skip to main content
10.1145/1984642.1984648acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

How do we trace requirements: an initial study of analyst behavior in trace validation tasks

Authors Info & Claims
Published:21 May 2011Publication History

ABSTRACT

Traceability recovery is a tedious, error-prone, person-power intensive task, even if aided by automated traceability tools. Human analysts must vet candidate traceability links retrieved by such tools and must often go looking for links that such tools fail to locate as they build a traceability matrix. This paper examines a research version of the traceability tool REquirements TRacing On target (RETRO) that logs analyst actions. We examine the user logs in order to understand how analysts work on traceability recovery tasks. Such information is a pre-requisite to understanding how to better design traceability tools to best utilize analyst time while developing a high quality final traceability matrix.

References

  1. Antoniol, G., Canfora, G., Casazza, G., De Lucia, A. and Merlo, E. 2002. Recovering traceability links between code and documentation. Software Engineering, IEEE Transactions on. 28, 10 (2002), 970--983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cleland-Huang, J., Chang, C.K., Sethi, G., Javvaji, K., Hu, H. and Xia, J. 2002. Automating Speculative Queries through Event-Based Requirements Traceability. Requirements Engineering, IEEE International Conference on (Los Alamitos, CA, USA, 2002), 289. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Cuddeback, D. Automated Requirements Traceability: the Study of Human Analysts. Ph.D. Thesis, Cal Poly, CA., 2010.Google ScholarGoogle Scholar
  4. Cuddeback, D., Dekhtyar, A., Hayes, J. H., Holden, J. and Kong, W. New Ideas and Emerging Results Track: Towards Overcoming Human Analyst Fallibility in the Requirements Tracing Process. Accepted, ICSE 2011 NIER track. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cuddeback, D., Dekhtyar, A. and Hayes, J. 2010. Automated Requirements Traceability: The Study of Human Analysts. Proceedings of the 2010 18th IEEE International Requirements Engineering Conference (Washington, DC, USA, 2010), 231--240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dekhtyar, A., Hayes, J. H. and Larsen, J. 2007. Make the Most of Your Time: How Should the Analyst Work with Automated Traceability Tools? Proceedings of the Third International Workshop on Predictor Models in Software Engineering (Washington, DC, USA, 2007), 4--. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Egyed, A., Graf, F. and Grunbacher, P. 2010. Effort and Quality of Recovering Requirements-to-Code Traces: Two Exploratory Experiments. Proceedings of the 2010 18th IEEE International Requirements Engineering Conference (Washington, DC, USA, 2010), 221--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gotel, O. and Finkelstein, C. 1994. An analysis of the requirements traceability problem. (1994), 94--101.Google ScholarGoogle Scholar
  9. Hayes, J. H. and Dekhtyar, A. 2005. Humans in the traceability loop: can't live with 'em, can't live without 'em. Proceedings of the 3rd international workshop on Traceability in emerging forms of software engineering (New York, NY, USA, 2005), 20--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hayes, J. H., Dekhtyar, A. and Osborne, J. 2003. Improving Requirements Tracing via Information Retrieval. Proceedings of the 11th IEEE International Conference on Requirements Engineering (Washington, DC, USA, 2003), 138--. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hayes, J. H., Dekhtyar, A. and Sundaram, S. 2005. Text mining for software engineering: how analyst feedback impacts final results. Proceedings of the 2005 international workshop on Mining software repositories (New York, NY, USA, 2005), 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hayes, J. H., Dekhtyar, A. and Sundaram, S. K. 2006. Advancing Candidate Link Generation for Requirements Tracing: The Study of Methods. IEEE Trans. Softw. Eng. 32, 1 (2006), 4--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hayes, J. H., Dekhtyar, A., Sundaram, S. K., Holbrook, E. A., Vadlamudi, S. and April, A. 2007. REquirements TRacing On target (RETRO): improving software maintenance through traceability recovery. ISSE. 3, 3 (2007), 193--202.Google ScholarGoogle Scholar
  14. Marcus, A. and Maletic, J. I. 2003. Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing. Software Engineering, International Conference on (Los Alamitos, CA, USA, 2003), 125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Tichy, W. F. 2000. Hints for Reviewing Empirical Work in Software Engineering. Emp. Softw. Engg. 5, (Dec. 2000), 309--312. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. How do we trace requirements: an initial study of analyst behavior in trace validation tasks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHASE '11: Proceedings of the 4th International Workshop on Cooperative and Human Aspects of Software Engineering
      May 2011
      100 pages
      ISBN:9781450305761
      DOI:10.1145/1984642

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 May 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHASE '11 Paper Acceptance Rate19of36submissions,53%Overall Acceptance Rate47of70submissions,67%

      Upcoming Conference

      ICSE 2025

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader