and abstract will appear in advertisements and on the conference website.

Motivation and Objectives:

2-3 sentences describing the motivation for why this topic is relevant to the main conference. If your tutorial has particular applicability to practitioners from industry, describe this relevance in another 2-3 sentences. If your tutorial is accepted, then this description will be used as early publicity for the tutorial.

Duration:

Full-day (7-hour) or half-day (3.5-hour), including breaks. If another format is used, it must be elaborated in detail here.

Outline of Topics:

Envision topics (e.g., in the form of a table of contents of the tutorial) Please indicate the number and type of interactive activities (such as exercises) for tutorial attendees and the motivation of why such activities have been chosen.

Target Audience:

What type of background should the tutorial attendees have? What is the envisioned number of attendees desired for the tutorial (minimum and maximum)?

Tutorial History:

Have you offered this tutorial before? If so, please provide a history of the venues, dates, and approximate attendance numbers.

Presenters’ Bios:

Provide the name and a brief (2-3 sentence) biography for each of the tutorial presenters that highlights their qualifications with respect to the tutorial.

Publicity:

Plans for promoting the tutorial and attracting participants.

Appendix:

Provide five to ten sample slides from the tutorial.

Please note that all tutorial presenters should be present in person at RE’24.


Tutorial 1: Promotion of Open Science in Requirements Engineering: Leveraging the Open Research Knowledge Graph for FAIR Scientific Information


Presenters: Oliver Karras (Leibniz Information Centre for Science and Technology), Alessio Ferrari (CNR-ISTI), Davide Fucci (Blekinge Institute of Technology) and Davide Dell’Anna (Utrecht University)

Abstract: Despite improved digital access to publications as digitized artifacts, they remain document-based and often behind paywalls, impeding open science. Researchers must push beyond the established boundary of publications as digitized documents. Open science infrastructures support them in organizing and (re-)using publications and their information so that they are Findable, Accessible, Interoperable, and Reusable (FAIR) for humans and machines in the long term. The Open Research Knowledge Graph (ORKG) is one sustainably governed infrastructure for FAIR scientific information, with successful use cases in requirements engineering (RE). The tutorial aims to familiarize the participants with open science and empower them to leverage the ORKG for FAIR scientific information. The half-day tutorial consists of three sessions: 1) A short introduction to open science and the ORKG regarding their importance, benefits, and incentives, 2) An interactive session with hands-on exercises for learning skills and practical experiences to leverage the ORKG, and 3) A feedback session for reflection. The tutorial raises awareness for open science in RE, introduces the ORKG, fosters networking, and, in the best case, establishes future collaborations. The participants become familiar with open science and the ORKG by learning skills and gaining practical experience to leverage the ORKG themselves. The transition away from digitized documents and towards FAIR scientific information is a long-term endeavor. We must gradually sensitize researchers to this transition while guiding and empowering them to leverage existing solutions as an integral part of their work. The tutorial pursues this endeavor to promote open science in RE.

Required equipment: Participants need a laptop with internet access and a browser

Date: Monday, June 24th (First half)


Tutorial 2: Modern Teaching of Requirements Engineering and Business Analysis


Presenters: Jean-Michel Bruel (University of Toulouse / CNRS-IRIT) and Sébastien Mosser (McMaster University)

Abstract: If a system is a solution, requirements state the problem. Since a solution to the wrong problem is useless, stating the problem is as important as building the solution. Hence the centrality of requirements engineering — also known as business analysis — in information technology, especially in the future era of massive use of LLMs, where prompting engineering will be a required skill. Good requirements are among the most treasurable assets of a project. Bad requirements hamper it at best and doom it at worst. Nevertheless, in today’s curriculum, requirements engineering is often perceived by students as boring and superficial. This tutorial aims to combine (i) an organised and systematic approach towards writing requirements so that they support rather than hinder the projects, and (ii) a teaching framework that illustrates the importance of benefiting, also at that level, from versioning and management tools such as Git repositories. It will provide the attendees with concrete and immediately applicable guidance, both for practitioners and for teachers.

Date: Monday, June 24th (First half)


Tutorial 3: Prompt Engineering


Presenters: Travis Breaux (Carnegie Mellon University)

Abstract:This tutorial is a half-day tutorial to introduce attendees to the history of large language models (LLMs) leading up to the discovery of in-context learning (ICL). This includes popular techniques used by commercial service providers to instruction-tune and align LLMs prior to deployment through public APIs. Attendees will learn how to write prompts by taking advantage of ICL prompt design patterns, including trigger words, demonstrations, and chain-of thought prompting. The tutorial will also cover task decomposition, in which complex tasks are decomposed into multiple, simple prompts to improve performance.

Date: Monday, June 24th (Second half)


Tutorial 4: Writing Effective Requirements


Presenter: Michael C. Panis (Teradyne, Inc.)

Abstract: Even organizations that apply requirements engineering processes do not always provide the necessary training to employees so that they can clearly communicate requirements. This tutorial focuses on some of the techniques and skills necessary to ensure written requirements will be interpreted as intended.

Date: Tuesday, June 25th (Full day)


Tutorial 5: Security Requirement Engineering for Socio-Technical Systems


Presenters: Mattia Salnitri (Politecnico di Milano) and Erlend Andreas Gjære (Secure Practice AS)

Abstract: In the past decade, there has been a notable increase in the integration of human users as active components within technical systems, giving rise to what is now recognized as sociotechnical systems. However, the advancement of security measures has not kept pace with this integration, resulting in humans becoming the vulnerable link in the security chain. To address this issue, it is imperative to engineer security requirements that encompass the characteristics of individuals, thereby guiding the design of secure socio-technical systems that are tailored to accommodate their human components. This tutorial will present socio-technical systems, the security criticalities related to their human part, and how to address them. The tutorial is targeted to academics and practitioners, with interactive activities that will guide attendees in the specification of security requirements for socio-technical systems, allow them to experience cyber and social attacks and direct them to incident response actions.

Date: Wednesday, June 26th (First half)