Resolving Requirements Discovery in Testing and Operations
نویسندگان
چکیده
This paper describes the results of an investigation into requirements discovery during testing and operations. Requirements discovery includes both new requirements and new knowledge regarding existing requirements. Analysis of anomaly reports shows that many of the anomalies that occur during these phases involve requirements discovery. Previous work by the authors ident@ed four common mechanisms for requirements discovery and resolution during testing. The results reported here extend that work in two ways: (I) to show that very similar requirementsdiscovery mechanisms are at work in both testing and operations, and (2) to evaluate the requirementsdiscovery mechanisms against experience with seven additional systems. The paper discusses the consequences of these classijications and results in terms of reducing requirements-based defects in critical, embedded systems.
منابع مشابه
The False Discovery Rate in Simultaneous Fisher and Adjusted Permutation Hypothesis Testing on Microarray Data
Background and Objectives: In recent years, new technologies have led to produce a large amount of data and in the field of biology, microarray technology has also dramatically developed. Meanwhile, the Fisher test is used to compare the control group with two or more experimental groups and also to detect the differentially expressed genes. In this study, the false discovery rate was investiga...
متن کاملFuel requirements and machine capacity for tillage and planting operations on a clay loam soil in isfahan
متن کامل
On two-dimensional Cayley graphs
A subset W of the vertices of a graph G is a resolving set for G when for each pair of distinct vertices u,v in V (G) there exists w in W such that d(u,w)≠d(v,w). The cardinality of a minimum resolving set for G is the metric dimension of G. This concept has applications in many diverse areas including network discovery, robot navigation, image processing, combinatorial search and optimization....
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملVERDICTS : Visual Exploratory Requirements Discovery and Injection for Comprehension and Testing of Software
We introduce a methodology and research tools for visual exploratory software analysis. VERDICTS combines exploratory testing, tracing, visualization, dynamic discovery and injection of requirements speci cations into a live quick-feedback cycle, without recompilation or restart of the system under test. This supports discovery and veri cation of software dynamic behavior, software comprehensio...
متن کامل