Requirements Engineering Databases: The Good, The Bad, and The Ugly



Similar documents
License & SW Asset Management at CES Design Services

A Review On Software Testing In SDlC And Testing Tools

SHARESYNC SECURITY FEATURES

CASE STUDY BRIDGE.

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

A Spam Message Filtering Method: focus on run time

CASE STUDY ALLOCATE SOFTWARE


Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Software Engineering Management: strategic choices in a new decade

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

APEC Environmental Goods and Services Work Program

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

How To Prepare For A Mallpox Outbreak

Return on Investment and Effort Expenditure in the Software Development Environment

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

OPINION PIECE. It s up to the customer to ensure security of the Cloud

Project Management Basics

Products and Services

Thank you for attending the MDM for the Enterprise Seminar Series!

Schmid Peoplemover Overpass and Revolution. The Discovery of a New Way.

Performance of a Browser-Based JavaScript Bandwidth Test

Cluster-Aware Cache for Network Attached Storage *

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

A Novel Web-Based Student Academic Records Information System

Bio-Plex Analysis Software

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Performance of Multiple TFRC in Heterogeneous Wireless Networks

TRID Technology Implementation

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Unit 11 Using Linear Regression to Describe Relationships

Third Party Technical Guidelines

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Assessing the Discriminatory Power of Credit Scores

Production Management II. Product Life-Cycle Management II

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Submission to the Network Rail s Long Term Planning Process London and South East Market Study

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

RISK MANAGEMENT POLICY

Insurance Solutions

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Warehouse Security System based on Embedded System

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring.

Strategic Plan of the Codex Alimentarius Commission

Principal version published in the University of Innsbruck Bulletin of 8 April 2009, Issue 55, No 233

Progress 8 measure in 2016, 2017, and Guide for maintained secondary schools, academies and free schools

6. Friction, Experiment and Theory

A note on profit maximization and monotonicity for inbound call centers

Genuine Bendix. a l v e. c o m p r e. s o r s. s y e r. a i r. d r. s t r o n i c. e l e c. d i s c. b r a k e s. w h e e l. e n d X V.

Morningstar Fixed Income Style Box TM Methodology

Change Management Plan Blackboard Help Course 24/7

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

2. METHOD DATA COLLECTION

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

Chapter 3 Torque Sensor

A technical guide to 2014 key stage 2 to key stage 4 value added measures

Forest Lake Local Plan

SGROI FINANCIAL. Contact us if you are interested in getting access to our new Client Portal

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

Name: SID: Instructions

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

PEM GROUP 2015 FINANCIAL RESULTS

Socially Optimal Pricing of Cloud Computing Resources

An Asset and Liability Management System for Towers Perrin-Tillinghast

Algorithms for Advance Bandwidth Reservation in Media Production Networks

A New Optimum Jitter Protection for Conversational VoIP

Delivering the Next Generation of Satellite and Terrestrial Communications

Applications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model

THE CARD DESIGN BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY.

Low-cost, Drift-free DGPS Locomotive Navigation System

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Universidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016.

INFORMATION Technology (IT) infrastructure management

Bidding for Representative Allocations for Display Advertising

Network Architecture for Joint Failure Recovery and Traffic Engineering

MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems)

Brokerage Commissions and Institutional Trading Patterns

Review of Multiple Regression Richard Williams, University of Notre Dame, Last revised January 13, 2015

Transcription:

New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1

Agenda Brief Introduction to Siemen (Context) What i a Requirement Databae? Key differentiator of an RE Databae Indutrial Problem Some Current Reearch Area 2

Information and Communication Communication Siemen Buine Automation and Control Automation and Drive Indutrial Solution and Service Siemen at a Glance Power Power Generation Power Tranmiion and Ditribution Tranportation Tranportation Sytem Siemen VDO Automotive Medical Medical Solution 3 Siemen Building Technologie Lighting Sylvania Service Annual Worldwide Sale Net Income: $2.8B World 21 t larget company 47,000 employee $6.6B dedicated to global R&D $98.2 billion Siemen AG: Worldwide figure for fical 2005 1 (U.S. GAAP 2 ) 1 Fical Year October 1 September 30 2 Average annual exchange rate for FY 2005: 1.00 =$1.273 75% of total ale are from product and ervice developed in the lat five year

SIEMENS CORPORATE RESEARCH Siemen ha a long tradition of technological innovation. 4

The rate of innovation i increaing. Share of ale with product 5 year and younger 48% 55% 75% 6 to 10 year old 30% 29% more than 10 year old 22% 1980 16% 19% 6% 1985 2005 5

RE Databae are Important Functionality previouly realized in electrical or electro-mechanical ytem i now being realized in oftware => bigger, more complex, & more oftware project (hundred of developer, million of line of code). Meeting functional and non-functional requirement i important to buine ucce => retricted hardware reource, real-time performance, afety critical application. Multiite development project. High quality (i.e., thoroughly teted, reliable) oftware i important to buine ucce. Our RE databae mut addre the increaing cale and complexity of emerging oftware ytem. 6

Requirement Databae A requirement databae i an extenion of a tandard databae that provide key functionality in the area of verion control and traceability. That i, the databae provide, off the helf the ability to verion and track change to requirement and to trace requirement within and outide of the databae, alo to create trace matrice and generate formatted report and pecification. Let find the change! 7

Attribute of an RE Databae The are many unique attribute of an RE databae compared with a traditional databae. They include: ischema predefined to upport the torage of requirement of different kind iverion control at the requirement (record) level, with uer view of hitory of a requirement iintrinic upport for tracing, that i, a drag and drop mechanim that i eay to ue and upport creating trace manually between requirement. igeneration of requirement document directly from the repoitory. The preferred method of working I to create and edit requirement in the databae, then ue the documentation facility of the databae to create a filtered and formatted et of requirement in a requirement pecification, uually a either a word or pdf document. 8

Typical Configuration of RE Databae There are two typical type of configuration for RE Databae. i One poible one ha the RE management oftware on the erver, uing a brower to acce it. i The other configuration, which i fater but require that oftware be intalled on the client, i to have a client application on the uer PC acceing the databae on a erver. 9

Scale and complexity make life difficult Requirement Databae with Over 16000* Requirement View Trace View Trace * We have RE databae with over 2 GB in them 10

Key Differentiator of RE Databae Eay to ue, intuitive with minimal need to refer to documentation Ability to baeline and perform change control on requirement. Support for rich text and graphic in a requirement decription 11

Key Differentiator of RE Databae Ability to work offline itake requirement home, review them, change them, roll them back into the databae later. Good thing I can make thoe change at at home. 12

Key Differentiator of RE Databae Product line upport icreate ubet of requirement that can be reued for different project and product. Global Support. ithe ability to have ditributed requirement analyi i more than jut the ability to fold in rule to determine routing, review procedure (e.g. workflow), and cripting for uer guidance and quality aurance. 13

Key Differentiator of RE Databae All field/attribute hould be definable on a per company or per project bai, uch that the ame corporate data dictionary i ued on multiple project for conitency, but each project can till have it own gloary of term, keyword, etc. Corporate DictionaryProject Dictionary 14

Key Differentiator of RE Databae Parent child relationhip- it hould be poible to have a parent child relationhip, and where there i uch a relationhip, it hould be poible to have parent and child of a different core requirement type. FEAT101 SECRQT101.5 PERFRQT 101.33 inote that ome commercial databae do not allow parent-child requirement to be of different type. 15

Key Differentiator of RE Databae Traceability- the tool ued hall enable end-toend traceability, vertical and horizontal traceability. Thi may require integration with other tool uch a IDE and/or modeling and teting tool. Mandated by law, including Sarbane-Oxley, the FDA and the FAA. Traceability required by mot demanding afetycritical proce tandard uch a: DO178B, IEC 61508, EN50128*. 16

Traceability and The FDA* A oftware requirement traceability analyi hould be conducted to trace oftware requirement to (and from) ytem requirement and to rik analyi reult. In addition to any other analye and documentation ued to verify oftware requirement, a formal deign review i recommended to confirm that requirement are fully pecified and appropriate before extenive oftware deign effort begin. Requirement can be approved and releaed incrementally, but care hould be taken that interaction and interface among oftware (and hardware) requirement are properly reviewed, analyzed, and controlled. *General Principle of Software Validation; Final Guidance for Indutry and FDA Staff, Jan 11, 2002 17

Traceability and the FAA FAA' Adviory Circular AC20-115B etablihed DO-178B a the accepted mean of certifying all new aviation oftware: The tringent and internationally accepted DO-178B proce tandard that govern the development of civilian avionic embedded oftware i primarily requirement driven. at each tage oftware developer mut be able to demontrate traceability of deign againt requirement; i.e. are the highlevel requirement I am pecifying traceable to the ytem requirement? Are the low-level requirement traceable to the high-level requirement?... *Eterel Technologie 18

SHR 3 Xx xxx xxx xx xx xxxxxx xxx or Xx xxx xx xx xx xxxx xx xxxxx Stakeholder requirement & Multiple Layer SR 37 X xx x xxxxx xx xx xx xxxx xxx SR 31 Xx x xx xxxxx xx xxxx xx x xxx DK 01: Xxx xxx x xx SR 41 Xxxxxxx xx xxxx x xxxx xx xxxxxx Sytem requirement & or & DR 37 DR 132 DR 24 DR 131 DR 42 DR 14 Deign requirement 19

