Technique integration for requirements assessment

被引:25
作者
Dekhtyar, Alex [1 ]
Hayes, Jane Huffinan [1 ]
Sundaram, Senthil [1 ]
Holbrook, Ashlee [1 ]
Dekhtyar, Olga [2 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
[2] Inst HIV Prevent, Lexington, KY 40502 USA
来源
15TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS | 2007年
关键词
D O I
10.1109/RE.2007.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In determining whether to permit a safety-critical software system to be certified and in performing independent verification and validation (IV&V) of safety- or mission-critical systems, the requirements traceability matrix (RTM) delivered by the developer must be assessed for accuracy. The current state of the practice is to perform this work manually, or with the help of general-purpose tools such as word processors and spreadsheets Such work is error prone and person power intensive. In this paper, we extend our prior work in application of Information Retrieval (IR) methods for candidate link generation to the problem of RTM accuracy assessment. We build voting committees from five IR methods, and use a variety of voting schemes to accept or reject links from given candidate RTMs. We report on the results of two experiments. In the first experiment, we used 25 candidate RTMs built by human analysts for a small tracing task involving a portion of a NASA scientific instrument specification. In the second experiment, we randomly seeded faults in the RTM for the entire specification. Results of the experiments are presented.
引用
收藏
页码:141 / +
页数:2
相关论文
共 16 条
[1]   Recovering traceability links between code and documentation [J].
Antoniol, G ;
Canfora, G ;
Casazza, G ;
De Lucia, A ;
Merlo, E .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (10) :970-983
[2]  
Antoniol G., 2005, P INT WORKSH TRAC EM, P73, DOI DOI 10.1145/1107656.1107672
[3]  
BAEZAYATES, 1999, RIBEIRO NETO MODERN
[4]   Latent Dirichlet allocation [J].
Blei, DM ;
Ng, AY ;
Jordan, MI .
JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (4-5) :993-1022
[5]   ANALYSIS OF FAULTS IN AN N-VERSION SOFTWARE EXPERIMENT [J].
BRILLIANT, SS ;
KNIGHT, JC ;
LEVESON, NG .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (02) :238-247
[6]  
CLELANDHUANG J, 2002, P INT REQ ENG C RE 0
[7]  
DEERWESTER S, 1990, J AM SOC INFORM SCI, V41, P391, DOI 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO
[8]  
2-9
[9]  
HAYES H, 2004, P IEEE REQ ENG C RE, P249
[10]   Will Johnny/Joanie make a good software engineer? - Are course grades showing the whole picture? [J].
Hayes, Jane Huffman ;
Dekhtyar, Alex ;
Holbrook, Ashlee ;
Dekhtyar, Olga ;
Sundaram, Senthil .
19TH CONFERENCE ON SOFTWARE ENGINEERING EDUCATION & TRAINING, PROCEEDINGS, 2006, :175-+