Dependency Link Derivation Process and Theorems of Requirements Traceability Matrix

Size: px
Start display at page:

Download "Dependency Link Derivation Process and Theorems of Requirements Traceability Matrix"

Transcription

1 2016 International Computer Symposium Dependency Link Derivation Process and Theorems of Requirements Traceability Matrix Wen-Tin Lee Department of Software Engineering National Kaohsiung Normal University Kaohsiung, Taiwan Abstract This work proposes traceability link derivation process and theorems to establish the trace links between system objectives, requirements, design models and system/subsystems/components. The traceability relation definitions and three kinds of traceability links are defined by adopting requirements traceability reference models. Based on the definitions and graph theory, the dependency link derivation theorems are provided to derive traceability relations of requirements traceability matrix in an automatic way. The proposed approach can be served as a basis for requirements management that can deal with the requirements traceability issues, such as degree of satisfaction, strength of dependency, dependency link direction and change impact analysis. Keywords-Requirements traceability matrix, dependency link derivation, traceability relation, requirements management. I. MOTIVATION Several studies have shown the importance of using the requirements traceability techniques to trace the requirements with other work products, such as design, source code and test cases, in the software development life-cycle [1], [2], [3], [4], [5], [6], [7], [8]. Establishing and maintaining requirements traceability usually encounter two major problems: (1) the traceability relations to be maintained are often imprecise and outof-date, and (2) the establishment of traceability relations among requirements and work products is not integrated with the development process. Several investigations have been conducted to address the requirements traceability problems, either by generating and maintaining traceability relations [9], [10], [11], [12], [13], [14], or by defining traceability models and relations [15], [1], [16]. However, two main issues are still remained to be explored: Although current approaches are supportive with the establishment of requirements traceability information, they are not systematically integrated with the development process. Although link strength and direction are crucial factors in the structuring of requirements traceability, few attempts have been made to address such issue. Inspired by the requirements traceability reference model proposed by Ramesh and Jarke [15], this work presents traceability relation definitions and link derivation theorems based on graph theory to formulating the trace relations among requirements and software work products. The proposed approach can be served as a basis of requirements traceability theory that can deal with the requirements traceability issues, such as degree of satisfaction, strength of dependency, and dependency link direction. Background work related closely to this research will be outlined in the next section. Section III describes the definitions of requirements traceability relations. Section IV illustrate the traceability link derivation process. Section V presents related work on requirements traceability. Finally, we use a algorithm to summarize the proposed approach and give a conclusion. II. BACKGROUND WORK In the proposed approach, the evolution, dependency, and satisfaction traceability links presented in the reference models [15] are adopted to establish requirements traceability among higher-level objects and lower-level objects. The traceability links are captured in a matrix that can be used to derive links automatically using the proposed theorem based on graph theory. A. Requirements Traceability Reference Model Ramesh [17] reported the factors that influence the traceability practices of high-end and low-end traceability users. The facilitating and impeding characteristics of the factors can be adopted to determine the success of traceability implementation. Following an empirical study on a wide range of traceability practices with low-end and high-end users of traceability, Ramesh and Jarke [15] presented a requirements traceability reference model comprising four submodels, namely requirements management, rationale, design allocation and compliance verification. The reference model can be tailored according to organization/project needs in order to manage requirements traceability. Their model adopts four types of traceability links, satisfies, depends-on, evolves-to and rationale and discusses issues involved in implementing each type of traceability link /16 $ IEEE DOI /ICS

2 Figure 1. Requirements Traceability Reference Model Adopted Figure 1 shows the adopted requirements traceability model which includes three kinds of traceability links, evolution, dependency, and satisfaction links, from the reference models proposed by Ramesh [15]. In figure 1, system objectives can generate requirements which means there exist generate evolution links from system objectives to requirements. In this context, system objectives are higher-level objects and requirements are lower-level objects. The requirements can satisfy system objectives in some degrees which means there exist satisfaction links from requirements to system objectives. The requirements can drive design models which can drive system/subsystems/components. In this case, the drive evolution links are identified from requirements to design models and from design models to system/subsystems/components. The design models, which can be satisfied by system/subsystems/components, can also satisfy requirements in some degree. A system objective can depend on another system objective which means there exist a dependency link between them. The requirement/design model/system/subsystem/component can also has dependency links to its related peer objects. III. DEFINITIONS OF THE REQUIREMENTS TRACEABILITY RELATIONS To capture the links between higher-level objects and lower-level objects, the three link types of traceability relations between higher-level objects and lower-level objects are in need for further evaluation. We first treat traceability links as a kind of impact relation to reflect its applicability to performing impact analysis of requirements change (see Figure 2. Link Types between Higher-level Object and Lower-level Object Definition 1). We then define the evolution, dependency, satisfaction and rationale links as a kind of impact relation between higher-level objects and lower-level objects in Definition 2. Definition 1. Let traceability relations R be the impact relations on the set of work products W defined by x R y if and only if change x may affect y for every x, y W R is transitive because if x impact y and y impact z then it follows that x impact z for every x, y, z W Definition 2. Let evolution link, satisfaction link and dependency link R be a kind of traceability relation. The relations between higher-level objects to lower-level objects are defined by 1) An evolution link from a higher-level object to a lowerlevel object is an impact relation. 2) A dependency link between higher-level objects/lowerlevel objects is an impact relation. 3) A satisfaction link from a lower-level object to a higher-level object is an impact relation. Figure 2 illustrates the traceability links between higherlevel objects and lower-level objects. In Figure 2-(a), a higher-level object evolves to a lower-level object. For example, a requirement has an evolution link to its derived design model, by changing the requirement may affect its derived design model. In Figure 2-(b), a higher-level/lower-level object depends on another higher-level/lower-level object. For example, a requirement has a dependency link to its dependent requirement, by changing the requirement may affect its dependent requirement(s). In Figure 2-(c), a lowerlevel object satisfies its related higher-level object to some degree, i.e. a requirement has a satisfaction link to its related system objective, by changing the requirement may affect its related system objective(s) IV. TRACEABILITY LINK DERIVATION PROCESS In this work, a systematic process is presented to evaluate the relations between higher-level objects and lower-level objects. Four steps are proposed to identify and evaluate 562

3 Figure 3. Traceability Link Derivation Process the relations between them, and a matrix, called traceability matrix, is divided into four sub-matrices to capture the traceability links (see Figure 3): 1) Identify Relation from Higher-level Object to Lowerlevel Object: The higher-level object to lower-level Object evolution links are identified and kept in the HL sub-matrix. 2) Identify Relation between Lower-level Objects: The dependency links between lower-level objects are identified and kept in the LL sub-matrix. 3) Evaluate Relation from Lower-level Object to Higherlevel Object: Users will be engaged to identify the satisfaction links related to lower-level object to higherlevel object 4) Analyze Relation between Higher-level Object: The dependency links between higher-level objects are derived automatically by using matrix multiplication based on the notion of graph theory. A. Identify Relation from Higher-level Object to Lower-level Object In the first phase of the traceability relation evaluation process, we begin with identifying the evolution links from higher-level object to lower-level object after they have been modelled. Since each higher-level object is evolved to its associated lower-level objects, the evolution links between are one-to-one or one-to-many relations, and are kept in the HL sub-matrix of the traceability matrix (see HL matrix in Figure 3). The (H i, L j ) entries (for i = 1,..., m, j = 1,...,n; m = number of higher-level objects, n = number of lower-level object) in traceability matrix are marked as 1 to indicate the evolution links between them. B. Identify Relation between Lower-Level Objects When there exists traceability relations between lowerlevel objects, the corresponding entries of LL sub-matrix are marked as 1 based on the dependency links between them (see LL sub-matrix in Figure 3). C. Evaluate Relation from Lower-Level Object to Higher- Level Object Traceability link strength and direction are crucial factors in the structuring of requirements traceability. The satisfaction degree of satisfaction links from lower-level object to higher-level object are evaluated to result in LH matrix. The evaluation process involves measuring the satisfaction degree of LH satisfaction links which are kept in the LH sub-matrix of the traceability matrix (see LH sub-matrix in Figure 3). To analyze the satisfaction links from lower-level to higher-level objects in the third phase of the evaluation process, we examine the relationships among higher-level objects and lower-level objects in a pairwise manner by utilizing Table I, which results in the satisfaction links in LH sub-matrix. The gauge of satisfaction values is from 1 to -1. 1/-1 means that the goal is fully satisfied/fully denied after the use case is performed. 0.2/-0.2 means that the goal is partially satisfied/partially denied after the use case is performed. 0 means that the goal is not affected after the use cases is performed. Others represent the degrees between scores listed above. Detail explanation of the rating of satisfaction degree can be found in Table I. Table I RATINGS DEFINITION OF SATISFACTION VALUES Score Explanation 1 The higher-level object is fully satisfied after the lowerlevel 0.6 The higher-level object is largely satisfied after the lowerlevel 0.2 The higher-level object is partially satisfied after the lower-level 0 The higher-level object is not affected after the lower-level -0.2 The higher-level object is partially denied after the lowerlevel -0.6 The higher-level object is largely denied after the lowerlevel -1 The higher-level object is fully denied after the lower-level 0.4, 0.8, Represent the degrees between scores listed above -0.4, -0.8 D. Analyze Relation between Higher-Level Objects In the final phase of the traceability relation evaluation process (see HH sub-matrix in Figure 3), the HH dependency links between higher-level objects are analyzed to produce HH sub-matrix. In order to derive the dependency links between higher-level objects, we formulate higher-level objects and lower-level objects as a vertex set and traceability links as edges between higher-level objects and lower-level objects in a graph. The HL, LL and LH links identified in previous sections can be captured in the HL, LL and LH sub-matrices. The dependency links between higher-level objects can be generated in the HH sub-matrix automatically using the theorems 1 and 2 based on the notion of graph 563

4 of length 2 from H i to H j with a path H i L i H j.if the (i, j)-entry > 0, then H i has a dependency link to H j, i.e. change H i may affect H j. Proof: If the (i, j)-entry of A 2 > 0, it means that there exist at least one edge sequence through the path H i L i H j. Thus H i has a evolution link to L i, and L i has a satisfaction link to H j. According to Definitions 1 and 2, evolution link and satisfaction link are a kind of impact relation which is transitive, then H i has a impact relation to H j. From Definition 2, the impact relation between higherlevel object is a dependency link, thus Hi has a dependency link to Hj which means that change H i may affect H j. Figure 4. Graph and its Adjacency Matrix theory. After the HH sub-matrix is generated, the four submatrices (HL, LL, LH and HH matrices) are all included in the traceability matrix that can be used for requirements management and change impact anlaysis. Figure 4 illustrates how the concept works behind this formulation. In Figure 4-(a), higher-level object H 1 is evolved to lower-level object L 1, which satisfies higher-level object H 2 to some degree. The adjacency matrix A of graph (a) is identified and the entries (H 1, L 1 ) and (L 1, H 2 ) are marked as 1 to indicate the evolution and satisfaction links, respectively. The entry (H 1,H 2 )ina 2, the square of matrix A, is 1, which means that there exists an edge sequence of length 2 from H 1 to H 2. This edge sequence is a path through H 1 L 1 H 2, an evolution link from H 1 L 1 and a satisfaction link from L 1 H 2, which implies a dependency link from H 1 to H 2, according to the Definitions 1 and 2. In Figure 4-(b), higher-level object H 3 is evolved to lowerlevel object L 3, and L 3 has a dependency link to lower-level object L 4, i.e. L 3 depends on L 3. L 4 has a satisfaction link with its original goal H 4. The adjacency matrix B of graph (b) is identified and the (H 4,L 4 ), (L 4,L 4 ) and (L 4,H 4 ) entries are marked as 1 to indicate the evolution, dependency and satisfaction links, respectively. The (H 3,H 4 )inb 3, the cube of matrix B, is 1, which means that there exists an edge sequence of length 3 from H 3 to H 4. This edge sequence is a path through H 3 L 3 L 4 H 4 that implies a dependency link from H 3 to H 4. Theorem 1 and 2 are given below to summarize the formulation to derive the higher-level objects to higher-level objects (HH) dependency links, which is based on the graph theory 10.1 in [18]. Dependency Link Derivation Theorem 1. Let T be a graph with vertex set H 1,..., H m,l 1,..., L n and adjacency matrix A with HL, LL and LH traceability links (m=number of higherlevel objects, n=number of lower level objects). The (i, j)- entry of A 2 (i, j = 1...m) is the number of edge sequences Dependency Link Derivation Theorem 2. Let T be a graph with vertex set H 1,..., H m,l 1,..., L n and adjacency matrix A with HL, LL and LH traceability links (m=number of higherlevel objects, n=number of lower level objects). The (i,j)- entry of A 3 (i, j = 1...n) is the number of edge sequences of length 3 from H i to H j. If the (i, j)-entry of A 3 > 0 and the (i, j)-entry of A 2 = 0, then there exists a path H i L i L j H j. Thus, H i has a dependency link to H j, i.e. change H i may affect H j. Proof: If the (i, j)-entry of A 3 > 0 and the (i, j)-entry of A 2 = 0, it means that there exists at least one edge sequence through the path H i L i L j H j. Thus H i has a evolution link to L i, L i has a dependency link to L j, and L j has a satisfaction link to H j. Since evolution link, dependency link and satisfaction link are a kind of impact relation which is transitive, H i has a impact relation to H j. From definition 2, the impact relation between higher-level object is a dependency link, thus Hi has a dependency link to Hj which means that change H i may affect H j. V. RELATED WORK Gotel and Finkelstein [2] investigated and reported the requirements traceability problems, and recommended several solutions. They observed a lack of pre-rs traceability, meaning that no traceability information was available before inclusion in the requirements specification. Dómges [16] proposed a framework of adaptable traceability environments to support the definition and usage of projectspecific trace data and strategies. The organizational learning about project-specific requirements traceability should be empowered to guide stakeholders in trace capture and usage, and support continuous process improvement. Spanoudakis et al. [9] developed a rule-based approach to automatically generate four traceability relations between requirement statement documents, use cases documents and analysis object models of a software system by using two different traceability rules, the requirements-to-object-model (RTOM) and inter-requirement rules (IREQ). 564

5 Egyed proposed a scenario-driven approach [10], [19] to generate and validate trace dependencies among model elements that are related to code. A test scenario or usage scenario are tested to generate observed traces for further trace analysis with other hypothesized traces. The new trace dependencies among model elements and code are then yielded and validated to solve the inconsistencies and incompletenesses. To address the human source issue of requirement traceability, Gotel and Finkelsten [12] presented contribution structure to locate people with their contributed artifacts in the contribution format. The social roles, role relations and commitments can be further inferred to form the personnelbased requirements traceability. Cleland-Huang et al. [14] developed an event-based traceability (EBT) approach, based on event notification, to trace and maintain the artifacts and their related links during the software lifecycle. The EBT s architecture has the following three main parts: Requirements Manager handles requirements evolution with identified change events, and triggers the events by publishing an event message when a change occurs. Event Server manages subscriptions, and receives event messages from the requirement manager. It then customizes event notifications into a specific update directive, and forwards it to the subscriber manager. Subscriber Manager receives and resolves event notifications and restores an artifact and related traceability links to a current state if necessary. Cleland-Huang [13], [20] also presented a goalcentric approach to manage non-function requirements in four steps. First, nonfunctional requirements are modeled by a softgoal interdependency graph (SIG). Second, when the changes occur, the trace links are dynamically generated using probabilistic network model, and filtered by users to remove the irrelevant ones. Third, the affected SIG elements are analyzed and evaluated to determine whether other goals are affected and still satisfied after the changes. Finally, the decision on whether to implement changes is made, and risk mitigation strategies are identified before performing the changes. VI. SUMMARY In a nutshell, the proposed approach can be summarized in Algorithm 1 which outlines the process involved in establishing a requirements traceability matrix and deriving traceability links. The higher-level objects and lower-level objects are denoted as vertex set in Theorem 1 and 2, and adjacency matrix A is used to capture the relations between higher-level objects and lower-level objects. The steps in the algorithm are described in detail below. In Step 1 of Algorithm 1, a square matrix A is created with m+n elements for m higher-level objects and n lowerlevel objects. All the entries in the matrix are initialized to 0, signifying no relation between the higher-level objects and lower-level objects. For phases 1-3 of the higher-level objects and lower-level objects evaluation process, the corresponding traceability matrix are established. The evolution links from higher-level objects to lower-level objects are identified in HL sub-matrix in Step 2. The dependency links between lower-level objects are identified in LL sub-matrix in Step 3. The satisfaction degrees S degree of LH satisfaction links are identified and normalized in LH sub-matrix in step 4. After Steps 2-4 are complete, the HH dependency links can be generated by steps 5-7 of Algorithm 1. From Theorem 1, matrix A is squared to calculate the number of links from H i to H j through the path H i L i H j in the HH submatrix of the HHSquareMatrix in Step 5. Matrix A is then cubed to obtain the number of links from H i to H j through the path H i L i L j H j in Step 6. The HH matrix is evaluated to obtain the dependency links between higherlevel objects from the HHSquareMatrix and HHCubeMatrix. In step 7, the links in the HHSquareMatrix are added first into matrix A. If no relation is found in the entries of the HHSquareMatrix, but one exists in the same entry of the HHCubeMatrix, then the links in the HHCubeMatrix are added into matrix A. The HH dependency links are established in the HH sub-matrix of matrix A. Matrix A can be further analyzed using matrix analysis methods, such as DSM partition algorithm [21], [22] to partition the matrix into blocks which include the coupled higher-level and lower-level objects, which bi-directionally influence each other owing to the loop relations among them. The matrix A can also be used to derive traceability trees [23] which can help developers to perform change impact analysis. Algorithm 1. Traceability Link Derivation Algorithm Let G be a graph with vertex set H 1,..., H m,l 1,..., L n and adjacency matrix A. 1. Establish (1) a square matrix A with m+n elements H 1,..., H m,l 1,..., L n, initialize (i, j)-entry = 0 for i = 1,..., m+n, j = 1,...,m+n (2) HHSquareMatrix and HHCubeMatrix with m elements H 1,..., H n 2. Let (i, j)-entry =1ifH i has a evolution link to L j for i=1,..., m, j=m+1,..., m+n 3. Let (i, j)-entry =1ifL i has a dependency link with L j for i = m+1,..., m+n, j = m+1,..., m+n 4. Let (i, j)-entry = S degree,ifl j satisfy H i in S degree value (for i = m+1,..., m+n, j = 1,..., n) 5. Squaring the matrix A, save the (i, j)-entry (i, j = 1...n) of the result matrix ra to HHSquareMatrix 6. Cubing the matrix A, save the (i, j)-entry (i, j = 1...n) of the result matrix ra to HHCubeMatrix 7. for each (i, j)-entry of (i, j = 1...n) of HHSquareMatrix and HHCubeMatrix do if (i, j)-entry of HHSquareMatrix > 0 add the (i, j)-entry in HHSquareMatrix to the matrix A else if (i, j)-entry of HHCubeMatrix > 0 add the (i, j)-entry in HHCubeMatrix to the matrix A end if VII. CONCLUSION To manage requirements change and analyze the impacted work products, establishing requirements traceability 565

6 relations is an inevitable feature during software development life-cycle. This work adopts requirements traceability reference models to define traceability relation definitions and three types of traceability links. The link derivation theorems are provided based on the proposed definitions and graph theory to establish the traceability links between system objectives/requirements/design models/subsystems/components in an automatic way. The proposed approach can be served as basis for a requirements traceability theory that can deal with the requirements traceability issues, such as degree of satisfaction, strength of dependency, and dependency link direction. ACKNOWLEDGMENT This study is conducted under the grant MOST E which is subsidized by the Ministry of Science and Technology REFERENCES [1] B. Ramesh and M. Edwards, Issues in the development of a requirements traceability model, in Proceedings of the International Conference on Requirements Engineering, Jan 1993, pp [2] O. C. Z. Gotel and A. C. W. Finkelstein, An analysis of the requirements traceability problem, in Proceedings of the International Conference on Requirements Engineering, Appril 1994, pp [3] B. Ramesh, T. Powers, C. Stubbs, and M. Edwards, Implementing requirements traceability: a case study, in Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 1995, pp [4] R. Watkins and M. Neal, Why and how of requirements tracing, IEEE Software, vol. 11, no. 4, pp , Jul [5] J.-P. Corriveau, Traceability process for large oo projects, IEEE Computer, vol. 29, no. 9, pp , September [6] M. Jarke, Requirements tracing, Communications of the ACM, vol. 41, no. 12, pp , December [7] P. Arkley and S. Riddle, Overcoming the traceability benefit problem, in Proceedings of the th IEEE International Conference on Requirements Engineering (RE05), 2005, pp [8] J. Dick, Design traceability, IEEE Software, vol. 22, no. 6, pp , November/December [9] G. Spanoudakis, A. Zisman, E. Pe rez-minana, and P. Krause, Rule-based generation of requirements traceability relations, Journal of Systems and Software, vol. 72, no. 2, pp , [11] G. Antoniol, G. Canfora, G. Casazza, A. D. Lucia, and E. Merlo, Recovering traceability links between code and documentation, IEEE Transactions on Software Engineering, vol. 28, no. 10, pp , October [12] O. Gotel and A. Finkelstein, Extended requirements traceability: results of an industrial case study, in Proceedings of the 3rd IEEE International Symposium on Requirements Engineering, Jan 1993, pp [13] J. Cleland-Huang, R. Settimi, O. BenKhadra, E. Berezhanskaya, and S. Christina, Goal-centric traceability for managing non-functional requirements, in Proceedings of the International Conference on Software Engineering, May 2005, pp [14] J. Cleland-Huang, C. K. Chang, and M. Christensen., Eventbased traceability for managing evolutionary change, IEEE Transactions on Software Engineering, vol. 29, no. 9, pp , Septmember [15] B. Ramesh and M. Jarke, Toward reference models for requirements traceability, IEEE Transactions on Software Engineering, vol. 27, no. 1, pp , January [16] R. Dómges and K. Pohl, Adapting traceability environments to project-specific needs, Communications of the ACM, vol. 41, no. 12, pp , December [17] B. Ramesh, Factors influencing requirements traceability practice, Communications of the ACM, vol. 41, no. 12, pp , December [18] R. Garnier and J. Taylor, Discrete Mathematics for New Technology, 2nd edition. Taylor and Francis. [19] A. Egyed, Resolving uncertainties during trace analysis, in Proceedings of the 12th ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE), 2004, pp [20] J. Cleland-Huang, Toward improved traceability of nonfunctional requirements, in Proceedings of the 3rd international workshop on Traceability in emerging forms of software engineering, Nomember 2005, pp [21] S.-H. Cho and S. D. Eppinger, A simulation-based process model for managing complex design projects, IEEE Transactions on Engineering Management, vol. 52, no. 3, pp , August [22] M. Danilovic and T. R. Browning, Managing complex product development projects with design structure matrices and domain mapping matrices, International Journal of Project Management, vol. 25, no. 3, pp , April [23] W.-T. Lee, W.-Y. Deng, J. Lee, and S.-J. Lee, Change impact analysis with a goal-driven traceability-based approach, Int. J. Intell. Syst., vol. 25, no. 8, pp , Aug [10] A. Egyed, A scenario-driven approach to trace dependency analysis, IEEE Transactions on Software Engineering, vol. 29, no. 2, pp , February

Towards a Model of Analyst Effort for Traceability Research

Towards a Model of Analyst Effort for Traceability Research Towards a Model of Analyst for Traceability Research Alex Dekhtyar CalPoly San Luis Obispo California 1 + 1 85 756 2387 dekhtyar@calpoly.edu Jane Huffman Hayes, Matt Smith University of Kentucky Lexington

More information

Representing Software Traceability using UML and XTM with an investigation into Traceability Patterns

Representing Software Traceability using UML and XTM with an investigation into Traceability Patterns Honours Project 2005 Representing Software Traceability using UML and XTM with an investigation into Traceability Patterns David Hollings University of Cape Town Dept. of Computer Science South Africa

More information

Formulating a Software Traceability Model for Integrated Test Documentation: a Case Study

Formulating a Software Traceability Model for Integrated Test Documentation: a Case Study Formulating a Software Traceability Model for Integrated Test Documentation: a Case Study Azri Azmi and Suhaimi Ibrahim Abstract Software Documentation is a key of quality factor in software development

More information

An Efficient Approach for Requirement Traceability Integrated With Software Repository

An Efficient Approach for Requirement Traceability Integrated With Software Repository An Efficient Approach for Requirement Traceability Integrated With Software Repository P.M.G.Jegathambal, N.Balaji P.G Student, Tagore Engineering College, Chennai, India 1 Asst. Professor, Tagore Engineering

More information

An Extensible Architecture for Enterprise-wide Automated Requirements Traceability

An Extensible Architecture for Enterprise-wide Automated Requirements Traceability An Extensible Architecture for Enterprise-wide Automated Requirements Traceability Jun Lin, Chan Chou Lin 2, Joseph Amaya 3, Massimo Ilario 4, Jane Cleland-Huang 5 Center for Requirements Engineering School

More information

Provenance in Software Engineering - A Configuration Management View

Provenance in Software Engineering - A Configuration Management View Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 Provenance in Software Engineering - A Configuration Management

More information

EA-Tracer: Identifying Traceability Links between Code Aspects and Early Aspects

EA-Tracer: Identifying Traceability Links between Code Aspects and Early Aspects EA-Tracer: Identifying Traceability Links between Code Aspects and Early Aspects ABSTRACT Alberto Sardinha INESC-ID and Instituto Superior Técnico, Technical University of Lisbon Lisbon, Portugal jose.alberto.sardinha@ist.utl.pt

More information

Requirements Change Impact Analysis Using Event Based Traceability

Requirements Change Impact Analysis Using Event Based Traceability Requirements Change Impact Analysis Using Based Traceability R. P. Gohil, Swapan Bhattacharya, and Ravirajsinh Chauhan Abstract The growing complexities of software and the demand for shorter time to market

More information

Requirements Evolution. Ch. 6 Lecture Notes IN4MTX 113 February 2010

Requirements Evolution. Ch. 6 Lecture Notes IN4MTX 113 February 2010 Requirements Evolution Ch. 6 Lecture Notes IN4MTX 113 February 2010 Chapter 6 Topics Sources of change Versions (Revisions) and Variants Configuration Management Change propagation Trace links Verifiability

More information

Impact of Dependency Graph in Software Testing

Impact of Dependency Graph in Software Testing Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,

More information

An Efficient Approach for Requirement Traceability Integrated With Software Repository

An Efficient Approach for Requirement Traceability Integrated With Software Repository IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 4 (Nov. - Dec. 2013), PP 65-71 An Efficient Approach for Requirement Traceability Integrated With Software

More information

Project Management Professional (PMP ) Exam Preparation Course

Project Management Professional (PMP ) Exam Preparation Course Course Objective Project Management Professional (PMP ) Spring 2018 Syllabus To prepare the student for the PMP certification examination with a rigorous review of Project Management best practices that

More information

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking Rengamathi Sankarkumar (B), Damith Ranasinghe, and Thuraiappah Sathyan Auto-ID Lab, The School of Computer Science, University

More information

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)

More information

Using Fine-Grained Differencing to Evolve Traceability Links

Using Fine-Grained Differencing to Evolve Traceability Links Using Fine-Grained Differencing to Evolve Traceability Links Bonita Sharif and Jonathan I. Maletic Department of Computer Science Kent State University Kent Ohio 44242 {bsimoes, jmaletic}@cs.kent.edu ABSTRACT

More information

Reconstructing Requirements Coverage Views from Design and Test using Traceability Recovery via LSI

Reconstructing Requirements Coverage Views from Design and Test using Traceability Recovery via LSI Reconstructing Requirements Coverage Views from Design and Test using Traceability Recovery via LSI Marco Lormans Delft Univ. of Technology M.Lormans@ewi.tudelft.nl Arie van Deursen CWI and Delft Univ.

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Model-based Run-Time Software Adaptation for Distributed Hierarchical Service Coordination

Model-based Run-Time Software Adaptation for Distributed Hierarchical Service Coordination Model-based Run-Time Software Adaptation for Distributed Hierarchical Service Coordination Hassan Gomaa, Koji Hashimoto Department of Computer Science George Mason University Fairfax, VA, USA hgomaa@gmu.edu,

More information

TRACEABILITY MANAGEMENT ARCHITECTURES SUPPORTING TOTAL TRACEABILITY IN THE CONTEXT OF SOFTWARE ENGINEERING

TRACEABILITY MANAGEMENT ARCHITECTURES SUPPORTING TOTAL TRACEABILITY IN THE CONTEXT OF SOFTWARE ENGINEERING International Book Series "Information Science and Computing" 17 TRACEABILITY MANAGEMENT ARCHITECTURES SUPPORTING TOTAL TRACEABILITY IN THE CONTEXT OF SOFTWARE ENGINEERING Héctor García, Eugenio Santos,

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

BUG TRACKING SYSTEM. November 2015 IJIRT Volume 2 Issue 6 ISSN: Kavita Department of computer science, india

BUG TRACKING SYSTEM. November 2015 IJIRT Volume 2 Issue 6 ISSN: Kavita Department of computer science, india BUG TRACKING SYSTEM Kavita Department of computer science, india Abstract It is important that information provided in bug reports is relevant and complete in order to help resolve bugs quickly. However,

More information

Parallel Evaluation of Hopfield Neural Networks

Parallel Evaluation of Hopfield Neural Networks Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE

More information

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security 1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this

More information

Keywords: DSM, DMM, Process simulation, product development, process planning

Keywords: DSM, DMM, Process simulation, product development, process planning 0 TH INTERNATIONAL DESIGN STRUCTURE MATRIX CONFERENCE, DSM 0 NOVEMBER 00, STOCKHOLM, SWEDEN SIMULATION OF PRODUCT CHANGE EFFECTS ON THE DURATION OF DEVELOPMENT PROCESSES BASED ON THE DSM Thomas Gärtner,

More information

REPORT ON TELECOMMUNICATIONS SERVICE QUALITY WINDSTREAM FLORIDA, INC.

