Process Mining Application in Software Process Assessment

Total Page:16

File Type:pdf, Size:1020Kb

Process Mining Application in Software Process Assessment Process mining application in software process assessment Citation for published version (APA): Samalikova Kapustova, J. (2012). Process mining application in software process assessment. Technische Universiteit Eindhoven. https://doi.org/10.6100/IR739990 DOI: 10.6100/IR739990 Document status and date: Published: 01/01/2012 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim. Download date: 28. Sep. 2021 Process Mining Application in Software Process Assessment A catalogue record is available from the Eindhoven University of Technology Library ISBN: 978-90-386-3287-2 This thesis is number D161 of the thesis series of the Beta Research School for Operations Management and Logistics. Printed by: AlfaPrint, s.r.o., Martin, Slovakia Cover design and photo by: Jana amalíková Kapustová Copyright © 2012 by Jana amalíková Kapustová. All rights reserved. Process Mining Application in Software Process Assessment PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Technische Universiteit Eindhoven, op gezag van de rector magnificus, prof.dr.ir. C.J. van Duijn, voor een commissie aangewezen door het College voor Promoties in het openbaar te verdedigen op woensdag 28 november 2012 om 16.00 uur door Jana amalíková Kapustová geboren te Komárno, Slowakije Dit proefschrift is goedgekeurd door de promotoren: prof.dr. R.J. Kusters en prof.dr.ir. P.W.P.J. Grefen Copromotor: dr.ir. J.J.M. Trienekens To my family Acknowledgements I want to take the opportunity to thank everyone who, one way or another, have helped and supported me over the past five years. First of all, I want to thank my supervisors Rob Kusters, Jos Trienekens, Ton Weijters and Paul Grefen for their guidance and support. Thank you for your advices and feedback, for your trust and patience. You made this period an exceptional and invaluable experience for me. For their willingness to serve on my doctoral committee and for their time dedicated to evaluate this dissertation, I would like to thank prof. dr. ir. D.M. van Solingen from Delft University of Technology, prof. dr. P.Krause from University of Surrey and prof. dr. M.G.J. van den Brand from Eindhoven University of Technology. I also want to thank my current and former colleagues at the Information Systems group for the pleasant time, support and inspiration. Especially, many thanks to Joel Ribeiro, Heidi Romero, Dániel Kelemen, Zhiqiang Yan, Marco Comuzzi, Ricardo Seguel Pérez, Samuil Angelov, Natalia Mulyar, Maja Pei, Mariska Netjes, Anne Rozinat and Ana Karla Alves de Medeiros among others. Thanks to the secretaries of the group Ineke Withagen, Ada Rijnberg and Annemarie van der Aa for their help and assistance. Also, thanks to Geertje Kramer and Annemie van der Werf from BETA. A big thank you goes to my friends in the Netherlands, as well as those at home in Slovakia for having a great time together and for “recharging my batteries”. Especially, thanks to Silvia for her long-lasting friendship and encouragement. Lastly and most importantly, I am deeply grateful to my family and to my children Danko, Samko and Vierka. akujem za vau lásku, trpezlivos a pomoc. Za to, e za ak chko vek okolností stojíte pri mne. Bez vaej podpory by som sa nedostala tam, kde teraz som. akujem! vii Table of Contents Acknowledgements.......................................................................................... vii List of Figures ................................................................................................. xiii List of Tables.....................................................................................................xv Part 1A.................................................................................................................1 Chapter 1 Introduction....................................................................................3 1.1. Software process quality ............................................................................3 1.2. Process mining ...........................................................................................8 1.3. Research goal .............................................................................................9 1.4. Research questions .....................................................................................9 1.5. Methodology ............................................................................................10 1.5.1. Research question RQ 1 .....................................................................11 1.5.2. Research question RQ 2 .....................................................................13 1.5.3. Research question RQ 3 .....................................................................14 1.5.4. Research question RQ 4 .....................................................................16 1.6. Contributions............................................................................................18 1.7. Outline of the thesis..................................................................................18 Part 2 Exploratory research...........................................................................23 Chapter 2 Information gathering in software process assessment............25 2.1. Introduction ..............................................................................................25 2.2. Background ..............................................................................................28 2.3. Information gathering in SPI methods .....................................................31 2.3.1. Information gathering in CMMI ........................................................31 2.3.2. Information gathering in SPICE - ISO/IEC 15504 ............................33 2.3.3. Information gathering in BOOTSTRAP ............................................34 2.3.4. Summary ............................................................................................34 2.4. Literature search on software process characteristics ..............................35 2.4.1. Literature search approach .................................................................36 2.4.2. Software process characteristics ........................................................37 2.5. Uncertainty as a basis for information gathering in software process assessment .......................................................................................................37 2.5.1. Uncertainty in a software development system .................................38 2.5.2. Evaluation of uncertainty in a software development system............43 2.6. Towards a new approach for information gathering in software process assessment: software process mining..............................................................46 2.7. Conclusions ..............................................................................................47 ix Table of Contents Chapter 3 Towards objective software process information: experiences from a case study ..............................................................................................49 3.1. Introduction ..............................................................................................49 3.2. Background and related research .............................................................51 3.3. The case studies: software projects and their CCB-process.....................55 3.3.1. The complexity of the 'actual' CCB-process ......................................55 3.3.2. The 'official' CCB-process as derived from the quality manuals.......56 3.4. The case-studies: the available data and the data preparation..................60 3.4.1. The available data ..............................................................................60 3.4.2. Data preparation: from snapshots to event-log ..................................61 3.5. Analyzing and constructing the 'actual' CCB-process..............................66
Recommended publications
  • Command Line Interface
    Command Line Interface Squore 21.0.2 Last updated 2021-08-19 Table of Contents Preface. 1 Foreword. 1 Licence. 1 Warranty . 1 Responsabilities . 2 Contacting Vector Informatik GmbH Product Support. 2 Getting the Latest Version of this Manual . 2 1. Introduction . 3 2. Installing Squore Agent . 4 Prerequisites . 4 Download . 4 Upgrade . 4 Uninstall . 5 3. Using Squore Agent . 6 Command Line Structure . 6 Command Line Reference . 6 Squore Agent Options. 6 Project Build Parameters . 7 Exit Codes. 13 4. Managing Credentials . 14 Saving Credentials . 14 Encrypting Credentials . 15 Migrating Old Credentials Format . 16 5. Advanced Configuration . 17 Defining Server Dependencies . 17 Adding config.xml File . 17 Using Java System Properties. 18 Setting up HTTPS . 18 Appendix A: Repository Connectors . 19 ClearCase . 19 CVS . 19 Folder Path . 20 Folder (use GNATHub). 21 Git. 21 Perforce . 23 PTC Integrity . 25 SVN . 26 Synergy. 28 TFS . 30 Zip Upload . 32 Using Multiple Nodes . 32 Appendix B: Data Providers . 34 AntiC . 34 Automotive Coverage Import . 34 Automotive Tag Import. 35 Axivion. 35 BullseyeCoverage Code Coverage Analyzer. 36 CANoe. 36 Cantata . 38 CheckStyle. ..
    [Show full text]
  • Analysis of Devops Tools to Predict an Optimized Pipeline by Adding Weightage for Parameters
    International Journal of Computer Applications (0975 – 8887) Volume 181 – No. 33, December 2018 Analysis of DevOps Tools to Predict an Optimized Pipeline by Adding Weightage for Parameters R. Vaasanthi V. Prasanna Kumari, PhD S. Philip Kingston Research Scholar, HOD, MCA Project Manager SCSVMV University Rajalakshmi Engineering Infosys, Mahindra City, Kanchipuram College, Chennai Chennai ABSTRACT cloud. Now-a-days more than ever, DevOps [Development + Operations] has gained a tremendous amount of attention in 2. SCM software industry. Selecting the tools for building the DevOps Source code management (SCM) is a software tool used for pipeline is not a trivial exercise as there are plethora’s of tools development, versioning and enables team working in available in market. It requires thought, planning, and multiple locations to work together more effectively. This preferably enough time to investigate and consult other plays a vital role in increasing team’s productivity. Some of people. Unfortunately, there isn’t enough time in the day to the SCM tools, considered for this study are GIT, SVN, CVS, dig for top-rated DevOps tools and its compatibility with ClearCase, Mercurial, TFS, Monotone, Bitkeeper, Code co- other tools. Each tool has its own pros/cons and compatibility op, Darcs, Endevor, Fossil, Perforce, Rational Synergy, of integrating with other tools. The objective of this paper is Source Safe, and GNU Bazaar. Table1 consists of SCM tools to propose an approach by adding weightage to each with weightage. parameter for the curated list of the DevOps tools. 3. BUILD Keywords Build is a process that enables source code to be automatically DevOps, SCM, dependencies, compatibility and pipeline compiled into binaries including code level unit testing to ensure individual pieces of code behave as expected [4].
    [Show full text]
  • Ansys SCADE Lifecycle®
    EMBEDDED SOFTWARE Ansys SCADE LifeCycle® SCADE LifeCycle is part of the Ansys Embedded Software family of products and solutions that includes modules providing unique support for application lifecycle management. This product line features requirements traceability via Application Lifecycle Management (ALM) tools, traceability from models, configuration and change management, and automatic documentation generation. SCADE LifeCycle enhances the functionalities of Ansys SCADE® tools with add-on modules that bridge SCADE solutions and Requirement Management tools or PLM/ALM (Product Lifecycle Management/ Application Lifecycle Management) tools. With SCADE LifeCycle, all systems and software teams involved in critical applications development can manage and control their design and verification activities across the full life cycle of their SCADE applications. / Requirements Traceability SCADE LifeCycle Application Lifecycle Management (ALM) Gateway provides an integrated traceability analysis solution for safety-critical design processes with SCADE Architect, SCADE Suite, SCADE Display, SCADE Solutions for ARINC 661 and SCADE Test: • Connection to ALM tools: linkage to DOORS NG, DOORS (9.6 and up) Jama Connect, Siemens Polarion, Dassault Systèmes Reqtify 2016. • Graphical creation of traceability links between requirements or other structured documents and SCADE models. • Traceability of test cases from SCADE Test Environment projects. • Bidirectional navigation across requirements and tests. • Customizable Export of SCADE artifacts to DOORS or Jama Connect. • Compliant with DO-178B, DO-178C, EN 50128, IEC 61508, ISO 26262, and IEC 60880 standards. EMBEDDED SOFTWARE / SCADE LifeCycle® // 1 / Project Documentation Generation SCADE LifeCycle Reporter automates the time-consuming creation of detailed and complete reports from SCADE Suite, SCADE Display, SCADE Architect and SCADE UA Page Creator for ARINC 661 designs through: • Generation of reports in RTF or HTML formats.
    [Show full text]
  • List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half- duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full- duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number /etc/services, a service name range being unassigned. The Stream Control Transmission Protocol database file on Unix-like operating (SCTP) and the Datagram Congestion Control Protocol (DCCP) also systems.[1][2][3][4] use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[5] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Official: Port is registered with IANA for the application.[5] Unofficial: Port is not registered with IANA for the application. Multiple use: Multiple applications are known to use this port. Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network services.
    [Show full text]
  • Les Outils Qui Nous Veulent Du Bien Plus De Temps Pour Développer En Labview
    Les outils qui nous veulent du bien Plus de temps pour développer en LabVIEW Rhône-Alpes LUG : Rencontre développeurs 04/07/2013 Luc DESRUELLE – Certifié LabVIEW Architect - MESULOG www.mesulog.fr La société MESULOG en bref Activité : Développement logiciel test et mesure Compétences : LabVIEW (Windows, RT, DSC, PDA, FPGA), TestStand Localisation : Grenoble (Moirans, 38) Partenaire National Instruments (2001) Développeurs certifiés LabVIEW et TestStand www.mesulog.fr (exemples de réalisation) Juillet 2013 Les logiciels qui vous veulent du bien 2 La société MESULOG en bref Ils nous ont fait confiance : AREVA T&D ALSTOM Grid ATMEL BEAMIND CEA (Commissariat à l'Énergie Atomique) CETIAT (Centre Technique des Industries Aérauliques et Thermiques) CNES (Centre National d'Études Spatiales) CNRS (Centre National de la Recherche Scientifique) EDF HONEYWELL Security LNE (Laboratoire National d'Essais) NIST (National Institute of Standards and Technology) NMIJ (National Metrology Institute of Japan) PECHINEY RADIALL STMicroelectronics THALES VALEO ... Juillet 2013 Les logiciels qui vous veulent du bien 3 Le présentateur CLA FORUMS Chef Projet Luc DESRUELLE Juillet 2013 Les logiciels qui vous veulent du bien 4 Le constat Le constat Juillet 2013 Les logiciels qui vous veulent du bien 5 Le constat Départ gestion projet Gestion projet : VITE Faire vite Juste avec ou bien? Coder BIEN BIEN vite ou bien un bloc notes Gestion Projet : Spécifications VITE Réalisation Tâches et Gestion code source Livrer Tests du code code Livrables
    [Show full text]
  • La Gestion De Configuration
    Gestion de configuration Gestion de versions L'outil Subversion > La gestion de configuration | Suivre l'´evolutionde son produit tout en travaillant en ´equipe Jean-Yves Didier Universit´ed'Evry-Val d'Essonne Jean-Yves Didier La gestion de configuration 1/42 Gestion de configuration Gestion de versions L'outil Subversion > 1 Gestion de configuration 2 Gestion de versions G´en´eralit´es Concepts 3 Subversion : un outil de gestion de version Fonctionnement g´en´eral D´eploiementde subversion Jean-Yves Didier La gestion de configuration 2/42 Gestion de configuration Gestion de versions L'outil Subversion > Probl´ematique Questions classiques • O`use trouve la derni`ereversion en cours de d´eveloppement ? • Quelle version a ´et´evalid´eeet a ´et´efabriqu´ee? • Comment d´efinirun r´ef´erentielcommun entre tous les acteurs d'un projet ? R´esolutiondes probl`emessuivants • La duplication des donn´eesnum´eriques; • La gestion des it´erationset des versions ; • La gestion des configurations ; • La cr´eationd'un r´ef´erentiel; • Le contr^olede l'acc`esaux donn´ees. Jean-Yves Didier La gestion de configuration 3/42 Gestion de configuration Gestion de versions L'outil Subversion > Gestion de configuration (1/3) D´efinition: Gestion de configuration • Instantan´edes caract´eristiquesfonctionnelles et physiques d'un syst`emecon¸cupour r´epondre `aun ensemble d'exigences • Ensemble des activit´es,manuelles ou automatis´ees, permettant d’identifier et de d´efinirles articles de configuration d'un syst`eme et toutes leurs relations ; D´efinition: Article de configuration • Ensembles et sous-ensembles du syst`emequi remplissent une fonction int´eressantles utilisateurs ; • Tout article (document papier, logiciel ou mat´eriel),contenant des informations n´ecessaires`ala r´ealisationd'un projet ou au suivi de cette derni`ere.
    [Show full text]
  • Rational DOORS Installation Guide Release 9.2
    IBM Rational DOORS Rational DOORS Installation Guide Release 9.2 Rational DOORS Rational DOORS Integration Products Before using this information, be sure to read the general information under the "Notices" chapter on page 107. This edition applies to IBM Rational DOORS, VERSION 9.2, and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1993, 2009 US Government Users Restricted Rights—Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Table of contents Chapter 1: About this manual 1 Chapter 2: Introduction 3 What is Rational DOORS? . 3 What types of Rational DOORS installation can I have? . 5 What are the licensing options?. 6 What next? . 6 Chapter 3: New installation of Rational DOORS on Windows 9 Installing the Rational DOORS database server . 9 Installing the Rational DOORS client. 12 Installing Rational DOORS for Rational Quality Manager Interface . 14 The Rational DOORS for Rational Quality Manager Interface client . 15 The Rational DOORS for Rational Quality Manager Interface server . 16 Silent installation . 18 Starting Rational DOORS . 19 For installations that point to an empty data folder . 19 For installations that point to existing Rational DOORS data . 20 RDS, the Rational DOORS database and UUIDs . 20 tds_valid_id.txt . 21 tds_registered.txt . 21 Installing the Rational DOORS Example Data . 21 Uninstalling Rational DOORS . 22 Chapter 4: Upgrading from version 9.0 and later 23 Information for users upgrading to Rational DOORS 9.2 from 9.0 and 9.1 . 23 Data migration. 23 Licensing . 23 Compatibility between version 9.0 and Rational DOORS 9.2 .
    [Show full text]
  • Introduction to Rational Synergy Release 7.1 Before Using This Information, Be Sure to Read the General Information Under Appendix A, “Notices” on Page 55
    Introduction to Rational Synergy Release 7.1 Before using this information, be sure to read the general information under Appendix A, “Notices” on page 55. This edition applies to VERSION 7.1, Rational Synergy (product number MN-SCM-IV-ICM70-08-01) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1992, 2009 US Government Users Restricted Rights—Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. ii Introduction to Rational Synergy Table of Contents Chapter 1: Introduction 1 Transitioning from other tools. 1 Conventions . 2 Rational Synergy graphical user interfaces . 2 Rational Synergy command line interface. 2 Typefaces and symbols . 2 Contacting IBM Rational Software Support . 3 Prerequisites . 3 Submitting problems. 3 Chapter 2: Benefits of using Rational Synergy 7 Goals of a configuration management tool . 7 Rational Synergy benefits . 8 Easy to use, right out of the box . 8 Fast start-up . 8 Rapid productivity for new users . 9 Flexible, automated workflow . 9 Secure team engineering environment . 10 World-wide control and transfer of information . 10 Seamless integrations for Windows development . 12 Chapter 3: Rational Synergy terminology 13 The Rational Synergy database. 13 Tasks and objects . 13 More about objects . 16 The check out and check in operations . 16 History. 18 Properties. 18 Current task. 18 Users, lifecycles, and states. 19 Introduction to Rational Synergy iii Projects and project groupings . 20 Directories and candidates . 22 The work area . 22 The synchronize operation . 23 Using, creating, adding, deleting, or removing objects . 23 Update, baseline, tasks, and process rules .
    [Show full text]
  • IBM Rational Synergy V7.2 and IBM Rational Change V5.3 Offer Architectural and Functional Improvements to Address Changing Needs
    IBM United States Software Announcement 211-038, dated May 3, 2011 IBM Rational Synergy V7.2 and IBM Rational Change V5.3 offer architectural and functional improvements to address changing needs of enterprise Change and Configuration Management Table of contents 1 Overview 7 Technical information 2 Key prerequisites 10 Ordering information 2 Planned availability date 18 Terms and conditions 2 Description 19 Prices 7 Program number 20 Order now 7 Publications At a glance In today's global economy, innovation holds the key to survival and growth. Organizations are profiting from skills and capital arbitrage through distributed resources. To support these dispersed, collaborative teams, organizations need a unifying platform for maximized value creation. IBM® Rational® Synergy and IBM Rational Change together: • Provide centralized Change and Configuration Management platform • Bring together globally distributed teams • Enable alignment of your technology investments with complex business demands to improve quality, accountability, and traceability From bottom to top support for achieving agility through task-based configuration management, advanced Software Change Management (SCM) and component- based development capabilities to a top-down approach using a Central CM platform, you can ensure that all processes for the development and delivery of software, systems, and IT, can be defined, implemented, automated, visualized, and thus, managed. Out-of-the-box Enterprise Change processes, reports, and lifecycles assist your organization with Six Sigma metrics and provide a fully integrated solution that brings together software development, IT, and other sources of change and software development for effective decision making. For ordering, contact your IBM representative, an IBM Business Partner, or IBM Americas Call Centers at 800-IBM-CALL (Reference: AE0001 ).
    [Show full text]
  • IBM Rational Synergy DCM-GUI
    IBM Rational Synergy DCM-GUI Release 7.2.1.1 IBM® Rational® Synergy - 1 - This edition applies to IBM Rational Synergy version 7.2.1.1, and to all subsequent releases and modifications until otherwise indicated in new editions. Before using this information, be sure to read the general information under Appendix: Notices on last section. © Copyright IBM Corporation 2014 US Government Users Restricted Rights – Use, duplication, or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM® Rational® Synergy - 2 - Contents Introduction........................................................................................................................4 Intended audience............................................................................................................4 Sources of DCM information..........................................................................................4 How this manual is organized..........................................................................................4 References used in this manual........................................................................................5 Overview of DCM..............................................................................................................6 About DCM.....................................................................................................................6 Features............................................................................................................................6 Terms and concepts.........................................................................................................7
    [Show full text]
  • Parasoft C/C++Test
    Parasoft C/C++test UNIFIED C AND C++ DEVELOPMENT TESTING GET A FREE TRIAL https://www.parasoft.com/ctest Deliver C and C++ FUNCTIONAL SAFETY AND COMPLIANCE ANALYZE HOST-BASED software that’s robust, Parasoft C/C++test provides everything you AND TARGET-BASED need to comply with industry standards: predictable, and secure. C AND C++ CODE CERTIFIED SOFTWARE Manage risk and costs by building better Parasoft C/C++test is certified by TÜV SÜD Increase the Quality of Complex software. Static analysis and unit testing for functional safety according to IEC 61508, Embedded C/C++ Software are critical for application quality, securi- IEC 62304, and ISO 26262 standards, Reduce the risk of complex embedded ty, and safety, and the cornerstone of any helping development teams achieve the software, leveraging comprehensive connected-application development initi- desired safety integrity level (SIL/ASIL). C and C++ coding best practices (e.g. ative today. MISRA C/C++, AUTOSAR C++, JSF) and Parasoft C/C++test is a unified testing QUALIFICATION KITS a powerful unit testing framework for solution that helps you identify defects To streamline the process of tool verification, both your host and target platforms. earlier and reduce the overall burden C/C++test Qualification Kits are available of achieving compliance with standards for DO-178B/C, DO-330, ED-12B/C, ISO- Mitigate the Security Risk from such as AUTOSAR, MISRA, ISO 26262, 26262, IEC-61508, and EN-50128, and other Connected IoT Devices DO-178B/C, IEC 61508, and IEC 62304. safety standards. These kits are customized Ensure the consistent application of for your specific environment and usage C/C++test helps organizations reduce security best practices (CERT, CWE, requirements, ensuring you have all the risk, cut costs, increase productivity, and OWASP) and integrate with API-level documentation required for verification.
    [Show full text]
  • Technical Data Sheet ®  SCADE Lifecycle R16
    Technical Data Sheet ® SCADE LifeCycle R16 SCADE LifeCycle is a product line of the ANSYS® Embedded software family of products and solutions that includes Requirements Management and modules combining a unique support for application lifecycle management. Traceability This product line features requirements traceability management, configuration and change management, SCADE LifeCycle Requirements Management Gateway automatic documentation generation, and project provides a complete traceability solution1 for safety-critical monitoring. design process with SCADE System, SCADE Suite, SCADE SCADE LifeCycle enhances the Display, and SCADE Test: functionalities of SCADE System®, SCADE Suite®, SCADE Display®, and SCADE Test with add-on modules that embed architecture and design activities within your whole Product/Application Lifecycle Management framework. With SCADE LifeCycle, all systems and software teams involved in critical applications Current Selection (Level N) development can manage and control their design and Central Column contains all documents verification activities across the full life cycle of their Upstream Information (N-1) = Downstream Information (N+1) What is covered by selection in = What is covering the selection SCADE® applications. the central column in the central column Read more about SCADE LifeCycle: • “Requirements Management and Traceability” • Capture of requirements and functional tests in a wide • “Project Metrics Dashboard” array of tools and formats: • ® ® ® ® • “Project Documentation Generation” Microsoft
    [Show full text]