Context: The rapid evolution of softwareengineering in response to the complex demands of the modern digital society has led to increased pressure on developers to adapt quickly. However, a pragmatic approach often o...
详细信息
ISBN:
(纸本)9789897587467
Context: The rapid evolution of softwareengineering in response to the complex demands of the modern digital society has led to increased pressure on developers to adapt quickly. However, a pragmatic approach often overlooks the deeper theoretical foundations, which can result in inefficient software development practices. systems Thinking (ST), particularly through Critical systems Heuristics (CSH), offers a reflective and holistic approach to address these challenges, especially in the software requirements elicitation phase. Goal: This research aims to relate an experience of introducing systems Thinking to undergraduate students using Critical systems Heuristics as a support tool in a requirement elicitation process. Method: A mixed-methods educational experience was conducted with 36 undergraduate softwareengineering students. The students applied the CSH framework during an assignment on software requirements elicitation. The effectiveness of CSH was assessed through both quantitative measures (number and categorization of elicited requirements) and qualitative feedback (students’ perceptions and reflections). At the end of the project, we collected the students’ reflections about the application experience to gather students’ feedback Results: The application of CSH led to the elicitation of 372 total requirements, of which 25 were derived using the CSH framework. Students reported a positive impact on their overall understanding of the system but also highlighted challenges related to the complexity and time-consuming nature of the framework. Conclusion: The study demonstrates that the CSH framework can be a valuable tool in software requirements elicitation, aiding in the understanding the problem’s context and in the confirmation of requirements. While students acknowledged its benefits, they also recognized its limitations, suggesting that further refinement is needed for practical use. This experience contributes to the integration of systems Thinking
The proceedings contain 22 papers. The special focus in this conference is on engineering of Complex computersystems. The topics include: Automated Parameter Determination for Enhancing the Product Configur...
ISBN:
(纸本)9783031664557
The proceedings contain 22 papers. The special focus in this conference is on engineering of Complex computersystems. The topics include: Automated Parameter Determination for Enhancing the Product Configuration System of Renault: An Experience Report;optimal Solution Guided Branching Strategy for Neural Network Branch and Bound Verification;AccMILP: An Approach for Accelerating Neural Network Verification Based on Neuron Importance;Word2Vec-BERT-bmu:Classification of RISC-V Architecture software Package Build Failures;Test Architecture Generation by Leveraging BERT and Control and Data Flows;less is More: An Empirical Study of Undersampling Techniques for Technical Debt Prediction;modeling and Verification of Solidity Smart Contracts with the B Method;template-Based Smart Contract Verification: A Case Study on Maritime Transportation Domain;QuanSafe: A DTBN-Based Framework of Quantitative Safety Analysis for AADL Models;a Event-B-Based Approach for Schedulability Analysis For Real-Time Scheduling Algorithms through Deadlock Detection;Validation of RailML Using ProB;reachability Analysis of Concurrent Self-modifying Code;an Iterative Formal Model-Driven Approach to Railway systems Validation;an Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control;confidentiality Management in Complex systems Design;analyzing Excessive Permission Requests in Google Workspace Add-Ons;formal Verification Techniques for Post-quantum Cryptography: A Systematic Review;autoWeb: Automatically Inferring Web Framework Semantics via Configuration Mutation;safePtrX: Research on Mitigation of Heap-Based Memory Safety Violations for Intel x86-64;towards Efficiently Parallelizing Patch-Space Exploration in Automated Program Repair.
[Context & Motivation] Explainable autonomous systems are increasingly essential for engendering trust, especially when they are deployed in safety-critical scenarios. [Question/Problem] Despite the robust reliabi...
详细信息
UGVs have enormous potential in industries such as defense, agriculture, and autonomous transportation. Efficiency and effectiveness can be achieved by UGVs through the sophistication of their control systems, mainly ...
详细信息
[Context and Motivation]: Cyber-Physical systems (CPS) have become relevant in a wide variety of different domains, integrating hardware and software, often operating in an emerging and uncertain environment where hum...
详细信息
In statistical signal processing and estimation theory, discrepancies between the true data-generating model and the assumed model can lead to large estimation errors. The misspecified Cramér-Rao bound (MCRB) qua...
详细信息
The software industry is characterized by an environment of uncertainty, high volatility, and constant change. This context has shaped the industry, its components, and actors, generating methodologies capable of meet...
详细信息
This paper presents a comprehensive assessment method of the security of open source components. The process is constructed using three analytical techniques: hierarchical analysis, expert scoring, and linear weightin...
详细信息
With the growing popularity of the Internet and digital technology, network security threats are increasing, and people's demand for advanced security defense means is rising. By combining advanced deep learning a...
详细信息
This paper introduces an innovative transformerless buck-boost DC-DC converter utilizing switched capacitor (SC) and switched inductor (SL) cells, with a positively controlled output voltage. The proposed converter...
详细信息
暂无评论