共查询到20条相似文献,搜索用时 31 毫秒
1.
A case study of requirements engineering practice is reported. The application, a decision support system for the Greek Ministry
of Health, was investigated by studying the process of requirements analysis through to design and implementation. A usability
analysis was then conducted on the designed system with the users. Several usability problems were discovered, and interviews
uncovered further problems with the system that could be attributed to failure in requirements engineering (RE). Even though
requirements were explicitly stated and the system was an evolution from an existing legacy system, functionality was defective
and usability was poor. The client’s prime concern for redeveloping the system was to improve usability; unfortunately communications
problems in the RE process meant that the developers did not appreciate this. The implications for RE methods and understanding
the RE process are discussed. 相似文献
2.
Linguistic Problems with Requirements and Knowledge Elicitation 总被引:1,自引:0,他引:1
David C. Sutton 《Requirements Engineering》2000,5(2):114-124
Human and conversational aspects of requirements and knowledge identification are employed to show that requirements ‘engineering’
is not the same as civil engineering or scientific problem solving. Not only can requirements not be made fully explicit at
the start of a project, they cannot be made fully explicit at all. A need is identified to enhance computer-based information
systems (CBIS) development methods to accommodate: plurality of incommensurable perspectives, languages and agendas; dynamic
representations of system features that can be experienced rather than abstracted and forced into an abstract paper-based
representation; recognition that CBIS development is in general a continuous process where users changing their minds is a
natural and necessary indication or organisational vitality.
It is suggested that prototyping and rapid application development go some way to addressing these requirements but that
they require further development in the light of the theoretical light thrown on the nature of the problem. 相似文献
3.
Darrell Raymond 《Requirements Engineering》2002,7(4):179-191
Engineering information system deployment is squeezed by a shrinking commitment to requirements definition and an expanding
need to determine the security requirements of such systems. This paper examines the causes and effects of this squeeze. Commitment
is shrinking because of past requirements experiences, misunderstood trends in system development and requirements fatigue,
while needs are expanding because of recent emphasis on Internet access to data, online transactions and workflow, which greatly
increase the severity of the authorisation problem. Some approaches to quantifying and addressing this problem are introduced.
Correspondence and offprint requests to: D. Raymond, 305 Bushview Crescent, Waterloo, Ontario, Canada N2V 2A6. Email: darrell.raymond@sympatico.ca 相似文献
4.
Cynthia E. Irvine Timothy Levin Jeffery D. Wilson David Shifflett Barbara Pereira 《Requirements Engineering》2002,7(4):192-206
Requirements specifications for high-assurance secure systems are rare in the open literature. This paper examines the development
of a requirements document for a multilevel secure system that must meet stringent assurance and evaluation requirements.
The system is designed to be secure, yet combines popular commercial components with specialised high-assurance ones. Functional
and non-functional requirements pertinent to security are discussed. A multidimensional threat model is presented. The threat
model accounts for the developmental and operational phases of system evolution and for each phase accounts for both physical
and non-physical threats. We describe our team-based method for developing a requirements document and relate that process
to techniques in requirements engineering. The system requirements document presented provides a calibration point for future
security requirements engineering techniques intended to meet both functional and assurance goals.
RID="*"
ID="*"The views expressed in this paper are those of the authors and should not be construed to reflect those of their employers
or the Department of Defense. This work was supported in part by the MSHN project of the DARPA/ITO Quorum programme and by
the MYSEA project of the DARPA/ATO CHATS programme.
Correspondence and offprint requests to: T. Levin, Department of Computer Science, Naval Postgraduate School, Monterey, CA 93943-5118, USA. Tel.: +1 831 656 2339;
Fax: +1 831 656 2814; Email: levin@nps.navy.mil 相似文献
5.
Requirements Engineering-Based Conceptual Modelling 总被引:1,自引:1,他引:1
The software production process involves a set of phases where a clear relationship and smooth transitions between them should
be introduced. In this paper, a requirements engineering-based conceptual modelling approach is introduced as a way to improve
the quality of the software production process. The aim of this approach is to provide a set of techniques and methods to
capture software requirements and to provide a way to move from requirements to a conceptual schema in a traceable way. The
approach combines a framework for requirements engineering (TRADE) and a graphical object-oriented method for conceptual modelling
and code generation (OO-Method). The intended improvement of the software production process is accomplished by providing
a precise methodological guidance to go from the user requirements (represented through the use of the appropriate TRADE techniques)
to the conceptual schema that properly represents them (according to the conceptual constructs provided by the OO-Method).
Additionally, as the OO-Method provides full model-based code generation features, this combination minimises the time dedicated
to obtaining the final software product. 相似文献
6.
Shared memory provides a convenient programming model for parallel applications. However, such a model is provided on physically
distributed memory systems at the expense of efficiency of execution of the applications. For this reason, applications can
give minimum consistency requirements on the memory system, thus allowing alternatives to the shared memory model to be used
which exploit the underlying machine more efficiently. To be effective, these requirements need to be specified in a precise
way and to be amenable to formal analysis. Most approaches to formally specifying consistency conditions on memory systems
have been from the viewpoint of the machine rather than from the application domain.
In this paper we show how requirements on memory systems can be given from the viewpoint of the application domain formally
in a first-order theory MemReq, to improve the requirements engineering process for such systems. We show the general use of MemReq in expressing major classes of requirements for memory systems and conduct a case study of the use of MemReq in a real-life parallel system out of which the formalism arose. 相似文献
7.
From Non-Functional Requirements to Design through Patterns 总被引:8,自引:2,他引:6
8.
This paper presents an automated tool for scenario-driven requirements engineering where scenario analysis plays the central
role. It is shown that a scenario can be described by three views of data flow, entity relationship and state transition models
by slight extensions of classic data flow, entity relationship and state transition diagrams. The notions of consistency and
completeness of a set of scenarios are formally defined in graph theory terminology and automatically checked by the tool.
The tool supports automatic validation of requirements definitions by analysing the consistency between a set of scenarios
and requirements models. It also supports automatic synthesis of requirements models from a set of scenarios. Its utility
and usefulness are demonstrated by a non-trivial example in the paper. Case studies of the tools are also presented. 相似文献
9.
Deriving Goals from a Use-Case Based Requirements Specification 总被引:2,自引:2,他引:0
Annie I. Antón Ryan A. Carter Aldo Dagnino John H. Dempster Devon F. Siege 《Requirements Engineering》2001,6(1):63-73
Use cases and scenarios have emerged as prominent analysis tools during requirements engineering activities due to both their
richness and informality. In some instances, for example when a project’s budget or schedule time is reduced at short notice,
practitioners have been known to adopt a collection of use cases as a suitable substitute for a requirements specification.
Given the challenges inherent in managing large collections of scenarios, this shortcut is cause for concern and deserves
focused attention. We describe our experiences during a goal-driven requirements analysis effort for an electronic commerce
application. In particular, we identify the specific risks incurred, focusing more on the challenges imposed due to traceability,
inconsistent use of terminology, incompleteness and consistency, rather than on traditional software project management risks.
We conclude by discussing the impact of the lessons learned for requirements engineering in the context of building quality
systems during goal and scenario analysis. 相似文献
10.
Why do the business requirements and the final software product often have little in common? Why are stakeholders, developers
and managers reluctant to embrace a full requirements process? Why does everybody say, ‘We don’t have time for requirements’?
Why is the potentially most beneficial part of the development process ignored or short-changed?
Following are some observations about why the real requirements for the product often go undiscovered. We will address this
by focusing on the different concerns of the people involved in requirements. 相似文献
11.
A major contributor to the failure of information technology-based systems is the problem of understanding user or customer
requirements in the initial analysis and requirements identification stage of development. This paper identifies and describes
an approach to help overcome some of these problems, particularly the mismatch or understanding gap between the customer and
the developer. The approach is intended to be used at the early stages of requirement determination and introduces techniques
from operational research into the process. In particular set theory and Venn diagrams are used as a way of graphically representing
the relationships and gaps in understanding that may exist. The benefit obtained from the use of the technique is partly in
the graphical representations themselves but mainly in the dialogue and negotiation that result from the construction of the
diagrams. The technique has been developed in a research study of retail organisations’ use of information technology in the
UK and an example case study from the sector is used to illustrate and discuss the technique. 相似文献
12.
Constantine Stephanidis Anthony Savidis 《Universal Access in the Information Society》2001,1(1):40-55
Accessibility and high quality of interaction with products, applications, and services by anyone, anywhere, and at any time are fundamental requirements
for universal access in the emerging Information Society. This paper discusses these requirements, and their relation to the concept of automated
adaptation of user interfaces. An example application is presented, showing how adaptation can be used to accommodate the
requirements of different user categories and contexts of use. This application is then used as a vehicle for discussing a
new engineering paradigm appropriate for the development of adaptation-based user interfaces. Finally, the paper investigates
issues concerning the interaction technologies required for universal access.
Published online: 23 May 2001 相似文献
13.
We present a shared memory algorithm that allows a set of f+1 processes to wait-free “simulate” a larger system of n processes, that may also exhibit up to f stopping failures.
Applying this simulation algorithm to the k-set-agreement problem enables conversion of an arbitrary k-fault-tolerant{\it n}-process solution for the k-set-agreement problem into a wait-free k+1-process solution for the same problem. Since the k+1-processk-set-agreement problem has been shown to have no wait-free solution [5,18,26], this transformation implies that there is no
k-fault-tolerant solution to the n-process k-set-agreement problem, for any n.
More generally, the algorithm satisfies the requirements of a fault-tolerant distributed simulation.\/ The distributed simulation implements a notion of fault-tolerant reducibility\/ between decision problems. This paper defines these notions and gives examples of their application to fundamental distributed
computing problems.
The algorithm is presented and verified in terms of I/O automata. The presentation has a great deal of interesting modularity,
expressed by I/O automaton composition and both forward and backward simulation relations. Composition is used to include
a safe agreement\/ module as a subroutine. Forward and backward simulation relations are used to view the algorithm as implementing a multi-try snapshot\/ strategy.
The main algorithm works in snapshot shared memory systems; a simple modification of the algorithm that works in read/write
shared memory systems is also presented.
Received: February 2001 / Accepted: February 2001 相似文献
14.
A Feasibility Study of Automated Natural Language Requirements Analysis in Market-Driven Development 总被引:2,自引:0,他引:2
Johan Natt och Dag Björn Regnell Pär Carlshamre Michael Andersson Joachim Karlsson 《Requirements Engineering》2002,7(1):20-33
In market-driven software development there is a strong need for support to handle congestion in the requirements engineering
process, which may occur as the demand for short time-to-market is combined with a rapid arrival of new requirements from
many different sources. Automated analysis of the continuous flow of incoming requirements provides an opportunity to increase
the efficiency of the requirements engineering process. This paper presents empirical evaluations of the benefit of automated
similarity analysis of textual requirements, where existing information retrieval techniques are used to statistically measure
requirements similarity. The results show that automated analysis of similarity among textual requirements is a promising
technique that may provide effective support in identifying relationships between requirements. 相似文献
15.
S. K. Probert 《Requirements Engineering》1999,4(2):85-91
The fidelity and practicality of using soft systems methodology (SSM) to empower the workforce such that its members can make
a fuller contribution to the requirements engineering process is critically analysed. The detailed analysis is carried out
by using a (critical) philosophical approach to develop an interpretation of (some key aspects of) requirements engineering
practice in actual information systems development situations, utilising a number of practical requirements engineering studies.
This analysis is built upon to explain the relationship between requirements engineering, SSM and workforce empowerment. It
is concluded that, by maintaining critically focused attention on the economic context, it is theoretically possible to engineer
requirements for information systems that would actually empower the workforce. However, the likelihood of using SSM successfully
for this purpose is low, as the economic context in which requirements engineering takes place is largely ignored by the SSM
advocates. 相似文献
16.
