Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all t...
详细信息
ISBN:
(纸本)9780769539096
Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all the affected requirements and other impacted software artefacts (such as designs, codes, and tests) must be identified and changed accordingly. This paper introduces an approach to facilitate both engineers and users in propagating changes from requirements to the software high-level designs during software development and evolution. The two main pillars of this approach, namely product metamodel and process model are described in details. Firstly, the metamodel highlights on explicit conceptual model for volatile requirement and its characteristics. Next, the focus will be placed on the systematic process model specified using the SPEM that offers guidelines to perform the requirement change process. The applicability of the product metamodel and its elements are evaluated using the IFAMMS case study application.
In the Problem Frames (PF) approach there are five basic problem frames and some variants to them. When a problem is being analysed, it is initially matched against these frames. If the problem does not fit into the b...
详细信息
ISBN:
(纸本)9780769539096
In the Problem Frames (PF) approach there are five basic problem frames and some variants to them. When a problem is being analysed, it is initially matched against these frames. If the problem does not fit into the basic problem frames or their variants, then problem analysis is performed. It has been recognised that 'projection' is an effective technique for analysing problems. That is, each sub-problem is considered as a projection of the main problem concerned only with the phenomena relevant to that sub-problem. The PF approach lacks a precise definition of problem projection and does not provide specific instructions on how to perform this projection. In this paper, we use the concept of projection from relational algebra and combine it with concepts from the PF and scenario-based approaches to present a conceptual model for conducting problem projection in requirements engineering. This model and ontology extend problem description at scenario level and support systematic derivation of sub-problems from scenarios. We also provide a detailed process description for performing projection for problem analysis and present the utility of our approach with a case study.
The development of renewable energy resources generation technologies requires the support of VSC-HVDC systems. VSC-HVDC systems using PWM controlled Voltage Source Converters (VSCs) have the attractive features such ...
详细信息
Common Information Model (CIM) provides a logical view of the physical aspects of energy management system information. This paper proposes a software model that extends CIM for the least square based state estimation...
详细信息
software Product Line (SPL) core assets development is an effective approach in software reuse in which core assets can be shared among the members of the product line with an explicit treatment of variability. Consid...
详细信息
ISBN:
(纸本)9780769539096
software Product Line (SPL) core assets development is an effective approach in software reuse in which core assets can be shared among the members of the product line with an explicit treatment of variability. Considering reuse early in development phase can promise the increase in reuse and understanding reuse at a later development phase. This paper concentrates on identifying and representing variability at requirement level. The proposed approach differs slightly from other approaches where identification of the variant requirements is done with commonality and variability analysis and using two important requirements model, feature and use case model. Relation between both requirements model is through matrix table. This paper illustrates the application of this approach using the library systems product line example.
A specialized Requirements Capability Maturity Model (R-CMM) was created by a group of researchers from UK as an attempt to support the requirements engineering phase of software development. The validation performed ...
详细信息
ISBN:
(纸本)9780769539096
A specialized Requirements Capability Maturity Model (R-CMM) was created by a group of researchers from UK as an attempt to support the requirements engineering phase of software development. The validation performed to this model shows that it has some potentials to be a useful tool for both practitioners and researchers in the field of process improvement and requirements engineering. However, the R-CMM focuses on the requirements engineering process defined within the retired softwareengineering Institute's (SEI's) software Capability Maturity Model (SW_CMM) process improvement framework. To continue its relevance and usefulness, we re-define the whole R-CMM within the characteristics of the latest Capability Maturity Model for Integration (CMMI) for Development (CMMI-DEV) v1.2. This paper describes how the CMMI-DEV characteristics are used to re-define the R-CMM, and rationale for re-building the requirements engineering model based on the latest process improvement framework. Also, this paper explains how the redefined R-CMM adapts to the goals and practices set by the CMMI-DEV.
Risk identification is a key stage for the success and quality of in risk management of software projects. It seems being overlooked far away about the concept of knowledge ontology, which the risk identification invo...
详细信息
Code clones (duplicated source code in a software system) are one of the major factors in decreasing maintainability. Many code clone detection methods have been proposed to find code clones automatically from large-s...
详细信息
ISBN:
(纸本)9780769539096
Code clones (duplicated source code in a software system) are one of the major factors in decreasing maintainability. Many code clone detection methods have been proposed to find code clones automatically from large-scale software. However, it is still hard to find harmful code clones to improve maintainability because there are many code clones that should remain. Thus, to help find harmful code clones, we propose a code clone visualization method and a metrics application on the visualized information. Our method enables the location of harmful code clones diffused in a software system. We apply our method to three open source software programs and visualize their code clone information.
complicated onlinear relationships exist among many data in the real-time control-process of large power plant. And data-mining technology could find knowledge, analyze parameters and adjust them. This paper ascertain...
详细信息
The software Communication Architecture (SCA) is the software architecture developed as the top design by the US Military's Joint Tactical Radio System (JTRS) for the next generation of radio systems. The SCA is d...
详细信息
暂无评论