REPORT ON TELECOMMUNICATIONS SERVICE QUALITY WINDSTREAM FLORIDA, INC. REPORT ON TELECOMMUNICATIONS SERVICE QUALITY For WINDSTREAM FLORIDA, INC. Alachua, Brooker, High Springs, Melrose, and Waldo s February 4 March 14, 2008 Division of Service, Safety & Consumer Assistance

More information

Aspect Design Pattern for Non Functional Requirements

Aspect Design Pattern for Non Functional Requirements Aspect Design Pattern for Non Functional Requirements FAZAL-E-AMIN¹, ANSAR SIDDIQ², HAFIZ FAROOQ AHMAD³ ¹ ²International Islamic University Islamabad, Pakistan ³NUST Institute of Information Technology,

More information

An Introduction to Graph Theory

An Introduction to Graph Theory An Introduction to Graph Theory CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 12:00, Friday 17 th February 2012 Outline 1 Graphs 2 Paths and cycles 3 Graphs and

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

Some Results on the Incidence Coloring Number of Chordal Rings *

Some Results on the Incidence Coloring Number of Chordal Rings * Some Results on the Incidence Coloring Number of Chordal Rings * Kung-Fu Ding, Kung-Jui Pai,+ and Ro-Yu Wu Department of Industrial Engineering and Management, Ming Chi University of Technology, New Taipei

More information

Financial Planning Institute of Southern Africa SETTING THE STANDARD. Continuous Professional Development (Cpd) Policy

Financial Planning Institute of Southern Africa SETTING THE STANDARD. Continuous Professional Development (Cpd) Policy FPI FPI Financial Planning Institute of Southern Africa SETTING THE STANDARD Continuous Professional Development (Cpd) Policy Table of Contents Definitions 3-4 Introduction 4 Primary Responsibility 5 Mandatory

More information

USTGlobal INNOVATION INFORMATION TECHNOLOGY. Using a Test Design Tool to become a Digital Organization

USTGlobal INNOVATION INFORMATION TECHNOLOGY. Using a Test Design Tool to become a Digital Organization USTGlobal INNOVATION INFORMATION TECHNOLOGY Using a Test Design Tool to become a Digital Organization Overview: Automating test design reduces efforts and increases quality Automated testing resolves most

More information

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology

More information

Singularity Analysis of an Extensible Kinematic Architecture: Assur Class N, Order N 1

Singularity Analysis of an Extensible Kinematic Architecture: Assur Class N, Order N 1 David H. Myszka e-mail: dmyszka@udayton.edu Andrew P. Murray e-mail: murray@notes.udayton.edu University of Dayton, Dayton, OH 45469 James P. Schmiedeler The Ohio State University, Columbus, OH 43210 e-mail:

More information

Empirical Study on Impact of Developer Collaboration on Source Code

Empirical Study on Impact of Developer Collaboration on Source Code Empirical Study on Impact of Developer Collaboration on Source Code Akshay Chopra University of Waterloo Waterloo, Ontario a22chopr@uwaterloo.ca Parul Verma University of Waterloo Waterloo, Ontario p7verma@uwaterloo.ca

More information

Graph similarity. Laura Zager and George Verghese EECS, MIT. March 2005

Graph similarity. Laura Zager and George Verghese EECS, MIT. March 2005 Graph similarity Laura Zager and George Verghese EECS, MIT March 2005 Words you won t hear today impedance matching thyristor oxide layer VARs Some quick definitions GV (, E) a graph G V the set of vertices

More information

OpenChain Conformance 2016-H1 Specification

OpenChain Conformance 2016-H1 Specification Contents Introduction... 3 Definitions... 4 Requirements... 5 G1: Know Your FOSS Responsibilities... 5 G2: Assign Responsibility for Achieving Compliance... 6 G3: Review and Approve FOSS Content... 7 G4:

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

GENERALIZED TRACEABILITY CODES

GENERALIZED TRACEABILITY CODES U.P.B. Sci. Bull., Series A, Vol. 78, Iss. 2, 2016 ISSN 1223-7027 GENERALIZED TRACEABILITY CODES Majid MAZROOEI 1, Ali ZAGHIAN 2 In this paper, we introduce generalizations of frameproof, secure frameproof,

More information

Using ITIL to Measure Your BCP

Using ITIL to Measure Your BCP Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP

More information

White Box Testing with Object Oriented programming

White Box Testing with Object Oriented programming White Box Testing with Object Oriented programming Mrs.Randive R.B 1, Mrs.Bansode S.Y 2 1,2 TPCT S College Of Engineering,Osmanabad Abstract:-Software testing is one of the best means to affirm the quality

More information

Inferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets

Inferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets 2016 IEEE 16th International Conference on Data Mining Workshops Inferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets Teruaki Hayashi Department of Systems Innovation

More information

Integrated Framework for Automating the Structural Design Iteration

Integrated Framework for Automating the Structural Design Iteration Integrated Framework for Automating the Structural Design Iteration P. Mujumdar a and J.U. Maheswari b a,b Department of Civil Engineering, Indian Institute of Technology Delhi, India E-mail: purvamujumdar@gmail.com

More information

REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH. Contents REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

More information

A Novel Method for the Comparison of Graphical Data Models

A Novel Method for the Comparison of Graphical Data Models 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS DEVELOPMENT (ISD01 CROATIA) A Novel Method for the Comparison of Graphical Data Models Katarina Tomičić-Pupek University of Zagreb, Faculty of Organization

