Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2245276.2231939acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

A clustering-based approach for discovering flaws in requirements specifications

Published: 26 March 2012 Publication History

Abstract

In this paper, we present the application of a clustering algorithm to exploit lexical and syntactic relationships occurring between natural language requirements. Our experiments conducted on a real-world data set highlight a correlation between clustering outliers, i.e., requirements that are marked as "noisy" by the clustering algorithm, and requirements presenting "flaws". Those flaws may refer to an incomplete explanation of the behavioral aspects, which the requirement is supposed to provide. Furthermore, flaws may also be caused by the usage of inconsistent terminology in the requirement specification. We evaluate the ability of our proposed algorithm to effectively discover such kind of flawed requirements. Evaluation is performed by measuring the accuracy of the algorithm in detecting a set of flaws in our testing data set, which have been previously manually-identified by a human assessor.

References

[1]
P. Achananuparp, X. Hu, and X. Shen. The evaluation of sentence similarity measures. In Proc. of DaWaK '08, pages 305--316, Berlin, Heidelberg, 2008. Springer-Verlag.
[2]
S. A. Alvarez. An exact analytical relation among recall, precision, and classification accuracy in information retrieval. Technical Report BCCS-02-01, Computer Science Department, Boston College, June 2002.
[3]
S. Boyd, D. Zowghi, and V. Gervasi. Optimal-constraint lexicons for requirements specifications. In Proc. of REFSQ'07, pages 203--217, Berlin, Heidelberg, 2007. Springer-Verlag.
[4]
A. Casamayor, D. Godoy, and M. Campo. Identification of non-functional requirements in textual specifications: A semi-supervised learning approach. IST, 52: 436--445, April 2010.
[5]
J. N. o. Dag, V. Gervasi, S. Brinkkemper, and B. Regnell. A linguistic-engineering approach to large-scale requirements management. IEEE Software, 22: 32--39, Janaury 2005.
[6]
C. Fitzgerald, E. Letier, and A. Finkelstein. Early failure prediction in feature request management systems. In Proc. of RE'11, pages 229--238, Washington, DC, USA, 2011. IEEE Computer Society.
[7]
J. H. Hayes, G. Antoniol, and Y.-G. Guéhéneuc. Prereqir: Recovering pre-requirements via cluster analysis. In Proc. of WCRE '08, pages 165--174, Washington, DC, USA, 2008. IEEE Computer Society.
[8]
L. Kaufman and P. Rousseeuw. Finding Groups in Data An Introduction to Cluster Analysis. Wiley Interscience, New York, 1990.
[9]
Y. Ko, S. Park, J. Seo, and S. Choi. Using classification techniques for informal requirements in the requirements analysis-supporting system. IST, 49: 1128--1140, November 2007.
[10]
V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10(8): 707--710, 1966.
[11]
C. Lucchese, S. Orlando, R. Perego, F. Silvestri, and G. Tolomei. Identifying task-based sessions in search engine query logs. In Proc. of the WSDM '11, pages 277--286, New York City, NY, USA, 2011. ACM.
[12]
A. P. Nikora and G. Balcom. Automated identification of ltl patterns in natural language requirements. In Proc. of ISSRE '09, pages 185--194, Piscataway, NJ, USA, 2009. IEEE Press.
[13]
J. Palmer and Y. Liang. Indexing and clustering of software requirements specifications. IDT, 18: 283--299, 1992.
[14]
S. Park, H. Kim, Y. Ko, and J. Seo. Implementation of an efficient requirements-analysis supporting system using similarity measure techniques. IST, 42: 429--438, April 2000.
[15]
M. F. Porter. An algorithm for suffix stripping. Program, 14(3): 130--137, 1980.
[16]
P. Tan, M. Steinbach, and V. Kumar. Introduction to Data Mining. Addison-Wesley, Boston, MA, USA, May 2005.

Cited By

View all
  • (2016)A retrospective analysis of SAC requirementsACM SIGAPP Applied Computing Review10.1145/2993231.299323416:2(26-41)Online publication date: 29-Aug-2016
  • (2016)Topic cohesion preserving requirements clusteringProceedings of the 5th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering10.1145/2896995.2896998(22-28)Online publication date: 14-May-2016
  • (2015)An Approach to Clustering and Sequencing of Textual RequirementsProceedings of the 2015 IEEE International Conference on Dependable Systems and Networks Workshops10.1109/DSN-W.2015.20(39-44)Online publication date: 22-Jun-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
March 2012
2179 pages
ISBN:9781450308571
DOI:10.1145/2245276
  • Conference Chairs:
  • Sascha Ossowski,
  • Paola Lecca
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. flawed requirements discovery
  2. requirement clustering

Qualifiers

  • Research-article

Conference

SAC 2012
Sponsor:
SAC 2012: ACM Symposium on Applied Computing
March 26 - 30, 2012
Trento, Italy

Acceptance Rates

SAC '12 Paper Acceptance Rate 270 of 1,056 submissions, 26%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2016)A retrospective analysis of SAC requirementsACM SIGAPP Applied Computing Review10.1145/2993231.299323416:2(26-41)Online publication date: 29-Aug-2016
  • (2016)Topic cohesion preserving requirements clusteringProceedings of the 5th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering10.1145/2896995.2896998(22-28)Online publication date: 14-May-2016
  • (2015)An Approach to Clustering and Sequencing of Textual RequirementsProceedings of the 2015 IEEE International Conference on Dependable Systems and Networks Workshops10.1109/DSN-W.2015.20(39-44)Online publication date: 22-Jun-2015
  • (2013)Using clustering to improve the structure of natural language requirements documentsProceedings of the 19th international conference on Requirements Engineering: Foundation for Software Quality10.1007/978-3-642-37422-7_3(34-49)Online publication date: 8-Apr-2013
  • (2012)Automatic analysis of multimodal requirementsProceedings of the 18th international conference on Requirements Engineering: foundation for software quality10.1007/978-3-642-28714-5_19(218-224)Online publication date: 19-Mar-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media