Thinging the Use Case Model

10/07/2019
by   Sabah Al-Fedaghi, et al.
0

Use cases as textual visual modeling techniques have become a key construct and the foundation of the most popular de facto standard technique for performing software requirements analysis and specification. This paper describes use cases in terms of a recently proposed model, the thinging machine (TM) model. Such a link to TM strengthens the notion of use cases and clarifies related concepts. For example, the concept of events is utilized in an unconstrained way in use cases, and TM may contribute in this direction. Several selected use cases are remodeled using TM. This study provides many insights. For example, one result shows that use cases are an activation apparatus of mega-triggering (high-level events) wherein a group of submachines (processes) are actuated.

READ FULL TEXT

page 3

page 4

page 5

page 6

page 7

page 8

page 9

page 10

research
07/01/2021

TMUML: A Singular TM Model with UML Use Cases and Classes

In the systems and software modeling field, a conceptual model involves ...
research
03/10/2021

Towards Connecting Use Cases and Methods in Interpretable Machine Learning

Despite increasing interest in the field of Interpretable Machine Learni...
research
08/19/2021

Teaching Uncertainty Quantification in Machine Learning through Use Cases

Uncertainty in machine learning is not generally taught as general knowl...
research
08/25/2020

A Review of Serverless Use Cases and their Characteristics

The serverless computing paradigm promises many desirable properties for...
research
06/09/2018

GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing

We present GHTraffic, a dataset of significant size comprising HTTP tran...
research
10/10/2019

Analysis of Requirements for the Design of a Detector Control System in a High Energy Physics (HEP) Experiment

In this work the use of the Rational Unified Process (RUP) to model the ...
research
02/12/2018

Erlang Code Evolution Control (Use Cases)

The main goal of this work is to show how SecEr can be used in different...

Please sign up or login with your details

Forgot password? Click here to reset