Validating the Functional Design of Embedded Systems against Stakeholder Intentions

被引:0
|
作者
Daun, Marian [1 ]
Weyer, Thorsten [1 ]
Pohl, Klaus [1 ]
机构
[1] Univ Duisburg, Ruhr Inst Software Technol, Paluno, Essen, Germany
关键词
Functional Design; Correctness; Stakeholder Intentions; Behavioral Requirements; Embedded Systems;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the embedded systems industry, function-centered engineering is commonly applied to address the increasing number and complexity of system functions. During function-centered engineering, the functional design that is created based on the defined requirements for the system is the main artifact that serves as a basis for subsequent development activities. If stakeholder intentions change and modifications become necessary, they are frequently incorporated directly into the functional design without updating the behavioral requirements accordingly. As a consequence, the correctness of the interplay of system functions as defined in the functional design cannot be assessed by checking it against the defined requirements (since they are outdated) but needs to be checked against the current stakeholder intentions. More precisely, the requirements engineer has to validate the functional design against the stakeholder intentions because he is the expert concerning the stakeholder intentions and can communicate with the stakeholders regarding them, if necessary. However, the requirements engineer is typically not familiar with the functional design and its notation on the one hand, and, on the other hand, the overall behavior of the system is spread across various diagrams in the functional design. Therefore, the requirements engineer needs a more abstract and consolidated view of the functional design in order to be able to validate its correctness with regard to the current stakeholder intentions. In this paper, we present an approach which is based on a specific kind of review model that is automatically generated from the functional design and supports the requirements engineer in her task. The approach that is presented in this paper is subject of ongoing research.
引用
收藏
页码:333 / 339
页数:7
相关论文
共 50 条
  • [41] Design of Embedded Multimodal Biometric Systems
    Yoo, Jang-Hee
    Ko, Jong-Gook
    Chung, Yun-Su
    Jung, Sung-Uk
    Kim, Ki-Hyun
    Moon, Ki-Young
    Chung, Kyoil
    [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 1058 - 1062
  • [42] Embedded systems design: Optimization challenges
    Pop, P
    [J]. INTEGRATION OF AI AND OR TECHNIQUES IN CONSTRAINT PROGRAMMING FOR COMBINATORIAL OPTIMIZATION PROBLEMS, 2005, 3524 : 16 - 16
  • [43] NAVIGATION IN TRANSFORMATIONAL DESIGN OF EMBEDDED SYSTEMS
    SEPPANEN, V
    [J]. SOFTWARE DEVELOPMENT TRENDS, 1989, 104 : 57 - 64
  • [44] SOC design challenges for embedded systems
    Hattori, Toshihiro
    [J]. ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 15 - 19
  • [45] Resource modeling for embedded systems design
    Sokolsky, O
    [J]. SECOND IEEE WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2004, : 99 - 103
  • [46] Reuse factors in embedded systems design
    Mrva, M
    [J]. COMPUTER, 1997, 30 (08) : 93 - 95
  • [47] Design validation of embedded dependable systems
    Bondavalli, A
    Fantechi, A
    Latella, D
    Simoncini, L
    [J]. IEEE MICRO, 2001, 21 (05) : 52 - 62
  • [48] Design tools for reconfigurable embedded systems
    Almeida, M
    Sklyarov, V
    Skliarova, I
    Pimentel, B
    [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 254 - 261
  • [49] THE DESIGN AND DEVELOPMENT OF EMBEDDED ADA SYSTEMS
    CLARK, RG
    [J]. SOFTWARE ENGINEERING JOURNAL, 1990, 5 (03): : 175 - 184
  • [50] Electromagnetic Induction Attacks Against Embedded Systems
    Selvaraj, Jayaprakash
    Dayanikli, Gokcen Yilmaz
    Gaunkar, Neelam Prabhu
    Ware, David
    Gerdes, Ryan M.
    Mina, Mani
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 499 - 510