27.03.2014 Views

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

There are two possibilities that can be drawn from such<br />

scenario: (1) RM is not a commonly performed activity in an<br />

SPL project; or, (2) practitioners have not reported their<br />

experience about what has been experienced in RM to SPL<br />

projects. Such possibilities were confirmed through the studies<br />

analyzed during the mapping in SPL and SSD [5].<br />

a) RM activities and steps.<br />

A number of common and different activities were<br />

identified during the results analysis. In order to understand<br />

them, some steps were also considered, as showed in Table III.<br />

The use of steps may ease the activities execution. However,<br />

for some identified activities and practices, the steps were not<br />

mentioned.<br />

TABLE III.<br />

ACTIVITIES AND STEPS<br />

ID Activities and Practices SPL SSD Steps SPL SSD<br />

Ac1 Mature Scope Definition<br />

Identify the drawbacks in Scope<br />

Isolate stable areas from unstable<br />

Meetings with the experts<br />

Ac2 Risk Identification<br />

Apply Interview<br />

Apply Brainstorming<br />

Analyses Documentation<br />

Apply Questionnaire<br />

Continuous Identification<br />

Early Identification<br />

Observation and Expertise<br />

Provide Meetings<br />

Provide Risk Description<br />

Risk Scenario<br />

Use of Tool<br />

Ac3 Risk Prioritization<br />

Checklist<br />

Define Level of Exposure<br />

Rank the Risks<br />

Summarize the Risks<br />

Ac4 Risk Reporting ----<br />

Ac5 Team Commitment<br />

Define Stakeholders Role<br />

Improve the Communication<br />

Provide Meetings<br />

Stakeholder´s Expertise<br />

Training the Team<br />

Ac6 Artifacts Reuse<br />

Identify reusable assets<br />

Define Level of Exposure<br />

Define Graphs<br />

Define Risk Template<br />

Ac7<br />

Provide (SPL)<br />

Risks Description<br />

Documentation<br />

Risk Historic<br />

Risk Ranking<br />

Risk Scenario<br />

Ac8 SPL Management<br />

Software Product Line Mapping<br />

Artifacts Management<br />

Ac9 Define Interview<br />

Identify risk through interview<br />

Define the Questionnaire<br />

Ac10 Mature Domain Definition<br />

Preparation, Execution and Analysis<br />

Establish a domain analyst role<br />

Assess the subdomains<br />

Identification of reusable entities<br />

Make a domain potential analysis<br />

Ac11 SPL Assessment<br />

Assess the architecture<br />

Identify the strengths and weakness<br />

Ac12 Feature Development<br />

Features Identification<br />

Features Elicitation<br />

Feature Model Development<br />

Ac13 SPL Variability Variability Assessment<br />

Ac14 Requirements Management Requirements Elicitation<br />

Ac15 Tool for SPL ----<br />

Continued on next page<br />

643

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!