This document discusses traceability beyond source code, which is an elusive target. It provides an overview and examples from industrial research projects on requirements-requirements, requirements-design, requirements-test cases traceability. The examples show challenges in capturing changes precisely and change rationales. Automated traceability approaches can reduce effort but may lack accuracy required for certification. Traceability is important for certification, change management and economic decision making.
A recap of the PCTEL webinar hosted by NEDAS on December 7, 2017Ilissa Miller
The NEDAS Live Seminar Series: Assuring Critical Communications for Public Safety: Supporting the Effort to Verify Indoor Network Performance was held on December 7, 2017.
The event presented by David Adams, Senior Product Manager, PCTEL RF Solutions and Jason Chambers, CSM & CPM Service Manager – SeaTac, Day Wireless Systems.
The program provided an overview of the various requirements for assuring indoor coverage and performance including:
-The leading organizations that provide specifications for network performance and testing
-How the various jurisdictions are adopting and adapting these for their own use
-What are the requirements and various ways they are applied
-Key challenges to putting requirements in place and enforcing them
-Effective solutions to overcome these challenges, including live demonstration
-Case studies of successfully assuring performance
This seminar was sponsored by PCTEL and DAY Wireless Systems.
For more information on NEDAS programs, events and sponsorship opportunities, visit www.nedas.com
A recap of the PCTEL webinar hosted by NEDAS on December 7, 2017Ilissa Miller
The NEDAS Live Seminar Series: Assuring Critical Communications for Public Safety: Supporting the Effort to Verify Indoor Network Performance was held on December 7, 2017.
The event presented by David Adams, Senior Product Manager, PCTEL RF Solutions and Jason Chambers, CSM & CPM Service Manager – SeaTac, Day Wireless Systems.
The program provided an overview of the various requirements for assuring indoor coverage and performance including:
-The leading organizations that provide specifications for network performance and testing
-How the various jurisdictions are adopting and adapting these for their own use
-What are the requirements and various ways they are applied
-Key challenges to putting requirements in place and enforcing them
-Effective solutions to overcome these challenges, including live demonstration
-Case studies of successfully assuring performance
This seminar was sponsored by PCTEL and DAY Wireless Systems.
For more information on NEDAS programs, events and sponsorship opportunities, visit www.nedas.com
During the Agile Austria Conference 2017, Graz, Austria
Speaker: Fariz Saracevic
This session will examine how requirements management can bring significant value to agile development teams.
Agile Development – Why requirements matter by Fariz SaracevicAgile ME
The clear benefits of agile development is a better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes.
So how does requirements management fit in an agile world? This meetup will take a look at requirements management and how it can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
In this presentation I will speak how are the SRE and DevOps, what is a reliability. Also about the reliability approach in Competitive Gaming in Wargaming and show a few cases.
During the Agile Austria Conference 2017, Graz, Austria
Speaker: Fariz Saracevic
This session will examine how requirements management can bring significant value to agile development teams.
Agile Development – Why requirements matter by Fariz SaracevicAgile ME
The clear benefits of agile development is a better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes.
So how does requirements management fit in an agile world? This meetup will take a look at requirements management and how it can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
In this presentation I will speak how are the SRE and DevOps, what is a reliability. Also about the reliability approach in Competitive Gaming in Wargaming and show a few cases.
Analyst360 is one of the largest and most forward-thinking learning services providers in the world,
delivering more than 10 million hours of training globally each year.
Analyst360 is one of the largest and most forward-thinking learning services providers in the world,
delivering more than 10 million hours of training globally each year.
Similar to Traceability Beyond Source Code: An Elusive Target? (20)
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Looking for a reliable mobile app development company in Noida? Look no further than Drona Infotech. We specialize in creating customized apps for your business needs.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
Traceability Beyond Source Code: An Elusive Target?
1. .lusoftware verification & validation
VVS
Traceability Beyond Source Code:
An Elusive Target?
Lionel Briand
Interdisciplinary Centre for Security, Reliability and Trust (SnT)
University of Luxembourg
SST, Florence - May 17, 2015
4. Motivations
• Traceability research is source-code-centric
• Certification (safety, privacy …)
• Change management: Impact analysis, design rationale,
regression testing …
• Change management is a key challenge to certification
• System-level activity
4
5. Challenges
• Establishing and maintaining traces is typically expensive
• Automation, in most cases, does not provide the level of accuracy
required
• The benefits of exploiting traces are still unclear in many contexts
• Highly contextualized: A great deal of variation in development
contexts entails a great deal of variation in traceability solutions
• Targeted analysis of traces drives traceability solutions
5
6. Requirements
• Hundreds or thousands of them
• Higher-level requirements (usually from customers)
decomposed into lower-level ones (analysts)
• Some more critical than others
• Constantly changing and evolving: A stronger argument for
the economic benefits of traceability
6
7. Modeling
• In many application domains where traceability is required,
system and software modeling is a rising practice
• Provisions in standards lead to modeling
• IEC 61508 (meta-standard), DO-178B (Avionics), EN50129
(Railways), ISO 26262 (Automotive)
• UML, SysML, Simulink, …
7
8. Economic Decision
• Not just about trace “accuracy” …
• Economic trade-off
• Cost: Establishing and maintaining traces
• Benefit: More accurate decisions, decrease in human effort
• Decision science
• Makes it hard to study, out of context, as it determines effort and
benefits
8
10. Traceability at a Glance
10
Archi. & Design
Requirements
Test Cases
Regulations
Source Code
Bulk of Research
11. Requirements-Source Code
• Natural language
• Hundreds or thousands of traces
• Information Retrieval & Natural Language Processing
• Coding conventions
• Level of granularity?
• Minimum accuracy for ensuring practicality? Few human studies …
11
Requirements
Source Code
12. Traceability at a Glance
12
Archi. & Design
Requirements
Test Cases
Regulations
Source Code
Change Impact
13. Requirements-Requirements
• Mostly natural language
• Sometimes structured (template)
• Hundreds of traces
• Domain terminology, concepts, and their relationships are key
to discovering traces among requirements
• Syntactic and semantic similarity measures
13
Requirements
14. Traceability at a Glance
14
Archi. & Design
Requirements
Test Cases
Regulations
Source Code
Compliance with
laws, regulations,
standards
15. Standards-Requirements
• Many standards, laws, and regulations
• They must be interpreted in context
• Compliance must be ensured
• Critical systems: Risks and hazards
• Requirements as mitigations
• Subjectivity, residual risks
15
Requirements
Regulations
16. Traceability at a Glance
16
Archi. & Design
Requirements
Test Cases
Regulations
Source Code
Certification, change
management
17. Requirements-Design
• Capture the rationale of design decisions
• Support evolution, avoid violating essential design decisions
• Useful for impact analysis based on traces
• What is a rationale? Level of granularity?
• Design representation?
17
Archi. & Design
Requirements
18. Traceability at a Glance
18
Archi. & Design
Requirements
Test Cases
Regulations
Source Code
Certification
Regression
testing
19. Requirements-Test Cases
• Requirements “coverage” required by standards
• Normally many test cases per requirement
• Thousands of traces
• Regression testing
• Precise impact analysis requires explicit test
strategy and rationale
• How were test cases derived from requirements?
• Representation of requirements matters
19
Requirements
Test Cases
20. Traceability at a Glance
20
Archi. & Design
Requirements
Test Cases
Regulations
Source Code
Impact analysis,
design conformance
21. Design-Source Code
• Ideally, code should be generated from
design models, e.g., controllers with
Simulink
• This would lead to “free” traceability
• In practice, not always that simple …
21
Archi. & Design
Source Code
24. Example
• R1: The mission operation controller shall transmit satellite
status reports to the user help desk.
• R2: The satellite management system shall provide users with
the ability to transfer maintenance and service plans to the
user help desk.
• R3: The mission operation controller shall transmit any
detected anomalies with the user help desk.
24
25. Example
• R1: The mission operation controller shall transmit satellite
status reports to the user help desk document repository.
• R2: The satellite management system shall provide users with
the ability to transfer maintenance and service plans to the
user help desk.
• R3: The mission operation controller shall transmit any
detected anomalies with the user help desk.
25
26. Challenge#1 -
Capture Changes Precisely
• R1: The mission operation controller shall transmit satellite
status reports to the user help desk document repository.
• R2: The satellite management system shall provide users with
the ability to transfer maintenance and service plans to the
user help desk.
• R3: The mission operation controller shall transmit any
detected anomalies with the user help desk.
26
27. Challenge#2 -"
Capture Change Rationale
• R1: The mission operation controller shall transmit satellite
status reports to the user help desk document repository.
• R2: The satellite management system shall provide users with
the ability to transfer maintenance and service plans to the
user help desk.
• R3: The mission operation controller shall transmit any
detected anomalies with the user help desk.
27
28. • R1: The mission operation controller shall transmit satellite status reports to the user help desk
document repository.
• R2: The satellite management system shall provide users with the ability to transfer
maintenance and service plans to the user help desk.
• R3: The mission operation controller shall transmit any detected anomalies with the user help
desk.
28
Challenge#2 -"
Change Rationale
Rationales:
R1: We want to globally rename “user help desk”
R2: Avoid communication between “mission
operation controller” and “user help desk”
R3: We no longer want to “transmit satellite
status reports” to “user help desk” but instead to
“user document repository”
29. Solution Characteristics
• Accounts for the phrasal structure of requirements
29
The mission operation controller shall transmit satellite
status reports to the user help desk document repository.
user help desk, Deleted
user document repository, Added
• Account for semantically-related phrases that are not exact
matches and close syntactic variations
31. RQ1 - Which similarity measures
are best suited to our approach?
• Experimented with 10
syntactic, 9 semantic
measures, and all their
pairwise combinations
(109 combinations)
31
32. RQ2 - How should analysts use the sorted
requirements list produced by our approach?
32
33. RQ3 - How effective is our
approach?
• Extra requirements traversed
• Case-A between 1%-7%
• Case-B between 6%-8%
except one case
• Number of impacted
requirements missed: "
1 out of 106
33
35. Context
• Context: Certification of safety-critical monitoring
applications (fire and gas detection and emergency and
process shutdown) in oil & gas industry
• Certification: Assessing and discussing software
requirements, design/architecture and implementation
documents
• Typically, many meetings taking place over 6 to 18 months
35
36. Observations
• Analyzed 66 distinct certification issues:
• Issues collected through observing certification meetings at different
suppliers of maritime and energy systems
• Meetings focused on requirements, architecture, and design documents
36
Expensive"
to fix
37. Research Objective
• Developing a model-based traceability methodology
• Generate a sound and yet minimal design slice for a given
safety requirement, to support safety inspections
• Slices constructed based on traceability links established
between safety requirements and design
37
Design Slice
38. Research Approach
38
Traceability Methodology
to relate safety
requirements to design
Slicing Algorithm
to extract a design slice
relevant to a given
safety requirement
Model Driven Engineering (MDE) is the enabler
39. Modeling
• System Modeling Language (SysML)
• A subset of UML extended with system engineering
diagrams
• A standard for system engineering
• Preliminary support for requirement analysis and built-in
traceability mechanism
39
40. Is SysML enough?
• Do we have proper guidelines for establishing traceability links between
requirements and design?
• SysML is only a notation and needs a methodology
• Are the built-in SysML traceability links capable of addressing
certification traceability issues?
• New traceability links: Source and assumptions of sys. safety reqs.
• We specialized the semantics of existing ones: Refine, decompose,
derive …
• Explicit and implicit links
40
46. Requirement to Design
Traceability
46
• Mappings are documenting the
design rationale!
• Implications relations between
phrases and block states and
operations
50. Slices
50
Fig. 11. The block and activity slices for the requirement in Fig. 8 extracted from the SysML design diagrams in Fig. 6.
S. Nejati et al. / Information and Software Technology 54 (2012) 569–590
51. Slicing Algorithm
• If a requirement holds over a design slice, it should also
hold over the original design (soundness)
• Proven analytically (formal proof)
• If a requirement holds over the original design, then the
design slice created for that requirement should
conclusively satisfy that requirement (completeness)
• Evaluated empirically (Case studies and experiments)
51
53. Case Study: SW/HW Interfaces
53
Interface
Control Modules
Hardware
Communicates commands and
data between control modules
and hardware
Goal: Practical guidelines to:
(1) Capture the concurrent design of
interfaces
(2) Reduce the number and criticality of
certification issues related to interfaces
54. Results
• Created design models with traceability to requirements
• One context diagram (BDD), One architecture diagram (IBD), One detailed
structure diagram (BDD), One activity decomposition diagram (BDD), One
overall activity diagram, 19 detailed activity diagrams
• Created 65 traceability links for 30 safety-relevant requirements
• Modeling effort was approximately 40 person-hours
• Model Slicing
• Extracted 34 block slices and 31 activity slices
• Slicing reduced the number of block operations by 70% and the number of
activity nodes by 50%
54
55. Controlled Experiment
• Question: Do safety slices help find design issues?
• Conducted in a laboratory setting with master students
• Overall design
• Seeded faults into the design
• Incorrect behavior and structure
• Divided the subjects into two groups
• One group gets the design without slices
• One group gets the design plus the relevant slices
55
56. Experiment Results
• Slices show strong benefits in terms of:
• Increasing the correctness of inspection decisions
• Decreasing the proportion of uncertain decisions
• Reducing the effort of inspections
56
57. Recent Similar Experiment
• Do developers benefit from requirements traceability when evolving
and maintaining a software system? Patrick Mäder, Alexander
Egyed
• Empirical Software Engineering (Springer), 2015
• Focus on program comprehension and maintenance
• Tasks with and without traceability
• Traceability led to 24% speed improvement and 50% better
correctness
57
59. Context
• Context: Automotive, sensor systems
• Traceability between system requirements and test cases
• Mandatory when software must undergo a certification process
(e.g. ISO 26262)
• Customers require such compliance
• Use-case-centric development
59
60. Automated Test Generation
• Restricted use case specifications: Structure, templates, restricted
natural language (RUCM)
• Domain modeling
• Constraints
• Automation combines Natural Language Processing and constraint
solving
• Automated test generation comes with traceability between use
case flows and system test cases
60
61. 5
Specify Constraints
OCL constraints
Errors.size() = 0
ERRORS ARE ABSENT
TEMPERATURE IS LOW
STATUS IS VALID
Status <> null
t > 0 and t < 50
Identify Constraints
4
Generate
Abstract
Test Cases
6
Generate
Platform
Specific
Test Cases
7
Evaluate
Completeness
3
Elicit Use Cases
1
Model the Domain
2
Domain Model
Missing Entities
List of Constraint descriptions
Abstract Test Cases
THE ACTOR SEND
THE SYSTEM VALI
THE SYSTEM DIS
THE ACTOR SEND
THE ACTOR SEND
THE SYSTEM VALI
THE SYSTEM DIS
THE ACTOR SEND
THE ACTOR SEND
THE SYSTEM VALI
THE SYSTEM DIS
THE ACTOR SEND
RUCM
Use Cases
Platform Test
Cases
Mapping Table
62. Case Study Results
• Rewrote 6 use case specifications of BodySense
• 48 constraints to specify
Effectiveness
Applicability
• Automatically generated test cases for 6 use cases
• Specific test strategy (Rationale)
• Approach covers more scenarios than manual testing: 100
versus 86
• Automated testing covers alternative flows not covered by
manual testing
63. Discussion
• Modeling effort reasonable after initial training
• Main challenge is writing OCL constraints.
