Automating the Detection of Complex Semantic Conflicts between Software Requirements(An empirical study on requirements conflict analysis with semantic technology)

نویسندگان

  • Thomas Moser
  • Dietmar Winkler
  • Matthias Heindl
  • Stefan Biffl
چکیده

Keeping requirements consistent already at early project stages is a main success factor for software development projects. However, manual requirements conflict analysis takes significant effort and is error-prone. Requirement engineers and other project participants such as technical architects use different terminologies (due to different domain backgrounds) which makes automation of conflict analysis difficult. In this paper we propose semantic approach as foundation for automating requirements conflict analysis and introduce the automated ontology-based reporting approach OntRep. We evaluate the effectiveness of OntRep referring to (a) different types of conflicts and (b) different levels of conflict complexity in a real-world industrial case study. Major results were that OntRep had considerably higher recall and precision of conflict detection for all conflict types compared to a manual approach. Regarding complexity, the comparison with manual results shows that recall and precision of OntRep is considerably higher for complex conflicts. Keywords—requirements conflict detection, requirements consistency checking, ontology, case study, empirical evaluation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Requirements Management with Semantic Technology: An Empirical Study on Automated Requirements Categorization and Conflict Analysis

Requirements managers aim at keeping the set of requirements consistent and up to date throughout the project by conducting the following tasks: requirements categorization, requirements conflict analysis, and requirements tracing. However, the manual conduct of these tasks takes significant effort and is error-prone. In this paper we propose to use semantic technology as foundation for automat...

متن کامل

The Symbiosis of Human and Semantic Technology Through the Lens of Actor-Network Theory

Background:  Semantic technologies (STs) have made machine reasoning possible by providing intelligent data management methods. This capability has created new forms of interaction between humans and STs, which is called "semantic interaction."  The increasing spread of this form of interaction in daily life reveals the need to identify the factors affecting it and introduce the requirements of...

متن کامل

Modeling a semantic recommender system for medical prescriptions and drug interaction detection

Introduction: The administration of appropriate drugs to patients is one of the most important processes of treatment and requires careful decision-making based-on the current conditions of the patient and its history and symptoms. In many cases, patients may require more than one drug, or in addition to having a previous illness and receiving the drug, they need new drugs for the new illness, ...

متن کامل

A Context-aware Architecture for Mental Model Sharing through Semantic Movement in Intelligent Agents

Recent studies in multi-agent systems are paying increasingly more attention to the paradigm of designing intelligent agents with human inspired concepts. One of the main cognitive concepts driving the core of many recent approaches in multi agent systems is shared mental models. In this paper, we propose an architecture for sharing mental models based on a new concept called semantic movement....

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011