Atjaunināt sīkdatņu piekrišanu

E-grāmata: Stable Analysis Patterns for Systems

(San José State University, California)
  • Formāts: 340 pages
  • Izdošanas datums: 18-May-2017
  • Izdevniecība: Auerbach Publishers Inc.
  • Valoda: eng
  • ISBN-13: 9781351774000
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 55,10 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 340 pages
  • Izdošanas datums: 18-May-2017
  • Izdevniecība: Auerbach Publishers Inc.
  • Valoda: eng
  • ISBN-13: 9781351774000
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Software analysis patterns play an important role in reducing the overall cost and compressing the time of software project lifecycles. However, building reusable and stable software analysis patterns is still considered a major and delicate challenge. This book proposes a novel concept for building analysis patterns based on software stability and is a modern approach for building stable, highly reusable, and widely applicable analysis patterns. The book also aims to promote better understanding of problem spaces and discusses how to focus requirements analysis accurately. It demonstrates a new approach to discovering and creating stable analysis patterns (SAPs).

This book presents a pragmatic approach to understanding problem domains, utilizing SAPs for any field of knowledge, and modeling stable software systems, components, and frameworks. It helps readers attain the basic knowledge that is needed to analyze and extract analysis patterns from any domain of interest. Readers also learn to master methods to document patterns in an effective, easy, and comprehensible manner.

Bringing significant contributions to the field of computing, this book is a unique and comprehensive reference manual on SAPs. It provides insight on handling the understanding of problem spaces and supplies methods and processes to analyze user requirements accurately as well as ways to use SAPs in building myriad cost-effective and highly maintainable systems. The book also shows how to link SAPs to the design phase thereby ensuring a smooth transition between analysis and design.
Preface xvii
Acknowledgments xxi
Author xxiii
Part I: Introduction
Chapter 1 Stable Analysis Patterns Overview
5(24)
1.1 Introduction
5(1)
1.2 Related Work
6(1)
1.3 Challenges That Analysis Patterns Face
6(2)
1.4 Stable Analysis Patterns
8(1)
1.5 Development of Stable Analysis Patterns
9(5)
1.6 Example of Stable Analysis Patterns
14(4)
1.6.1 The Negotiation Analysis Pattern
14(1)
1.6.2 The Trust Analysis Pattern
14(4)
1.7 Summary
18(1)
1.8 Open and Research Issues
18(1)
Overview Questions
18(1)
Exercises
19(1)
Projects
19(1)
Sidebars
20(8)
References
28(1)
Chapter 2 Applying Analysis Patterns through Analogy: Problems and Solutions
29(8)
2.1 Introduction
29(1)
2.2 Analysis Patterns as Templates
30(1)
2.3 Problems with Using Analysis Patterns through Analogy
31(1)
2.4 Stable Analysis Patterns
32(1)
2.4.1 Stability Model
32(1)
2.4.2 Stable Analysis Pattern Example
33(1)
2.5 Applying Stable Analysis Patterns
33(1)
2.6 Summary
34(1)
Review Questions
35(1)
Exercises
35(1)
Projects
35(1)
References
36(1)
Chapter 3 A Pattern Language for Building Stable Analysis Patterns
37(26)
3.1 Introduction
37(1)
3.2 Pattern Language Overview
38(1)
3.3 Building Stable Analysis Pattern Language Description
39(21)
3.3.1 Pattern 1.1: Efficient Usable Analysis Models
39(3)
3.3.1.1 Intent
39(1)
3.3.1.2 Context
39(1)
3.3.1.3 Problem
39(1)
3.3.1.4 Forces
39(1)
3.3.1.5 Solution
40(2)
3.3.2 Pattern 1.2: Stability Model
42(3)
3.3.2.1 Intent
42(1)
3.3.2.2 Context
42(1)
3.3.2.3 Problem
42(1)
3.3.2.4 Forces
42(1)
3.3.2.5 Solution
42(3)
3.3.3 Pattern 2.3: Identify the Problem
45(1)
3.3.3.1 Intent
45(1)
3.3.3.2 Context
45(1)
3.3.3.3 Problem
45(1)
3.3.3.4 Forces
45(1)
3.3.3.5 Solution
45(1)
3.3.4 Pattern 2.4: Identify EBTs
46(3)
3.3.4.1 Intent
46(1)
3.3.4.2 Context
46(1)
3.3.4.3 Problem
46(1)
3.3.4.4 Forces
47(1)
3.3.4.5 Solution
47(1)
3.3.4.6 Discussion
48(1)
3.3.5 Pattern 2.5: Identify BOs
49(3)
3.3.5.1 Intent
49(1)
3.3.5.2 Context
49(1)
3.3.5.3 Problem
49(1)
3.3.5.4 Forces
49(1)
3.3.5.5 Solution
49(2)
3.3.5.6 Discussion
51(1)
3.3.6 Pattern 2.6: Proper Abstraction Level
52(2)
3.3.6.1 Intent
52(1)
3.3.6.2 Context
52(1)
3.3.6.3 Problem
52(1)
3.3.6.4 Forces
52(1)
3.3.6.5 Solution
52(1)
3.3.6.6 Discussion
53(1)
3.3.7 Pattern 3.7: Build Stable Analysis Patterns
54(4)
3.3.7.1 Intent
54(1)
3.3.7.2 Context
54(2)
3.3.7.3 Problem
56(1)
3.3.7.4 Forces
56(1)
3.3.7.5 Solution
56(1)
3.3.7.6 Examples
56(2)
3.3.8 Pattern 3.8: Use Stable Analysis Patterns
58(7)
3.3.8.1 Intent
58(1)
3.3.8.2 Context
58(1)
3.3.8.3 Problem
58(1)
3.3.8.4 Forces
58(1)
3.3.8.5 Solution
58(1)
3.3.8.6 Comment
59(1)
3.3.8.7 Example
59(1)
3.4 Summary
60(1)
3.5 Open and Research Issue
61(1)
Review Questions
61(1)
Exercises
62(1)
Projects
62(1)
References
62(1)
Chapter 4 Model-Based Software Reuse Using Stable Analysis Patterns
63(12)
4.1 Introduction
63(1)
4.2 Essential Properties of Analysis Patterns
64(1)
4.3 Classification of Analysis Pattern Methodologies
65(1)
4.4 Evaluation of Analysis Patterns Groups
65(3)
4.4.1 Group I: Direct Approach
65(1)
4.4.2 Group II: Analogy Approach
66(1)
4.4.3 Group III: Stability Approach
67(1)
4.5 Comparison of Analysis Patterns Groups
68(1)
4.6 Summary
68(2)
4.7 Open and Research Issues
70(1)
Review Questions
70(1)
Exercises
71(1)
Projects
72(1)
References
72(3)
Chapter 5 Stable Patterns' Documentation: Templates, UML Forms, Rules, and Heuristics
75(30)
5.1 Introduction
75(2)
5.2 Patterns' Documentation Templates
77(15)
5.2.1 Current Stable Models' Templates and Their Problems
77(1)
5.2.2 Full Stable Patterns' Template Description with Rules and Heuristics
78(28)
5.2.2.1 Pattern Name
78(1)
5.2.2.2 Known As
78(1)
5.2.2.3 Context
79(1)
5.2.2.4 Problem
80(1)
5.2.2.5 Challenges and Constraints
80(1)
5.2.2.6 Solution
81(2)
5.2.2.7 Consequences
83(1)
5.2.2.8 Applicability
84(1)
5.2.2.9 Applicability with Illustrated Examples
84(1)
5.2.2.10 Related Patterns and Measurability
84(2)
5.2.2.11 Modeling Issues, Criteria, and Constraints
86(1)
5.2.2.12 Design and Implementation Issues
86(1)
5.2.2.13 Testability
86(1)
5.2.2.14 Formalization using Z++, Object Z, or Object- Constraints Language (OCL) (Optional)
87(1)
5.2.2.15 Business Issues
87(5)
5.2.2.16 Known Usage
92(1)
5.2.2.17 Tips and Heuristics
92(1)
5.3 Summary
92(1)
Review Questions
93(1)
Exercises
93(1)
Project
93(1)
Sidebars
94(7)
References
101(4)
Part II: SAPs: Detailed Documentation Templates
Chapter 6 Competition Stable Analysis Pattern
105(24)
6.1 Introduction
105(1)
6.2 Competition Analysis Pattern Document
106(17)
6.2.1 Pattern Name: Competition Stable Analysis Pattern
106(23)
6.2.1.1 Known As
106(1)
6.2.1.2 Context
106(1)
6.2.1.3 Problem
107(2)
6.2.1.4 Challenges and Constraints
109(1)
6.2.1.5 Solution
110(1)
6.2.1.6 Consequences
111(1)
6.2.1.7 Applicability
111(9)
6.2.1.8 Related Pattern and Measurability
120(3)
6.3 Summary
123(1)
6.4 Open and Research Issues
123(1)
Review Questions
124(1)
Exercises
125(1)
Projects
126(1)
References
127(2)
Chapter 7 Corruption Stable Analysis Pattern
129(16)
7.1 Introduction
129(1)
7.2 Corruption Stable Analysis Pattern
129(12)
7.2.1 Context
130(1)
7.2.1.1 Executive Branch Political Corruption
130(1)
7.2.1.2 Public Corruption
130(1)
7.2.2 Problem
130(3)
7.2.2.1 Functional Requirements
131(1)
7.2.2.2 Nonfunctional Requirements
132(1)
7.2.3 Challenges and Constraints
133(1)
7.2.3.1 Constraints
133(1)
7.2.4 Solution
133(1)
7.2.5 Applicability with Illustrated Examples
133(4)
7.2.6 Business Rules
137(4)
7.2.7 Known Usage
141(1)
7.3 Summary
141(1)
7.4 Open and Research Issues
141(1)
Review Questions
142(1)
Exercises
143(1)
Project
143(1)
References
143(1)
Bibliography
143(2)
Chapter 8 Dignity Stable Analysis Pattern
145(40)
8.1 Introduction
145(1)
8.2 Pattern Documentation
146(32)
8.2.1 Known As
146(1)
8.2.2 Context
146(1)
8.2.3 Problem
147(5)
8.2.4 Challenges and Constraints
152(1)
8.2.4.1 Challenges
152(1)
8.2.4.2 Constraints
152(1)
8.2.5 Solutions
153(2)
8.2.5.1 Class Diagram Description
154(1)
8.2.5.2 Participants
154(1)
8.2.6 Consequences
155(1)
8.2.7 Applicability with Illustrated Examples
155(9)
8.2.7.1 Application 1: Dignity at Work
155(6)
8.2.7.2 Application 2: Dignity of Human Rights
161(3)
8.2.8 Related Patterns and Measurability
164(5)
8.2.8.1 Related Pattern
164(4)
8.2.8.2 Measurability
168(1)
8.2.9 Modeling Issues, Criteria, and Constraints
169(1)
8.2.9.1 Abstraction
169(1)
8.2.10 Modeling Heuristics
170(1)
8.2.10.1 General Enough to Be Reused in Different Application
170(1)
8.2.11 Design and Implementation Issues
170(3)
8.2.11.1 Delegation versus Inheritance
170(2)
8.2.11.2 Testability
172(1)
8.2.12 Formalization Using OCL, Z++, Object Z, and/or EBNF
173(2)
8.2.13 Business Issues
175(2)
8.2.13.1 Business Rules
175(2)
8.2.13.2 Business Integration
177(1)
8.2.13.3 Business Enduring Themes
177(1)
8.2.14 Known Usage
177(1)
8.3 Tips and Heuristics
178(1)
8.4 Summary
178(1)
8.5 Open Research Issues
179(1)
Review Questions
179(2)
Exercises
181(2)
Projects
183(1)
References
184(1)
Chapter 9 Trust Stable Analysis Pattern
185(20)
9.1 Introduction
185(1)
9.2 Trust Analysis Pattern Document
186(11)
9.2.1 Pattern Name: Trust Stable Analysis Pattern
186(11)
9.2.1.1 Known As
186(1)
9.2.1.2 Context
187(1)
9.2.1.3 Problem
188(1)
9.2.1.4 Challenges and Constraints
189(1)
9.2.1.5 Solution
189(3)
9.2.1.6 CRC Cards
192(1)
9.2.1.7 Applicability with Illustrated Examples
192(5)
9.3 Tips and Heuristics
197(2)
9.3.1 Design Heuristics
197(2)
9.4 Summary
199(1)
9.5 Open and Research Issues
199(2)
Review Questions
201(1)
Exercises
202(1)
Projects
202(1)
References
203(2)
Chapter 10 Accessibility Stable Analysis Pattern
205(30)
10.1 Introduction
205(1)
10.2 The Accessibility Analysis Pattern
206(21)
10.2.1 Pattern Name: Accessibility Stable Analysis Pattern
206(30)
10.2.1.1 Known As
206(1)
10.2.1.2 Context
207(1)
10.2.1.3 Problem
207(2)
10.2.1.4 Challenges and Constraints
209(1)
10.2.1.5 Pattern Structure and Participants
210(2)
10.2.1.6 Consequences
212(1)
10.2.1.7 Applicability
213(7)
10.2.1.8 Related Patterns and Measurability
220(2)
10.2.1.9 Modeling Issues, Criteria, and Constraints
222(2)
10.2.1.10 Design and Implementation Issues
224(1)
10.2.1.11 Testability
224(1)
10.2.1.12 Business Issues
224(2)
10.2.1.13 Known Usage
226(1)
10.2.1.14 Tips and Heuristics
227(1)
10.3 Summary
227(1)
10.4 Open and Research Issues
227(1)
Review Questions
228(1)
Exercises
229(1)
Projects
230(1)
References
230(5)
Part III: SAPs: Mid-Size Documentation Templates
Chapter 11 Reputation Stable Analysis Patterns
235(10)
11.1 Introduction
235(1)
11.2 Reputation Analysis Pattern Document
236(7)
11.2.1 Pattern Name: Reputation Stable Analysis Pattern
236(9)
11.2.1.1 Context
236(1)
11.2.1.2 Problem
237(1)
11.2.1.3 Solution
237(1)
11.2.1.4 Applicability with Illustrated Example
238(5)
11.3 Summary
243(1)
11.4 Open and Research Issues
243(1)
Review Questions
243(1)
Exercises
244(1)
Projects
244(1)
References
244(1)
Chapter 12 Temptation Stable Analysis Pattern
245(16)
12.1 Introduction
245(1)
12.2 Reputation Analysis Pattern Document
245(10)
12.2.1 Pattern Name: Temptation Stable Analysis Pattern
245(17)
12.2.1.1 Context
245(1)
12.2.1.2 Problem
246(2)
12.2.1.3 Challenges
248(1)
12.2.1.4 Constraints
248(1)
12.2.1.5 Solution
248(3)
12.2.1.6 Applicability with Illustrated Example
251(4)
12.3 Summary
255(1)
Review Questions
255(1)
Exercises
256(1)
Projects
257(1)
References
257(4)
Part IV: SAPs: Short Documentation Templates and Future Work and Conclusions
Chapter 13 Analysis Stable Analysis Pattern
261(8)
13.1 Introduction
261(1)
13.2 Pattern Name: Analysis Stable Analysis Pattern
262(2)
13.2.1 Context
262(1)
13.2.2 Scenarios
262(1)
13.2.3 Problem
263(1)
13.2.3.1 Functional Requirements
263(1)
13.2.3.2 Nonfunctional Requirements
264(1)
13.2.4 Solution
264(5)
13.2.4.1 Class Diagram Description
264(1)
13.3 Summary
264(1)
13.4 Open and Research Issues
265(1)
Review Questions
266(1)
Exercises
266(1)
Projects
267(1)
References
267(2)
Chapter 14 Deployment Stable Analysis Pattern
