Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Efficient Approach for Requirement Volatility Identification

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 101 - Number 15
Year of Publication: 2014
Authors:
Md. Faisal
Md. Rizwan Beg
Halima Sadia
10.5120/17767-8884

Md. Faisal, Md. Rizwan Beg and Halima Sadia. Article: An Efficient Approach for Requirement Volatility Identification. International Journal of Computer Applications 101(15):42-45, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Md. Faisal and Md. Rizwan Beg and Halima Sadia},
	title = {Article: An Efficient Approach for Requirement Volatility Identification},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {101},
	number = {15},
	pages = {42-45},
	month = {September},
	note = {Full text available}
}

Abstract

Software Development is a dynamic activity. Requirements of the stakeholders keep on changing throughout the lifecycle of a project development. These Volatile requirements are considered as a major risk factor during system development in the software industry. Requirement Volatility is found to be having a significant impact on schedule & cost overrun in software projects. This paper discusses an approach for identifying volatile requirement and proposes an algorithm to automate the identification of volatile requirements in a requirement document at an early stage so that preventive measures can be taken. Also, we are proposing an approach to analyze the dependencies among various requirements which can be very lucrative in requirement management especially in the presence of volatile requirements.

References

  • K. E. Wiegers, "Software requirements", Microsoft press 1999.
  • G. Stark, A. Skillicorn, and R. Ameele, "An Examination of the Effects of Requirements Changes on Software Releases," CROSSTALK, The Journal of Defence Software Engineering, December 1998.
  • T. Hammer, L. Huffman, and L. Rosenberg, "Doing Requirements Right the First Time," CROSSTALK, The Journal of Defence Software Engineering, December 1998, pp. 20-25
  • D. Zowghi, and Nurmuliani, "Investigating Requirements Volatility During Software Development: Research in Progress", Proceedings of the 3rd Australian Conference on Requirements Engineering (ACRE98), Geelong, Australia, 1998
  • D. Zowghi, R. Offen, and N. Nurmuliani, "The Impact of Requirements Volatility on Software Development Lifecycle," proceedings of the International Conference on Software, Theory and Practice (ICS2000), Beijing, China, 2000
  • L. Hyatt and L. Rosenberg, "Software Metric for Risk Assessment," proceedings of the 26th Safety and Rescue Symposium, Risk Management and Assessment Session, Beijing, China, 1996.
  • Lane and A. L. M. Cavaye, " Requirements Volatility Enhances Software Development Productivity," proceedings of the 3rd Australian Conference on Requirements Engineering (ACRE 98), Geelong, Australia, 1998.
  • M. Fagan, "Advances in Software Inspections," IEEE Trans. Software Eng. , July 1986, pp. 744-751.
  • Forrest Shull Ioana Rus, Victor Basili "How Perspective-Based Reading Can Improve Requirements Inspections" 0018-9162/00/ 2000 IEEE
  • S. Nayak, R. Khan and R. Beg "Evaluation of Requirement Defects: An Implementation of Identification Technique" ICIET2012, Journal of Procedia Technology.
  • Aho, Alfred V. ; Corasick, Margaret J. (June 1975). "Efficient string matching: An aid to bibliographic search". Communications of the ACM 18 (6): 333–340