Implementation-Centric Classification of Business Rules from Documents

作者: Preethu Rose Anish , Abhishek Sainani , Abdul Ahmed , Smita Ghaisas

DOI: 10.1109/REW.2019.00047

关键词:

摘要: In large multi-site multi-vendor projects, studying requirement documents to understand the problem domain and inferring possible solution posed is an important activity in Requirements Engineering. The process of reading User require-ments Specification (URS) create Software Requirement Speci-fication (SRS) a knowledge intensive that precedes sev-eral other Engineering (SE) activities such as design test plans. Automated Interpretation URS terms implementation-specific elements for software engineers' consumption has been reported past. aim interpretation reduce effort associated with manual extraction subsequently, their "translation" into primitives understood by those who must build intended software. this paper, we present deep learning model implementation-centric classification one element, namely, business rules. We discuss approach based on Bidirectional Long Short Term Memory Network (BiLSTM) capture context information each word, followed attention aggregate useful infor-mation from these words get final classification. Our adopts end-to-end architecture does not rely any handcrafted features.

参考文章(21)
Jane Huffman Hayes, Wenbin Li, Mona Rahimi, Weka meets TraceLab: Toward convenient classification: Machine learning for requirements engineering problems: A position paper Artificial Intelligence for Requirements Engineering (AIRE), 2014 IEEE 1st International Workshop on. pp. 9- 12 ,(2014) , 10.1109/AIRE.2014.6894850
Smita Ghaisas, Manish Motwani, Preethu Rose Anish, Detecting system use cases and validations from documents automated software engineering. pp. 568- 573 ,(2013) , 10.1109/ASE.2013.6693114
Walid Maalej, Smita Ghaisas, Capturing and sharing domain knowledge with business rules lessons learned from a global software vendor ieee international conference on requirements engineering. pp. 364- 373 ,(2014) , 10.1109/RE.2014.6912287
Tariq Alshugran, Julius Dichter, Extracting and modeling the privacy requirements from HIPAA for healthcare applications long island systems, applications and technology conference. pp. 1- 5 ,(2014) , 10.1109/LISAT.2014.6845198
José L. Martínez-Fernández, José C. González, Julio Villena, Paloma Martínez, A Preliminary Approach to the Automatic Extraction of Business Rules from Unrestricted Text in the Banking Industry applications of natural language to data bases. pp. 299- 310 ,(2008) , 10.1007/978-3-540-69858-6_29
Yoav Goldberg, Omer Levy, word2vec Explained: deriving Mikolov et al.'s negative-sampling word-embedding method. arXiv: Computation and Language. ,(2014)
Travis D. Breaux, Annie I. Antón, Mining rule semantics to understand legislative compliance Proceedings of the 2005 ACM workshop on Privacy in the electronic society - WPES '05. pp. 51- 54 ,(2005) , 10.1145/1102199.1102210
Claire Cardie, Ozan Irsoy, Deep Recursive Neural Networks for Compositionality in Language neural information processing systems. ,vol. 27, pp. 2096- 2104 ,(2014)
John Slankas, Laurie Williams, Automated extraction of non-functional requirements in available documentation 2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE). pp. 9- 16 ,(2013) , 10.1109/NATURALISE.2013.6611715