269(8)
14.1 Introduction
269(1)
14.2 Pattern Name: Deployment Stable Analysis Pattern
269(3)
14.2.1 Context
270(1)
14.2.1.1 Scenario 1: Deployment of Military Personnel
270(1)
14.2.1.2 Scenario 2: Resource Deployment
270(1)
14.2.1.3 Scenario 3: Deployment of Parachute
270(1)
14.2.2 Problem
270(1)
14.2.2.1 Functional Requirements
270(1)
14.2.2.2 Nonfunctional Requirements
271(1)
14.2.3 Solution
271(1)
14.2.3.1 Class Diagram Description
271(1)
14.2.4 Five Scenarios
272(1)
14.3 Summary
272(1)
14.4 Open and Research Issues
272(2)
Review Questions
274(1)
Exercises
274(1)
Projects
275(1)
References
275(2)
Chapter 15 Change Stable Analysis Pattern
277(8)
15.1 Introduction
277(1)
15.2 Name: Change Stable Analysis Pattern
278(4)
15.2.1 Context
278(1)
15.2.1.1 Change of Workplace Location
278(1)
15.2.1.2 Change of Password
278(1)
15.2.1.3 Change Review Meeting
278(1)
15.2.2 Problem
279(2)
15.2.2.1 Functional Requirement
279(1)
15.2.2.2 Nonfunctional Requirement
280(1)
15.2.3 Solution
281(5)
15.2.3.1 Class Diagram
281(1)
15.2.3.2 Class Diagram Description
281(1)
15.2.3.3 Applicability
282(1)
15.3 Summary
282(1)
15.4 Open Research Issues
282(1)
Review Questions
282(1)
Exercises
283(1)
Projects
283(1)
References
284(1)
Chapter 16 Propaganda Stable Analysis Pattern
285(8)
16.1 Introduction
285(1)
16.2 Pattern Name: Propaganda Stable Analysis Pattern
286(3)
16.2.1 Context
286(1)
16.2.1.1 Political Propaganda
286(1)
16.2.1.2 Business Manipulation
286(1)
16.2.2 Problem
287(2)
16.2.2.1 Functional Requirements
287(1)
16.2.2.2 Nonfunctional Requirements
288(1)
16.2.3 Solution
289(4)
16.2.3.1 Class Diagram Description
289(1)
16.3 Summary
289(1)
16.4 Open Research Issues
289(1)
Review Questions
289(1)
Exercises
290(1)
Projects
290(1)
References
291(2)
Chapter 17 Fairness Stable Analysis Pattern
293(6)
17.1 Introduction
293(1)
17.2 Pattern Name: Fairness Stable Analysis Pattern
293(3)
17.2.1 Context
294(1)
17.2.1.1 Sportsmanship
294(1)
17.2.1.2 Legal Judgment
294(1)
17.2.2 Problem
294(2)
17.2.2.1 Functional Requirements
295(1)
17.2.2.2 Nonfunctional Requirements
295(1)
17.2.3 Solution
296(4)
17.2.3.1 Class Diagram
296(1)
17.2.3.2 Class Diagram Description
296(1)
17.3 Summary
296(1)
17.4 Open Research Issues
297(1)
Review Questions
297(1)
Exercise
297(1)
Projects
297(1)
References
298(1)
Chapter 18 Anxiety Stable Analysis Pattern
299(6)
18.1 Introduction
299(1)
18.2 Name: Anxiety Stable Analysis Pattern
300(2)
18.2.1 Context
300(1)
18.2.1.1 Scenario 1: Work Place Anxiety
300(1)
18.2.1.2 Scenario 2: Anxious Wait for Test Results
300(1)
18.2.2 Problem
300(2)
18.2.2.1 Functional Requirements
300(1)
18.2.2.2 Nonfunctional Requirements
301(1)
18.2.3 Solution
302(1)
18.2.3.1 Class Diagram Description
302(1)
18.3 Summary
302(1)
18.4 Open Research Issues
303(1)
Review Questions
303(1)
Exercises
303(1)
Projects
304(1)
References
304(1)
Chapter 19 Future Work and Conclusions
305(4)
19.1 Future Work
305(1)
19.2 Summary
306(1)
Review Questions
307(1)
Exercises
307(1)
References
307(2)
Index 309
Mohamed Fayad