Computer Science ›› 2018, Vol. 45 ›› Issue (10): 183-188.doi: 10.11896/j.issn.1002-137X.2018.10.034

• Software & Database Technology • Previous Articles     Next Articles

Requirement Defect Detection Based on Multi-view Card Model

SU Ruo, WU Ji, LIU Chao, YANG Hai-yan   

  1. School of Computer Science and Engineering,Beihang University,Beijing 100191,China
  • Received:2017-09-20 Online:2018-11-05 Published:2018-11-05

Abstract: Requirement stems from the understanding and expectations of different stakeholders on the real system.Requirement elicitation is crucial in the wholeprocess of software product development,and it often decides the quality of software product,even its success or failure.Due to the influence of various complex factors in the elicited requirements,there are some defects such as incompleteness,inaccuracy and conflict.The ambiguity of requirement expression and the incompleteness and inconsistency of requirement description are the most common requirement defects.This paper proposed a card model based on multi-view requirements and requirement defect detection rules.In the process of requirement acquisition,especially in the early period,the incomplete and inconsistent requirement defects from stakeholders can be found through requirement defect detection rules.Finally,the validity of this method is verified by the experiment on three project cases.

Key words: Multi-view card model, Requirement defect detection, Requirement elicitation

CLC Number: 

  • TP311
[1]DAVIS A M.Just Enough Requirements Management:Where Software Development Meets Marketing[M].New York:Dorest House,2005.
[2]WIEGERS K,BEATTY J.软件需求[M].北京:清华大学出版社,2016.
[3]TAO Y.Automatically Deriving a UML Analysis Model from a Use Case Model[D].Ottawia:Carleton University,2010.
[4]ROSS D T.Structured Analysis (SA):A Language for Communicating Ideas[M]∥Programming Methodology.Springer New York,1978:16-34.
[5]ROSS D T,JR K E S.Structure Analysis for Requirements Definition[J].IEEE Transactions on Software Engineering,1977,3(1):6-15.
[6]MULLERY G P.CORE-a method for controlled requirement specification[C]∥International Conference on Software Engineering.1979:126-135.
[7]LEITE J C S P,FREEMAN P A.Requirements Validation Through Viewpoint Resolution[J].IEEE Transactions on Software Engineering,1991,17(12):1253-1269.
[8]KRUCHTEN P.Architectural Blueprints-The “4+1” View Model of Software Architecture[J].IEEE Software,1995,12(6):42-50.
[9]KOTONYA G,SOMMERVILLE I.Requirements engineering with viewpoints[J].Software Engineering Journal,2002,11(1):5-18.
[10]SOMMERVILLE I,SAWYER P.Requirements Engineering:A Good Practice Guide[J].European Journal of Dental Education,1997,168(1):220-221.
[11]SOMMERVILLE I,SAWYER P,VILLER S.Viewpoints for Requirements Elicitation:A Practical Approach[C]∥Third International Conference on Requirements Engineering,1998.IEEE,1998:74-81.
[12]BALZER R.“Tolerating Inconsistency” revisited[C]∥International Conference on Software Engineering.Toronto:IEEE Computer Press,2001:665.
[13]GHEZZI C,NUSEIBEH B.Guest editorial:Introduction to the special section[J].IEEE Transactions on Software Engineering,1999,25(6):782-783.
[14]EASTERBROOK S,CHECHIK M.Int’l workshop on living with inconsistency[C]∥Internationa Conference on Software Engineering.Toronto:IEEE Computer Press,2001:749-750.
[15]ZHU X F,JIN Z.About inconsistency management in software requirements [J].Journal of Software,2005,16(7):1221-1231.(in Chinese)
朱雪峰,金芝.关于软件需求中的不一致性管理[J].软件学报,2005,16(7):1221-1231.
[16]CLARKE E,GRUMBERG O,LONG D.Verification tools for finite-state concurrent systems[C]∥REX School /Symposium on A Decade of Concurrency,Beflections and Perspectives.London:Springer-Verlag,1994:124-175.
