INDEX
A
Abuse cases, 134
Activity diagram, 393, 395, 401, 403, 404
Actor, 8, 14, 31, 67, 68, 88, 94, 96, 119, 247, 263
goals, 241
key, 67
See also Role; Stakeholders
Affinity diagram, 190
See also User stories
Air Traffic Control (ATC), 364
Alternative courses, 161–164, 166, 168, 169, 174, 364, 370, 373
See also Use case scenarios
Alternative scenarios, 103–116, 146
applicability, 103
features, 104
strengths, 104
technique, 105
weaknesses, 104
Alternative world, 10
See also Situation
Alternative world scenarios, 106
Analysis, 4, 228, 249, 250, 252, 254
bottom-up, 397
object/action, 224
top-down, 397
Anti-scenarios, 136
Architecturally Significant Requirements (ASR), 384, 385
Architecture Trade-off Analysis Method (ATAM), 384
applicability, 161
approach, 164
comparisons, 176
features, 162
process and environment, 162
research, 163
software environment, 166
strengths, 162
structure and representation, 164
weaknesses, 162
worked example, 173
ASR. See Architecturally Significant Requirements
Assumptions, 77, 105–110, 215, 300, 365, 393, 401, 409, 411
ATHOC, 411
Automatic Teller Machine (ATM), 284
Automatic Train Control (ATC), 402, 404
Automotive industry, 334
Automotive software development, 331, 334
strengths, 330
weaknesses, 330
B
Bayesian Belief Networks (BBNs), 176
Black-Box Test, 296
British Telecom (BT), 61
Business event, 40
identification, 44
alternative case ...
Get Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.