Moonzoo Kim. KAIST CS350 Intro. to SE Spring

Similar documents
Chapter 7 Requirements Engineering

Understanding Requirements. Slides copyright 1996, 2001, 2005, 2009, 2014 by Roger S. Pressman. For non-profit educational use only

CS Division of EECS Dept. KAIST

Requirements Analysis aka Requirements Engineering. Requirements Elicitation Process

F. Tip and M. Weintraub REQUIREMENTS

CSE - Annual Research Review. From Informal WinWin Agreements to Formalized Requirements

Software Engineering: A Practitioner s Approach, 7/e. Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman

Unit 5: Unified Software Development Process. 3C05: Unified Software Development Process USDP. USDP for your project. Iteration Workflows.

Object-oriented Analysis and Design

Developing a VR System. Mei Yii Lim

An introduction to software development. Dr. C. Constantinides, P.Eng. Computer Science and Software Engineering Concordia University

UNIT-III LIFE-CYCLE PHASES

IBM Software Group. Mastering Requirements Management with Use Cases Module 2: Introduction to RMUC

Herts Valleys Clinical Commissioning Group. Review of NHS Herts Valleys CCG Constitution

UML and Patterns.book Page 52 Thursday, September 16, :48 PM

Domain Understanding and Requirements Elicitation

IMGD 1001: Programming Practices; Artificial Intelligence

BIG IDEAS. Personal design choices require self-exploration, collaboration, and evaluation and refinement of skills. Learning Standards

Indiana K-12 Computer Science Standards

Interoperable systems that are trusted and secure

Allied Radio Matrix for Emergency Response (ARMER) Standards, Protocols, Procedures

10. Personas. Plan for ISSD Lecture #10. 1 October Bob Glushko. Roadmap to the lectures. Stakeholders, users, and personas

Business English Basics

IMGD 1001: Programming Practices; Artificial Intelligence

Defining Process Performance Indicators by Using Templates and Patterns

Issues and Challenges in Coupling Tropos with User-Centred Design

The Partnership Process- Issue Resolution in Action

Arcade Game Maker Product Line Requirements Model

Issues and Challenges in Ecosystems of Federated Embedded Systems

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

Lecture 6: HCI, advanced course, Design rationale for HCI

OCEAN OBSERVATORIES INITIATIVE. Release 2 Schedule. OOI CI Release 2 Kickoff M a y 2,

JOURNAL OF OBJECT TECHNOLOGY

Lecture 13: Requirements Analysis

Digital Scenarios and Future Skills

Date: Paul Spaanderman, Abstract: Not know at this time. Decision Discussion Information Other <specify>

IAASB Main Agenda (March, 2015) Auditing Disclosures Issues and Task Force Recommendations

The Open University xto5w_59duu

NEGOTIATING WORK AND LIFE HOW TO FIND THE JOY

2009 New Jersey Core Curriculum Content Standards - Technology

Welcome to our first of webinars that we will. be hosting this Fall semester of Our first one

STANDARDS DEVELOPMENT NEGOTIATION

CHAPTER 1: INTRODUCTION TO SOFTWARE ENGINEERING DESIGN

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

What is Empirical Modelling? Principles, Tools, Examples and Perspective. Short Orientation. Principles & Tools. Applications of EM

Using BIM Geometric Properties for BLE-based Indoor Location Tracking

Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION

IS 525 Chapter 2. Methodology Dr. Nesrine Zemirli

Formal Report. Assignment

the gamedesigninitiative at cornell university Lecture 23 Strategic AI

Foresight Impact on Policy making and Lessons for New Member States and Candidate Countries Insights from the FORLEARN mutual learning process

Wireless Network Security Spring 2014

Software LEIC/LETI. Lecture 21

GOAL SETTING NOTES. How can YOU expect to hit a target you that don t even have?

Software Project Management 4th Edition. Chapter 3. Project evaluation & estimation

C 2 A L L Y O U R P A R T N E R I N U S E R E X P E R I E N C E

About Software Engineering.

"The Lottery Shotgun Method:

Managing the Innovation Process. Development Stage: Technical Problem Solving, Product Design & Engineering

Identifying and Managing Joint Inventions

GLOSSARY for National Core Arts: Media Arts STANDARDS

UNIT IV SOFTWARE PROCESSES & TESTING SOFTWARE PROCESS - DEFINITION AND IMPLEMENTATION

Michigan State University College of Engineering; Dept. of Electrical and Computer Eng. ECE 480 Capstone Design Course Project Charter Fall 2017

National Coalition for Core Arts Standards. Visual Arts Model Cornerstone Assessment: Secondary Accomplished

Model-based Diagnosis Tutorial PHM-E 12

Technical Data Standards Development & Implementation

Grundlagen des Software Engineering Fundamentals of Software Engineering

FP7 ICT Call 6: Cognitive Systems and Robotics

IB Interview Guide: How to Walk Through Your Resume or CV as an Undergrad or Recent Grad

STORYBOARDS, SCENARIOS, AND PERSONAS

THE METHODOLOGY: STATUS AND OBJECTIVES THE PILOT PROJECT B

How to complete the Work-Based Project ASSOCIATION MUSEUMS AMA. Building a successful career in museums

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016

Candidate Interview Preparation

Modeling support systems for multi-modal design of physical environments

EXECUTIVE BOARD MEETING METHODOLOGY FOR DEVELOPING STRATEGIC NARRATIVES

Model Based Systems Engineering with MagicGrid

Discussion guide My personal record

MANAGING HUMAN-CENTERED DESIGN ARTIFACTS IN DISTRIBUTED DEVELOPMENT ENVIRONMENT WITH KNOWLEDGE STORAGE

Planning for Human-Robot Teaming Challenges & Opportunities

Lecture 9: Estimation and Prioritization" Project Planning"

Subway simulator Case study

How to write a resume

FEE Comments on EFRAG Draft Comment Letter on ESMA Consultation Paper Considerations of materiality in financial reporting

Adapt or Fail coordination in different environments

CONTENTS. 1. Number of Players. 2. General. 3. Ending the Game. FF-TCG Comprehensive Rules ver.1.0 Last Update: 22/11/2017

CC532 Collaborative System Design

(a) General requirements. This course is recommended for students in Grades Recommended prerequisite: Principles of Information Technology.

Wireless Network Security Spring 2015

MEASURES TO INCREASE THE EFFICIENCY OF CIF COMMITTEES. CTF-SCF/TFC.11/7/Rev.1 January 27, 2014

Does it happen that you're in the middle of the call and the flow of conversation doesn't follow the script that you've posted on your wall?

Air Traffic Soft. Management. Ultimate System. Call Identifier : FP TREN-3 Thematic Priority 1.4 Aeronautics and Space

learning progression diagrams

Connecting museum collections and creator communities: The Virtual Museum of the Pacific project

TECHNOLOGY WITH A HUMAN TOUCH

ISO ISO is the standard for procedures and methods on User Centered Design of interactive systems.

12 April Fifth World Congress for Freedom of Scientific research. Speech by. Giovanni Buttarelli

Exploring emerging ICT-enabled governance models in European cities

SUGGESTIONS FOR IMPROVING THE STRUCTURAL STEEL SHOP DRAWING PROCESS

The Semantics of Innovation Exploring the deep nature of innovation IC3K, Rome, October 2014

Transcription:

Chapter 7 Requirements Engineering Moonzoo Kim CS Division of EECS Dept. KAIST moonzoo@cs.kaist.ac.kr http://pswlab.kaist.ac.kr/courses/cs350-07 ac kr/courses/cs350 07 Spring 2008 1

Requirements Engineering-I Inception ask a set of questions that establish basic understanding di of the problem (what) the people who want a solution (who) the nature of the solution that is desired, and the effectiveness of preliminary communication and collaboration between the customer and the developer Elicitation elicit requirements from all stakeholders Elaboration create an analysis model that identifies data, function and behavioral requirements Negotiation agree agree on a deliverable system that is realistic for developers and customers Spring 2008 2

Requirements Engineering-II Specification can can be any one (or more) of the following: A written document A set of models A collection of user scenarios (use-cases) A prototype Validation a a review mechanism that looks for Errors in content or interpretation Areas where clarification may be required (ambiguity) Missing information (incomplete requirement) Inconsistencies a major problem when large products or systems are engineered) Unrealistic (unachievable) requirements. Requirements management Spring 2008 3

Identify stakeholders Inception who else do you think I should talk to? Recognize multiple points of view Work toward collaboration The first questions Who is behind the request for this work? Who will use the solution? What will be the economic benefit of a successful solution Is there another source for the solution that you need? Spring 2008 4

Eliciting Requirements meetings are conducted and attended by both software engineers and customers an agenda is suggested a "facilitator" (can be a customer, a developer, or an outsider) controls the meeting a "definition mechanism" (can be work sheets, flip charts, or wall stickers or an electronic bulletin board, chat room or virtual forum) is used the goal is to identify the problem propose elements of the solution negotiate different approaches, and specify a preliminary set of solution requirements Spring 2008 5

Conducting a Requirements Gathering Meeting (pg188) The scene: A meeting room. The first requirements gathering meeting is in progress. The players: Jamie Lazar, software team member; Vinod Raman, software team member; Ed Robbins, software team member; Doug Miller, software engineering manager; three members of marketing; a product engineering representative; a facilitator. The conversation: Facilitator (pointing at white board): So that's the current list of objects and services for the home security function. Marketing gp person: That about covers it from our point of view. Vinod: Didn't someone mention that they wanted all SafeHome functionality to be accessible via the Internet? That would include the home security function, no? Marketing person: Yes, that's right... we'll have to add that functionality and the appropriate objects. Spring 2008 6

Facilitator: Does that also add some constraints? Jamie: It does, both technical and legal. Production rep: Meaning? Jamie: We better make sure an outsider can't hack into the system, disarm it, and rob the place or worse. Heavy liability on our part. Doug: Very true. Marketing: But we still need Internet connectivity. just be sure to stop an outsider from getting in. Ed: That's easier said than done and... Facilitator (interrupting): I don't want to debate this issue now. Let's note it as an action item and proceed. (Doug, serving as the recorder for the meeting, makes an appropriate note.) Facilitator: I have a feeling there's still more to consider here. (The group spends the next 45 minutes refining and ex-panding the details of the home security function.) Spring 2008 7

Eliciting Requirements Conduct FAST m eetings Make lists of functions, classes Make lists of constraints, etc. Elicit requirements yes formal prioritization? no Us e QFD t o prioritize requirements inf orm ally prioritize requirements define actors draw use-case diagram write scenario Create Use-cases complete template Spring 2008 8

Quality Function Deployment Function deployment determines each function required of the system Information deployment identifies data objects and events Task deployment examines the behavior of the system Value analysis determines the relative priority of requirements during each of the three deployments Value should be one that are perceived by the customer Spring 2008 9

Elicitation Work Products a set of usage scenarios that provide insight into the use of the system or product under different operating conditions. any prototypes developed to better define requirements. a statement of need and feasibility. a bounded statement of scope for the system stem or product. a list of customers, users, and other stakeholders who participated in requirements elicitation a description of the system s technical environment. a list of requirements (preferably organized by function) and the domain constraints that apply to each. Spring 2008 10

Use-Cases A collection of user scenarios that describe the thread of usage of a system Each scenario is described from the point-of of-view of an actor actor a a person or device that interacts with the software in some way Each scenario answers the following questions: Who is the primary actor, the secondary actor (s)? What are the actor s goals? What preconditions should exist before the story begins? What main tasks or functions are performed by the actor? What extensions might be considered as the story is described? What variations in the actor s interaction are possible? What system information will the actor acquire, produce, or change? Will the actor have to inform the system about changes in the external environment? What information does the actor desire from the system? Does the actor wish to be informed about unexpected changes? Spring 2008 11

SafeHome Product Spring 2008 12

Example of Use Case for SafeHome Use-case: InitiateMonitoring Primary actor: Homeowner Goal in context: To set the system to monitor sensors when the homeowner leaves the house or remains inside Preconditions: System has been programmed for a password and to recognize various sensors Trigger: The homeowner decides to set the system, i.e., to turn on the alarm functions Scenario: 1. Homeowner: observes control panel 2. Homeowner:enters password 3. Homeowner: selects stay or away 4. Homeowner: observes red alarm light to indicate that SafeHome has been armed Exceptions: 1a. Control panel is not ready: homeowner checks all sensors to determine which are open; closes them 2a. Password is incorrect Priority: Essential, must be implemented When available: first increment Frequency of use: Many times per day Channel to actor: Via control panel interface Secondary actors: Support technician Channels to secondary actors: support technician: phone line Open issues: Do we enforce time limit for password entering? Spring 2008 13

Use-Case Diagram Arms/ disarms system Accesses system via Int ernet sensors homeowner Responds t o alarm event Encount ers an error condition system administ rat or Reconf igures sensors and relat ed system features Spring 2008 14

Building the Analysis Model Elements of the analysis model Scenario-based elements Functional processing narratives for software functions Use-case case descriptions of the interaction between an actor and the system Class-based elements Implied by scenarios Behavioral elements State diagram Flow-oriented oriented elements Data flow diagram Spring 2008 15

Class Diagram From the SafeHome system Sensor name/id type location area characteristics identify() enable() disable() reconfigure () Spring 2008 16

State Diagram Initialization Reading commands not jammed t urn copier on syst em st at us= not ready display msg = please wait display st at us = blinking subsyst ems ready syst em st at us= Ready display msg = ent er cmd display st at us = st eady paper f ull ent ry/ swit ch machine on do: run diagnost ics do: initiate all subsystems entry/ subsystems ready do: poll user input panel do: read user input do: int erpret user input turn copier off st art copies Making copies syst em st at us= Copying display msg= copy count = display message=#copies display st at us= st eady ent ry/ st art copies do: manage copying do: monit or paper t ray do: monit or paper f low copies complet e paper t ray empt y paper jammed problem diagnosis syst em st at us= Jammed display msg = paper jam display message=locat ion display st at us= blinking ent ry/ paper jammed do: det ermine locat ion do: provide correct ive msg. do: int errupt making copies load paper syst em st at us= load paper display msg= load paper display st at us= blinking ent ry/ paper empt y do: lower paper t ray do: monit or f ill swit ch do: raise paper t ray not jammed Figure 7.6 Preliminary UML st at e diagram for a phot ocopier Spring 2008 17

Negotiating Requirements Identify the key stakeholders These are the people who will be involved in the negotiation Determine each of the stakeholders win conditions Win conditions are not always obvious Negotiate Work toward a set of requirements that lead to win-win win Spring 2008 18

Validating Requirements-I Is each requirement consistent with the overall objective for the system/product? Have all requirements been specified at the proper level of abstraction? That is, do some requirements provide a level l of technical detail that is inappropriate i at this stage? Is the requirement really necessary or does it represent an add-on feature that may not be essential to the objective of the system? Is each requirement bounded and unambiguous? Does each requirement have attribution? That is, is a source (generally, a specific individual) noted for each requirement? Spring 2008 19

Validating Requirements-II Do any requirements conflict with other requirements? Is each requirement achievable in the technical environment that will house the system or product? Is each requirement testable, once implemented? Does the requirements model properly reflect the information, function and behavior of the system to be built. Has the requirements model been partitioned in a way that exposes progressively more detailed information about the system. Spring 2008 20