More information

350 Index 2005 GOAL/QPC

350 Index 2005 GOAL/QPC Index abstract testing, 274 acceptance criteria, 270 acceptance tests, 270 activity diagrams, 113, 114, 174-175, 321 actor catalog, 144 actor description, 144 actor hierarchy, 148 actor map, 59, 114, 144,

More information

Overview of SBSE. CS454, Autumn 2017 Shin Yoo

Overview of SBSE. CS454, Autumn 2017 Shin Yoo Overview of SBSE CS454, Autumn 2017 Shin Yoo Search-Based Software Engineering Application of all the optimisation techniques we have seen so far, to the various problems in software engineering. Not web

More information

DSM (Dependency/Design Structure Matrix)

DSM (Dependency/Design Structure Matrix) DSM (Dependency/Design Structure Matrix) L T JayPrakash Courtsey: DSMweb.org Organization of the Talk 1 Different DSM Types How to Read a DSM Building and Creating a DSM Hands-on Exercises Operations on

More information

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013!

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013! Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are

More information

OG0-091 Q&As TOGAF 9 Part 1

OG0-091 Q&As TOGAF 9 Part 1 CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

Star Decompositions of the Complete Split Graph

Star Decompositions of the Complete Split Graph University of Dayton ecommons Honors Theses University Honors Program 4-016 Star Decompositions of the Complete Split Graph Adam C. Volk Follow this and additional works at: https://ecommons.udayton.edu/uhp_theses

More information

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers , October 20-22, 2010, San Francisco, USA Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers I-Lun Tseng, Member, IAENG, Huan-Wen Chen, and Che-I Lee Abstract Longest-path routing problems,

More information

Taccumulation of the social network data has raised

Taccumulation of the social network data has raised International Journal of Advanced Research in Social Sciences, Environmental Studies & Technology Hard Print: 2536-6505 Online: 2536-6513 September, 2016 Vol. 2, No. 1 Review Social Network Analysis and

More information

Bipolar Fuzzy Line Graph of a Bipolar Fuzzy Hypergraph

Bipolar Fuzzy Line Graph of a Bipolar Fuzzy Hypergraph BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 1 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0002 Bipolar Fuzzy Line Graph of a

More information

Unsupervised Clustering of Requirements

Unsupervised Clustering of Requirements Technology Volume 1, Issue 2, October-December, 2013, pp. 183-188, IASTER 2013 www.iaster.com, Online: 2347-5099, Print: 2348-0009 Unsupervised Clustering of Requirements 1 B. Saranya, 2 R. Subha, 3 Dr.S.

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

Stable sets, corner polyhedra and the Chvátal closure

Stable sets, corner polyhedra and the Chvátal closure Stable sets, corner polyhedra and the Chvátal closure Manoel Campêlo Departamento de Estatística e Matemática Aplicada, Universidade Federal do Ceará, Brazil, mcampelo@lia.ufc.br. Gérard Cornuéjols Tepper

More information

Modeling Issues Modeling Enterprises. Modeling

Modeling Issues Modeling Enterprises. Modeling Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

Integrated Cyber Defense Working Group (ICD WG) Introduction

Integrated Cyber Defense Working Group (ICD WG) Introduction Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative

More information

OpenChain Specification Version 1.3 (DRAFT)

OpenChain Specification Version 1.3 (DRAFT) OpenChain Specification Version 1.3 (DRAFT) 2018.10.14 DRAFT: This is the draft of the next version 1.3 of the OpenChain specification. Recommended changes to be made over the current released version

More information

A method for solving unbalanced intuitionistic fuzzy transportation problems

A method for solving unbalanced intuitionistic fuzzy transportation problems Notes on Intuitionistic Fuzzy Sets ISSN 1310 4926 Vol 21, 2015, No 3, 54 65 A method for solving unbalanced intuitionistic fuzzy transportation problems P Senthil Kumar 1 and R Jahir Hussain 2 1 PG and

More information

Attribute-Driven Design

Attribute-Driven Design Attribute-Driven Design Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Attribute-Driven Design The ADD method is an approach to defining a software architecture in which the design process is based

More information

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada

More information

DSM Modelling for Digital Design Using Verilog HDL

DSM Modelling for Digital Design Using Verilog HDL DSM Modelling for Digital Design Using Verilog HDL Xing Xue 1, Yao Chen 2, and Junchao Wei 3 1 Faculty of economics and management, ShangLuo University, 726000 ShangLuo, China, chenyao3505@gmail.com 2

More information

Synology Security Whitepaper

Synology Security Whitepaper Synology Security Whitepaper 1 Table of Contents Introduction 3 Security Policy 4 DiskStation Manager Life Cycle Severity Ratings Standards Security Program 10 Product Security Incident Response Team Bounty

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

IPv6 Migration Framework Case of Institutions in Ethiopia

IPv6 Migration Framework Case of Institutions in Ethiopia IPv6 Migration Framework Case of Institutions in Ethiopia Kidist Mekonnen Zemen Bank, Addis Ababa, Ethiopia kidistmt@yahoo.com Taye Abdulkadir HiLCoE School of Computer Science and Technology, Addis Ababa,

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs

A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs MACRo 2015-5 th International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs

More information

Traceability for Managing Evolutionary Change

Traceability for Managing Evolutionary Change Traceability for Managing Evolutionary Change Patrick Maeder, Matthias Riebisch and Ilka Philippow Technical University of Ilmenau Department of Software Systems/Process Informatics D-98693 Ilmenau, Germany

More information

Introduction to Triangulated Graphs. Tandy Warnow

Introduction to Triangulated Graphs. Tandy Warnow Introduction to Triangulated Graphs Tandy Warnow Topics for today Triangulated graphs: theorems and algorithms (Chapters 11.3 and 11.9) Examples of triangulated graphs in phylogeny estimation (Chapters

More information

Using Reverse Semantic Traceability for Quality Control in Agile MSFbased

Using Reverse Semantic Traceability for Quality Control in Agile MSFbased Using Reverse Semantic Traceability for Quality Control in Agile MSFbased Projects Konstantin Zhereb1, Vladimir Pavlov1, Anatoliy Doroshenko 1, and Victor Sergienko 1 1International Software & Productivity

More information

2 nd UML 2 Semantics Symposium: Formal Semantics for UML

2 nd UML 2 Semantics Symposium: Formal Semantics for UML 2 nd UML 2 Semantics Symposium: Formal Semantics for UML Manfred Broy 1, Michelle L. Crane 2, Juergen Dingel 2, Alan Hartman 3, Bernhard Rumpe 4, and Bran Selic 5 1 Technische Universität München, Germany

More information

String Vector based KNN for Text Categorization

String Vector based KNN for Text Categorization 458 String Vector based KNN for Text Categorization Taeho Jo Department of Computer and Information Communication Engineering Hongik University Sejong, South Korea tjo018@hongik.ac.kr Abstract This research

More information

Network Topology for the Application Research of Electrical Control System Fault Propagation

Network Topology for the Application Research of Electrical Control System Fault Propagation Available online at www.sciencedirect.com Procedia Engineering 15 (2011 1748 1752 Advanced in Control Engineering and Information Science Network Topology for the Application Research of Electrical Control

More information

Leveraging Transitive Relations for Crowdsourced Joins*

Leveraging Transitive Relations for Crowdsourced Joins* Leveraging Transitive Relations for Crowdsourced Joins* Jiannan Wang #, Guoliang Li #, Tim Kraska, Michael J. Franklin, Jianhua Feng # # Department of Computer Science, Tsinghua University, Brown University,

More information

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,

More information

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set Renu Vashist School of Computer Science and Engineering Shri Mata Vaishno Devi University, Katra,

More information

A Forward-Secure Signature with Backward-Secure Detection

A Forward-Secure Signature with Backward-Secure Detection A Forward-Secure Signature with Backward-Secure Detection Dai-Rui Lin and Chih-I Wang Department of Computer Science and Engineering National Sun Yat-sen University, Kaohsiung 804, Taiwan June 17, 2007

More information

Information modeling and reengineering for product development process

Information modeling and reengineering for product development process ISSN 1 746-7233, England, UK International Journal of Management Science and Engineering Management Vol. 2 (2007) No. 1, pp. 64-74 Information modeling and reengineering for product development process

More information

Generating (n,2) De Bruijn Sequences with Some Balance and Uniformity Properties. Abstract

Generating (n,2) De Bruijn Sequences with Some Balance and Uniformity Properties. Abstract Generating (n,) De Bruijn Sequences with Some Balance and Uniformity Properties Yi-Chih Hsieh, Han-Suk Sohn, and Dennis L. Bricker Department of Industrial Management, National Huwei Institute of Technology,

More information

Multi-color graph pebbling

Multi-color graph pebbling Multi-color graph pebbling DIMACS REU Final Presentation CJ Verbeck DIMACS REU, Rutgers July 17th, 2009 CJ Verbeck (DIMACS REU, Rutgers) Multi-color graph pebbling July 17th, 2009 1 / 22 An introduction

More information

A Comparative Analysis of Architecture Frameworks

A Comparative Analysis of Architecture Frameworks A Comparative Analysis of Architecture Frameworks Antony Tang Jun Han Pin Chen School of Information Technology DSTO C3 Research Centre Swinburne University of Technology Department of Defence Melbourne,

More information

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.

More information

Robust DWT Based Technique for Digital Watermarking

Robust DWT Based Technique for Digital Watermarking Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information

More information

OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off]

OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off] OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off] DRAFT: This is the near final draft of the 1.2 version of the OpenChain Specification. We have recently completed the final

More information

Information Extraction of Important International Conference Dates using Rules and Regular Expressions

Information Extraction of Important International Conference Dates using Rules and Regular Expressions ISBN 978-93-84422-80-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-2017) Pattaya (Thailand) Dec. 28-29, 2017 Information Extraction of Important

More information

Tiling Rectangles with Gaps by Ribbon Right Trominoes

Tiling Rectangles with Gaps by Ribbon Right Trominoes Open Journal of Discrete Mathematics, 2017, 7, 87-102 http://www.scirp.org/journal/ojdm ISSN Online: 2161-7643 ISSN Print: 2161-7635 Tiling Rectangles with Gaps by Ribbon Right Trominoes Premalatha Junius,

More information

Collaborative Filtering using Euclidean Distance in Recommendation Engine

Collaborative Filtering using Euclidean Distance in Recommendation Engine Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102074, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Collaborative Filtering using Euclidean Distance

More information

Version Control on Database Schema and Test Cases from Functional Requirements Input Changes

Version Control on Database Schema and Test Cases from Functional Requirements Input Changes , March 15-17, 2017, Hong Kong Control on Database Schema and Test Cases from Functional Requirements Input Parichat Kiatphao and Taratip Suwannasart Abstract In software engineering, version control is

More information

Modeling the Knowledge Sharing Barriers using an ISM approach

Modeling the Knowledge Sharing Barriers using an ISM approach 2012 International Conference on Information and Knowledge Management (ICIKM 2012) IPCSIT vol.45 (2012) (2012) IACSIT Press, Singapore Modeling the Knowledge Sharing Barriers using an ISM approach B. P.

More information

Weighting Selection in GRA-based MADM for Vertical Handover in Wireless Networks

Weighting Selection in GRA-based MADM for Vertical Handover in Wireless Networks 216 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation Weighting Selection in GRA-based MADM for Vertical Handover in Wireless Networks Ali F. Almutairi Electrical Engineering

More information

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Electronic Journal of Graph Theory and Applications 3 (2) (2015), 191 196 On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Rafael Del Valle

More information

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

1. Discovering Important Nodes through Graph Entropy The Case of Enron  Database 1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide

More information

LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS

LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS TIMOTHY L. VIS Abstract. A significant problem in finite optimization is the assignment problem. In essence, the assignment

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft

More information

Math.3336: Discrete Mathematics. Chapter 10 Graph Theory

Math.3336: Discrete Mathematics. Chapter 10 Graph Theory Math.3336: Discrete Mathematics Chapter 10 Graph Theory Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information