An Efficient Approach for Requirement Traceability Integrated With Software Repository
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 4
Abstract
Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques are applied on source code and requirements document to generate baseline traceability links. Concurrently, software repositories are also mined to generate validating traceability links i.e. Histrace links which are then called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking the experts and finds most traceable links. The proposed approach is able to improve the precision and recall values of the traceability links.
Authors and Affiliations
P. M. G. Jegathambal
Ict As A Change Agent For Socialization And Social Engineering
Abstract: The future communication has been predicted to depend to a great degree on electronic modes; academics businessmen and professionals in various fields, purpose, various uses of ICT facilities and new media gene...
Research Paper Selection Based On an Ontology and Text MiningTechnique Using Clustering
Abstract: Research Paper Selection is important decision making task for the Government funding Agency,Universities, research Institutes. Ontology is Knowledge Repository in which concepts and terms defined as well...
Cloud Computing –Its Prospects and Challenges
Abstract: The extensive use of information and communication technology has transformed manufacturing organizations and economies into information centric and customer focused organizations. In present times, the i...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example
Internet banking has gained wide acceptance internationally and seems to be fast catching up in India with more and more banks entering the fray. online banking is defined as the use of Internet as a remote  ...
Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques
Abstract: Analysis and interpretation of Myocardial infarction, is very important at the early stage to detect the possible risk for heart attacks. Various non-invasive imaging modalities have been used for better diagno...