Preface |
|
xvii | |
Acknowledgments |
|
xxi | |
Author |
|
xxiii | |
Part I: Introduction |
|
|
Chapter 1 Stable Analysis Patterns Overview |
|
|
5 | (24) |
|
|
5 | (1) |
|
|
6 | (1) |
|
1.3 Challenges That Analysis Patterns Face |
|
|
6 | (2) |
|
1.4 Stable Analysis Patterns |
|
|
8 | (1) |
|
1.5 Development of Stable Analysis Patterns |
|
|
9 | (5) |
|
1.6 Example of Stable Analysis Patterns |
|
|
14 | (4) |
|
1.6.1 The Negotiation Analysis Pattern |
|
|
14 | (1) |
|
1.6.2 The Trust Analysis Pattern |
|
|
14 | (4) |
|
|
18 | (1) |
|
1.8 Open and Research Issues |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (8) |
|
|
28 | (1) |
|
Chapter 2 Applying Analysis Patterns through Analogy: Problems and Solutions |
|
|
29 | (8) |
|
|
29 | (1) |
|
2.2 Analysis Patterns as Templates |
|
|
30 | (1) |
|
2.3 Problems with Using Analysis Patterns through Analogy |
|
|
31 | (1) |
|
2.4 Stable Analysis Patterns |
|
|
32 | (1) |
|
|
32 | (1) |
|
2.4.2 Stable Analysis Pattern Example |
|
|
33 | (1) |
|
2.5 Applying Stable Analysis Patterns |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
Chapter 3 A Pattern Language for Building Stable Analysis Patterns |
|
|
37 | (26) |
|
|
37 | (1) |
|
3.2 Pattern Language Overview |
|
|
38 | (1) |
|
3.3 Building Stable Analysis Pattern Language Description |
|
|
39 | (21) |
|
3.3.1 Pattern 1.1: Efficient Usable Analysis Models |
|
|
39 | (3) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (2) |
|
3.3.2 Pattern 1.2: Stability Model |
|
|
42 | (3) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (3) |
|
3.3.3 Pattern 2.3: Identify the Problem |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
3.3.4 Pattern 2.4: Identify EBTs |
|
|
46 | (3) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
3.3.5 Pattern 2.5: Identify BOs |
|
|
49 | (3) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
3.3.6 Pattern 2.6: Proper Abstraction Level |
|
|
52 | (2) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
3.3.7 Pattern 3.7: Build Stable Analysis Patterns |
|
|
54 | (4) |
|
|
54 | (1) |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (2) |
|
3.3.8 Pattern 3.8: Use Stable Analysis Patterns |
|
|
58 | (7) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
3.5 Open and Research Issue |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
Chapter 4 Model-Based Software Reuse Using Stable Analysis Patterns |
|
|
63 | (12) |
|
|
63 | (1) |
|
4.2 Essential Properties of Analysis Patterns |
|
|
64 | (1) |
|
4.3 Classification of Analysis Pattern Methodologies |
|
|
65 | (1) |
|
4.4 Evaluation of Analysis Patterns Groups |
|
|
65 | (3) |
|
4.4.1 Group I: Direct Approach |
|
|
65 | (1) |
|
4.4.2 Group II: Analogy Approach |
|
|
66 | (1) |
|
4.4.3 Group III: Stability Approach |
|
|
67 | (1) |
|
4.5 Comparison of Analysis Patterns Groups |
|
|
68 | (1) |
|
|
68 | (2) |
|
4.7 Open and Research Issues |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (3) |
|
Chapter 5 Stable Patterns' Documentation: Templates, UML Forms, Rules, and Heuristics |
|
|
75 | (30) |
|
|
75 | (2) |
|
5.2 Patterns' Documentation Templates |
|
|
77 | (15) |
|
5.2.1 Current Stable Models' Templates and Their Problems |
|
|
77 | (1) |
|
5.2.2 Full Stable Patterns' Template Description with Rules and Heuristics |
|
|
78 | (28) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
5.2.2.5 Challenges and Constraints |
|
|
80 | (1) |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
84 | (1) |
|
5.2.2.9 Applicability with Illustrated Examples |
|
|
84 | (1) |
|
5.2.2.10 Related Patterns and Measurability |
|
|
84 | (2) |
|
5.2.2.11 Modeling Issues, Criteria, and Constraints |
|
|
86 | (1) |
|
5.2.2.12 Design and Implementation Issues |
|
|
86 | (1) |
|
|
86 | (1) |
|
5.2.2.14 Formalization using Z++, Object Z, or Object- Constraints Language (OCL) (Optional) |
|
|
87 | (1) |
|
|
87 | (5) |
|
|
92 | (1) |
|
5.2.2.17 Tips and Heuristics |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (7) |
|
|
101 | (4) |
Part II: SAPs: Detailed Documentation Templates |
|
|
Chapter 6 Competition Stable Analysis Pattern |
|
|
105 | (24) |
|
|
105 | (1) |
|
6.2 Competition Analysis Pattern Document |
|
|
106 | (17) |
|
6.2.1 Pattern Name: Competition Stable Analysis Pattern |
|
|
106 | (23) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
6.2.1.4 Challenges and Constraints |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (9) |
|
6.2.1.8 Related Pattern and Measurability |
|
|
120 | (3) |
|
|
123 | (1) |
|
6.4 Open and Research Issues |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (2) |
|
Chapter 7 Corruption Stable Analysis Pattern |
|
|
129 | (16) |
|
|
129 | (1) |
|
7.2 Corruption Stable Analysis Pattern |
|
|
129 | (12) |
|
|
130 | (1) |
|
7.2.1.1 Executive Branch Political Corruption |
|
|
130 | (1) |
|
7.2.1.2 Public Corruption |
|
|
130 | (1) |
|
|
130 | (3) |
|
7.2.2.1 Functional Requirements |
|
|
131 | (1) |
|
7.2.2.2 Nonfunctional Requirements |
|
|
132 | (1) |
|
7.2.3 Challenges and Constraints |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
7.2.5 Applicability with Illustrated Examples |
|
|
133 | (4) |
|
|
137 | (4) |
|
|
141 | (1) |
|
|
141 | (1) |
|
7.4 Open and Research Issues |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (2) |
|
Chapter 8 Dignity Stable Analysis Pattern |
|
|
145 | (40) |
|
|
145 | (1) |
|
8.2 Pattern Documentation |
|
|
146 | (32) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (5) |
|
8.2.4 Challenges and Constraints |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (2) |
|
8.2.5.1 Class Diagram Description |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
8.2.7 Applicability with Illustrated Examples |
|
|
155 | (9) |
|
8.2.7.1 Application 1: Dignity at Work |
|
|
155 | (6) |
|
8.2.7.2 Application 2: Dignity of Human Rights |
|
|
161 | (3) |
|
8.2.8 Related Patterns and Measurability |
|
|
164 | (5) |
|
|
164 | (4) |
|
|
168 | (1) |
|
8.2.9 Modeling Issues, Criteria, and Constraints |
|
|
169 | (1) |
|
|
169 | (1) |
|
8.2.10 Modeling Heuristics |
|
|
170 | (1) |
|
8.2.10.1 General Enough to Be Reused in Different Application |
|
|
170 | (1) |
|
8.2.11 Design and Implementation Issues |
|
|
170 | (3) |
|
8.2.11.1 Delegation versus Inheritance |
|
|
170 | (2) |
|
|
172 | (1) |
|
8.2.12 Formalization Using OCL, Z++, Object Z, and/or EBNF |
