skip to main content
10.1145/1810295.1810308acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Can clone detection support quality assessments of requirements specifications?

Authors Info & Claims
Published:01 May 2010Publication History

ABSTRACT

Due to their pivotal role in software engineering, considerable effort is spent on the quality assurance of software requirements specifications. As they are mainly described in natural language, relatively few means of automated quality assessment exist. However, we found that clone detection, a technique widely applied to source code, is promising to assess one important quality aspect in an automated way, namely redundancy that stems from copy&paste operations. This paper describes a large-scale case study that applied clone detection to 28 requirements specifications with a total of 8,667 pages. We report on the amount of redundancy found in real-world specifications, discuss its nature as well as its consequences and evaluate in how far existing code clone detection approaches can be applied to assess the quality of requirements specifications in practice.

References

  1. B. S. Baker. On finding duplication and near-duplication in large software systems. In WCRE'95. IEEE, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng., 33(9):577--591, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Bernárdez, A. Durán, and M. Genero. Empirical evaluation and review of a metrics-based approach for use case verification. JRPIT, 36(4):247--258, 2004.Google ScholarGoogle Scholar
  4. B. Boehm and V. R. Basili. Software defect reduction top 10 list. Computer, 34(1):135--137, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Bucchiarone, S. Gnesi, G. Lami, G. Trentanni, and A. Fantechi. QuARS Express - A Tool Demonstration. In ASE'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. J. Corbin and L. A. Strauss. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage Publ., 3. edition, 2008.Google ScholarGoogle Scholar
  7. F. Culwin and T. Lancaster. A review of electronic services for plagiarism detection in student submissions. In ITiCSE'00, 2000.Google ScholarGoogle Scholar
  8. F. Deissenboeck, B. Hummel, E. Juergens, B. Schaetz, S. Wagner, J.-F. Girard, and S. Teuchert. Clone detection in automotive model-based development. In ICSE'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Domann, E. Juergens, and J. Streit. The curse of copy&paste - Cloning in requirements specifications. In ESEM'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. Fabbrini, M. Fusani, S. Gnesi, and G. Lami. An Automatic Quality Evaluation for Natural Language Requirements. In REFSQ'01, 2001.Google ScholarGoogle Scholar
  11. T. Gilb and D. Graham. Software Inspection. Addison-Wesley, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. L. Glass. Persistent software errors. IEEE Trans. Softw. Eng., 7(2):162--168, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. D. Gould, L. Alfaro, R. Finn, B. Haupt, and A. Minuto. Why reading was slower from CRT displays than from paper. SIGCHI Bull., 17(SI):7--11, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. IEEE. Recommended practice for software requirements specifications. Standard 830--1998, IEEE, 1998.Google ScholarGoogle Scholar
  15. L. K. Ishrar Hussain, Olga Ormandjieva. Automatic quality assessment of SRS text by means of a decision-tree-based text classifier. In QSIC'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. Juergens, F. Deissenboeck, and B. Hummel. CloneDetective - A workbench for clone detection research. In ICSE'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E. Juergens, F. Deissenboeck, and B. Hummel. Code similarities beyond copy & paste. In CSMR'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. Juergens, F. Deissenboeck, B. Hummel, and S. Wagner. Do code clones matter? In ICSE'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Koschke. Identifying and removing software clones. In T. Mens and S. Demeyer, editors, Software Evolution. Springer, 2008.Google ScholarGoogle Scholar
  20. C. Lyon, R. Barrett, and J. Malcolm. A theoretical basis to the automated detection of copying between texts, and its practical implementation in the ferret plagiarism and collusion detector. In Plagiarism: Prevention, Practice and Policies Conference, 2004.Google ScholarGoogle Scholar
  21. M. F. Porter. An algorithm for suffix stripping. Program, 14(3):130--137, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  22. C. K. Roy and J. R. Cordy. A survey on software clone detection research. Technical Report 2007--541, School of Computing Queen's University, 2007.Google ScholarGoogle Scholar
  23. M. Weber and J. Weisbrod. Requirements engineering in automotive development - Experiences and challenges. In RE'02, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J.-R. Wen, J.-Y. Nie, and H.-J. Zhang. Clustering user queries of a search engine. In WWW'01, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. W. M. Wilson, L. H. Rosenberg, and L. E. Hyatt. Automated analysis of requirement specifications. In ICSE'97, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. Wohlin, P. Runeson, and M. Höst. Experimentation in software engineering: An introduction. Kluwer Academic, Boston, Mass., 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Can clone detection support quality assessments of requirements specifications?

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
        May 2010
        554 pages
        ISBN:9781605587196
        DOI:10.1145/1810295

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 May 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate276of1,856submissions,15%

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader