compound-agent 1.8.0 → 2.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +46 -1
- package/README.md +30 -47
- package/bin/ca +73 -0
- package/package.json +25 -77
- package/scripts/postinstall.cjs +245 -0
- package/dist/cli.d.ts +0 -1
- package/dist/cli.js +0 -13655
- package/dist/cli.js.map +0 -1
- package/dist/index.d.ts +0 -3730
- package/dist/index.js +0 -3251
- package/dist/index.js.map +0 -1
- package/docs/research/AgenticAiCodebaseGuide.md +0 -1206
- package/docs/research/BuildingACCompilerAnthropic.md +0 -116
- package/docs/research/HarnessEngineeringOpenAi.md +0 -220
- package/docs/research/code-review/systematic-review-methodology.md +0 -409
- package/docs/research/index.md +0 -76
- package/docs/research/learning-systems/knowledge-compounding-for-agents.md +0 -695
- package/docs/research/property-testing/property-based-testing-and-invariants.md +0 -742
- package/docs/research/scenario-testing/advanced-and-emerging.md +0 -470
- package/docs/research/scenario-testing/core-foundations.md +0 -507
- package/docs/research/scenario-testing/domain-specific-and-human-factors.md +0 -474
- package/docs/research/security/auth-patterns.md +0 -138
- package/docs/research/security/data-exposure.md +0 -185
- package/docs/research/security/dependency-security.md +0 -91
- package/docs/research/security/injection-patterns.md +0 -249
- package/docs/research/security/overview.md +0 -81
- package/docs/research/security/secrets-checklist.md +0 -92
- package/docs/research/security/secure-coding-failure.md +0 -297
- package/docs/research/software_architecture/01-science-of-decomposition.md +0 -615
- package/docs/research/software_architecture/02-architecture-under-uncertainty.md +0 -649
- package/docs/research/software_architecture/03-emergent-behavior-in-composed-systems.md +0 -644
- package/docs/research/spec_design/decision_theory_specifications_and_multi_criteria_tradeoffs.md +0 -0
- package/docs/research/spec_design/design_by_contract.md +0 -251
- package/docs/research/spec_design/domain_driven_design_strategic_modeling.md +0 -183
- package/docs/research/spec_design/formal_specification_methods.md +0 -161
- package/docs/research/spec_design/logic_and_proof_theory_under_the_curry_howard_correspondence.md +0 -250
- package/docs/research/spec_design/natural_language_formal_semantics_abuguity_in_specifications.md +0 -259
- package/docs/research/spec_design/requirements_engineering.md +0 -234
- package/docs/research/spec_design/systems_engineering_specifications_emergent_behavior_interface_contracts.md +0 -149
- package/docs/research/spec_design/what_is_this_about.md +0 -305
- package/docs/research/tdd/test-driven-development-methodology.md +0 -547
- package/docs/research/test-optimization-strategies.md +0 -401
- package/scripts/postinstall.mjs +0 -102
|
@@ -1,234 +0,0 @@
|
|
|
1
|
-
# Requirements Engineering as a Discipline
|
|
2
|
-
|
|
3
|
-
*25 February 2026*
|
|
4
|
-
|
|
5
|
-
## Abstract
|
|
6
|
-
|
|
7
|
-
This survey examines requirements engineering (RE) as a distinct engineering discipline concerned with discovering, documenting, validating, and evolving the requirements of software intensive systems across their life cycles. It focuses on methodological families that structure elicitation, specification, validation, and management activities, rather than on static specification templates alone. The analysis documents how standards, patterns, models, and automated analyses interact with socio‑technical practices to shape requirement quality, change resilience, and traceability. [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf)
|
|
8
|
-
|
|
9
|
-
The survey identifies eight main approach families: stakeholder‑centred elicitation, standardized SRS and process standards, requirements patterns and controlled natural language, goal‑oriented methods, scenario‑based techniques, model‑based and formal approaches, traceability‑centred management, and automated quality and ambiguity analysis. These families exhibit trade‑offs along axes such as accessibility versus precision, early structuring versus adaptability, and human interpretability versus automation, with empirical evidence ranging from large‑scale surveys to focused industrial case studies. The review highlights substantial progress in structuring RE activities yet also documents persistent gaps in integrating socio‑technical discovery with formal reasoning, scaling quality analysis, and adapting RE practices to agile, ecosystem, and research software contexts. [arxiv](https://arxiv.org/pdf/2309.10355.pdf)
|
|
10
|
-
|
|
11
|
-
## 1. Introduction
|
|
12
|
-
|
|
13
|
-
Requirements engineering addresses the problem of how to systematically understand the real‑world goals, services, and constraints that a future system must satisfy, and to relate these to precise specifications that can guide development and evolution. This problem matters because empirical studies repeatedly document incomplete, inconsistent, or ambiguous requirements as major contributors to project overruns, quality defects, and failures, especially in large or safety‑critical systems. This field therefore spans both technical modelling and socio‑technical inquiry, drawing on software engineering, systems engineering, human–computer interaction, and organizational studies. [arxiv](http://arxiv.org/pdf/1611.04976.pdf)
|
|
14
|
-
|
|
15
|
-
The scope of this survey covers RE methodologies and artefacts for software and software‑intensive systems, with emphasis on elicitation, specification, validation, and change management activities as characterized in widely used roadmaps and standards. It includes process and product standards (IEEE 830, ISO/IEC/IEEE 29148), syntactic patterns such as EARS, traceability frameworks, model‑based validation, and ambiguity detection tools, but excludes detailed project management methods, general systems engineering beyond requirements processes, and tool‑specific user guides. Agile‑specific RE variants and domain‑specific RE (for example, research software or open innovation ecosystems) are considered where they illuminate general methodological issues rather than as exhaustive sub‑surveys. [arxiv](https://arxiv.org/pdf/1801.00250.pdf)
|
|
16
|
-
|
|
17
|
-
In this survey, a requirement denotes an expression of a stakeholder need or constraint formulated in the problem domain vocabulary, which the system is expected to satisfy. A software requirements specification (SRS) denotes a structured document that consolidates these requirements, with IEEE 830 and its successor ISO/IEC/IEEE 29148 specifying content and quality attributes such as correctness, unambiguity, completeness, verifiability, and modifiability. Traceability denotes the documented ability to describe and follow the life of a requirement from origin through specification, design, implementation, and use, in both forward and backward directions, as formalized by Ramesh and Jarke and later standardization work. Ambiguity denotes the existence of multiple plausible interpretations for a requirement statement, which ambiguity‑detection tools analyze by combining linguistic patterns, metrics, and natural language processing to surface potentially problematic phrases. [www0.cs.ucl.ac](http://www0.cs.ucl.ac.uk/staff/a.finkelstein/fose/present/nuseibehpres.pdf)
|
|
18
|
-
|
|
19
|
-
## 2. Foundations
|
|
20
|
-
|
|
21
|
-
Foundational work conceptualizes RE as a set of interleaved activities that span eliciting requirements, modelling and analysing them, communicating them, reaching agreement, and managing their evolution over time. Nuseibeh and Easterbrook’s roadmap situates these activities in a lifecycle perspective, emphasizing that RE begins before software design, continues throughout development, and often extends into operation as systems and environments change. This framing views RE as both an engineering and learning process, where understanding of stakeholder goals and domain properties is progressively refined through models, scenarios, and negotiations. [zora.uzh](https://www.zora.uzh.ch/id/eprint/204996/8/ZORA204996.pdf)
|
|
22
|
-
|
|
23
|
-
Standards such as IEEE 830 and ISO/IEC/IEEE 29148 codify this foundation by articulating what constitutes a “good” requirement and how requirements processes relate to broader lifecycle process standards ISO/IEC/IEEE 15288 and 12207. IEEE 830 describes the content and qualities of a high‑quality SRS, including coverage of functionality, interfaces, performance, attributes, and design constraints, along with templates and guidance on avoiding design detail in requirements. ISO/IEC/IEEE 29148 generalizes this to systems and software, specifying required RE processes, defining attributes and characteristics of requirements, and describing iterative and recursive application of RE throughout the life cycle. [math.uaa.alaska](http://www.math.uaa.alaska.edu/~afkjm/cs401/IEEE830.pdf)
|
|
24
|
-
|
|
25
|
-
This conceptual basis supports differentiation among functional requirements (services provided by the system), quality or non‑functional requirements (for example, performance, dependability, usability), and constraints (such as regulatory or architectural restrictions). Recent work on requirements quality research proposes harmonized theories and taxonomies that decompose “quality” into dimensions such as linguistic well‑formedness, completeness, consistency, and fitness for purpose, mapping them to evaluation methods and tools. Large‑scale survey programmes, such as “Naming the Pain in Requirements Engineering”, document how industrial organizations prioritize these qualities and which RE problems they experience most acutely in practice. This empirical grounding underpins much of the later evidence discussed in §4. [webstore.iec](https://webstore.iec.ch/en/publication/64315)
|
|
26
|
-
|
|
27
|
-
## 3. Taxonomy of Approaches
|
|
28
|
-
|
|
29
|
-
The approaches surveyed here are organized into eight families, each corresponding to a distinct way of structuring RE artefacts and activities. Every family maps to a subsection in §4.
|
|
30
|
-
|
|
31
|
-
| ID | Approach family | Primary artefacts | Main focus phase(s) | Typical validation channel |
|
|
32
|
-
|-----|-----------------------------------------------|------------------------------------------|--------------------------------------|----------------------------------------|
|
|
33
|
-
| A1 | Stakeholder‑centred elicitation | Interview notes, domain models, lists | Elicitation, negotiation | Reviews, workshops, surveys [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) |
|
|
34
|
-
| A2 | Standardized SRS and process standards | IEEE‑style SRS, process definitions | Specification, communication | Document inspections, audits [math.uaa.alaska](http://www.math.uaa.alaska.edu/~afkjm/cs401/IEEE830.pdf) |
|
|
35
|
-
| A3 | Requirements patterns & controlled NL | Patterned sentences (e.g. EARS), boilerplates | Specification, early validation | Structured reviews, pattern conformance [alistairmavin](https://alistairmavin.com/ears/) |
|
|
36
|
-
| A4 | Goal‑oriented requirements methods | Goal models, refinement trees | Analysis, conflict resolution | Model analysis, rationale reviews [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) |
|
|
37
|
-
| A5 | Scenario‑ and use‑case‑based techniques | Scenarios, use cases, user stories | Elicitation, communication, validation | Walkthroughs, prototyping [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) |
|
|
38
|
-
| A6 | Model‑based and formal specification | State/behavioral models, logic specs | Validation, verification | Model checking, formal analysis [mdpi](https://www.mdpi.com/1999-4893/14/10/298/pdf) |
|
|
39
|
-
| A7 | Traceability‑centred RE and management | Trace links, traceability models, change records | Change impact, compliance | Trace queries, coverage metrics [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf) |
|
|
40
|
-
| A8 | Automated quality and ambiguity analysis | Metrics, flagged sentences, reports | Quality assessment, risk identification | Tool‑assisted reviews, empirical studies [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf) |
|
|
41
|
-
|
|
42
|
-
This taxonomy separates how requirements are discovered and shaped (A1, A5), how they are structured linguistically (A2, A3), how their underlying intent is modelled (A4, A6), how their lifecycle relationships are managed (A7), and how their textual quality is assessed (A8). Several industrial and research frameworks integrate elements from multiple families, but the classification clarifies the primary mechanisms emphasized by each. [mdpi](https://www.mdpi.com/1999-4893/14/10/298/pdf)
|
|
43
|
-
|
|
44
|
-
## 4. Analysis
|
|
45
|
-
|
|
46
|
-
### 4.1 Stakeholder‑centred elicitation and prioritization (A1)
|
|
47
|
-
|
|
48
|
-
**Theory & mechanism.** Stakeholder‑centred elicitation treats RE as primarily a process of discovering and aligning stakeholder goals, expectations, and domain assumptions through interactions such as interviews, workshops, and observation. Nuseibeh and Easterbrook describe elicitation as identifying system boundaries, stakeholders, goals, tasks, feasibility, and risks, drawing information from people, domain knowledge, and existing documentation. The causal mechanism is that structured communication surfaces tacit knowledge and conflicts early, allowing requirements engineers to negotiate feasible goals and adjust stakeholder expectations before design commitments harden. Prioritization techniques within this family (for example, negotiation sessions or structured ranking) aim to balance competing goals when resources are constrained. [arxiv](http://arxiv.org/pdf/1611.04976.pdf)
|
|
49
|
-
|
|
50
|
-
**Literature evidence.** The RE roadmap synthesizes early work on elicitation techniques, contrasting traditional interviews and questionnaires with contextual inquiry, ethnographic approaches, and facilitated workshops such as Joint Application Design. The “Naming the Pain in Requirements Engineering” survey programme, using a family of surveys across multiple countries, documents elicitation‑related problems such as incomplete requirements, communication flaws, and volatile requirements as frequent industrial pain points. A systematic mapping study on RE in software ecosystems reports that most ecosystem‑specific RE research focuses on elicitation, analysis, and modelling, emphasizing the complexity of multi‑stakeholder settings. Work on RE for research software similarly notes informal, ad hoc elicitation as common, with domain scientists improvising requirements processes. [arxiv](http://arxiv.org/pdf/2405.07781.pdf)
|
|
51
|
-
|
|
52
|
-
**Implementations & benchmarks.** Concrete implementations include structured interview protocols, stakeholder workshops, and viewpoint‑based approaches that organize requirements around stakeholder perspectives. Empirical evidence consists mainly of qualitative case studies and surveys rather than controlled experiments, with “Naming the Pain” providing quantitative patterns of which elicitation problems correlate with perceived RE process satisfaction. Open innovation and ecosystem studies describe specific elicitation practices for managing external contributions and platform requirements, although systematic benchmarks of technique effectiveness remain sparse. Evidence on prioritization methods in this family is largely anecdotal or project‑specific, indicating a gap in comparative evaluation. [semanticscholar](https://www.semanticscholar.org/paper/1f749ad874dd55a19c72932f0f711202d6825073)
|
|
53
|
-
|
|
54
|
-
**Strengths & limitations.** Stakeholder‑centred elicitation appears powerful for uncovering contextual constraints, organizational politics, and evolving goals, particularly in domains where domain knowledge is distributed and tacit. It scales reasonably when stakeholder groups are manageable, but evidence suggests difficulties in large ecosystems or open innovation contexts where sources multiply and interests diverge. The reliance on human judgement and negotiation introduces variability and potential bias, with few standardized metrics available to compare elicitation outcomes across projects. Overall, evidence for specific elicitation techniques’ superiority remains thin, with survey data documenting problems more clearly than method performance. [arxiv](https://arxiv.org/pdf/2208.01741.pdf)
|
|
55
|
-
|
|
56
|
-
### 4.2 Standardized SRS and process standards (A2)
|
|
57
|
-
|
|
58
|
-
**Theory & mechanism.** Standardized SRS approaches posit that a well‑structured specification document, following an accepted standard, improves communication, supports verification and validation, and facilitates later maintenance and procurement. IEEE 830 defines recommended practices for SRS content, emphasizing separation of functionality, external interfaces, performance, attributes, and design constraints, along with qualities such as clarity, completeness, and verifiability. ISO/IEC/IEEE 29148 generalizes this to systems and software, specifying RE processes and information items, and connecting them to lifecycle standards ISO/IEC/IEEE 15288 and 12207. The mechanism is that shared document structure and quality criteria reduce misinterpretation and omissions, provide traceable anchors for design and test, and support compliance audits. [standards.ieee](https://standards.ieee.org/ieee/830/1222/)
|
|
59
|
-
|
|
60
|
-
**Literature evidence.** IEEE 830, initially published in 1984 and revised in 1993 and 1998, has been widely cited as a de facto standard for SRS content and quality guidelines, although it has been superseded by ISO/IEC/IEEE 29148. ISO/IEC/IEEE 29148 defines constructs of good requirements, attributes and characteristics, and discusses iterative application of RE processes; it also explicitly replaces IEEE 830 and related standards. Case‑study papers document the use of IEEE 830‑style SRS structures to specify systems such as 3D media platforms and electronic news magazine systems, arguing that the standard supports systematic analysis of AS‑IS and TO‑BE scenarios. Position papers on standards evolution discuss how RE‑related standards are being updated to address emerging technologies and quality concerns. [mdpi](https://www.mdpi.com/2071-1050/13/15/8155/pdf)
|
|
61
|
-
|
|
62
|
-
**Implementations & benchmarks.** Implementations include IEEE 830‑conformant templates disseminated in textbooks, university courses, and industrial process assets, some of which add project‑specific sections while retaining the core structure. ISO/IEC/IEEE 29148 is integrated into corporate process frameworks where RE processes and information items are explicitly aligned with systems engineering processes. Empirical evaluation often takes the form of project case reports showing that SRS templates helped structure requirements, but systematic quantitative benchmarks comparing standardized SRS against ad hoc documents are limited. Recent work on “fitness‑for‑purpose” RE proposes activity and attribute models meant to underpin more rigorous measurement of how RE artefacts, including SRSs, support downstream processes, but this remains at an initial modelling stage. [arxiv](http://arxiv.org/pdf/2405.09895.pdf)
|
|
63
|
-
|
|
64
|
-
**Strengths & limitations.** Standardized SRS approaches demonstrate strength in regulated or contract‑heavy environments where explicit documentation and audit trails are essential, and where multiple organizations must interpret the same specification. They tend to scale well to large projects by providing common structure, but their effectiveness depends on how well other RE activities (elicitation, analysis) feed into the SRS, which standards largely treat implicitly. Evidence suggests that standards alone do not prevent ambiguity or incompleteness, since they constrain document structure more than natural language content, prompting complementary use of patterns or analysis tools. The overhead of producing and maintaining large SRS documents may be problematic in fast‑evolving or agile contexts, and empirical work on adapting these standards to such settings remains limited. [arxiv](https://arxiv.org/pdf/2405.18847.pdf)
|
|
65
|
-
|
|
66
|
-
### 4.3 Requirements patterns and controlled natural language (A3)
|
|
67
|
-
|
|
68
|
-
**Theory & mechanism.** Requirements pattern and controlled natural language (CNL) approaches constrain textual requirements into predefined templates with limited syntactic variation, aiming to reduce ambiguity, vagueness, and omissions while remaining readable to non‑experts. The Easy Approach to Requirements Syntax (EARS) introduces a generic clause structure (“while” preconditions, “when” trigger, “the system shall” response) specialized into patterns such as ubiquitous, event‑driven, unwanted behaviour, state‑driven, and optional features. The causal mechanism is that enforcing explicit separation of conditions, triggers, and responses, in a fixed temporal order, forces authors to articulate necessary information and supports consistent interpretation and later automation. [alistairmavin](https://alistairmavin.com/ears/)
|
|
69
|
-
|
|
70
|
-
**Literature evidence.** The original EARS paper reports application of the ruleset while extracting aero engine control system requirements from an airworthiness regulation, noting reductions in ambiguity, complexity, vagueness, omission, and duplication compared to raw requirements. Later presentations and practitioner reports describe EARS adoption in industrial contexts, including Intel, highlighting practitioner perceptions of improved clarity and reduced errors despite minimal training overhead. The SENSE framework extends this idea by integrating boilerplates into a semantics‑based RE framework that selects appropriate templates depending on requirement type and performs validity and completeness checks with a minimum set of formalities. These works collectively suggest that pattern‑based CNL can systematically address recurring linguistic problems, although evaluations are often limited to specific domains. [slideshare](https://www.slideshare.net/slideshow/ears-the-easy-approach-to-requirements-syntax/51558506)
|
|
71
|
-
|
|
72
|
-
**Implementations & benchmarks.** EARS exists as a lightweight notation used within word processors or RE tools, with slides and guidelines providing concrete patterns and examples. Case‑study results in the aero‑engine domain show substantial reductions in identified linguistic problems when rewriting requirements according to EARS, along with changes in requirement granularity and average words per requirement. SENSE demonstrates a prototype framework that combines CNL boilerplates with flow‑down semantics and automated checks, but reported evaluations focus on feasibility and expressiveness rather than large‑scale industrial deployment. Beyond these, tools such as QVscribe incorporate pattern libraries inspired by CNL research, although their evaluations are typically grouped under ambiguity‑detection studies discussed in §4.8. [ccy05327.github](https://ccy05327.github.io/SDD/08-PDF/Easy%20Approach%20to%20Requirements%20Syntax%20(EARS).pdf)
|
|
73
|
-
|
|
74
|
-
**Strengths & limitations.** Requirements patterns and CNL show strength in environments where stakeholders accept mild syntactic constraints in exchange for clearer, more consistent requirements, particularly when authors are non‑native English speakers. They provide low‑cost mechanisms for reducing obvious linguistic defects without requiring formal methods expertise, and they integrate relatively easily with existing SRS structures and review practices. However, these approaches remain bound to natural language and may struggle to capture complex temporal properties, quantitative constraints, or cross‑cutting non‑functional requirements without additional modelling formalisms. Evidence is mainly domain‑specific and case‑based, with limited cross‑domain, controlled comparisons, and there is ongoing debate about how far CNL can scale before it either becomes too restrictive or reintroduces ambiguity through pattern misuse. [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf)
|
|
75
|
-
|
|
76
|
-
### 4.4 Goal‑oriented requirements methods (A4)
|
|
77
|
-
|
|
78
|
-
**Theory & mechanism.** Goal‑oriented approaches model the desired system in terms of stakeholder goals and their refinements, treating operational requirements as means to achieve higher‑level objectives, often with explicit treatment of conflicts and alternatives. Nuseibeh and Easterbrook highlight a shift from modelling information flow and system state towards modelling stakeholders’ goals and scenarios illustrating how these goals can be achieved, emphasizing the importance of capturing system purpose. The mechanism is that explicit goal models help identify missing requirements, analyze trade‑offs among soft goals such as usability or security, and reason about how design choices satisfy or compromise these goals. [link.springer](https://link.springer.com/10.1007/978-3-642-21001-3)
|
|
79
|
-
|
|
80
|
-
**Literature evidence.** The RE roadmap surveys goal‑oriented work, including goal refinement, obstacle analysis, and the use of goals to derive operational requirements and evaluate alternative designs, although it does not focus on specific notations in the excerpts considered here. The volume “Relating Software Requirements and Architectures” discusses how goal models connect stakeholder concerns to architectural design decisions, reinforcing the idea that goals provide a bridge between problem and solution spaces. Subsequent RE conference and REFSQ contributions (as summarized in overviews) indicate continued research on goal modelling techniques and their tool support, although the extracted material mostly highlights conceptual importance rather than quantitative effectiveness metrics. Empirical evaluations tend to be small‑scale studies of modelling exercises rather than large industrial trials. [link.springer](https://link.springer.com/10.1007/978-3-642-21001-3)
|
|
81
|
-
|
|
82
|
-
**Implementations & benchmarks.** Goal‑oriented methods are implemented in various modelling frameworks and tools that support constructing goal hierarchies, annotating them with satisfaction conditions, and propagating satisfaction or violation through refinement structures. These tools often integrate with scenario notations by linking goals to use cases or with architectural models by mapping goals to components or services, though the specific names of such tools are not detailed in the retrieved sources. Benchmarks typically involve controlled modelling tasks or design exercises where subjects use goal‑oriented techniques to derive requirements or evaluate designs, yielding qualitative insights into comprehensibility and perceived usefulness but limited quantitative outcome data. Evidence on industrial adoption and long‑term impact remains relatively sparse in the visible excerpts. [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf)
|
|
83
|
-
|
|
84
|
-
