• Articles •     Next Articles

An Empirical Study on the Impact of Automation on the Requirements Analysis Process

Giuseppe Lami{1 and Robert W. Ferguson{2   

  1. {1}Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo", I-56124 Pisa, Italy {2}Software Engineering Institute, Carnegie Mellon University, 15213 Pittsburgh, PA, U.S.A.
  • Received:2006-03-15 Revised:2006-12-05 Online:2007-05-10 Published:2007-05-10

Requirements analysis is an important phase in a software project. The analysis is often performed in an informal way by specialists who review documents looking for ambiguities, technical inconsistencies and incomplete parts. Automation is still far from being applied in requirements analyses, above all since natural languages are informal and thus difficult to treat automatically. There are only a few tools that can analyse texts. One of them, called QuARS, was developed by the Istituto di Scienza e Tecnologie dell'Informazione and can analyse texts in terms of ambiguity. This paper describes how QuARS was used in a formal empirical experiment to assess the impact in terms of effectiveness and efficacy of the automation in the requirements review process of a software company.

Key words: default logic; extension; cumulativity; assumption; (joint) compat-ibility;



[1]Gray J, Schach S. Constraint animation using an object-oriented declarative language. In -\it Proc. the 38th Annual ACM SE Conference}, Clemson, SC, April 7$\sim$8, 2000, pp.1$\sim$10.

[2] Kamsties E, Berry D M, Paech B. Detecting ambiguities in requirements documents using inspections. In -\it Proc. First Workshop on Inspection in Software Engineering $($WISE'01$)$}, Paris, France, July 23, 2001, Lawford M, Parnas D L (eds.), Software Quality Research Lab at McMaster University in Canada, pp.68$\sim$80.

[3] Sommerville I, Sawyer P. Requirements Engineering: A Good Practice Guide. John Wiley and Sons., 1997.

[4] Gilb T, Graham D. Software Inspection. London: Addison-Wesley, 1993.

[5] Basili V R. Evolving and packaging reading technologies. -\it Journal of Systems and Software}, 1997, 38(1): 3$\sim$12.

[6] Lami G. QuARS: A tool for analyzing requirements. Software Engineering Technical Report CMU/SEI-2005-TR-014, Software Engineering Institute, USA, September 2005.

[7] Kimberly S Wasson. Requirements metrics: Scaling up. In -\it Proc. 2nd International Workshop on Comparative Evaluation in Requirements Engineering $($CERE'04$)$}, Kyoto, Japan, September 2004, Vincenzo Gervasi, Didar Zowghi, Susan Elliot Sim (eds.), FIT-UTS, Sydney, ISBN: 1-86365-866-1, pp.51$\sim$55.

[8] Seaman C B. Qualitative methods in empirical studies of software engineering. -\it IEEE Transaction on Software Engineering}, 1999, 25(4): 557$\sim$572.

[9] Fabbrini F, Fusani M, Gnesi S, Lami G. The linguistic approach to the natural language requirements quality: Benefits of the use of an automatic tool. In -\it Proc. 26th Annual IEEE Computer Society --NASA Goddard Space Flight Center Software Engineering Workshop}, Greenbelt, MA, USA, November 27$\sim$29, 2001, pp.97$\sim$105.

[10] Information Technology --Software Process Assessment. ISO/IEC TR 15504:1998, pp.1$\sim$9.

[11] Gnesi S, Lami G, Trentanni G, Fabbrini F, Fusani M. An automatic tool for the analysis of natural language requirements. -\it International Journal of Computer Systems Science and Engineering, Special Issue on Automated Tools for Requirements Engineering}. Leicester: CRL Publishing Ltd, UK, 2005, 20(1): 53$\sim$62.

[12] Coleman M, Liau T L. A computer readability formula designed for machine scoring. -\it Journal of Applied Psychology,} 1975, 60(2): 283$\sim$284.

[13] Lami G, Trentanni G. An automatic tool for improving the quality of software requirements. -\it ERCIM News}, 2004, 58: 18$\sim$19.

[14] Kitchenham B, Pickard L, Pfleeger S L. Case studies for methods and tool evaluation. -\it IEEE Software}, 1995, 12(4): 52$\sim$62.

[15] Kitchenham B. Evaluating software engineering methods and tools, part 1: The evaluation context and evaluation methods. -\it ACM SIGSOFT Software Engineering Notes}, Jan. 1996, 21(1): 11$\sim$14.

[16] Wohlin C -\it et al}. Experimentation in Software Engineering: An Introduction. -International Series in Software Engineering}, Springer Ed, 2000, Vol.6.

[17] Fenton N. Software Metrics A Rigorous Approach. London: Chapman and Hall Ed., 1991.

[18] Basili V R, Rombach H D. The TAME project: Towards improvement-orientated software environments. -\it IEEE Transactions in Software Engineering}, 1988, 14(6): 758$\sim$773.
[1] Ge Wu, Jian-Chang Lai, Fu-Chun Guo, Willy Susilo, Fu-Tai Zhang. Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions [J]. Journal of Computer Science and Technology, 2019, 34(6): 1366-1379.
[2] Rui Xue, Ning-Hui Li, and Jiang-Tao Li. Algebraic Construction for Zero-Knowledge Sets [J]. , 2008, 23(2): 166-175 .
[3] Xi-Shun Zhao. Regular Disjunction-Free Default Theories [J]. , 2004, 19(3): 0-0.
[4] XU DaoYun (许道云), DING DeCheng (丁德成) and ZHANG MingYi (张明义). Characterization of an Auto-Compatible Default Theory [J]. , 2003, 18(3): 0-0.
[5] HAO Jie (郝杰) and LI Xing (李星). Word Spotting Based on a posterior Measure of Keyword Confidence [J]. , 2002, 17(4): 0-0.
[6] SU Kaili(苏开乐). Constraints on Extensions of a Default Theory [J]. , 2001, 16(4): 0-0.
[7] WANG Kewen(王克文)and ZHOU Lizhu(周立柱). Closed World Assumption for Disjunctive Reasoning [J]. , 2001, 16(4): 0-0.
[8] ZHANG Mingyi; ZHANG Ying;. Characterizations and Algorithms of Extensionsfor CADL and QDL [J]. , 1999, 14(2): 140-145.
[9] Zhi Lihong;. Optimal Algorithm for Algebraic Factoring [J]. , 1997, 12(1): 1-9.
[10] Zhang Dongmo;. Belief Revision by Sets of Sentences [J]. , 1996, 11(2): 108-125.
[11] Zhang Mingyi;. Some Results on Default Logic [J]. , 1994, 9(3): 267-274.
[12] Wu Xindong;. Inductive Learning [J]. , 1993, 8(2): 22-36.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved