skip to main content
10.1145/800178.810134acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-national-conferenceConference Proceedingsconference-collections
Article
Free access

Validation and verification vs. The software life cycle(Position Statement)

Published: 01 January 1978 Publication History

Abstract

In attempting to forecast the future trends in software engineering, a very dynamic future appears to be in store. Validation and verification are rapidly becoming recognized as an integral part of the total software life cycle. Validation and verification are no longer being viewed as new names for testing. A modern view of validation and verification encompasses the set of tasks and functions needed for tracing requirements through the evolving stages of the system life cycle down to the final implemented code. At each stage of program development, verification of each successively developed representation back to the next higher level representation needs to be performed. Validation is a separate functional activity which also needs to be performed. The main difference between validation and verification is, instead of examining the mapping between representations, an attempt is made to ensure the system will correctly implement the users preceived requirements; the principle question being: Is the system usable?
Thus, validation and verification are not activities which occur merely at the end of the coding process. Validation and verification involve such issues as verifying the preliminary design document back against its requirements, verifying a detailed design document back against a preliminary design document, verifying the code back to the detailed design. Each of these verification exercises is an attempt to provide a trace between the evolving stages of the system. Validation of the developing design occurs in parallel with system evolution. The preliminary designs is validated by the user, the detailed design ramifications are also presented to the user for validation as is the actual operation of the code. This expanded view of validation and verification is not without its problems. Several examples will begiven.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM '78: Proceedings of the 1978 annual conference - Volume 2
January 1978
990 pages
ISBN:0897910001
DOI:10.1145/800178
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1978

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 740
    Total Downloads
  • Downloads (Last 12 months)47
  • Downloads (Last 6 weeks)6
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media