skip to main content
10.1145/1810295.1810389acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Change impact analysis from business rules

Published:01 May 2010Publication History

ABSTRACT

Impact analysis is the identification of the potential consequences of a change, or estimating what needs to be modified to accomplish a change, including related costs and schedule estimates. In this work, we distinguish between two kinds of concerns related to impact analysis: (1) business-specific concerns, those related to stakeholders interested in checking if other business rules are impacted by the change and also need to be modified; and (2) software-specific concerns, those related to stakeholders interested in the impacted software artifacts that need to be modified. Several traceability techniques have been studied and none of them supported impact analysis that dealt with business-specific concerns with reasonable values of precision and recall for the discovered impacts. Our research work aims to support business-specific concerns during impact analysis, by proposing and evaluating a traceability technique that resorts on a new traceability model defined over business rules, with expected precision and recall values of 100%.

References

  1. G. Antoniol et al. Recovering traceability links between code and documentation. IEEE Trans. Softw. Eng., 28(10):970--983, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. S. Arnold. Software Change Impact Analysis. IEEE Computer Society Press, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Cleland-Huang. Just enough requirements traceability. In COMPSAC'06: Proc. 30th Annual Intl Computer Software and Applications Conf., pages 41--42, Washington, DC, USA, 2006. IEEE Comp. Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Filho Oliveira et al. Em busca de agilidade na analise de impacto: O artefato fir. Latin America Transactions, IEEE, 6(3):275--281, July 2008.Google ScholarGoogle ScholarCross RefCross Ref
  5. B. R. Group. Business rules group (BRG) - http://www.businessrulesgroup.org.Google ScholarGoogle Scholar
  6. B. V. Halle. Business Rules Applied: Building Better Systems Using the Business Rules Approach. John Wiley & Sons, Inc., New York, NY, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Heindl et al. A case study on value-based requirements tracing. In ESEC/FSE-13: Proc. 10th ESEC13th ACM SIGSOFT Intl Symp. on Found. of Software Engineering, pages 60--69, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. Kasse. Practical Insight Into CMMI. Artech House, Boston, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. M. Lehman. Laws of software evolution revisited. In EWSPT '96: Proceedings of the 5th European Workshop on Software Process Technology, pages 108--124, London, UK, 1996. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Leite and M. C. Leonardi. Business rules as organizational policies. In IWSSD'98: Proc. 9th Intl Workshop on Software Specification and Design, page 68, Washington, DC, USA, 1998. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. U. A. Raja and K. Kamran. Framework for requirements traceability - tlfrt supporting pre-rs & post-rs traceability. Master's thesis, Blekinge Institute of Technology, School of Engineering, 2008.Google ScholarGoogle Scholar
  12. S. Rochimah et al. An evaluation of traceability approaches to support software evolution. In ICSEA'07: Proc. Intl Conf. on Software Engineering Advances, page 19, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Zemont. Towards Value-Based Requirements Traceability. PhD thesis, Dept. of Computer Science, De Paul University, 2005.Google ScholarGoogle Scholar

Index Terms

  1. Change impact analysis from business rules

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
              May 2010
              554 pages
              ISBN:9781605587196
              DOI:10.1145/1810295

              Copyright © 2010 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 May 2010

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate276of1,856submissions,15%

              Upcoming Conference

              ICSE 2025

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader