Page 347 - Software and Systems Requirements Engineering in Practice
P. 347

309
                                                                            d
                                                                             e
                                                                              x
                                                                          I I n d e x      309
                                                                           n
                        requirements database, 217,   content correctness, 113
                           294–295                    creation of, 74
                        requirements engineering,     described, 77, 222
                           15–16                      design, 74, 81, 115, 117–120
                        requirements management,      determining completeness of,
                           204–206                       113–114
                        threat modeling, 286          diagram quality, 113
                        tips for, 205                 domain, 164, 165
                        used early in project, 205    elicitation, 77–78
                        volatility, 198, 206          extracting requirements from,
                      metrics summaries, 15              94–96
                      mitigation techniques, 215      fault trees, 74
                      Mizuno, Shigeru (Dr.), 55       faults, 113–114
                      mock-up prototypes, 252         feature, 74, 81
                      model reviews, 98               formal, 75
                      model-based testing (MBT),      goal, 81, 89
                        222–227                       implementation, 74, 81
                      model-driven architecture       integrated, 130–132
                        (MDA) initiative, 223         lightweight, 84
                      Model-Driven Requirements       metamodels, 27, 203–204, 215
                        Engineering. See MDRE         NFR, 183–184
                      model-driven techniques, 58–62  organization of, 96
                      modeling                        process, 77
                        artifact. See artifact modeling  quality checks, 117–118
                        business, 80, 95              REAM. See REAM
                        business object, 108–109      requirements, 222
                        challenges, 235               requirements analysis, 74
                        distributed, 98               reviewing, 229
                        feature, 78                   test, 74–75
                        goal, 49–51, 78, 145–146, 153  types of, 74–75, 222–227
                        Kano, 52                      UML, 75, 227–228
                        performance, 164–168          usage, 222
                        SysML modeling, 79            use case, 80, 81, 92–94
                        threat. See threat modeling   “V” model, 202–204, 220, 221
                        use case, 85                modifiability, 11, 14, 152, 164
                      modeling sessions, 96–116     modification optimization,
                      models                          251–252
                        analysis, 77–78, 80, 81, 94, 115  modification requests
                        artifact, 101–102             (MRs), 196
                        business, 74, 79, 80–81, 95  MRs (modification requests), 196
                        constructed from source     multidimensional support,
                           code, 222                  299, 300
   342   343   344   345   346   347   348   349   350   351   352