skip to main content
10.1145/568760.568785acmotherconferencesArticle/Chapter ViewAbstractPublication PagessekeConference Proceedingsconference-collections
Article

Towards an inspection technique for use case models

Published:15 July 2002Publication History

ABSTRACT

A use case model describes the functional requirements of a software system and is used as input to several activities in a software development project. The quality of the use case model therefore has an important impact on the quality of the resulting software product. Software inspection is regarded as one of the most efficient methods for verifying software documents. There are inspection techniques for most documents produced in a software development project, but no comprehensive inspection technique exists for use case models. This paper presents a taxonomy of typical defects in use case models and proposes a checklist-based inspection technique for detecting such defects. This inspection technique was evaluated in two studies with undergraduate students as subjects. The results from the evaluations indicate that inspections are useful for detecting defects in use case models and motivate further studies to improve the proposed inspection technique.

References

  1. Anda, B., Dreiem, H., Sjøberg, D. I. K., and Jørgensen, M. Estimating Software Development Effort Based on Use Cases - Experiences from Industry. UML'2001, Toronto, Canada, October 1-5, 2001, LNCS 2185 Springer-Verlag, pp. 487-502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anda, B., Sjøberg, D. I. K. and Jørgensen, M. Quality and Understandability in Use Case Models. ECOOP'2001, June 18-22, 2001, LNCS 2072 Springer-Verlag, pp. 402-428. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Armour, F. and Miller, G. Advanced Use Case Modelling. Addison-Wesley, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cheng, B. and Jeffery, R. Comparing Inspection Strategies for Software Requirement Specifications. Proceedings Australian Software Engineering Conference. IEEE Comput. Soc, Los Alamitos, CA, USA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cockbum, A. Writing Effective Use Cases. Addison-Wesley, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. El Emam, K. and Laitenberger, O. Evaluating Capture-Recapture Models with Two Inspectors. IEEE Trans. on Softw. Eng., Vol. 27(9), pp. 851-864, September 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Fagan, M. E. Design and Code Inspections to Reduce Errors in Program Development. IBM Systems Journal, Vol. 15(3), pp. 182-211, 1976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gilb, T. and Graham, D. Software Inspection. Addison-Wesley, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hurlbut, R. R. A Survey of Approaches for Describing and Formalizing Use Cases. Technical Report: XPT-TR-97-03, Expertech, Ltd., 1997.Google ScholarGoogle Scholar
  10. Kulak, D. and Guiney, E. Use Cases: Requirements in Context. Addison-Wesley, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Laitenberger, O., Atkinson, C., Schlich, M. and El Emam, K. An experimental comparison of reading techniques for defect detection in UML design documents. Journal of Systems and Software, Vol. 53(2), pp. 183-204, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lanubile.F. and Visaggio, G. Assessing defect detection methods for software requirements inspections through external replication, ISERN-96-01, January 1996.Google ScholarGoogle Scholar
  13. Miller, J., Wood, M., Roper, M. and Brooks, A. Further Experiences with Scenarios and Checklists. Empirical Software Engineering, Vol. 3(1), pp. 37-64, January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Porter, A. A., Votta, L. G. and Basili, V. R. Comparing Detection Methods for Software Requirements Inspections: a Replicated Experiment. IEEE Trans. on Softw. Eng., Vol. 21(6), pp. 563-575, June 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sandahl, K, Blomkvist, O., Karlsson, J., Krysander, C., Lindvall, M. and Ohlsson, N. An Extended Replication of an Experiment for Assessing Methods for Software Requirements Inspections, Empirical Software Engineering, Vol. 3(4), pp. 327-354, December 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Schneider, G. and Winters, J. Applying Use Cases --- A Practical Guide. Addison-Wesley, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shull, F., Rus, I. and Basili, V. How Perspective-Based Reading Can Improve Requirements Inspections. IEEE Computer, Vol. 33(7), pp. 73-79, July 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Shull, F., Travassos, G. H., Carver, J. and Basili, V. R. Evolving a Set of Techniques for OO Inspections. CS-TR-4070 and UMIACS-TR-, October 1999.Google ScholarGoogle Scholar
  19. Sommerville, I. Software Engineering, 5th Ed. Addison-Wesley, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Thelin, T., Runeson, P. And Wohlin, C. An Experimental Comparison of Usage-Based and Checklist-Based Reading. WISE 2001.Google ScholarGoogle Scholar
  21. Yourdon, E. Structured Walkthroughs. Prentice-Hall, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. www.mcbreen.ab.ca/papers/QAUseCases.htmlGoogle ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SEKE '02: Proceedings of the 14th international conference on Software engineering and knowledge engineering
    July 2002
    859 pages
    ISBN:1581135564
    DOI:10.1145/568760

    Copyright © 2002 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 July 2002

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader