Open Access Open Access  Restricted Access Subscription or Fee Access

A Conceptual Dependency Analysis on Requirements Clustering for Component Selection

A. Siba, R. Subha


Component Based System (CBS) development is used to integrate existing components to build a software system. In this project, a goal model is created for Meeting Scheduling System which consists of High Level Goals and Concrete Level Goals. A conceptual dependency analysis is created to model interdependencies of CBS. Then the goals are clustered based on the usage, non-functional and threat dependencies. A potential list of candidate components is identified for each cluster. Each CLG in the cluster is identified as a keyword and is used to search for off the- shelf components that satisfy it. The off-the-shelf components that satisfy all the CLGs in a cluster are candidates for the cluster (consolidated CLG).Then the matching index of the cluster are found. The cluster based component selection process leads to a set of consolidated CLGs and a portfolio of candidate components which satisfies system requirements.


Component Based Software System; Conceptual Dependency Analysis; Matching Index; Concrete Level Goals.

Full Text:



Muhammad Ali Khan , Sajjad Mahmood,”A graph based requirements clustering approach for component selection,” Advances in Engineering Software 54 (2012) 1–16

Li J, Conradi R, Siyngstad OPN, Bunse C, Torchiano M, Morisio M,”Development with off-the-shelf components”10 facts. IEEE Software 2009;26(2):80–7.

Rolland C, Souveyet C, Achour CB,”Guiding goal modeling using scenarios,”IEEE Trans Software Eng 1998;24(12):1055–71.

van Lamsweerde A,” Requirements engineering from system goals to UML models to software specifications,” Wiley; 2009.

Doreian P, Mrvar A,”Partitioning signed social networks,” Soc Networks 2009;31(1):1–11.

Cechich A, Piattini M,” Early detection of cots component functional suitability,”Inf Software Technol 2007;49(2):108–21.

Harman M, Skaliotis A, Steinhofel K. Search-based approaches to the component selection and prioritization problem. In: Proceedings of the 22nd IEE international conference on software maintenance. 2006. p. 176–85.

Birkmeier D, Overhage S. “On componenet identification approaches classification, state of the art, and comparision,” In: Lewis GA, Poernomo I,Hofmeister C. editors. 12th international symposium on component-based software engineering, vol. LNCS 5582. 2009. p. 1–18.

Crnkovic I, Larsson M,”Challenges of component based development,”J Syst Software 2002;61(3):201–12.

Sommerville I,”Integrated requirements engineering,”: a tutorial. IEEE Software 2005;22(1):16–23.

Mohamed A, Ruhe G, Eberlein A,” Mihos: an approach to support handling the mismatches between system requirements and cots products,” Requirements Eng 2007;12:127–43.

Hope P, McGraw G, Anton AI,” Misuse and abuse cases: getting past the positive,” IEEE Secur Privacy 2004;2(3):90–2.

Sindre G, Opdahl AL,”Eliciting security requirements with misuse cases,”Requirements Eng 2005;10:34–44.

de Nooy W, Mrvar A, Batageli V,”Exploratory social network analysis with Pajek,” Cambridge University Press; 2005.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.