**Strengths & limitations.** Goal‑oriented methods offer conceptual strength in clarifying why a system is needed and how specific requirements contribute to business or mission objectives, which is particularly valuable in complex, multi‑stakeholder settings. They support reasoning about conflicts and alternatives, especially for non‑functional qualities, and they can structure early design rationale in a way that complements more operational specifications. However, constructing and maintaining detailed goal models can be effort‑intensive, and the lack of standardized notations and tool ecosystems may limit their mainstream use compared with SRS templates or scenario notations. Evidence for improved project outcomes is suggestive rather than conclusive, with studies focusing more on conceptual expressiveness than on measurable impacts on defects, cost, or lead time. [arxiv](https://arxiv.org/pdf/2309.10355.pdf)
|
|
85
|
-
|
|
86
|
-
### 4.5 Scenario‑ and use‑case‑based techniques (A5)
|
|
87
|
-
|
|
88
|
-
**Theory & mechanism.** Scenario‑ and use‑case‑based approaches represent requirements as concrete narratives of interactions between actors and the system, often structured into preconditions, main flows, and alternative flows, or as user stories in agile settings. The theoretical motivation, as summarized in the RE roadmap, is that scenarios make abstract goals and requirements tangible, support communication among stakeholders, and reveal missing or inconsistent behaviour when stakeholders simulate use. The mechanism involves using narratives to uncover tasks, exceptions, and boundary conditions, which are then abstracted into more formal requirements or models, creating a bridge between domain understanding and operational specifications. [sciencedirect](https://www.sciencedirect.com/science/article/abs/pii/S0164121203002425)
|
|
89
|
-
|
|
90
|
-
**Literature evidence.** Nuseibeh and Easterbrook discuss scenarios and use cases as key artefacts for eliciting and analysing requirements, particularly in user‑centred and task‑oriented development. A rule‑based approach to generating requirements traceability relations describes tracing between requirements statements, use case specifications written in structured natural language, and analysis object models, indicating the centrality of scenarios in many RE practices. Empirical work on RE in software ecosystems and open innovation notes that scenario‑like artefacts are used to capture usage contexts and stakeholder interactions, although terminology may vary. However, the retrieved material focuses more on how scenarios fit into larger frameworks than on direct evaluations of scenario techniques per se. [arxiv](https://arxiv.org/pdf/1801.00250.pdf)
|
|
91
|
-
|
|
92
|
-
**Implementations & benchmarks.** Implementations include use case documents conforming to structured templates, user story backlogs, and scenario collections used in prototyping and walkthroughs. The traceability work mentioned above implements a prototype where requirement and use case documents, along with object models, are represented in XML, and traceability relations are generated using rules that match syntactic and semantic elements. Experiments reported in that work evaluate the ability of the rule engine to generate correct trace links across different artefact types, indirectly benchmarking the structure and consistency of scenario and requirement documents. Systematic comparisons between scenario‑centric and other approaches in terms of project outcomes are not prominent in the available excerpts, suggesting an evidence gap concerning scalability and long‑term maintainability. [sciencedirect](https://www.sciencedirect.com/science/article/abs/pii/S0164121203002425)
|
|
93
|
-
|
|
94
|
-
**Strengths & limitations.** Scenario‑based techniques excel at supporting communication with non‑technical stakeholders because narrative forms are easier to understand and validate than abstract models or dense SRS text. They encourage thinking about exceptional situations and user goals, which can reduce omissions, particularly in interactive systems, and they integrate well with prototyping and usability evaluations. On the other hand, scenarios can proliferate and become hard to manage without supporting abstractions, and ensuring coverage of all required behaviour and non‑functional properties through scenarios alone is challenging. Evidence directly linking scenario practices to improved defect rates or change resilience is limited, and many organizations use scenarios informally without systematic traceability or quality control. [arxiv](https://arxiv.org/pdf/2309.10355.pdf)
|
|
95
|
-
|
|
96
|
-
### 4.6 Model‑based and formal specification (A6)
|
|
97
|
-
|
|
98
|
-
**Theory & mechanism.** Model‑based and formal approaches represent requirements using mathematically defined notations such as state machines, temporal logic, or domain‑specific formalisms, enabling rigorous analysis of consistency, completeness, and satisfiability. Nuseibeh and Easterbrook describe modelling and analysing requirements as constructing abstract descriptions of desired behaviour and reasoning about whether proposed designs meet the system’s purpose, with increasing emphasis on formal models for safety‑critical and high‑assurance systems. A semantics‑based RE framework such as SENSE uses flow‑down semantics to ensure that high‑level requirements consistently refine into lower‑level ones, employing a minimal yet consistent set of formal languages. Techniques for validating inconsistent requirements models using graph‑based abduction illustrate how formal reasoning can detect and manage contradictions in requirements sets. [semanticscholar](https://www.semanticscholar.org/paper/f2fc2f4d45a86dad349fadda7b03c7efd8b929a3)
|
|
99
|
-
|
|
100
|
-
**Literature evidence.** The RE roadmap outlines the role of formal specification and analysis as part of requirements modelling, particularly for non‑functional properties and complex environments, and notes open challenges in bridging contextual elicitation and formal approaches. The SENSE framework paper argues that combining boilerplates with semantics‑based checks can improve validity and completeness of requirements, presenting its approach as addressing persistent problems in RE for complex systems. Work on graph‑based abduction demonstrates validating inconsistent requirements models by constructing explanations for inconsistencies, showing benefits for managing imperfect or evolving requirements rather than assuming full consistency. Collectively, these sources indicate that formal analysis can reveal subtle issues, though they primarily provide technical case studies rather than large‑scale industrial statistics. [semanticscholar](https://www.semanticscholar.org/paper/f2fc2f4d45a86dad349fadda7b03c7efd8b929a3)
|
|
101
|
-
|
|
102
|
-
**Implementations & benchmarks.** Implementations range from bespoke modelling languages and tools to integrations with model checkers and theorem provers, although specific tools are not named in the retrieved text. SENSE is implemented as a framework that integrates formal boilers, flows requirements down multiple levels, and performs automated checks with reported case studies that demonstrate feasibility and error‑finding capabilities. The graph‑based abduction approach is evaluated on requirements models where inconsistencies are deliberately introduced or naturally occur, with performance measured in terms of the approach’s ability to propose plausible resolutions. However, comprehensive benchmarks comparing formal RE approaches against informal ones with respect to cost, defect density, or time to market are not evident in the excerpts, indicating that evidence remains largely technical and domain‑specific. [mdpi](https://www.mdpi.com/1999-4893/14/10/298/pdf)
|
|
103
|
-
|
|
104
|
-
**Strengths & limitations.** Model‑based and formal approaches provide strong guarantees about certain classes of defects, especially logical inconsistencies and missing cases, which is particularly valuable in safety‑critical or highly regulated domains. They support automation of validation and can integrate with architecture and design analyses, making requirements more amenable to rigorous change impact assessments. Their limitations include steep learning curves, the need for specialized expertise, and potential misalignment with stakeholders who are unfamiliar with formal notations, which can create communication gaps if not complemented by more accessible artefacts. Evidence suggests that these approaches are most mature in niche domains, with broader industrial adoption constrained by cost, complexity, and the difficulty of connecting formal models to informal elicitation practices. [zora.uzh](https://www.zora.uzh.ch/id/eprint/204996/8/ZORA204996.pdf)
|
|
105
|
-
|
|
106
|
-
### 4.7 Traceability‑centred RE and management (A7)
|
|
107
|
-
|
|
108
|
-
**Theory & mechanism.** Traceability‑centred approaches conceptualize RE as managing networks of relationships among requirements and between requirements and other artefacts such as designs, code, tests, and documents, in order to maintain alignment over time. Ramesh and Jarke define requirements traceability as the ability to describe and follow the life of a requirement in both forward and backward directions, emphasizing satisfiability, dependency, evolution, and rationale relations. The mechanism is that explicit trace links enable change impact analysis, support verification that all requirements are implemented and validated, and provide evidence for compliance and certification. [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf)
|
|
109
|
-
|
|
110
|
-
**Literature evidence.** The reference model work on requirements traceability introduces a three‑dimensional framework that relates different traceability techniques and purposes, highlighting its importance for managing complex projects and mitigating communication problems. A rule‑based approach for generating traceability relations between requirements, use case documents, and analysis object models demonstrates how trace links can be automatically created using grammatical tagging, XML representations, and traceability rules. The RE roadmap notes requirements traceability and management as core RE activities, underscoring how they enable evolving systems and product families while retaining control over requirements changes. Empirical evaluations of traceability frameworks often involve experiments measuring link generation accuracy or case studies on traceability use in industrial projects. [ieeexplore.ieee](https://ieeexplore.ieee.org/document/895989/)
|
|
111
|
-
|
|
112
|
-
**Implementations & benchmarks.** Implementations range from basic trace matrices maintained in spreadsheets to dedicated traceability management tools that store artefacts and links, provide visualizations, and support queries. The rule‑based traceability prototype described in the literature generates four types of traceability relations between requirements statements, use cases, and object models, using traceability rules encoded in an XML‑based rule markup language. Experiments with this prototype evaluate its ability to generate correct trace links under different rule sets and artefact configurations, showing that automated rule engines can support traceability in heterogeneous tool environments. However, large‑scale quantitative studies correlating traceability practice with project outcomes, such as defect rates or change costs, are rare, and “Naming the Pain” suggests that traceability is often underused or inconsistently applied. [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf)
|
|
113
|
-
|
|
114
|
-
**Strengths & limitations.** Traceability‑centred RE supports change impact analysis, regulatory compliance, and cross‑artefact reasoning, making it particularly valuable in large, long‑lived, or safety‑critical projects where requirements and implementations co‑evolve. Automated and semi‑automated traceability approaches reduce the manual effort of maintaining links and can reveal missing or inconsistent coverage across artefacts. Nevertheless, establishing and sustaining high‑quality traceability is effort‑intensive, with benefits that may be hard to demonstrate in short projects or less regulated environments, which partly explains limited adoption. Evidence suggests that without integration into everyday tools and processes, traceability information decays quickly, and there is limited empirical guidance on cost–benefit trade‑offs for different traceability strategies. [ieeexplore.ieee](https://ieeexplore.ieee.org/document/895989/)
|
|
115
|
-
|
|
116
|
-
### 4.8 Automated quality and ambiguity analysis (A8)
|
|
117
|
-
|
|
118
|
-
**Theory & mechanism.** Automated quality and ambiguity analysis approaches apply natural language processing, rule‑based metrics, and increasingly machine learning and large language models (LLMs) to detect linguistic problems in natural language requirements, such as ambiguity, vagueness, and complexity. Early tools like NASA’s Automated Requirements Measurement (ARM) and the Quality Analyzer for Requirements Specifications (QuARS) use keyword‑based patterns and metrics (for example, counts of imperatives, options, and weak phrases) to flag potentially problematic requirements. More recent work evaluates multiple tools and reviews ambiguity detection techniques, distinguishing manual, semi‑automatic NLP‑based, and semi‑automatic machine‑learning approaches. The mechanism is that systematic analysis of text highlights sentences likely to be misunderstood, prompting human review and rewriting. [ijisae](https://www.ijisae.org/index.php/IJISAE/article/view/2681)
|
|
119
|
-
|
|
120
|
-
**Literature evidence.** A comparative study of ambiguity‑detection tools evaluates ARM, QuARS, and RETA on industrial railway requirements, comparing tool outputs with an expert engineer’s judgement of ambiguous requirements. The study reports that tools focus on improving quality, reducing complexity, and identifying ambiguity by comparing requirements against predefined patterns or rules, but it also notes over‑flagging issues (for example, RETA marking almost all requirements as potentially ambiguous). A review paper on pragmatic ambiguity detection discusses how context and reader background knowledge shape interpretation and surveys NLP techniques for detecting and resolving such ambiguities. Recent work on using LLMs for requirements ambiguity detection reports that prompting models with in‑context examples yields a 20.20% average performance increase in classifying ambiguous requirements compared to zero‑shot prompting, and includes a human study assessing explanation usefulness. [ipr.mdu](https://www.ipr.mdu.se/pdf_publications/7221.pdf)
|
|
121
|
-
|
|
122
|
-
**Implementations & benchmarks.** ARM and QuARS implement lexical and syntactic analyses, using patterns for options (“may”, “can”), subjectivity (“better”, “worse”), weakness (“timely”, “be able to”), and structural complexity, providing metrics such as specification depth and readability indexes. RETA and related tools use patterns to detect plural terms, passive sentences, and other features correlated with ambiguity, albeit at the cost of high false‑positive rates in some evaluations. Commercial tools such as Requirements Scout and QVscribe have been evaluated in experience reports comparing multiple tools on the same requirement sets, illustrating differences in coverage and usability. LLM‑based approaches, still at research stage, implement classifiers and explanation generators, benchmarked on industrial datasets with metrics such as precision, recall, and improvement over baselines, but long‑term industrial impact remains unknown. [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf)
|
|
123
|
-
|
|
124
|
-
**Strengths & limitations.** Automated analysis tools provide systematic, repeatable checks that can be integrated into RE workflows to flag potentially ambiguous or low‑quality requirements, addressing known industrial problems with natural language specifications. They scale well to large specifications and can enforce organizational style guides or patterns, particularly when integrated with standard SRS templates and CNL approaches. However, evidence shows that current tools often produce false positives or miss context‑dependent pragmatic ambiguities, and industrial evaluations are limited in number and scope, with many studies relying on small datasets or single domains. LLM‑based methods appear promising but may introduce new risks related to explainability, bias, and dependence on training data, and the field’s own roadmap notes that requirements quality research tends to focus on normative definitions rather than fitness for purpose in real projects. [alistairmavin](https://alistairmavin.com/ears/)
|
|
125
|
-
|
|
126
|
-
## 5. Comparative Synthesis
|
|
127
|
-
|
|
128
|
-
The table below synthesizes the eight approach families across several comparative dimensions, combining conceptual analysis with available empirical indications.
|
|
129
|
-
|
|
130
|
-
| ID | Approach family | Primary phases supported | Precision of artefacts | Tooling maturity | Evidence base quality | Scalability pattern |
|
|
131
|
-
|-----|----------------------------------------|--------------------------------------------------|-------------------------------|---------------------------|--------------------------------------------------|--------------------------------------------------|
|
|
132
|
-
| A1 | Stakeholder‑centred elicitation | Early elicitation, negotiation, prioritization [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) | Low–medium (informal notes) | Medium (generic tools) | Strong surveys, weak comparative trials [arxiv](http://arxiv.org/pdf/1611.04976.pdf) | Good for moderate stakeholder sets; weak for very large ecosystems [arxiv](https://arxiv.org/pdf/1801.00250.pdf) |
|
|
133
|
-
| A2 | Standardized SRS & process standards | Specification, communication, compliance [math.uaa.alaska](http://www.math.uaa.alaska.edu/~afkjm/cs401/IEEE830.pdf) | Medium (structured NL) | High (standards, templates) [math.uaa.alaska](http://www.math.uaa.alaska.edu/~afkjm/cs401/IEEE830.pdf) | Strong normative standards, case studies, few experiments [mdpi](https://www.mdpi.com/2071-1050/13/15/8155/pdf) | Scales well in regulated, document‑centric domains; overhead in rapidly changing contexts [math.uaa.alaska](http://www.math.uaa.alaska.edu/~afkjm/cs401/IEEE830.pdf) |
|
|
134
|
-
| A3 | Patterns & controlled NL | Specification, early validation, readability [alistairmavin](https://alistairmavin.com/ears/) | Medium–high (constrained NL) | Medium (pattern libraries) | Case studies and evaluations in specific domains [ccy05327.github](https://ccy05327.github.io/SDD/08-PDF/Easy%20Approach%20to%20Requirements%20Syntax%20(EARS).pdf) | Effective for teams accepting syntactic discipline; uncertain in very heterogeneous contexts [alistairmavin](https://alistairmavin.com/ears/) |
|
|
135
|
-
| A4 | Goal‑oriented methods | Analysis, conflict handling, rationale capture [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) | High (structured models) | Medium (research tools) | Conceptual and small‑scale empirical studies [link.springer](https://link.springer.com/10.1007/978-3-642-21001-3) | Valuable in complex projects; modelling effort may limit use on small or fast projects [zora.uzh](https://www.zora.uzh.ch/id/eprint/204996/8/ZORA204996.pdf) |
|
|
136
|
-
| A5 | Scenario‑ and use‑case‑based | Elicitation, communication, validation [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) | Medium (structured narratives) | High (widespread practice) | Case and tool studies, limited quantitative data [sciencedirect](https://www.sciencedirect.com/science/article/abs/pii/S0164121203002425) | Scales with tool support; risk of unmanageable scenario sets in very large systems [sciencedirect](https://www.sciencedirect.com/science/article/abs/pii/S0164121203002425) |
|
|
137
|
-
| A6 | Model‑based & formal | Validation, verification, consistency checking [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) | High (formal semantics) | Medium (specialized tools) | Strong technical case studies, niche industrial use [mdpi](https://www.mdpi.com/1999-4893/14/10/298/pdf) | Highly effective in critical systems; high entry cost limits general adoption [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf) |
|
|
138
|
-
| A7 | Traceability‑centred RE & management | Change management, coverage, compliance [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf) | Medium (links plus artefacts) | Medium–high (tools, plugins) | Reference models, prototypes, limited outcome data [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf) | Scales for large projects when integrated; overhead problematic without automation [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf) |
|
|
139
|
-
| A8 | Automated quality & ambiguity analysis | Quality assessment, risk flagging [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf) | Medium (annotated NL) | Medium (research + commercial tools) | Comparative tool studies, emerging LLM work [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf) | Scales well to large corpora; context sensitivity issues remain at scale [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf) |
|
|
140
|
-
|
|
141
|
-
This synthesis reveals non‑obvious trade‑offs between approaches that rely on human communication and negotiation (A1, A5) versus those emphasizing structural or formal control (A2, A3, A6, A7, A8). For example, pattern‑based and automated analyses (A3, A8) can substantially improve textual clarity and highlight defects but depend on underlying elicitation and modelling quality that they do not themselves ensure. Similarly, traceability and formal models (A6, A7) offer strong analytic capabilities yet face adoption barriers related to cost and expertise, suggesting that combinations of lightweight and heavyweight techniques are often observed in practice rather than pure instantiations of any single family. [ccy05327.github](https://ccy05327.github.io/SDD/08-PDF/Easy%20Approach%20to%20Requirements%20Syntax%20(EARS).pdf)
|
|
142
|
-
|
|
143
|
-
## 6. Open Problems & Gaps
|
|
144
|
-
|
|
145
|
-
- **Bridging contextual elicitation and formal analysis.** Foundational work explicitly identifies a gap between elicitation approaches based on contextual enquiry and more formal specification and analysis, with limited methodologies for systematically transforming rich qualitative insights into formal models without loss of meaning. Addressing this gap matters because many failures arise from misinterpreting socio‑technical contexts, and progress likely requires integrated frameworks and tools that support traceable refinement from field data to formal requirements. [www0.cs.ucl.ac](http://www0.cs.ucl.ac.uk/staff/a.finkelstein/fose/present/nuseibehpres.pdf)
|
|
146
|
-
|
|
147
|
-
- **Empirical evaluation and comparative studies of RE methods.** Large‑scale surveys document prevalent RE problems, but there is comparatively little rigorous empirical evidence comparing alternative RE methods or combinations in terms of cost, defect density, or change resilience across diverse domains. This limits the discipline’s ability to assess trade‑offs quantitatively, and resolving it would require coordinated multi‑site studies, shared datasets, and standardized outcome metrics for RE interventions. [arxiv](http://arxiv.org/pdf/1611.04976.pdf)
|
|
148
|
-
|
|
149
|
-
- **Requirements engineering in agile, ecosystem, and open innovation contexts.** Mapping studies on software ecosystems and open innovation suggest that traditional RE techniques require adaptation when requirements emerge from networks of external stakeholders and continuously evolving platforms, yet research remains fragmented. Open problems include managing conflicting requirements from ecosystem participants, maintaining traceability across organizational boundaries, and reconciling agile backlogs with longer‑term requirements strategies. [arxiv](https://arxiv.org/pdf/2405.18847.pdf)
|
|
150
|
-
|
|
151
|
-
- **RE for research software and data‑intensive, AI‑enabled systems.** Vision papers argue that research software, often developed by scientists without formal SE training, exhibits ad hoc requirements practices that current RE methods do not adequately address, especially given the exploratory nature of such projects. Similarly, data‑intensive and AI‑enabled systems raise questions about specifying and validating requirements for data quality, model behaviour, and ethical constraints, which existing standards only partially cover, indicating the need for domain‑specific adaptations. [arxiv](http://arxiv.org/pdf/2401.10833.pdf)
|
|
152
|
-
|
|
153
|
-
- **Measuring requirements quality and fitness for purpose.** A harmonized requirements quality theory and initial models of RE activities and attributes have been proposed, but operationalizing these for decision support and continuous improvement remains an open challenge. This matters because without robust, validated measures of requirements “fitness for purpose”, organizations cannot systematically optimize RE processes or quantify the impact of new methods or tools. [arxiv](http://arxiv.org/pdf/2405.09895.pdf)
|
|
154
|
-
|
|
155
|
-
- **Scaling automated ambiguity detection and LLM‑based analysis.** Tool evaluations reveal limitations of current ambiguity‑detection tools, including false positives and insufficient handling of pragmatic context, and LLM‑based methods, while promising, introduce new challenges in robustness and explainability. Future work needs to establish how such tools perform across domains, languages, and specification styles, and to develop interaction patterns where automated suggestions and human judgement combine effectively, especially in safety‑critical settings. [ijisae](https://www.ijisae.org/index.php/IJISAE/article/view/2681)
|
|
156
|
-
|
|
157
|
-
## 7. Conclusion
|
|
158
|
-
|
|
159
|
-
This survey has documented requirements engineering as a mature yet evolving discipline that spans socio‑technical elicitation, structured specifications, modelling and analysis, traceability, and automated quality assessment, drawing on both standards and research advances. The taxonomy articulated in §3 and analysed in §4 reveals eight principal families of approaches, each emphasizing different artefacts and mechanisms, from conversational practices and narrative scenarios to formal models and machine‑assisted text analysis. These families collectively constitute a rich methodological landscape rather than a single coherent method, and organizations typically assemble tailored combinations that reflect domain, regulatory, and organizational constraints, as suggested by empirical studies and standards practice. [math.uaa.alaska](http://www.math.uaa.alaska.edu/~afkjm/cs401/IEEE830.pdf)
|
|
160
|
-
|
|
161
|
-
Structural trade‑offs emerge along several recurring dimensions, including natural language accessibility versus formal precision, early documentation versus emergent specification, and human interpretability versus automation, with different approach families occupying distinct regions in this design space. Survey and case‑study evidence shows that while standards, patterns, and tools provide important scaffolding for better RE, persistent problems related to incomplete, ambiguous, and volatile requirements remain widespread, particularly in agile, ecosystem, and research software contexts. Future work, as outlined in §6, will determine how far the discipline can move towards integrated, empirically grounded, and context‑sensitive RE practices that balance these trade‑offs while accommodating emerging technologies and development paradigms. [arxiv](http://arxiv.org/pdf/2405.07781.pdf)
|
|
162
|
-
|
|
163
|
-
## References
|
|
164
|
-
|
|
165
|
-
Nuseibeh, B., Easterbrook, S., 2000, “Requirements engineering: a roadmap,” Proceedings of the Conference on the Future of Software Engineering (ICSE 2000), ACM, pp. 35–46. [dl.acm](https://dl.acm.org/doi/10.1145/336512.336523)
|
|
166
|
-
|
|
167
|
-
Nuseibeh, B., Easterbrook, S., 2000, “Requirements Engineering: A Roadmap” (presentation slides), Imperial College London / University of Toronto. [interaction-design](https://www.interaction-design.org/literature/conference/proceedings-of-the-conference-on-the-future-of-software-engineering)
|
|
168
|
-
|
|
169
|
-
IEEE Computer Society, 1998, “IEEE Std 830‑1998: IEEE Recommended Practice for Software Requirements Specifications,” IEEE Standards Association. [ieeexplore.ieee](https://ieeexplore.ieee.org/document/720574)
|
|
170
|
-
|
|
171
|
-
ISO/IEC/IEEE, 2011, “ISO/IEC/IEEE 29148:2011 Systems and software engineering – Life cycle processes – Requirements engineering,” ISO / IEEE Standards Association. [standards.ieee](https://standards.ieee.org/ieee/29148/5289/)
|
|
172
|
-
|
|
173
|
-
ISO/IEC/IEEE, 2018, “ISO/IEC/IEEE 29148:2018 Systems and software engineering – Life cycle processes – Requirements engineering,” ISO / IEEE. [iso](https://www.iso.org/standard/72089.html)
|
|
174
|
-
|
|
175
|
-
Mavin, A., Wilkinson, P., et al., 2009, “Easy Approach to Requirements Syntax (EARS),” Technical report and case study material, Rolls‑Royce. [alistairmavin](https://alistairmavin.com/ears/)
|
|
176
|
-
|
|
177
|
-
Mavin, A., 2015, “EARS: The Easy Approach to Requirements Syntax,” public presentation slides. [slideshare](https://www.slideshare.net/slideshow/ears-the-easy-approach-to-requirements-syntax/51558506)
|
|
178
|
-
|
|
179
|
-
Oriol, M., et al., 2021, “SENSE: A Flow‑Down Semantics‑Based Requirements Engineering Framework,” Algorithms, 14(10), 298. [mdpi](https://www.mdpi.com/1999-4893/14/10/298/pdf)
|
|
180
|
-
|
|
181
|
-
Spanoudakis, G., Zisman, A., 2004, “Rule‑based generation of requirements traceability relations,” Journal of Systems and Software. [sciencedirect](https://www.sciencedirect.com/science/article/abs/pii/S0164121203002425)
|
|
182
|
-
|
|
183
|
-
Ramesh, B., Jarke, M., 2001, “Toward reference models for requirements traceability,” IEEE Transactions on Software Engineering / CREWS technical report. [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf)
|
|
184
|
-
|
|
185
|
-
Bajceta, A., et al., 2021, “Using NLP Tools to Detect Ambiguities in System Requirements: An Industrial Case Study,” NLP4RE Workshop, CEUR‑WS Vol. 3122. [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf)
|
|
186
|
-
|
|
187
|
-
Khan, S., 2023, “A Critical Study of Pragmatic Ambiguity Detection in Natural Language Requirements,” International Journal of Intelligent Systems and Applications in Engineering. [ijisae](https://www.ijisae.org/index.php/IJISAE/article/view/2681)
|
|
188
|
-
|
|
189
|
-
Bashir, S., et al., 2022, “Requirements Ambiguity Detection and Explanation with Large Language Models,” Mälardalen University technical report. [ipr.mdu](https://www.ipr.mdu.se/pdf_publications/7221.pdf)
|
|
190
|
-
|
|
191
|
-
Méndez Fernández, D., Wagner, S., et al., 2016, “Naming the Pain in Requirements Engineering: Design of a Global Family of Surveys and First Results from Germany,” arXiv preprint. [arxiv](http://arxiv.org/pdf/1611.04976.pdf)
|
|
192
|
-
|
|
193
|
-
Franch, X., et al., 2017, “A Systematic Mapping Study on Requirements Engineering in Software Ecosystems,” arXiv preprint. [arxiv](https://arxiv.org/pdf/1801.00250.pdf)
|
|
194
|
-
|
|
195
|
-
Ramsauer, E., et al., 2022, “Requirements engineering in open innovation: a research agenda,” arXiv preprint. [arxiv](https://arxiv.org/pdf/2208.01741.pdf)
|
|
196
|
-
|
|
197
|
-
Lago, P., et al., 2019, “Requirements Engineering: Foundation for Software Quality,” REFSQ 2019 volume introduction, Springer. [zora.uzh](https://www.zora.uzh.ch/id/eprint/204996/8/ZORA204996.pdf)
|
|
198
|
-
|
|
199
|
-
Pajares‑Ferrando, R., et al., 2023, “Requirements Quality Research: a harmonized Theory, Evaluation, and Roadmap,” arXiv preprint. [arxiv](https://arxiv.org/pdf/2309.10355.pdf)
|
|
200
|
-
|
|
201
|
-
Klünder, J., et al., 2025, “Measuring the Fitness‑for‑Purpose of Requirements: An initial Model of Activities and Attributes,” arXiv preprint. [arxiv](http://arxiv.org/pdf/2405.09895.pdf)
|
|
202
|
-
|
|
203
|
-
Gunter, D., et al., 2025, “Requirements Engineering for Research Software: A Vision,” arXiv preprint. [arxiv](http://arxiv.org/pdf/2405.07781.pdf)
|
|
204
|
-
|
|
205
|
-
Kasauli, R., et al., 2024, “Defining Requirements Strategies in Agile: A Design Science Research Study,” arXiv preprint. [arxiv](https://arxiv.org/pdf/2405.18847.pdf)
|
|
206
|
-
|
|
207
|
-
Tzafilkou, K., et al., 2021, “Holistic Requirements Analysis for Specifying New Systems for 3D Media Production and Promotion,” Sustainability, 13(15), 8155. [mdpi](https://www.mdpi.com/2071-1050/13/15/8155/pdf)
|
|
208
|
-
|
|
209
|
-
Alomari, M., et al., 2021, “Constructing a software requirements specification and design for electronic IT news magazine system,” arXiv preprint. [arxiv](https://arxiv.org/pdf/2111.01501.pdf)
|
|
210
|
-
|
|
211
|
-
## Practitioner Resources
|
|
212
|
-
|
|
213
|
-
- **Standards and templates**
|
|
214
|
-
- IEEE Std 830‑1998 SRS Template (PDF), University of Alaska Anchorage copy: Overview of recommended SRS structure, including examples and guidance on content organization. [math.uaa.alaska](http://www.math.uaa.alaska.edu/~afkjm/cs401/IEEE830.pdf)
|
|
215
|
-
- ISO/IEC/IEEE 29148:2018 Standard entry, ISO Webstore: Official description and purchase link for the current RE process and information item standard. [webstore.iec](https://webstore.iec.ch/en/publication/64315)
|
|
216
|
-
- IEEE Software Requirements Specification Template (CSUSB ScholarWorks): Example SRS template laid out in modified IEEE 830 style for educational and practical use. [utdallas](https://www.utdallas.edu/~chung/RE/Presentations06F/Team_1.doc)
|
|
217
|
-
|
|
218
|
-
- **Requirements patterns and CNL**
|
|
219
|
-
- EARS homepage (Alistair Mavin): Introductory material, examples, and links on the Easy Approach to Requirements Syntax for constrained natural language requirements. [alistairmavin](https://alistairmavin.com/ears/)
|
|
220
|
-
- “Easy Approach to Requirements Syntax (EARS)” PDF: Detailed description of EARS patterns, case study results, and practical guidance for applying the ruleset. [ccy05327.github](https://ccy05327.github.io/SDD/08-PDF/Easy%20Approach%20to%20Requirements%20Syntax%20(EARS).pdf)
|
|
221
|
-
|
|
222
|
-
- **Traceability and management**
|
|
223
|
-
- “Toward Reference Models for Requirements Traceability” (CREWS report): Conceptual framework for organizing traceability techniques and understanding their roles in RE processes. [ftp.informatik.rwth-aachen](http://ftp.informatik.rwth-aachen.de/ftp/pub/packages/CREWS/CREWS-99-13.pdf)
|
|
224
|
-
- “Rule‑based generation of requirements traceability relations” (Journal of Systems and Software): Prototype and experiments showing how to automatically generate trace links between requirements, use cases, and object models. [sciencedirect](https://www.sciencedirect.com/science/article/abs/pii/S0164121203002425)
|
|
225
|
-
|
|
226
|
-
- **Automated quality and ambiguity tools**
|
|
227
|
-
- NLP4RE Tool Evaluation Paper (Bajceta et al., 2021): Comparative evaluation of ARM, QuARS, RETA, Requirement Scout, and QVscribe on industrial requirements, useful for understanding tool capabilities and limitations. [ceur-ws](https://ceur-ws.org/Vol-3122/NLP4RE-paper-3.pdf)
|
|
228
|
-
- “A Critical Study of Pragmatic Ambiguity Detection in NLRs”: Survey of ambiguity types and NLP techniques with emphasis on context‑dependent (pragmatic) ambiguities in requirements. [ijisae](https://www.ijisae.org/index.php/IJISAE/article/view/2681)
|
|
229
|
-
- “Requirements Ambiguity Detection and Explanation with LLMs” report: Early exploration of using large language models to classify and explain ambiguous requirements, including evaluation setup and results. [ipr.mdu](https://www.ipr.mdu.se/pdf_publications/7221.pdf)
|
|
230
|
-
|
|
231
|
-
- **Surveys and roadmaps**
|
|
232
|
-
- “Requirements Engineering: A Roadmap” (Nuseibeh & Easterbrook ICSE 2000): High‑level overview of RE activities, foundations, and challenges, serving as a conceptual entry point to the field. [cs.toronto](https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf)
|
|
233
|
-
- “Requirements Quality Research: a harmonized Theory, Evaluation, and Roadmap”: Comprehensive synthesis of work on requirements quality and directions for future research. [arxiv](https://arxiv.org/pdf/2309.10355.pdf)
|
|
234
|
-
- “Naming the Pain in Requirements Engineering” global survey report: Empirical data on industrial RE problems, expectations, and practices across organizations and countries. [arxiv](http://arxiv.org/pdf/1611.04976.pdf)
|
|
@@ -1,149 +0,0 @@
|
|
|
1
|
-
# Systems Engineering Specifications, Emergent Behavior, and Interface Contracts in NASA/DoD Traditions
|
|
2
|
-
|
|
3
|
-
*February 25, 2026*
|
|
4
|
-
|
|
5
|
-
## Abstract
|
|
6
|
-
|
|
7
|
-
This survey examines how systems engineering traditions in aerospace and defense, particularly within NASA and the United States Department of Defense (DoD), conceptualize and manage specifications as interconnected artifacts rather than isolated documents. It focuses on emergent behavior, interface contracts between subsystems, and the family of “ilities” (for example reliability, maintainability, and testability) that historically shaped specification practice in high‑assurance programs. [nasa](https://www.nasa.gov/wp-content/uploads/2018/09/nasa_systems_engineering_handbook_0.pdf)
|
|
8
|
-
|
|
9
|
-
The analysis identifies five main families of approaches: lifecycle standards and process models, explicit interface management and control documentation, model‑based systems engineering (MBSE) for requirements and interfaces, formal behavioral specification and verification, and architectures plus specialty‑engineering practices oriented toward emergent behavior and ilities. These families embody different theories of how specifications interact with architecture, verification, and risk management, which leads to distinct patterns of handling cross‑cutting properties and system‑of‑systems behavior. [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf)
|
|
10
|
-
|
|
11
|
-
The survey documents trade‑offs among these approaches along dimensions such as process complexity, evidence quality, scalability to systems of systems, and depth of support for emergent behavior analysis and ilities, while highlighting where empirical evidence remains sparse or largely qualitative. No prescriptive ranking is offered; instead, the landscape and its structural tensions are made explicit for further evaluation. [scielo](https://www.scielo.br/j/aabc/a/ZrfsXBTKt8PgCZwvdR7YZRh/?format=pdf&lang=en)
|
|
12
|
-
|
|
13
|
-
## 1. Introduction
|
|
14
|
-
|
|
15
|
-
The central problem considered in this survey concerns how systems engineering traditions treat specifications as parts of an interacting fabric that shapes system behavior, rather than as independent requirement statements. This problem matters because large aerospace and defense systems often satisfy individual specifications while still exhibiting unanticipated emergent behavior or failing to achieve required reliability, maintainability, or testability at system level. This disconnect between local specification satisfaction and global behavior has driven decades of refinement in NASA and DoD processes, which now embed interface management, specialty engineering, and configuration control into formal lifecycle standards. [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf)
|
|
16
|
-
|
|
17
|
-
The survey scope encompasses system‑level engineering practices for complex, safety‑critical or mission‑critical systems, with particular emphasis on NASA handbooks, DoD standards, ISO/IEC/IEEE 15288, and INCOSE guidance. It covers requirements engineering, interface management, MBSE, formal methods for behavior, and reference architectures for emergent behavior control, but it excludes detailed project management, contracting, and purely software‑centric agile practices that are only weakly integrated into these high‑assurance traditions. The focus remains on how specifications, models, and interface contracts express and constrain system behavior, including ilities, across the life cycle. [scribd](https://www.scribd.com/document/89707990/Mil-Std-499b)
|
|
18
|
-
|
|
19
|
-
Several key definitions structure the discussion. In plain terms, a “requirement” is a statement of what a system must do or how well it must do it; in systems engineering, this becomes a verifiable condition allocated across system elements, commonly termed a “system requirement”. A “specification” is then a curated collection of such requirements that defines a baseline for a system or configuration item, often formalized in system, allocated, or product specifications. An “interface contract” is a structured description of assumptions and guarantees across boundaries between system elements, realized through interface requirements, interface control documents (ICDs), and related artifacts. Finally, “emergent behavior” refers to system‑level properties arising from interactions among components and their environment that are not trivially deducible from component specifications, while “ilities” denote cross‑cutting quality attributes such as reliability, maintainability, and testability that depend on coordinated design and verification decisions across multiple subsystems. [ntrs.nasa](https://ntrs.nasa.gov/api/citations/20170007238/downloads/20170007238.pdf)
|
|
20
|
-
|
|
21
|
-
## 2. Foundations
|
|
22
|
-
|
|
23
|
-
Foundational lifecycle standards define how specifications evolve with system maturity and how they relate to architecture, verification, and risk. ISO/IEC/IEEE 15288 provides a process framework spanning concept, development, operation, and disposal, organizing activities into agreement, organizational, technical management, and technical processes that jointly shape requirement and interface artifacts. NASA’s Systems Engineering Handbook similarly describes a life cycle in which stakeholder expectations are translated into system requirements, decomposed into architectural design, integrated through interface management, and verified and validated, with explicit feedback loops for managing technical risk and change. [se-trends](https://www.se-trends.de/en/iso-15288/)
|
|
24
|
-
|
|
25
|
-
Within these frameworks, emergent behavior arises because requirements and designs are allocated across a hierarchy of system elements and enabling systems, with complex couplings captured imperfectly by documents and models. NASA and DoD guidance emphasize that requirements analysis must address completeness, traceability, and consistency across functional allocations and interfaces, but they also recognize that many design errors manifest only during integration and test when interactions become fully observable. This recognition motivates strong configuration management, technical performance measurement, and progressive verification, which together attempt to ensure that evolving specifications and implementations remain aligned as knowledge about emergent behavior accumulates. [cto](https://www.cto.mil/wp-content/uploads/2023/06/SE-Guidebook-2022.pdf)
|
|
26
|
-
|
|
27
|
-
The ilities are embedded in this landscape as specialty engineering domains rather than isolated requirements, which means that their realization depends on coordinated activities across the lifecycle. Military standards and INCOSE guidance describe reliability, maintainability, and related specialties as being integrated into the systems engineering management plan, influencing trade studies, allocations, and verification strategies rather than being confined to late‑stage testing. MBSE and design‑assurance research in aerospace further argue that qualitative methods and process‑based mitigations are necessary because deterministic testing alone cannot demonstrate absence of design errors in highly integrated systems. Consequently, the foundations position specifications, interfaces, and ilities as co‑evolving artifacts within a broader system of processes, checks, and models rather than static, one‑shot documents. [scribd](https://www.scribd.com/document/831362205/MIL-STD-499A)
|
|
28
|
-
|
|
29
|
-
## 3. Taxonomy of Approaches
|
|
30
|
-
|
|
31
|
-
Table 1 summarizes the taxonomy used in this survey. Each approach appears as a leaf node and is analyzed in §4.
|
|
32
|
-
|
|
33
|
-
**Table 1. Taxonomy of systems‑engineering approaches to specifications, interfaces, and emergent behavior**
|
|
34
|
-
|
|
35
|
-
| ID | Approach name | Primary focus | Representative sources |
|
|
36
|
-
|-----|-----------------------------------------------------------|-------------------------------------------------------------|---------------------------------------------------------|
|
|
37
|
-
| 4.1 | Lifecycle standards and process models | End‑to‑end process control of requirements and ilities | NASA SE Handbook, ISO 15288, DoD SE Guidebook [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf) |
|
|
38
|
-
| 4.2 | Interface management and control documentation | Structuring and governing interface contracts | NASA interface guidance, MIL‑STD‑499B, expanded NASA SE [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf) |
|
|
39
|
-
| 4.3 | Model‑Based Systems Engineering for specs and interfaces | SysML and MBSE meta‑models for digital requirements | SysML requirements meta‑models, NASA MBSE case studies [arxiv](http://arxiv.org/pdf/2410.21288.pdf) |
|
|
40
|
-
| 4.4 | Formal behavioral specification and verification | Mathematical models and model checking of spacecraft behavior | Formal spacecraft behavior dissertation, related guidance [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd) |
|
|
41
|
-
| 4.5 | Emergent‑behavior and ilities‑oriented architectures and specialties | Reference architectures and specialty engineering for resilience and ilities | Resilient enterprise architecture, INCOSE and DoD guidance [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf) |
|
|
42
|
-
|
|
43
|
-
## 4. Analysis
|
|
44
|
-
|
|
45
|
-
### 4.1 Lifecycle standards and process models
|
|
46
|
-
|
|
47
|
-
**Theory & mechanism.** Lifecycle standards view specifications as outputs and inputs of structured processes that transform stakeholder needs into system architectures and verified implementations over time. ISO/IEC/IEEE 15288 arranges processes such as requirements analysis, architectural design, implementation, integration, verification, validation, operation, and maintenance into a coherent framework, emphasizing that these technical processes are coupled with technical management processes like risk management and configuration management. NASA’s Systems Engineering Handbook similarly frames systems engineering as a set of concurrent and iterative technical and management processes, in which requirement baselines are established, decomposed, and updated as design and verification evidence accumulate across the life cycle. This process view embeds ilities and emergent behavior considerations in repeated cycles of analysis, trade‑off, and verification rather than treating them as late additions. [incose](https://www.incose.org/resource/the-iso-15288-technical-processes-system-maturity-and-conceptual-gaps/)
|
|
48
|
-
|
|
49
|
-
**Literature evidence.** NASA’s handbooks document lessons from multiple missions, asserting that disciplined lifecycle processes reduce the likelihood of large‑scale redesign and technical surprises, particularly when requirements management and interface management are tightly integrated. DoD’s Systems Engineering Guidebook emphasizes that interdependencies in the system architecture and asynchronous life cycles in systems of systems require systematic integration, verification, and validation processes to obtain a validated solution, while highlighting technical performance measures for tracking critical parameters. An INCOSE analysis of ISO 15288 technical processes formalizes these processes in terms of system maturity transitions, arguing that specific process steps (for example verification) are required to justify maturity changes and to maintain alignment between evolving specifications and product baselines. Evidence in these sources is largely qualitative, derived from accumulated practice rather than controlled empirical studies. [standards.nasa](https://standards.nasa.gov/sites/default/files/standards/MSFC/C/0/msfc-hdbk-3173_rev_c.pdf)
|
|
50
|
-
|
|
51
|
-
**Implementations & benchmarks.** ISO 15288 is implemented as an international standard adopted by organizations across aerospace, defense, and other sectors, often embedded in corporate process frameworks and quality systems. NASA enforces its systems engineering requirements through procedural requirements (NPR 7123.1) and associated handbooks which define mandatory and recommended practices for center‑level and project‑level processes, including tailoring mechanisms for differing mission classes. The DoD guidebook ties lifecycle processes to acquisition phases and encourages the use of technical performance measures and digital engineering ecosystems to monitor progress, although it does not report quantitative benchmarks demonstrating process effectiveness in terms of defect rates or mission outcomes. Empirical benchmarks on the direct impact of these lifecycle models on emergent behavior or ilities remain limited in the publicly accessible literature. [nasa](https://www.nasa.gov/wp-content/uploads/2018/09/nasa_systems_engineering_handbook_0.pdf)
|
|
52
|
-
|
|
53
|
-
**Strengths & limitations.** Lifecycle standards offer a comprehensive vocabulary and structure for relating specifications, interfaces, and ilities to architecture, verification, and risk management, which appears to facilitate communication and governance in complex programs. They scale relatively well to large organizations and long programs, particularly when configuration management and technical performance measurement processes are institutionalized, but this scaling often introduces process overhead that may reduce flexibility in fast‑changing environments. These standards primarily encode process expectations rather than explicit causal models of emergent behavior, so their ability to prevent unwanted emergent phenomena depends heavily on local tailoring, engineering judgment, and complementary techniques such as MBSE and formal methods. The evidence base demonstrates widespread adoption and perceived value but offers limited quantitative comparisons between different lifecycle instantiations or against alternative, less formal approaches. [incose](https://www.incose.org/docs/default-source/default-document-library/systems-engineering-guidebook---isbn-9780692091807bb88028572db67488e78ff000036190a.pdf?sfvrsn=365365c7_0)
|
|
54
|
-
|
|
55
|
-
### 4.2 Interface management and control documentation
|
|
56
|
-
|
|
57
|
-
**Theory & mechanism.** Interface management practices treat interfaces as first‑class engineering objects whose specifications and changes must be actively controlled to prevent integration failures and unintended emergent behaviors. NASA’s Systems Engineering Handbook describes an interface management process that identifies internal and external interfaces, defines interface requirements, and produces artifacts such as Interface Requirements Documents, Interface Control Documents or Drawings, Interface Definition Documents, and Interface Control Plans. MIL‑STD‑499B similarly mandates that performing activities define internal and external physical interfaces, ensure that requirements are integrated and verifiable across interfaces, and establish interface controls that encompass vendor and subcontractor items, facilities, and data. This mechanism formalizes interface contracts as shared baselines whose stability and clarity constrain interactions among subsystems. [ntrs.nasa](https://ntrs.nasa.gov/api/citations/20170007238/downloads/20170007238.pdf)
|
|
58
|
-
|
|
59
|
-
**Literature evidence.** Expanded NASA guidance stresses that defining all interface requirements, including those to enabling systems, is critical and that both explicit and implicit interfaces must be addressed to avoid latent design errors that appear late in integration. The legacy NASA SP‑2007‑6105 handbook details inputs, activities, and outputs for interface management, highlighting tasks such as identifying interface dependencies, coordinating interface changes, and documenting interface agreements, which collectively aim to reduce incompatibilities and emergent failures at boundaries. MIL‑STD‑499B’s interface management section emphasizes configuration control of interface documentation and the need to delineate design compatibility of external and internal interfaces within specifications, underscoring that uncoordinated interface changes can propagate risks across the system. These sources consistently point to interface mismatches as a recurrent cause of cost growth and schedule delays, although formal statistics are rarely provided. [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd)
|
|
60
|
-
|
|
61
|
-
**Implementations & benchmarks.** In practice, interface management is implemented through multi‑party working groups, interface control working groups, and formal review milestones where interface documentation is baselined and change requests are adjudicated, as described in NASA and DoD materials. Interface control documents are widely used on NASA missions and defense acquisitions to coordinate between spacecraft and launch vehicles, ground systems and space segments, and among constituent systems within systems of systems, with specific templates and data requirements defined in center‑ or program‑level handbooks. MIL‑STD‑499B and related guides position interface management as part of configuration management and systems analysis and control, tying interface changes to risk assessments and technical performance measurements that evaluate their impact on higher‑level parameters, although published quantitative performance data remain minimal. Public benchmarks on interface defect density or rework effort across programs using different interface management regimes are largely absent. [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf)
|
|
62
|
-
|
|
63
|
-
**Strengths & limitations.** Explicit interface management makes the interconnected nature of specifications visible and governable, often surfacing cross‑subsystem assumptions that would otherwise remain implicit until integration, which appears to reduce certain classes of emergent failures. It supports multi‑organizational integration by providing shared artifacts (for example ICDs) that clarify responsibilities and constraints, although maintaining these artifacts in alignment with rapidly evolving designs can be labor‑intensive, particularly in complex systems of systems with asynchronous life cycles. Interface documentation often struggles to capture dynamic and implicit interactions, such as shared resource contention or timing‑dependent behaviors, which means that important emergent properties remain only partially represented, requiring complementary modeling and analysis approaches. Evidence on the marginal benefit of increasingly detailed interface documentation relative to its cost is limited, and guidance on tailoring interface management intensity to program characteristics remains largely heuristic. [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf)
|
|
64
|
-
|
|
65
|
-
### 4.3 Model‑Based Systems Engineering for specifications and interfaces
|
|
66
|
-
|
|
67
|
-
**Theory & mechanism.** MBSE approaches replace or complement document‑centric specifications with structured models, often in SysML, that capture requirements, architecture, behavior, and interfaces in an integrated digital representation. A recent INCOSE‑derived SysML meta‑model for digital requirements engineering proposes Model‑Based Structured Requirements that impose syntactic and semantic constraints on requirement expression and link requirements directly to system elements and behavioral models, aiming to improve clarity and traceability compared with natural‑language documents. ISO 15288’s 2023 revision introduces a new annex providing guidelines for MBSE application, reflecting a view that technical processes such as architecture definition, system analysis, and integration can be enacted within a unified modeling environment where emergent interactions and ilities are analyzed more systematically. [arxiv](http://arxiv.org/pdf/2410.21288.pdf)
|
|
68
|
-
|
|
69
|
-
**Literature evidence.** The SysML meta‑model study reports initial results from deployment at NASA’s Jet Propulsion Laboratory, suggesting that model‑based structured requirements may rapidly improve requirement expression quality while complementing NASA handbook checklists, although challenges remain in automating typical requirements management activities within system architecture tools. A NASA case study on applying MBSE to space communications networks argues that traditional document‑based methods become inadequate for complex systems and systems of systems, and that MBSE enables concurrent development of requirements, architecture, and concepts of operations within a coherent model. A study on MBSE and design‑assurance processes for highly integrated aerospace systems notes that qualitative methods and MBSE artifacts are increasingly used to mitigate design errors that deterministic testing cannot feasibly uncover, emphasizing the role of MBSE in capturing non‑desired behaviors and supporting safety assessments. These sources provide qualitative and some semi‑structured evaluation, but sustained quantitative outcome data are limited. [arxiv](https://arxiv.org/pdf/2401.16330.pdf)
|
|
70
|
-
|
|
71
|
-
**Implementations & benchmarks.** MBSE is implemented in practice through SysML or similar modeling languages in commercial or open‑source tools, where requirement stereotypes, traceability relationships, and behavioral diagrams collectively define the “digital thread” for a system. NASA’s MBSE applications to space communications networks demonstrate model repositories that integrate requirements, architectural views, and operational scenarios, allowing engineers to visualize and analyze system behavior across geographic and logical dimensions that are difficult to capture in static documents. The design‑assurance MBSE work in aerospace describes process integrations where MBSE models feed into safety assessments and design error mitigation activities, but it acknowledges that deterministic test sets cannot prove absence of design errors and that MBSE is used as part of a broader qualitative assurance strategy. Reported metrics primarily concern perceived improvements in understandability and stakeholder communication; rigorous before‑and‑after comparisons on defect discovery or rework are rare. [zenodo](https://zenodo.org/record/1280501/files/article.pdf)
|
|
72
|
-
|
|
73
|
-
**Strengths & limitations.** MBSE appears to enhance consistency and traceability across specifications, interfaces, and behavioral descriptions by enforcing explicit links within a shared model, which can make emergent interactions more analyzable and support early detection of conflicts between requirements and architecture. It provides a natural platform for integrating specialty analyses (for example reliability models) and for exploring systems‑of‑systems interactions, particularly when combined with simulation and analytic tools, although tool integration and model governance remain nontrivial challenges. Limitations documented in the literature include difficulties in automating requirements management workflows within MBSE tools, the learning curve for stakeholders unfamiliar with formal modeling, and the risk that models become out of sync with evolving code and hardware if configuration management is weak. Evidence on MBSE’s direct effect on ilities or emergent behavior control is still emerging, which suggests that claims of superiority over document‑centric approaches should be regarded as promising but not definitively established. [arxiv](http://arxiv.org/pdf/2410.21288.pdf)
|
|
74
|
-
|
|
75
|
-
### 4.4 Formal behavioral specification and verification
|
|
76
|
-
|
|
77
|
-
**Theory & mechanism.** Formal specification approaches model system behavior using mathematically rigorous formalisms, enabling exhaustive or semi‑exhaustive analysis of properties related to safety, liveness, and interaction patterns that underlie emergent behavior. A dissertation on spacecraft systems engineering develops a formal approach based on the Communicating Sequential Processes (CSP) process algebra, modeling subsystem events, explicit and implicit interfaces, modes, and transitions to analyze spacecraft behavior rigorously. This formalization enables model checking and theorem proving to verify that specified properties hold for all reachable behaviors of the model, thereby exposing subtle design and specification errors that might only manifest late in integration or operation. MBSE and design‑assurance literature in aerospace positions such formal methods as complements to qualitative and test‑based approaches, particularly where failure modes are difficult to enumerate experimentally. [scielo](https://www.scielo.br/j/aabc/a/ZrfsXBTKt8PgCZwvdR7YZRh/?format=pdf&lang=en)
|
|
78
|
-
|
|
79
|
-
**Literature evidence.** The CSP‑based spacecraft behavior work reports that current spacecraft development approaches leave systems highly vulnerable to design errors that are not detected until integration and test, and demonstrates how formal models can reveal disconnects between required and designed behaviors earlier in the process. The dissertation presents examples from ACE and WIRE spacecraft subsystems, modeling power interfaces, attitude control modes, and data handling, and uses the FDR model checker to verify properties and uncover specification inconsistencies, although quantitative statistics on error reduction are not provided. The MBSE and design‑assurance paper notes that civil aviation recognizes the infeasibility of deterministic test sets to demonstrate absence of design errors in highly integrated systems and reports widespread use of qualitative methods, including model‑based and sometimes formal techniques, to mitigate design errors contributing to non‑desired behaviors during operation. Together, these sources suggest that formal methods can detect classes of emergent behavior and interface problems not easily identified by testing alone, but systematic adoption evidence remains sparse. [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd)
|
|
80
|
-
|
|
81
|
-
**Implementations & benchmarks.** Implementations of formal behavioral specification in aerospace involve modeling languages like CSP and associated tools such as the FDR model checker, as described in the spacecraft behavior dissertation. The work shows how system block diagrams, message sequence charts, and mode transition diagrams can be systematically translated into CSP processes, enabling automated verification of properties such as correct command distribution, safe mode transitions, and absence of deadlocks in communication protocols. Broader aerospace design‑assurance practice described in MBSE literature acknowledges the use of qualitative and model‑based methods for mitigating design errors but does not systematically catalog formal method deployments or provide cross‑project benchmarks. Consequently, while case studies demonstrate feasibility and problem‑finding power, consistent quantitative benchmarks comparing formal and non‑formal projects on defect profiles or reliability outcomes are not widely available. [scielo](https://www.scielo.br/j/aabc/a/ZrfsXBTKt8PgCZwvdR7YZRh/?format=pdf&lang=en)
|
|
82
|
-
|
|
83
|
-
**Strengths & limitations.** Formal behavior models provide strong guarantees about modeled properties and can expose emergent behaviors arising from complex state interactions and implicit interfaces that are difficult to capture with document‑centric or informal models, especially when concurrency and distributed control are involved. They can sharpen specifications by forcing explicit treatment of modes, events, and interface assumptions, thereby surfacing ambiguities that might otherwise remain latent until integration, but this benefit depends on the scope and fidelity of the models constructed. Limitations include the substantial expertise required, the effort to build and maintain formal models alongside evolving designs, and challenges in scaling to full system‑of‑systems contexts where state spaces become intractably large, which often leads to selective application to critical subsystems or properties. Additionally, integration of formal methods with mainstream MBSE tools and lifecycle standards remains partial, and institutional guidance on when and how to apply them is less mature than for document‑centric processes. [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf)
|
|
84
|
-
|
|
85
|
-
### 4.5 Emergent‑behavior and ilities‑oriented architectures and specialty engineering
|
|
86
|
-
|
|
87
|
-
**Theory & mechanism.** Emergent‑behavior‑oriented architectures explicitly design for detection, monitoring, and control of emergent phenomena, often in enterprise‑ or system‑of‑systems contexts that extend beyond traditional platform‑centric systems. A reference architecture for resilient enterprises proposes a hybrid distributed architecture combining autonomous business functions with centralized monitoring to detect and respond to emergent behaviors in cyber‑physical and Industry 4.0 environments, emphasizing architectural mechanisms such as event monitoring, anomaly detection, and adaptive control loops. In parallel, systems engineering guidance from INCOSE and DoD positions specialties such as reliability, maintainability, and cyber survivability as integrated threads that influence architecture and design decisions, with structured plans and metrics embedded in systems engineering management plans and technical performance measurement frameworks. This combination treats ilities as emergent properties of architecture, operations, and support systems rather than isolated requirement lines. [cto](https://www.cto.mil/wp-content/uploads/2023/06/SE-Guidebook-2022.pdf)
|
|
88
|
-
|
|
89
|
-
**Literature evidence.** The resilient enterprise architecture paper argues that technological advances in cyber‑physical systems and Industry 4.0 increase the need to understand and control emergent behaviors in enterprises and distills architectural requirements for detection and monitoring of such behaviors, although evaluation focuses on conceptual and prototype analyses rather than large‑scale deployments. The INCOSE systems engineering guidebook states that systems engineering must enable the development of engineered resilient systems that are trusted, assured, and easily modified and emphasizes integrated, measurable, and repeatable processes to mature and manage the product baseline, including specialty engineering plans for reliability and maintainability. The DoD guidebook describes technical performance measures and risk metrics, including operational resilience and cyber survivability, and notes that testing systems of systems is more challenging because of asynchronous life cycles and the complexity of constituent systems, implying that architectural and process measures are necessary to handle emergent risk. MIL‑STD‑499A further describes integration and coordination of engineering specialty areas to achieve the best mix of technical and performance values, indicating long‑standing recognition that ilities require coordinated treatment. [scribd](https://www.scribd.com/document/831362205/MIL-STD-499A)
|
|
90
|
-
|
|
91
|
-
**Implementations & benchmarks.** Implementations of emergent‑behavior‑oriented architectures in practice include prototype systems that integrate monitoring and control components into enterprise architectures, as proposed in the resilient enterprise reference architecture, although large‑scale field data are not widely reported. INCOSE and DoD guidance describe implementation expectations such as developing specialty plans, integrating reliability and maintainability modeling into trade studies, and selecting technical performance measures (for example operational resilience metrics) to monitor ilities throughout the life cycle, with digital engineering ecosystems envisioned as platforms for sharing such metrics among stakeholders. MIL‑STD‑499A describes system effectiveness modeling to assess life‑cycle performance and cost, aligning ilities with system performance characteristics and trade‑off analyses, but again does not provide quantitative benchmarks across multiple programs. Overall, implementations are described normatively in standards and guidebooks, with limited publicly accessible empirical evaluation. [incose](https://www.incose.org/docs/default-source/default-document-library/systems-engineering-guidebook---isbn-9780692091807bb88028572db67488e78ff000036190a.pdf?sfvrsn=365365c7_0)
|
|
92
|
-
|
|
93
|
-
**Strengths & limitations.** Architectures and specialty engineering focused on emergent behavior and ilities make system‑level properties explicit design concerns, enabling mechanisms such as monitoring, adaptation, and redundancy to be systematically incorporated into system structures rather than appended as afterthoughts. They help organizations conceptualize resilience, safety, and maintainability as emergent from the interplay of components, processes, and environments, which aligns with observed behavior in complex enterprises and systems of systems, but practical realization often depends on integrating multiple disciplines and tools across organizational silos. Limitations include the relative novelty of some architectural patterns for emergent behavior control, resulting in thin empirical evidence on cost‑effectiveness and operational impact, and challenges in aligning high‑level resilience concepts with concrete requirements and verification activities defined in lifecycle standards. There is also ongoing tension between static specification of ilities and dynamic, context‑dependent resilience mechanisms, which existing standards and reference architectures only partially address. [incose](https://www.incose.org/resource/the-iso-15288-technical-processes-system-maturity-and-conceptual-gaps/)
|
|
94
|
-
|
|
95
|
-
## 5. Comparative Synthesis
|
|
96
|
-
|
|
97
|
-
**Table 2. Comparative view of approaches to specifications, interfaces, emergent behavior, and ilities**
|
|
98
|
-
|
|
99
|
-
| Approach (ID) | Primary artifact type | Maturity in NASA/DoD contexts | Evidence quality on outcomes | Scalability to systems of systems | Treatment of emergent behavior | Treatment of ilities |
|
|
100
|
-
|---------------|-----------------------------------------------|-------------------------------|-----------------------------------------|------------------------------------------------------|----------------------------------------------------------|-----------------------------------------------------------|
|
|
101
|
-
| 4.1 Lifecycle standards and process models | Process definitions, requirement and specification baselines | High (longstanding institutional standards) [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf) | Moderate (qualitative, practice based) [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf) | Moderate to high, with explicit SoS guidance emerging [cto](https://www.cto.mil/wp-content/uploads/2023/06/SE-Guidebook-2022.pdf) | Indirect, via iterative verification and risk management [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf) | Embedded as specialty processes and requirements threads [scribd](https://www.scribd.com/document/831362205/MIL-STD-499A) |
|
|
102
|
-
| 4.2 Interface management and control documentation | ICDs, interface requirements and control plans | High (standard practice in major programs) [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf) | Moderate (case‑driven, anecdotal) [ntrs.nasa](https://ntrs.nasa.gov/api/citations/20170007238/downloads/20170007238.pdf) | Moderate, but strained by asynchronous life cycles and many stakeholders [cto](https://www.cto.mil/wp-content/uploads/2023/06/SE-Guidebook-2022.pdf) | Focused on preventing boundary‑related emergent failures [ntrs.nasa](https://ntrs.nasa.gov/api/citations/20170007238/downloads/20170007238.pdf) | Enables allocation of ilities across interfaces but rarely models emergent ilities explicitly [scribd](https://www.scribd.com/document/89707990/Mil-Std-499b) |
|
|
103
|
-
| 4.3 MBSE for specs and interfaces | SysML and related models integrating requirements, behavior, and structure | Growing, with institutional endorsements [arxiv](http://arxiv.org/pdf/2410.21288.pdf) | Emerging (initial studies, limited metrics) [arxiv](http://arxiv.org/pdf/2410.21288.pdf) | Potentially high, contingent on tool and model governance [zenodo](https://zenodo.org/record/1280501/files/article.pdf) | Can represent complex interactions and support early analysis of emergent behaviors [zenodo](https://zenodo.org/record/1280501/files/article.pdf) | Supports integrated modeling of ilities, but depends on embedded analyses and data [scielo](https://www.scielo.br/j/aabc/a/ZrfsXBTKt8PgCZwvdR7YZRh/?format=pdf&lang=en) |
|
|
104
|
-
| 4.4 Formal behavioral specification and verification | Formal models (for example CSP) and verification artifacts | Low to moderate, mainly in critical subsystems [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd) | Case‑study based (strong on specific projects, sparse broadly) [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd) | Limited by state‑space explosion, often applied selectively [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd) | Direct, through exhaustive analysis of modeled behaviors and properties [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd) | Indirect, via guarantees on behaviors that underlie reliability or safety [scielo](https://www.scielo.br/j/aabc/a/ZrfsXBTKt8PgCZwvdR7YZRh/?format=pdf&lang=en) |
|
|
105
|
-
| 4.5 Emergent‑behavior and ilities‑oriented architectures and specialties | Reference architectures, specialty plans, effectiveness models | Moderate, newer for emergent architectures, older for specialties [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf) | Limited quantitative, largely conceptual and guidance based [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf) | Aimed at high scalability across enterprises and SoS [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf) | Central concern, with mechanisms for detection, monitoring, and response [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf) | Central concern, framing ilities as integrated system properties with dedicated metrics [incose](https://www.incose.org/docs/default-source/default-document-library/systems-engineering-guidebook---isbn-9780692091807bb88028572db67488e78ff000036190a.pdf?sfvrsn=365365c7_0) |
|
|
106
|
-
|
|
107
|
-
This comparative view highlights that document‑centric lifecycle standards and interface management are deeply institutionalized and provide strong governance structures, while MBSE and formal methods offer more direct mechanisms for analyzing emergent behavior but are less mature and less widely benchmarked. Emergent‑behavior‑oriented architectures and specialty engineering emphasize resilience and ilities at architectural and organizational levels, yet they currently rest on relatively thin empirical bases, especially regarding cost‑effectiveness and long‑term impact in operational settings. [zenodo](https://zenodo.org/record/1280501/files/article.pdf)
|
|
108
|
-
|
|
109
|
-
## 6. Open Problems & Gaps
|
|
110
|
-
|
|
111
|
-
- Quantitative evaluation of process and architecture choices. Existing NASA, DoD, and INCOSE materials provide rich qualitative guidance but limited quantitative data comparing defect rates, cost growth, or mission outcomes under different combinations of lifecycle standards, MBSE adoption levels, interface management intensities, and formal‑method usage. Resolving this gap would require systematically instrumented multi‑program studies with shared metrics and transparent reporting. [eng.auburn](https://www.eng.auburn.edu/~dbeale/ESMDCourse/Site%20Documents/NASA%20SP-2007-6105.pdf)
|
|
112
|
-
|
|
113
|
-
- Representing and analyzing implicit and context‑dependent interfaces. Current interface management and MBSE practices acknowledge implicit interfaces and context‑dependent couplings (for example resource contention, human‑system interactions), but they offer only partial methods for modeling and verifying behaviors that depend on such implicit links, particularly in systems of systems. Progress would involve extending modeling and analysis techniques to better capture environmental and organizational interfaces and validating these extensions against observed emergent behaviors. [ntrs.nasa](https://ntrs.nasa.gov/api/citations/20170007238/downloads/20170007238.pdf)
|
|
114
|
-
|
|
115
|
-
- Integration and governance across document, model, and formal artifacts. Lifecycle standards, ICDs, MBSE models, and formal behavior models often coexist with limited integration, raising questions about configuration management, traceability, and conflict resolution when these artifacts diverge. Addressing this problem would require robust digital engineering infrastructures, standardized traceability schemas, and institutional processes that treat all artifact types as part of a single specification baseline. [arxiv](http://arxiv.org/pdf/2410.21288.pdf)
|
|
116
|
-
|
|
117
|
-
- Scaling formal and semi‑formal methods to enterprise‑level emergent behavior. Current formal behavior modeling tends to focus on critical subsystems, while enterprise‑level reference architectures for emergent behavior control remain largely conceptual or prototype‑based. Research is needed on compositional techniques, abstraction methods, and probabilistic or statistical verification approaches that can handle large‑scale enterprise and system‑of‑systems contexts without overwhelming computational resources. [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd)
|
|
118
|
-
|
|
119
|
-
- Operationalizing ilities as measurable, verifiable system properties. Standards and guidebooks emphasize ilities through specialty plans and technical performance measures, but there remains a gap between high‑level concepts like resilience or maintainability and concrete, model‑based properties that can be verified and monitored across the lifecycle. Progress would entail developing shared ontologies, metrics, and model patterns that link ilities to system structures and behaviors in ways amenable to analysis and continuous assurance. [cto](https://www.cto.mil/wp-content/uploads/2023/06/SE-Guidebook-2022.pdf)
|
|
120
|
-
|
|
121
|
-
## 7. Conclusion
|
|
122
|
-
|
|
123
|
-
This survey has outlined how NASA, DoD, ISO/IEC/IEEE, and INCOSE traditions conceptualize specifications as interconnected components of a broader system of processes, models, and architectures that collectively shape emergent behavior and ilities. Lifecycle standards and interface management practices provide a stable institutional backbone that structures how requirements and interfaces are defined, allocated, and verified, but they rely heavily on human judgment and local tailoring to address the complex ways in which component‑level specifications aggregate into system‑level behavior. [scribd](https://www.scribd.com/document/89707990/Mil-Std-499b)
|
|
124
|
-
|
|
125
|
-
MBSE and formal behavioral specification approaches offer more explicit and analyzable representations of interactions and modes, which appear to enhance understanding of emergent phenomena and reduce certain classes of design errors, although the empirical evidence base is still developing and often limited to case studies. Emergent‑behavior‑oriented architectures and integrated specialty engineering for ilities extend the focus to enterprise and system‑of‑systems levels, treating resilience, safety, and maintainability as properties emerging from architectural, operational, and organizational patterns, yet they remain supported primarily by conceptual frameworks and prototype evaluations. [zenodo](https://zenodo.org/record/1280501/files/article.pdf)
|
|
126
|
-
|
|
127
|
-
Across these approaches, structural trade‑offs become apparent between institutional maturity and analytical power, between documentation and modeling, and between local component optimization and global emergent properties. The landscape documented here suggests that handling emergent behavior and ilities in complex systems depends less on any single technique and more on how multiple specification, modeling, and governance mechanisms are composed and aligned over time. [incose](https://www.incose.org/resource/the-iso-15288-technical-processes-system-maturity-and-conceptual-gaps/)
|
|
128
|
-
|
|
129
|
-
## Practitioner Resources
|
|
130
|
-
|
|
131
|
-
- **NASA Systems Engineering Handbook (NASA/SP‑2007‑6105 and later revisions).** Comprehensive NASA guidance on systems engineering processes, including requirements, interface management, and technical risk, useful as a primary reference for lifecycle and interface practices. [nasa](https://www.nasa.gov/wp-content/uploads/2018/09/nasa_systems_engineering_handbook_0.pdf)
|
|
132
|
-
|
|
133
|
-
- **ISO/IEC/IEEE 15288: System life cycle processes.** International standard defining technical and management processes across the system life cycle, including an MBSE annex in the 2023 version, relevant for aligning organizational processes with systems engineering best practices. [se-trends](https://www.se-trends.de/en/iso-15288/)
|
|
134
|
-
|
|
135
|
-
- **DoD Systems Engineering Guidebook (2022).** Defense acquisition guidebook detailing systems engineering expectations, technical performance measures, and systems‑of‑systems considerations, with particular relevance to operational resilience and complex interdependencies. [cto](https://www.cto.mil/wp-content/uploads/2023/06/SE-Guidebook-2022.pdf)
|
|
136
|
-
|
|
137
|
-
- **INCOSE Systems Engineering Handbook and related guidebook.** Practitioner‑oriented compendia describing systems engineering processes, specialty engineering integration, and metrics, useful for understanding how ilities are embedded into systems engineering management plans. [incose](https://www.incose.org/docs/default-source/default-document-library/systems-engineering-guidebook---isbn-9780692091807bb88028572db67488e78ff000036190a.pdf?sfvrsn=365365c7_0)
|
|
138
|
-
|
|
139
|
-
- **MIL‑STD‑499A and MIL‑STD‑499B (draft).** Military standards describing systems engineering processes, including requirements analysis, allocation, interface management, and integration of engineering specialties, valuable for historical and current DoD practice on specifications and interfaces. [scribd](https://www.scribd.com/document/89707990/Mil-Std-499b)
|
|
140
|
-
|
|
141
|
-
- **Digital Requirements Engineering with an INCOSE‑derived SysML Meta‑Model.** Research paper detailing a SysML meta‑model for structured requirements and reporting initial results from deployment at NASA JPL, informative for practitioners adopting MBSE for requirements. [arxiv](https://arxiv.org/pdf/2401.16330.pdf)
|
|
142
|
-
|
|
143
|
-
- **Applying Model‑Based Systems Engineering to NASA’s Space Communications Networks.** Case study describing MBSE application to complex space communication networks, illustrating how requirements, architecture, and operations can be co‑modeled. [zenodo](https://zenodo.org/record/1280501/files/article.pdf)
|
|
144
|
-
|
|
145
|
-
- **MBSE and Design Assurance in Aerospace.** Study discussing the use of MBSE and qualitative methods to mitigate design errors in highly integrated aerospace systems, emphasizing limitations of deterministic testing. [scielo](https://www.scielo.br/j/aabc/a/ZrfsXBTKt8PgCZwvdR7YZRh/?format=pdf&lang=en)
|
|
146
|
-
|
|
147
|
-
- **A Formal Approach to Specifying and Verifying Spacecraft Behavior.** Dissertation presenting a CSP‑based formal framework and tool‑supported verification for spacecraft behavior, offering detailed examples of formal specification and analysis of interfaces and modes. [digitalcommons.usu](https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1269&context=etd)
|
|
148
|
-
|
|
149
|
-
- **A Design of the Resilient Enterprise: A Reference Architecture for Emergent Behaviors Control.** MDPI paper proposing a reference architecture for monitoring and reacting to emergent behaviors in enterprises, relevant to practitioners designing for resilience and emergent‑behavior control. [mdpi](https://www.mdpi.com/1424-8220/20/22/6672/pdf)
|