Eliciting Efficiency Requirements with Use Cases
نویسنده
چکیده
Non-functional requirements provide the glue between functional requirements and architectural decisions. Thus, it is important to elicit and specify the nonfunctional requirements precisely. In practice, however, they are mostly neglected. In this paper, we sketch an approach developed in the context of the EMPRESS project, which allows efficiency requirements to be elicited in conjunction with use cases. This is part of a more general, experience-based approach to elicit and specify nonfunctional requirements in concert with functional requirements and architecture.
منابع مشابه
Misuse Cases and Abuse Cases in Eliciting Security Requirements
Misuse cases, the inverted version of a use case can be used to elicit security requirements. Abuse cases also are used in eliciting security requirements. Their notation appears to be similar. This paper presents a brief comparison between misuse cases and abuse cases. It is observed that misuse cases are able to model a wider range of mis-users and they also interact with use cases in interes...
متن کاملCapturing Security Requirements through Misuse Cases
Use cases have become popular for eliciting, communicating and documenting requirements. They support functional requirements well, but provide less support for working with extra-functional requirements, such as security requirements. With the advent of eand m-commerce applications, such requirements are growing in importance. This paper discusses a conceptual extension of use cases, namely ‘m...
متن کاملEliciting Security Requirements by Misuse Cases
Use case diagrams have proven quite helpful in requirements engineering, both for eliciting requirements and getting a better overview of requirements already stated. However, not all kinds of requirements are equally well supported by use case dagrams. They are good for functional requirements, but poorer at, e.g., securiq requirements, which ofren concentrate on what should not happen in the ...
متن کاملTemplates for Misuse Case Description
Use cases have proven helpful for eliciting, communicating and documenting requirements. But whereas functional requirements are well supported, use cases provide less support for working with extra-functional requirements, such as security requirements. With the advent of e-commerce applications, security and other extra-functional requirements are growing in importance. In an earlier paper, t...
متن کاملEliciting and Specifying Requirements with Use Cases for Embedded Systems
This paper proposes enhancements to the use case technique for eliciting and specifying requirements for embedded systems. The work resulted from the employment of the use case technique for the requirements elicitation and specification of embedded systems in an industrial context. The use case technique is currently considered the state-of-the-art for handling requirements, because of the man...
متن کامل