SlideShare a Scribd company logo
1 of 29
Download to read offline
Uncertainty, Risk, and Information Value in
Software Requirements and Architecture
Emmanuel Letier, David Stefan, Earl T. Barr
University College London, UK
1
Hyderabad, 6 June 2014, ICSE 2014
Embrace uncertainty!
2
Software Design Decisions
Uncertainty is inevitable
We must decide without knowing everything
3
What software to build? What
functions? What quality
level?
What architectural style? What
components and interfaces?
How to deploy them?
The Surfer’s Approach to Uncertainty
Instead of learning to
surf, conventional
organizations try to
control the waves. This
almost never works.
— Allen Ward
4
Mary Poppendieck, “Learning to Surf”, industry keynote @ ICSE2013
The Surfer’s Approach to Uncertainty
Instead of learning to
surf, conventional
organizations try to
control the waves. This
almost never works.
— Allen Ward
5
Mary Poppendieck, “Learning to Surf”, industry keynote @ ICSE2013
The Surfer’s Approach to Uncertainty
Instead of learning to
surf, conventional
organizations try to
control the waves. This
almost never works.
-- Allen Ward
6
The Scientific Approach to Uncertainty
Decision Analysis, a discipline
for understanding, formalising,
analysing, and communicating
insights about situations in
which important decisions
must be made
7
Ron Howard, Stanford
The Pseudo-Scientific Approach
Use formulae that resembles a
scientific approach, except that
•  the decision criteria are
numbers without verifiable
meaning
•  the decision models are not
falsifiable
•  no retrospective evaluation of
decisions and outcomes
Most widely used example, the
Analytical Hierarchy Process
(AHP)
8
What do we mean by uncertainty ?
9
Uncertainty
Uncertainty is the lack of complete knowledge about a state
or quantity. There is more than one possible value and the
“true” value is not known.
Measurement of uncertainty. A set of possible values with
a probability assigned to each.
10
Will I submit a paper to
ICSE 2015?
yes no
0.8
0.2
How many papers will be
submitted to ICSE 2015?
500 600350
distribution
Key observation
11
For any uncertain quantity, we always know something even
if our uncertainty is large
How many auto rickshaw journeys in
Hyderabad today?
10m100k
12
Things Software Engineers Say ...
Clients don’t know what they want
Requirements change is inevitable
It’s not possible to discover the true requirements
before building the system
13
Things Academics Say ...
Requirements are inherently
unknowable!
Linda Northrop “Does Scale Really Matter? – Ultra-Large-Scale Systems
Seven Years after the Study” plenary keynote @ ICSE2013
What they mean ...
Requirements are uncertain
14
We always know something about the
requirements for a system even if our
uncertainty is large
Software Design Decisions
Uncertainty is inevitable
We must decide without knowing everything
15
What software to build? What
functions? What quality
level?
What architectural style? What
components and interfaces?
How to deploy them?
Our approach in 6 steps
16
1. Model the design
decision problem
Architecture decisions
and impact on software qualities
Requirements decisions
and impact on business value
Our approach in 6 steps
17
1. Model the design
decision problem
2. Define the decision risks
What do we mean by risk?
Risk is a state of uncertainty where some of the possibilities
involve a loss, catastrophe, or other undesirable outcome.
Measurement of Risk. A set of possibilities each with
quantified probabilities and quantified losses. (D. Hubbard)
18
Goal failure risk: software not meeting minimally acceptable
level of goal satisfaction (e.g. unacceptable performance,
reliability, availability, cost, etc.)
Project failure risk: software not meeting minimally
acceptable level for at least one of its goals
In our approach
Paper novelty: first method to quantify goal failure risks and project failure
risk to inform software design decisions
Our approach in 6 steps
19
1. Model the design
decision problem
2. Define the decision risks
3. Elicit what decision makers already know
(their prior probability distributions)
We rely on simple, effective
methods to counter cognitive
biases (overconfidence,
anchoring, etc.)
Our approach in 6 steps
20
1. Model the design
decision problem
2. Define the decision risks
3. Elicit what decision makers already know
(their prior probability distributions)
4. Shortlist candidate architectures based on
expected value, expected cost, and risks
0.0 0.2 0.4 0.6 0.8 1.0
1214161820
Project Failure risk
ExpectedNetBenefit
Shortlisting candidate architectures
•  Monte-Carlo simulation to
evaluate candidate architectures
under uncertainty
•  Multi-objective optimisation to
find shortlist (shortlist = set of
Pareto-optimal candidates)
21
•  Paper novelties (for SBSE experts):
- Pareto strip = Pareto front with uncertainty margins
- Identification of closed and open decisions in shortlist
Design space: ~ 7,000 candidates
Shortlist (in red): 10 candidates
Our approach in 6 steps
22
1. Model the design
decision problem
2. Define the decision risks
3. Elicit what decision makers already know
(their prior probability distributions)
4. Shortlist candidate architectures based on
expected value, expected cost, and risks
5. Compute the expected
value of information
Should we seek additional info about shortlisted candidates?
The Expected Value of Perfect Information (EVPI)
•  Useful against measurement inversion bias: measuring
what we can be precise about rather than what is most
valuable to decision
•  Paper novelty: computing impact of perfect information on
risk
23
EVPI(X) = the expected gain in business value ($) from
obtaining perfect information about X to inform decision
(Ronald Howard, 1966)
How much would you be willing to pay for perfect information about X?
Our approach in 6 steps
24
1. Model the design
decision problem
2. Define the decision risks
3. Elicit what decision makers already know
(their prior probability distributions)
4. Shortlist candidate architectures based on
expected value, expected cost, and risks
5. Compute the expected
value of information
6. Seek additional info
where valuable (creates
posterior distributions)
Should we seek additional info about shortlisted candidates?
Application to an example from ICSE’13
A mobile system for coordinating
emergency rescue teams
•  Design space: 10 design
decisions; around 7,000 candidate
architectures
•  Objectives: Cost, Response Time,
Reliability, Battery Life, ...
•  Models given by design team:
Utility score defined as weighted
sum of objectives satisfaction
•  Lessons Learnt
–  Measuring risks leads to a
different shortlist
–  Need to reason about model
uncertainty in addition to
parameter uncertainty
–  Decision models must be
falsifiable
25
(Esfahani, Malek, & Razavi)
Conclusion
26
Research Roadmap
27
Scientific Approach
to Software
Decisions
Parameter uncertainty
Model uncertainty: quantifying “good enough”
Incremental value
delivery
Showing applicability
Showing cost-effectiveness
Overcoming cultural barriers
???
Incremental evidence-based
model tuning
Please, help us!
28
We need more research on Software Decision Analysis
‒  Our ‘moda’ R package is available to facilitate uptake
‒  Related work: CBAM @ ICSE’01, ICSE’03; GuideArch
@ ICSE’13; Fenton et al @ ICSE’04
We need industry partners willing to try scientific
approach to decision making
–  portfolio decisions
–  release planning
–  architecture decisions
–  risk-based testing
–  process decisions
A Call to Action
Who do you want to inform critical
IT decisions?
29
Uncertainty will be at the heart of
many important decisions for the
21st Century
The Surfers The ScientistsThe Pseudo-Scientists

More Related Content

What's hot

Concepts Development : How To Create Products Customers Love
Concepts Development : How To Create Products Customers LoveConcepts Development : How To Create Products Customers Love
Concepts Development : How To Create Products Customers LoveBernardo A. Delicado
 
Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?Phil Watt
 
RE2021 tutorial human values in requirements engineering
RE2021 tutorial   human values in requirements engineeringRE2021 tutorial   human values in requirements engineering
RE2021 tutorial human values in requirements engineeringJon Whittle
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software DevelopmentJane Prusakova
 
Steve mcconnell
Steve mcconnellSteve mcconnell
Steve mcconnellShiraz316
 
The challenge of wicked problems in airlines engineering ahmad arafat
The challenge of wicked problems in airlines engineering   ahmad arafatThe challenge of wicked problems in airlines engineering   ahmad arafat
The challenge of wicked problems in airlines engineering ahmad arafatAhmad Arafat
 

What's hot (8)

Icpc12b.ppt
Icpc12b.pptIcpc12b.ppt
Icpc12b.ppt
 
Concepts Development : How To Create Products Customers Love
Concepts Development : How To Create Products Customers LoveConcepts Development : How To Create Products Customers Love
Concepts Development : How To Create Products Customers Love
 
Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?
 
RE2021 tutorial human values in requirements engineering
RE2021 tutorial   human values in requirements engineeringRE2021 tutorial   human values in requirements engineering
RE2021 tutorial human values in requirements engineering
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
 
Steve mcconnell
Steve mcconnellSteve mcconnell
Steve mcconnell
 
The challenge of wicked problems in airlines engineering ahmad arafat
The challenge of wicked problems in airlines engineering   ahmad arafatThe challenge of wicked problems in airlines engineering   ahmad arafat
The challenge of wicked problems in airlines engineering ahmad arafat
 

Similar to Uncertainty, Risk, and Information Value in Software Requirements and Architecture

Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsShahid Shah
 
IronHacks Live: Info session #3 - COVID-19 Data Science Challenge
IronHacks Live: Info session #3 - COVID-19 Data Science ChallengeIronHacks Live: Info session #3 - COVID-19 Data Science Challenge
IronHacks Live: Info session #3 - COVID-19 Data Science ChallengePurdue RCODI
 
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainTeam MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainJames Neo
 
Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...
Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...
Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...OW2
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programPriyanka Aash
 
Testing the ideas
Testing the ideasTesting the ideas
Testing the ideasDan Ashby
 
WTF is Design Thinking
WTF is Design ThinkingWTF is Design Thinking
WTF is Design ThinkingMarian Mota
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturitySynopsys Software Integrity Group
 
World Future Society 2015 Professional Members Forum
World Future Society 2015 Professional Members ForumWorld Future Society 2015 Professional Members Forum
World Future Society 2015 Professional Members ForumWendy Schultz
 
Machine Learning and AI in Risk Management
Machine Learning and AI in Risk ManagementMachine Learning and AI in Risk Management
Machine Learning and AI in Risk ManagementQuantUniversity
 
Introduction to software engineering
Introduction to software engineeringIntroduction to software engineering
Introduction to software engineeringHitesh Mohapatra
 
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...Joe Lamantia
 
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline TechnologiesUX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline TechnologiesUX STRAT
 
Adopting Data Science and Machine Learning in the financial enterprise
Adopting Data Science and Machine Learning in the financial enterpriseAdopting Data Science and Machine Learning in the financial enterprise
Adopting Data Science and Machine Learning in the financial enterpriseQuantUniversity
 
Good-to-Great with AQUENT presentation - Koen van Niekerk
Good-to-Great with AQUENT presentation - Koen van NiekerkGood-to-Great with AQUENT presentation - Koen van Niekerk
Good-to-Great with AQUENT presentation - Koen van NiekerkLisa Trapman
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Constructionjxyz
 
Disruption: Designing Successful Startups
Disruption: Designing Successful StartupsDisruption: Designing Successful Startups
Disruption: Designing Successful StartupsJulian Scaff
 

Similar to Uncertainty, Risk, and Information Value in Software Requirements and Architecture (20)

Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
 
IronHacks Live: Info session #3 - COVID-19 Data Science Challenge
IronHacks Live: Info session #3 - COVID-19 Data Science ChallengeIronHacks Live: Info session #3 - COVID-19 Data Science Challenge
IronHacks Live: Info session #3 - COVID-19 Data Science Challenge
 
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainTeam MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe Again
 
Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...
Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...
Redefine Corporate CyberSecurity Frameworks under "COVID-19" Situations, OW2o...
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Testing the ideas
Testing the ideasTesting the ideas
Testing the ideas
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
WTF is Design Thinking
WTF is Design ThinkingWTF is Design Thinking
WTF is Design Thinking
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
 
World Future Society 2015 Professional Members Forum
World Future Society 2015 Professional Members ForumWorld Future Society 2015 Professional Members Forum
World Future Society 2015 Professional Members Forum
 
Machine Learning and AI in Risk Management
Machine Learning and AI in Risk ManagementMachine Learning and AI in Risk Management
Machine Learning and AI in Risk Management
 
Introduction to software engineering
Introduction to software engineeringIntroduction to software engineering
Introduction to software engineering
 
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
UX STRAT 2018 | Flying Blind On a Rocket Cycle: Pioneering Experience Centere...
 
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline TechnologiesUX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
UX STRAT USA Presentation: Joe Lamantia, Bottomline Technologies
 
Adopting Data Science and Machine Learning in the financial enterprise
Adopting Data Science and Machine Learning in the financial enterpriseAdopting Data Science and Machine Learning in the financial enterprise
Adopting Data Science and Machine Learning in the financial enterprise
 
Good-to-Great with AQUENT presentation - Koen van Niekerk
Good-to-Great with AQUENT presentation - Koen van NiekerkGood-to-Great with AQUENT presentation - Koen van Niekerk
Good-to-Great with AQUENT presentation - Koen van Niekerk
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
 
Disruption: Designing Successful Startups
Disruption: Designing Successful StartupsDisruption: Designing Successful Startups
Disruption: Designing Successful Startups
 

Recently uploaded

Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxjana861314
 

Recently uploaded (20)

Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
 

Uncertainty, Risk, and Information Value in Software Requirements and Architecture

  • 1. Uncertainty, Risk, and Information Value in Software Requirements and Architecture Emmanuel Letier, David Stefan, Earl T. Barr University College London, UK 1 Hyderabad, 6 June 2014, ICSE 2014
  • 3. Software Design Decisions Uncertainty is inevitable We must decide without knowing everything 3 What software to build? What functions? What quality level? What architectural style? What components and interfaces? How to deploy them?
  • 4. The Surfer’s Approach to Uncertainty Instead of learning to surf, conventional organizations try to control the waves. This almost never works. — Allen Ward 4 Mary Poppendieck, “Learning to Surf”, industry keynote @ ICSE2013
  • 5. The Surfer’s Approach to Uncertainty Instead of learning to surf, conventional organizations try to control the waves. This almost never works. — Allen Ward 5 Mary Poppendieck, “Learning to Surf”, industry keynote @ ICSE2013
  • 6. The Surfer’s Approach to Uncertainty Instead of learning to surf, conventional organizations try to control the waves. This almost never works. -- Allen Ward 6
  • 7. The Scientific Approach to Uncertainty Decision Analysis, a discipline for understanding, formalising, analysing, and communicating insights about situations in which important decisions must be made 7 Ron Howard, Stanford
  • 8. The Pseudo-Scientific Approach Use formulae that resembles a scientific approach, except that •  the decision criteria are numbers without verifiable meaning •  the decision models are not falsifiable •  no retrospective evaluation of decisions and outcomes Most widely used example, the Analytical Hierarchy Process (AHP) 8
  • 9. What do we mean by uncertainty ? 9
  • 10. Uncertainty Uncertainty is the lack of complete knowledge about a state or quantity. There is more than one possible value and the “true” value is not known. Measurement of uncertainty. A set of possible values with a probability assigned to each. 10 Will I submit a paper to ICSE 2015? yes no 0.8 0.2 How many papers will be submitted to ICSE 2015? 500 600350 distribution
  • 11. Key observation 11 For any uncertain quantity, we always know something even if our uncertainty is large How many auto rickshaw journeys in Hyderabad today? 10m100k
  • 12. 12 Things Software Engineers Say ... Clients don’t know what they want Requirements change is inevitable It’s not possible to discover the true requirements before building the system
  • 13. 13 Things Academics Say ... Requirements are inherently unknowable! Linda Northrop “Does Scale Really Matter? – Ultra-Large-Scale Systems Seven Years after the Study” plenary keynote @ ICSE2013
  • 14. What they mean ... Requirements are uncertain 14 We always know something about the requirements for a system even if our uncertainty is large
  • 15. Software Design Decisions Uncertainty is inevitable We must decide without knowing everything 15 What software to build? What functions? What quality level? What architectural style? What components and interfaces? How to deploy them?
  • 16. Our approach in 6 steps 16 1. Model the design decision problem Architecture decisions and impact on software qualities Requirements decisions and impact on business value
  • 17. Our approach in 6 steps 17 1. Model the design decision problem 2. Define the decision risks
  • 18. What do we mean by risk? Risk is a state of uncertainty where some of the possibilities involve a loss, catastrophe, or other undesirable outcome. Measurement of Risk. A set of possibilities each with quantified probabilities and quantified losses. (D. Hubbard) 18 Goal failure risk: software not meeting minimally acceptable level of goal satisfaction (e.g. unacceptable performance, reliability, availability, cost, etc.) Project failure risk: software not meeting minimally acceptable level for at least one of its goals In our approach Paper novelty: first method to quantify goal failure risks and project failure risk to inform software design decisions
  • 19. Our approach in 6 steps 19 1. Model the design decision problem 2. Define the decision risks 3. Elicit what decision makers already know (their prior probability distributions) We rely on simple, effective methods to counter cognitive biases (overconfidence, anchoring, etc.)
  • 20. Our approach in 6 steps 20 1. Model the design decision problem 2. Define the decision risks 3. Elicit what decision makers already know (their prior probability distributions) 4. Shortlist candidate architectures based on expected value, expected cost, and risks
  • 21. 0.0 0.2 0.4 0.6 0.8 1.0 1214161820 Project Failure risk ExpectedNetBenefit Shortlisting candidate architectures •  Monte-Carlo simulation to evaluate candidate architectures under uncertainty •  Multi-objective optimisation to find shortlist (shortlist = set of Pareto-optimal candidates) 21 •  Paper novelties (for SBSE experts): - Pareto strip = Pareto front with uncertainty margins - Identification of closed and open decisions in shortlist Design space: ~ 7,000 candidates Shortlist (in red): 10 candidates
  • 22. Our approach in 6 steps 22 1. Model the design decision problem 2. Define the decision risks 3. Elicit what decision makers already know (their prior probability distributions) 4. Shortlist candidate architectures based on expected value, expected cost, and risks 5. Compute the expected value of information Should we seek additional info about shortlisted candidates?
  • 23. The Expected Value of Perfect Information (EVPI) •  Useful against measurement inversion bias: measuring what we can be precise about rather than what is most valuable to decision •  Paper novelty: computing impact of perfect information on risk 23 EVPI(X) = the expected gain in business value ($) from obtaining perfect information about X to inform decision (Ronald Howard, 1966) How much would you be willing to pay for perfect information about X?
  • 24. Our approach in 6 steps 24 1. Model the design decision problem 2. Define the decision risks 3. Elicit what decision makers already know (their prior probability distributions) 4. Shortlist candidate architectures based on expected value, expected cost, and risks 5. Compute the expected value of information 6. Seek additional info where valuable (creates posterior distributions) Should we seek additional info about shortlisted candidates?
  • 25. Application to an example from ICSE’13 A mobile system for coordinating emergency rescue teams •  Design space: 10 design decisions; around 7,000 candidate architectures •  Objectives: Cost, Response Time, Reliability, Battery Life, ... •  Models given by design team: Utility score defined as weighted sum of objectives satisfaction •  Lessons Learnt –  Measuring risks leads to a different shortlist –  Need to reason about model uncertainty in addition to parameter uncertainty –  Decision models must be falsifiable 25 (Esfahani, Malek, & Razavi)
  • 27. Research Roadmap 27 Scientific Approach to Software Decisions Parameter uncertainty Model uncertainty: quantifying “good enough” Incremental value delivery Showing applicability Showing cost-effectiveness Overcoming cultural barriers ??? Incremental evidence-based model tuning
  • 28. Please, help us! 28 We need more research on Software Decision Analysis ‒  Our ‘moda’ R package is available to facilitate uptake ‒  Related work: CBAM @ ICSE’01, ICSE’03; GuideArch @ ICSE’13; Fenton et al @ ICSE’04 We need industry partners willing to try scientific approach to decision making –  portfolio decisions –  release planning –  architecture decisions –  risk-based testing –  process decisions
  • 29. A Call to Action Who do you want to inform critical IT decisions? 29 Uncertainty will be at the heart of many important decisions for the 21st Century The Surfers The ScientistsThe Pseudo-Scientists