Development of a Graphical Approach to Software Requirements Analysis
نویسنده
چکیده
.................................................................................................. 3 Acknowledgments ........................................................................................ 5 Table of
منابع مشابه
Application of triangulation approach in requirements engineering process: A study in analysis and design of the pediatrics epilepsy information system
Introduction: Requirements Engineering process is a crucial phase in software development. In order to achieve a successful design of health information systems (HISs), applying the best methodologies is essential. Therefore, the aim of the present study was to design pediatrics Epilepsy Information System (EPIS) as well as the use of triangulation approach in elicitation and validation of epil...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کامل