Requirements analysis using similar sequence diagrams

Akihiko Hara, Shingo Takada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Requirements analysis is a very important phase in software development. Unfortunately, it is very difficult to make explicit all requirements because developers and customers may not really know what they want. Development cost will become higher if the number of unknown and implicit behaviors is large, because developers will need to repeatedly modify the analysis and design models. This paper proposes an approach which suggests to the developer various behaviors, in the form of sequence diagrams, that the application may have but is not currently included. Our approach is implemented in a tool which searches a database of sequence diagrams for previously developed applications. Developers search the database for "similar" sequence diagrams based on the diagrams they have already developed.

Original languageEnglish
Title of host publicationProceedings of the 11th IASTED International Conference on Software Engineering and Applications, SEA 2007
PublisherActa Press
Pages66-71
Number of pages6
ISBN (Electronic)9780889867055
Publication statusPublished - 2007
Event11th IASTED International Conference on Software Engineering and Applications, SEA 2007 - Cambridge, United States
Duration: 2007 Nov 192007 Nov 21

Publication series

NameProceedings of the 11th IASTED International Conference on Software Engineering and Applications, SEA 2007

Other

Other11th IASTED International Conference on Software Engineering and Applications, SEA 2007
Country/TerritoryUnited States
CityCambridge
Period07/11/1907/11/21

Keywords

  • Category
  • Requirements analysis
  • Sequence diagrams
  • Similarity

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Requirements analysis using similar sequence diagrams'. Together they form a unique fingerprint.

Cite this