SHR 3 Xx xxx xxx xx xx xxxxxx xxx or Xx xxx xx xx xx xxxx xx xxxxx Stakeholder requirement & Multiple Layer SR 37 X xx x xxxxx xx xx xx xxxx xxx & Product line make Xx x xx xxxxx or SR 31 xx xxxx xx x xxx thi DK 01: Xxx wore!!! xxx x xx & SR 41 Xxxxxxx xx xxxx x xxxx xx xxxxxx Sytem requirement DR 37 DR 132 DR 24 DR 131 DR 42 DR 14 Deign requirement 20

The Ugly Databae do not cale Significant performance Degradation Lack of functionality Not uer friendly Obolete cripting language Inefficient query mechanim Poor merge functionality Trace are unmanageable and break 21

Time to panic? 22

Captain! There are no viable olution on the horizon 23

The Bad An unolved computer cience problem 24

The Good ome advanced technique that SCR/SE ha piloted may help in the future iunified Requirement Model idynamic Tracing 25

The Unified Requirement Modeling Language The Unified Requirement Modeling Language (URML) i a tandard notation for the modeling of requirement artifact a firt tep in developing a product or performing buine modeling. It incorporate element of: iue cae ifeature Modeling ihazard Analyi ithreat Modeling igoal Modeling iother requirement related viual modeling technique Sample URML Picture 26

Unified Requirement Model A unified requirement model i a model that ha been created uing the URML. iit ha been found empirically that text pecification are inherently ambiguou. The ambiguity i exacerbated with global oftware development, different language and culture. Graphical model are inherently unambiguou. 27

Unified Requirement Model Requirement Relationhip are naturally organized in directed graph, wherea traditional databae upport a tree tructure. The ue of a tree tructure force the creation of an inordinate number of trace and doe not work well with cro-cutting requirement. A a typical project grow to N requirement, the number of trace needed i often greater than N 2. 28

SIEMENS CORPORATE RESEARCH I finally undertand why I hould ue childproof door lock! ¾Eaier to undertand than text. ¾Verifiable ¾Fater than text (up to 70%) A Viual Language Provide View into the Model 29

Definition of Traceability* Requirement traceability i the ability to decribe and follow the life of a requirement, in both a forward and backward direction: from it origin, through it development and pecification to it ubequent deployment and ue through period of ongoing refinement and iteration in all of the project phae. - *Gotel & Finkletein, 1994 30

Dynamic Tracing Problem: Manual tracing i ubject to error, omiion, and decay a artifact are changed and the lack-of-benefit-to-tracer problem. One olution: Dynamic tracing Dynamic tracing i the automated generation of candidate trace link. 31

With over 3000 deign document the rebel will NEVER find the flaw in in the DeathStar. 32

Much to to learn you have, hmmm? The rebel are uing Dynamic Tracing! 33

A Typical Traceability Matrix 34

Information Retrieval* Inference Network Model (probabilitic approach) Frequency of term t i in repect to the ize of the document. prob(d j t i )=freq(d j,t i )/ Σ k freq(d j,t k ) Frequency of term t i in repect to the ize of the query. prob(q t i )=freq(q,t i )/ Σ k freq(q,t k ) Prob(d j q) = Σ prob(d j t i ) prob(q t i ) prob(t i ) i prob(q) Probability of a link between a query and document. Σ i prob(q t i ) prob(t i ) Meaure the rarity/commonality of the term. prob(t i ) = η(1/n i ) where n i = # of doc containing t i. η = normalizing factor *Slide Courtey of Prof. Jane Cleland-Huang, DePaul Univerity 35

/* * Notification_Proceing.java * @author Fuhu Liu * @verion 5.0 * Changed log file to log DB */ import java.awt.*; import java.awt.event.*; import javax.wing.*; import java.io.*; import java.util.*; import java.ql.*;... void UpdateDiplayLit() { litmodel.removeallelement(); String msql = "SELECT ditinct + SubcriberName FROM EventDetail"; try { r = tmt.executequery(msql); while (r.next()) { String SubName = r.getstring(1); litmodel.addelement(subname); } } } r.cloe(); } catch (Exception e) { Sytem.out.println("Notification_Proceing: Problem with query: " + e); An example of traceable artifact and elected link 36

Viualized Hierarchy* X X WEATHER STATION MANAGEMEN T FREEZE PREDICTIO N DRIVING ALERT CONTACTS Alert hall be iued when hazardou driving condition exit WEATHER READINGS WEATHER STATIONS DE-ICING SCHEDULING ROADS ROAD NETWORK MAPS UPDATE ROAD DATA ROAD SENSORS Candidate link Accepted link Current link Rejected link X *Slide Courtey of Prof. Jane Cleland-Huang, DePaul Univerity 37

Quetion? Am I uppoed to diintegrate the databae or the audience??? Zapppp 38