A reference to a set of Viewpoints: Viewpoints that receive the
assistant services. service.
Responsibilities: Responsibilities of the Constraints: Constraints on providing the
viewpoint. service.
Assumptions: Assumptions made about Implementation: How the service is
the viewpoint. implemented.
Relationships: Relationships to other Status: Current status of the service
viewpoints. (proposed, approved etc).
Priorities: Viewpoint priorities.
Issues: Viewpoint issues.
Rationale: Reason for the viewpoint.
Requirements Management Part 2 - Analysis and CommunicationMohamed Shaaban
This document discusses requirements engineering and analysis. It uses the analogy of blind men feeling different parts of an elephant to represent the various perspectives in requirements analysis, including process, system, functions, and reports. It outlines techniques for requirements analysis like activity diagrams, flowcharts, use cases, and the "Method H" template. The document stresses the importance of effective communication of requirements through documentation, reviews, and revision strategies.
Evaluation techniques can be used at various stages of design to assess usability and functionality. Common techniques include cognitive walkthroughs, heuristic evaluation, and user testing in both laboratory and field settings. A variety of data collection methods exist such as think-aloud protocols, questionnaires, interviews, and physiological measures like eye tracking. The appropriate technique depends on factors like when in the design process evaluation occurs, desired objectivity, available resources, and whether the focus is on high-level or low-level information.
The document discusses key aspects of the software engineering process for designing interactive systems, including the software lifecycle, usability engineering, iterative design and prototyping, and design rationale. It emphasizes that usability must be considered throughout the entire lifecycle rather than as an isolated activity.
Modeling: the holy grail for designing complex systems?xmoneva
presentation given at the ESI Symposium 2009 (Eindhoven, The Netherlands); abstract: http://www.esi.nl/events/esi_symposium_2009/programme/2_1_abstract.html
This document discusses simulation of manufacturing systems. Simulation can be used to understand and predict the future behavior of a system and determine how to influence that behavior. A simulation model acts as a surrogate for experimenting with a real manufacturing system. It is important to validate the model and ensure it is credible. Simulation can evaluate and compare different aspects of a manufacturing process and suggest improvements, even for non-existent systems based on assumptions. The scope of the simulation study should involve customers. Manufacturing transforms raw materials through processes like design, material specification, and modification. Simulation can quantify system performance, predict existing or planned systems, and compare design alternatives. Sources of randomness in simulated manufacturing systems must be modeled correctly.
The document discusses requirements engineering and use case modeling. It covers what requirements engineering is, the requirements engineering process which includes elicitation, analysis, validation, negotiation, documentation and management. It also discusses what a use case is, the different types of actors in use cases, and sections that are typically included in a use case such as goals, scope, steps and supplementary specification.
The document presents PABRE, a method for facilitating requirements elicitation using a catalogue of requirement patterns. The method aims to save time and reduce errors during the elicitation process for selecting off-the-shelf software components. The method involves selecting relevant patterns from the catalogue based on the project needs and adapting them into a requirements book, which is then used for a call for tenders process to select software providers. The paper discusses the structure of the pattern catalogue, including metadata for each pattern and form, and the process used to develop the initial catalogue contents based on analyzing previous projects.
The document discusses requirements engineering and analysis. It describes the key activities in requirements analysis as requirements elicitation, modeling the problem domain, and specifying requirements. It discusses different techniques for requirements analysis including structured analysis, object-oriented analysis, problem domain analysis, and viewpoint analysis. The goal of requirements analysis is to understand the problem before beginning design by representing the information domain, system functions, and system behavior through various models.
Requirements Management Part 2 - Analysis and CommunicationMohamed Shaaban
This document discusses requirements engineering and analysis. It uses the analogy of blind men feeling different parts of an elephant to represent the various perspectives in requirements analysis, including process, system, functions, and reports. It outlines techniques for requirements analysis like activity diagrams, flowcharts, use cases, and the "Method H" template. The document stresses the importance of effective communication of requirements through documentation, reviews, and revision strategies.
Evaluation techniques can be used at various stages of design to assess usability and functionality. Common techniques include cognitive walkthroughs, heuristic evaluation, and user testing in both laboratory and field settings. A variety of data collection methods exist such as think-aloud protocols, questionnaires, interviews, and physiological measures like eye tracking. The appropriate technique depends on factors like when in the design process evaluation occurs, desired objectivity, available resources, and whether the focus is on high-level or low-level information.
The document discusses key aspects of the software engineering process for designing interactive systems, including the software lifecycle, usability engineering, iterative design and prototyping, and design rationale. It emphasizes that usability must be considered throughout the entire lifecycle rather than as an isolated activity.
Modeling: the holy grail for designing complex systems?xmoneva
presentation given at the ESI Symposium 2009 (Eindhoven, The Netherlands); abstract: http://www.esi.nl/events/esi_symposium_2009/programme/2_1_abstract.html
This document discusses simulation of manufacturing systems. Simulation can be used to understand and predict the future behavior of a system and determine how to influence that behavior. A simulation model acts as a surrogate for experimenting with a real manufacturing system. It is important to validate the model and ensure it is credible. Simulation can evaluate and compare different aspects of a manufacturing process and suggest improvements, even for non-existent systems based on assumptions. The scope of the simulation study should involve customers. Manufacturing transforms raw materials through processes like design, material specification, and modification. Simulation can quantify system performance, predict existing or planned systems, and compare design alternatives. Sources of randomness in simulated manufacturing systems must be modeled correctly.
The document discusses requirements engineering and use case modeling. It covers what requirements engineering is, the requirements engineering process which includes elicitation, analysis, validation, negotiation, documentation and management. It also discusses what a use case is, the different types of actors in use cases, and sections that are typically included in a use case such as goals, scope, steps and supplementary specification.
The document presents PABRE, a method for facilitating requirements elicitation using a catalogue of requirement patterns. The method aims to save time and reduce errors during the elicitation process for selecting off-the-shelf software components. The method involves selecting relevant patterns from the catalogue based on the project needs and adapting them into a requirements book, which is then used for a call for tenders process to select software providers. The paper discusses the structure of the pattern catalogue, including metadata for each pattern and form, and the process used to develop the initial catalogue contents based on analyzing previous projects.
The document discusses requirements engineering and analysis. It describes the key activities in requirements analysis as requirements elicitation, modeling the problem domain, and specifying requirements. It discusses different techniques for requirements analysis including structured analysis, object-oriented analysis, problem domain analysis, and viewpoint analysis. The goal of requirements analysis is to understand the problem before beginning design by representing the information domain, system functions, and system behavior through various models.
Requirement engineering involves several key tasks: inception to establish project scope, elicitation to determine user needs, elaboration to refine requirements, negotiation to resolve conflicts, validation to verify requirements, and management of changing requirements. Effective elicitation uses techniques like interviews, scenarios, and ethnography to understand stakeholders and identify general, expected, and unexpected requirements while addressing problems of scope, understanding, volatility, and communication barriers. Requirements are further developed through analysis, modeling, prioritization, and specification documentation. Regular reviews validate that requirements define the desired system.
Requirement analysis and specification, software engineeringRupesh Vaishnav
The document discusses the key tasks in requirements engineering including inception, elicitation, elaboration, negotiation, specification, validation and management. It describes each task such as inception involves establishing a basic understanding of the problem and potential solutions through questioning stakeholders. Elicitation involves drawing requirements from stakeholders through techniques like meetings. Specification can take the form of documents, models, scenarios or prototypes. The requirements specification is an important output and should have certain characteristics like being unambiguous and traceable.
The document discusses various requirements elicitation techniques including interviews, questionnaires, meetings, prototyping, and analyzing existing documentation and hard data. It provides details on how to conduct interviews, distribute questionnaires, plan and run effective meetings, and sample and analyze hard data. The document also covers challenges with elicitation such as stakeholders having differing views, knowledge being distributed across sources, and tacit knowledge being difficult for stakeholders to articulate.
Requirement analysis and UML modelling in Software engineeringsnehalkulkarni74
Receptionist
Patient: Patient
Doctor: Doctor
- The vertical solid line represents the life of an
object.
- It runs from top to bottom.
Messages:-
- The arrow represents the message passing
between objects.
- The arrow head points to the receiver.
- The message name is written near arrow.
- Synchronous and asynchronous message
Receptionist
Patient
Doctor
makeAppointment()
checkAvailability()
scheduleAppointment()
confirmAppointment()
treatPatient()
billPatient()
- Sequence diagram shows the time sequence of
messages between objects.
- It emphasizes on
The document discusses the key tasks in requirements engineering: inception to initially understand user needs, elicitation to gather requirements, elaboration to further analyze and model requirements, negotiation to reconcile conflicts, specification to formally document requirements, validation to verify requirements quality, and management to track requirements throughout the project. The tasks involve collaborative activities like interviews and workshops to capture ambiguous and changing user needs and transform them into clear, consistent requirements that form the basis for subsequent software design and development.
The document discusses requirement gathering and analysis. It emphasizes the importance of requirements in project success and describes key tasks in requirements engineering including inception, elicitation, and elaboration. During inception, questions are asked to understand the problem, stakeholders, and desired solution. Elicitation involves discovering requirements through collaboration and techniques like use cases. Elaboration refines information through analysis modeling with elements like use cases, classes, and behaviors. The goal is a model that defines the functional, informational, and behavioral domains of the problem.
This document provides an overview of requirements documentation and modeling techniques. It discusses guidelines for writing requirements, such as using standard templates and natural language. Requirements documents establish what a system should do and provide validation. The document also discusses use case modeling and defines actors, flows of events, and extensions. It provides an example case study of an ATM banking system and describes associated use cases. Finally, it discusses principles of modeling like abstraction and partitioning, as well as modeling techniques like object-oriented and functional modeling.
Requirements engineering process in software engineeringPreeti Mishra
Requirement Engineering (RE) involves understanding what customers want through tasks like elicitation, negotiation, and specification. RE helps establish requirements that provide a solid foundation for design and construction. The key RE tasks are inception to understand the problem, elicitation by drawing out requirements, elaboration by creating analysis models, negotiation to agree on a realistic solution, specification to formally describe requirements, validation to check for errors or issues, and management of changing requirements. RE helps software engineers better understand problems to solve through participation with customers, managers, and end users.
1. Requirements analysis identifies customer needs, evaluates feasibility, and establishes system definitions and specifications. It bridges the gap between requirements engineering and system design.
2. Requirements analysis has several phases including problem recognition, evaluation and synthesis of possible solutions, help modeling, and writing definitions and specifications. It also considers management questions around effort, roles, challenges, and costs.
3. Requirements analysis determines functional requirements describing system behavior and inputs/outputs, as well as non-functional requirements around performance, interfaces, and user factors. It also validates that requirements are correct, consistent, complete, and testable.
Enterprise system implementation strategies and phasesJohn Cachat
Implementation Strategies
Full blown
Staggered or Phased
Implementation Phases
Project planning
Application exploration
System design
System testing
System activation – “go live”
johncachat@hotmail.com
www.peproso.com
The document discusses requirements engineering and provides an overview of the requirements engineering process. It describes requirements elicitation, analysis and negotiation, specification, system modeling, validation, and management as the key steps in requirements engineering. Requirements engineering aims to understand customer needs, analyze and negotiate requirements, unambiguously specify the solution, and manage requirements as the system is developed. It provides the best process currently available for ensuring a system properly meets customer needs and expectations.
Requirements engineering involves multiple tasks to ensure software engineers understand customer needs. It begins with inception to establish basic understanding, then elicitation gathers requirements from stakeholders. During elaboration, requirements are analyzed and modeled. Negotiation reconciles customer wants with feasibility. Requirements are then specified and validated before being managed throughout the project. The goals are to avoid building the wrong solution and establish a solid foundation for design.
Requirements modeling involves creating models during requirements analysis to understand current systems or business processes being automated and how users will interact with a new system. It helps with elicitation, validation, and communication of requirements. Common tools for requirements modeling include use cases, state diagrams, UI mockups, storyboards, and prototypes.
Define requirements modeling as representing the customers' needs and the problem domain using models to facilitate understanding between stakeholders.
Explain four roles of requirements modeling as:
1) Guiding elicitation by helping determine questions to ask and uncover hidden requirements
2) Providing progress measures by ensuring model completeness indicates elicitation is complete
3) Hel
This document provides an overview of software engineering processes and requirements management. It discusses project inception, requirements management, functional and non-functional requirements, use case modeling, and common use case patterns. The key topics covered are defining a project vision, eliciting stakeholder needs, detailing requirements, identifying actors and use cases, and common use case types like maintain, process, view, and generate. The goal is to introduce best practices for managing requirements and modeling system functionality using use cases.
This chapter discusses analyzing the business case for IT projects. It explains that strategic planning allows companies to develop mission statements and goals to guide projects. Systems projects are initiated to improve performance or reduce costs. The analyst evaluates feasibility of requests through a preliminary investigation involving fact-finding, scope definition, and analysis of costs and benefits before making recommendations to management.
Requirement engineering is the key phase in software development that determines what to build and outlines the quality of the final product. It involves discovering, modeling, documenting, and managing requirements through elicitation, analysis, specification, validation, and management processes. The goal is to develop a system requirements specification document that describes required system functionalities at varying levels of detail, from abstract statements to precise mathematical specifications.
This document provides an overview of interaction design and the process of establishing software requirements from user needs. It discusses:
1. What interaction design is, including the importance of involving users and taking a user-centered approach.
2. Practical issues in requirements gathering such as identifying users, understanding needs, generating alternatives, and choosing among alternatives.
3. Common techniques for gathering and analyzing user data to establish requirements, including interviews, questionnaires, observation, personas, task analysis, and hierarchical task analysis.
The document emphasizes the importance of understanding user needs through direct involvement and observing users' tasks in order to develop an accurate set of requirements for software.
Fyp list batch-2009 (project approval -rejected list)Mr SMAK
This document lists 29 final year projects for computer science students in the BS (CS) Batch of 2009 at Sir Syed University of Engineering & Technology in Karachi, Pakistan. It provides the roll numbers, names, project titles and assigned supervisors for each group of students. The remarks column notes whether project ideas were accepted, rejected or required revisions and additional consultation with supervisors.
The document contains 8 questions for an assignment on wireless application protocol. The questions cover topics such as comparing circuit-switched and packet-switched networks, frequency division multiplexing of voice channels, spread spectrum techniques, calculating bandwidth requirements for frequency division multiplexing with guard bands, advantages and disadvantages of bursty versus continuous data transmission in wireless systems, and disadvantages of wireless LANs compared to wired LANs. The last question discusses applications where the disadvantages of wireless LANs may be outweighed or override the advantages of wireless mobility.
Requirement engineering involves several key tasks: inception to establish project scope, elicitation to determine user needs, elaboration to refine requirements, negotiation to resolve conflicts, validation to verify requirements, and management of changing requirements. Effective elicitation uses techniques like interviews, scenarios, and ethnography to understand stakeholders and identify general, expected, and unexpected requirements while addressing problems of scope, understanding, volatility, and communication barriers. Requirements are further developed through analysis, modeling, prioritization, and specification documentation. Regular reviews validate that requirements define the desired system.
Requirement analysis and specification, software engineeringRupesh Vaishnav
The document discusses the key tasks in requirements engineering including inception, elicitation, elaboration, negotiation, specification, validation and management. It describes each task such as inception involves establishing a basic understanding of the problem and potential solutions through questioning stakeholders. Elicitation involves drawing requirements from stakeholders through techniques like meetings. Specification can take the form of documents, models, scenarios or prototypes. The requirements specification is an important output and should have certain characteristics like being unambiguous and traceable.
The document discusses various requirements elicitation techniques including interviews, questionnaires, meetings, prototyping, and analyzing existing documentation and hard data. It provides details on how to conduct interviews, distribute questionnaires, plan and run effective meetings, and sample and analyze hard data. The document also covers challenges with elicitation such as stakeholders having differing views, knowledge being distributed across sources, and tacit knowledge being difficult for stakeholders to articulate.
Requirement analysis and UML modelling in Software engineeringsnehalkulkarni74
Receptionist
Patient: Patient
Doctor: Doctor
- The vertical solid line represents the life of an
object.
- It runs from top to bottom.
Messages:-
- The arrow represents the message passing
between objects.
- The arrow head points to the receiver.
- The message name is written near arrow.
- Synchronous and asynchronous message
Receptionist
Patient
Doctor
makeAppointment()
checkAvailability()
scheduleAppointment()
confirmAppointment()
treatPatient()
billPatient()
- Sequence diagram shows the time sequence of
messages between objects.
- It emphasizes on
The document discusses the key tasks in requirements engineering: inception to initially understand user needs, elicitation to gather requirements, elaboration to further analyze and model requirements, negotiation to reconcile conflicts, specification to formally document requirements, validation to verify requirements quality, and management to track requirements throughout the project. The tasks involve collaborative activities like interviews and workshops to capture ambiguous and changing user needs and transform them into clear, consistent requirements that form the basis for subsequent software design and development.
The document discusses requirement gathering and analysis. It emphasizes the importance of requirements in project success and describes key tasks in requirements engineering including inception, elicitation, and elaboration. During inception, questions are asked to understand the problem, stakeholders, and desired solution. Elicitation involves discovering requirements through collaboration and techniques like use cases. Elaboration refines information through analysis modeling with elements like use cases, classes, and behaviors. The goal is a model that defines the functional, informational, and behavioral domains of the problem.
This document provides an overview of requirements documentation and modeling techniques. It discusses guidelines for writing requirements, such as using standard templates and natural language. Requirements documents establish what a system should do and provide validation. The document also discusses use case modeling and defines actors, flows of events, and extensions. It provides an example case study of an ATM banking system and describes associated use cases. Finally, it discusses principles of modeling like abstraction and partitioning, as well as modeling techniques like object-oriented and functional modeling.
Requirements engineering process in software engineeringPreeti Mishra
Requirement Engineering (RE) involves understanding what customers want through tasks like elicitation, negotiation, and specification. RE helps establish requirements that provide a solid foundation for design and construction. The key RE tasks are inception to understand the problem, elicitation by drawing out requirements, elaboration by creating analysis models, negotiation to agree on a realistic solution, specification to formally describe requirements, validation to check for errors or issues, and management of changing requirements. RE helps software engineers better understand problems to solve through participation with customers, managers, and end users.
1. Requirements analysis identifies customer needs, evaluates feasibility, and establishes system definitions and specifications. It bridges the gap between requirements engineering and system design.
2. Requirements analysis has several phases including problem recognition, evaluation and synthesis of possible solutions, help modeling, and writing definitions and specifications. It also considers management questions around effort, roles, challenges, and costs.
3. Requirements analysis determines functional requirements describing system behavior and inputs/outputs, as well as non-functional requirements around performance, interfaces, and user factors. It also validates that requirements are correct, consistent, complete, and testable.
Enterprise system implementation strategies and phasesJohn Cachat
Implementation Strategies
Full blown
Staggered or Phased
Implementation Phases
Project planning
Application exploration
System design
System testing
System activation – “go live”
johncachat@hotmail.com
www.peproso.com
The document discusses requirements engineering and provides an overview of the requirements engineering process. It describes requirements elicitation, analysis and negotiation, specification, system modeling, validation, and management as the key steps in requirements engineering. Requirements engineering aims to understand customer needs, analyze and negotiate requirements, unambiguously specify the solution, and manage requirements as the system is developed. It provides the best process currently available for ensuring a system properly meets customer needs and expectations.
Requirements engineering involves multiple tasks to ensure software engineers understand customer needs. It begins with inception to establish basic understanding, then elicitation gathers requirements from stakeholders. During elaboration, requirements are analyzed and modeled. Negotiation reconciles customer wants with feasibility. Requirements are then specified and validated before being managed throughout the project. The goals are to avoid building the wrong solution and establish a solid foundation for design.
Requirements modeling involves creating models during requirements analysis to understand current systems or business processes being automated and how users will interact with a new system. It helps with elicitation, validation, and communication of requirements. Common tools for requirements modeling include use cases, state diagrams, UI mockups, storyboards, and prototypes.
Define requirements modeling as representing the customers' needs and the problem domain using models to facilitate understanding between stakeholders.
Explain four roles of requirements modeling as:
1) Guiding elicitation by helping determine questions to ask and uncover hidden requirements
2) Providing progress measures by ensuring model completeness indicates elicitation is complete
3) Hel
This document provides an overview of software engineering processes and requirements management. It discusses project inception, requirements management, functional and non-functional requirements, use case modeling, and common use case patterns. The key topics covered are defining a project vision, eliciting stakeholder needs, detailing requirements, identifying actors and use cases, and common use case types like maintain, process, view, and generate. The goal is to introduce best practices for managing requirements and modeling system functionality using use cases.
This chapter discusses analyzing the business case for IT projects. It explains that strategic planning allows companies to develop mission statements and goals to guide projects. Systems projects are initiated to improve performance or reduce costs. The analyst evaluates feasibility of requests through a preliminary investigation involving fact-finding, scope definition, and analysis of costs and benefits before making recommendations to management.
Requirement engineering is the key phase in software development that determines what to build and outlines the quality of the final product. It involves discovering, modeling, documenting, and managing requirements through elicitation, analysis, specification, validation, and management processes. The goal is to develop a system requirements specification document that describes required system functionalities at varying levels of detail, from abstract statements to precise mathematical specifications.
This document provides an overview of interaction design and the process of establishing software requirements from user needs. It discusses:
1. What interaction design is, including the importance of involving users and taking a user-centered approach.
2. Practical issues in requirements gathering such as identifying users, understanding needs, generating alternatives, and choosing among alternatives.
3. Common techniques for gathering and analyzing user data to establish requirements, including interviews, questionnaires, observation, personas, task analysis, and hierarchical task analysis.
The document emphasizes the importance of understanding user needs through direct involvement and observing users' tasks in order to develop an accurate set of requirements for software.
Fyp list batch-2009 (project approval -rejected list)Mr SMAK
This document lists 29 final year projects for computer science students in the BS (CS) Batch of 2009 at Sir Syed University of Engineering & Technology in Karachi, Pakistan. It provides the roll numbers, names, project titles and assigned supervisors for each group of students. The remarks column notes whether project ideas were accepted, rejected or required revisions and additional consultation with supervisors.
The document contains 8 questions for an assignment on wireless application protocol. The questions cover topics such as comparing circuit-switched and packet-switched networks, frequency division multiplexing of voice channels, spread spectrum techniques, calculating bandwidth requirements for frequency division multiplexing with guard bands, advantages and disadvantages of bursty versus continuous data transmission in wireless systems, and disadvantages of wireless LANs compared to wired LANs. The last question discusses applications where the disadvantages of wireless LANs may be outweighed or override the advantages of wireless mobility.
This document provides an introduction to wireless communication and wireless application protocol (WAP). It discusses the benefits of wireless communication like freedom from wires and global coverage. It also covers some of the technical challenges in wireless communication like efficient use of spectrum, mobility support, and maintaining quality of service over unreliable links. It defines wireless communication and differentiates between wireless and mobile. It also describes various types of wireless technologies and their limitations.
The document summarizes the evolution of wireless networks from 1G to 4G. 1G networks used analog signals and standards like NMT, AMPS, and TACS. 2G introduced digital cellular and standards like GSM, CDMA, and IS-136. 2.5G provided upgrades like GPRS, EDGE, and CDMA2000 1x to support higher data rates. 3G networks supported broadband data and included W-CDMA and CDMA2000. 4G aims to provide fully integrated IP services with speeds over 100 Mbps.
Wireless Application Protocol (WAP) allows devices to access the Internet over wireless networks. There are three main categories of protocols for managing shared access to wireless networks: fixed assignment, demand assignment, and random assignment. Fixed assignment divides resources like frequency bands or time slots and allocates them exclusively. Demand assignment allocates resources only to nodes that need them. Random assignment does not preallocate resources and relies on collision detection and retransmission to manage shared access. Common protocols that fall under these categories include FDMA, TDMA, CDMA, ALOHA, and CSMA.
Wireless cellular networks divide geographic areas into cells served by base stations to allow for frequency reuse. As users travel between cells, their calls are handed off seamlessly. Cellular systems improve capacity by allocating unique frequency groups to each cell and reusing the same frequencies in cells sufficiently distant from each other. Larger networks connect multiple base stations and mobile switching centers to facilitate roaming and complete calls between mobile and fixed users.
This chapter discusses shared memory architecture and classifications of shared memory systems. It describes Uniform Memory Access (UMA), Non-Uniform Memory Access (NUMA), and Cache Only Memory Architecture (COMA). It also covers bus-based symmetric multiprocessors and basic cache coherency methods like write-through, write-back, write-invalidate, and write-update. Finally, it discusses snooping protocols for maintaining cache coherency, including write-invalidate and write-through, write-invalidate and write-back, write-once, write-update and partial write-through, and write-update and write-back.
This document discusses parallel computer memory architectures, including shared memory, distributed memory, and hybrid architectures. Shared memory architectures allow all processors to access a global address space, but lack scalability. Distributed memory assigns separate memory to each processor requiring explicit communication between tasks. Hybrid architectures combine shared memory within nodes and distributed memory between nodes for scalability.
This document discusses parallel computers and architectures. It defines parallel computers as collections of processing elements that cooperate and communicate to solve problems fast. It then examines questions about parallel computers, different types of parallelism, and opportunities for parallel computing in scientific and commercial applications. Finally, it discusses fundamental issues in parallel architectures, including naming, synchronization, latency and bandwidth, and different parallel frameworks and models like shared memory, message passing, and data parallelism.
This document provides an overview of parallel computing and parallel processing. It discusses:
1. The three types of concurrent events in parallel processing: parallel, simultaneous, and pipelined events.
2. The five fundamental factors for projecting computer performance: clock rate, cycles per instruction (CPI), execution time, million instructions per second (MIPS) rate, and throughput rate.
3. The four programmatic levels of parallel processing from highest to lowest: job/program level, task/procedure level, interinstruction level, and intrainstruction level.
This document discusses key concepts and terminologies related to parallel computing. It defines tasks, parallel tasks, serial and parallel execution. It also describes shared memory and distributed memory architectures as well as communications and synchronization between parallel tasks. Flynn's taxonomy is introduced which classifies parallel computers based on instruction and data streams as Single Instruction Single Data (SISD), Single Instruction Multiple Data (SIMD), Multiple Instruction Single Data (MISD), and Multiple Instruction Multiple Data (MIMD). Examples are provided for each classification.
This document provides an overview of a course on parallel computing for undergraduates. It outlines the theoretical and practical components of the course, including concepts that will be covered pre- and post-midterm. It also details assessment criteria, reading resources, and codes of conduct for the class.
This document discusses parallel computer memory architectures, including shared memory, distributed memory, and hybrid architectures. Shared memory architectures allow all processors to access a global address space, but lack scalability. Distributed memory assigns separate memory to each processor requiring explicit communication between tasks. Hybrid architectures combine shared memory within nodes and distributed memory between nodes for scalability.
This chapter discusses shared memory architecture and classifications of shared memory systems. It describes Uniform Memory Access (UMA), Non-Uniform Memory Access (NUMA), and Cache Only Memory Architecture (COMA). It also covers basic cache coherency methods like write-through, write-back, write-invalidate, and write-update. Finally, it discusses snooping protocols and cache coherency techniques used in shared memory systems.
Planning and scheduling involves fundamental engineering principles of first analyzing a problem and then developing a solution to meet defined needs. Key objectives include effective time management, optimizing the sequence of events, and defining necessary resources to ensure timely project progress. Gantt charts and PERT charts are common tools used to plan and schedule projects, with Gantt charts focusing more on calendar timelines and PERT charts emphasizing task dependencies. Function point analysis is an alternative technique for estimating the time and effort required for a software project based on identifying and weighting various user-requested application components and functionalities.
The document outlines a project plan structure covering 5 sections: 1) the software engineering process model and team roles, 2) risk analysis and management methods, 3) tasks and scheduling, 4) resources, costs and estimates, and 5) monitoring and management methods to track the project. A sample project plan is attached for reference.
The document outlines guidelines for formatting a final year project proposal. It includes sections for the project title, student names and roll numbers, main text formatting, headings formatting, figures and tables, and references. Guidelines are provided for font type, size, indentation, spacing, capitalization, and other formatting rules to maintain a consistent structure and appearance.
Students of the final year 2009 batch at Sir Syed University of Engineering & Technology are advised to submit 3 copies of their final year project proposals by March 03, 2012. The proposals can be in the areas of artificial intelligence, expert systems, communication & networking, 3D applications, mobile computing, or web applications. Proposals should be submitted to faculty members Naheed Khan, Shardha Nand, Asharaf Ali Waseem, or M. Kashif Khan. Projects must be completed by groups of 3 to 4 students, who will later defend their proposal to the final year project committee.
This document outlines 29 potential projects for university students to undertake with SUPARCO. The projects range from designing components of small satellites to analyzing aerodynamic properties to developing encryption systems. SUPARCO will provide funding and engineering support for selected projects. Students will gain hands-on experience working on challenges relevant to SUPARCO's objectives.
The document outlines the timeline and assessment policy for final year projects (FYP) for computer science students graduating in 2009 from Sir Syed University of Engineering & Technology in Karachi, Pakistan. Key dates are provided for submitting registration forms, proposals, requirements documents, design documents, progress reviews, reports and presentations. The assessment policy breaks down the project into components like requirements, design, presentations and reviews, allocating marks between supervisor and evaluation committee assessments with the total project marks equalling 200.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
4. Requirements engineering processes
• The processes used for RE vary widely
depending on the application domain, the
people involved and the organisation
developing the requirements
• However, there are a number of generic
activities common to all processes
– Requirements elicitation
– Requirements analysis
– Requirements validation
– Requirements management
5. The requirements engineering process
Feasibility Requirements
study elicitation and
analysis
Requirements
specification
Feasibility Requirements
report validation
System
models
U and system
ser
requirements
Requirements
document
6. Feasibility studies
• A feasibility study decides whether or not the
proposed system is worthwhile
• A short focused study that checks
– If the system contributes to organisational
objectives
– If the system can be engineered using current
technology and within budget
– If the system can be integrated with other
systems that are used
7. Feasibility study implementation
• Based on information assessment (what is required),
information collection and report writing
• Questions for people in the organisation
– What if the system wasn’t implemented?
– What are current process problems?
– How will the proposed system help?
– What will be the integration problems?
– Is new technology needed? What skills?
– What facilities must be supported by the proposed system?
8. Requirements Elicitation and analysis
• Sometimes called requirements elicitation or requirements
discovery.
• Involves technical staff working with customers to find out
about the application domain, the services that the system
should provide and the system’s operational constraints.
• May involve end-users, managers, engineers involved in
maintenance, domain experts, trade unions, etc. These are
called stakeholders.
9. Requirements Elicitation Techniques
• Interviewing and questionnaires.
• Brainstorming and idea reduction.
• Storyboarding.
• Role Playing.
• Requirements workshops.
• Prototyping.
• User Stories.
• Viewpoint-oriented elicitation
9
10. Technique: Interviewing
• Simple direct technique
• Context-free questions about what system
needs to do for the users
• Convergence on some common needs will
initiate a “requirements repository”
• A questionnaire is no substitute for an
interview, but may precede or follow
interviews
10
11. Interview:
Context-free questions
• Goal is to prevent prejudicing the user’s response to
the questions
• Examples:
– Who is the customer?
– Who is the user?
– Who is the user’s customer?
– Are their needs different?
– Where else can a solution to this problem be found?
• After context-free questions are asked, suggested
solutions can be explored
11
12. Technique: Brainstorming
• Brainstorming involves both idea generation and
idea reduction
• The most creative, innovative ideas often result from
combining seemingly unrelated ideas
• Various voting techniques may be used to prioritize
the ideas created
• Although live brainstorming is preferred, web-based
brainstorming may be a viable alternative
12
13. Rules for Brainstorming
• Do not allow criticism or debate
• Let your imagination soar
• Generate as many ideas as possible
• Mutate and combine ideas
• Only then do Idea Reduction
– Prune ideas that are not worthy of further discussion
– Group similar ideas into one super topic
• Prioritize the remaining ideas
13
14. Technique: Storyboarding
• Scripted walkthrough of system activities and/
or screen mockups
• Identify the players, explain what happens to
them, and describes how it happens
• Make the storyboard sketchy and easy to
modify
14
15. Technique: Role Playing
• Role playing allows developers to experience
the user’s world from the user’s perspective
• Live storyboard or unscripted walkthrough
• Generate system activities and/or screen
mockups as you go along
15
16. Technique:
Requirements Workshop
• Perhaps the most powerful technique for
eliciting requirements
• Gather all key stakeholders together for a
short but intensely focused period
• Use an outside facilitator experienced in
requirements management
• May combine interviewing, brainstorming,
storyboards, role playing
16
17. Technique: Prototyping
• Partial implementation of a software system,
built to help developers, users and customers
better understand system requirements
• Focus on the “fuzzy” requirements: poorly
defined and/or poorly understood
17
18. User Stories
• Written by the customers (or end-users) as
things that the system needs to do for them
• About 3 sentences in the customer’s
terminology, without technical detail
• Written on index cards (!)
• May be augmented by samples (e.g.,
formatted report)
• Prioritize (high, medium, low)
18
19. Example Story Card
111 Ins truc tor View
T inst uct v foragiv cour incl t
he r or iew en se udes he
cour number na a semest ; abuton t edit
se , me nd er t o
t int oduct abuton t designae l ayr v
he r ion; t o t ibr r eser es;
a abuton t a ustsetings fort cour
nd t o dj t he se.
Ot w t instuct v is t sa a
her ise he r or iew he me s
t st v .
he udent iew
Priority High
19
20. Continuing Example
222 S tudent View
T st v foragiv cour incl t
he udent iew en se udes he
cour number na a semest ; gener lcour
se , me nd er a se
infor t a inst uct infor t
maion; nd r or maion.
T e ae butons t sel intoduct discussion,
her r t o ect r ion,
boad, cl ss e- il dict r not d a hel
r a ma , ionay, epa nd p.
Priority High
20
21. Continuing Example
123 Ins truc tor vs . S tudent View
W a instuct sel s one oft cour
hen n r or ect he ses
he/ is t ching, t instuct v is show
she ea he r or iew n.
T instuct v shoul incl abuton t
he r or iew d ude t o
showt st v , a t t tspecia st
he udent iew nd hen ha l udent
v shoul incl abuton t sw ch ba t t
iew d ude t o it ck o he
inst uct v
r or iew
Priority Medium
21
22. Continuing Example
321 Login
T useris pr ed t ent uni a pa or
he ompt o er nd ssw d
Ift uni a pa or mach daa se,
he nd ssw d t t ba
t useris show t defa tscr w h his/
he n he ul een it her
l ofcurentcour
ist r ses
Priority High
22
23. Viewpoint-oriented elicitation
• Stakeholders represent different ways of
looking at a problem or problem viewpoints.
• This multi-perspective analysis is important as
there is no single correct way to analyse
system requirements
24. Banking ATM system
• The example used here is an auto-teller system which
provides some automated banking services.
• I use a very simplified system which offers some services
to customers of the bank who own the system and a
narrower range of services to other customers.
• Services include cash withdrawal, message passing (send a
message to request a service), ordering a statement and
transferring funds.
25. Autoteller viewpoints
• Bank customers
• Representatives of other banks
• Hardware and software maintenance engineers
• Marketing department
• Bank managers and counter staff
• Database administrators and security staff
• Communications engineers
• Personnel department
26. The VORD method
Viewpoint Viewpoint Viewpoint Viewpoint
identification structuring documentation system mapping
27. VORD process model
• Viewpoint identification
– Discover viewpoints which receive system services and identify the
services provided to each viewpoint
• Viewpoint structuring
– Group related viewpoints into a hierarchy. Common services are
provided at higher-levels in the hierarchy
• Viewpoint documentation
– Refine the description of the identified viewpoints and services
• Viewpoint-system mapping
– Transform the analysis to an object-oriented design
28. VORD Standard Forms
Viewpoint template Service template
Reference: The viewpoint name. Reference: The service name.
Attributes: Attributes providing Rationale: Reason why the service is
viewpoint information. provided.
Events: A reference to a set of event Specification: Reference to a list of service
scenarios describing how specifications. These may
the system reacts to be expressed in different
viewpoint events. notations.
Services A reference to a set of Viewpoints: List of viewpoint names
service descriptions. receiving the service.
Sub-VPs: The names of sub- Non-functional Reference to a set of non -
viewpoints. requirements: functional requirements
which constrain the service.
Provider: Reference to a list of system
objects which provide the
service.
