Model-based requirements verification method: Conclusions from two controlled experiments

被引:17
作者
Aceituna, Daniel [1 ]
Walia, Gursimran [1 ]
Do, Hyunsook [1 ]
Lee, Seok-Won [2 ]
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58108 USA
[2] Ajou Univ, Dept Software Convergence Technol, Suwon 443749, Gyeonggi Do, South Korea
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
Requirements verification; Model-based verification; NLtoSTD; Fault checklist; Controlled experiments;
D O I
10.1016/j.infsof.2013.11.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Requirements engineering is one of the most important and critical phases in the software development life cycle, and should be carefully performed to build high quality and reliable software. However, requirements are typically gathered through various sources and are represented in natural language (NL), making requirements engineering a difficult, fault prone, and a challenging task. Objective: To ensure high-quality software, we need effective requirements verification methods that can clearly handle and address inherently ambiguous nature of NL specifications. The objective of this paper is to propose a method that can address the challenges with NL requirements verification and to evaluate our proposed method through controlled experiments. Method: We propose a model-based requirements verification method, called NLtoSTD, which transforms NL requirements into a State Transition Diagram (STD) that can help to detect and to eliminate ambiguities and incompleteness. The paper describes the NLtoSTD method to detect requirement faults, thereby improving the quality of the requirements. To evaluate the NLtoSTD method, we conducted two controlled experiments at North Dakota State University in which the participants employed the NLtoSTD method and a traditional fault checklist during the inspection of requirement documents to identify the ambiguities and incompleteness of the requirements. Results: Two experiment results show that the NLtoSTD method can be more effective in exposing the missing functionality and, in some cases, more ambiguous information than the fault-checklist method. Our experiments also revealed areas of improvement that benefit the method's applicability in the future. Conclusion: We presented a new approach, NLtoSTD, to verify requirements documents and two controlled experiments assessing our approach. The results are promising and have motivated the refinement of the NLtoSTD method and future empirical evaluation. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:321 / 334
页数:14
相关论文
共 39 条
[1]  
Aceituna D., 2011, 2011 First International Workshop on Empirical Requirements Engineering, P13, DOI 10.1109/EmpiRE.2011.6046248
[2]  
Aceituna D., 2010, INT S SOFTW REL ENG
[3]  
Alur R, 2005, RTAS 2005: 11TH IEEE REAL TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, P508
[4]  
Alur R., 1990, Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science (90CH2897-7), P414, DOI 10.1109/LICS.1990.113766
[5]  
Alur Rajeev., 2003, TSE, V31, P304
[6]  
[Anonymous], 2006, Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, SIGSOFT '06/FSE-14
[7]  
[Anonymous], 1981, Software Engineering Economics
[8]  
Berry D., 2004, Perspectives on Software Requirements
[9]  
Berry DanielM., 2008, Innovations for Requirement Analysis. From Stakeholders' Needs to Formal Designs, P1, DOI DOI 10.1007/978-3-540-89778-1_1
[10]   Software defeat reduction top 10 list [J].
Boehm, B ;
Basili, VR .
COMPUTER, 2001, 34 (01) :135-137