2009
DOI: 10.1007/978-3-642-02457-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-Based Requirements Conflicts Analysis in Activity Diagrams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…3. Analysis results based on type of requirements [13], [18]; structural model if graphical analysis is used like [20], [19], [8], [29]; or formalization methods which are different from schematic version in [3], structure requirements in [6], two canonical forms in [16], semi-formal ontology driven domain-special requirement language in [17], DSL in [20] and [19], OWL in [27], and EBNF in [21]. While some proposed techniques used more than one type of representation like [20], [19] which used ontology and DSL as formalization method, [27] used ontology, OWL as formalization method and goal graph as a structural model.…”
Section: B Comparing Between Exciting Workmentioning
confidence: 99%
“…3. Analysis results based on type of requirements [13], [18]; structural model if graphical analysis is used like [20], [19], [8], [29]; or formalization methods which are different from schematic version in [3], structure requirements in [6], two canonical forms in [16], semi-formal ontology driven domain-special requirement language in [17], DSL in [20] and [19], OWL in [27], and EBNF in [21]. While some proposed techniques used more than one type of representation like [20], [19] which used ontology and DSL as formalization method, [27] used ontology, OWL as formalization method and goal graph as a structural model.…”
Section: B Comparing Between Exciting Workmentioning
confidence: 99%
“…Ontology can be used in information systems, such as enabling communication among software agents (Guarino, 1998). Recently, ontology has been used to detect requirement conflicts in information systems development (Liu, 2009). Therefore ontology is useful for conflict detection in access control policies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…kind, composition, and antonym relationships). Using ontologies is a feasible and effective strategy for conflict detection (Liu, 2009). Social and tag setting includes users' social relations and web content tags.…”
Section: Introductionmentioning
confidence: 99%
“…A requirements engineer's goal is to keep the set of requirements consistent and up-to-date in the project duration [1]. Successful requirements engineering involves: understanding the needs of stakeholders, understanding the problem domain, providing specification templates and examples to ensure a high level of quality, maintaining a good relationship between stakeholders to fulfill user needs, validating that the documenting requirements match the collected requirements; managing requirements development, and assigning requirements engineering activities to skilled software engineers and team members for better performance [2][3][4]. A number of research studies have indicated that conflict resolution in requirements is a critical factor in project success [5].…”
Section: Introductionmentioning
confidence: 99%