Skip to main content

Supporting the Selection of Constraints for Requirements Monitoring from Automatically Mined Constraint Candidates

  • Conference paper
  • First Online:
Requirements Engineering: Foundation for Software Quality (REFSQ 2019)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11412))

Abstract

[Context and Motivation] Existing approaches, e.g., in the areas of specification mining and process mining, allow to automatically identify requirements-level system properties, that can then be used for verifying or monitoring systems. For instance, specifications, invariants, or constraints can be mined by analyzing source code or system logs. [Question/Problem] However, the usefulness of mining approaches is currently limited by (i) the typically high number of mined properties and (ii) the often high number of false positives that are mined from complex systems. [Principal Ideas/Results] In this paper, we present an approach that supports domain experts in selecting constraints for requirements monitoring by grouping, filtering, and ranking constraint candidates mined from event logs. [Contributions] Our tool-supported approach is flexible and extensible and allows users to experiment with different thresholds, configurations, and ranking algorithms to ease the selection of useful constraints. We demonstrate the usefulness and scalability of our approach by applying it to constraints mined from event logs of two complex real-world systems: a plant automation system and a cyber-physical system controlling unmanned aerial vehicles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cleland-Huang, J., Vierhauser, M., Bayley, S.: Dronology: an incubator for cyber-physical systems research. In: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, pp. 109–112. ACM (2018)

    Google Scholar 

  2. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2009)

    MATH  Google Scholar 

  3. Ernst, M., et al.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1), 35–45 (2007)

    MathSciNet  MATH  Google Scholar 

  4. Fahad, A., et al.: A survey of clustering algorithms for big data: taxonomy and empirical analysis. IEEE Trans. Emerg. Top. Comput. 2(3), 267–279 (2014)

    Google Scholar 

  5. Gabel, M., Su, Z.: Javert: fully automatic mining of general temporal properties from dynamic traces. In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 339–349. ACM (2008)

    Google Scholar 

  6. Krismayer, T.: Automatic mining of constraints for monitoring systems of systems. In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 924–927. ACM (2018)

    Google Scholar 

  7. Krismayer, T., Rabiser, R., Grünbacher, P.: Mining constraints for event-based monitoring in systems of systems. In: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pp. 826–831. IEEE (2017)

    Google Scholar 

  8. Lemieux, C., Park, D., Beschastnikh, I.: General LTL specification mining (T). In: Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, pp. 81–92. IEEE (2015)

    Google Scholar 

  9. Lo, D., Khoo, S.C., Han, J., Liu, C.: Mining Software Specifications: Methodologies and Applications. CRC Press, Boca Raton (2011)

    Google Scholar 

  10. Lo, D., Maoz, S.: Scenario-based and value-based specification mining: better together. Autom. Softw. Eng. 19(4), 423–458 (2012)

    Google Scholar 

  11. Maita, A.R.C., et al.: A systematic mapping study of process mining. Enterp. Inf. Syst. 12(5), 505–549 (2018)

    Google Scholar 

  12. Narayan, A., Cutulenco, G., Joshi, Y., Fischmeister, S.: Mining timed regular specifications from system traces. ACM Trans. Embed. Comput. Syst. 17(2), 46:1–46:21 (2018)

    Google Scholar 

  13. Rabiser, R., Thanhofer-Pilisch, J., Vierhauser, M., Grünbacher, P., Egyed, A.: Developing and evolving a DSL-based approach for runtime monitoring of systems of systems. Autom. Softw. Eng. 25(4), 875–915 (2018)

    Google Scholar 

  14. Robinson, W.: A requirements monitoring framework for enterprise systems. Requirements Eng. 11(1), 17–41 (2006)

    Google Scholar 

  15. Shoham, S., Yahav, E., Fink, S.J., Pistoia, M.: Static specification mining using automata-based abstractions. IEEE Trans. Softw. Eng. 34(5), 651–666 (2008)

    Google Scholar 

  16. van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169–194. Springer, Heidelberg (2012)

    Google Scholar 

  17. Vierhauser, M., Rabiser, R., Grünbacher, P.: Requirements monitoring frameworks: a systematic review. Inf. Softw. Technol. 80(December), 89–109 (2016)

    Google Scholar 

  18. Vierhauser, M., Rabiser, R., Grünbacher, P., Aumayr, B.: A requirements monitoring model for systems of systems. In: Proceedings of the 23rd IEEE International Requirements Engineering Conference, pp. 96–105. IEEE (2015)

    Google Scholar 

  19. Vierhauser, M., Rabiser, R., Grünbacher, P., Seyerlehner, K., Wallner, S., Zeisel, H.: ReMinds: a flexible runtime monitoring framework for systems of systems. J. Syst. Softw. 112, 123–136 (2016)

    Google Scholar 

  20. Weimer, W., Necula, G.C.: Mining temporal specifications for error detection. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 461–476. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  21. Xu, R., Wunsch, D.: Survey of clustering algorithms. IEEE Trans. Neural Netw. 16(3), 645–678 (2005)

    Google Scholar 

Download references

Acknowledgments

The financial support by the Austrian Federal Ministry for Digital and Economic Affairs, the National Foundation for Research, Technology and Development, and Primetals Technologies is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Krismayer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krismayer, T., Kronberger, P., Rabiser, R., Grünbacher, P. (2019). Supporting the Selection of Constraints for Requirements Monitoring from Automatically Mined Constraint Candidates. In: Knauss, E., Goedicke, M. (eds) Requirements Engineering: Foundation for Software Quality. REFSQ 2019. Lecture Notes in Computer Science(), vol 11412. Springer, Cham. https://doi.org/10.1007/978-3-030-15538-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15538-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15537-7

  • Online ISBN: 978-3-030-15538-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics