The CCITT-specification and description language SDL
Computer Networks and ISDN Systems
Twilight Zones and Cornerstones: A Gnat Robot Double Feature
Twilight Zones and Cornerstones: A Gnat Robot Double Feature
Architecture-level dependence analysis in support of software maintenance
ISAW '98 Proceedings of the third international workshop on Software architecture
The Feature and Service Interaction Problem in Telecommunications Systems: A Survey
IEEE Transactions on Software Engineering
Towards compositional synthesis of evolving systems
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering
Algorithms and tool support for dynamic information flow analysis
Information and Software Technology
Predicting feature interactions by using inconsistency models
Computer Networks: The International Journal of Computer and Telecommunications Networking
Predicting performance via automated feature-interaction detection
Proceedings of the 34th International Conference on Software Engineering
Family-based performance measurement
Proceedings of the 12th international conference on Generative programming: concepts & experiences
Exploring feature interactions in the wild: the new feature-interaction challenge
Proceedings of the 5th International Workshop on Feature-Oriented Software Development
Hi-index | 0.00 |
Features are added to an existing system to add functionality. A new feature interacts with an existing feature if the behavior of the existing feature is changed by the presence of the new feature. Our research group has started to investigate how to detect feature interactions during the requirements phase of feature development. We have adopted a layered state-transition machine model that prioritizes features and avoids interactions due to non-determinism. We have a tabular notation for specifying behavioral requirements of services and features. Specifications are composed into a reachability graph, and the graph is searched for feature interactions. This paper demonstrates how reachability analysis has been used to automatically detect known control interactions, data interactions, and resource contentions among telephony features.