Validating requirements: the evolutionary approach

被引:0
|
作者
Lemoine, N [1 ]
Marre, D [1 ]
Thuillier, P [1 ]
Wippler, JL [1 ]
机构
[1] ONERA, CERT, Dept Prospect & Synthese, F-31055 Toulouse, France
关键词
requirements engineering; cooperative work; object-oriented method; formal method; evolutionary model;
D O I
10.1109/CMPSAC.1998.716696
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Industrial practices in Requirements Engineering do not give the right place to formal methods. Two main reasons explain why such a failure arises. First of all formal methods have not promoted a dedicated SLC (Software Life Cycle) which should have been easily integrated within the upper phases of the traditional V-like or Waterfall-like model. A second reason is that formal methods have failed in scaling zip. In this paper we show how the requirements elicitation phase can take advantage of formal methods. We report the industrial and successful experience [2] undertaken by the STNA(1), a governmental office responsible for the French ATM (Air Traffic Management) system. We exhibit the evolutionary model which was applied to develop both a validated object-oriented model of a particular ATM subsystem, and a formal specification of some of its safety critical parts. We then show that the SRD (Software Requirements Document) is the key of the whole development. Its writing requires a strongly related cooperation of two different teams that are effective actors of the evolutionary model. We conclude the paper in exhibiting some recommendations.
引用
收藏
页码:458 / 463
页数:6
相关论文
共 50 条
  • [31] A systematic tradeoff methodology for acquiring and validating imprecise requirements
    Yen, J
    Tiao, WA
    Liu, XQF
    FUZZ-IEEE '96 - PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, 1996, : 349 - 354
  • [32] CREWS-SAVRE: scenarios for acquiring and validating requirements
    City Univ, London, United Kingdom
    Autom Software Eng, 4 (419-446):
  • [33] VALIDATING TIMING REQUIREMENTS FOR TIME BASIC NET SPECIFICATIONS
    GHEZZI, C
    MORASCA, S
    PEZZE, M
    JOURNAL OF SYSTEMS AND SOFTWARE, 1994, 27 (02) : 97 - 117
  • [34] Validating Business Requirements Using MAS Analysis Models
    Mitakides, Nektarios
    Spanoudakis, Nikolaos
    Delias, Pavlos
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1693 - 1694
  • [35] Validating personal requirements by assisted symbolic behavior browsing
    Hall, RJ
    Zisman, A
    19TH INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 56 - 66
  • [36] A risk-driven multi-objective evolutionary approach for selecting software requirements
    Aruan Amaral
    Gledson Elias
    Evolutionary Intelligence, 2019, 12 : 421 - 444
  • [37] A risk-driven multi-objective evolutionary approach for selecting software requirements
    Amaral, Aruan
    Elias, Gledson
    EVOLUTIONARY INTELLIGENCE, 2019, 12 (03) : 421 - 444
  • [38] Validating Security Policy Conformance with WS-Security Requirements
    Satoh, Fumiko
    Uramoto, Naohiko
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 133 - 148
  • [39] Code Patterns for Automatically Validating Requirements-to-Code Traces
    Ghabi, Achraf
    Egyed, Alexander
    2012 PROCEEDINGS OF THE 27TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2012, : 200 - 209
  • [40] Validating Requirements Model of a B2B System
    Yin, Ling
    Liu, Jing
    Li, Xiaoshan
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 1020 - +