Ustory-Refactory: ferramenta de refatoração de requisitos aplicada em cartões user stories (CRC Cards)
AUTOR(ES)
Tiago da Silva Minuzzi
DATA DE PUBLICAÇÃO
2007
RESUMO
The emergence of new agile methodologies to support systems development, as the Extreme Programming (XP), has been causing impact on software development companies, specially for its flexibility in the requirements changes during the project. Thus, a better understanding and structural representation of the requirements become basic. Then, this research applies the concept of the code refactoring techniques, inside of the Requirements Engineering, which is focused at XP methodology, through the User Stories. The work applies a set of standards and rules that allows the requirements expressed in CRC cards to be refactored through pre and post-conditions, and the requirements are described for conceptual maps (CMaps) in OWL format. In their turn, the CMaps are converted into UML classes diagrams by the UML-MC that formalizes this transformation. This way, the UStory-Refactory environment partially automatizes the refactoring process and allows the refactored requirements to be exported in OWL format, promoting interoperability among diverse software systems. For the correct functioning of the solution it is necessary that it is used by a senior systems analyst, who has knowledge on software process construction. This guarantees the consistency and efficiency of the requirements refactoring
ASSUNTO(S)
software software engineering uml, ontology engenharia xp ciencia da computacao extreme programming programação extrema engenharia de requisito refatoração refactoring engineering requirement
ACESSO AO ARTIGO
http://bdtd.unisinos.br/tde_busca/arquivo.php?codArquivo=379Documentos Relacionados
- Construções semiolinguísticas do discurso sincrético em cartões telefônicos
- Aplicação do Modelo Multi-estado de Markov em Cartões de Crédito
- Aplicação de segurança eletrônica com java cards : o caso de um protocolo para registro online e sem anonimato em cartões criptograficamente inteligentes
- Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito
- Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito