Computer Science ›› 2018, Vol. 45 ›› Issue (10): 183-188.doi: 10.11896/j.issn.1002-137X.2018.10.034
• Software & Database Technology • Previous Articles Next Articles
SU Ruo, WU Ji, LIU Chao, YANG Hai-yan
CLC Number:
[1]DAVIS A M.Just Enough Requirements Management:Where Software Development Meets Marketing[M].New York:Dorest House,2005. [2]WIEGERS K,BEATTY J.软件需求[M].北京:清华大学出版社,2016. [3]TAO Y.Automatically Deriving a UML Analysis Model from a Use Case Model[D].Ottawia:Carleton University,2010. [4]ROSS D T.Structured Analysis (SA):A Language for Communicating Ideas[M]∥Programming Methodology.Springer New York,1978:16-34. [5]ROSS D T,JR K E S.Structure Analysis for Requirements Definition[J].IEEE Transactions on Software Engineering,1977,3(1):6-15. [6]MULLERY G P.CORE-a method for controlled requirement specification[C]∥International Conference on Software Engineering.1979:126-135. [7]LEITE J C S P,FREEMAN P A.Requirements Validation Through Viewpoint Resolution[J].IEEE Transactions on Software Engineering,1991,17(12):1253-1269. [8]KRUCHTEN P.Architectural Blueprints-The “4+1” View Model of Software Architecture[J].IEEE Software,1995,12(6):42-50. [9]KOTONYA G,SOMMERVILLE I.Requirements engineering with viewpoints[J].Software Engineering Journal,2002,11(1):5-18. [10]SOMMERVILLE I,SAWYER P.Requirements Engineering:A Good Practice Guide[J].European Journal of Dental Education,1997,168(1):220-221. [11]SOMMERVILLE I,SAWYER P,VILLER S.Viewpoints for Requirements Elicitation:A Practical Approach[C]∥Third International Conference on Requirements Engineering,1998.IEEE,1998:74-81. [12]BALZER R.“Tolerating Inconsistency” revisited[C]∥International Conference on Software Engineering.Toronto:IEEE Computer Press,2001:665. [13]GHEZZI C,NUSEIBEH B.Guest editorial:Introduction to the special section[J].IEEE Transactions on Software Engineering,1999,25(6):782-783. [14]EASTERBROOK S,CHECHIK M.Int’l workshop on living with inconsistency[C]∥Internationa Conference on Software Engineering.Toronto:IEEE Computer Press,2001:749-750. [15]ZHU X F,JIN Z.About inconsistency management in software requirements [J].Journal of Software,2005,16(7):1221-1231.(in Chinese) 朱雪峰,金芝.关于软件需求中的不一致性管理[J].软件学报,2005,16(7):1221-1231. [16]CLARKE E,GRUMBERG O,LONG D.Verification tools for finite-state concurrent systems[C]∥REX School /Symposium on A Decade of Concurrency,Beflections and Perspectives.London:Springer-Verlag,1994:124-175. [17]MCMILLAN L.Symbolic model checking [D].Pittsburgh:Carnegie Mellon University,1992. [18]HOLZMANN J.The model checker SPIN[J].IEEE Transac- tions on Software Engineering,1997,23(5):279-295. [19]LAMSWEERDE V,DARIMONT R,LETIER E.Managing conflict in goal-driven requirements engineering[J].IEEE Transactions on Software Engineering,1998,24(11):908-926. [20]LAMSWEERDE V,LETIER E.Handling obstacles in goal- oriented requirements engineering[J].IEEE Transactionson Software Engineering,2000,26(10):978-1005. [21]GLINZ M.A lightweight approach to consistency of scenarios and class models[C]∥Proceedings of the 4th Int’l Conference on Requirements Engineering.Schaumburg:IEEE Computer Press,2000:49-58. [22]CARROLL J M.Scenario-based design:envisioning work and technology in system development[M].John Wiley & Sons,Inc.,1995:375-376. [23]JARKE M,BUI X T,CARROLL J M.Scenario Management: An Interdisciplinary Approach[J].Requirements Engineering,1998,3(3/4):155-173. [24]FANMUY G,FRAGA A,LLORENS J.Requirements Verification in the Industry[J].Complex Systems Design & Management,2012,13(169):145-160. [25]YAN Y Q,LI S X,MEI X Y.Defect needs analysis and management model[J].Computer Science,2009,36(4):140-144.(in Chinese) 严玉清,李师贤,梅晓勇.缺陷需求分析与管理模型[J].计算机科学,2009,36(4):140-144. [26]KOESTERS G.Coupling Use cases and Class Models as a Means for validation and verification of requirements Specification[J].Requirements Engineering,2001,6(1):3-17. [27]LEITE J C S D P,HADAD G D S,DOORN J H,et al.Scenario Construction Process[J].Requirements Engineering,2000,5(1):38-61. [28]Software Considerations in Airborne Systems and Equipment Certification:DO-178B/C[S].1982. [29]IEEE.Recommended practice for software requirements specifications[S].1998. |
[1] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[4] | XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang. Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism [J]. Computer Science, 2022, 49(7): 212-219. |
[5] | PAN Zhi-yong, CHENG Bao-lei, FAN Jian-xi, BIAN Qing-rong. Algorithm to Construct Node-independent Spanning Trees in Data Center Network BCDC [J]. Computer Science, 2022, 49(7): 287-296. |
[6] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[7] | HUANG Jue, ZHOU Chun-lai. Frequency Feature Extraction Based on Localized Differential Privacy [J]. Computer Science, 2022, 49(7): 350-356. |
[8] | YE Yue-jin, LI Fang, CHEN De-xun, GUO Heng, CHEN Xin. Study on Preprocessing Algorithm for Partition Reconnection of Unstructured-grid Based on Domestic Many-core Architecture [J]. Computer Science, 2022, 49(6): 73-80. |
[9] | ZHAO Jing-wen, FU Yan, WU Yan-xia, CHEN Jun-wen, FENG Yun, DONG Ji-bin, LIU Jia-qi. Survey on Multithreaded Data Race Detection Techniques [J]. Computer Science, 2022, 49(6): 89-98. |
[10] | CHEN Xin, LI Fang, DING Hai-xin, SUN Wei-ze, LIU Xin, CHEN De-xun, YE Yue-jin, HE Xiang. Parallel Optimization Method of Unstructured-grid Computing in CFD for DomesticHeterogeneous Many-core Architecture [J]. Computer Science, 2022, 49(6): 99-107. |
[11] | WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271. |
[12] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[13] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[14] | YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495. |
[15] | CHEN Jun-wu, YU Hua-shan. Strategies for Improving Δ-stepping Algorithm on Scale-free Graphs [J]. Computer Science, 2022, 49(6A): 594-600. |
|