Extended requirements traceability Results of an industrial case study
专升本英语单词词汇星火英语

专升本英语单词词汇星火英语Requirement Acquisition.Requirement acquisition is a crucial phase in the software development life cycle (SDLC) that involves eliciting, analyzing, documenting, and managing user and stakeholder requirements. It serves as the foundation for successful software development projects, ensuring that the end product aligns with the intended purpose and expectations.Elicitation Techniques.Effective requirement elicitation involves employing various techniques to gather information from stakeholders. These include:Interviews: Conducting one-on-one or group discussions to gather insights, opinions, and expectations from users.Document Analysis: Reviewing existing documents, such as business plans, process descriptions, and user stories, to identify potential requirements.Observation: Directly observing stakeholders in their work environment to gain a deeper understanding of their needs and behaviors.Prototyping: Creating interactive prototypes to provide stakeholders with a tangible representation of the proposed system, facilitating feedback and refinement.Brainstorming: Conducting group sessions to generate a wide range of ideas and potential requirements.Requirement Analysis and Prioritization.Once requirements have been elicited, they must be analyzed to ensure completeness, consistency, and feasibility. This involves:Classification: Categorizing requirements based ontheir type, such as functional, non-functional, or business requirements.Verification: Validating requirements against user expectations and ensuring that they are testable and verifiable.Prioritization: Establishing the relative importance of each requirement to guide development efforts.Traceability: Establishing relationships between requirements and other artifacts, such as design specifications and test cases, to ensure consistency and accountability.Requirement Management.Requirement management is an ongoing process that involves documenting, tracking, and controlling requirements throughout the SDLC. This includes:Requirement Documentation: Creating comprehensiverequirement specifications that clearly define the system's functionality, performance, and other characteristics.Requirement Change Management: Managing changes to requirements effectively to ensure that the system remains aligned with user needs.Requirement Verification and Validation: Regularly verifying and validating requirements to ensure their accuracy, completeness, and consistency.Requirement Prioritization and Traceability: Continuously prioritizing and tracing requirements throughout the development process to guide decision-making and ensure traceability.Benefits of Effective Requirement Acquisition.Effective requirement acquisition and management offer numerous benefits for software development projects, including:Increased Project Success: Clear and well-defined requirements reduce the likelihood of misinterpretation, rework, and project failure.Improved Stakeholder Satisfaction: Involving stakeholders in the requirement acquisition process increases their buy-in and ensures that their needs are met.Enhanced Software Quality: Accurate and complete requirements facilitate the development of high-quality software that meets user expectations.Reduced Development Costs: By identifying and addressing requirements upfront, development efforts can be streamlined, reducing overall project costs.Improved Project Management: Transparent and well-managed requirements provide a solid foundation for project planning, scheduling, and risk management.Conclusion.Requirement acquisition and management are critical to the success of any software development project. By effectively eliciting, analyzing, prioritizing, and managing requirements, organizations can increase project success, improve stakeholder satisfaction, enhance software quality, reduce development costs, and improve project management.。
ul_traceability_requirements

M A R K I N T E G R I T Y P R O G R A MUL Works to Support You Through:Why This Requirement is Important A key element in verifying compliance with UL requirements is determining that materials and components used in UL certified products are consistent with their descriptions in UL Follow-Up Services procedures. Determining compliance of materials and components usedin UL certified products is an important step in getting safer products to market. Additionally, maintaining the traceability of these materials and components helps support the ongoing integrity of the supply chain resulting in higher levels of confidence that materials being received meet sourcing requirements.RequirementsResponsibility It is a manufacturer’s responsibility to assure that all components and materials are as described in the UL Follow-Up Services procedure and to maintain all required records so they are readily available for review by a UL field representative. UL Field representatives will verify compliance to the applicable traceability programs and requirements specified in this document.UL Recognized ComponentsOverview This program provides traceability for a large and diversified group of components. Although they may be vastly different in form and function, components covered by this program meet all of the following criteria:• Subject to a third-party factory follow-up program• Incomplete in certain construction featuresor restricted in performance capabilities• Intended only for factory installation in end-productsor equipment where the limitations of use are knownto an end-product manufacturer• Not authorized to bear the UL Listing Mark or ULClassification MarkingMethod of Traceability Components covered under UL’s Component Recognition and Follow-Up Services programs are identified by a Recognized Component marking. Unless otherwise specified in a component’s published information, a Recognized Component marking consists of the following:• Recognized company identification/name• Recognized company catalog or model number Information about UL Recognized Components is publishedin the UL Recognized Component Directory available at /database. In addition to the Recognized company name and model number, components covered under this program may also bear the Recognized Component Mark for the United States, Canada or the combination Mark for the United States and Canada.UL Traceability RequirementsMaterial and Components Used for UL/C-UL/ULC Mark Follow-Up ServicesUL defines minimum requirements for material and components used in UL certified end products as part of its Follow-Up Services procedures. This document applies to all customers of UL’s product certification services for the U.S. and Canadian markets, i.e., UL/C-UL/ULC Mark certifications.Fabricated Parts (Category QMMY2)Overview UL’s fabricated parts traceability program covers material traceability for molded, encapsulated, potted and other fabricated plastic parts. This program is intended to provide quick verification of material identity through markings on a fabricated part.Component specifications are noted in individual end-product UL Follow-Up Services procedures. An end-product manufacturer must pay particular attention to the UL Follow-Up Services procedure to be sure that the component specifications are not compromised and continue to meet UL requirements, especially when molders or fabricators use additives, regrinds and recycled plastics.Method of Traceability Traceability is provided by meansof identification markings on a part, shipping carton or accompanying specification sheet that includes the following information:• UL-assigned designation• Name of molder/fabricator• Factory location, when more than one factory locationis used• Part identification• Date of molding or fabrication• Material manufacturer’s name and grade designations.This may be a code mutually agreed upon betweenan end-product/designated-party manufacturer anda molder/fabricatorSpooled Wire and CableOverview Wire and cable used in the production of UL certified products must be traceable to the original UL Mark (label) (typically affixed to the spool by adhesive or tag). Surface printing on the wire alone is not sufficient verification of UL wire certification. Traceability is often lost when the UL Mark (label) is separated from the spool and discarded. In order to avoid loss of traceability, the UL Mark (label) should always be kept with the spool/packaging.Method of Traceability To maintain traceability of wire and cable, verification from the wire back to the original UL spool label must be readily available. Manufacturers are encouraged to adopt the following practices to ensure traceability:• If the UL Mark (label) is affixed to outer wrapping,immediately staple or otherwise affix the tag with theUL Mark (label) to the wire reel upon removal ofthe wrapping• Request that the wire supplier affix the UL Mark (label)directly to the spool, rather than the outer wrap• Reject spools of wire that do not have UL Marks (labels)attached during incoming inspection• Communicate wire traceability requirements to personnel handling wire in productionProcessed Wire(Categories ZKLU, ZKLU2, ZKLU7 and ZKLU8) Overview This program provides traceability for various types of wire/cable that have been subjected to processing subsequent to original manufacturing and labeling. Wire in these categories originates as insulated wire that is then cut into specified lengths with insulation stripped from one or both ends and packaged for further processing. The stripped ends may be soldered or tinned and may have eyelet, ring, open spadeor quick-connect terminals attached by crimping, solderingor welding. This program can also cover wire that has been respooled into smaller quantities.Method of Traceability Traceability for wire that is covered under this program is through an appropriate UL certification mark on an attached tag, reel or smallest unit container in which product is packaged. In addition, tagmarking information provided by an original wire manufacturer is transferred onto tags provided by a wire processor. The certification marks applicable to this program include:• UL Listed processed wire• Respooled UL Listed processed wire• UL Classified processed wire• Respooled UL Classified processed wire• UL Recognized processed wire• Respooled UL Recognized processed wireWiring Harnesses (category ZPFW2)Overview This program provides traceability for wiring harnesses that are assembled at off-site locations and intended for use as factory installed components at anend-product manufacturing facility. They are defined as components consisting of two or more wires joined electrically and/or mechanically, and may include connectors, plugs, strain reliefs, splices, etc. When assembled at an off-site location, traceability for components used to construct a wiring harness is not possible at an end-product factory location. This program can be used to provide this traceability. Each wiring harnessis normally constructed in accordance with a harness diagram and is generally designed for a specific application that is indicated on a diagram or carton marking. These wiring harnesses are not intended for field installation. An assembly consisting solely of a cord set, power supply cord or power supply cord attached to an appliance, such as a motor, isnot eligible for coverage under this program.Method of Traceability An off-site fabricator assemblesa wiring harness in accordance with a harness diagram,print or other specification from an end-product manufacturer that details construction elements and components to be used in assembling a harness. A harness manufacturer will assemble a harness in accordance with these specifications and, provided that a wiring harness is in compliance with these specifications, it may be shipped with the UL Mark. Traceability for these construction elements is further determined at an end-product manufacturing location and involves verifying that these features comply with an end-product Follow-Up Services procedure.The UL Recognized Component Mark on the smallest bundle or unit container in which a product is packaged is the only method used to identify wiring harnesses manufactured under the UL Recognition and Follow-Up Service programs.Printed Wiring Board Assemblies (category ZPVI2) Overview This program provides traceability for printed wiringboard assemblies. It covers materials and components of assembled printed wiring boards, including a board itself, when these can only be identified at a board assembly location. This program is used when printed wiring boards are assembled remotely from an end-product manufacturing location and traceability of a board or its components is a concern. It is intended to address traceability of a UL Recognized board and/or components only. All other aspects of design, spacings, etc., are evaluated as part of the UL investigation ofend-use products.Method of Traceability An assembler is required to keep records to trace the identity of all materials and components from receipt through storage, inventory, withdrawal, assembly, packaging and shipping. Printed wiring assemblies covered under the category ZPVI2 are identified by an assembler’s name and UL code designation on a part, shipping container or included specification sheet. Relevant material and component manufacturer name and type designations are marked ona part, shipping container or accompanying documentation.In addition, assemblies covered under this program will also bear the UL Recognized Component Mark.High Technology Equipment Subassemblies (Category VZQC2)Overview This program provides traceability for high technology subassemblies, which are a group of components that constitute a portion of a complete component or product. They are limited to use in a specific group of high tech equipment including audio/visual equipment, information technology equipment and telephone equipment. This program is not intended to address subassemblies ordinarily covered under a separate UL certification program. These subassemblies are coveredunder their respective product categories.Method of Traceability Each subassembly is constructed and/or tested in accordance with a drawing or specification provided by an end-product manufacturer. In addition,a sub-assembler is required to keep records that will trace the identity of all components and materials identified ona drawing or specification from receipt through storage, assembly, packaging and shipping. Subassemblies covered under this program are identified by a UL-assigned code designation and a sub-assembler’s name and part identification. In addition, these subassemblies will also bear the UL Recognized Component Mark.Repackaged Product Program (Categories TEOW, TEOY, TEOZ, TEPC and TEOU2) Overview This program is intended to accommodate redistribution of bulk shipments of UL certified products. Through this program, the appropriate UL markings can be applied to new packaging for individual items or sub-lot quantities. It provides a solution for distributors, retailers, importers and manufacturers who redistribute bulk shipments to accommodate different customer needsand manage inventories. For further information on this program, please visit /repackaged/index.html. Split Inspection ProgramOverview The split inspection program provides a meansof traceability for components, materials and subassemblies that are manufactured or assembled at an off-site or contract manufacturing facility. This program is usually implemented when other UL programs do not resolve a specific traceability issue. Follow-Up Service inspections are conducted at these off-site factory locations to establish traceability for specific components, materials or assemblies.Method of Traceability These special components will be described in a UL Follow-Up Services procedure that contains specific instructions for inspections/verifications for each component. Upon verification of compliance with the inspection instructions, special components will be permitted to bear an agreed-upon special marking. This identification permits a UL field representative at an end-product manufacturing facility to accept these components as having been previously counterchecked, therefore avoiding any re-inspection.Document AuditOverview Other programs described in this document are the preferred methods for establishing traceability. However,UL recognizes that there may be isolated circumstances when document audits may be necessary. With a few exceptions, the document audit can be used only for a short period of time while a manufacturer implements another of UL’s traceability programs. For example, the document auditis not an acceptable long-term traceability method for verifying wire, cable, connectors, etc., when these products are assembled off-site. Another of the UL traceability programs describedin this document, e.g., wiring harnesses, processed wire or split inspection, must be established to address these traceability issues.The document audit program involves examining documentation and specifications to determine that components and materials comply with specified requirements. To be successful, a manufacturer’s procurement system must address the following:• When sourcing, an end-product manufacturermust provide a vendor or supplier with appropriatecomponent and material requirements• An end-product manufacturer must require that avendor/supplier provide confirmation with each productshipment that the components in the shipment meet the stated requirements• An end-product manufacturer must implement a method to address on-going verification – either through supplieraudits, incoming inspection, etc. – that all receivedcomponents and materials meet requirementsFollowing are some examples when document audit may be used on a continual basis:When a UL Certification Mark is on the Product,but it is Incomplete• Components with only the “UL in a circle” or theUL Recognized Component Mark on a product mayuse a vendor-supplied document to provide additionalinformation from the packaging for the UL certificationmarking along with all conditions or instructions provided on or within the original packaging. Examples include:– A fusible link has only the “UL in a circle” stampedin it: a supplier document can provide productcategory and control number from the requiredfour-element UL Listing Mark on the package alongwith the temperature rating stamped on the box– A fluorescent lamp holder has only the “UL ina circle” molded into it: a supplier documentcan provide product category and control numberfrom the required four-element UL Listing Mark onthe package along with “Suitable for Outdoor Use”as stamped on the package– A crimp terminal has only the “UL in a circle”stamped in it: a supplier document can providethe product category and control number from therequired four-element UL Listing Mark on thepackage along with all installation instructions,wire combination, required crimp tool and otherrestrictions noted on the packaging– Gasket material is cut in such a way that only theUL Component Recognition Mark can be identified:a supplier document can provide manufacturer’sname and model number to verify complianceThe document audit may be an acceptable method for validating traceability requirements on an on-going basis for UL certified components when the UL Mark is required anda part is marked with an indication of coverage by UL. Attribute Traceability When no Formal Program Exists• A document audit may be an acceptable meansof determining traceability for specific attributessuch as chemical formulations, metallurgical content,steel coating thickness, etc. A document audit is alsoacceptable for verifying elements described in the ULFollow-Up Services procedure used in the constructionof non-UL certified motors or transformers, including wire integral to the construction of such a device.However, a document audit is not acceptable forUL certified components requiring a certificationmark on the product or packaging. In addition,this approach is not an acceptable method for verifyingdimensions. UL expects that manufacturers maintain the capability to verify dimensions identified in Follow-UpService procedures. While statements of complianceprovided by s uppliers can help satisfy a manufacturer’srequirements for subcontractor control, these