首页 > 最新文献

2015 IEEE 23rd International Requirements Engineering Conference (RE)最新文献

英文 中文
The Personal Information Security Assistant 个人信息安全助理
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320457
Roeland H. P. Kegel
The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security requirements. It does this by elicitation of a user's privacy and security requirements (risk appetite) as well as a user's risk perception. The PISA then takes action by aligning the user's requirements and perceptions, thereby improving user awareness regarding privacy and security. This article outlines the research questions, methodology and current results associated with the PISA project.
人的因素往往是信息安全链中最薄弱的环节。个人信息安全助理项目旨在通过提高最终用户的隐私和安全意识,并使用户的个人IT环境与用户的安全要求保持一致,来解决这个问题。它通过引出用户的隐私和安全需求(风险偏好)以及用户的风险感知来实现这一点。然后,PISA通过调整用户的需求和感知来采取行动,从而提高用户对隐私和安全的认识。本文概述了与PISA项目相关的研究问题、方法和当前结果。
{"title":"The Personal Information Security Assistant","authors":"Roeland H. P. Kegel","doi":"10.1109/RE.2015.7320457","DOIUrl":"https://doi.org/10.1109/RE.2015.7320457","url":null,"abstract":"The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security requirements. It does this by elicitation of a user's privacy and security requirements (risk appetite) as well as a user's risk perception. The PISA then takes action by aligning the user's requirements and perceptions, thereby improving user awareness regarding privacy and security. This article outlines the research questions, methodology and current results associated with the PISA project.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"152 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of risk perception in security requirements composition 对安全需求构成中的风险感知进行评估
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320417
Hanan Hibshi, T. Breaux, S. Broomell
Security requirements analysis depends on how well-trained analysts perceive security risk, understand the impact of various vulnerabilities, and mitigate threats. When systems are composed of multiple machines, configurations, and software components that interact with each other, risk perception must account for the composition of security requirements. In this paper, we report on how changes to security requirements affect analysts risk perceptions and their decisions about how to modify the requirements to reach adequate security levels. We conducted two user surveys of 174 participants wherein participants assess security levels across 64 factorial vignettes. We analyzed the survey results using multi-level modeling to test for the effect of security requirements composition on participants' overall security adequacy ratings and on their ratings of individual requirements. We accompanied this analysis with grounded analysis of elicited requirements aimed at lowering the security risk. Our results suggest that requirements composition affects experts' adequacy ratings on security requirements. In addition, we identified three categories of requirements modifications, called refinements, replacements and reinforcements, and we measured how these categories compare with overall perceived security risk. Finally, we discuss the future impact of our work in security requirements assessment practice.
安全需求分析取决于训练有素的分析人员如何感知安全风险,了解各种漏洞的影响,并减轻威胁。当系统由多个相互交互的机器、配置和软件组件组成时,风险感知必须考虑到安全需求的组成。在本文中,我们报告了安全需求的变更如何影响分析人员的风险感知,以及他们关于如何修改需求以达到适当的安全级别的决策。我们对174名参与者进行了两次用户调查,其中参与者评估了64个因子的安全水平。我们使用多级建模来分析调查结果,以测试安全需求构成对参与者的整体安全充分性评级和他们对个人需求评级的影响。我们将此分析与针对降低安全风险的引出需求的基础分析相结合。我们的结果表明需求组合影响专家对安全需求的充分性评级。此外,我们确定了需求修改的三个类别,称为细化、替换和增强,并且我们测量了这些类别如何与总体感知的安全风险进行比较。最后,我们讨论了我们在安全需求评估实践中工作的未来影响。
{"title":"Assessment of risk perception in security requirements composition","authors":"Hanan Hibshi, T. Breaux, S. Broomell","doi":"10.1109/RE.2015.7320417","DOIUrl":"https://doi.org/10.1109/RE.2015.7320417","url":null,"abstract":"Security requirements analysis depends on how well-trained analysts perceive security risk, understand the impact of various vulnerabilities, and mitigate threats. When systems are composed of multiple machines, configurations, and software components that interact with each other, risk perception must account for the composition of security requirements. In this paper, we report on how changes to security requirements affect analysts risk perceptions and their decisions about how to modify the requirements to reach adequate security levels. We conducted two user surveys of 174 participants wherein participants assess security levels across 64 factorial vignettes. We analyzed the survey results using multi-level modeling to test for the effect of security requirements composition on participants' overall security adequacy ratings and on their ratings of individual requirements. We accompanied this analysis with grounded analysis of elicited requirements aimed at lowering the security risk. Our results suggest that requirements composition affects experts' adequacy ratings on security requirements. In addition, we identified three categories of requirements modifications, called refinements, replacements and reinforcements, and we measured how these categories compare with overall perceived security risk. Finally, we discuss the future impact of our work in security requirements assessment practice.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116205774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Resolving goal conflicts via argumentation-based analysis of competing hypotheses 通过基于论证的竞争性假设分析来解决目标冲突
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320418
Pradeep K. Murukannaiah, A. Kalia, Pankaj R. Telang, Munindar P. Singh
A stakeholder's beliefs influence his or her goals. However, a stakeholder's beliefs may not be consistent with the goals of all stakeholders of a system being constructed. Such belief-goal inconsistencies could manifest themselves as conflicting goals of the system to be. We propose Arg-ACH, a novel approach for capturing inconsistencies between stakeholders' goals and beliefs, and resolving goal conflicts. Arg-ACH employs a hybrid of (1) the analysis of competing hypotheses (ACH), a structured analytic technique, for systematically eliciting stakeholders' goals and beliefs, and (2) rational argumentation for determining belief-goal inconsistencies to resolve conflicts. Arg-ACH treats conflicting goals as hypotheses that compete with each other and the winning hypothesis as a goal of the system to be. Arg-ACH systematically captures the trail of a requirements engineer's thought process in resolving conflicts. We evaluated Arg-ACH via a study in which 20 subjects applied Arg-ACH or ACH to resolve goal conflicts in a sociotechnical system concerning national security. We found that Arg-ACH is superior to ACH with respect to completeness and coverage of belief search; length of belief chaining; ease of use; explicitness of the assumptions made; and repeatability of conclusions across subjects. Not surprisingly, Arg-ACH required more time than ACH: although this is justified by improvements in quality, the gap could be reduced through better tooling.
利益相关者的信念影响他或她的目标。然而,涉众的信念可能与正在构建的系统的所有涉众的目标不一致。这种信念-目标的不一致可能表现为系统目标的冲突。我们提出了Arg-ACH,这是一种捕捉利益相关者目标和信念之间不一致并解决目标冲突的新方法。Arg-ACH采用(1)竞争假设分析(ACH),一种结构化分析技术,系统地引出利益相关者的目标和信念;(2)理性论证,确定信念-目标不一致性,以解决冲突。Arg-ACH将相互冲突的目标视为相互竞争的假设,并将获胜的假设视为系统的目标。Arg-ACH系统地捕捉需求工程师在解决冲突时的思维过程。我们通过一项研究来评估Arg-ACH,在这项研究中,20名受试者应用Arg-ACH或ACH来解决涉及国家安全的社会技术系统中的目标冲突。结果表明,Arg-ACH算法在信念搜索的完备性和覆盖性方面优于ACH算法;信念链长度;易用性;假设的明确性;以及结论的可重复性。毫不奇怪,Arg-ACH比ACH需要更多的时间:尽管质量的提高证明了这一点,但可以通过更好的工具来缩小差距。
{"title":"Resolving goal conflicts via argumentation-based analysis of competing hypotheses","authors":"Pradeep K. Murukannaiah, A. Kalia, Pankaj R. Telang, Munindar P. Singh","doi":"10.1109/RE.2015.7320418","DOIUrl":"https://doi.org/10.1109/RE.2015.7320418","url":null,"abstract":"A stakeholder's beliefs influence his or her goals. However, a stakeholder's beliefs may not be consistent with the goals of all stakeholders of a system being constructed. Such belief-goal inconsistencies could manifest themselves as conflicting goals of the system to be. We propose Arg-ACH, a novel approach for capturing inconsistencies between stakeholders' goals and beliefs, and resolving goal conflicts. Arg-ACH employs a hybrid of (1) the analysis of competing hypotheses (ACH), a structured analytic technique, for systematically eliciting stakeholders' goals and beliefs, and (2) rational argumentation for determining belief-goal inconsistencies to resolve conflicts. Arg-ACH treats conflicting goals as hypotheses that compete with each other and the winning hypothesis as a goal of the system to be. Arg-ACH systematically captures the trail of a requirements engineer's thought process in resolving conflicts. We evaluated Arg-ACH via a study in which 20 subjects applied Arg-ACH or ACH to resolve goal conflicts in a sociotechnical system concerning national security. We found that Arg-ACH is superior to ACH with respect to completeness and coverage of belief search; length of belief chaining; ease of use; explicitness of the assumptions made; and repeatability of conclusions across subjects. Not surprisingly, Arg-ACH required more time than ACH: although this is justified by improvements in quality, the gap could be reduced through better tooling.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Incorporating preferences from multiple stakeholders in software requirements selection an interactive search-based approach 在软件需求选择中结合来自多个涉众的偏好,这是一种基于交互式搜索的方法
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320455
Antônio Mauricio Pitangueira
The software requirements selection process has an important role in software development because it aims in identifying an (close to) optimal subset of candidate requirements by exploiting trade-offs among these requirements to satisfy the demands of users. Usually, more than one stakeholder participates in the requirements selection process analyzing important aspects in this context, such as budget, costs, available resources, and technical aspects to find a set of requirements that meets the users' needs. In a scenario in which different stakeholders are involved, the inclusion of their preferences, decision criteria and judgment are important factors to guarantee the selection of the best requirements according to project constraints. An interactive approach to incorporate preferences from multiple stakeholders is proposed aiming to assist users in obtaining solutions as close to their needs.
软件需求选择过程在软件开发中具有重要的作用,因为它旨在通过利用这些需求之间的权衡来确定候选需求的(接近)最优子集,以满足用户的需求。通常,不止一个涉众参与需求选择过程,分析此上下文中的重要方面,例如预算、成本、可用资源和技术方面,以找到满足用户需求的一组需求。在涉及不同干系人的场景中,包含他们的偏好、决策标准和判断是保证根据项目约束选择最佳需求的重要因素。提出了一种结合多个利益相关者偏好的交互式方法,旨在帮助用户获得最接近其需求的解决方案。
{"title":"Incorporating preferences from multiple stakeholders in software requirements selection an interactive search-based approach","authors":"Antônio Mauricio Pitangueira","doi":"10.1109/RE.2015.7320455","DOIUrl":"https://doi.org/10.1109/RE.2015.7320455","url":null,"abstract":"The software requirements selection process has an important role in software development because it aims in identifying an (close to) optimal subset of candidate requirements by exploiting trade-offs among these requirements to satisfy the demands of users. Usually, more than one stakeholder participates in the requirements selection process analyzing important aspects in this context, such as budget, costs, available resources, and technical aspects to find a set of requirements that meets the users' needs. In a scenario in which different stakeholders are involved, the inclusion of their preferences, decision criteria and judgment are important factors to guarantee the selection of the best requirements according to project constraints. An interactive approach to incorporate preferences from multiple stakeholders is proposed aiming to assist users in obtaining solutions as close to their needs.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130934829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An enhanced requirements gathering interface for open source software development environments 为开源软件开发环境提供了一个增强的需求收集接口
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320442
Jaison Kuriakose, J. Parsons
In this paper, we propose an enhancement to requirements gathering interface used in open source software (OSS) development environments. Specifically we propose embedding currently used interface with reusable requirement patterns. We propose this enhancement based on the result we obtained from an experiment on the availability of requirement patterns during requirements generation in OSS development.
本文对开源软件开发环境下的需求收集接口进行了改进。我们特别建议在当前使用的接口中嵌入可重用的需求模式。我们根据在OSS开发过程中需求生成过程中需求模式可用性的实验结果提出了这种增强。
{"title":"An enhanced requirements gathering interface for open source software development environments","authors":"Jaison Kuriakose, J. Parsons","doi":"10.1109/RE.2015.7320442","DOIUrl":"https://doi.org/10.1109/RE.2015.7320442","url":null,"abstract":"In this paper, we propose an enhancement to requirements gathering interface used in open source software (OSS) development environments. Specifically we propose embedding currently used interface with reusable requirement patterns. We propose this enhancement based on the result we obtained from an experiment on the availability of requirement patterns during requirements generation in OSS development.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133754098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using real options to manage Technical Debt in Requirements Engineering 使用实物期权管理需求工程中的技术债务
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320428
Zahra Shakeri Hossein Abad, G. Ruhe
Despite the importance of Requirements Engineering (RE) for the success of software products, most of the requirements decisions such as requirements specification and prioritization are still ad hoc and depend upon the managers' preferences and the trade-offs they make. The Technical Debt (TD) metaphor looks into the trade-offs between short term and long-term goals in software development projects that may lead to increased cost in the future. This problem is mainly due to the lack of a systematic and well-defined approach to manage the high level of uncertainty in requirements decisions. In this paper, we propose to apply the real options thinking to develop a quantitative method for managing requirements decisions under uncertainty and, more specifically for managing requirements debt in software development projects. A real option is a right without an obligation to make a specific future decision depending on how uncertainty resolves. We demonstrate the application of real options in the context of requirements debt valuation by using the binomial model combined with dynamic programming. We provide an illustrative example to show how uncertainty creates option value and influences requirements decisions and finally outline a future research agenda.
尽管需求工程(RE)对于软件产品的成功很重要,但是大多数需求决策,如需求规范和优先级仍然是临时的,并且依赖于管理人员的偏好和他们所做的权衡。技术债务(TD)比喻着眼于软件开发项目中可能导致未来成本增加的短期和长期目标之间的权衡。这个问题主要是由于缺乏系统的和定义良好的方法来管理需求决策中的高度不确定性。在本文中,我们建议应用实物期权思想来开发一种定量方法,用于管理不确定性下的需求决策,更具体地说,用于管理软件开发项目中的需求债务。实物期权是一种没有义务的权利,可以根据不确定性如何解决而做出具体的未来决定。本文利用二项模型与动态规划相结合的方法,论证了实物期权在需求债务评估中的应用。我们提供了一个说明性的例子来说明不确定性如何创造期权价值并影响需求决策,最后概述了未来的研究议程。
{"title":"Using real options to manage Technical Debt in Requirements Engineering","authors":"Zahra Shakeri Hossein Abad, G. Ruhe","doi":"10.1109/RE.2015.7320428","DOIUrl":"https://doi.org/10.1109/RE.2015.7320428","url":null,"abstract":"Despite the importance of Requirements Engineering (RE) for the success of software products, most of the requirements decisions such as requirements specification and prioritization are still ad hoc and depend upon the managers' preferences and the trade-offs they make. The Technical Debt (TD) metaphor looks into the trade-offs between short term and long-term goals in software development projects that may lead to increased cost in the future. This problem is mainly due to the lack of a systematic and well-defined approach to manage the high level of uncertainty in requirements decisions. In this paper, we propose to apply the real options thinking to develop a quantitative method for managing requirements decisions under uncertainty and, more specifically for managing requirements debt in software development projects. A real option is a right without an obligation to make a specific future decision depending on how uncertainty resolves. We demonstrate the application of real options in the context of requirements debt valuation by using the binomial model combined with dynamic programming. We provide an illustrative example to show how uncertainty creates option value and influences requirements decisions and finally outline a future research agenda.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"429 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Democratic mass participation of users in Requirements Engineering? 用户在需求工程中的民主参与?
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320433
Timo Johann, W. Maalej
A large part of Requirements Engineering is concerned with involving system users, capturing their needs, and getting their feedback. As users are becoming more and more demanding, markets and technologies are evolving fast, and systems are getting more and more individual, a broad and systematic user involvement in Requirements Engineering is becoming more important than ever. This paper presents the idea of pushing user involvement in Requirements Engineering to its extreme by systematically delegating the responsibility for developing the requirements and deciding about future releases to the crowd of users. We summarize the pros and cons of this vision, its main challenges, and sketch promising solution concepts, which have been proposed and used in E-Participation and E-Democracy. We discussed our vision with ten experts from the fields of Requirements Engineering, politics, psychology, and market research, who were partly supportive partly skeptical.
需求工程的很大一部分涉及到系统用户,获取他们的需求,并获得他们的反馈。随着用户的要求越来越高,市场和技术发展迅速,系统变得越来越个性化,在需求工程中广泛而系统的用户参与变得比以往任何时候都重要。本文通过系统地将开发需求和决定未来发布的责任委托给用户群,将用户参与需求工程的想法推向极致。我们总结了这一愿景的利弊、主要挑战,并概述了在电子参与和电子民主中提出和使用的有希望的解决方案概念。我们与来自需求工程、政治、心理学和市场研究领域的10位专家讨论了我们的愿景,他们部分支持,部分持怀疑态度。
{"title":"Democratic mass participation of users in Requirements Engineering?","authors":"Timo Johann, W. Maalej","doi":"10.1109/RE.2015.7320433","DOIUrl":"https://doi.org/10.1109/RE.2015.7320433","url":null,"abstract":"A large part of Requirements Engineering is concerned with involving system users, capturing their needs, and getting their feedback. As users are becoming more and more demanding, markets and technologies are evolving fast, and systems are getting more and more individual, a broad and systematic user involvement in Requirements Engineering is becoming more important than ever. This paper presents the idea of pushing user involvement in Requirements Engineering to its extreme by systematically delegating the responsibility for developing the requirements and deciding about future releases to the crowd of users. We summarize the pros and cons of this vision, its main challenges, and sketch promising solution concepts, which have been proposed and used in E-Participation and E-Democracy. We discussed our vision with ten experts from the fields of Requirements Engineering, politics, psychology, and market research, who were partly supportive partly skeptical.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133479329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Breeze: A modeling tool for designing, analyzing, and improving software architecture Breeze:用于设计、分析和改进软件架构的建模工具
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320440
Luxi Chen, Linpeng Huang, Hao Zhong, Chen Li, Xiwen Wu
One of the key challenges in the software engineering lies in requirement engineering. As an important technique for modeling and analyzing requirements, software architecture has been intensively studied in recent years. Although various modeling tools have been proposed in both academy and industry, these tools typically provide limited support for analyzing non-functional requirements at architecture level. To address this problem, in this tool demo, we present a tool, called Breeze, that models, analyzes, and improves software architecture, with an emphasis on its non-functional requirements. In particular, Breeze has three key modules: (1) a modeling module that facilitates the modeling for software systems, (2) an analysis module that verifies non-functional requirements (e.g. safety, reliability and correctness) at the architecture level, and (3) a reconfiguration module that allows users to repair defects or to further improve architectures.
软件工程中的一个关键挑战在于需求工程。软件体系结构作为一种重要的需求建模和分析技术,近年来得到了广泛的研究。尽管学术界和工业界都提出了各种各样的建模工具,但是这些工具通常对分析体系结构级别的非功能需求提供有限的支持。为了解决这个问题,在这个工具演示中,我们展示了一个名为Breeze的工具,它对软件架构进行建模、分析和改进,并强调其非功能性需求。特别是,Breeze有三个关键模块:(1)一个建模模块,它促进了软件系统的建模;(2)一个分析模块,它在体系结构级别上验证非功能需求(例如安全性、可靠性和正确性);(3)一个重新配置模块,它允许用户修复缺陷或进一步改进体系结构。
{"title":"Breeze: A modeling tool for designing, analyzing, and improving software architecture","authors":"Luxi Chen, Linpeng Huang, Hao Zhong, Chen Li, Xiwen Wu","doi":"10.1109/RE.2015.7320440","DOIUrl":"https://doi.org/10.1109/RE.2015.7320440","url":null,"abstract":"One of the key challenges in the software engineering lies in requirement engineering. As an important technique for modeling and analyzing requirements, software architecture has been intensively studied in recent years. Although various modeling tools have been proposed in both academy and industry, these tools typically provide limited support for analyzing non-functional requirements at architecture level. To address this problem, in this tool demo, we present a tool, called Breeze, that models, analyzes, and improves software architecture, with an emphasis on its non-functional requirements. In particular, Breeze has three key modules: (1) a modeling module that facilitates the modeling for software systems, (2) an analysis module that verifies non-functional requirements (e.g. safety, reliability and correctness) at the architecture level, and (3) a reconfiguration module that allows users to repair defects or to further improve architectures.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting online human knowledge in Requirements Engineering 在需求工程中开发在线人类知识
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320434
Anas Mahmoud, D. Carver
Data-driven Natural Language Processing (NLP) methods have noticeably advanced in the past few years. These advances can be tied to the drastic growth of the quality of collaborative knowledge bases (KB) available on the World Wide Web. Such KBs contain vast amounts of up-to-date structured human knowledge and common sense data that can be exploited by NLP methods to discover otherwise-unseen semantic dimensions in text, aiding in tasks related to natural language understanding, classification, and retrieval. Motivated by these observations, we describe our research agenda for exploiting online human knowledge in Requirements Engineering (RE). The underlying assumption is that requirements are a product of the human domain knowledge that is expressed mainly in natural language. In particular, our research is focused on methods that exploit the online encyclopedia Wikipedia as a textual corpus. Wikipedia provides access to a massive number of real-world concepts organized in hierarchical semantic structures. Such knowledge can be analyzed to provide automated support for several exhaustive RE activities including requirements elicitation, understanding, modeling, traceability, and reuse, across multiple application domains. This paper describes our preliminary findings in this domain, current state of research, and prospects of our future work.
数据驱动的自然语言处理(NLP)方法在过去几年中取得了显著进展。这些进步可以与万维网上可用的协作知识库(KB)质量的急剧增长联系起来。这样的知识库包含大量最新的结构化人类知识和常识数据,这些数据可以被NLP方法利用来发现文本中其他不可见的语义维度,帮助完成与自然语言理解、分类和检索相关的任务。在这些观察的激励下,我们描述了在需求工程(RE)中开发在线人类知识的研究议程。潜在的假设是需求是主要用自然语言表达的人类领域知识的产物。特别是,我们的研究集中在利用在线百科全书维基百科作为文本语料库的方法上。维基百科提供了对以分层语义结构组织的大量现实世界概念的访问。可以对这些知识进行分析,从而为几个详尽的可再生资源活动提供自动化支持,这些活动包括跨多个应用程序域的需求引出、理解、建模、可跟踪性和重用。本文介绍了我们在这一领域的初步发现、研究现状以及对未来工作的展望。
{"title":"Exploiting online human knowledge in Requirements Engineering","authors":"Anas Mahmoud, D. Carver","doi":"10.1109/RE.2015.7320434","DOIUrl":"https://doi.org/10.1109/RE.2015.7320434","url":null,"abstract":"Data-driven Natural Language Processing (NLP) methods have noticeably advanced in the past few years. These advances can be tied to the drastic growth of the quality of collaborative knowledge bases (KB) available on the World Wide Web. Such KBs contain vast amounts of up-to-date structured human knowledge and common sense data that can be exploited by NLP methods to discover otherwise-unseen semantic dimensions in text, aiding in tasks related to natural language understanding, classification, and retrieval. Motivated by these observations, we describe our research agenda for exploiting online human knowledge in Requirements Engineering (RE). The underlying assumption is that requirements are a product of the human domain knowledge that is expressed mainly in natural language. In particular, our research is focused on methods that exploit the online encyclopedia Wikipedia as a textual corpus. Wikipedia provides access to a massive number of real-world concepts organized in hierarchical semantic structures. Such knowledge can be analyzed to provide automated support for several exhaustive RE activities including requirements elicitation, understanding, modeling, traceability, and reuse, across multiple application domains. This paper describes our preliminary findings in this domain, current state of research, and prospects of our future work.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130493503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Selecting creativity techniques for creative requirements: An evaluation of four techniques using creativity workshops 为创意需求选择创意技术:利用创意工作坊对四种创意技术进行评估
Pub Date : 2015-11-05 DOI: 10.1109/RE.2015.7320409
Richard Berntsson-Svensson, Maryam Taghavianfar
Requirements engineering is recognized as a creative process where stakeholders jointly discover new creative ideas for innovative and novel products that eventually are expressed as requirements. This paper evaluates four different creativity techniques, namely Hall of Fame, Constraint Removal, Brainstorming, and Idea Box, using creativity workshops with students and industry practitioners. In total, 34 creativity workshops were conducted with 90 students from two universities, and 86 industrial practitioners from six companies. The results from this study indicate that Brainstorming can generate by far the most ideas, while Hall of Fame generates most creative ideas. Idea Box generates the least number of ideas, and the least number of creative ideas. Finally, Hall of Fame was the technique that led to the most number of requirements that was included in future releases of the products.
需求工程被认为是一个创造性的过程,在这个过程中,涉众共同为创新的和新颖的产品发现新的创造性的想法,这些想法最终被表达为需求。本文评估了四种不同的创造力技术,即名人堂,约束去除,头脑风暴和创意盒,使用与学生和行业从业者的创造力研讨会。来自两所大学的90名学生和来自六家公司的86名业界人士共举办了34个创意工作坊。这项研究的结果表明,到目前为止,头脑风暴能产生最多的想法,而名人堂能产生最多的创意。“创意盒”产生的创意最少,创意最少。最后,Hall of Fame是一种技术,它导致了大量的需求,这些需求被包含在产品的未来版本中。
{"title":"Selecting creativity techniques for creative requirements: An evaluation of four techniques using creativity workshops","authors":"Richard Berntsson-Svensson, Maryam Taghavianfar","doi":"10.1109/RE.2015.7320409","DOIUrl":"https://doi.org/10.1109/RE.2015.7320409","url":null,"abstract":"Requirements engineering is recognized as a creative process where stakeholders jointly discover new creative ideas for innovative and novel products that eventually are expressed as requirements. This paper evaluates four different creativity techniques, namely Hall of Fame, Constraint Removal, Brainstorming, and Idea Box, using creativity workshops with students and industry practitioners. In total, 34 creativity workshops were conducted with 90 students from two universities, and 86 industrial practitioners from six companies. The results from this study indicate that Brainstorming can generate by far the most ideas, while Hall of Fame generates most creative ideas. Idea Box generates the least number of ideas, and the least number of creative ideas. Finally, Hall of Fame was the technique that led to the most number of requirements that was included in future releases of the products.","PeriodicalId":132568,"journal":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129500653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2015 IEEE 23rd International Requirements Engineering Conference (RE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1