2017 IEEE 25th International Requirements Engineering Conference (RE)最新文献

筛选
英文 中文
Optimized Functionality for Super Mobile Apps 为超级移动应用程序优化功能
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.72
Maleknaz Nayebi, G. Ruhe
{"title":"Optimized Functionality for Super Mobile Apps","authors":"Maleknaz Nayebi, G. Ruhe","doi":"10.1109/RE.2017.72","DOIUrl":"https://doi.org/10.1109/RE.2017.72","url":null,"abstract":"Functionality of software products often does not match user needs and expectations. The closed set-up of systems and information is replaced by wide access to data of users and competitor products. This shift offers completely new opportunities to approach requirements elicitation and subsequent planning of software functionality. This is, in particular true for app store markets. App stores are markets for many small sized software products which provide an open platform for users to provide feedback on using apps. Moreover, the functionality and status of similar software products can be retrieved. While this is a competitive risk, it is at the same time an opportunity.In this paper, we envision a new release planning approach that leverages the new opportunities for decision making. We propose a new model using bi-criterion integer programming. We make suggestions for optimized super app functionality that are based on two key aspects: (i) the estimated value of features, and (ii) the cohesiveness between newly added features and cohesiveness between existing and the features to be added. The information on these attributes comes from reasoning on feature composition of existing similar apps. The approach is applicable to the development of new product releases as well as to the creation of completely new apps. We illustrate the applicability of our model by a small example and outline directions for future research.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"36 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Gamifying Collaborative Prioritization: Does Pointsification Work? 游戏化协作优先级:点化是否有效?
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.66
Fitsum Meshesha Kifetew, Denisse Muñante Arzapalo, A. Perini, A. Susi, A. Siena, P. Busetta, Danilo Valerio
{"title":"Gamifying Collaborative Prioritization: Does Pointsification Work?","authors":"Fitsum Meshesha Kifetew, Denisse Muñante Arzapalo, A. Perini, A. Susi, A. Siena, P. Busetta, Danilo Valerio","doi":"10.1109/RE.2017.66","DOIUrl":"https://doi.org/10.1109/RE.2017.66","url":null,"abstract":"Gamification has been applied in software engineering contexts, and more recently in requirements engineering with the purpose of improving the motivation and engagement of people performing specific engineering tasks. But often an objective evaluation that the resulting gamified tasks successfully meet the intended goal is missing. On the other hand, current practices in designing gamified processes seem to rest on a try, test and learn approach, rather than on first principles design methods. Thus empirical evaluation should play an even more important role.We combined gamification and automated reasoning techniques to support collaborative requirements prioritization in software evolution. A first prototype has been evaluated in the context of three industrial use cases. To further investigate the impact of specific game elements, namely point-based elements, we performed a quasi-experiment comparing two versions of the tool, with and without pointsification. We present the results from these two empirical evaluations, and discuss lessons learned.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114324184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
SAFE: A Simple Approach for Feature Extraction from App Descriptions and App Reviews SAFE:从应用描述和应用评论中提取特征的简单方法
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.71
Timo Johann, Christoph Stanik, B. AlirezaM.Alizadeh, W. Maalej
{"title":"SAFE: A Simple Approach for Feature Extraction from App Descriptions and App Reviews","authors":"Timo Johann, Christoph Stanik, B. AlirezaM.Alizadeh, W. Maalej","doi":"10.1109/RE.2017.71","DOIUrl":"https://doi.org/10.1109/RE.2017.71","url":null,"abstract":"A main advantage of app stores is that they aggregate important information created by both developers and users. In the app store product pages, developers usually describe and maintain the features of their apps. In the app reviews, users comment these features. Recent studies focused on mining app features either as described by developers or as reviewed by users. However, extracting and matching the features from the app descriptions and the reviews is essential to bear the app store advantages, e.g. allowing analysts to identify which app features are actually being reviewed and which are not. In this paper, we propose SAFE, a novel uniform approach to extract app features from the single app pages, the single reviews and to match them. We manually build 18 part-of-speech patterns and 5 sentence patterns that are frequently used in text referring to app features. We then apply these patterns with several text pre-and post-processing steps. A major advantage of our approach is that it does not require large training and configuration data. To evaluate its accuracy, we manually extracted the features mentioned in the pages and reviews of 10 apps. The extraction precision and recall outperformed two state-of-the-art approaches. For well-maintained app pages such as for Google Drive our approach has a precision of 87% and on average 56% for 10 evaluated apps. SAFE also matches 87% of the features extracted from user reviews to those extracted from the app descriptions.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114621831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Awareness Driven Software Reengineering 意识驱动的软件再造
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.52
A. Moura
{"title":"Awareness Driven Software Reengineering","authors":"A. Moura","doi":"10.1109/RE.2017.52","DOIUrl":"https://doi.org/10.1109/RE.2017.52","url":null,"abstract":"As software changes, it may become more difficult to under-stand, to be changed and harder to be reusable. In such cases, reengineering is a well-suited approach. While reengineering a system for renovation and reclamation, an organization gener-ally reassesses how the system implements high-level business requirements and makes modifications to conform to desired changes. Reengineering usually involves some form of reverse engineering to achieve a more abstract description of the soft-ware. We consider that a self-adaptive system implements awareness requirements, a high-level abstraction for self-adaptation. Awareness requirements are nonfunctional re-quirements (NFRs) about the software environment, as well as about the software itself (i.e.: the ability to perceive what is hap-pening about itself) for management and/or adaptation purpos-es. Most of the effort on self-adaptive system reengineering is focused on separation of concerns (i.e.: adaptation logic and application logic) or evolve a non-adaptive to a self-adaptive system. We identified that the design recovery approaches being used, limit themselves to recover the application logic, thus leav-ing the adaptation logic in low-level models. This fact leads to lack of proper integration at high-level models, resulting in im-plementation problems. Our research aims to tackle these prob-lems, by using the concept of awareness requirements as soft-goal in a goal-oriented model. We understand that recovering the adaptation operationalization and mapping them onto an i* based goal model will provide a high-level description of both the adaptation logic as well as the application logic.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114791777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
What Questions do Requirements Engineers Ask? 需求工程师会问什么问题?
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.76
Sugandha Malviya, Michael Vierhauser, J. Cleland-Huang, S. Ghaisas
{"title":"What Questions do Requirements Engineers Ask?","authors":"Sugandha Malviya, Michael Vierhauser, J. Cleland-Huang, S. Ghaisas","doi":"10.1109/RE.2017.76","DOIUrl":"https://doi.org/10.1109/RE.2017.76","url":null,"abstract":"Requirements Engineering (RE) is comprised of various tasks related to discovering, documenting, and maintaining different kinds of requirements. To accomplish these tasks, a Requirements Engineer or Business Analyst needs to retrieve and combine information from multiple sources such as use case models, interview scripts, and business rules. However, collecting and analyzing all the required data can be tedious and the resulting data is often incomplete with inadequate trace links. Analyzing real-world queries can shed light on the questions requirements professionals would like to ask and the artifacts needed to support such questions. We therefore conducted an online survey with requirements professionals in the IT industry. Our analysis included 29 survey responses and a total of 159 natural language queries. Using open coding and grounded theory, we analyzed and grouped these queries into 9 different query purposes and 54 sub-purposes, and also identified frequently used artifacts. The results from the survey could help project-level planners identify important questions, proactively instrument their environments with supporting tools, and strategically collect data that is needed to answer the queries of interest to their project.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121785586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Verifying Cyber-Physical System Behavior in the Context of Cyber-Physical System-Networks 在信息-物理系统-网络环境下验证信息-物理系统行为
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.45
Jennifer Brings
{"title":"Verifying Cyber-Physical System Behavior in the Context of Cyber-Physical System-Networks","authors":"Jennifer Brings","doi":"10.1109/RE.2017.45","DOIUrl":"https://doi.org/10.1109/RE.2017.45","url":null,"abstract":"Cyber-physical systems are highly connected context sensitive systems that form networks. Within these cyber-physical system-networks, behavior emerges from the interplay of the connected systems that cannot be attributed to a single system. Verifying single system behavior as well as the resulting emergent behavior of the system-network the single systems contribute to, is challenging as the intended behavior differs between the different cyber-physical system-networks the single system takes part in. It can even differ between two almost identical cyber-physical system-networks, which, for example, only differ by one system. To ensure correct behavior, requirements engineering for cyber-physical systems must cope with the identification and documentation of the cyber-physical system's dynamic context, i.e. the different system-networks the system takes part in (e.g., a system-network of vehicles forming a platoon on a highway) as well as the context situations these system-networks can encounter (e.g., road work leading to the need for lane shifts). This paper contributes a solution idea for automated support in identifying relevant system-networks the system will have to interact with and for verifying the cyber-physical system under development against these relevant system-networks.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling and Reasoning with Changing Intentions: An Experiment 改变意图的建模和推理:一个实验
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.19
A. Grubb, M. Chechik
{"title":"Modeling and Reasoning with Changing Intentions: An Experiment","authors":"A. Grubb, M. Chechik","doi":"10.1109/RE.2017.19","DOIUrl":"https://doi.org/10.1109/RE.2017.19","url":null,"abstract":"Existing modeling approaches in requirements engineering assume that stakeholder goals are static: once set, they remain the same throughout the lifecycle of the project. Of course, such goals, like anything else, may change over time. In earlier work, we introduced Evolving Intentions: an approach that allows stakeholders to specify how evaluations of goal model elements change over time. Simulation over Evolving Intentions enables stakeholders to ask a variety of 'what if' questions, and evaluate possible evolutions of a goal model. GrowingLeaf is a web-based tool that implements both the modeling and analysis components of this approach. In this paper, we investigate the effectiveness and usability of Evolving Intentions, Simulation over Evolving Intentions, and GrowingLeaf. We report on a between-subjects experiment we conducted with fifteen graduate students familiar with requirements engineering. Using qualitative, quantitative, and timing data, we show that Evolving Intentions were intuitive, that Simulation over Evolving Intentions increased the subjects' understanding and produced meaningful results, and that GrowingLeaf was found to be effective and usable.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131358573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reinforcing Security Requirements with Multifactor Quality Measurement 用多因素质量度量加强安全需求
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.77
Hanan Hibshi, T. Breaux
{"title":"Reinforcing Security Requirements with Multifactor Quality Measurement","authors":"Hanan Hibshi, T. Breaux","doi":"10.1109/RE.2017.77","DOIUrl":"https://doi.org/10.1109/RE.2017.77","url":null,"abstract":"Choosing how to write natural language scenarios is challenging, because stakeholders may over-generalize their descriptions or overlook or be unaware of alternate scenarios. In security, for example, this can result in weak security constraints that are too general, or missing constraints. Another challenge is that analysts are unclear on where to stop generating new scenarios. In this paper, we introduce the Multifactor Quality Method (MQM) to help requirements analysts to empirically collect system constraints in scenarios based on elicited expert preferences. The method combines quantitative statistical analysis to measure system quality with qualitative coding to extract new requirements. The method is bootstrapped with minimal analyst expertise in the domain affected by the quality area, and then guides an analyst toward selecting expert-recommended requirements to monotonically increase system quality. We report the results of applying the method to security. This include 550 requirements elicited from 69 security experts during a bootstrapping stage, and subsequent evaluation of these results in a verification stage with 45 security experts to measure the overall improvement of the new requirements. Security experts in our studies have an average of 10 years of experience. Our results show that using our method, we detect an increase in the security quality ratings collected in the verification stage. Finally, we discuss how our proposed method helps to improve security requirements elicitation, analysis, and measurement.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130446078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the Elicitation of Delightful Context-Aware Features: A Data-Based Approach 改善令人愉快的上下文感知特征的引出:基于数据的方法
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.42
R. Falcão
{"title":"Improving the Elicitation of Delightful Context-Aware Features: A Data-Based Approach","authors":"R. Falcão","doi":"10.1109/RE.2017.42","DOIUrl":"https://doi.org/10.1109/RE.2017.42","url":null,"abstract":"The pursuit of innovation in the mobile software industry frequently requires coming up with new features – and not just any feature, but startling and unexpected delightful features. Despite the potential of context awareness to provide a system with delightfulness, current requirements elicitation techniques do not cope with an essential aspect: comprehension of the relationships among the numerous contextual elements of a certain domain and how they can positively influence the user task. As a result, solution providers continuously miss the opportunity to add more value to their software solutions by identifying context-aware behaviors that will lead to better recommendations or adaptations. This paper discusses this problem and proposes a process for tackling it by taking the task to be improved as input and semi-automatically generating (1) a conceptual context model that reveals and represents both the relevance of contextual elements and the relationships among them, and (2) candidate requirements. The expected scientific contributions of the ongoing research are delineated as well.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Behind Points and Levels — The Influence of Gamification Algorithms on Requirements Prioritization 点数和等级背后——游戏化算法对需求优先级的影响
2017 IEEE 25th International Requirements Engineering Conference (RE) Pub Date : 2017-09-01 DOI: 10.1109/RE.2017.59
Martina Z. Kolpondinos-Huber, M. Glinz
{"title":"Behind Points and Levels — The Influence of Gamification Algorithms on Requirements Prioritization","authors":"Martina Z. Kolpondinos-Huber, M. Glinz","doi":"10.1109/RE.2017.59","DOIUrl":"https://doi.org/10.1109/RE.2017.59","url":null,"abstract":"Prioritizing requirements is a crucial ingredient of successful Requirements Engineering (RE). The popular prioritization techniques assume that stakeholders are known and can be mandated to contribute to the prioritization process. This prerequisite no longer holds for many of today's systems where significant stakeholders (end-users, in particular) are outside organizational reach: they are neither known nor can they be identified among the members of the involved organizations. Classic techniques for involving these stakeholders such as polls or questionnaires are neither interactive nor collaborative, which is detrimental for prioritization. Social media enable collaborative prioritization, but fall short in motivating stakeholders outside organizational reach to participate voluntarily. In this light, we are developing the Garuso platform, which combines social media with gamification for motivating stakeholders. While first approaches to employing gamification in RE are promising, research is still in its infancy. Especially, little is known about the influence of the gamification algorithms controlling single game elements on the stakeholders' activities. In this paper we report on a field experiment in which we investigated this influence with Garuso. We found statistically significant differences between different algorithms controlling single game elements on the contributions of stakeholders to the prioritization of requirements.","PeriodicalId":176958,"journal":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116032125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信