statements may not be the sole means of verification or used as arationale for a manufacturer to opt out of possessing theinspection, measuring and test equipment requiredto validate dimensions described in a Follow-UpServices procedure.Verification of Molded Plastic PartsUnless the use of a Recognized Component fabricated part (category QMMY2) is a required construction feature specified in an end-product Follow-Up Services procedure, a document audit can be used to verify plastic materials (raw material manufacturer’s name and grade designations) for plastic parts molded off-site. At a minimum, any documentation must provide sufficient information to determine that requirements defined in an end-product procedure are met. As a best practice, certificates of compliance or other documentation for plastic parts molded off-site should include the following:• Name of molder• Molding date• Shipment quantity• Material manufacturer’s name or trade nameand material designation• Percent of thermoplastic regrind used (1)• Color concentrates or other additives (2)• Name of company buying the product,i.e., end-product manufacturer• Part name or number• Specification number• Purchase order number or other means to properlylink a component to documentation• Shipment date• Manufacturer representative’s name, signatureor function to authorize and attest toinformation accuracy Notes1. Regrind is non-contaminated product or scrap suchas sprues and runners that have been reclaimedby shredding and granulating for use in-house.Thermoplastic regrind is limited to 25% by weight unlessthe specific material used is authorized for greater than25% as specified in the UL Recognized ComponentDirectory. Thermoset regrind is not acceptable at any level unless any content used is evaluated and authorizedI. Examples of common thermoplastics: Polyethylene,polycarbonate, polystyrene, polyamide, etc.II. Examples of common thermosets: Phenolic, epoxy,melamine resins, polyester fiberglass, vulcanizedrubber, etc.2. C olor concentrate use: A UL Recognized Base ResinMaterial may be pigmented by dry-blending withRecognized Color Concentrate or dyestuff providingthat the let-down ratio is not exceeded and that thecolor concentrate has been investigated for use withthe appropriate base resin materialFinally, if there are any additional construction elements specified in the description in the UL Follow-Up Service procedure, any certificate or documentation should also address these features.。
需求分析文档模板Requirements-Specification-Template

需求分析文档模板Requirements-Specification-Template[YourProject] Requirements SpecificationVersion 1.0February 21, 2020Use this Requirements Specification template to document the requirements for your product or service, including priority and approval. Tailor the specification to suit your project, organizing the applicable sections in a way that works best, and use the checklist to record the decisions about what is applicable and what isn't.The format of the requirements depends on what works best for your project.This document contains instructions and examples which are for the benefit of the person writing the document and should be removed before the document is finalized.To regenerate the TOC, select all (CTL-A) and press F9.c:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 2 o f 17Table of Contents1.EXECUTIVE SUMMARY (4)1.1P ROJECT O VERVIEW (4)1.2P URPOSE AND S COPE OF THIS S PECIFICATION (4)2.PRODUCT/SERVICE DESCRIPTION (4)2.1P RODUCT C ONTEXT (4)2.2U SER C HARACTERISTICS (4)2.3A SSUMPTIONS (4)2.4C ONSTRAINTS (4)2.5D EPENDENCIES (5)3.REQUIREMENTS (5)3.1F UNCTIONAL R EQUIREMENTS (6)3.2U SER I NTERFACE R EQUIREMENTS (7)3.3U SABILITY (7)3.4P ERFORMANCE (7)3.4.1Capacity (7)3.4.2Availability (7)3.4.3Latency (7)3.5M ANAGEABILITY/M AINTAINABILITY (8)3.5.1Monitoring (8)3.5.2Maintenance (8)3.5.3Operations (8)3.6S YSTEM I NTERFACE/I NTEGRATION (8)3.6.1Network and Hardware Interfaces (8)3.6.2Systems Interfaces (8)3.7S ECURITY (9)3.7.1Protection (9)3.7.2Authorization and Authentication (9)3.8D ATA M ANAGEMENT (9)3.9S TANDARDS C OMPLIANCE (10)3.10P ORTABILITY (10)ER SCENARIOS/USE CASES (10)5.DELETED OR DEFERRED REQUIREMENTS (10)6.REQUIREMENTS CONFIRMATION/STAKEHOLDER SIGN-OFF (12)APPENDIX (13)A PPENDIX A.D EFINITIONS,A CRONYMS, AND A BBREVIATIONS (13)A PPENDIX B.R EFERENCES (13)A PPENDIX C.R EQUIREMENTS T RACEABILITY M ATRIX (13)A PPENDIX D.O RGANIZING THE R EQUIREMENTS (16)c:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 3 o f 171. Executive Summary1.1 Project OverviewDescribe this project or product and its intended audience, or provide a link or reference to the project charter.1.2 Purpose and Scope of this SpecificationDescribe the purpose of this specification and its intended audience. Include a description of what is within the scope what is outside of the scope of these specifications. For example:In scopeThis document addresses requirements related to phase 2 of Project A:•modification of Classification Processing to meet legislative mandate ABC.•modification of Labor Relations Processing to meet legislative mandate ABC.Out of ScopeThe following items in phase 3 of Project A are out of scope:•modification of Classification Processing to meet legislative mandate XYZ.•modification of Labor Relations Processing to meet legislative mandate XYZ.(Phase 3 will be considered in the development of the requirements for Phase 2, but the Phase 3 requirements will be documented separately.)2. Product/Service DescriptionIn this section, describe the general factors that affect the product and its requirements. This section should contain background information, not state specific requirements (provide the reasons why certain specific requirements are later specified).2.1 Product ContextHow does this product relate to other products? Is it independent and self-contained? Does it interface with a variety of related systems? Describe these relationships or use a diagram to show the major components of the larger system, interconnections, and external interfaces.2.2 User CharacteristicsCreate general customer profiles for each type of user who will be using the product. Profiles should include:•Student/faculty/staff/other•experience•technical expertise•other general characteristics that may influence the product2.3 AssumptionsList any assumptions that affect the requirements, for example, equipment availability, user expertise, etc. For example, a specific operating system is assumed to be available; if the operating system is not available, the Requirements Specification would then have to change accordingly.2.4 ConstraintsDescribe any items that will constrain the design options, includingc:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 4 o f 17•parallel operation with an old system•audit functions (audit trail, log files, etc.)•access, management and security•criticality of the application•system resource constraints (e.g., limits on disk space or other hardware limitations) •other design constraints (e.g., design or other standards, such as programming language or framework)2.5 DependenciesList dependencies that affect the requirements. Examples:•This new product will require a daily download of data from X,•Module X needs to be completed before this module can be built.3. Requirements•Describe all system requirements in enough detail for designers to design a system satisfying the requirements and testers to verify that the system satisfies requirements. •Organize these requirements in a way that works best for your project. See Appendix DAppendix D, Organizing the Requirements for different ways to organize theserequirements.•Describe every input into the system, every output from the system, and every function performed by the system in response to an input or in support of an output. (Specify what functions are to be performed on what data to produce what results at what location for whom.)•Each requirement should be numbered (or uniquely identifiable) and prioritized.See the sample requirements in Functional Requirements, and System Interface/Integration, as well as these example priority definitions:Priority DefinitionsThe following definitions are intended as a guideline to prioritize requirements.•Priority 1 –The requirement is a “must have” as outlined by policy/law•Priority 2 – The requirement is needed for improved processing, and the fulfillment of the requirement will create immediate benefits•Priority 3 –The requirement is a “nice to have” which may include new functionality It may be helpful to phrase the requirement in terms of its priority, e.g., "The value of the employee status sent to DIS must be either A or I" or "It would be nice if the application warned the user that the expiration date was 3 business days away". Another approach would be to group requirements by priority category.• A good requirement is:•Correct•Unambiguous (all statements have exactly one interpretation)•Complete (where TBDs are absolutely necessary, document why the information is unknown, who is responsible for resolution, and the deadline)•Consistent•Ranked for importance and/or stability•Verifiable (avoid soft descriptions like “works well”, “is user friendly”; use concrete terms and specify measurable quantities)•Modifiable (evolve the Requirements Specification only via a formal change process, preserving a complete audit trail of changes)c:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 5 o f 17•Does not specify any particular design•Traceable (cross-reference with source documents and spawned documents).3.1 Functional RequirementsIn the example below, the requirement numbering has a scheme - BR_LR_0## (BR for Business Requirement, LR for Labor Relations). For small projects simply BR-## would suffice. Keep in mind that if no prefix is used, the traceability matrix may be difficult to create (e.g., no differentiation between '02' as a business requirement vs. a test case)The following table is an example format for requirements. Choose whatever format works best for your project.For Example:c:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 6 o f 173.2 User Interface RequirementsIn addition to functions required, describe the characteristics of each interface between the product and its users (e.g., required screen formats/organization, report layouts, menu structures, error and other messages, or function keys).3.3 UsabilityInclude any specific usability requirements, for example,Learnability•The user documentation and help should be complete•The help should be context sensitive and explain how to achieve common tasks•The system should be easy to learn(See /)3.4 PerformanceSpecify static and dynamic numerical requirements placed on the system or on human interaction with the system:•Static numerical requirements may include the number of terminals to be supported, the number of simultaneous users to be supported, and the amount and type of information to be handled.