Software Defect And Operational Profile Modeling

Author: Kai-Yuan Cai
Publisher: Springer Science & Business Media
ISBN: 1461555930
Size: 67.81 MB
Format: PDF, ePub
View: 805

Domain Modeling Based Software Engineering

Author: Ruqian Lu
Publisher: Springer Science & Business Media
ISBN: 1461544874
Size: 49.30 MB
Format: PDF, ePub, Mobi
View: 2679
Many approaches have been proposed to enhance software productivity and reliability. These approaches typically fall into three categories: the engineering approach, the formal approach, and the knowledge-based approach. The optimal gain in software productivity cannot be obtained if one relies on only one of these approaches. Thus, the integration of different approaches has also become a major area of research. No approach can be said to be perfect if it fails to satisfy the following two criteria. Firstly, a good approach should support the full life cycle of software development. Secondly, a good approach should support the development of large-scale software for real use in many application domains. Such an approach can be referred to as a five-in-one approach. The authors of this book have, for the past eight years, conducted research in knowledge-based software engineering, of which the final goal is to develop a paradigm for software engineering which not only integrates the three approaches mentioned above, but also fulfils the two criteria on which the five-in-one approach is based. Domain Modeling- Based Software Engineering: A Formal Approach explores the results of this research. Domain Modeling-Based Software Engineering: A Formal Approach will be useful to researchers of knowledge-based software engineering, students and instructors of computer science, and software engineers who are working on large-scale projects of software development and want to use knowledge-based development methods in their work.

Advances In Software Engineering

Author: Dominik Ślȩzak
Publisher: Springer
ISBN: 3642106196
Size: 54.12 MB
Format: PDF, Kindle
View: 2859
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio- Technology (BSBT), Control and Automation (CA), Database Theory and Appli- tion (DTA), Disaster Recovery and Business Continuity (DRBC; published indepe- ently), Future Generation Communication and Networking (FGCN) that was c- bined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), Multimedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and u- and e-Service, Science and Technology (UNESST).

Quality Of Protection

Author: Dieter Gollmann
Publisher: Springer Science & Business Media
ISBN: 9780387365848
Size: 61.90 MB
Format: PDF, Mobi
View: 5708
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective. Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.

Making Globally Distributed Software Development A Success Story

Author: Qing Wang
Publisher: Springer Science & Business Media
ISBN: 3540795871
Size: 25.43 MB
Format: PDF, ePub, Mobi
View: 4432
This book constitutes the refereed proceedings of the Second International Conference on Software Process, held in Leipzig, Germany, in May 2008 - colocated with ICSE 2008, the 30th International Conference on Software Engineering. The 33 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on process content, process tools and metrics, process management, process representation, analysis and modeling, experience report, and simulation modeling.

Early Software Reliability Prediction

Author: Ajeet Kumar Pandey
Publisher: Springer
ISBN: 8132211766
Size: 76.42 MB
Format: PDF, Docs
View: 6946
The development of software system with acceptable level of reliability and quality within available time frame and budget becomes a challenging objective. This objective could be achieved to some extent through early prediction of number of faults present in the software, which reduces the cost of development as it provides an opportunity to make early corrections during development process. The book presents an early software reliability prediction model that will help to grow the reliability of the software systems by monitoring it in each development phase, i.e. from requirement phase to testing phase. Different approaches are discussed in this book to tackle this challenging issue. An important approach presented in this book is a model to classify the modules into two categories (a) fault-prone and (b) not fault-prone. The methods presented in this book for assessing expected number of faults present in the software, assessing expected number of faults present at the end of each phase and classification of software modules in fault-prone or no fault-prone category are easy to understand, develop and use for any practitioner. The practitioners are expected to gain more information about their development process and product reliability, which can help to optimize the resources used.

Data Management And Internet Computing For Image Pattern Analysis

Author: David D. Zhang
Publisher: Springer
Size: 48.74 MB
Format: PDF, Docs
View: 4588
Data Management and Internet Computing for Image/Pattern Analysis focuses on the data management issues and Internet computing aspect of image processing and pattern recognition research. The book presents a comprehensive overview of the state of the art, providing detailed case studies that emphasize how image and pattern (IAP) data are distributed and exchanged on sequential and parallel machines, and how the data communication patterns in low- and higher-level IAP computing differ from general numerical computation, what problems they cause and what opportunities they provide. The studies also describe how the images and matrices should be stored, accessed and distributed on different types of machines connected to the Internet, and how Internet resource sharing and data transmission change traditional IAP computing. Data Management and Internet Computing for Image/Pattern Analysis is divided into three parts: the first part describes several software approaches to IAP computing, citing several representative data communication patterns and related algorithms; the second part introduces hardware and Internet resource sharing in which a wide range of computer architectures are described and memory management issues are discussed; and the third part presents applications ranging from image coding, restoration and progressive transmission. Data Management and Internet Computing for Image/Pattern Analysis is an excellent reference for researchers and may be used as a text for advanced courses in image processing and pattern recognition.

Software Reliability Engineering

Author: John D. Musa
Publisher: McGraw-Hill/Osborne Media
ISBN: 9780079132710
Size: 44.73 MB
Format: PDF, Docs
View: 3694
This hands-on tutorial shows how to develop tests that ensure the reliability of software systems. Software developers learn how to establish reliable objectives, develop operational profiles, and prepare and execute test cases, as well as about useful formulae and recommended software tools.