Patterns and Requirements Reuse Sample Clauses

Patterns and Requirements Reuse. Requirements reuse consists on taking advantage of requirements knowledge obtained from previous IT projects and later on using this knowledge in a new one. Requirement patterns are assets that provide a structured representation to reuse knowledge about specific requirements. Other assets associated to the term requirement pattern are not considered in this summary since they are not the target of the OpenReq project. Firstly we include here a summary of the existing approaches to requirements reuse, and after that a summary of the practical experiences presented in the literature of the application of requirement reuse and patterns. For a detailed description of the state of the art see deliverable D5. 1. The existing proposals of requirements reuse can be mainly characterized by: the part of a requirements specification that they allow to reuse, the language used to express the requirements to be reused, the size of the part of the specification that can be reused, the abstraction of the knowledge to reuse, and the scope where the reuse can be done. ● The proposals classified according the part of a specification that they allow to reuse are proposals that reuse requirements knowledge (e.g., [Xxxxxxx 2007], [Franch et al. 2013]), requirements classification knowledge (e.g., [Panis 2015], [Franch et al. 2013]) and/or requirements interdependencies (e.g., [Xxxxxx et al. 2013], [Xxxxxx et al. 2002]). ● From the proposals that allow to reuse requirements knowledge, they assume that these requirements are expressed in natural language (e.g., [Withall 2007]), use cases (e.g., [Xxxxx et al. 2006], [Dehlinger et al. 2005]), and domain models (e.g., [Xxxxx et al. 2002]). More formal representation of requirements are also used in some approaches, such as i* models (e.g., [Xxxxxxxx et al. 2004]). ● The size of reusable artifacts varies from individual requirements (e.g., [Xxxxxxxx et al. 2012]) to requirement clusters (e.g., [Xxxxxx et al. 2002]), to parts of requirement specifications and even to complete requirement specifications (e.g., [Xxxxx et al. 2006]). ● The abstraction of knowledge to reuse in the proposals varies from no abstraction — such as templates that are natural language sentences with no required structure (e.g., [Xxxxxxxxxxx et al. 2012]) — to a high level of abstraction — for instance in the case of patterns or feature models based on the notion of variability of requirements (e.g., [Xxxxxxx 2007], [Xxxxxxx et al. 1999], [Xxxxxx et al. 2013])...
AutoNDA by SimpleDocs

Related to Patterns and Requirements Reuse

  • Personnel Requirements a. The CONTRACTOR shall secure, at the CONTRACTOR'S own expense, all personnel required to perform this Contract. b. The CONTRACTOR shall ensure that the CONTRACTOR'S employees or agents are experienced and fully qualified to engage in the activities and perform the services required under this Contract, and that all applicable licensing and operating requirements imposed or required under federal, state, or county law, and all applicable accreditation and other standards of quality generally accepted in the field of the activities of such employees and agents are complied with and satisfied.

  • Additional Requirements for Sleeping Rooms The Contractor shall provide departing Attendees a secured area for storing belongings.

  • Training Requirements Grantee shall: A. Authorize and require staff (including volunteers) to attend training, conferences, and meetings as directed by DSHS; B. Appropriately budget funds in order to meet training requirements in a timely manner, and ensure that staff and volunteers are trained as specified in the training requirements listed at xxxxx://xxx.xxxx.xxxxx.xxx/hivstd/training/ and as otherwise specified by DSHS. Grantee shall document that these training requirements are met; and C. Ensure that staff hired for HIV and syphilis testing are trained to perform blood draws within three (3) months of employment.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Safety Requirements The Contractor shall comply with all Federal, State, and local safety laws and regulations applicable to the Work performed under this Agreement.

  • E-Verify Requirements To the extent applicable under ARIZ. REV. STAT. § 41- 4401, the Contractor and its subcontractors warrant compliance with all federal immigration laws and regulations that relate to their employees and their compliance with the E-verify requirements under ARIZ. REV. STAT. § 23-214(A). Contractor’s or its subcontractor’s failure to comply with such warranty shall be deemed a material breach of this Agreement and may result in the termination of this Agreement by the City.

  • Operational Requirements 4 At-Sea Monitors are deployed, in accordance with coverage rates developed by 5 NMFS and as assigned through the Pre-Trip Notification System (PTNS), to 6 vessels. Due to availability of funding, changes in the fishery management, 7 such as emergency closures, court ordered closures, weather, and unforeseen 8 events must remain flexible. Additional funding for sea days may be added to 9 the contract within the scope and maximum allowable sea days. 10 The following items define the operational services to be provided by the 11 contractor under this contract.

  • Screening Requirements Practitioner shall ensure that all prospective and current Covered Persons are not Ineligible Persons, by implementing the following screening requirements. a. Practitioner shall screen all prospective Covered Persons against the Exclusion List prior to engaging their services and, as part of the hiring or contracting process, shall require such Covered Persons to disclose whether they are Ineligible Persons.‌ b. Practitioner shall screen all current Covered Persons against the Exclusion List within 30 days after the Effective Date and on a monthly basis thereafter.‌ c. Practitioner shall require all Covered Persons to disclose immediately if they become an Ineligible Person.‌ Practitioner shall maintain documentation in order to demonstrate that Practitioner: (1) has checked the Exclusion List (i.e., a print screen of the search results) and determined that its Covered Persons are not Ineligible Persons; and (2) has required its Covered Persons to disclose if they are an Ineligible Person. Nothing in this Section III.D affects Practitioner’s responsibility to refrain from (and liability for) billing Federal health care programs for items or services furnished, ordered, or prescribed by an excluded person. Practitioner understands that items or services furnished by excluded persons are not payable by Federal health care programs and that Practitioner may be liable for overpayments and/or criminal, civil, and administrative sanctions for employing or contracting with an excluded person regardless of whether Practitioner meets the requirements of Section III.D.

  • Access Requirements You will be responsible for providing the System to enable you to use an Electronic Service.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!