<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Requirement Evolution: Towards a Methodology and Framework</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Le</forename><surname>Minh</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DISI</orgName>
								<orgName type="institution">Università degli Studi di Trento</orgName>
								<address>
									<addrLine>Via Sommarive 14</addrLine>
									<postCode>I-38123 (POVO</postCode>
									<settlement>), Trento</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Sang</forename><surname>Tran</surname></persName>
							<email>tran@disi.unitn.it</email>
							<affiliation key="aff0">
								<orgName type="department">DISI</orgName>
								<orgName type="institution">Università degli Studi di Trento</orgName>
								<address>
									<addrLine>Via Sommarive 14</addrLine>
									<postCode>I-38123 (POVO</postCode>
									<settlement>), Trento</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><roleName>Prof</roleName><forename type="middle">Fabio</forename><surname>Massacci</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DISI</orgName>
								<orgName type="institution">Università degli Studi di Trento</orgName>
								<address>
									<addrLine>Via Sommarive 14</addrLine>
									<postCode>I-38123 (POVO</postCode>
									<settlement>), Trento</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><roleName>Prof</roleName><forename type="middle">John</forename><surname>Mylopoulos</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">DISI</orgName>
								<orgName type="institution">Università degli Studi di Trento</orgName>
								<address>
									<addrLine>Via Sommarive 14</addrLine>
									<postCode>I-38123 (POVO</postCode>
									<settlement>), Trento</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Requirement Evolution: Towards a Methodology and Framework</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E60EABECC89010525ADF7E2E518EF0CD</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T22:51+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>Requirement Engineering, Rule-based Evolution Modeling</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Software systems are undergoing continuing changes and rapid revolution. As consequence, requirements that were satisfied may no longer be satisfied or new requirements may be introduced. Thus, a challenging aspect is to develop a methodology and tools to model, manage, and analyze the evolution of requirements. In this paper, we describe our work at UNITN which targets a framework and methodology for requirement evolution. As an evidence for the feasibility of our approach, we describe our steps to achieve the goal as well as our preliminary result. In which, we propose a foundation to model requirement evolution, and concepts to support reasoning on evolutionary model.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Evolution is a phenomenon that happens commonly in many domains. It is a fact of life. Environments and natural species living within them evolve. Also, other entities such as societies, theories, concepts, ideas -artificial, or virtual -all evolve over time in their own context. The ability to evolve is prerequisite for survival keypoint. As the term reflects a process of progressive, it is necessary to determine what is admitted as progressive in every context.</p><p>The evolution phenomena as observed in diversified domains varies significantly. In most of the cases, evolution results from changes in several or many, of the facets of an evolving entity or set of entities. Individual changes are generally small with respect to an entity, but even then their impact may be critical. In areas such as software, evolution refers to a process of continually updating software systems in responding to changes in their operating environment, their specification and properties. It is inevitable in software systems as they need to continue to satisfy changing business needs, new regulations and standards, and the introduction of new technologies. Such evolution may involve changes that add, remove, or modify features, redesign the system for migration to a new platform, or that integrate with other application. As a consequence, part of the software may have to be modified to correct errors that are found in operation to adapt the software to a new platform or to improve its performance.</p><p>Numbers of researches have been built for the study of software evolution but still, little attention has been paid for the evolution at requirement level. The fact that requirement evolution is one of the most important evolutions motivates our research. We focus our study on the formalization of evolving requirements, analyzing their affects and management mechanism.</p><p>In the rest, we briefly review past work in the field ( §2). Then we describe our research objectives ( §3) which is followed by a research agenda ( §4). Next we present our preliminary results ( §5) in which we model requirement evolutions in terms of evolution rules and propose quantitative metrics for reasoning on evolutionary requirement models. Finally we conclude the paper ( §6).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>A majority of approaches to software evolution has focused on the evolution of architecture and source code level. However, in recent years, changes at the requirement level have been identified as one of the drivers of software evolution <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b20">21]</ref>. As a way to understand how requirements evolve, research in PROTEUS <ref type="bibr" target="#b14">[15]</ref> classifies changing requirements (that of Harker et al <ref type="bibr" target="#b9">[10]</ref>) into five types, which are related to the development environment, stakeholder, development processes, requirement understanding and requirement relation. Later, Lam and Loomes <ref type="bibr" target="#b11">[12]</ref> discusses the problem of evolving requirements and presented the EVE framework for characterizing changes. The EVE framework consists of two parts which are a meta-model and an associated process model. The meta model captures key modeling concepts in requirement evolution such as change, impact, risk, and viewpoint. The process model aims to a methodological framework for handling new and changing requirements; however, not much of this was provided.</p><p>Several approaches have been proposed for supporting requirements evolution. Madhavji <ref type="bibr" target="#b13">[14]</ref> proposed a process model for change management (PRISM) to manage the versions of the changed artifacts, to collect change-related data. Han <ref type="bibr" target="#b8">[9]</ref> presented an approach to impact analysis and change propagation to software change. Impact analysis and change propagation are performed on software artifacts and their dependences. Software artifacts are represented using augmented EBNF. The impact analysis concerns the introduction, modification, and deletion of software artifacts and dependences. It is comprised of automatic applying of change patterns and interactive confirmation of potential impacts. The change propagation process is a combination of automatic propagation based on codified rules and interactive user guidance bases on the impact analysis results. Zowgi and Offen <ref type="bibr" target="#b20">[21]</ref> work at meta level and view requirement models as theory (or a belief set) in some nonmonotonic logic. Requirements are considered as set of belief about the theory ("machine") going to be built. Requirement evolution are the changes occur when mapping a theory to another theory through a process of rational belief revision. The process begins from an incomplete requirement model, at each step, a new set of requirement changes is brought to bear. After a series of revi-sions, the requirement model is refined and completed in each step. The limitation of this approach is the overhead in encoding requirement model into logic.</p><p>Russo et al.'s <ref type="bibr" target="#b16">[17]</ref> propose an analysis and revision approach to restructure requirements to detect inconsistency and manage changes. The main idea is to allow evolutionary changes to occur first and then verify their impact on requirement satisfaction in the next step. Also based on this idea, Garcez et al <ref type="bibr" target="#b2">[3]</ref> focus on evolving requirement specifications rather than evolving requirement. This work supports modification while preserving particular requirement goals and properties. It proposed the use of a cycle comprised of two phases: analysis and revision. During the analysis phase, techniques of abductive reasoning are used to check specifications if a number of desirable properties of the system is satisfied. If not, diagnosis information is generated. The revision phase uses the techniques of inductive learning to modify the specifications according to diagnosis information generated. Similar to Garcez et al, Ghose's <ref type="bibr" target="#b6">[7]</ref> framework is based on formal default reasoning and belief revision, aiming to address the problem of inconsistencies due to requirement evolution. This approach is supported by automated tools <ref type="bibr" target="#b7">[8]</ref>. Also relating to inconsistencies, Fabrinni et al.'s <ref type="bibr" target="#b3">[4]</ref> deals with requirement evolution expressed in natural language, which is challenging to capture precisely requirement changes. Their approach employs formal concept analysis to enable a systematic and precise verification of consistency among different stages, hence, control requirement evolution.</p><p>Other notable approaches include Brier et al.'s <ref type="bibr" target="#b1">[2]</ref> to capturing, analyzing, and understanding how software systems adapt to changing requirements in an organizational context; Felici et al <ref type="bibr" target="#b5">[6]</ref> concern with the nature of requirements evolving in the early phase of the system; Stark et al <ref type="bibr" target="#b18">[19]</ref> study the information on how change occurs in the software system and attempts to produce a prediction model of changes; Lormans et al <ref type="bibr" target="#b12">[13]</ref> use a formal requirement management systems to motivate a more structural approach to requirement evolution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Research Objective</head><p>Evolution modeling obviously requires extra efforts in the software development process. The motivation behind this work is to make the software system-to-be more resilient to changes during its lifetime in an efficient way.</p><p>Existing requirement modeling languages (e.g., UML, Tropos, KAOS) do not provide any tools or concepts to capture the evolution of the requirement models. Obviously designers cannot express the evolutionary puzzle without additional concepts. Some existing languages may allow users to define new concepts to represent the evolution. For example, to express an idea that a model evolves to another one, UML users can define a new stereotype e.g., 'evolve to', and tag it to the association relation between two models. However, such extensions are ad-hoc, and thus are difficult to exchange among designers. Moreover, ad-hoc extensions do not make much sense due to the lack of systematic analyses and reasoning methods. Even if UML extends itself to deal with evolution, this extension would hardly replicate to other languages.</p><p>Recent studies on the field focused on how to adapt system configuration due to environment changes in order to satisfy predefined requirements. This kind of system supports (semi)automatically reconfiguration of system components so that it can guarantee the designed purposes regards less environment changes. This can be considered as internal evolution. In the other side, external evolution refers to the cases that completely new requirements may arrives, then new components have to be implemented. And some existing components become obsoleted. Only a few of past studies covered both internal and external evolutions. However most of them are at high level of abstraction. And there is lack of practical frameworks as well as CASE tools that can be ready for real world projects.</p><p>This inspires our research objective. Concretely, we aim to construct:</p><p>"A comprehensive, practical framework for requirement evolution that can deal with arbitrary changes in requirement models. This framework is general enough so that it can be applied to as much as possible existing modeling languages."</p><p>In which we would like to identify a framework to elicit requirement evolutions model and represent evolutions in such a way that is consistent with human mental models.</p><p>reason and analyze evolutions that meet stakeholder's desire.</p><p>In subsequence sections, we discuss our research agenda to achieve our goals. Also, we sketch a preliminary of our approach which has been published in CAiSE'11 <ref type="bibr" target="#b3">4</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Research Plan</head><p>Here we describe our research plan in accordance to our objective. Generally speaking, we can separate our working plan into two phases. In the first phase, we work on a generic approach dealing with evolution for requirement model at a high level of abstraction so that our approach will not be limited to any particular requirement modeling language. In the second phase, we instantiate the generic approach to a specific modeling language to prove the applicability of the proposed approach. For validation purpose, we apply our approach to a couple of case studies taken from industrial projects.</p><p>In the following we elaborate our moves in order to achieve a framework for requirement evolution. In which we need to construct or support:</p><p>An generic approach for modeling requirement evolution that supports uncertainly modeling. We can anticipate the changes but we cannot assure whether changes happen. We can only say these changes may happen with a certain probability. Reasoning and Analysis on evolutionary model. This is a crucial part of our approach.</p><p>We identify several kinds of analysis as follows:</p><p>-Coverage Analysis: This analysis assures that all customer requirements are always satisfied regardless to evolutions. -Impact Analysis and Change Propagation: This analysis addresses research questions such as "Which is the impact of evolution" and "How changes are propagated?".</p><p>-Risk Analysis: This is similar to the risk analysis done in static requirement model <ref type="bibr" target="#b0">[1]</ref>, but here we put it in the context of evolution.</p><p>-Security Analysis: We analyze the security properties of requirement models (e.g., confidentiality) to see whether evolutions falsify them. -Usefulness Analysis: This kind of analysis answers research questions such as "Given anticipated evolutions, what is the best evolution-resilient design for the system?. The term 'evolution-resilient' means that a system still operates properly even though evolution does actually happen. -Robustness Analysis:This analysis provides another view rather than the usefulness analysis. While usefulness analysis helps to choose optimal design for the system-to-be, robustness analysis takes a design and try to look ahead its evolvability, e.g., how much does it cost for repairing the system once evolutions happens. Together with usefulness analysis, robustness analysis gives a more comprehensive to the evolution of requirements. The first four anlyses are addressed in existing modeling languages or studies in the literature. However, they should need some modifications in order to apply to an evolutionary requirement model. We might not implement all of these analyses but some of them that meet stakeholder's desires which are discussed in the validation step. Interaction protocols for the collaboration between stakeholder and engineers to construct evolutionary requirement models. It is motivated by the fact that most of evolutions are uncertain and anticipated. Hence, in order to do any analysis, we need to determine "all" potential evolutions and their likelihoods of occurrences, namely probabilities of evolutions. Intuitively, these probability values should be supported by stakeholder or domain experts who usually are not equipped with a strong background in computer science or mathematic. Thus it is difficult for stakeholder (or domain experts) to give a concrete numbers, say 60%, for the probability of evolution. Instead, using qualifiers such as "more likely", "unlikely" is more familiar. To recover a numerical probabilities from these qualifiers, we might employ the idea of Analytic Hierarchy Process (AHP) <ref type="bibr" target="#b17">[18]</ref>. Specialization of the proposed approach . At this step, we will map the idea of the generic approach to a specific modeling language. Also, we might need to develop algorithms for analysis in the context of this modeling language. Notably, when we do specialization, some of generic notions and concepts need to be refined to comply with the modeling language. Validation of proposed approach. Obviously this is an important part of our work to prove the applicability and usability of the proposed approach. In which we try to answer two questions: "Could our approach be applicable to real projects?" and "Does our approach meet users' desires?".</p><p>To answer these questions, we analyze case studies taken from industrial projects e.g., ATM <ref type="bibr" target="#b15">[16]</ref> and SWIM <ref type="bibr" target="#b4">[5]</ref>. We gather their requirement documents and build up requirement models. We directly work with stakeholder to understand their desires to develop our work. Then we apply our approach to model and analyze evolutions.</p><p>The final outcome will be again validated with stakeholder. A proof of concept to verify the applicability of our proposed framework. Concretely, we plan to:</p><p>-Implement a prototype of a CASE tool for a specialization of our framework.</p><p>In which we instantiate the approach to a particular language, e.g., i* language, and implements a tool to model evolutions and reasoning on these. -Support evolution simulation. After designers have chosen a solution (i.e. an implementation for the system-to-be), the simulation engine can take this solution and generate random events (evolution) to see how the solution reacts to evolution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Proposed Approach and Preliminary Result</head><p>In the following we describe our approach to deal with the requirement evolution. The detail of this approach is published in CAiSE 2011 <ref type="bibr" target="#b19">[20]</ref>. Here, we only present the sketch.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Rule-Based Approach for Modeling Requirement Evolution</head><p>To the purpose of generality, we firstly treat a requirement model as a set of elements and relations rather than investigating on any specific requirement model (e.g., goalbased model, UML models). We do not go into details about how many kinds of element and relationship a model would have. Instead, we treat elements at abstract meaning, and are only interested in the satisfaction relationship which determines how to satisfy an element (i.e. requirement) by others (e.g., component). Considering evolutionary requirement models, we classify two kinds of evolution depended on actors (i.e. designer, stakeholder, reality) who decide changes. They are controllable and observable evolutions. In the former, designers can decide which evolution to follow in order to meet some high level requirements from the stakeholder, with low level requirements for components. The later, on the other hand, is not under the control of designers, but it can be somehow detected when it happens ; its likelihood can be estimated with a certain confidence of the stakeholder.</p><p>We model these kinds of evolutions in terms of evolution rules: controllable rule and observable rule. The former basically is pair of beforeand after-models, which means the before-model can be substituted by the after-mode. In this sense, the aftermodel is a design alternative (or design choice) of the before-model. At design time, designers decide which design alternative to implement. The later rule is modeled as a triplet of before-, after-models and the likelihood that this evolution happens, namely evolution probability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Reasoning on Evolutionary Model</head><p>Among reasonings and analyses listed in the research plan, we have addressed the usefulness analysis so far. Here we focus on the question: "Whether or not a model element (or set of element) becomes useless after evolution?". Since the occurrence of evolution is uncertain, so the usefulness of an element set is evaluated in term of probability. We have introduced two metrics based on the evolution probabilities as follows:</p><p>Max Belief (MaxB): of an element set X is a function that measures the maximum belief supported by Stakeholder such that X is useful to a set of top requirements after evolution happens. This belief of usefulness for a set of model element is inspired from a game in which Stakeholder play a game together with Designer and Reality to decide which elements are going to implementation phase. Residual Risk (RRisk): of an element set X is the complement of total belief supported by Stakeholder such that X is useful to set of top requirements after evolution happens. In other words, residual risk of X is the total belief that X is not useful to set of top requirements regard to evolution. Importantly, do not confuse this notion of residual risk with the one in risk analysis studies which are different in nature.</p><p>In <ref type="bibr" target="#b19">[20]</ref>, we have discussed long-tail problem for which we use these two metrics instead of a single one called Total Belief.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>This paper describes our interests on the field of software evolution, particularly requirement evolution. After reviewing many past studies in the field, we focus ourselves on constructing a methodology to deal with requirement evolutions. We are going to perform a series of analyses (e.g., usefulness, robustness, and impact analysis) to obtain the ultimate purpose: support designers in building more evolution-resilient software. So far, we have worked on a possible way to model requirement evolution using evolution rules, and a couple of concepts, Max Belief and Residual Risk, which are the stepping stone for our further analysis. This approach has been published in CAiSE <ref type="bibr">'11.</ref> </p></div>		</body>
		<back>

			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This work is supported by the European Commission under projects EU-FET-IP-SECURECHANGE.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Requirements Analysis and Risk Assessment for Critical Information Systems</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Asnar</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>ICT School, University of Trento</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Problem-based analysis of organisational change: a realworld example</title>
		<author>
			<persName><forename type="first">J</forename><surname>Brier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rapanotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hall</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of IWAAPF &apos;06</title>
				<meeting>of IWAAPF &apos;06</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Combining abductive reasoning and inductive learning to evolve requirements specifications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Avila Garcez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Russo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nuseibeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kramer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEE Proceedings -Software</title>
		<imprint>
			<biblScope unit="volume">150</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="25" to="38" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Controlling requirements evolution: a formal concept analysis-based approach</title>
		<author>
			<persName><forename type="first">F</forename><surname>Fabbrini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fusani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnesi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lami</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSEA &apos;</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">07</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">System wide information management (swim) segment 2 technical review</title>
		<imprint>
			<date type="published" when="2009-10">October 2009</date>
		</imprint>
		<respStmt>
			<orgName>Federal Aviation Administration ; FAA</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Observational Models of Requirements Evolution</title>
		<author>
			<persName><forename type="first">M</forename><surname>Felici</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
		<respStmt>
			<orgName>University of Edinburgh</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A formal basis for consistency, evolution and rationale management in requirements engineering</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ghose</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICTAI &apos;99</title>
				<imprint>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Formal tools for managing inconsistency and change in re</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ghose</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IWSSD &apos;00</title>
				<meeting><address><addrLine>Washington, DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Supporting impact analysis and change propagation in software engineering environments</title>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 8th International Workshop on Software Technology and Engineering Practice (STEP&apos;97/CASE&apos;97)</title>
				<meeting>8th International Workshop on Software Technology and Engineering Practice (STEP&apos;97/CASE&apos;97)</meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The change and evolution of requirements as a challenge to the practice of software engineering</title>
		<author>
			<persName><forename type="first">S</forename><surname>Harker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Eason</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Dobson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">RE &apos;93</title>
				<imprint>
			<date type="published" when="1993">1993</date>
			<biblScope unit="page" from="266" to="272" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Change impact analysis for requirement evolution using use case maps</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hassine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rilling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hewitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dssouli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IWPSE &apos;</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">05</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Requirements evolution in the midst of environmental change: a managed approach</title>
		<author>
			<persName><forename type="first">W</forename><surname>Lam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Loomes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CSMR &apos;98</title>
				<imprint>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Managing evolving requirements in an outsourcing context: an industrial experience report</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lormans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Van Dijk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Van Deursen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Nocker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>De Zeeuw</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IWPSE &apos;04</title>
				<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="149" to="158" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Environment evolution: The prism model of changes</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">H</forename><surname>Madhavji</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Software Eng</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="380" to="392" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m">Deliverable 1.3: Meeting the challenge of chainging requirements</title>
				<imprint>
			<date type="published" when="1996-06">June 1996</date>
		</imprint>
		<respStmt>
			<orgName>Centre for Software Reliability, University of Newcastle upon Tyne</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m">Deliverable 1.1: Description of the scenarios and their requirements</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical report</note>
	<note>Project SecureChange</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Restructuring requirements specifications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Russo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nuseibeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kramer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEE Proceedings: Software</title>
				<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">146</biblScope>
			<biblScope unit="page" from="44" to="53" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Decision making with the analytic hierarchy proce</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Saaty</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Services Sciences</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="83" to="98" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">An examination of the effects of requirements changes on software maintenance releases</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">E</forename><surname>Stark</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Oman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Skillicorn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ameele</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Software Maintenance: Research and Practice</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="293" to="309" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Dealing with known unknowns: Towards a game-theoretic foundation for software requirement evolution</title>
		<author>
			<persName><forename type="first">L</forename><surname>Tran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Massacci</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">23rd International Conference on Advanced Information Systems Engineering (CAiSE&apos;11)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A logical framework for modeling and reasoning about the evolution of requirements</title>
		<author>
			<persName><forename type="first">D</forename><surname>Zowghi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Offen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICRE &apos;</title>
		<imprint>
			<biblScope unit="volume">97</biblScope>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