G. Kotonya 《Requirements Engineering》1999,4(3):115-133
The notion of viewpoints as a means of eliciting and formulating requirements is now well known. However, there is little
practical evidence that viewpoint-based requirements methods scale up to address real problems. This paper presents a detailed
case study based on a medium-sized system, and illustrates how a viewpoint-based requirements method can be used to structure
and specify system requirements. The case study is intended to serve two purposes: first, to demonstrate the scalability of
viewpoint-based requirements methods; and second, to act as a shared example for other researchers in the field to test their
techniques and methods. The case study is based on an electronic document delivery and interchange system (EDDIS). The requirements
are presented as they appeared in the original user requirements document. The paper concludes by outlining the lessons learnt
in applying VORD to EDDIS, and proposes a set of 10 comparators that other researchers can use to compare their approaches
and techniques. 相似文献
17.
A Multi-Model View of Process Modelling 总被引:4,自引:4,他引:0
18.
Evangelia Kavakli 《Requirements Engineering》2002,6(4):237-251
The study of contemporary requirements engineering (RE) methodologies indicates that modelling of organisational goals constitutes
a central activity of the RE process. In particular, goals provide the rationale and drive the elaboration of the requirements
that operationalise them. They also provide the criteria against which the completeness and correctness of the requirements
specification is validated. In other words, requirements implement goals in the same way that programs implement design specifications.
Despite the significance of goals in RE, research in the field is fragmented. No research has so far taken place in order
to define the overall role that goals play in RE. This paper puts forward a unifying view of goal analysis in the context
of RE. This allows the identification of similarities and differences between the different conceptions of goal used by different
approaches and promotes the understanding of the overall role of goal analysis in RE. Based on this understanding the various
approaches can be put together, thus leading to a stronger goal-driven RE framework that takes advantage of the contributions
from the many streams of goal-oriented research. 相似文献
19.
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System 总被引:2,自引:0,他引:2
Guy Helmer Johnny Wong Mark Slagell Vasant Honavar Les Miller Robyn Lutz 《Requirements Engineering》2002,7(4):207-220
Requirements analysis for an intrusion detection system (IDS) involves deriving requirements for the IDS from analysis of
the intrusion domain. When the IDS is, as here, a collection of mobile agents that detect, classify, and correlate system
and network activities, the derived requirements include what activities the agent software should monitor, what intrusion
characteristics the agents should correlate, where the IDS agents should be placed to feasibly detect the intrusions, and
what countermeasures the software should initiate. This paper describes the use of software fault trees for requirements identification
and analysis in an IDS. Intrusions are divided into seven stages (following Ruiu), and a fault subtree is developed to model
each of the seven stages (reconnaissance, penetration, etc.). Two examples are provided. This approach was found to support
requirements evolution (as new intrusions were identified), incremental development of the IDS, and prioritisation of countermeasures.
Correspondence and offprint requests to: G. Helmer, Department of Computer Science, 226 Atanasoff Hall, Iowa State University, Ames, Iowa 50011, USA. Email: ghelmer@cs.iastate.edu 相似文献
20.
Round-Trip Prototyping Based on Integrated Functional and User Interface Requirements Specifications
Requirements engineering in the new millennium is facing an increasing diversity of computerised devices comprising an increasing
diversity of interaction styles for an increasing diversity of user groups. Thus the incorporation of user interface requirements
into software requirements specifications becomes more and more mandatory. Validating these requirements specifications with
hand-made, throw-away prototypes is not only expensive, but also bears the danger that validation results are not accurately
fed back into the requirements specification. In this paper, we propose an enhancement of the requirements specification method
SCORES for an explicit capturing of user interface requirements. The advantages of the approach are threefold. First, the
user interface requirements specification is UML-compliant and integrated into the functional requirements specification.
Second, prototypes for validation purposes can semi-automatically be generated. Third, the model-based generation of prototypes
allows for ‘round-trip prototyping’ such that manual changes of the prototype during the validation process are automatically
fed back into the requirements specification. 相似文献