Towards an Ontology-Based Approach for Eliciting Possible Solutions to Non-Functional Requirements

被引:7
作者
Veleda, Rodrigo [1 ]
Cysneiros, Luiz Marcio [1 ]
机构
[1] York Univ, Sch Informat Technol, Toronto, ON, Canada
来源
ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2019) | 2019年 / 11483卷
基金
加拿大自然科学与工程研究理事会;
关键词
Non-Functional Requirements; Knowledge reuse; Ontology; Quality requirements;
D O I
10.1007/978-3-030-21290-2_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Requirements Engineering plays a crucial role in the software development process. Many works have pointed out that Non-Functional Requirements (NFRs) are critical to the quality of software systems. NFRs, also known as quality requirements, can be difficult to elicit due to their subjective diversity nature. In this paper, we introduce the QR Framework which uses an ontology-based approach to support the collection of knowledge on possible solutions to implement NFRs, semi-automatically connecting related NFRs. Preliminary search mechanisms are provided in a tool to facilitate the identification of possible solutions to an NFR and their related consequences to other solutions and/or other NFRs. To evaluate whether our approach aids eliciting NFRs, we conducted a controlled experiment performing a software development scenario. Our results suggest that reusing NFR knowledge can drive software engineers to obtain a closer to complete set of possible solutions to address quality concerns.
引用
收藏
页码:145 / 161
页数:17
相关论文
共 18 条
  • [1] Al Balushi TH, 2007, LECT NOTES COMPUT SC, V4542, P306
  • [2] The Semantic Web - A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities
    Berners-Lee, T
    Hendler, J
    Lassila, O
    [J]. SCIENTIFIC AMERICAN, 2001, 284 (05) : 34 - +
  • [3] Brickley D., 2002, RDF Vocabulary Description Language 1.0: RDF Schema
  • [4] Cardoso E., 2013, FRAM DEV EFF INF SYS, P226
  • [5] Chung L., 2012, Non-functional requirements in software engineering, V5
  • [6] Cleland-Huang J, 2005, PROC INT CONF SOFTW, P362
  • [7] Cysneiros L. M., 2007, WER, P107
  • [8] The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals
    de Gramatica, Martina
    Labunets, Katsiaryna
    Massacci, Fabio
    Paci, Federica
    Tedeschi, Alessandra
    [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY ( REFSQ 2015), 2015, 9013 : 98 - 114
  • [9] Four commentaries on the use of students and professionals in empirical software engineering experiments
    Feldt, Robert
    Zimmermann, Thomas
    Bergersen, Gunnar R.
    Falessi, Davide
    Jedlitschka, Andreas
    Juristo, Natalia
    Muench, Juergen
    Oivo, Markku
    Runeson, Per
    Shepperd, Martin
    Sjoberg, Dag I. K.
    Turhan, Burak
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2018, 23 (06) : 3801 - 3820
  • [10] Hasan M.M., 2014, ENTERPRISE BUSINESS, P348, DOI DOI 10.1007/978-3-662-43745-2_24