ABSTRACT
Due to their pivotal role in software engineering, considerable effort is spent on the quality assurance of software requirements specifications. As they are mainly described in natural language, relatively few means of automated quality assessment exist. However, we found that clone detection, a technique widely applied to source code, is promising to assess one important quality aspect in an automated way, namely redundancy that stems from copy&paste operations. This paper describes a large-scale case study that applied clone detection to 28 requirements specifications with a total of 8,667 pages. We report on the amount of redundancy found in real-world specifications, discuss its nature as well as its consequences and evaluate in how far existing code clone detection approaches can be applied to assess the quality of requirements specifications in practice.
- B. S. Baker. On finding duplication and near-duplication in large software systems. In WCRE'95. IEEE, 1995. Google ScholarDigital Library
- S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng., 33(9):577--591, 2007. Google ScholarDigital Library
- B. Bernárdez, A. Durán, and M. Genero. Empirical evaluation and review of a metrics-based approach for use case verification. JRPIT, 36(4):247--258, 2004.Google Scholar
- B. Boehm and V. R. Basili. Software defect reduction top 10 list. Computer, 34(1):135--137, 2001. Google ScholarDigital Library
- A. Bucchiarone, S. Gnesi, G. Lami, G. Trentanni, and A. Fantechi. QuARS Express - A Tool Demonstration. In ASE'08, 2008. Google ScholarDigital Library
- M. J. Corbin and L. A. Strauss. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage Publ., 3. edition, 2008.Google Scholar
- F. Culwin and T. Lancaster. A review of electronic services for plagiarism detection in student submissions. In ITiCSE'00, 2000.Google Scholar
- F. Deissenboeck, B. Hummel, E. Juergens, B. Schaetz, S. Wagner, J.-F. Girard, and S. Teuchert. Clone detection in automotive model-based development. In ICSE'08, 2008. Google ScholarDigital Library
- C. Domann, E. Juergens, and J. Streit. The curse of copy&paste - Cloning in requirements specifications. In ESEM'09, 2009. Google ScholarDigital Library
- F. Fabbrini, M. Fusani, S. Gnesi, and G. Lami. An Automatic Quality Evaluation for Natural Language Requirements. In REFSQ'01, 2001.Google Scholar
- T. Gilb and D. Graham. Software Inspection. Addison-Wesley, 1993. Google ScholarDigital Library
- R. L. Glass. Persistent software errors. IEEE Trans. Softw. Eng., 7(2):162--168, 1981. Google ScholarDigital Library
- J. D. Gould, L. Alfaro, R. Finn, B. Haupt, and A. Minuto. Why reading was slower from CRT displays than from paper. SIGCHI Bull., 17(SI):7--11, 1987. Google ScholarDigital Library
- IEEE. Recommended practice for software requirements specifications. Standard 830--1998, IEEE, 1998.Google Scholar
- L. K. Ishrar Hussain, Olga Ormandjieva. Automatic quality assessment of SRS text by means of a decision-tree-based text classifier. In QSIC'07, 2007. Google ScholarDigital Library
- E. Juergens, F. Deissenboeck, and B. Hummel. CloneDetective - A workbench for clone detection research. In ICSE'09, 2009. Google ScholarDigital Library
- E. Juergens, F. Deissenboeck, and B. Hummel. Code similarities beyond copy & paste. In CSMR'10, 2010. Google ScholarDigital Library
- E. Juergens, F. Deissenboeck, B. Hummel, and S. Wagner. Do code clones matter? In ICSE'09, 2009. Google ScholarDigital Library
- R. Koschke. Identifying and removing software clones. In T. Mens and S. Demeyer, editors, Software Evolution. Springer, 2008.Google Scholar
- C. Lyon, R. Barrett, and J. Malcolm. A theoretical basis to the automated detection of copying between texts, and its practical implementation in the ferret plagiarism and collusion detector. In Plagiarism: Prevention, Practice and Policies Conference, 2004.Google Scholar
- M. F. Porter. An algorithm for suffix stripping. Program, 14(3):130--137, 1980.Google ScholarCross Ref
- C. K. Roy and J. R. Cordy. A survey on software clone detection research. Technical Report 2007--541, School of Computing Queen's University, 2007.Google Scholar
- M. Weber and J. Weisbrod. Requirements engineering in automotive development - Experiences and challenges. In RE'02, 2002. Google ScholarDigital Library
- J.-R. Wen, J.-Y. Nie, and H.-J. Zhang. Clustering user queries of a search engine. In WWW'01, 2001. Google ScholarDigital Library
- W. M. Wilson, L. H. Rosenberg, and L. E. Hyatt. Automated analysis of requirement specifications. In ICSE'97, 1997. Google ScholarDigital Library
- C. Wohlin, P. Runeson, and M. Höst. Experimentation in software engineering: An introduction. Kluwer Academic, Boston, Mass., 2000. Google ScholarDigital Library
Index Terms
- Can clone detection support quality assessments of requirements specifications?
Recommendations
MOQARE: misuse-oriented quality requirements engineering
This work presents MOQARE (misuse-oriented quality requirements engineering), a method to explore quality requirements. The aim of MOQARE is to support intuitive and systematic identification of quality requirements. It was developed by integrating and ...
Quality of Requirements Specifications
ICEIS 2014: Proceedings of the 16th International Conference on Enterprise Information Systems - Volume 2Requirements specifications describe multiple technical concerns of a system and are used throughout the project life-cycle to help sharing a common understanding among the stakeholders. In spite a lot of interest has been given to manage the ...
Quality of requirements specifications: a preliminary overview of an automatic validation approach
SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied ComputingRequirements specifications describe multiple technical concerns of a system and are used throughout the project life-cycle to help sharing a common understanding among the stakeholders. In spite a lot of interest has been given to manage the ...
Comments