ABSTRACT
As software systems age, the requirements that motivated their original development get lost. Requirements documentation is unavailable or obsolete. Recapturing these requirements is critical for software reengineering activities. In our CelLEST process we adopt a data-mining approach to this problem and attempt to discover patterns of frequent similar episodes in the sequential run-time traces of the legacy user-interface behavior. These patterns constitute operational models of the application's functional requirements, from the end-user perspective. We have developed an algorithm, IPM, for interaction-pattern discovery. This algorithm discovers patterns that meet a user-specified criterion and is robust to insertion errors, caused by user mistakes or by the availability of alternative scenarios for the same user task. In this paper, we discuss IPM and we evaluate it with a case study.
- Agrawal, R. and Srikant, R.. Mining Sequential Patterns. In Proc. 11th Int. Conf. on Data Engineering, IEEE Computer Soc. Press, 1995, 3-14.]] Google ScholarDigital Library
- Baixeries, J., Casas, G. and Balcazar, J. L. Frequent Sets, Sequences, and Taxonomies: New, Efficient Algorithmic Proposals. Report Number: LSI-00-78-R, El departament de Llenguatges i Sistemes Informàtics, Universitat Politècnica de Catalunya, Spain, Dec. 2000.]]Google Scholar
- Cohen, W. Recovering Software Specifications with Inductive Logic Programming. In Proc. 12th National Conf. on Artificial Intelligence, AAAI Press, 1994, vol. 1, 142-148.]] Google ScholarDigital Library
- Di Lucca, G., Fasolino, A., and De Carlini, U. Recovering Use Case Models from Object-oriented Code: a Thread-based Approach. In Proc. 7th Working Conf. on Rev. Eng., 2000, IEEE Computer Soc. Press, 108-117.]] Google ScholarDigital Library
- El-Ramly, M., Iglinski, P., Stroulia, E., Sorenson, P. and Matichuk, B. Modeling the System-User Dialog Using Interaction Traces. In Proc. 8th Working Conf. on Rev. Eng., IEEE Computer Soc. Press, Oct. 2001, 208-217.]] Google ScholarDigital Library
- El-Ramly, M, Stroulia, E., and Sorenson, P. Mining System-User Interaction Traces for Use Case Models. In Proc. 10th Int. Workshop on Program Comprehension, June 2002, IEEE Computer Soc. Press.]] Google ScholarDigital Library
- Floratos, A. Pattern Discovery in Biology: Theory and Applications. Ph.D. Thesis, Department of Computer Science, New York University, Jan. 1999.]] Google ScholarDigital Library
- Jonassen, I. Methods for Finding Motifs in Sets of Related Biosequences. Dr. Scient Thesis, Dept. of Informatics, Univ. of Bergen, 1996,]]Google Scholar
- Kapoor, R. and Stroulia, E. Simultaneous Legacy Interface Migration to Multiple Platforms. In Proc. 9th Int. Conf. on Human-Computer Interaction, Lawrence Erlbaum Associates, Aug. 2001, vol. 1, 51-55.]]Google Scholar
- Lehman, M., Ramil, J., Wernick, P. and Perry, D. Metrics and Laws of Software Evolution --- The Nineties View. In Proc. 4th Int. Software Metrics Symposium, 1997, 20-32.]] Google ScholarDigital Library
- Liu K., Alderson, A. and Qureshi, Z. Requirements Recovery from Legacy Systems by Analysing and Modelling Behaviour. In Proc. Int. Conf. on Software Maintenance, Sep. 1999, IEEE Computer Soc. Press, 3-12.]] Google ScholarDigital Library
- Mannila, H., Toivonen, H. and Verkamo, A. Discovery of Frequent Episodes in Event Sequences. Data Mining and Knowledge Discovery, Nov. 1997, vol.1, no. 3, 259 - 289.]] Google ScholarDigital Library
- Mortazavi-Asl, B. Discovering and Mining User Web-page Traversal Patterns. M.Sc. Thesis, The School Of Computing Sci., Simon Fraser Univ., Canada, Apr. 2001.]]Google Scholar
- Rayson, P., Emmet, L., Garside, R., and Sawyer, P. The REVERE Project: Experiments with the Application of Probabilistic NLP to Systems Engineering. In Proc. 5th Int. Conf. on Applications of Natural Language to Information Systems, June 2000, 288-300.]] Google ScholarDigital Library
- Shao, J and Pound, J. C. Extracting Business Rules form Information Systems. BT Tech. J., Oct. 1999, vol. 17, no. 4]] Google ScholarDigital Library
- Stroulia, E., El-Ramly, M., Kong, L., Sorenson, P. and Matichuk, B. Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach. In Proc. 6th Working Conf. on Rev. Eng, 1999, IEEE Computer Soc. Press, 292-302.]] Google ScholarDigital Library
Recommendations
User Requirements and System Requirements
Stakeholders, analysts, and designers often fail to differentiate the roles of user and system requirements. Unfortunately, treating them as the same thing can create problems for projects. Here are three strategies for managing user and system ...
Knowledge-based system requirements
There is a growing demand both for greater 'ease of use' and 'support in use' as existing software packages are employed for more complex tasks. End users are faced with both the intricacies of the existing software, and the increasing complexity of the ...
Comments