首页 > 最新文献

2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)最新文献

英文 中文
Framework for Analysis of Multi-party Collaboration 多方协作分析框架
Yuliyan V. Maksimov, Samuel Fricker
In recent years, platforms have become important for allowing ecosystems to emerge that allow users to collaborate and create unprecedented forms of innovation. For the platform provider, the ecosystem represents a massive business opportunity if the platform succeeds to make the collaborations among the users value-creating and to facilitate trust. While the requirements flow for evolving existing ecosystems is understood, it is unclear how to analyse an ecosystem that is to be. In this paper, we draw on recent work on collaboration modelling in requirements engineering and propose an integrated framework for the analysis of multi-party collaboration that is to be supported by a platform. Drawing on a real-world case, we describe how the framework is applied and the results that have been obtained with it. The results indicate that the framework was useful to understand the ecosystem context for a planned platform in the domain of artificial intelligence, allowed identification of platform requirements and offered a basis to plan validation.
近年来,平台对于允许用户协作和创造前所未有的创新形式的生态系统的出现变得非常重要。对于平台提供商来说,如果平台能够成功地让用户之间的合作创造价值并促进信任,那么生态系统就代表着巨大的商业机会。虽然已经了解了现有生态系统演化的需求流程,但尚不清楚如何分析未来的生态系统。在本文中,我们借鉴了需求工程中协作建模的最新工作,并提出了一个用于分析由平台支持的多方协作的集成框架。通过一个实际案例,我们描述了如何应用该框架以及使用该框架获得的结果。结果表明,该框架有助于了解人工智能领域规划平台的生态环境,允许识别平台需求,并为规划验证提供基础。
{"title":"Framework for Analysis of Multi-party Collaboration","authors":"Yuliyan V. Maksimov, Samuel Fricker","doi":"10.1109/REW.2019.00013","DOIUrl":"https://doi.org/10.1109/REW.2019.00013","url":null,"abstract":"In recent years, platforms have become important for allowing ecosystems to emerge that allow users to collaborate and create unprecedented forms of innovation. For the platform provider, the ecosystem represents a massive business opportunity if the platform succeeds to make the collaborations among the users value-creating and to facilitate trust. While the requirements flow for evolving existing ecosystems is understood, it is unclear how to analyse an ecosystem that is to be. In this paper, we draw on recent work on collaboration modelling in requirements engineering and propose an integrated framework for the analysis of multi-party collaboration that is to be supported by a platform. Drawing on a real-world case, we describe how the framework is applied and the results that have been obtained with it. The results indicate that the framework was useful to understand the ecosystem context for a planned platform in the domain of artificial intelligence, allowed identification of platform requirements and offered a basis to plan validation.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CrowdRE: Achievements, Opportunities and Pitfalls CrowdRE:成就、机遇和陷阱
M. Glinz
This paper is an extended abstract of a keynote given at the Third International Workshop on Crowd-Based Requirements Engineering, held at RE'19. It provides a short guided tour through the landscape of CrowdRE, highlighting achievements, opportunities and pitfalls of CrowdRE.
本文是在RE'19举行的第三届基于人群的需求工程国际研讨会上发表的主题演讲的扩展摘要。它提供了一个简短的导游通过CrowdRE的景观,突出CrowdRE的成就,机遇和陷阱。
{"title":"CrowdRE: Achievements, Opportunities and Pitfalls","authors":"M. Glinz","doi":"10.1109/REW.2019.00036","DOIUrl":"https://doi.org/10.1109/REW.2019.00036","url":null,"abstract":"This paper is an extended abstract of a keynote given at the Third International Workshop on Crowd-Based Requirements Engineering, held at RE'19. It provides a short guided tour through the landscape of CrowdRE, highlighting achievements, opportunities and pitfalls of CrowdRE.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"17 42","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Examination of Evaluation Method on Human Error During Work by Bioinstrumentation 生物仪器工作中人为误差评定方法的检验
Taro Kishimoto, Reiji Yoshida, Y. Tobe, Midori Sugaya
In recent years, mechanisms to detect and correct human errors by AI and efforts to automate business operations have been advancing. Human errors are expected to be fatal in the future, and they need to be predicted and prevented in advance. Researches has also been proposed to analyze human errors from a model of human behavior and electroencephalograms, but no other useful biological information is considered. Therefore, in this research, we thought that prediction and detection could be performed by adding autonomic nerves that can be acquired from heart rate as biological information and observing patterns before and after mistakes. In order to realize it, we measured the pulse and EEG of the worker who is carrying out the computational task, developed an experimental system to investigate the question and timing of the task, assumed that it that it is possible to evaluate the electroencephalogram and pulse at the time of human error occurrence by the computational task. In addition, a questionnaire based on NASA Task Load Index was conducted to enable analysis using subjective assessment of the tasks. Through the evaluation experiments, it was suggested that it is possible to detect the occurrence of human error in the group that answered that emphasized a particular measure in the questionnaire.
近年来,通过人工智能检测和纠正人为错误的机制以及自动化业务操作的努力一直在推进。在未来,人为错误预计会是致命的,需要提前预测和预防。也有人提出通过人类行为模型和脑电图分析人类错误,但没有考虑其他有用的生物学信息。因此,在本研究中,我们认为可以通过添加从心率中获取的自主神经作为生物信息,并观察错误前后的模式来进行预测和检测。为了实现这一目标,我们测量了执行计算任务的工人的脉搏和脑电图,开发了一个实验系统来研究任务的问题和时间,假设可以通过计算任务来评估人为错误发生时的脑电图和脉搏。此外,基于NASA任务负荷指数进行问卷调查,对任务进行主观评价分析。通过评价实验,建议在回答问卷中强调某一特定措施的组中检测人为错误的发生是可能的。
{"title":"Examination of Evaluation Method on Human Error During Work by Bioinstrumentation","authors":"Taro Kishimoto, Reiji Yoshida, Y. Tobe, Midori Sugaya","doi":"10.1109/REW.2019.00019","DOIUrl":"https://doi.org/10.1109/REW.2019.00019","url":null,"abstract":"In recent years, mechanisms to detect and correct human errors by AI and efforts to automate business operations have been advancing. Human errors are expected to be fatal in the future, and they need to be predicted and prevented in advance. Researches has also been proposed to analyze human errors from a model of human behavior and electroencephalograms, but no other useful biological information is considered. Therefore, in this research, we thought that prediction and detection could be performed by adding autonomic nerves that can be acquired from heart rate as biological information and observing patterns before and after mistakes. In order to realize it, we measured the pulse and EEG of the worker who is carrying out the computational task, developed an experimental system to investigate the question and timing of the task, assumed that it that it is possible to evaluate the electroencephalogram and pulse at the time of human error occurrence by the computational task. In addition, a questionnaire based on NASA Task Load Index was conducted to enable analysis using subjective assessment of the tasks. Through the evaluation experiments, it was suggested that it is possible to detect the occurrence of human error in the group that answered that emphasized a particular measure in the questionnaire.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114588521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Title page i] [标题页i]
{"title":"[Title page i]","authors":"","doi":"10.1109/rew.2019.00001","DOIUrl":"https://doi.org/10.1109/rew.2019.00001","url":null,"abstract":"","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125406290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Renovating Requirements Engineering: First Thoughts to Shape Requirements Engineering as a Profession 更新需求工程:将需求工程塑造为一门专业的第一个想法
Y. D. Pham, Lloyd Montgomery, W. Maalej
Legacy software systems typically include vital data for organizations that use them and should thus to be regularly maintained. Ideally, organizations should rely on Requirements Engineers to understand and manage changes of stakeholder needs and system constraints. However, due to time and cost pressure, and with a heavy focus on implementation, organizations often choose to forgo Requirements Engineers and rather focus on ad-hoc bug fixing and maintenance. This position paper discusses what Requirements Engineers could possibly learn from other similar roles to become crucial for the evolution of legacy systems. Particularly, we compare the roles of Requirements Engineers (according to IREB), Building Architects (according to the German regulations), and Product Owners (according to "The Scrum-Guide"). We discuss overlaps along four dimensions: liability, self-portrayal, core activities, and artifacts. Finally we draw insights from these related fields to foster the concept of a Requirements Engineer as a distinguished profession.
遗留软件系统通常包括使用它们的组织的重要数据,因此应该定期维护。理想情况下,组织应该依靠需求工程师来理解和管理涉众需求和系统约束的变化。然而,由于时间和成本的压力,以及对实现的高度关注,组织经常选择放弃需求工程师,而更专注于特定的bug修复和维护。这篇意见书讨论了需求工程师可以从其他类似的角色中学到什么,从而成为遗留系统发展的关键。特别地,我们比较了需求工程师(根据IREB)、建筑架构师(根据德国法规)和产品负责人(根据“scrum指南”)的角色。我们沿着四个维度讨论重叠:责任、自我描述、核心活动和工件。最后,我们从这些相关领域中得出见解,以培养需求工程师作为一种杰出职业的概念。
{"title":"Renovating Requirements Engineering: First Thoughts to Shape Requirements Engineering as a Profession","authors":"Y. D. Pham, Lloyd Montgomery, W. Maalej","doi":"10.1109/REW.2019.00008","DOIUrl":"https://doi.org/10.1109/REW.2019.00008","url":null,"abstract":"Legacy software systems typically include vital data for organizations that use them and should thus to be regularly maintained. Ideally, organizations should rely on Requirements Engineers to understand and manage changes of stakeholder needs and system constraints. However, due to time and cost pressure, and with a heavy focus on implementation, organizations often choose to forgo Requirements Engineers and rather focus on ad-hoc bug fixing and maintenance. This position paper discusses what Requirements Engineers could possibly learn from other similar roles to become crucial for the evolution of legacy systems. Particularly, we compare the roles of Requirements Engineers (according to IREB), Building Architects (according to the German regulations), and Product Owners (according to \"The Scrum-Guide\"). We discuss overlaps along four dimensions: liability, self-portrayal, core activities, and artifacts. Finally we draw insights from these related fields to foster the concept of a Requirements Engineer as a distinguished profession.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Automated Logging for Forensic-Ready Software Systems 面向取证软件系统的自动日志记录
Fanny Rivera-Ortiz, L. Pasquale
Security incidents can arise from the misuse of existing software systems. Thus, appropriate logging mechanisms should be implemented at the software level to support the detection and investigation of security incidents. However, due to insufficient logging, security incidents often go undetected for long periods. Moreover, even after a security incident is detected, there is not enough information to fully reconstruct how an incident occurred. Insufficient logging may be due to the limited security expertise of software developers, who may not know what are the most critical security incidents. Also, for large software systems and a multitude of potential misuse scenarios, it is cumbersome to identify when and what logging instructions should be implemented. In this paper, we propose a preliminary idea to automate the development of "forensic-ready" software systems. These systems can log a minimum amount of relevant data that can be used to detect and investigate potential security incidents. Our approach allows a security engineer to elicit a set of potential software misuse scenarios, expressed as annotated sequence diagrams. These diagrams are then used—together with a control flow graph of the software system— to identify the exact location where logging instructions should be placed and the information they should log. Finally, logging instructions can be injected into designated software system locations using Aspect-Oriented Programming. We illustrate our approach using an example of software misuse in a human resources management software system.
对现有软件系统的误用可能引起安全事故。因此,应该在软件级别实现适当的日志机制,以支持安全事件的检测和调查。然而,由于日志记录不足,安全事件通常在很长一段时间内未被发现。此外,即使在检测到安全事件之后,也没有足够的信息来完全重建事件是如何发生的。日志记录不足可能是由于软件开发人员的安全专业知识有限,他们可能不知道什么是最关键的安全事件。此外,对于大型软件系统和大量潜在的误用场景,确定何时以及应该实现哪些日志记录指令是很麻烦的。在本文中,我们提出了一个初步的想法,自动化开发“法医准备”软件系统。这些系统可以记录最少量的相关数据,这些数据可用于检测和调查潜在的安全事件。我们的方法允许安全工程师引出一组潜在的软件误用场景,用带注释的序列图表示。然后使用这些图(连同软件系统的控制流图)来确定应该放置日志指令的确切位置以及应该记录的信息。最后,可以使用面向方面编程将日志指令注入指定的软件系统位置。我们用一个人力资源管理软件系统中软件误用的例子来说明我们的方法。
{"title":"Towards Automated Logging for Forensic-Ready Software Systems","authors":"Fanny Rivera-Ortiz, L. Pasquale","doi":"10.1109/REW.2019.00033","DOIUrl":"https://doi.org/10.1109/REW.2019.00033","url":null,"abstract":"Security incidents can arise from the misuse of existing software systems. Thus, appropriate logging mechanisms should be implemented at the software level to support the detection and investigation of security incidents. However, due to insufficient logging, security incidents often go undetected for long periods. Moreover, even after a security incident is detected, there is not enough information to fully reconstruct how an incident occurred. Insufficient logging may be due to the limited security expertise of software developers, who may not know what are the most critical security incidents. Also, for large software systems and a multitude of potential misuse scenarios, it is cumbersome to identify when and what logging instructions should be implemented. In this paper, we propose a preliminary idea to automate the development of \"forensic-ready\" software systems. These systems can log a minimum amount of relevant data that can be used to detect and investigate potential security incidents. Our approach allows a security engineer to elicit a set of potential software misuse scenarios, expressed as annotated sequence diagrams. These diagrams are then used—together with a control flow graph of the software system— to identify the exact location where logging instructions should be placed and the information they should log. Finally, logging instructions can be injected into designated software system locations using Aspect-Oriented Programming. We illustrate our approach using an example of software misuse in a human resources management software system.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133221740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Formal Requirements and Constraints Modelling in FORM-L for the Engineering of Complex Socio-Technical Systems 复杂社会技术系统工程的FORM-L形式需求和约束建模
Thuy Nguyen
Socio-technical systems combine behaviour and actions from human operators, physical processes (e.g., thermodynamic or electromagnetism), computing and data communication. One often uses expression "cyber-physical system", or "systems of systems" in the case of systems composed of socio-technical systems of their own that each have different stakeholders, owners and lifecycles, but that must cooperate in order to achieve what none can achieve independently. Complex systems are systems that require the cooperation and coordination of multiple individuals, multiple teams, multiple engineering disciplines and multiple stakeholders to be fully understood in all necessary aspects. This coordination must be ensured all along the lifetime of the system, from scoping studies that aim at determining the nature of the system needed, to deconstruction. For systems such as power plants or passenger aircrafts, this lifetime may cover several decades, during which the system needs to be operated, maintained, retrofitted and upgraded, by multiple successive generations. EDF has developed a FOrmal Requirements Modelling Language (FORM-L) to help address this issue for what concerns dynamic phenomena. This paper provides a brief introduction to FORM-L and its underlying methodology, illustrated with short examples.
社会技术系统结合了人类操作员的行为和行动、物理过程(如热力学或电磁学)、计算和数据通信。在由各自的社会技术系统组成的系统中,人们经常使用“网络物理系统”或“系统的系统”这样的表达,每个系统都有不同的利益相关者、所有者和生命周期,但它们必须合作才能实现任何一个系统都无法独立实现的目标。复杂系统是需要多个个人、多个团队、多个工程学科和多个利益相关者在所有必要方面进行充分理解的合作和协调的系统。这种协调必须在系统的整个生命周期中得到保证,从旨在确定所需系统的性质的范围研究到解构。对于发电厂或客机等系统,其寿命可能长达数十年,在此期间,系统需要连续几代人进行操作、维护、改装和升级。EDF开发了一种形式需求建模语言(FORM-L)来帮助解决与动态现象相关的问题。本文简要介绍了FORM-L及其基本方法,并举例说明。
{"title":"Formal Requirements and Constraints Modelling in FORM-L for the Engineering of Complex Socio-Technical Systems","authors":"Thuy Nguyen","doi":"10.1109/REW.2019.00027","DOIUrl":"https://doi.org/10.1109/REW.2019.00027","url":null,"abstract":"Socio-technical systems combine behaviour and actions from human operators, physical processes (e.g., thermodynamic or electromagnetism), computing and data communication. One often uses expression \"cyber-physical system\", or \"systems of systems\" in the case of systems composed of socio-technical systems of their own that each have different stakeholders, owners and lifecycles, but that must cooperate in order to achieve what none can achieve independently. Complex systems are systems that require the cooperation and coordination of multiple individuals, multiple teams, multiple engineering disciplines and multiple stakeholders to be fully understood in all necessary aspects. This coordination must be ensured all along the lifetime of the system, from scoping studies that aim at determining the nature of the system needed, to deconstruction. For systems such as power plants or passenger aircrafts, this lifetime may cover several decades, during which the system needs to be operated, maintained, retrofitted and upgraded, by multiple successive generations. EDF has developed a FOrmal Requirements Modelling Language (FORM-L) to help address this issue for what concerns dynamic phenomena. This paper provides a brief introduction to FORM-L and its underlying methodology, illustrated with short examples.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127976136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Process Mining for Cloud-Based Applications: A Systematic Literature Review 基于云的应用程序的过程挖掘:系统的文献综述
Najah Mary El-Gharib, Daniel Amyot
Process mining uses event log data to discover processes, hence enabling multiple requirements elicitation activities. As the number of applications deployed on a cloud infrastructure is increasing, it becomes important to understand their processes and the ways these existing systems are actually used. However, the cloud brings new challenges to process mining that deserve special attention. This paper reports on a systematic literature review based on a selection of 27 papers. The aim is to assess the applicability of process mining techniques to cloud-based applications, to document the processes of these existing systems. We observe there is a growing interest in applying process mining to these areas, and we report on algorithms, tools, and validation approaches taken. We also report on many cloud-specific challenges for process mining, which require further attention from the research community.
流程挖掘使用事件日志数据来发现流程,从而支持多个需求提取活动。随着部署在云基础设施上的应用程序数量的增加,了解它们的流程和这些现有系统的实际使用方式变得非常重要。然而,云计算给过程采矿带来了新的挑战,值得特别关注。本文在选取27篇论文的基础上进行了系统的文献综述。目的是评估过程挖掘技术对基于云的应用程序的适用性,以记录这些现有系统的过程。我们观察到,将过程挖掘应用到这些领域的兴趣正在增长,并且我们报告了所采用的算法、工具和验证方法。我们还报告了流程挖掘的许多特定于云的挑战,这些挑战需要研究社区进一步关注。
{"title":"Process Mining for Cloud-Based Applications: A Systematic Literature Review","authors":"Najah Mary El-Gharib, Daniel Amyot","doi":"10.1109/REW.2019.00012","DOIUrl":"https://doi.org/10.1109/REW.2019.00012","url":null,"abstract":"Process mining uses event log data to discover processes, hence enabling multiple requirements elicitation activities. As the number of applications deployed on a cloud infrastructure is increasing, it becomes important to understand their processes and the ways these existing systems are actually used. However, the cloud brings new challenges to process mining that deserve special attention. This paper reports on a systematic literature review based on a selection of 27 papers. The aim is to assess the applicability of process mining techniques to cloud-based applications, to document the processes of these existing systems. We observe there is a growing interest in applying process mining to these areas, and we report on algorithms, tools, and validation approaches taken. We also report on many cloud-specific challenges for process mining, which require further attention from the research community.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Approach to Validation of Combined Natural Language and Formal Requirements for Control Systems 控制系统中自然语言与形式需求相结合的验证方法
M. Trakhtenbrot
The paper presents a novel approach to validation of behavioral requirements for control systems. A requirement is specified by a natural language pattern and its expression in Linear Temporal Logic (LTL). This way flexibility and understandability of natural language is combined with advantages of formalization that is a basis for various stages of system development, testing and verification. Still, validity of the requirements remains a major challenge. The paper considers application of mutation analysis for capturing of correct behavioral requirements. Generation and exploration of mutants supports a better understanding of requirements, The novelty of the approach is that the suggested mutations are semantic-based, as opposed to the more common syntax-based mutation analysis. A significant advantage of the approach is that it allows to focus only on plausible potential faults in understanding of the required system behavior, and to avoid generation of a vast amount of mutants that are irrelevant to the intended meaning of the requirements. Moreover, in many cases the effect of semantic-based mutations just can not be achieved by usual syntax-based mutations of LTL formulas associated with requirements. The approach is illustrated using a rail cross control example.