• Test generation time took about 12 min per test cases, mostly
due to constraint solving
• Engineers miss important test scenarios because
• Path analysis across multiple use case specifications is
difficult
• Regular use case specifications are less precise that RUCM
65. Solution Overview
65
Test cases
Actual
software
system
Traces to
Traces to
Analyzable
interpretation
of the law
Generates
Results match?
Impact of legal
changes
Simulates
66. Example
66
Art. 105bis […]The commuting
expenses deduction (FD) is
defined as a function over the
distance between the principal
town of the municipality on
whose territory the taxpayer's
home is located and the place of
taxpayer’s work. The distance is
measured in units of distance
expressing the kilometric
distance between [principal]
towns. A ministerial regulation
provides these distances.
Interpretation + Traces
67. Example
67
The amount of the deduction is
calculated as follows:
If the distance exceeds 4 units but is
less than 30 units, the deduction is €
99 per unit of distance.
The first 4 units does not trigger any
deduction and the deduction for a
distance exceeding 30 units is limited
to € 2,574.
Interpretation + Traces
68. Discussion
• We addressed the gap between legal experts and IT
specialists
• Models understandable by both legal experts and IT
specialists
• Modeling effort was considered reasonable given the life span
of such eGovernment systems
• Traceability to the law was considered a significant asset
given frequent and complex changes in the law
68
70. Conclusions
• From an economic standpoint,
• the accuracy of trace recovery techniques cannot be interpreted out of
context
• what traceability information to capture is a trade-off
• benefits depend on context
• More human studies are required to assess cost-benefits
• Design of such studies is not easy: baseline of comparison, comparable
tasks, training, comparable skills …
70
71. Conclusions
• Change impact analysis among requirements was surprisingly accurate
• Change rationale needed to be captured
• But this is expected to depend on requirements writing practice, e.g.,
precision and consistency
• Accurate inter-requirements traces may require capturing tacit
dependencies between domain concepts, e.g., domain model
• What type of domain model do we need? Ontologies?
• Can accuracy be improved through the use of NL templates?
71
72. Conclusions
• Requirements-design traces require a precise design methodology,
including practical mechanisms to capture design rationale and link it to
requirements
• Documenting design rationale cannot be automated, but can be facilitated
• Questions, in each new context:
• What is the right Modeling methodology?
• What is the right trace granularity?
• What information do traces need to carry?
72
76. Natural Language Requirements
• [RE 2015] C. Arora et al., Change impact analysis for natural language requirements: An NLP
approach
• [TSE 2015] C. Arora et al., Automated Checking of Conformance to Requirements Templates using
Natural Language Processing
• [ESEM 2014] C. Arora et al., Improving requirements glossary construction via clustering
• [ESEM 2013] C. Arora et al., Automatic checking of conformance to requirements boilerplates via
text chunking
Requirements-Driven Testing
• [ISSTA 2015] C. Wang et al., Automatic Generation of System Test Cases from Use Case
Specifications
76
77. SysML Traceability and Safety Analysis
• [TOSEM 2014] L. Briand et al., Traceability and SysML design slices to support safety inspections:
A controlled experiment.
• [IST 2012] S. Nejati et al.A SysML-Based Approach to Traceability Management and Design Slicing
in Support of Safety Certification: Framework, Tool Support, and Case Studies
• [HASE 2011] M. Sabetzadeh et al., Using SysML for Modeling of Safety--Critical Software--
Hardware Interfaces: Guidelines and Industry Experience
• [FSE 2011] D. Falessi et al., SafeSlice: a model slicing and design safety inspection tool for SysML.
Legal Modeling and Analysis
• [MODELS 2014] G. Soltana et al., “ UML for Modeling Procedural Legal Rule”
• [RE 2014] M. Adedjouma et al., “Automated Detection and Resolution of Legal Cross References”
77
78. .lusoftware verification & validation
VVS
Traceability Beyond Source Code:
An Elusive Target?
Lionel Briand
Interdisciplinary Centre for Security, Reliability and Trust (SnT)
University of Luxembourg
SST, Florence - May 17, 2015