DSW 602
Software Requirements Engineering (3G)
Spring 2013
Graduate School of Software
Ajou University
Last Update: March 1, 2013
Pre-requisite (Catalog
Description):
Full graduate standing, or consent of
the Department. Introduction to requirement engineering methodologies.
Topics include (Catalog
Description):
Requirements elicitation, specification, and validation;
structural, informational, behavioral, security, privacy, and computer user
interface requirements; scenario analysis; application of object-oriented
methodologies in requirements gathering; spiral development models; risk
management models; software engineering maturity model.
Instructor:
Prof. Seok-Won Lee
Tel: 031-219-3548
Email: leesw at
ajou.ac.kr (insert 'DSW 602' in the subject)
Office: Pal-Dal Hall #603
Office Hours: Wed. 3 - 5 PM.
Meeting Time & Location:
Wednesdays & Fridays, 1:30-3:00 PM, Pal-Dal Hall 407
Specific Course Objectives, Topics1 and Schedule2:
* State-of-the-art Requirements Engineering (RE) research:
theory,
practice, and applications : Definition, role and scope of RE in software and systems engineering, Current
techniques, notations, processes and tools used in RE; Gain practical experiences in selected RE techniques such as VORD (i.e.
through motivated class projects) and expose to innovative applications in
real-world problems
*
Understand the essential interdisciplinary nature of RE : Breadth of skills needed for RE, and the many other
disciplines on which it draws (i.e. knowledge engineering, information security/assurance,
GIS); Contextual factors & practicalities that affect the success
of various approaches to RE (i.e. problem solving, context-awareness issues)
*
Build a basic research background in RE : Methodological issues for RE research, Current research
issues and the direction of the field, survey of the literature
|
Date |
Course Topics
(Tentative1) |
Due |
Misc. |
1 |
3-6 3-8 |
Course Orientation & Introduction to Requirements Engineering |
|
Please read the provided materials before the class! |
2 |
3-13 3-15 |
Introduction to Requirements Engineering *B. A. Nuseibeh and S. M. Easterbrook, "Requirements Engineering: A Roadmap", In Proceedings of the ICSE '00. IEEE. *A. van Lamsweerde, "Requirements engineering in the year 00: a research perspective", In Proceedings of the ICSE '00. IEEE. |
|
|
3 |
3-20 3-22 |
Requirements Engineering Process
& Basics *Jackson, M. " The Meaning of Requirements." Annals of Software Engineering, Vol 3, pp5-21, Baltzer Science Publishers. 1997. Zave, P. and Jackson, M. " Four Dark Corners of Requirements Engineering." ACM Transactions on Software Engineering and Methodology 6(1) 1-30. ACM Press. 1997. |
|
Lead student: |
4 |
3-27 3-29 |
RE Process Part 1 - Requirements Elicitation and Analysis *Allenby, K. and Kelly, T. (2001). Deriving Safety Requirements Using Scenarios. Proceedings, Fifth IEEE International Symposium on Requirements Engineering (RE'01), Toronto, Canada, August 27-31, 2001. Pp228-235. IEEE Computer Society Press. *Hickey A.M., Davis, A. "Elicitation Technique Selection: How Do Experts
Do It?", Proceedings of the 11th IEEE International Requirements Conference.
2003. |
Project Proposal |
Lead student: |
5 |
4-3 4-5 |
RE Process Part 2 - Methods for Requirements Engineering
- Modeling and Analyzing Requirements (modeling, communications, agreement,
verification & validation) *van Lamsweerde, A. (2001) Goal-oriented requirements engineering: a guided tour. Proceedings, Fifth IEEE International Symposium on Requirements Engineering (RE'01), Toronto, Canada, August 27-31, 2001. Pages: 249-262. *Yu, E.S.K. (1997) Towards modelling and reasoning support for early-phase requirements engineering. Proceedings, Third IEEE International Symposium on Requirements Engineering (RE'97), Annapolis, USA, pp 226 -235. IEEE Computer Society Press. |
|
Lead student: |
6 |
4-10 4-12 |
Goal-based Requirements
Methods *Sutcliffe, A. “Scenario-based requirements analysis”, Requirements Engineering Journal, Vol 3(1), Springer-Verlag, 1995, pp: 48-65 개교 기념일 4-12 |
Domain modeling exercise |
Lead student: |
7 |
4-17 4-19
|
Viewpoints-oriented Requirements Methods Multi-paradigm Requirements Methods *Sommerville, I. and
Sawyer, P. Viewpoints: Principles, Problems and a Practical Approach to
Requirements Engineering. Annual Software Engineering, Vol. 3. pp.
101-130. 1997. |
|
|
8 |
4-24 4-26 |
Mid-term Exam |
|
|
9 |
5-1 5-3
|
Privacy / Security Requirements |
|
|
10 |
5-8
5-10 |
Secure Software Assurance - Requirements Engineering-based Approach
Liu, L., Yu E., Mylopoulos J.,
“Security and Privacy Requirements Analysis within a Social
Setting”, In Proceedings of the 11th International
Conference on Requirements Engineering (RE’03), pp.151-161, 2003
Premkumar T. Devanbu and Stuart
Stubblebine, “Software engineering for security: a roadmap”, In
Proceedings of the International Conference on Software Engineering
(ICSE '00),
|
|
|
11 |
5-15 5-17 |
Literature Survey Paper Presentation
Research paper discussion 석가 탄신일 (5-17) |
|
|
12 |
5-22 5-24 |
Literature Survey Paper Presentation Non-functional Requirements |
|
|
13 |
5-29 5-31 |
Non-functional Requirements
*Cysneiros, L.M. and Leite, J.C.S.P.
"Nonfunctional Requirements: From Elicitation to Conceptual Models",
IEEE Transactions on Software Engineering, Vol. 30, No. 5. May 2004.
Mylopoulos, J., Chung, L. and Nixon, B. "Representing and Using Nonfunctional Requirements: A Process-Oriented Approach", IEEE Trans on Software Engineering, Vol. 18, No. 6, June 1992.
|
|
Lead student:
|
14 |
6-5
6-7 |
|
|
Lead student:
|
15 |
6-12 6-14 |
Extending Requirements Engineering Distributed Requirements
Engineering
Glinz, M., “Problems and Deficiencies of UML as a Requirements
Specification Language,” In Proceedings of the 10th International
Workshop on Software Specification and Design (IWSSD-10). San Diego,
IEEE, pp 11-22, 2000
|
|
Lead student: Lead student: |
16 |
6-17 6-19 6-21 |
개교기념일, 석가 탄신일에 대한 보강일 (6-17) Term Project Paper Presentation I Term Project Paper Presentation II |
Due: |
|
1Additional topics will be introduced as time allows. 2Schedules may be changed.
Important Dates:
Mid-term: April 24, 2013. (during class hours)
Text Book (Optional):
1. Axel van Lamsweerde, Requirements Engineering: From System Goals to UML Models to Software Specifications, January 2009
& Michael Jackson, Software Requirements and Specification: a lexicon of practice, principles and prejudices, Addison-Wesley 1995. ISBN 0-201-87712-0
2. A collection of research articles will be handed out each week for reading and discussion. Each week, one or two students will be assigned to lead the discussion (w/ summary note).
Recommended Readings (Not Required):
3.
Gerald Kotonya, Ian Sommerville,
Requirements Engineering: Processes and Techniques,
ISBN: 0-471-97208-8,
August 1998,
John Wiley & Sons.
4. Michael Jackson,
Problem Frames: Analyzing and Structuring Software Development Problems,
Addison-Wesley, 2001.
5. Martin Fowler
UML Distilled: A brief guide to the
standard object modeling language, Third Edition, Addison-Wesley. 2003.
ISBN: 0-321-19368-7
6. Karl E. Wiegers,
Software Requirements, Second Edition, Microsoft, 2003.
7. Proceedings of the International Conference on Software Engineering (ICSE),
IEEE/ACM Press
8. Proceedings of the International Requirements Engineering Conference/Symposium (RE),
IEEE Computer Society Press
9. Requirements Engineering Journal by Springer
Online Resources:
-
Requirements Engineering Journal, Springer-Verlag
- Requirements
Engineering books reviews by I. Alexander
- Requirements Engineering Specialist Group
in UK
- IFIP Working Group 2.9
on Requirements Engineering
- INCOSE Requirements Engineering Group
- Requirements Engineering
resources from the IEEE Task Force on RE
- RE On-line
mailing list
Grading Policies:
Midterm: 30%
Oral Presentation & Class Discussion: 20%
Individual Project: 50%, Paper
format (ACM/IEEE paper format)
- Project Proposal/ Literature Survey:
20%
- Final Project Report/ Presentation/
Demonstration: 30%
Ph.D. students will have additional assignment
requirements.
Special Notes:
Academic Integrity: Refer to the University document.
Acknowledgements: Many thanks go to my colleagues in Software (Requirements) Engineering research community for providing opportunities to use research articles, tools, and online resources for this course.