Computer Science ›› 2018, Vol. 45 ›› Issue (10): 183-188.doi: 10.11896/j.issn.1002-137X.2018.10.034

• Software & Database Technology • Previous Articles     Next Articles

Requirement Defect Detection Based on Multi-view Card Model

SU Ruo, WU Ji, LIU Chao, YANG Hai-yan   

  1. School of Computer Science and Engineering,Beihang University,Beijing 100191,China
  • Received:2017-09-20 Online:2018-11-05 Published:2018-11-05

Abstract: Requirement stems from the understanding and expectations of different stakeholders on the real system.Requirement elicitation is crucial in the wholeprocess of software product development,and it often decides the quality of software product,even its success or failure.Due to the influence of various complex factors in the elicited requirements,there are some defects such as incompleteness,inaccuracy and conflict.The ambiguity of requirement expression and the incompleteness and inconsistency of requirement description are the most common requirement defects.This paper proposed a card model based on multi-view requirements and requirement defect detection rules.In the process of requirement acquisition,especially in the early period,the incomplete and inconsistent requirement defects from stakeholders can be found through requirement defect detection rules.Finally,the validity of this method is verified by the experiment on three project cases.

Key words: Multi-view card model, Requirement elicitation, Requirement defect detection

CLC Number: 

  • TP311
[1]DAVIS A M.Just Enough Requirements Management:Where Software Development Meets Marketing[M].New York:Dorest House,2005.
[2]WIEGERS K,BEATTY J.软件需求[M].北京:清华大学出版社,2016.
[3]TAO Y.Automatically Deriving a UML Analysis Model from a Use Case Model[D].Ottawia:Carleton University,2010.
[4]ROSS D T.Structured Analysis (SA):A Language for Communicating Ideas[M]∥Programming Methodology.Springer New York,1978:16-34.
[5]ROSS D T,JR K E S.Structure Analysis for Requirements Definition[J].IEEE Transactions on Software Engineering,1977,3(1):6-15.
[6]MULLERY G P.CORE-a method for controlled requirement specification[C]∥International Conference on Software Engineering.1979:126-135.
[7]LEITE J C S P,FREEMAN P A.Requirements Validation Through Viewpoint Resolution[J].IEEE Transactions on Software Engineering,1991,17(12):1253-1269.
[8]KRUCHTEN P.Architectural Blueprints-The “4+1” View Model of Software Architecture[J].IEEE Software,1995,12(6):42-50.
[9]KOTONYA G,SOMMERVILLE I.Requirements engineering with viewpoints[J].Software Engineering Journal,2002,11(1):5-18.
[10]SOMMERVILLE I,SAWYER P.Requirements Engineering:A Good Practice Guide[J].European Journal of Dental Education,1997,168(1):220-221.
[11]SOMMERVILLE I,SAWYER P,VILLER S.Viewpoints for Requirements Elicitation:A Practical Approach[C]∥Third International Conference on Requirements Engineering,1998.IEEE,1998:74-81.
[12]BALZER R.“Tolerating Inconsistency” revisited[C]∥International Conference on Software Engineering.Toronto:IEEE Computer Press,2001:665.
[13]GHEZZI C,NUSEIBEH B.Guest editorial:Introduction to the special section[J].IEEE Transactions on Software Engineering,1999,25(6):782-783.
[14]EASTERBROOK S,CHECHIK M.Int’l workshop on living with inconsistency[C]∥Internationa Conference on Software Engineering.Toronto:IEEE Computer Press,2001:749-750.
[15]ZHU X F,JIN Z.About inconsistency management in software requirements [J].Journal of Software,2005,16(7):1221-1231.(in Chinese)
[16]CLARKE E,GRUMBERG O,LONG D.Verification tools for finite-state concurrent systems[C]∥REX School /Symposium on A Decade of Concurrency,Beflections and Perspectives.London:Springer-Verlag,1994:124-175.
[17]MCMILLAN L.Symbolic model checking [D].Pittsburgh:Carnegie Mellon University,1992.
[18]HOLZMANN J.The model checker SPIN[J].IEEE Transac- tions on Software Engineering,1997,23(5):279-295.
[19]LAMSWEERDE V,DARIMONT R,LETIER E.Managing conflict in goal-driven requirements engineering[J].IEEE Transactions on Software Engineering,1998,24(11):908-926.
[20]LAMSWEERDE V,LETIER E.Handling obstacles in goal- oriented requirements engineering[J].IEEE Transactionson Software Engineering,2000,26(10):978-1005.
[21]GLINZ M.A lightweight approach to consistency of scenarios and class models[C]∥Proceedings of the 4th Int’l Conference on Requirements Engineering.Schaumburg:IEEE Computer Press,2000:49-58.
[22]CARROLL J M.Scenario-based design:envisioning work and technology in system development[M].John Wiley & Sons,Inc.,1995:375-376.
[23]JARKE M,BUI X T,CARROLL J M.Scenario Management: An Interdisciplinary Approach[J].Requirements Engineering,1998,3(3/4):155-173.
[24]FANMUY G,FRAGA A,LLORENS J.Requirements Verification in the Industry[J].Complex Systems Design & Management,2012,13(169):145-160.
[25]YAN Y Q,LI S X,MEI X Y.Defect needs analysis and management model[J].Computer Science,2009,36(4):140-144.(in Chinese)
[26]KOESTERS G.Coupling Use cases and Class Models as a Means for validation and verification of requirements Specification[J].Requirements Engineering,2001,6(1):3-17.
[27]LEITE J C S D P,HADAD G D S,DOORN J H,et al.Scenario Construction Process[J].Requirements Engineering,2000,5(1):38-61.
[28]Software Considerations in Airborne Systems and Equipment Certification:DO-178B/C[S].1982.
[29]IEEE.Recommended practice for software requirements specifications[S].1998.
[1] MAO Xiang-ke, HUANG Shao-bin, YU Qin-yong. Graph Based Collaborative Extraction Method for Keywords and Summary from Documents [J]. Computer Science, 2021, 48(10): 44-50.
[2] LU Jia-wen, YAN Li. Mapping Method from Object-relational Database to RDF(S) [J]. Computer Science, 2021, 48(10): 145-151.
[3] KANG Yan, CHEN Tie, LI Hao, YANG Bing, ZHANG Ya-chuan, BU Rong-jing. Urban Traffic Flow Completion with Multi-view Attention Mechanism [J]. Computer Science, 2021, 48(10): 177-184.
[4] ZHU Han-qing, MA Wu-bin, ZHOU Hao-hao, WU Ya-hui, HUANG Hong-bin. Microservices User Requests Allocation Strategy Based on Improved Multi-objective Evolutionary Algorithms [J]. Computer Science, 2021, 48(10): 343-350.
[5] LI Shu, YANG Hua, SONG Bo. Study on Co-evolution of Underload Failure and Overload Cascading Failure in Multi-layer Supply Chain Network [J]. Computer Science, 2021, 48(10): 351-358.
[6] WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42.
[7] WANG Ying-li, JIANG Cong-cong, FENG Xiao-nian, QIAN Tie-yun. Time Aware Point-of-interest Recommendation [J]. Computer Science, 2021, 48(9): 43-49.
[8] SONG Jia-geng, ZHANG Fu-sang, JIN Bei-hong, DOU Zhu-mei. On Aircraft Trajectory Type Recognition Based on Frequent Route Patterns [J]. Computer Science, 2021, 48(9): 59-67.
[9] YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117.
[10] WU Shao-bo, FU Qi-ming, CHEN Jian-ping, WU Hong-jie, LU You. Meta-inverse Reinforcement Learning Method Based on Relative Entropy [J]. Computer Science, 2021, 48(9): 257-263.
[11] SHUI Ze-nong, ZHANG Xing-yu, SHA Chao-feng. Outlier Document Detection via Optimal Transport and k-nearest Neighbor [J]. Computer Science, 2021, 48(7): 105-111.
[12] SANG Chun-yan, XU Wen, JIA Chao-long, WEN Jun-hao. Prediction of Evolution Trend of Online Public Opinion Events Based on Attention Mechanism in Social Networks [J]. Computer Science, 2021, 48(7): 118-123.
[13] ZHAO Min, LIU Jing-lei. Semi-supervised Clustering Based on Gaussian Fields and Adaptive Graph Regularization [J]. Computer Science, 2021, 48(7): 137-144.
[14] WU Cheng-feng, CAI Li, LI Jin, LIANG Yu. Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data [J]. Computer Science, 2021, 48(7): 155-163.
[15] LIU Dan, GUO Shao-zhong, HAO Jiang-wei, XU Jin-chen. Implementation of Transcendental Functions on Vectors Based on SIMD Extensions [J]. Computer Science, 2021, 48(6): 26-33.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .