SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Visualizing Stakeholder Concerns
with Anchored Map
                 Takanori Ugai*
                       **               **
        Shinpei Hayashi , Motoshi Saeki
* Fujitsu Laboratories/Tokyo Institute of Technology
** Tokyo Institute of Technology
Motivation
 Software development is a cooperative work by stakeholders.
 It is important
   to understand stakeholder concerns
   to identify potential problems
     • imbalance of stakeholders
     • lack of stakeholders




                                     1              Copyright 2010 Takanori Ugai
Stakeholders and concerns in AGORA




               2               Copyright 2010 Takanori Ugai
Stakeholders and concerns
Stakeholders                two-layer graphical representation
                                           Maintainability
   User1

   User2                3                    Portability

                    2
   User3                                     Usability

  Admin1
                5                            Reliability
                        5
  Admin2
                                             Efficiency
  Admin3

   Dev1                                        Cost

   Dev2
                                              Security

   Dev3
                                             Functions
                                     3
Anchored Map
 The nodes in stakeholders, called
  “anchor nodes”, are arranged on the
  circumference
 The nodes in concerns, called “free
  nodes”, are arranged at suitable positions
  in relations to the adjacent anchor nodes.
 The strength of edge as a spring is in
  proportional to the value attached the
  edge.
 An anchor node and a free node are
  located closer to each other if the
  stakeholder is strongly interested in the
  concern.


 Supposing that the elements in concerns
  as anchor nodes and the elements in
  stakeholders as free nodes, a anchored
  map is generated with the same way
                                        4      Copyright 2010 Takanori Ugai
Example
 Most of stakeholders are
  strongly interested in security
  and functions because they
  are located in the center of
  the circle.
 Developers, Admin1 and
 Admin3 are interested in cost
 but users are not.
 Users and Admin2 are
 interested in usability but
 developers are not.
 Only Admin2 is interested in
 maintainability.


                                    5   Copyright 2010 Takanori Ugai
Example2
 All users are interested in
  similar concerns, and Admin2 is
  also the same as the users.
 Dev2 and Dev3 are interested in
  similar concerns but Dev1 is
  slightly different from Dev2 and
  Dev3.
 All administrators are interested
  in different concerns.
 Nobody is interested in
  portability, reliability and
  efficiency. This is because the
  goal graph describes business
  domains and does not describe
  the system infrastructure
                                6     Copyright 2010 Takanori Ugai
Summery
 This study presented a technique for visualizing stakeholders
  concerns in a project using an anchored map.
 The tool produces a graph which represents the relationship
  between stakeholders and system concerns.
 The tool can switch anchors and free nodes, and stakeholder
  preferences for goals are aggregated with semantic tags.
 Requirements analysts can easily obtain an overview of the
  analysis,
   Find which concern has high priority for end users or system
    administrators, or
   Identify the concerns which the smallest number of stakeholders are
    interested.
 A case study shows the system visualizes imbalance of
  stakeholders and lack of stakeholders and the information can
  give analysts suggestions.
                                     7                          Copyright 2010 Takanori Ugai
Future work: Scalability
 The system is able to handle data from thousands of
  stakeholders, but it is difficult to understand how the system is
  operating in this case


                          Clustering




                                 8                       Copyright 2010 Takanori Ugai
9   Copyright 2010 FUJITSU LIMITED

Mais conteúdo relacionado

Mais procurados

Concept lattices: a representation space to structure software variability
Concept lattices: a representation space to structure software variabilityConcept lattices: a representation space to structure software variability
Concept lattices: a representation space to structure software variabilityRa'Fat Al-Msie'deen
 
Session 9 advance_verification_features
Session 9 advance_verification_featuresSession 9 advance_verification_features
Session 9 advance_verification_featuresNirav Desai
 
Aspect-Oriented Programming and Depedency Injection
Aspect-Oriented Programming and Depedency InjectionAspect-Oriented Programming and Depedency Injection
Aspect-Oriented Programming and Depedency InjectionRobert Lemke
 
Chapter 9 & chapter 10 solutions
Chapter 9 & chapter 10 solutionsChapter 9 & chapter 10 solutions
Chapter 9 & chapter 10 solutionsSaeed Iqbal
 
Session 8 assertion_based_verification_and_interfaces
Session 8 assertion_based_verification_and_interfacesSession 8 assertion_based_verification_and_interfaces
Session 8 assertion_based_verification_and_interfacesNirav Desai
 
Upgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVC
Upgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVCUpgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVC
Upgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVCFPGA Central
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchShinpei Hayashi
 
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13Multi-dimensional exploration of API usage - ICPC13 - 21-05-13
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13Coen De Roover
 
C programming session 14
C programming session 14C programming session 14
C programming session 14AjayBahoriya
 
OOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptOOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptPtidej Team
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...IOSR Journals
 
Aldec overview 2011-10 revised
Aldec overview 2011-10 revisedAldec overview 2011-10 revised
Aldec overview 2011-10 revisedPrateek Chopra
 
Reverse Architecting of a Medical Device Software
Reverse Architecting of a Medical Device SoftwareReverse Architecting of a Medical Device Software
Reverse Architecting of a Medical Device SoftwareDharmalingam Ganesan
 
A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...
A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...
A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...Coen De Roover
 
Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...
Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...
Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...Raffi Khatchadourian
 
02 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_0202 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_02Niit Care
 

Mais procurados (20)

Concept lattices: a representation space to structure software variability
Concept lattices: a representation space to structure software variabilityConcept lattices: a representation space to structure software variability
Concept lattices: a representation space to structure software variability
 
Session 9 advance_verification_features
Session 9 advance_verification_featuresSession 9 advance_verification_features
Session 9 advance_verification_features
 
Aspect-Oriented Programming and Depedency Injection
Aspect-Oriented Programming and Depedency InjectionAspect-Oriented Programming and Depedency Injection
Aspect-Oriented Programming and Depedency Injection
 
Java swing 1
Java swing 1Java swing 1
Java swing 1
 
Chapter 9 & chapter 10 solutions
Chapter 9 & chapter 10 solutionsChapter 9 & chapter 10 solutions
Chapter 9 & chapter 10 solutions
 
Session 8 assertion_based_verification_and_interfaces
Session 8 assertion_based_verification_and_interfacesSession 8 assertion_based_verification_and_interfaces
Session 8 assertion_based_verification_and_interfaces
 
Upgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVC
Upgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVCUpgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVC
Upgrading to System Verilog for FPGA Designs, Srinivasan Venkataramanan, CVC
 
Krml203
Krml203Krml203
Krml203
 
Java Programming Assignment
Java Programming AssignmentJava Programming Assignment
Java Programming Assignment
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic Search
 
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13Multi-dimensional exploration of API usage - ICPC13 - 21-05-13
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13
 
C programming session 14
C programming session 14C programming session 14
C programming session 14
 
Tyuukan
TyuukanTyuukan
Tyuukan
 
OOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptOOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.ppt
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
 
Aldec overview 2011-10 revised
Aldec overview 2011-10 revisedAldec overview 2011-10 revised
Aldec overview 2011-10 revised
 
Reverse Architecting of a Medical Device Software
Reverse Architecting of a Medical Device SoftwareReverse Architecting of a Medical Device Software
Reverse Architecting of a Medical Device Software
 
A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...
A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...
A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in O...
 
Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...
Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...
Open Problems in Automatically Refactoring Legacy Java Software to use New Fe...
 
02 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_0202 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_02
 

Destaque

Sentence-to-Code Traceability Recovery with Domain Ontologies
Sentence-to-Code Traceability Recovery with Domain OntologiesSentence-to-Code Traceability Recovery with Domain Ontologies
Sentence-to-Code Traceability Recovery with Domain OntologiesShinpei Hayashi
 
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionShinpei Hayashi
 
Understanding Source Code Differences by Separating Refactoring Effects
Understanding Source Code Differences by Separating Refactoring EffectsUnderstanding Source Code Differences by Separating Refactoring Effects
Understanding Source Code Differences by Separating Refactoring EffectsShinpei Hayashi
 
Historef: A Tool for Edit History Refactoring
Historef: A Tool  for Edit History RefactoringHistoref: A Tool  for Edit History Refactoring
Historef: A Tool for Edit History RefactoringShinpei Hayashi
 
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQM
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQMHow Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQM
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQMShinpei Hayashi
 
Terminology Matching of Requirements Specification Documents and Regulations ...
Terminology Matching of Requirements Specification Documents and Regulations ...Terminology Matching of Requirements Specification Documents and Regulations ...
Terminology Matching of Requirements Specification Documents and Regulations ...Shinpei Hayashi
 
Incremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeIncremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeHiroshi Kazato
 
Refactoring Edit History of Source Code
Refactoring Edit History of Source CodeRefactoring Edit History of Source Code
Refactoring Edit History of Source CodeShinpei Hayashi
 
Establishing Regulatory Compliance in Goal-Oriented Requirements Analysis
Establishing Regulatory Compliance in Goal-Oriented Requirements AnalysisEstablishing Regulatory Compliance in Goal-Oriented Requirements Analysis
Establishing Regulatory Compliance in Goal-Oriented Requirements AnalysisShinpei Hayashi
 
Feature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisFeature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisHiroshi Kazato
 
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security RequirementsModeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security RequirementsShinpei Hayashi
 
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」Takashi Kobayashi
 

Destaque (12)

Sentence-to-Code Traceability Recovery with Domain Ontologies
Sentence-to-Code Traceability Recovery with Domain OntologiesSentence-to-Code Traceability Recovery with Domain Ontologies
Sentence-to-Code Traceability Recovery with Domain Ontologies
 
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
 
Understanding Source Code Differences by Separating Refactoring Effects
Understanding Source Code Differences by Separating Refactoring EffectsUnderstanding Source Code Differences by Separating Refactoring Effects
Understanding Source Code Differences by Separating Refactoring Effects
 
Historef: A Tool for Edit History Refactoring
Historef: A Tool  for Edit History RefactoringHistoref: A Tool  for Edit History Refactoring
Historef: A Tool for Edit History Refactoring
 
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQM
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQMHow Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQM
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQM
 
Terminology Matching of Requirements Specification Documents and Regulations ...
Terminology Matching of Requirements Specification Documents and Regulations ...Terminology Matching of Requirements Specification Documents and Regulations ...
Terminology Matching of Requirements Specification Documents and Regulations ...
 
Incremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeIncremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source Code
 
Refactoring Edit History of Source Code
Refactoring Edit History of Source CodeRefactoring Edit History of Source Code
Refactoring Edit History of Source Code
 
Establishing Regulatory Compliance in Goal-Oriented Requirements Analysis
Establishing Regulatory Compliance in Goal-Oriented Requirements AnalysisEstablishing Regulatory Compliance in Goal-Oriented Requirements Analysis
Establishing Regulatory Compliance in Goal-Oriented Requirements Analysis
 
Feature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisFeature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept Analysis
 
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security RequirementsModeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
 
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
 

Semelhante a Visualizing Stakeholder Concerns with Anchored Map

[PPT] _ UNIT 2 _ Interaction-1.pptx
[PPT] _ UNIT 2 _ Interaction-1.pptx[PPT] _ UNIT 2 _ Interaction-1.pptx
[PPT] _ UNIT 2 _ Interaction-1.pptxRahulRahul937954
 
Document Management System: Redesign Proposal
Document Management System: Redesign ProposalDocument Management System: Redesign Proposal
Document Management System: Redesign ProposalFaiz Shariff
 
As 2nd screen_usability_analisis_2013
As 2nd screen_usability_analisis_2013As 2nd screen_usability_analisis_2013
As 2nd screen_usability_analisis_2013Javier Lasa
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
An employing a multistage fuzzy architecture for usability of open source sof...
An employing a multistage fuzzy architecture for usability of open source sof...An employing a multistage fuzzy architecture for usability of open source sof...
An employing a multistage fuzzy architecture for usability of open source sof...ijcsit
 
Engineering Software Products: 4. software architecture
Engineering Software Products: 4. software architectureEngineering Software Products: 4. software architecture
Engineering Software Products: 4. software architecturesoftware-engineering-book
 
Local Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSLocal Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSYogeshIJTSRD
 
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...ictseserv
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET Journal
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineeringTechglyphs
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
 
Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...
Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...
Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...WTHS
 
Object Oriented Database
Object Oriented DatabaseObject Oriented Database
Object Oriented DatabaseMegan Espinoza
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Application development for the internet of things
Application development for the internet of thingsApplication development for the internet of things
Application development for the internet of thingsPankesh Patel
 
AI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMS
AI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMSAI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMS
AI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMSRudranshupandey1
 

Semelhante a Visualizing Stakeholder Concerns with Anchored Map (20)

[PPT] _ UNIT 2 _ Interaction-1.pptx
[PPT] _ UNIT 2 _ Interaction-1.pptx[PPT] _ UNIT 2 _ Interaction-1.pptx
[PPT] _ UNIT 2 _ Interaction-1.pptx
 
Sample SRS format
Sample SRS formatSample SRS format
Sample SRS format
 
Document Management System: Redesign Proposal
Document Management System: Redesign ProposalDocument Management System: Redesign Proposal
Document Management System: Redesign Proposal
 
As 2nd screen_usability_analisis_2013
As 2nd screen_usability_analisis_2013As 2nd screen_usability_analisis_2013
As 2nd screen_usability_analisis_2013
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
An employing a multistage fuzzy architecture for usability of open source sof...
An employing a multistage fuzzy architecture for usability of open source sof...An employing a multistage fuzzy architecture for usability of open source sof...
An employing a multistage fuzzy architecture for usability of open source sof...
 
Engineering Software Products: 4. software architecture
Engineering Software Products: 4. software architectureEngineering Software Products: 4. software architecture
Engineering Software Products: 4. software architecture
 
OOP ppt.pdf
OOP ppt.pdfOOP ppt.pdf
OOP ppt.pdf
 
Local Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSLocal Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMS
 
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
Srs
SrsSrs
Srs
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...
Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...
Paper Alejandro Medrano - Use of hierarchical model-view-controller architect...
 
Object Oriented Database
Object Oriented DatabaseObject Oriented Database
Object Oriented Database
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Documenting Software Architectures
Documenting Software ArchitecturesDocumenting Software Architectures
Documenting Software Architectures
 
Application development for the internet of things
Application development for the internet of thingsApplication development for the internet of things
Application development for the internet of things
 
AI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMS
AI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMSAI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMS
AI AND ML BASED PPT FOR THE CLARIFICATIONS ON DIFFERNT PROBLEMS
 

Mais de Takanori Ugai

ナレッジグラフ推論チャレンジ【実社会版】最終発表
ナレッジグラフ推論チャレンジ【実社会版】最終発表ナレッジグラフ推論チャレンジ【実社会版】最終発表
ナレッジグラフ推論チャレンジ【実社会版】最終発表Takanori Ugai
 
ナレッジグラフ推論チャレンジ【実社会版】応募資料
ナレッジグラフ推論チャレンジ【実社会版】応募資料ナレッジグラフ推論チャレンジ【実社会版】応募資料
ナレッジグラフ推論チャレンジ【実社会版】応募資料Takanori Ugai
 
コロナ禍における研究会のデザインに向けて
コロナ禍における研究会のデザインに向けてコロナ禍における研究会のデザインに向けて
コロナ禍における研究会のデザインに向けてTakanori Ugai
 
第52回SWO研究会チュートリアル資料
第52回SWO研究会チュートリアル資料第52回SWO研究会チュートリアル資料
第52回SWO研究会チュートリアル資料Takanori Ugai
 
ナレッジグラフ推論チャレンジ2020最終審査
ナレッジグラフ推論チャレンジ2020最終審査ナレッジグラフ推論チャレンジ2020最終審査
ナレッジグラフ推論チャレンジ2020最終審査Takanori Ugai
 
.ニューノーマルを見据えた研究会デザインに向けて
.ニューノーマルを見据えた研究会デザインに向けて.ニューノーマルを見据えた研究会デザインに向けて
.ニューノーマルを見据えた研究会デザインに向けてTakanori Ugai
 
ナレッジグラフ推論チャレンジ2020技術勉強会
ナレッジグラフ推論チャレンジ2020技術勉強会ナレッジグラフ推論チャレンジ2020技術勉強会
ナレッジグラフ推論チャレンジ2020技術勉強会Takanori Ugai
 
Lodc kgrc 2020 Meeting
Lodc kgrc 2020 MeetingLodc kgrc 2020 Meeting
Lodc kgrc 2020 MeetingTakanori Ugai
 
推論チャレンジ2019発表資料
推論チャレンジ2019発表資料推論チャレンジ2019発表資料
推論チャレンジ2019発表資料Takanori Ugai
 
第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~
第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~
第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~Takanori Ugai
 
ナレッジグラフ推論チャレンジ2019技術勉強会
ナレッジグラフ推論チャレンジ2019技術勉強会ナレッジグラフ推論チャレンジ2019技術勉強会
ナレッジグラフ推論チャレンジ2019技術勉強会Takanori Ugai
 
Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...
Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...
Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...Takanori Ugai
 
ナレッジグラフ推論チャレンジ2018ミートアップ@東京
ナレッジグラフ推論チャレンジ2018ミートアップ@東京ナレッジグラフ推論チャレンジ2018ミートアップ@東京
ナレッジグラフ推論チャレンジ2018ミートアップ@東京Takanori Ugai
 
ナレッジグラフ推論チャレンジ発表資料
ナレッジグラフ推論チャレンジ発表資料ナレッジグラフ推論チャレンジ発表資料
ナレッジグラフ推論チャレンジ発表資料Takanori Ugai
 
Knowledge Graph Completion Challenge
Knowledge Graph Completion ChallengeKnowledge Graph Completion Challenge
Knowledge Graph Completion ChallengeTakanori Ugai
 

Mais de Takanori Ugai (16)

ナレッジグラフ推論チャレンジ【実社会版】最終発表
ナレッジグラフ推論チャレンジ【実社会版】最終発表ナレッジグラフ推論チャレンジ【実社会版】最終発表
ナレッジグラフ推論チャレンジ【実社会版】最終発表
 
ナレッジグラフ推論チャレンジ【実社会版】応募資料
ナレッジグラフ推論チャレンジ【実社会版】応募資料ナレッジグラフ推論チャレンジ【実社会版】応募資料
ナレッジグラフ推論チャレンジ【実社会版】応募資料
 
コロナ禍における研究会のデザインに向けて
コロナ禍における研究会のデザインに向けてコロナ禍における研究会のデザインに向けて
コロナ禍における研究会のデザインに向けて
 
第52回SWO研究会チュートリアル資料
第52回SWO研究会チュートリアル資料第52回SWO研究会チュートリアル資料
第52回SWO研究会チュートリアル資料
 
ナレッジグラフ推論チャレンジ2020最終審査
ナレッジグラフ推論チャレンジ2020最終審査ナレッジグラフ推論チャレンジ2020最終審査
ナレッジグラフ推論チャレンジ2020最終審査
 
.ニューノーマルを見据えた研究会デザインに向けて
.ニューノーマルを見据えた研究会デザインに向けて.ニューノーマルを見据えた研究会デザインに向けて
.ニューノーマルを見据えた研究会デザインに向けて
 
ナレッジグラフ推論チャレンジ2020技術勉強会
ナレッジグラフ推論チャレンジ2020技術勉強会ナレッジグラフ推論チャレンジ2020技術勉強会
ナレッジグラフ推論チャレンジ2020技術勉強会
 
Lodc kgrc 2020 Meeting
Lodc kgrc 2020 MeetingLodc kgrc 2020 Meeting
Lodc kgrc 2020 Meeting
 
推論チャレンジ2019発表資料
推論チャレンジ2019発表資料推論チャレンジ2019発表資料
推論チャレンジ2019発表資料
 
第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~
第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~
第2回ナレッジグラフ推論チャレンジ2019勉強会 ~ 同一事件 A CASE OF IDENTITY ~
 
ナレッジグラフ推論チャレンジ2019技術勉強会
ナレッジグラフ推論チャレンジ2019技術勉強会ナレッジグラフ推論チャレンジ2019技術勉強会
ナレッジグラフ推論チャレンジ2019技術勉強会
 
Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...
Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...
Practical use of Knowledge Graph with Case Studies using Semantic Web Publish...
 
ナレッジグラフ推論チャレンジ2018ミートアップ@東京
ナレッジグラフ推論チャレンジ2018ミートアップ@東京ナレッジグラフ推論チャレンジ2018ミートアップ@東京
ナレッジグラフ推論チャレンジ2018ミートアップ@東京
 
ナレッジグラフ推論チャレンジ発表資料
ナレッジグラフ推論チャレンジ発表資料ナレッジグラフ推論チャレンジ発表資料
ナレッジグラフ推論チャレンジ発表資料
 
Knowledge Graph Completion Challenge
Knowledge Graph Completion ChallengeKnowledge Graph Completion Challenge
Knowledge Graph Completion Challenge
 
Nober application
Nober applicationNober application
Nober application
 

Visualizing Stakeholder Concerns with Anchored Map

  • 1. Visualizing Stakeholder Concerns with Anchored Map Takanori Ugai* ** ** Shinpei Hayashi , Motoshi Saeki * Fujitsu Laboratories/Tokyo Institute of Technology ** Tokyo Institute of Technology
  • 2. Motivation  Software development is a cooperative work by stakeholders.  It is important  to understand stakeholder concerns  to identify potential problems • imbalance of stakeholders • lack of stakeholders 1 Copyright 2010 Takanori Ugai
  • 3. Stakeholders and concerns in AGORA 2 Copyright 2010 Takanori Ugai
  • 4. Stakeholders and concerns Stakeholders two-layer graphical representation Maintainability User1 User2 3 Portability 2 User3 Usability Admin1 5 Reliability 5 Admin2 Efficiency Admin3 Dev1 Cost Dev2 Security Dev3 Functions 3
  • 5. Anchored Map  The nodes in stakeholders, called “anchor nodes”, are arranged on the circumference  The nodes in concerns, called “free nodes”, are arranged at suitable positions in relations to the adjacent anchor nodes.  The strength of edge as a spring is in proportional to the value attached the edge.  An anchor node and a free node are located closer to each other if the stakeholder is strongly interested in the concern.  Supposing that the elements in concerns as anchor nodes and the elements in stakeholders as free nodes, a anchored map is generated with the same way 4 Copyright 2010 Takanori Ugai
  • 6. Example  Most of stakeholders are strongly interested in security and functions because they are located in the center of the circle.  Developers, Admin1 and Admin3 are interested in cost but users are not.  Users and Admin2 are interested in usability but developers are not.  Only Admin2 is interested in maintainability. 5 Copyright 2010 Takanori Ugai
  • 7. Example2  All users are interested in similar concerns, and Admin2 is also the same as the users.  Dev2 and Dev3 are interested in similar concerns but Dev1 is slightly different from Dev2 and Dev3.  All administrators are interested in different concerns.  Nobody is interested in portability, reliability and efficiency. This is because the goal graph describes business domains and does not describe the system infrastructure 6 Copyright 2010 Takanori Ugai
  • 8. Summery  This study presented a technique for visualizing stakeholders concerns in a project using an anchored map.  The tool produces a graph which represents the relationship between stakeholders and system concerns.  The tool can switch anchors and free nodes, and stakeholder preferences for goals are aggregated with semantic tags.  Requirements analysts can easily obtain an overview of the analysis,  Find which concern has high priority for end users or system administrators, or  Identify the concerns which the smallest number of stakeholders are interested.  A case study shows the system visualizes imbalance of stakeholders and lack of stakeholders and the information can give analysts suggestions. 7 Copyright 2010 Takanori Ugai
  • 9. Future work: Scalability  The system is able to handle data from thousands of stakeholders, but it is difficult to understand how the system is operating in this case Clustering 8 Copyright 2010 Takanori Ugai
  • 10. 9 Copyright 2010 FUJITSU LIMITED