IPSJ SIG Technical Report Vol.2015-SE-187 No /3/ Checking the Consisteny between Requirements Specification Documents and Regulations A

Similar documents
& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]

2 33,**. + : +/* /++** +/* /++** +/* /++** /** /** F+ +*** F+ +*** / 1*42.,43 /14+,*42 /, , 134,.,43 / 0-41,*42.4, -/41,*43,34,,+4. +

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

58 10

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

新製品開発プロジェクトの評価手法

DEIM Forum 2009 E

( )

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

揃 Lag [hour] Lag [day] 35

Computer Security Symposium October 2013 Android OS kub

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R


先端社会研究 ★5★号/4.山崎

16_.....E...._.I.v2006

,,,,., C Java,,.,,.,., ,,.,, i


Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

知能と情報, Vol.30, No.5, pp

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

FUJII, M. and KOSAKA, M. 2. J J [7] Fig. 1 J Fig. 2: Motivation and Skill improvement Model of J Orchestra Fig. 1: Motivating factors for a

Web Web Web Web Web, i

先端社会研究所紀要 第9号☆/2.島村

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

Core Ethics Vol.

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

日本感性工学会論文誌

FC741E2_091201

.\.....pwd

関西福祉大学紀要 12号(P)/1.太田

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

<332D985F95B62D8FAC93638BA795DB90E690B62E706466>

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

11_土居美有紀_様.indd

Hansen 1 2, Skinner 5, Augustinus 6, Harvey 7 Windle 8 Pels 9 1 Skinner 5 Augustinus 6 Pels 9 NL Harvey ML 11 NL

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,


3_39.dvi

SERPWatcher SERPWatcher SERP Watcher SERP Watcher,

AP AP AP AP AP AP AP( AP) AP AP( AP) AP AP Air Patrol[1] Air Patrol Cirond AP AP Air Patrol Senser Air Patrol Senser AP AP Air Patrol Senser AP

:. * ** *** **** Little Lord Fauntleroy Little Lord Fauntleroy Frances Eliza Hodgson Burnett, - The Differences between the Initial Edition and First

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig

untitled

人文学部研究年報12号.indb

ICT Web Web ICT Web 2. 新 学 習 指 導 要 領 の 理 念 と 教 育 の 情 報 化 の 意 義 2-1 新 学 習 指 導 要 領 の 理 念 ICT 2

36 Theoretical and Applied Linguistics at Kobe Shoin No. 20, 2017 : Key Words: syntactic compound verbs, lexical compound verbs, aspectual compound ve

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

, IT.,.,..,.. i

XML Tool to Check the Consistency both Software Documents Using XML and Source Programs 1 Summary. Generally, a software consists of source programs a

SNS GIS Abstract The Tourism-based Country Promotion Basic Act was enacted in Japan over a decade ago. Tourism is expected to be the primary contribut

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

2reN-A14.dvi

先端社会研究所紀要 第11号☆/3.李

<30315F985F95B65F90B490852E696E6464>


% 95% 2002, 2004, Dunkel 1986, p.100 1

鹿大広報149号

IPSJ SIG Technical Report Vol.2012-MUS-96 No /8/10 MIDI Modeling Performance Indeterminacies for Polyphonic Midi Score Following and

2 ( ) i

The 18th Game Programming Workshop ,a) 1,b) 1,c) 2,d) 1,e) 1,f) Adapting One-Player Mahjong Players to Four-Player Mahjong

* * 2

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :


Huawei G6-L22 QSG-V100R001_02

Core Ethics Vol. QOL N N N N N N N K N N

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

NINJAL Research Papers No.3

tikeya[at]shoin.ac.jp The Function of Quotation Form -tte as Sentence-final Particle Tomoko IKEYA Kobe Shoin Women s University Institute of Linguisti

〈論文〉興行データベースから「古典芸能」の定義を考える

大学における原価計算教育の現状と課題


IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

05研究紀要第3号_卒論_松澤一真様59-74.indd

3_23.dvi

untitled

IPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki

JFE.dvi

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

自然言語処理16_2_45

29 jjencode JavaScript


johnny-paper2nd.dvi

Steel Construction Vol. 6 No. 22(June 1999) Engineering

...S.....\1_4.ai

16

...

「リストラ中高年」の行方

‚æ4“ƒ.ren

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2


橡LET.PDF


DOUSHISYA-sports_R12339(高解像度).pdf

<8ED089EF8B D312D30914F95742E696E6464>

Transcription:

1 1 1 Checking the Consisteny between Requirements Specification Documents and Regulations Abstract: When developers check the consistency between requirements specification documents and regulations by Model checking, they need state transition models of the documents and logic specifications of regulations. Moreover, they have to know which words in documents correspond to words in applicable regulations in respect of meaning so that they create logic specifications. In this paper, we propose a technique to reason the meaning of words in requirements specification documents by using co-occurrence restrictions in case frames and to create state transition models based on the reasoned meaning and logic specifications of applicable regulations. These specifications are created from these reasoned meaning and logic expressions which contain case frames as factors and express regulations. Our proposal is evaluated with a case study. Keywords: Use case description, Model checking, Case grammar 1. [1] [2] 1 Tokyo Institute of Technology [3] [4] 1

[5] 6 4 8 4 2 3 4 5 6 7 2. 2.1 [6] (, :, :, : ) [7] 2.2 1 [3] *1 (, : x, :, : y) (, : x, : ) (, : x, :, : y) (, : x, : ) [2] s, a s AF a (, :, :, : ) *1 2

シナリオの順序 状態遷移, 変数の導出 [ 鈴木 ] 状態遷移モデル モデル検査器 ユースケース 格構造 格構造 + 単語の概念 整合性判定 : 要求文の概念特定 : 規則の論理式の具体化 検査式 単語辞書 格フレーム辞書 概念階層辞書 規則の論理式 言語資源 1 1 2.3 [8] 3. 3.1 1 is-a [8] [9] 3

3.2 3.1 is-a 3 2 概念階層 制度 組織 事業者 単語システム 格フレーム辞書 抽象物 個人情報 住所取る 住所 学問 取得 学ぶ 動詞主格 ( ガ ) 深層格 ( ヲ ) 源泉格 ( カラ ) 学ぶ人 組織学問人 組織 人 客 顧客 動詞主格 ( ガ ) 深層格 ( ヲ ) 源泉格 ( カラ ) 取る人 組織具体物人 組織 2 W C W C 2 { w w c } 1 c [9] c w rep { c w rep c } w rep rep is-a C C 2 is-a. c v case d rest f = (c v, case d: rest,... ) (1) F 2 2 f 1 f 1 = (, :, :, : ) (2) m f f 1 m f1 ( ) 2 c c c &! 3.3. w v cases: w n,.... (, :, :, : ) w n. w v w v F wv = { (c v, cased: rest,... ) F w v c v } (3) w v = 2 2. w n (case d, rest) case d = m f (case s ) case d rest case s w n 4

{( : : ), ( : : ), ( : : )}, (4) {( : : ), ( : : ), ( : : )} (5). w n rest w n c r s [10] s min{s(r a, c), s(r b, c)} (r = r a & r b ) max{s(r a, c), s(r b, c)} (r = r a r b ) s(r, c) = 1 s(c r, c) (r =! c r ) s(c r, c) (r = c r ) (6) c r s(c r, c) 1 (c c r ) s(c r, c) = 1/(d min + 1) () 0 (c c = c p ) d(c c, c p ) = 1 (c p c c ) 1 + d () s(c r, c) c r c is-a c r c is-a 1 (8) is-a d d { d(c c, c p ) c p c p } d min { d(c c, c ) c c c c p c } c c c p c c 2 s(, ) = 1/(2 + 1) = 0.67 s (7) (8) slots = {(w n, case d, rest, cs, score) i } (9) score cs 2 (4) (5) (9) (,, { }, 1) (,, { }, 1/3). score f = slots k=1 score k slots + 1 (10) (10) 1 score 1 (10) 3/4(0.75) 2.33/4(0.58) score f (11) 3.4 (w v, c v, score f, slots) (11) f 1 = (c 1, case1 i : rest 1 i,... ), f 2 = (c 2, case2 j : rest 2 j,... ) c 1 = c 2 case 1 i case 1 i = case2 j case2 j c (s(rest 1 i, c) = 1 s(rest 2 j, c) = 1) (12) f 2 f 1 (11) f i cs (11) CS i i CS 1 CS n n CS i = CS i = {FALSE} f i 3.2 rep CS i 5

3 (rep(c v ), cased: rep(c rep ),... )}) (13) c rep (9) cs (, :, :, : ) AF (, :, :, : ) {(, :, :, : )}, {(, :, :, : )}, (, :, :, : ) AF(, :, :, : ) 4. 5.2 3 4 4 [2] 2 5 (14), (15), (16) * 2.3 * NuSMV *2 CTL Cabocha *3 5. 5.1 *2 http://nusmv.fbk.eu/ *3 https://code.google.com/p/cabocha/ AG((, :, :, : ) &!(, :, : ) AF (, :, :, : ) (, :, : )) AG ((, :, : ) AF (, :, : )) (14) (15) 6

1 EDR 270000 410000 13000 EDR * 61(9) 59(17) 10(1) * ( ) 2 2 2 1 1 2 2 0 0 2 0 1 1 AG((, :, :, : ) AF((, :, :, : ) &(, :, : ) (, :, :, : ))) (16) EDR [11] EDR 1 5.3 4/8(0.50), 4/6(0.66) 2 (16) (15) 5.4 1 (14) AG(((, :, :, : )&!FALSE) (17) AF((, :, :, : ) FALSE)) 5.5 [4] 15, 144, include 3 16, 146, 5 7

6. KNP *4 KNP Web [12] KNP [13] [14], [15] Sinnig [16] Sinning 7. [1] Otto, P. N. and Antón, A. I.: Addressing Legal Requirements in Requirements Engineering, Proc. RE, pp. 5 14 (2007). [2] Saeki, M., Kaiya, H. and Hattori, S.: Detecting Regulatory Vulnerability in Functional Requirements Specifications, Proc. ICSOFT, Vol. 1, pp. 105 114 (2009). [3] Saeki, M. and Kaiya, H.: Supporting the Elicitation of Requirements Compliant with Regulations, Proc. CAiSE, pp. 228 242 (2008). [4],, Vol. 2010, No. 17, pp. 1 8 (2010). [5],, 2014 pp. 76 84 (2014). [6] Fillmore, C. J.: Some problems for case grammar, Monograph series on languages and linguistics, Vol. 24, pp. 35 56 (1971). [7] Bird, S., Klein, E. and Loper, E.: O Reilly Japan, Inc. (2010). [8] (2012). [9],, Vol. 113, No. 489, pp. 25 30 (2014). [10] Russell, S. and Norvig, P.: Artificial Intelligence: A Modern Approach, Prentice Hall Press, 3rd edition (2009). [11] EDR. [12] Web Vol. 2006, No. 1, pp. 67 73 (2006). [13],, Vol. 31, No. 2, pp. 175 181 (1990). [14] May, M. J., Gunter, C. A. and Lee, I.: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop, pp. 85 97 (2006). [15] Ingolfo, S., Jureta, I., Siena, A., Perini, A. and Susi, A.: Nòmos 3: Legal Compliance of Roles and Requirements, Proc. ER, pp. 275 288 (2014). [16] Sinnig, D., Chalin, P. and Khendek, F.: LTS Semantics for Use Case Models, Proc. SAC, pp. 365 370 (2009). *4 http://nlp.ist.i.kyoto-u.ac.jp/index.php?knp 8