•Dynamic numerical requirements may include the number of transactions and tasks and the amount of data to be processed within certain time period for both normal and peak workload conditions.All of these requirements should be stated in measurable form. For example, "95% of the transactions shall be processed in less than 1 second" rather than “an operator shall not have to wait for the transaction to complete”.3.4.1 CapacityInclude measurable capacity requirements (e.g., the number of simultaneous users to be supported, the maximum simultaneous user load, per-user memory requirements, expected application throughput)3.4.2 AvailabilityInclude specific and measurable requirements for:•Hours of operation•Level of availability required•Coverage for geographic areas•Impact of downtime on users and business operations•Impact of scheduled and unscheduled maintenance on uptime and maintenance communications procedures•reliability (e.g., acceptable mean time between failures (MTBF), or the maximum permitted number of failures per hour).3.4.3 LatencyInclude explicit latency requirements, e.g., the maximum acceptable time (or average time) for a service request.c:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 7 o f 173.5 Manageability/Maintainability3.5.1 MonitoringInclude any requirements for product or service health monitoring, failure conditions, error detection, logging, and correction.3.5.2 MaintenanceSpecify attributes of the system that relate to ease of maintenance. These requirements may relate to modularity, complexity, or interface design. Requirements should not be placed here simply because they are thought to be good design practices.3.5.3 OperationsSpecify any normal and special operations required by the user, including:•periods of interactive operations and periods of unattended operations•data processing support functions•backup and recovery operations•safety considerations and requirements•disaster recovery and business resumption3.6 System Interface/IntegrationSpecify the use of other required products (e.g., a database or operating system), and interfaces with other systems (e.g., UWHires package interfaces with PubCookie and ODS, HEPPS system interfaces with Budget system). For each interface, define the interface in terms of message format and content. For well-documented interfaces, simply provide a reference to the documentation.Outline each interface between the product and the hardware or network components of the system. This includes configuration characteristics (e.g., number of ports, instruction sets), what devices are to be supported, and protocols (e.g., signal handshake protocols).3.6.1 Network and Hardware InterfacesSpecify the logical characteristics of each interface between the product and the hardware or network components of the system. This includes configuration characteristics (e.g., number of ports, instruction sets), what devices are to be supported, and protocols (e.g., signal handshake protocols).3.6.2 Systems InterfacesExample systems interface requirements:A. System1-to-System2 InterfaceThe <external party> will create and send a fixed length text file as an email attachment toSystem2mail@ to be imported into the System2 system for payroll calculation.This file must be received on EDIT day by 4:00 PM in order to be processed in the EDIT night run.The requirements below document the file specifications, data transfer process, and specificschedule. This file is referred to as "FileName" in this document.c:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 8 o f 17File Structure and FormatA1. The FileName file is a fixed length text file.A2. The FileName file is an unformatted ASCII file (text-only).A3. The FileName file contains a batch totals record and several detail records.File Description: Batch Totals RecordA4. The batch totals record can be placed at the beginning, in the middle, or at the end of the file.A5. The batch totals record contains the following:•Record Type (value: XA)•Process Type (value: A)•Batch Number (3 digit number assigned by Payroll Dept)•Origin Code (AIG)•Total number of detail records•Total deduction amountFile Description: Detail RecordsA6. The FileName file contains a row for each record meeting xxx criteria.A7. Each row in the FileName file contains the following fields, comma-delimited and encased in double-quotes where the data includes commas or spaces:•Employee Id•Record Type•Process Date (MMDDYY)•XYG Number•Element Code•Amount•Amount Sign•Year Flag•Total Amount•Total Amt Sign3.7 Security3.7.1 ProtectionSpecify the factors that will protect the system from malicious or accidental access, modification, disclosure, destruction, or misuse. For example:•encryption•activity logging, historical data sets•restrictions on intermodule communications•data integrity checks3.7.2 Authorization and AuthenticationSpecify the Authorization and Authentication factors. Consider using standard tools such as PubCookie.3.8 Data ManagementSpecify the requirements for any information that is to be placed into a database, including •types of information used by various functions•frequency of use•data access rulesc:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 9 o f 17•data entities and relationships•integrity constraints•data retention•valid range, accuracy, and/or tolerance•units of measure•data formats•default or initial values3.9 Standards ComplianceSpecify the requirements derived from existing standards, policies, regulations, or laws (e.g., report format, data naming, accounting procedures, audit tracing). For example, this could specify the requirement for software to trace processing activity. Such traces are needed for some applications to meet minimum regulatory or financial standards. An audit trace requirement may, for example, state that all changes to a payroll database must be recorded in a trace file with before and after values.3.10 PortabilityIf portability is a requirement, specify attributes of the system that relate to the ease of porting the system to other host machines and/or operating systems. For example,•Percentage of components with host-dependent code;•Percentage of code that is host dependent;•Use of a proven portable language;•Use of a particular compiler or language subset;•Use of a particular operating system;•The need for environment-independence - the product must operate the same regardless of operating systems, networks, development or production environments.4. User Scenarios/Use CasesProvide a summary of the major functions that the product will perform. Organize the functions to be understandable to the customer or a first time reader. Include use cases and business scenarios, or provide a link to a separate document (or documents). A business scenario: •Describes a significant business need•Identifies, documents, and ranks the problem that is driving the scenario•Describes the business and technical environment that will resolve the problem•States the desired objectives•Shows the “Actors” and where they fit in the business model•Is specific, and measurable, and uses clear metrics for success5. Deleted or Deferred RequirementsIdentify any requirements that have been deleted after approval or that may be delayed until future versions of the system. For example:c:\iknow\docshare\data\cur_work\1114012273.doc February 21, 2020 Page 10 o f 176. Requirements Confirmation/Stakeholder sign-offInclude documentation of the approval or confirmation of the requirements here. For example:APPENDIXThe appendixes are not always considered part of the actual Requirements Specification and are not always necessary. They may include•Sample input/output formats, descriptions of cost analysis studies, or results of user surveys;•Supporting or background information that can help the readers of the Requirements Specification;• A description of the problems to be solved by the system;•Special packaging instructions for the code and the media to meet security, export, initial loading, or other requirements.When appendixes are included, the Requirements Specification should explicitly state whether or not the appendixes are to be considered part of the requirements.Appendix A. Definitions, Acronyms, and AbbreviationsDefine all terms, acronyms, and abbreviations used in this document.Appendix B. ReferencesList all the documents and other materials referenced in this document.Appendix C. Requirements Traceability MatrixThe following trace matrix examples show one possible use of naming standards for deliverables (FunctionalArea-DocType-NN). The number has no other meaning than to keep the documents unique. For example, the Bargaining Unit Assignment Process Flow would be BUA-PF-01.For example (1):Appendix D. Organizing the RequirementsThis section is for information only as an aid in preparing the requirements document.Detailed requirements tend to be extensive. Give careful consideration to your organization scheme. Some examples of organization schemes are described below:By System ModeSome systems behave quite differently depending on the mode of operation. For example, a control system may have different sets of functions depending on its mode: training, normal, or emergency.By User ClassSome systems provide different sets of functions to different classes of users. For example, an elevator control system presents different capabilities to passengers, maintenance workers, and fire fighters.By ObjectsObjects are real-world entities that have a counterpart within the system. For example, in a patient monitoring system, objects include patients, sensors, nurses, rooms, physicians, medicines, etc. Associated with each object is a set of attributes (of that object) and functions (performed by that object). These functions are also called services, methods, or processes. Note that sets of objects may share attributes and services. These are grouped together as classes.By FeatureA feature is an externally desired service by the system that may require a sequence of inputs to affect the desired result. For example, in a telephone system, features include local call, call forwarding, and conference call. Each feature is generally described in a sequence ofstimulus-response pairs, and may include validity checks on inputs, exact sequencing of operations, responses to abnormal situations, including error handling and recovery, effects of parameters, relationships of inputs to outputs, including input/output sequences and formulas for input to output.By StimulusSome systems can be best organized by describing their functions in terms of stimuli. For example, the functions of an automatic aircraft landing system may be organized into sections for loss of power, wind shear, sudden change in roll, vertical velocity excessive, etc.By ResponseSome systems can be best organized by describing all the functions in support of the generation of a response. For example, the functions of a personnel system may be organized into sections corresponding to all functions associated with generating paychecks, all functions associated with generating a current list of employees, etc.By Functional HierarchyWhen none of the above organizational schemes prove helpful, the overall functionality can be organized into a hierarchy of functions organized by common inputs, common outputs, or common internal data access. Data flow diagrams and data dictionaries can be used to show the relationships between and among the functions and data.Additional CommentsWhenever a new Requirements Specification is contemplated, more than one of the organizational techniques given above may be appropriate. In such cases, organize the specific requirements for multiple hierarchies tailored to the specific needs of the system under specification.There are many notations, methods, and automated support tools available to aid in the documentation of requirements. For the most part, their usefulness is a function of organization. For example, when organizing by mode, finite state machines or state charts may prove helpful; when organizing by object, object-oriented analysis may prove helpful; when organizing by feature, stimulus-response sequences may prove helpful; and when organizing by functional hierarchy, data flow diagrams and data dictionaries may prove helpful.。
【实用文档】TRACEABILITY

Definitions :* The 3 parts of the traceability (upstream, internal and downstream ) are totally linked .For memory :-Upstream Traceability = from DANONE to its suppliers-Internal Traceability = from the material reception to final products deliveries (it can be rising [to the raw materials] or going down [to the final Products] )-Downstream Traceability = from the deliveries to the consumer (it’s going down [to the customers] or rising [from consumers to DANONE] )* Identification (static) and traceability (dynamic) are different .* DANONE rules are :1.Downstream TraceabilityRule N° 1 :Danone must be able to retrieve 100% :♦of products manufactured (delivered or not)♦of products sold (manufactured or co-packed, delivered by Danone or other)♦as far as first stage of retailer system (eg Customer Warehouse)♦including Export and other ways of sale♦within 1 day(max.) of incident notification – in practise 2/3 hrs forFrance.Priorities+ Danone brand world-wideInternational Danone brands (e.g. Danon(e), Evian, Volvic,Ferrarelle, … )Other Group brands – prioritised if necessary by Pole.-Retailer’s BrandsRule N° 1 bis :Danone must be able to have samples of each finished product ( Local‘reference library’ ) retain ed for duration of shelf-life.(the minimum being : 2 bottles per team and per line, except for the 5 gallons, too large to stock) .Rule N° 2 : Ensure the interface with customer. (to conserve the traceability chain) :DANONEWATER WWBU QUALITY STANDARD, TECHNICAL REQUIREMENT3- FOOD SAFETY T ECHNOLOGY C ENTERWriter Arnaud CLEVY3.3- TRACEABILITY Requirement Date d18/m8/y2000Refer. WTC FS 3.3-2 Update d 23/m10/y2001 Unit of consumption must include the means, visible to the consumer, reliable andinstantly recognisable to identify:-(a)Day of manufacture (link with BB Day)(b)Line of manufacture (link with factory)(c)Hour and Minute of packingUnit of sale must include (out of the usual and legal information) :♦ Contact address (according to local legislation)♦ Contact Telephone number appropriate to country of sale♦ For single variety: (a) and (b) as above (if pack is transparent, noadded information on it)♦ For mixed variety: (a) as above (if shelf-lives are different, theshort one is put on)Cartons/Outers/Cases etc must include (a) and (b) if the unit of sale is not visible.Pallets must each have:-♦ Computerised label♦ Conforming to STD EAN 128/SSCC♦ With direct reading of : Unique pallet numberProduct nameSell By DateSystems requirements♦ Computerised identification of: Pallet (complete & ‘picked’)Cartons/Cases (if coded)and facility to monitor movement of product between sites (‘In’and ‘Out’) wit hin Danone circuit + co-packers + contracteddistributionPriorities for “going on traceability”:+ * UC identification (sell by date, factory)* pallets identification- * Phone number for overseas export2. Upstream traceability :Rule N° 3 : Be able to adapt traceability system to the level of critical for materialsList raw materials and materials in direct contact with product according to following risk criteria ( with questions about presence/contact with the product; naturaltoxicity; %incorporation; process effect; risks perception; previous crisis…) :→Critical (PET, PP, PC, Preform, bottles, caps, and allingredients as minerals, flavor, sugar, preservative..)→Minor (others…)Critical ♦ Log all delivery information from supplier (code, date etc.)♦Trace incorporation into product (start and end time), ideally via.Computerized system.Minor ♦ Record delivery information/Supplier/Batch No.For raw materials and contact materials deeme d ‘Critical’ :♦Determine, with input from CSA, measures to be taken bySuppliers and by Danone to control identified risks and incorporatethese into specification (as close as possible to the “first harvest orindustrial operation” ).♦ Monitor suppliers via. regular audits to ensure compliance.For every material : follow FIFO rule3. Internal traceability :Rule N° 4 : Develop an internal traceability system coherent to the downstream and upstream rules .Find the industrial practices could disturb the downstream function , and solution .0O0。
在系统工程中建立与维护需求跟踪矩阵(RTM)的技术

在系统工程中建立与维护需求跟踪矩阵(RTM)的技术Establish and Maintain Requirements Traceability Matrix (RTM) Technology In the Systems Engineering为了确保工作产品与需求保持一致,需要建立起二者之间的追溯关系。
在系统工程中,一般可以通过建立与维护需求跟踪矩阵的技术方法来管理需求之间的“垂向”与“水平向”关系。
建立与维护需求与工作产品之间的双向可追溯性,能够确保需求到产品实现的无遗漏和减小偏离,并有助于变更影响分析、覆盖率分析、来源分析、质量分析等,从而提高需求管理效率,减少返工量,降低项目失败的风险。
In order to ensure that the work products and requirements keeps consistent, need to establish the trace relationship between requirements. In the systems engineering, the general can through the establishment and maintenance Requirements Traceability Matrix technical way to manage requirements between "vertical" and "horizontal" relationship. Establish and maintain the requirements and work products between the bidirectional traceability, can ensure that requirement to the product realization of complete and reduce deviation, and help to change the impact analysis, coverage analysis, the source analysis, quality analysis and so on, so as to improve requirements management efficiency and reduce rework amount, reduce the project the risk of failure.需求跟踪矩阵(以下简称RTM,即Requirements Traceability Matrix)是指在系统工程中建立起的需求与相关需求、设计、实现及验证之间双向可追溯的矩阵关系,是确保需求开发和需求管理有效性的重要技术方法。
traceability analysis

traceability analysisTraceability AnalysisIntroductionTraceability analysis is the process of tracking and documenting the relationships between requirements, design, code, and testing artifacts. It is an essential part of software development that ensures that every requirement is met and every change made to the system can be traced back to its origin. Traceability analysis provides a clear understanding of how each artifact in the development process contributes to the final product.Benefits of Traceability AnalysisThere are several benefits of traceability analysis, including:1. Improved Quality: Traceability analysis ensures that all requirements are met and all changes are properly documented. This leads to a higher quality product that meets customer expectations.2. Increased Productivity: By providing a clear understanding ofhow each artifact contributes to the final product, traceability analysis reduces rework and improves productivity.3. Better Communication: Traceability analysis promotes better communication between stakeholders by providing a common language for discussing requirements, design, code, and testing artifacts.4. Regulatory Compliance: Traceability analysis is often required by regulatory bodies to ensure that software meets safety and security standards.Traceability MatrixA traceability matrix is a tool used in traceability analysis to track the relationships between requirements, design, code, and testing artifacts. It provides a visual representation of how each artifact contributes to the final product.A traceability matrix typically includes:1. Requirements: A list of all requirements for the system.2. Design Elements: A list of all design elements that satisfy eachrequirement.3. Code Elements: A list of all code elements that implement each design element.4. Test Cases: A list of all test cases that verify each requirement.By using a traceability matrix, developers can easily track changes made throughout the development process and ensure that every requirement is met.Traceability Analysis ProcessThe following steps describe an effective process for performing traceability analysis:1. Identify Requirements: The first step in traceability analysis is to identify all requirements for the system. This includes functional and non-functional requirements.2. Create a Traceability Matrix: Once all requirements are identified, create a traceability matrix that tracks the relationships between requirements, design, code, and testing artifacts.3. Link Artifacts: Link each artifact in the traceability matrix to its corresponding requirement. This ensures that every requirement is met and every change can be traced back to its origin.4. Update Traceability Matrix: As changes are made throughout the development process, update the traceability matrix to reflect these changes.5. Perform Impact Analysis: Use the traceability matrix to perform impact analysis on any changes made to the system. This ensures that all affected artifacts are properly updated and tested.ConclusionTraceability analysis is an essential part of software development that ensures that every requirement is met and every change made to the system can be traced back to its origin. By using a traceability matrix and following an effective process for performing traceability analysis, developers can improve quality, increase productivity, promote bettercommunication between stakeholders, and ensure regulatory compliance.。
Identification and traceability标识和可追溯性控制程序(中英文)

1.0 PURPOSE 目的1.1 This procedure defines the product Identification and Traceability system to prevent unintendeduse and ensure the traceability for production and quality.定义产品标识和追溯性系统,防止产品混用,确保对产品质量及形成的过程实现可追溯性。
2.0 SCOPE 范围2.1 Apply to the materials, semi-products and finished products.适用于原料,半成品及成品的标识和追溯。
3.0 DEFINITIONS 定义3.1 Product identification: make clear and understandable mark by special number, part number orcomparable mark and status mark.产品标识:通过特定的编号、零件号、或可比较的记号和状态标记,对产品做出清楚的、易理解的标记。
3.2 Traceability: the capability to trace the history, application or location, it refers to resource ofmaterial and component, manufacturing process, distribution status of delivered products.可追溯性:追溯产品的历史、应用情况或所处场所的能力,涉及材料和零件的来源、加工过程、交付后产品的分布状况。
4.0 REFERENCE DOCUMENTS 参考文件4.1 ISO/TS 16949 Clause 7.5.3 Identification and Traceability 标识和可追溯性5.0 RECORDS 记录5.1 FN-AS-003 Production batch record form《生产批号记录表》6.0 RESPONSIBILITY 职责6.1 Program department create part number.项目部负责创建材料和产品料号。
3GPP 5G基站(BS)R16版本一致性测试英文原版(3GPP TS 38.141-1)

4.2.2
BS type 1-H.................................................................................................................................................. 26
4.3
Base station classes............................................................................................................................................27
1 Scope.......................................................................................................................................................13
All rights reserved. UMTS™ is a Trade Mark of ETSI registered for the benefit of its members 3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners LTE™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM Association
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Extended Requirements Traceabil ity:Resul ts of an Industrial Case StudyOrlena Gotel & Anthony Fink elsteinDepartment of Computer Sci enceCi ty Uni versi tyNorthampton SquareLondon EC1V 0HB[olly|acwf]@AbstractContri buti on structures offer a way to model the network ofpeople who have participated in the requi rements engi neeri ngprocess. They further provide the opportunity to extendconventi onal forms of artifact-based requi rements traceabi li tywith the traceability of contri buti ng personnel. In this paper, wedescribe a case study that investigated the modelli ng and use ofcontribution structures in an i ndustri al project. In particular, wedemonstrate how they made it possible to answer previouslyunanswerable questions about the human source(s) ofrequi rements. In so doing, we argue that this i nformati onaddresses important problems currently attributed to inadequaterequi rements traceabi li ty.1.IntroductionThe inability to answer questions regarding the human source(s) of requi rements i nformati on has been found to result i n claims of requirements traceability problems [5]. An approach to address this problem was presented in [6]. Thi s paper describes a case study designed to evaluate, through demonstrati on, whether use of the approach helps answer practitioner’s outstandi ng questions and, in so doing, allevi ates an i mportant class of requi rements traceability problems. The case study is based on materi al gathered from a real industrial project over a period of three years.In Secti on 2, we explain what requi rements traceability is and describe the underlyi ng reason for long-term requi rements traceability problems. W e provide examples of the kind of questions that are problematic to answer as a consequence. We then outli ne an approach to address this fundamental problem and summari se how it is anticipated to provide answers that satisfy practitioners’ needs. In Secti on 3, we describe the case study materi al used to validate our claim. Since the approach was not in existence at the onset of the project, its requirements did not drive the data gathering. From the extensi ve records that were mai ntai ned, we only summari se that data perti nent to the approach. In Secti on 4, we demonstrate how the approach was applied in a post-hoc manner to this data, thereby reveali ng i nformati on about the project’s evoluti on. In Secti on 5, we show how this i nformati on makes i t possible to answer questions about the project regarding involvement, responsibility, ramifications, change notification and work ing relationships. Due to the manner in whi ch the approach was applied, we are only in a posi ti on to validate the feasibility of the approach and the usefulness of the i nformati on it provides in a hi stori cal and subjecti ve manner. Another repercussi on of not being on the project’s critical path is that we can only suggest how the i nformati on could be used, say to assist the mai ntenance process. Based on our experiences and practitioners’ comments, we highlight some outstandi ng issues in Secti on 6, then make recommendati ons for uptake.2.Contribution structures for requirements traceabilityIn this section, we describe what requi rements traceability is, why it is important and what the problems with it are. We then outline an approach to address a fundamental problem that currently makes it difficult to recover i nformati on about the human source(s) of requi rements i nformati on.2.1.Requirements traceabilityRequirements traceability refers to the ability to describe and follow the life of a requi rement in both a forwards and backwards direction (i.e., from i ts origins, through its development and specification, to its subsequent deployment and use, and through periods of on-going refi nement and i terati on in any of these phases). It is considered the primary techni que to help with many project-related acti vi ti es, like ensuri ng that systems andsoftware conform to their changing requi rements, but is commonly cited as a problem area by practitioners.Although the number of tools that clai m to support requi rements traceabi li ty is growing, some more recent ones being described in [10, 11, 14, 15], the schemes that need to be established prior to their use have received rather less attenti on. Wi th few exceptions, examples being the requi rements traceabi li ty models of the U.S. DoD [8, 9] and the requi rements traceability meta models arising from the NATURE project [12], endeavours to i mprove the potential for requi rements traceabi li ty have mostly i nvolved uncoveri ng and recordi ng as much information as possible about the requi rements engi neeri ng process, then li nki ng it in i nteresti ng ways for trace retri eval. Thi s can lead to an unwieldy mass of unstructured and unusable data wi thout some a priori di scri mi nati on concerni ng the type of requi rements i nformati on that practitioners are likely to need access to.Followi ng an empi ri cal study reported in [5], we argued that the most fundamental i nformati on to record for reli evi ng long-term requirements traceability problems was that whi ch identified the human source(s)of requi rements i nformati on. We found that, what are perceived to be requirements traceability problems tend to arise when practitioners are unable to answer questions about the personnel who had been i nvolved in the producti on and refi nement of requi rements. Thi s is because people are frequently the ulti mate baseline whenever requi rements need to be re-exami ned or re-worked. Examples of such questions are gi ven in Figure 1. However, we also reported that information concerni ng the human source(s) is often neglected in the stri ve to replace i nformal social contact with exhausti ve documentary records.“Who has been involved in the production of this requirement and how?”“Who was originally responsible for this requirement, who is currently responsible for it and at what points in its life has this responsibility changed hands?”“At what points in this requirement's life have the working arrangements of all those involved been changed?”“Who needs to be involved in or informed of changes proposed to this requirement?”“What are the ramifications, regarding the loss of requirements-related knowledge, if aspecific individual or group leaves a project?”Figure 1: Personnel-related requirements traceability questions.2.2.Contribution structuresWe described an approach to address this more focal problem underlyi ng long-term requi rements traceability problems in [6]. In that paper, we also described a prototype tool to support the approach and provided scenarios of use. Formali sati on of the approach, plus the i nferences it supports, can be found in [4].We summari se the mai n steps of the approach in Figure 2. The approach is based on modelli ng the contribution structure underlyi ng requi rements. Thi s reflects the network of people who have contributed to the artifacts produced in the requi rements engi neeri ng process. The i nformati on in this model makes it possible to extend conventional forms of artifact-based requi rements traceability with a form of personnel-based requi rements traceability. W e claim that this new dimension can help elicit answers to the above questions and so alleviate an important class of requirements traceability problem.contributed to an artifact’s producti on is also mai ntai ned in its contribution format. Based on Goffman’s work on the nature of participation in soci al encounters [3], this structure delineates the principal, author and documentor of an artifact. As described in [6], these categories have been moti vated by soci oli ngui sti c and textual li ngui sti c theori es, and chosen for thei r analyti c potenti al. Together, the i nformati on they provide can be used to i nfer detai ls about soci al roles, role relati ons and commi tments.3.Case studyIn this section, we give details of the company, project and participants of the case study. We describe the data we gathered and our method for so doing.3.1.ProjectThe project came from a small communi cati ons company employi ng about twenty-fi ve people. It runs many projects concurrently, provi di ng software and procedural soluti ons to communi cati ons-related problems. The ori gi nal objecti ve of this project was to supply a dedicated communi cati on service to complement a customer’s disaster recovery programme. The project was initiated in February 1992 and went live at the end of March 1992.In August 1992, the idea of developi ng a generic service was discussed. Six versi ons of a requi rements and design specification were drawn up throughout September 1992. These were then abandoned until new staff were employed at the end of October 1992 to develop and market the service. Followi ng much staff turn-over, the generic service did not go li ve unti l February 1994. Between October 1992 and February 1994, the specification evolved i nto an operati onal service, an operati ons manual and a high-level manager’s guide. Si nce February 1994, the generic service and accompanying documentati on has undergone conti nuous modi fi cati on to account for the requi rements of new customers.Most of the artifacts produced during the project were i nformal and paper-based. All that remains within the company today is an early specification, an up-to-date operati ons manual, an up-to-date manager's guide, contracts with customers and mi scellaneous correspondence. Requi rements traceability has not been mai ntai ned. Those sti ll i nvolved i n the project no longer remember from where or from whom the vari ous aspects of the current service have been derived. Some problems have resulted from this loss of information but,because the project is restricted in scope, and because the team is small and exhibits some staff continuity, these have not been critical to maintainability.3.2.Data gatheredThe work that occurred from the i ni ti al discussion about provi di ng a generic service, through to the sixth versi on of the requi rements and design specification, was followed closely. We observed all the meeti ngs that took place, made notes and audio recordings, and collected photocopies of any tangible artifacts produced. We also participated in some aspects of the process. During this ti me, a detailed picture of what had happened when developing the i ni ti al customer-specific service was reconstructed with those who had been i nvolved.From the end of October 1992, we mai ntai ned a record of the mai n arti facts produced due to the specification, many of whi ch were in producti on for months. For the purposes of the case study, our definition of “artifact” applied to single physical documents. Not only does this promote identification, but i t enables us to exami ne the viability of the approach at a coarse level of granularity prior to i ntroduci ng further complexity. Some of the traceability i mpli cati ons that arise from decomposing a single physical artifact i nto a number of components are menti oned in Secti on 5. During this period, we also mai ntai ned a record of the people i nvolved in the producti on and di stri buti on of these artifacts. However, we were unable to mai ntai n a full record of the peri pheral artifacts, like the notes made during meeti ngs wi th customers and so forth.Fifty-eight people contributed directly to the project. These i ncluded individuals and groups from wi thi n the company and from outside. We use alphabetic identifiers when we refer to these people below. One hundred and sixty-six mai n artifacts were produced in the project. We use numeric identifiers when we refer to these artifacts below.3.3.Project phases(1)The artifacts to do with the i ni ti al customer-specific service. Twenty-three artifacts were produced between February and March 1992.(2)The artifacts to do with developi ng the baseline specification for thegeneric service. Sixty-five artifacts were produced from August to September 1992.(3)The artifacts to do with developi ng the i ni ti al generic service. Thi rty-nine artifacts were produced from October 1992 to July 1993.(4)The artifacts to do with extending the generic service to address newcustomer requi rements. Thi rty-ni ne artifacts were produced from September 1993 to June 1995.4.Application of approachIn this section, we outli ne how the approach was applied. Based on the data we had gathered, key project participants were tasked to reconstruct the mai n artifact-based relati ons and to give them mi ni mal semanti cs. Under si mi lar condi ti ons, they were also tasked to reconstruct the contri buti on format for each artifact. We then examined what could be inferred about social roles, role relati ons and commi tments as a consequence.4.1.Artifact-based relationsFor each project phase, its artifacts were numbered according to production order, then temporal relati ons were established between them to reflect the order in whi ch they had been produced. Thi s ordering is suggested in Fi gure 3. The nature of these relati ons was further clarified, based on [1], as: before(1,2); during(4,3); equal(11,12); meets(16,17); etc. The coarse flow-down of information amongst these artifacts was also established. This is also shown in Figure 3. Note that, no attempt was made to determi ne all the possible relations, like the many transitive or internal relations for instance.An example of the mi ni mal semanti cs gi ven to these artifact-based relations is shown in Table 1. In the first column of this table, we list the original reason gi ven for the relati on by participants. In the second column, we categorise the nature of this relati on according to standard classifications of cohesi on and coherence relati ons [2]. Based on this, we list the broad communi cati ve functi on between the two related artifacts in the third column. This function encapsulates the finer purpose of the relati on, helps to eliminate individual differences in classification, so provides what we refer to as i ts minimal semantics.Figure 3: The order in which artifacts were produced and the predominant artifact-based relations between them. Note that, elongated artifacts, like 102 and 128, represent all the correspondence between the company and potential customers; correspondence was difficult to keep track of. Note that, the slightly enlarged artifacts, like 115 and 147, indicate that other artifacts were produced whilst in production.(1) Informal description of relation given by practitioner (2) Nature of relation interms of cohesion andcoherence relations(3) Broad communicativefunction of relation givesminimal semantics2 qualifies 1 2 adds to 1 2 adopts 12 is the reason for3 2 frames 3 3 references 24 defines 2 4 adds to 2 4 adopts 22 is the reason for 6 2 frames 6 6 references 23 assists with4 3 substantiates 4 4 references 35 is compared with 4 5 matched with 4 5 references 46 refines 4 6 alters 4 6 adopts 45 assists with6 5 substantiates 6 6 references 57 responds to 4 4 causes 7 4 references 76 is the reason for 8 6 frames 88 references 67 is background for 87 frames 88 references 79 is a result of 88 causes 99 references 89 assists with 109 substantiates 1010 references 910 elaborates 610 adds to 610 adopts 68 is background for 108 frames 1010 references 810 is the reason for 1110 frames 1111 references 1012 replies to 1010 causes 1212 references 1013 replies to 1010 causes 1313 references 1015 extends 1015 adds to 1015 adopts 10Table 1: The nature of some of the main artifact-based relations of phase 1.For phase one, Figure 4 (a) i llustrates those relati ons likely to be represented in conventi onal forms of artifact-based requi rements traceability. Thi s i s because they tend to capture parent-child relati ons, or predecessor-successor relations, so provide requirements history and flow-down [13, 16]. Figure 4 (b) i llustrates those additional relati ons the approach is concerned with, namely the references relati ons of Table 1. It indicates the wealth of contextual i nformati on often not integrated and used actively for requirements traceability purposes.Figure 4: (a) Adopts - the artifact-based relations typically maintained for requirements traceability. The arrows here suggest the flow-down of artifact content. (b) References - the artifact-based relations that further provide context. The arrows here suggest the direction of influence between artifacts.4.2.Contribution formatFor each project phase, the contri buti on format was established for each artifact. Using our example scheme, this indicated the i ndi vi duals or groups who contributed in the capacities of principal, author and documentor. The contribution formats allocated for some of the artifacts produced in phase one are shown in Table 2. The people to whom an artifact was ei ther passed or copied is also shown in this table for completeness.Artifact Principal Author Documentor Distributed to 1BH BI AW AT2AT BB={AW/AV/AT/AR/AX/AU}BB={AW/AV/AT/AR/AX/AU}AA3AA AA/AE AA None4AA AA/AE AU BI/BB={AW/AV/AT/AR/AX/AU}5AA AA/AQ/AP/BB={AW/AV/AT/AR/AX/AU}AA None6AA AA/AT AA AE7BH BI BL AA8AA AA/AE AA None9AA AA/BB={AW/AV/AT/AR/AX/AU}AA None10AA AA AA AE/BI/BB={AW/AV/AT/AR/AX/AU}Table 2: The contribution formats for artifacts 1 to 10. Note that, AA/AE means joint contributors. Note that, group descriptors are decomposed into their members.4.3.QualificationEach contri buti on format was qualified to provide further details about contributions and contributors. As an example, we explain how the authori al status was qualified and highlight the use of this information. Artifact 106 was the first versi on of the operati ons manual for the generic service. It was authored by AI. From artifact 106, the artifact-based relati ons can be used to trace all the paths back to the original author(s). They can also be used to trace forwards to locate the author(s) of all the artifacts arising from it. Details about how each progressive author made use of the previ ous author's contri buti on can thereby be uncovered. Part of this authorial trail is illustrated in Figure 5. From such authori al trails, we can see: whi ch people produce the most ori gi nal artifacts; whi ch use thei r own or another’s contri buti ons the most often; whose contri buti ons get referenced with the greatest frequency; and so on. We can also begin to assess the i nfluence of a person's authored contri buti ons on the surroundi ng body of artifacts and on the project as a whole. Such details can help identify those to notify followi ng different types of change or those to contact regarding different queries.11111212(author of artifact 106)(author of artifact 103)Adopts (adds to)Adopts (alters)(authors of artifact 73)(authors of artifact 85)Adopts (removes from)Adopts(alters)Adopts(adds to)Adopts(removesfrom)Adopts (removes from)(authors of artifact 86)(authors of artifact 88)(authors of artifact 99)(authors of artifact 100)Adopts (alters)(authors of artifact 84)Adopts (adds to)Adopts (alters)Adopts (adds to)(authors of artifact 77) (authors of artifact 81)(authors of artifact 83)(authors of artifact 73)(authors of artifact 74)Adopts (removes from)Adopts (adds to)Adopts (alters)(authors of artifact 65)(author of artifact 80)(authors ofartifact 81)Adopts(removes from)Adopts (alters)(authors of artifact 76)(authors of artifact 77)Adopts (alters)Adopts (alters)Adopts (alters)See Box X(author of artifact 55)(authors of artifact 61)Adopts(removes from)Adopts (adds to)(authors of artifact 58)(author of artifact 60)Adopts (alters)Adopts (alters)See Box Y(authors of artifact 52)(authors of artifact 53)Adopts (alters)Adopts (alters)(authors of artifact 49)Adopts (adds to)Adopts (adds to)(author of artifact 46)Adopts (alters)(author of artifact 21)Adopts (alters)(authors of artifact 45)Adopts (adds to)(author of artifact 36)(author of artifact 30)Adopts (alters)Adopts (adds to) (author of artifact 26)(author of artifact 28)Adopts (adds to)Adopts (alters)Box YAP/AQ AC/AT/AU AI AC/AQ AE/AA/AC/AG AA/AE/AK/AG BB/AP/AQ AE/AA/AC/AG AA/AC/AE/AG AC/AEAC AA/AC/AE/AG AA/AC/AE/AG AE/BWBox XAC/AE AC/AT/AU AE/AA/AC/AGAA/AC/AE/AG AC/AE AA AE/AA/AC AE AA/AC/AE/AG AA/AC/AE/AG AA/AE AE AA AE/BW AC AC AC AA AI [Reads: 106 adopts 103 (106 adds to 103)]See Box X(author of artifact 18)Adopts (alters)Adopts (alters)(author of artifact 15)Adopts (copies)Adopts (alters) (authors of artifact 16)Adopts (adds to)Adopts (copies) (authors of artifact 14)Adopts (alters) (authors of artifact 13) (author of artifact 10)Adopts (adds to)(authors of artifact 6)Adopts (alters) (authors of artifact 4)Adopts (adds to)(author of artifact 2)Adopts (adds to)(author of artifact 1)AA/AT AA/AE BBBI BI/AA BI/AA AA/AEBK/AA/AE AA AA AA Figure 5: Authorial trail following backwards requirements traceability from artifact 106. For clarity, it is filtered to highlight those whose contributions were adopted in getting to106.4.4.Social roles and role relationsThe social roles that people assume when contri buti ng to artifacts can be inferred from the i nformati on we have gathered so far. For instance, if a person is both the principal and author of an artifact, they can be said to be its devisor. If they are solely the documentor, they can be said to be its relayer. The ensui ng role relati ons between people when they joi ntly contribute to artifacts, say as a devisor/relayer pair, reveals more about the underlying contri buti on structure. Not only can we see whom has collaborated with whom, but we can see how they have collaborated and whether these role relations have varied or been sustained.To explain the use of such information, we compare the social roles of two of the project leaders. AI was the project leader when artifacts 99 to 127 were produced and a contri butor to twenty-two of these. AJ was the project leader when artifacts 128 to 162 were produced and a contri butor to twenty-six of these. Thei r social roles when contri buti ng to these artifacts, as well as their role relations to collaborators, are shown in Tables 3 and 4 respectively.Social role of AI On howmanyartifacts?How many onown?Social roles of other contributors whocollaborate with AITrue author (i.e., contributes as P, A and D)1613True author = BM (x1)Ghost author = AA/AE/AD (x1)Ghost author = AA/AE/AD/AT (x1)Nominal author (i.e., PD)20Ghost author = AA/AE/AD/AG (x1)Ghost author = BB/AP/AQ (x1)Representative(i.e., AD)20Sponsor = AD (x2)Ghost author(i.e., A)20Sponsor = AD and Relayer = BO (x2)Table 3: The social roles and role relations for AI.From these tables, we can see that AI worked on his own on over half of the artifacts he contributed to, else he worked with small groups of people. As he worked largely as a true author, he was evi dently a self-sufficient documentor. It is noteworthy that AD tended to collaborate with AI as a sponsor when dealing with customer-related artifacts. In contrast, we can see that AJ worked rarely on his own and mai nly collaborated with one or two others. He had a strong dependency on AE as his ghost author when worki ng together and on many others as relayers, the latter hi nti ng at the need for secretarial support. It is noteworthy that AD was ulti mately responsible for about a third of the artifacts that AJ had contributed to.1313Social role of AJ On howmanyartifacts?How many onown?Social roles of other contributors whocollaborate with AJTrue author (i.e., PAD)72True author = BM (x1)Ghost author = AE (x 4)Ghost author (i.e., A)90Sponsor = AD and Relayer = AP/AS (x1)Sponsor = AD and Relayer = AP (x5)Sponsor = AD and Relayer = AR (x2)Sponsor = AD, Ghost author = AF and Relayer =AO (x1)Devisor (i.e., PA)90Ghost author = AE and Relayer = AW (x2)Ghost author = AE and Relayer = BQ (x1)Relayer = AL (x4)Relayer = AM (x2)Sponsor(i.e., P)10True author = AE (x1)Table 4: The social roles and role relations for AJ.There could be many reasons for the subtle differences in how these two people with the same job description worked in the project. AI did not close any sales and focused on developi ng a marketable service. In contrast, AJ focused on selling what AI had developed and only made subsequent additions to it to account for new customer requirements. Notably, it was with such additions that AE collaborated with AJ as ghost author. Thi s served to mai ntai n some conti nui ty, since AE had also collaborated with AI as ghost author.mitmentBased on the data gi ven in Table 5, we give an example of the kind of i nformati on that can be inferred about the commi tments of project contributors. We can see that AP is mai nly responsible for the physical appearance of artifacts, only responsible for thei r content when collaborati ng with others, though never responsible for thei r ulti mate effect. We can also see which other people AP is commi tted to through thei r joi nt contri buti ons to shared artifacts. Here, we can identify AD and AJ as those with whom AP has collaborated the most often, as well as the number and type of artifacts o n whi ch they collaborated. By extensi on, we can exami ne those people that AP is commi tted to due to the artifact-based relati ons that situate her contri buti ons, though not shown i n the table.The i ntersecti on and difference between commi tments can uncover much i nteresti ng i nformati on. For example, we can identify: whi ch people have collaborated with specified others the most or least often; whi ch people are commi tted to the same set of other people; whi ch people have collaborated1414with customers; which people are committed to the same artifacts and for the same aspects; and which people have contributed to those artifacts that are the i ni ti al sources of requi rements.Contrib to (artifact)Aspect of artifact committed to Contrib with(person)No. artifactscollab on5Content (as one of many contributors)AD622Physical appearance (on own)AJ631Physical appearance (on own)AQ441Content (as one of two contributors)Physical appearance (on own)AT4 85Content (as one of two contributors)AU496Content (as one of many contributors)Physical appearance (as one of two contributors)AW3 100Content (as one of many contributors)AV3111Content (as one of many contributors)AR3139Physical appearance (as one of two contributors)AX3140Physical appearance (on own)AC2148Physical appearance (on own)AD2151Physical appearance (on own)AJ2154Physical appearance (on own)AQ1155Physical appearance (on own)AT1Table 5: AP's artifact and collaborator commitment store.5.Results and discussionIn this section, we select some of the questions gi ven in Figure 1 to demonstrate how they can be addressed. We also menti on other forms of analysis the approach makes possible. The reader is referred to [4] for a more detailed description and a thorough evaluation.5.1.Invol vement“Who has been involved in the production of this requirement and how?”One of the requi rements in versi on two of the requi rements and design specification, artifact 49, was to do with security. It was pursued throughout phase two of the project, cited in all six versi ons of the specification, then dropped in phase three. It led to much i nvesti gati on and many artifacts that became redundant. Once removed, its impact only surfaced over ti me. The resulting problems could have been allevi ated with knowledge of its original source and of those who had pushed for its concern.1515。