Difference between revisions of "Application UseCase Template"
Line 1: | Line 1: | ||
− | =Use Case <Cluster>.<SubArea>.<number>.<letter>: <Short Name>= | + | =0.Use Case <Cluster>.<SubArea>.<number>.<letter>: <Short Name>= |
E.g. | E.g. | ||
Line 7: | Line 7: | ||
<letter>={a, b, c, ...} | <letter>={a, b, c, ...} | ||
− | ==Purpose== | + | ==0.1.Purpose== |
Earth Information Exchange | Earth Information Exchange | ||
− | ==Revision Information== | + | ==0.2.Revision Information== |
Version X.N.a (can be labeled draft if X=0) | Version X.N.a (can be labeled draft if X=0) | ||
Revision as of 15:36, January 9, 2007
0.Use Case <Cluster>.<SubArea>.<number>.<letter>: <Short Name>
E.g. Use Case AQ.Smoke.1.a: Smoke plume event detection and related dataset discovery <Cluster>={AQ, DM, EC, EF, PH, WM} <number>={1, 2, 3, ...} <letter>={a, b, c, ...}
0.1.Purpose
Earth Information Exchange
0.2.Revision Information
Version X.N.a (can be labeled draft if X=0)
Prepared by <Author(s) with responsibility>
<Affiliation>
<Date/Time created>
Revision History
Modified by <Modifier Name/Affil>, <Date/time>, <Brief Description>
1.Use Case Identification
1.1.Use Case Designation
<Cluster>.<SubArea>.<number>.<letter>
1.2.Use Case Name
<Insert short name and long name>
2.Use Case Definition
First paragraph is short description, second paragraph, etc. may contain further details.
Through this use case, the system User locates and identifies datasets (collections of related grandules) for use or processing. This process results in the User having access to a subset of the datasets in the portal that meet the requirements of the User. Individual datasets, and their constituent granules, may then be identified for further action or processing (e.g. Visualization, analysis, download).
2.1.Actors
Always identify primary actors, may be more than one. Also identify other actor including any other systems or services which are important.
2.1.1.Primary Actors
The actor that initiates this use case is the portal User. Providers may also initiate this use case as a precursor to use case EIE05, Manage Collections/datasets.
2.1.2.Other Actors
2.2.Preconditions
- 1.Collection metadata have been entered into the system
- 2.Collection metadata have been validated
- 3.Collection metadata have been published
2.3.Postconditions
- 1.Datasets or granules have been identified within the system for further action
- 2.Appropriate action (i.e. Map, download, process) controls have been provided to the user to initiate that action.
- 3.Controls are provided to the user to refine the criteria used to 'discover' the dataset.
2.4.Normal Flow (Process Model)
- 1)The user selects the 'dataset discovery' tool collection from the user interface
- 2)The user performs a 'simple' search using a simple interface that searches commonly queries dataset attribute fields for matching text/terms.
- 3)The results of the search are presented to the user with appropriate action controls associated with the datasets.
- 4)The user selects one of the action controls to 'use' the identified dataset(s) in a specified action (i.e. Visualization, download, processing)
2.5.Alternative Flows
- 1)The user selects the 'dataset discovery' tool collection from the user interface
- 2)The user selects a control that provides access to an advanced search tool that supports spatial, temporal, and parametric search methods. Flow then extends to EIE11-EIE14.
2.6.Successful Outcomes
- 1.Operation succeeds and user obtains QQQ.
2.7.Failure Outcomes
- 1.Operation fails to return any XXX. Should instead YYYY.
- 2.Illegal input of AAA, Should instead ZZZZ
2.8.Special Functional Requirements
None
2.9.Extension Points
- <Cluster>.<SubArea>.<number>.<letter+1> something added or a variant.
E.g. AQ.Smoke.1.b something added or a variant
- <Cluster>.<SubArea>.<number>.<letter+2> something added or a variant
- <Cluster>.<SubArea>.<number>.<letter+3> something added or a variant
3.Diagrams
3.1.Use Case Diagram
3.2.State Diagram
3.3.Activity Diagram
3.4.Other Diagrams
4.Non-Functional Requirements
4.1.Performance
4.2.Reliability
4.3.Scalability
4.4.Usability
4.5.Security
4.6.Other Non-functional Requirements
5.Selected Technology
5.1.Overall Technical Approach
5.2.Architecture
5.3.Technology A
5.3.1.Description
5.3.2.Benefits
5.3.3.Limitations
5.4.Technology B
5.4.1.Description
5.4.2.Benefits
5.4.3.Limitations
6.References
None