Requirements Intelligence Clause Samples

Requirements Intelligence. We define requirements intelligence (RI) similarly to business intelligence (BI) but with a focus on requirements of software products. RI is about the systematic collection, analysis, processing, and visualization of requirements and user feedback coming from natural text such as issue trackers, app reviews, or legacy requirements. The goal of RI is to provide new insights about software products based on diverse data sources of natural language and meta data. These insights can be generated from software product descriptions and used to analyze the product features and compare it to its competitors. More insights can also come from explicit feedback such as user reviews, or from implicit data gathered from the software product itself. Further, data can come from different channels such as social media, issue trackers, emails, and other media. Combining data from different perspectives and channels leads to new ways of creating and adapting requirements as they are based on facts (e.g., implicit feedback) and customers’ subjective impressions (e.g., explicit feedback). User feedback can be used to recommend, for example, software features the customers often wishes for, which the stakeholders can then turn into requirements. OpenReq will identify those actively discussed software features and recommend them to the stakeholders. The stakeholders might agree with the discussion and turn the discussed feature to a requirement. RI will also provide insights to understand user needs, especially for companies that are overwhelmed by the huge amount of data, by aggregating the opinion and sentiment of a large number of reviews related to their software product. In this document, we describe the technical approach to mining, processing, and visualizing requirements-related data.
Requirements Intelligence. This component will encapsulate an analytics backend and include text-mining algorithms that allow the analysis of natural language in text-based documents or user feedback (user feedback can be either explicit or implicit - see Figure 2). In addition to that also interactive visualization will be supported by this component. In particular, interactive visualization supports stakeholders in visualizing descriptive and predictive analytics data. An example of such a visualization is shown in Figure 3. Figure presents the trend of different app review types (e.g., a user requests a new feature or a bug to be fixed) over time, for a specific app and over its different versions. Figure 2: Example for explicit and implicit feedback Figure 3: Example trend of different app review types
Requirements Intelligence role in the architecture Figure 1: OpenReq overall architecture. The OpenReq Prototype and the industry trials exploit the basic functionalities provided by the OpenReq services. Furthermore, services themselves exploit and integrate the services of other components. For example, release planning uses functionalities of dependency detection, recommendation, and group decision making (for simplicity, this is not considered in the architecture figure). In the following, we give a short overview on the different services, knowledge infrastructure, and interfaces shown in Figure 1 (for more details we refer to the DoA).
Requirements Intelligence. In OpenReq, we define requirements intelligence (RI) similar to business intelligence (BI). For BI, we use the definition of [▇▇▇▇▇▇ 2004]: “BI systems combine data gathering, data storage, and knowledge management with analytical tools to present complex internal and competitive information to planners and decision makers.” RI follows the same definition but focuses on requirements of software products. RI is the systematic collection, analysis, processing, and visualization of requirements and user feedback coming from natural text such as issue trackers, app reviews, or legacy requirements. The goal of RI is to provide new insights about software products based on diverse data sources of natural language and metadata. In order to describe the state of the art, we separate RI into the topics mining, classification, clustering, and visualization of requirements (a deeper literature analysis can be found in D2. 1). With text mining, we are able to retrieve requirements or related information to those in natural text. A survey by ▇▇▇▇ et al. [2004] found that 79% of companies use unstructured natural language in their requirements documents; 16% use structured natural language (e.g., using templates); 5% use formal approaches. Therefore, the application of natural language processing (NLP) to requirements engineering has attracted a lot of attention from software engineering researchers and practitioners [▇▇▇▇▇ 1995]. Already in the late 1990s, NASA built a tool that leverages NLP for requirement engineering (Automated Requirements Measurement, or ARM) [▇▇▇▇▇▇▇ and ▇▇▇▇▇▇▇▇ 2014]. In the area of software engineering, several approaches have been developed in the recent years with many focusing on app stores as shown in [Harman et al. 2012], [▇▇▇▇▇▇ et al. 2017], [▇▇▇▇▇▇ and ▇▇▇▇▇▇ 2013]. An interesting source of information can be found in user reviews, comments, and social media in general, as people use these platforms to describe their desires and issues online [▇▇▇▇▇▇ and ▇▇▇▇▇▇ 2014], [▇▇▇▇▇▇▇▇ and ▇▇▇▇▇▇▇ 2017], [▇▇▇▇▇▇ et al. 2017]. The next step is the classification of requirements, which deals, among others, with the classification of requirements into functional (FR) and non-functional (NFR) as shown by the authors [▇▇▇▇▇▇▇▇ et al. 2016], [▇▇▇▇▇▇▇▇▇▇▇ and ▇▇▇▇▇▇ 1997], and [▇▇▇▇▇▇▇▇▇▇ and ▇▇▇▇▇▇ 2017]. In addition, RI will take advantage of the research done in the identification of bug reports, feature requests, and non-informative text in user ...

Related to Requirements Intelligence

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇▇▇.▇▇▇▇▇.▇▇.▇▇/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at ▇▇▇▇@▇▇▇▇▇.▇▇▇▇▇.▇▇.▇▇ and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (▇▇▇) ▇▇▇-▇▇▇▇. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Quality Assurance Requirements There are no special Quality Assurance requirements under this Agreement.

  • System Requirements Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

  • Program Requirements The parties shall comply with the Disadvantaged Business Enterprise Program requirements established in 49 CFR Part 26.

  • Procurement Requirements If the Sponsor has, or is required to have, a procurement process that follows applicable state and/or federal law or procurement rules and principles, it must be followed, documented, and retained. If no such process exists, the Sponsor must follow these minimum procedures: 1) Publish a notice to the public requesting bids/proposals for the project; 2) Specify in the notice the date for submittal of bids/proposals; 3) Specify in the notice the general procedure and criteria for selection; and 4) Sponsor must contract or hire from within its bid pool. If bids are unacceptable the process needs to be repeated until a suitable bid is selected. 5) Comply with the same legal standards regarding unlawful discrimination based upon race, gender, ethnicity, sex, or sex-orientation that are applicable to state agencies in selecting a bidder or proposer. Alternatively, Sponsor may choose a bid from a bidding cooperative if authorized to do so. This procedure creates no rights for the benefit of third parties, including any proposers, and may not be enforced or subject to review of any kind or manner by any entity other than the RCO. Sponsors may be required to certify to the RCO that they have followed any applicable state and/or federal procedures or the above minimum procedure where state or federal procedures do not apply.