提出了一种新的控制系统行为需求验证方法。需求由自然语言模式及其在线性时序逻辑(LTL)中的表达来指定。这种方式将自然语言的灵活性和可理解性与形式化的优势相结合,形式化是系统开发、测试和验证各个阶段的基础。然而,这些要求的有效性仍然是一个主要的挑战。本文考虑了突变分析在捕获正确行为需求方面的应用。突变的生成和探索支持更好地理解需求。该方法的新颖之处在于,建议的突变是基于语义的,而不是更常见的基于语法的突变分析。该方法的一个重要优点是,它允许在理解所需的系统行为时只关注可能的潜在错误,并避免产生与需求的预期意义无关的大量突变。此外,在许多情况下,基于语义的突变无法通过通常基于语法的与需求相关的LTL公式的突变来实现。用一个轨道交叉控制的例子说明了这种方法。
{"title":"An Approach to Validation of Combined Natural Language and Formal Requirements for Control Systems","authors":"M. Trakhtenbrot","doi":"10.1109/REW.2019.00025","DOIUrl":"https://doi.org/10.1109/REW.2019.00025","url":null,"abstract":"The paper presents a novel approach to validation of behavioral requirements for control systems. A requirement is specified by a natural language pattern and its expression in Linear Temporal Logic (LTL). This way flexibility and understandability of natural language is combined with advantages of formalization that is a basis for various stages of system development, testing and verification. Still, validity of the requirements remains a major challenge. The paper considers application of mutation analysis for capturing of correct behavioral requirements. Generation and exploration of mutants supports a better understanding of requirements, The novelty of the approach is that the suggested mutations are semantic-based, as opposed to the more common syntax-based mutation analysis. A significant advantage of the approach is that it allows to focus only on plausible potential faults in understanding of the required system behavior, and to avoid generation of a vast amount of mutants that are irrelevant to the intended meaning of the requirements. Moreover, in many cases the effect of semantic-based mutations just can not be achieved by usual syntax-based mutations of LTL formulas associated with requirements. The approach is illustrated using a rail cross control example.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126609240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developers' Eyes on the Changes of Apps: An Exploratory Study on App Changelogs 开发者对应用变化的关注:基于应用变化日志的探索性研究
Chong Wang, Ju Li, Peng Liang, M. Daneva, M. V. Sinderen
Release planning for mobile apps has only recently become an area of active research. As a result, little is known about the types of requirements that app developers pay the most attention to when releasing an app. This research uses the changelogs of apps to shed light on this. We report the results of an exploratory study in which we analyzed the requirements that dominate the changes of apps, according to a set of 3000 changelogs collected from 120 apps from three categories in the Apple App Store: Travel, Social networking, and Books. We analyzed the changelogs in terms of functional and non-functional requirements, from a developers' perspective. Our results suggest that developers' releases are by far more concerned with non-functional requirements than with functional requirements. We also found that usability and maintainability are the most frequently mentioned non-functional requirements (NFRs) in the changelogs. Surprisingly, reliability requirements formed only a fraction of the total number of NFRs addressed in all changelogs of apps in the three selected App Store categories.
手机应用的发布计划直到最近才成为一个活跃的研究领域。因此,我们对应用开发者在发布应用时最关注的需求类型知之甚少。本研究使用应用的变更记录来阐明这一点。我们报告了一项探索性研究的结果,根据从苹果应用商店中三个类别(旅游、社交网络和图书)的120个应用中收集的3000个更新日志,我们分析了主导应用程序更改的需求。我们从开发人员的角度,从功能性和非功能性需求的角度分析了变更日志。我们的结果表明,到目前为止,开发人员发布的版本更多地关注非功能性需求,而不是功能性需求。我们还发现,可用性和可维护性是变更日志中最常提到的非功能需求(nfr)。令人惊讶的是,在三个选定的App Store类别的应用程序的所有变更日志中,可靠性要求只占NFRs总数的一小部分。
{"title":"Developers' Eyes on the Changes of Apps: An Exploratory Study on App Changelogs","authors":"Chong Wang, Ju Li, Peng Liang, M. Daneva, M. V. Sinderen","doi":"10.1109/REW.2019.00042","DOIUrl":"https://doi.org/10.1109/REW.2019.00042","url":null,"abstract":"Release planning for mobile apps has only recently become an area of active research. As a result, little is known about the types of requirements that app developers pay the most attention to when releasing an app. This research uses the changelogs of apps to shed light on this. We report the results of an exploratory study in which we analyzed the requirements that dominate the changes of apps, according to a set of 3000 changelogs collected from 120 apps from three categories in the Apple App Store: Travel, Social networking, and Books. We analyzed the changelogs in terms of functional and non-functional requirements, from a developers' perspective. Our results suggest that developers' releases are by far more concerned with non-functional requirements than with functional requirements. We also found that usability and maintainability are the most frequently mentioned non-functional requirements (NFRs) in the changelogs. Surprisingly, reliability requirements formed only a fraction of the total number of NFRs addressed in all changelogs of apps in the three selected App Store categories.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128111438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1