{"title":"Guidelines for Benchmarking Automated Software Traceability Techniques","authors":"Yonghee Shin, J. Hayes, J. Cleland-Huang","doi":"10.1109/SST.2015.13","DOIUrl":"https://doi.org/10.1109/SST.2015.13","url":null,"abstract":"To comparatively evaluate automated trace ability solutions, we need to develop standardized benchmarks. However there is currently no consensus on how a benchmark should be constructed and used to evaluate competing techniques. In this paper we discuss recurring problems in evaluating trace ability techniques, identify essential properties that evaluation methods should possess, and provide guidelines for benchmarking software trace ability techniques. We illustrate the properties and guidelines using empirical evaluation of three software trace ability techniques on nine data sets.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Actionable Software Architecture Traceability","authors":"Saeed Namdar, Mehdi Mirakhorli","doi":"10.1109/SST.2015.17","DOIUrl":"https://doi.org/10.1109/SST.2015.17","url":null,"abstract":"This paper introduces a set of strategic trace ability patterns for backward and forward trace ability of critical architectural properties. These patterns define architecturally significant elements and factors which are engaged in realizing an architectural tactic and satisfying quality goals. Furthermore a set of trace ability realization mechanisms are proposed to implement trace links among quality goals, architectural tactics and solution fragments that implement tactics.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Nhlabatsi, Y. Yu, A. Zisman, T. Tun, N. Khan, A. Bandara, K. Khan, B. Nuseibeh
{"title":"Managing Security Control Assumptions Using Causal Traceability","authors":"A. Nhlabatsi, Y. Yu, A. Zisman, T. Tun, N. Khan, A. Bandara, K. Khan, B. Nuseibeh","doi":"10.1109/SST.2015.14","DOIUrl":"https://doi.org/10.1109/SST.2015.14","url":null,"abstract":"Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions about the operational environment often reveal unexpected flaws. To diagnose the causes of violations in security requirements it is necessary to check these design-time assumptions. Otherwise, the system could be vulnerable to potential attacks. Addressing such vulnerabilities requires an explicit understanding of how the security control specifications were defined from the original security requirements. However, assumptions are rarely explicitly documented and monitored during system operation. This paper proposes a systematic approach to monitoring design-time assumptions explicitly as logs, by using trace ability links from requirements to specifications. The work also helps identify which alternative specifications of security control can be used to satisfy a security requirement that has been violated based on the logs. The work is illustrated by an example of an electronic patient record system.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128435542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Markus Kleffmann, Sebastian Rohl, V. Gruhn, Matthias Book
{"title":"Establishing and Navigating Trace Links between Elements of Informal Diagram Sketches","authors":"Markus Kleffmann, Sebastian Rohl, V. Gruhn, Matthias Book","doi":"10.1109/SST.2015.8","DOIUrl":"https://doi.org/10.1109/SST.2015.8","url":null,"abstract":"The Augmented Interaction Room is a team room whose walls are outfitted with wall-sized touch screens that are used to create informal diagram sketches. It strives to help stakeholders in fostering a common understanding of a project's most important risk and value drivers by visualizing aspects of a software system from different perspectives and allowing stakeholders to annotate elements that are especially important or critical for project success. In this paper, we discuss how a combination of trace ability techniques and fuzzy search methods can be used to efficiently support the stakeholders' collaboration and their early design and decision making activities by providing an easy and intuitive visualization and navigation approach and by automatically uncovering potential inconsistencies and contradictions in the created sketches. Since the pragmatic methodology of the Augmented Interaction Room encourages stakeholders to work with handwritten sketches rather than with formal modeling languages, the identification and maintenance of trace links is particularly challenging.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Linsbauer, Stefan Fischer, R. Lopez-Herrejon, Alexander Egyed
{"title":"Using Traceability for Incremental Construction and Evolution of Software Product Portfolios","authors":"L. Linsbauer, Stefan Fischer, R. Lopez-Herrejon, Alexander Egyed","doi":"10.1109/SST.2015.16","DOIUrl":"https://doi.org/10.1109/SST.2015.16","url":null,"abstract":"Software reuse has become mandatory for companies to compete and a wide range of reuse techniques are available today. Despite the great benefits of these techniques, they also have the disadvantage that they do not necessarily support the creation and evolution of closely related products - products that are customized to different infrastructures, ecosystems, machinery, or customers. In this paper we outline an approach for incrementally constructing and evolving software product portfolios of similar product variants. An initial proof of concept demonstrates its feasibility.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127696529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoli Lian, Ahmed E. Fakhry, Li Zhang, J. Cleland-Huang
{"title":"Leveraging Traceability to Reveal the Tapestry of Quality Concerns in Source Code","authors":"Xiaoli Lian, Ahmed E. Fakhry, Li Zhang, J. Cleland-Huang","doi":"10.1109/SST.2015.15","DOIUrl":"https://doi.org/10.1109/SST.2015.15","url":null,"abstract":"Software quality concerns, related to attributes such as reliability, security, and performance, are realized through a series of architectural decisions impacting the choice of frameworks, styles, tactics, and even high-level design patterns. These decisions are often undocumented and, as a result, developers maybe unaware of the relationship between various sections of the code and quality concerns. In this paper we utilize an existing classifier to detect architectural tactics in code, and then present three different visualization techniques for visualizing the impact of quality concerns on code. We demonstrate our approach against the Cassandra database system and show that our visualizations offer potentially useful perspectives on the tapestry of quality concerns woven throughout the code.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125814562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traceability Recovery for Innovation Processes","authors":"Thomas Beyhl, H. Giese","doi":"10.1109/SST.2015.11","DOIUrl":"https://doi.org/10.1109/SST.2015.11","url":null,"abstract":"Nowadays, innovation is a competitive business advantage. In practice, innovation and engineering are two distinct process steps with an information handover in between. Often only design prototypes are handed over that present the overall concept, but justify design decisions only partially. However, engineers require thorough knowledge about design rationales when getting the innovation ready for the market. Therefore, innovation processes need to support trace ability to enable the retrieval of design rationales. But, existing approaches for documenting innovation processes rather focus on capturing artifacts than enabling the retrieval of trace ability information. Furthermore, existing trace ability approaches often cannot be employed, because they rely on structured artifacts. In this paper, we present a trace ability recovery approach for innovation processes that enables trace ability for unstructured artifacts as often used in innovation processes by employing recovery modules, which jointly recover trace ability information. We demonstrate and evaluate our approach using the innovation methodology of Design Thinking.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Parameterized Safety Requirements Templates","authors":"P. Antonino, M. Trapp, Paulo Barbosa, Luana Sousa","doi":"10.1109/SST.2015.12","DOIUrl":"https://doi.org/10.1109/SST.2015.12","url":null,"abstract":"Despite imposing strict recommendations to be considered during the specification of safety requirements, standards and regulations do not provide guidance to be used throughout the creation of these artifacts. In practice, each safety requirement specification has heterogeneous structures, usually based on the experience of the engineers involved in the specification process. Consequently, it becomes difficult to ensure that the standards' recommendations were considered, such as the existence of evidences that the requirements are properly traceable to other development artifacts such as architecture and failure propagation models. To address this challenge, we defined the Parameterized Safety Requirements Templates, which is a controlled natural language based approach to support engineers in elaborating the content description of safety requirements specifications, ensuring that elements of the architectural design and of the failure propagation models are explicitly considered throughout the textual description of the safety requirements, and are therefore properly traced. The Parameterized Safety Requirements Templates have been used in different domains such as automotive, avionics, and medical devices, and have proven to be effective in improving artifact traceability. In this paper, we present their usage in the context of an industrial Automated External Defibrillator system.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tagging in Assisted Tracing","authors":"Wentao Wang, Nan Niu, Hui Liu, Yuting Wu","doi":"10.1109/SST.2015.9","DOIUrl":"https://doi.org/10.1109/SST.2015.9","url":null,"abstract":"Assisted tracing is the process where human analyst vets and makes decisions concerning the automated method's output. Current research reveals human fallibility in this process, and shows that analyst often makes incorrect decisions that lead to inaccurate final trace matrix. To help enhance analyst performance, we leverage tagging in assisted tracing. Specifically, we implement tagging as a front-end feature that allows analysts to freely mark what they feel worth externalizing during tracing. We then carry out an experiment to investigate the tagging practices of 28 student analysts in vetting requirements-to-source-code trace matrices. Our study shows that tagging is readily adopted by analysts, tags produced in tracing follow power laws, and tags greatly enhance the precision of analyst-submitted final trace matrices. Our work opens up new avenues for researching improved ways to foster analyst-tool integration.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive User Feedback for IR-Based Traceability Recovery","authors":"Annibale Panichella, A. D. Lucia, A. Zaidman","doi":"10.1109/SST.2015.10","DOIUrl":"https://doi.org/10.1109/SST.2015.10","url":null,"abstract":"Trace ability recovery allows software engineers to understand the interconnections among software artefacts and, thus, it provides an important support to software maintenance activities. In the last decade, Information Retrieval (IR) has been widely adopted as core technology of semi-automatic tools to extract trace ability links between artefacts according to their textual information. However, a widely known problem of IR-based methods is that some artefacts may share more words with non-related artefacts than with related ones. To overcome this problem, enhancing strategies have been proposed in literature. One of these strategies is relevance feedback, which allows to modify the textual similarity according to information about links classified by the users. Even though this technique is widely used for natural language documents, previous work has demonstrated that relevance feedback is not always useful for software artefacts. In this paper, we propose an adaptive version of relevance feedback that, unlike the standard version, considers the characteristics of both (i) the software artefacts and (ii) the previously classified links for deciding whether and how to apply the feedback. An empirical evaluation conducted on three systems suggests that the adaptive relevance feedback outperforms both a pure IR-based method and the standard feedback.","PeriodicalId":404877,"journal":{"name":"2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117325843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}