|
|
173 | (2) |
|
|
175 | (2) |
|
|
175 | (2) |
|
8.2.13.2 Business Integration |
|
|
177 | (1) |
|
8.2.13.3 Business Enduring Themes |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (2) |
|
|
181 | (2) |
|
|
183 | (1) |
|
|
184 | (1) |
|
Chapter 9 Trust Stable Analysis Pattern |
|
|
185 | (20) |
|
|
185 | (1) |
|
9.2 Trust Analysis Pattern Document |
|
|
186 | (11) |
|
9.2.1 Pattern Name: Trust Stable Analysis Pattern |
|
|
186 | (11) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
9.2.1.4 Challenges and Constraints |
|
|
189 | (1) |
|
|
189 | (3) |
|
|
192 | (1) |
|
9.2.1.7 Applicability with Illustrated Examples |
|
|
192 | (5) |
|
|
197 | (2) |
|
|
197 | (2) |
|
|
199 | (1) |
|
9.5 Open and Research Issues |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (2) |
|
Chapter 10 Accessibility Stable Analysis Pattern |
|
|
205 | (30) |
|
|
205 | (1) |
|
10.2 The Accessibility Analysis Pattern |
|
|
206 | (21) |
|
10.2.1 Pattern Name: Accessibility Stable Analysis Pattern |
|
|
206 | (30) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (2) |
|
10.2.1.4 Challenges and Constraints |
|
|
209 | (1) |
|
10.2.1.5 Pattern Structure and Participants |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
213 | (7) |
|
10.2.1.8 Related Patterns and Measurability |
|
|
220 | (2) |
|
10.2.1.9 Modeling Issues, Criteria, and Constraints |
|
|
222 | (2) |
|
10.2.1.10 Design and Implementation Issues |
|
|
224 | (1) |
|
|
224 | (1) |
|
10.2.1.12 Business Issues |
|
|
224 | (2) |
|
|
226 | (1) |
|
10.2.1.14 Tips and Heuristics |
|
|
227 | (1) |
|
|
227 | (1) |
|
10.4 Open and Research Issues |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (5) |
Part III: SAPs: Mid-Size Documentation Templates |
|
|
Chapter 11 Reputation Stable Analysis Patterns |
|
|
235 | (10) |
|
|
235 | (1) |
|
11.2 Reputation Analysis Pattern Document |
|
|
236 | (7) |
|
11.2.1 Pattern Name: Reputation Stable Analysis Pattern |
|
|
236 | (9) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
11.2.1.4 Applicability with Illustrated Example |
|
|
238 | (5) |
|
|
243 | (1) |
|
11.4 Open and Research Issues |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
Chapter 12 Temptation Stable Analysis Pattern |
|
|
245 | (16) |
|
|
245 | (1) |
|
12.2 Reputation Analysis Pattern Document |
|
|
245 | (10) |
|
12.2.1 Pattern Name: Temptation Stable Analysis Pattern |
|
|
245 | (17) |
|
|
245 | (1) |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
248 | (3) |
|
12.2.1.6 Applicability with Illustrated Example |
|
|
251 | (4) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (4) |
Part IV: SAPs: Short Documentation Templates and Future Work and Conclusions |
|
|
Chapter 13 Analysis Stable Analysis Pattern |
|
|
261 | (8) |
|
|
261 | (1) |
|
13.2 Pattern Name: Analysis Stable Analysis Pattern |
|
|
262 | (2) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
13.2.3.1 Functional Requirements |
|
|
263 | (1) |
|
13.2.3.2 Nonfunctional Requirements |
|
|
264 | (1) |
|
|
264 | (5) |
|
13.2.4.1 Class Diagram Description |
|
|
264 | (1) |
|
|
264 | (1) |
|
13.4 Open and Research Issues |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (2) |
|
Chapter 14 Deployment Stable Analysis Pattern |
|
|
269 | (8) |
|
|
269 | (1) |
|
14.2 Pattern Name: Deployment Stable Analysis Pattern |
|
|
269 | (3) |
|
|
270 | (1) |
|
14.2.1.1 Scenario 1: Deployment of Military Personnel |
|
|
270 | (1) |
|
14.2.1.2 Scenario 2: Resource Deployment |
|
|
270 | (1) |
|
14.2.1.3 Scenario 3: Deployment of Parachute |
|
|
270 | (1) |
|
|
270 | (1) |
|
14.2.2.1 Functional Requirements |
|
|
270 | (1) |
|
14.2.2.2 Nonfunctional Requirements |
|
|
271 | (1) |
|
|
271 | (1) |
|
14.2.3.1 Class Diagram Description |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
14.4 Open and Research Issues |
|
|
272 | (2) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (2) |
|
Chapter 15 Change Stable Analysis Pattern |
|
|
277 | (8) |
|
|
277 | (1) |
|
15.2 Name: Change Stable Analysis Pattern |
|
|
278 | (4) |
|
|
278 | (1) |
|
15.2.1.1 Change of Workplace Location |
|
|
278 | (1) |
|
15.2.1.2 Change of Password |
|
|
278 | (1) |
|
15.2.1.3 Change Review Meeting |
|
|
278 | (1) |
|
|
279 | (2) |
|
15.2.2.1 Functional Requirement |
|
|
279 | (1) |
|
15.2.2.2 Nonfunctional Requirement |
|
|
280 | (1) |
|
|
281 | (5) |
|
|
281 | (1) |
|
15.2.3.2 Class Diagram Description |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
15.4 Open Research Issues |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
Chapter 16 Propaganda Stable Analysis Pattern |
|
|
285 | (8) |
|
|
285 | (1) |
|
16.2 Pattern Name: Propaganda Stable Analysis Pattern |
|
|
286 | (3) |
|
|
286 | (1) |
|
16.2.1.1 Political Propaganda |
|
|
286 | (1) |
|
16.2.1.2 Business Manipulation |
|
|
286 | (1) |
|
|
287 | (2) |
|
16.2.2.1 Functional Requirements |
|
|
287 | (1) |
|
16.2.2.2 Nonfunctional Requirements |
|
|
288 | (1) |
|
|
289 | (4) |
|
16.2.3.1 Class Diagram Description |
|
|
289 | (1) |
|
|
289 | (1) |
|
16.4 Open Research Issues |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (2) |
|
Chapter 17 Fairness Stable Analysis Pattern |
|
|
293 | (6) |
|
|
293 | (1) |
|
17.2 Pattern Name: Fairness Stable Analysis Pattern |
|
|
293 | (3) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (2) |
|
17.2.2.1 Functional Requirements |
|
|
295 | (1) |
|
17.2.2.2 Nonfunctional Requirements |
|
|
295 | (1) |
|
|
296 | (4) |
|
|
296 | (1) |
|
17.2.3.2 Class Diagram Description |
|
|
296 | (1) |
|
|
296 | (1) |
|
17.4 Open Research Issues |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
Chapter 18 Anxiety Stable Analysis Pattern |
|
|
299 | (6) |
|
|
299 | (1) |
|
18.2 Name: Anxiety Stable Analysis Pattern |
|
|
300 | (2) |
|
|
300 | (1) |
|
18.2.1.1 Scenario 1: Work Place Anxiety |
|
|
300 | (1) |
|
18.2.1.2 Scenario 2: Anxious Wait for Test Results |
|
|
300 | (1) |
|
|
300 | (2) |
|
18.2.2.1 Functional Requirements |
|
|
300 | (1) |
|
18.2.2.2 Nonfunctional Requirements |
|
|
301 | (1) |
|
|
302 | (1) |
|
18.2.3.1 Class Diagram Description |
|
|
302 | (1) |
|
|
302 | (1) |
|
18.4 Open Research Issues |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Chapter 19 Future Work and Conclusions |
|
|
305 | (4) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
307 | (2) |
Index |
|
309 | |