[17]MCMILLAN L.Symbolic model checking [D].Pittsburgh:Carnegie Mellon University,1992.
[18]HOLZMANN J.The model checker SPIN[J].IEEE Transac- tions on Software Engineering,1997,23(5):279-295.
[19]LAMSWEERDE V,DARIMONT R,LETIER E.Managing conflict in goal-driven requirements engineering[J].IEEE Transactions on Software Engineering,1998,24(11):908-926.
[20]LAMSWEERDE V,LETIER E.Handling obstacles in goal- oriented requirements engineering[J].IEEE Transactionson Software Engineering,2000,26(10):978-1005.
[21]GLINZ M.A lightweight approach to consistency of scenarios and class models[C]∥Proceedings of the 4th Int’l Conference on Requirements Engineering.Schaumburg:IEEE Computer Press,2000:49-58.
[22]CARROLL J M.Scenario-based design:envisioning work and technology in system development[M].John Wiley & Sons,Inc.,1995:375-376.
[23]JARKE M,BUI X T,CARROLL J M.Scenario Management: An Interdisciplinary Approach[J].Requirements Engineering,1998,3(3/4):155-173.
[24]FANMUY G,FRAGA A,LLORENS J.Requirements Verification in the Industry[J].Complex Systems Design & Management,2012,13(169):145-160.
[25]YAN Y Q,LI S X,MEI X Y.Defect needs analysis and management model[J].Computer Science,2009,36(4):140-144.(in Chinese)
严玉清,李师贤,梅晓勇.缺陷需求分析与管理模型[J].计算机科学,2009,36(4):140-144.
[26]KOESTERS G.Coupling Use cases and Class Models as a Means for validation and verification of requirements Specification[J].Requirements Engineering,2001,6(1):3-17.
[27]LEITE J C S D P,HADAD G D S,DOORN J H,et al.Scenario Construction Process[J].Requirements Engineering,2000,5(1):38-61.
[28]Software Considerations in Airborne Systems and Equipment Certification:DO-178B/C[S].1982.
[29]IEEE.Recommended practice for software requirements specifications[S].1998.
[1] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[2] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[3] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[4] XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang. Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism [J]. Computer Science, 2022, 49(7): 212-219.
[5] PAN Zhi-yong, CHENG Bao-lei, FAN Jian-xi, BIAN Qing-rong. Algorithm to Construct Node-independent Spanning Trees in Data Center Network BCDC [J]. Computer Science, 2022, 49(7): 287-296.
[6] LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339.
[7] HUANG Jue, ZHOU Chun-lai. Frequency Feature Extraction Based on Localized Differential Privacy [J]. Computer Science, 2022, 49(7): 350-356.
[8] YE Yue-jin, LI Fang, CHEN De-xun, GUO Heng, CHEN Xin. Study on Preprocessing Algorithm for Partition Reconnection of Unstructured-grid Based on Domestic Many-core Architecture [J]. Computer Science, 2022, 49(6): 73-80.
[9] ZHAO Jing-wen, FU Yan, WU Yan-xia, CHEN Jun-wen, FENG Yun, DONG Ji-bin, LIU Jia-qi. Survey on Multithreaded Data Race Detection Techniques [J]. Computer Science, 2022, 49(6): 89-98.
[10] CHEN Xin, LI Fang, DING Hai-xin, SUN Wei-ze, LIU Xin, CHEN De-xun, YE Yue-jin, HE Xiang. Parallel Optimization Method of Unstructured-grid Computing in CFD for DomesticHeterogeneous Many-core Architecture [J]. Computer Science, 2022, 49(6): 99-107.
[11] WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271.
[12] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[13] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[14] YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495.
[15] CHEN Jun-wu, YU Hua-shan. Strategies for Improving Δ-stepping Algorithm on Scale-free Graphs [J]. Computer Science, 2022, 49(6A): 594-600.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!