software architecture is receiving increasingly attention as a critical design level for softwaresystems. As software architecture design resources (in the form of architectural specifications) are going to be accumu...
详细信息
ISBN:
(纸本)0818685972
software architecture is receiving increasingly attention as a critical design level for softwaresystems. As software architecture design resources (in the form of architectural specifications) are going to be accumulated, the development of techniques and tools to support architectural understanding, testing, reengineering, maintenance, and reuse will become an important issue. This paper introduces a new form of slicing, named architectural slicing, to aid architectural understanding and reuse. In contrast to traditional slicing, architectural slicing is designed to operate on the architectural specification of a software system, rather than the source code of a program. Architectural slicing provides knowledge about the high-level structure of a software system, rather than the low-level implementation details of a program. In order to compute an architectural slice, we present the architecture information flow graph which can be used to represent information flows in a software architecture. Based on the graph, we give a two-phase algorithm to compute an architectural slice.
A literate programming paradigm that provides an environment suitable for documenting and organizing the low-level design of a system is presented. It is shown that a literate program design language (PDL) strengthens...
详细信息
ISBN:
(纸本)0818620412
A literate programming paradigm that provides an environment suitable for documenting and organizing the low-level design of a system is presented. It is shown that a literate program design language (PDL) strengthens the bridge between design and implementation activities since the documentation generated during the design phase can be used directly as a shell for program construction. In this type of language, module names and program constructs appear as labeled modules which can be directly expanded into their equivalent code.
A methodology for library design is outlined and it is implemented for the domain of discrete event simulations. The top-down approach consists of five stages: (1) state the users' needs, (2) state the general goa...
详细信息
ISBN:
(纸本)081862065X
A methodology for library design is outlined and it is implemented for the domain of discrete event simulations. The top-down approach consists of five stages: (1) state the users' needs, (2) state the general goals for the library, (3) derive the requirements of goals, (4) list opposing requirements, and (5) resolve contradictions by analyzing requirements in view of users' needs and the domain, or by conducting field studies with prospective users.
A structured method is presented for object-oriented system design, with special emphasis on discovering objects within the system and creating an object-oriented model of the system. First, a technique is introduced ...
详细信息
ISBN:
(纸本)0818620412
A structured method is presented for object-oriented system design, with special emphasis on discovering objects within the system and creating an object-oriented model of the system. First, a technique is introduced for decomposing an object into its components according to the actions required by the operations of that object. Next, system decomposition is presented as a coherent top-down process which progressively applies object decomposition principles through all the stages of system design.
A testability analysis tool is presented that uses a set of testability conditions which allow qualitative evaluation of the testability of a VLSI device from the earliest phases of the circuit's design. The tool ...
详细信息
ISBN:
(纸本)0818620412
A testability analysis tool is presented that uses a set of testability conditions which allow qualitative evaluation of the testability of a VLSI device from the earliest phases of the circuit's design. The tool is written in C and runs under MS-DOS and Unix. It has been used on a number of designs, giving good results that have been verified in practice.
Iterative control constructs in data flow programming languages have always been a challenging part of language design. We suggest a solution for iterative processing in data flow diagrams based on the notion of a con...
详细信息
ISBN:
(纸本)0818681365
Iterative control constructs in data flow programming languages have always been a challenging part of language design. We suggest a solution for iterative processing in data flow diagrams based on the notion of a conditional data flow switch, and a specialized iterative constructs based on pattern matching for vectors, matrices, and multisets. All of these constructs can be seamlessly incorporated into a data flow visual programming language. We demonstrate how these constructs may be used to reveal the spatial/temporal dualism of data streams.
An approach to the tested elements reduction problem, in which a set of reduction rules is developed to detect the dominated tested elements and remove them is proposed. The dominant elements are then manifested. Thes...
详细信息
ISBN:
(纸本)081862065X
An approach to the tested elements reduction problem, in which a set of reduction rules is developed to detect the dominated tested elements and remove them is proposed. The dominant elements are then manifested. These reduction rules are formally proved mathematically. The physical meaning of each rule is described in detail. Their effectiveness is illustrated by examples. The proposed table-reduction approach is a generalized method for all kinds of coverage criteria, including individual, local, and mixed coverage criteria.
The author examines risk management through use of analysis disciplines. A method for risk management is presented which consists of a three-dimensional classification schema. This classification method is based on ri...
详细信息
ISBN:
(纸本)081862065X
The author examines risk management through use of analysis disciplines. A method for risk management is presented which consists of a three-dimensional classification schema. This classification method is based on risk categories, risk danger levels, and the probabilities of the risk actually occuring. The method allows for the total management of the risk aspects of a project. The processes are for risk management in high-technology projects and high-technology environments. This article is based on the risk management procedure contained in the PATRIARCH manager's procedure manual.
A novel algorithm for parallel design verification is described. Its data model is that of the data flow computer and is based on the partitioning of the design verification cycle into independent tasks that can be ru...
详细信息
ISBN:
(纸本)081862065X
A novel algorithm for parallel design verification is described. Its data model is that of the data flow computer and is based on the partitioning of the design verification cycle into independent tasks that can be run concurrently. The significance of this methodology is that, unlike other concepts that cannot use the existing sequential code and can only run on an expensive special-purpose hardware, the proposed approach does not require any code development and can be accommodated by a standard UNIX distributed network or a multiprocessor. The author presents experimental results for performing 52 design rule checks on 1.3 million polygons (12 layers) on both a multiprocessor configuration and a distributed network.
A specification presentation tool which is founded on the specification execution approach is described. The purpose of the presentation tool is to give automated assistance to the system analyst in the presentation o...
详细信息
ISBN:
(纸本)0818620412
A specification presentation tool which is founded on the specification execution approach is described. The purpose of the presentation tool is to give automated assistance to the system analyst in the presentation of specifications to the user for validation. Specifically, the software allows the user to check that the specification meets the requirements by interacting with an actual system. The software can present specifications developed by the JSD (Jackson system development) method. The approach taken was to derive executable Lisp code and default screens from ART representations of JSD specifications.
暂无评论