Towards automated requirements prioritization and triage

被引:0
作者
Chuan Duan
Paula Laurent
Jane Cleland-Huang
Charles Kwiatkowski
机构
[1] DePaul University,School of Computing
来源
Requirements Engineering | 2009年 / 14卷
关键词
Requirements prioritization; Requirements triage; Data mining; Non-functional requirements;
D O I
暂无
中图分类号
学科分类号
摘要
Time-to-market deadlines and budgetary restrictions require stakeholders to carefully prioritize requirements and determine which ones to implement in a given product release. Unfortunately, existing prioritization techniques do not provide sufficient automation for large projects with hundreds of stakeholders and thousands of potentially conflicting requests and requirements. This paper therefore describes a new approach for automating a significant part of the prioritization process. The proposed method utilizes data-mining and machine learning techniques to prioritize requirements according to stakeholders’ interests, business goals, and cross-cutting concerns such as security or performance requirements. The effectiveness of the approach is illustrated and evaluated through two case studies based on the requirements of the Ice Breaker System, and also on a set of stakeholders’ raw feature requests mined from the discussion forum of an open source product named SugarCRM.
引用
收藏
页码:73 / 89
页数:16
相关论文
共 18 条
[1]  
Davis AM(2003)The art of requirements triage IEEE Comput 36 42-49
[2]  
Goldstein H(2005)Who killed the virtual case file? IEEE Spectr 42 24-35
[3]  
Karlsson J(1997)A cost-value approach for prioritizing requirements IEEE Softw 14 67-75
[4]  
Ryan K(1989)Theory-W software project management: principles and examples IEEE Trans Softw Eng 15 902-916
[5]  
Boehm BW(2001)Concept decompositions for large sparse text data using clustering Mach Learn 42 143-175
[6]  
Ross R(1997)AbstFinder, a prototype natural language text abstraction finder for use in requirements elicitation Autom Softw Eng 4 375-412
[7]  
Dhillon IS(2001)Weaving together requirements and archi-tecture IEEE Comput 34 115-117
[8]  
Modha DS(1990)Concepts and effectiveness of the cover-coefficient-based clustering methodology for text databases ACM Trans Database Syst 15 483-517
[9]  
Goldin L(2007)Best practices for automated traceability IEEE Comput 40 27-35
[10]  
Berry DM(undefined)undefined undefined undefined undefined-undefined