29. Viewpoint identification
Query Get Customer Cash Transaction
balance transactions database withdrawal log
Manager Card Remote
Machine Order
returning software
supplies cheques
upgrade
Account Message Software
information log size Bank Invalid
User teller user
interface System cost Foreign
customer Printe
r Security
Account Stolen Order Hardware
card statement Card
holder maintenance retention
Message
passing
Remote Update Funds Card
Reliability account transfer
diagnostics validation
30. Viewpoint service information
ACCOUNT FOREIGN BANK
HOLDER CUSTOMER TELLER
Service list Service list Service list
Withdraw cash Withdraw cash Run diagnostics
Query balance Query balance Add cash
Or der cheques Add paper
Send message Send message
Transaction list
Or der statement
Transfer funds
31. Viewpoint data/control
ACCOUNT
HOLDER Control input Da ta input
Start transaction Card details
Cancel transaction PIN
End transaction Am ount required
Select service Message
32. Viewpoint hierarchy
All VPs
Services
Query balance
Withdraw cash Customer Bank staff
Services Account Foreign
Teller Manager Engineer
holder customer
Order cheques
Send message
Transaction list
Order statement
Transfer funds
33. Customer/cash withdrawal templates
Reference: Customer Reference: Cash withdrawal
Attributes: Account number Rationale: To improve customer service
PIN and reduce paperwork
Start transaction
Events: Select service Specification: Users choose this service by
Cancel pressing the cash withdrawal
transaction button. They then enter the
End transaction amount required. This is
confirmed and, if funds allow,
Services: Cash withdrawal the balance is delivered.
Balance enquiry
VPs: Customer
Sub-VPs: Account holder
Foreign Non-funct. Deliver cash within 1 minute
customer requirements: of amount being confirmed
Provider: Filled in later
34. Scenarios
• Scenarios are descriptions of how a system is
used in practice
• They are helpful in requirements elicitation as
people can relate to these more readily than
abstract statement of what they require from
a system
• Scenarios are particularly useful for adding
detail to an outline requirements description
35. Scenario descriptions
• System state at the beginning of the scenario
• Normal flow of events in the scenario
• What can go wrong and how this is handled
• Other concurrent activities
• System state on completion of the scenario
36. Event scenarios
• Event scenarios may be used to describe how a system
responds to the occurrence of some particular event such as
‘start transaction’
• VORD includes a diagrammatic convention for event
scenarios.
– Data provided and delivered
– Control information
– Exception processing
– The next expected event
37. Event scenario - start transaction
Card present
Valid card
Card User OK
Request PIN
PIN
Account Validate user Account
number number Select
PIN service
Timeout
Return card Incorrect PIN
Re-enter PIN
Invalid card
Return card
Incorrect PIN
Stolen card Return card
Retain card
38. Notation for data and control analysis
• Ellipses. data provided from or delivered to a
viewpoint.
• Control information enters and leaves at the
top of each box.
• Data leaves from the right of each box.
• Exceptions are shown at the bottom of each
box.
• Name of next event is in box with thick edges
39. Exception description
• Most methods do not include facilities for
describing exceptions
• In this example, exceptions are
– Timeout. Customer fails to enter a PIN within the
allowed time limit
– Invalid card. The card is not recognised and is
returned
– Stolen card. The card has been registered as
stolen and is retained by the machine
40. The requirements analysis process
Requirements
definition and
Requirem ents specification
validati
on
Domain
Prioritization
understanding
Process
entry
Requirements Conflict
collection resolution
Classification
41. System models
• Different models may be produced during the requirements
analysis activity.
• Requirements analysis may involve three structuring activities
which result in these different models.
– Partitioning. Identifies the structural (part-of) relationships between
entities.
– Abstraction. Identifies generalities among entities.
– Projection. Identifies different ways of looking at a problem.
42. Requirements Verification
• Concerned with demonstrating that the
requirements define the system that the
customer really wants
• Requirements error costs are high so
validation is very important
– Fixing a requirements error after delivery may
cost up to 100 times the cost of fixing an
implementation error
43. Requirements checking
• Validity. Does the system provide the functions which best
support the customer’s needs?
• Consistency. Are there any requirements conflicts?
• Completeness. Are all functions required by the customer
included?
• Realism. Can the requirements be implemented given
available budget and technology
44. Requirements management
• Requirements management is the process of managing
changing requirements during the requirements engineering
process and system development
• Requirements are inevitably incomplete and inconsistent
– New requirements emerge during the process as business needs
change and a better understanding of the system is developed
– Different viewpoints have different requirements and these are often
contradictory
45. Problems of requirements analysis
• Stakeholders don’t know what they really want
• Stakeholders express requirements in their own terms
• Different stakeholders may have conflicting requirements
• Organisational and political factors may influence the system
requirements
• The requirements change during the analysis process. New
stakeholders may emerge and the business environment
change
46. Key points
• The requirements engineering process
includes a feasibility study, requirements
elicitation and analysis, requirements
specification and requirements management
• Requirements analysis is iterative involving
domain understanding, requirements
collection, classification, structuring,
prioritisation and validation
• Systems have multiple stakeholders with
different requirements
47. Key points
• Social and organisation factors influence
system requirements
• Requirements validation is concerned with
checks for validity, consistency, completeness,
realism and verifiability
• Business changes inevitably lead to changing
requirements
• Requirements management includes planning
and change management
Editor's Notes
Examples of context-free questions?
Banning criticism and banning debate is not just an attempt to “be nice”. It is necessary to not squelch creative thinking.