skip to main content
10.1145/568760.568837acmotherconferencesArticle/Chapter ViewAbstractPublication PagessekeConference Proceedingsconference-collections
Article

Recovering software requirements from system-user interaction traces

Published:15 July 2002Publication History

ABSTRACT

As software systems age, the requirements that motivated their original development get lost. Requirements documentation is unavailable or obsolete. Recapturing these requirements is critical for software reengineering activities. In our CelLEST process we adopt a data-mining approach to this problem and attempt to discover patterns of frequent similar episodes in the sequential run-time traces of the legacy user-interface behavior. These patterns constitute operational models of the application's functional requirements, from the end-user perspective. We have developed an algorithm, IPM, for interaction-pattern discovery. This algorithm discovers patterns that meet a user-specified criterion and is robust to insertion errors, caused by user mistakes or by the availability of alternative scenarios for the same user task. In this paper, we discuss IPM and we evaluate it with a case study.

References

  1. Agrawal, R. and Srikant, R.. Mining Sequential Patterns. In Proc. 11th Int. Conf. on Data Engineering, IEEE Computer Soc. Press, 1995, 3-14.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Baixeries, J., Casas, G. and Balcazar, J. L. Frequent Sets, Sequences, and Taxonomies: New, Efficient Algorithmic Proposals. Report Number: LSI-00-78-R, El departament de Llenguatges i Sistemes Informàtics, Universitat Politècnica de Catalunya, Spain, Dec. 2000.]]Google ScholarGoogle Scholar
  3. Cohen, W. Recovering Software Specifications with Inductive Logic Programming. In Proc. 12th National Conf. on Artificial Intelligence, AAAI Press, 1994, vol. 1, 142-148.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Di Lucca, G., Fasolino, A., and De Carlini, U. Recovering Use Case Models from Object-oriented Code: a Thread-based Approach. In Proc. 7th Working Conf. on Rev. Eng., 2000, IEEE Computer Soc. Press, 108-117.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. El-Ramly, M., Iglinski, P., Stroulia, E., Sorenson, P. and Matichuk, B. Modeling the System-User Dialog Using Interaction Traces. In Proc. 8th Working Conf. on Rev. Eng., IEEE Computer Soc. Press, Oct. 2001, 208-217.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. El-Ramly, M, Stroulia, E., and Sorenson, P. Mining System-User Interaction Traces for Use Case Models. In Proc. 10th Int. Workshop on Program Comprehension, June 2002, IEEE Computer Soc. Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Floratos, A. Pattern Discovery in Biology: Theory and Applications. Ph.D. Thesis, Department of Computer Science, New York University, Jan. 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jonassen, I. Methods for Finding Motifs in Sets of Related Biosequences. Dr. Scient Thesis, Dept. of Informatics, Univ. of Bergen, 1996,]]Google ScholarGoogle Scholar
  9. Kapoor, R. and Stroulia, E. Simultaneous Legacy Interface Migration to Multiple Platforms. In Proc. 9th Int. Conf. on Human-Computer Interaction, Lawrence Erlbaum Associates, Aug. 2001, vol. 1, 51-55.]]Google ScholarGoogle Scholar
  10. Lehman, M., Ramil, J., Wernick, P. and Perry, D. Metrics and Laws of Software Evolution --- The Nineties View. In Proc. 4th Int. Software Metrics Symposium, 1997, 20-32.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Liu K., Alderson, A. and Qureshi, Z. Requirements Recovery from Legacy Systems by Analysing and Modelling Behaviour. In Proc. Int. Conf. on Software Maintenance, Sep. 1999, IEEE Computer Soc. Press, 3-12.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mannila, H., Toivonen, H. and Verkamo, A. Discovery of Frequent Episodes in Event Sequences. Data Mining and Knowledge Discovery, Nov. 1997, vol.1, no. 3, 259 - 289.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mortazavi-Asl, B. Discovering and Mining User Web-page Traversal Patterns. M.Sc. Thesis, The School Of Computing Sci., Simon Fraser Univ., Canada, Apr. 2001.]]Google ScholarGoogle Scholar
  14. Rayson, P., Emmet, L., Garside, R., and Sawyer, P. The REVERE Project: Experiments with the Application of Probabilistic NLP to Systems Engineering. In Proc. 5th Int. Conf. on Applications of Natural Language to Information Systems, June 2000, 288-300.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Shao, J and Pound, J. C. Extracting Business Rules form Information Systems. BT Tech. J., Oct. 1999, vol. 17, no. 4]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Stroulia, E., El-Ramly, M., Kong, L., Sorenson, P. and Matichuk, B. Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach. In Proc. 6th Working Conf. on Rev. Eng, 1999, IEEE Computer Soc. Press, 292-302.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SEKE '02: Proceedings of the 14th international conference on Software engineering and knowledge engineering
    July 2002
    859 pages
    ISBN:1581135564
    DOI:10.1145/568760

    Copyright © 2002 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 July 2002

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader