![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming > Software engineering
Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation systems, and remote data acquisition and control to the present-day e-commerce and distance learning to tomorrow's patient medical records, remote surgery, intelligent transportation systems, and communications and control in deep space. To date, however, the design and development of NIT systems have been ad-hoc, and lacking a scientific theory. A new text presents a scientific theory of NIT systems and logically develops the fundamental principles to help synthesize control algorithms for these systems. The algorithms are referred to as asynchronous, distributed decision-making (ADDM) algorithms, and their characteristics include correct operation, robustness, reliability, scalability, stability, and performance. The book explains through several case studies and actual research the conception, development, experimental testing, validation, and rigorous performance analysis of practical ADDM algorithms for real-world systems from a number of diverse disciplines. It concludes by exploring the benefits and impact of ADDM algorithms in the future. Topics and features: *develops a logical yet practical approach to synthesizing ADDM algorithms for NIT systems *addresses design of NIT systems using a scientific manner *essential for NIT engineers who plan to design, build, deploy, maintain, and evolve NIT systems that span virtually every aspect of human behavior *includes actual case studies to help readers develop clarity and application of key principles
This book discusses smart, agile software development methods and their applications for enterprise crisis management, presenting a systematic approach that promotes agility and crisis management in software engineering. The key finding is that these crises are caused by both technology-based and human-related factors. Being mission-critical, human-related issues are often neglected. To manage the crises, the book suggests an efficient agile methodology including a set of models, methods, patterns, practices and tools. Together, these make a survival toolkit for large-scale software development in crises. Further, the book analyses lifecycles and methodologies focusing on their impact on the project timeline and budget, and incorporates a set of industry-based patterns, practices and case studies, combining academic concepts and practices of software engineering.
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:
Offering ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods, this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis, design, and testing phases of your software development lifecycle. Some Praise for the Book: This book pulls together the state of the art in thinking about
this important issue in a holistic way with several examples. It
takes you through the entire lifecycle from conception to
implementation ... . ...provides the reader with the tools necessary to jump-start
and mature security within the software development lifecycle
(SDLC).
Dispelling much of the folklore surrounding software maintenance, Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do their work and instructs on the methods required to achieve success. Donald J. Reifer an award winner for his contributions to the field of software engineering and whose experience includes managing the DoD Software Initiatives Office provides step-by-step guidance on how to structure the job to complete the work related to the task. Covering all phases of maintenance up to software retirement, he identifies the resources required to ready support system operation during transition and turnover, details best practices for establishing a maintenance infrastructure, and spells out a wealth of best practices aimed at maintaining and sustaining the product once it is deployed. This book tells you how to manage today 's ever-evolving maintenance environment so you can build the foundation for sound maintenance work. It explains how to create a robust management infrastructure, ensure proper resources are available, establish a user support structure, and conduct a meaningful measurement program. Filled with real-world examples and a detailed case study that is threaded across chapters, it provides you with the understanding and tools to plan for a major upgrade and determine the best time to retire your current software systems.
It is said that business re-engineering is part of our transition
to a post-industrial society. The purpose of this book is to
present an approach to how to reorganize businesses using the
discipline of software engineering as a guiding paradigm. The
author's thesis is that software engineering provides the necessary
analytical expertise for defining business processes and the tools
to transform process descriptions to support systems.
Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Software Engineering, Computer Engineering, and Systems Engineering and Sciences. Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes selected papers form the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2007) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2007).
Enterprise Information Systems Design, Implementation and Management: Organizational Applications investigates the creation and implementation of enterprise information systems. Covering a wide array of topics such as flow-shop scheduling, information systems outsourcing, ERP systems utilization, Dietz transaction methodology, and advanced planning systems, it is an essential reference source for researchers and professionals alike.
Software is difficult to develop, maintain, and reuse. Two factors that contribute to this difficulty are the lack of modular design and good program documentation. The first makes software changes more difficult to implement. The second makes programs more difficult to understand and to maintain. Formal Specification Techniques for Engineering Modular C Programs describes a novel approach to promoting program modularity. The book presents a formal specification language that promotes software modularity through the use of abstract data types, even though the underlying programming language may not have such support. This language is structured to allow useful information to be extracted from a specification, which is then used to perform consistency checks between the specification and its implementation. Formal Specification Techniques for Engineering Modular C Programs also describes a specification-driven, software re-engineering process model for improving existing programs. The aim of this process is to make existing programs easier to maintain and reuse while keeping their essential functionalities unchanged. Audience: Suitable as a secondary text for graduate level courses in software engineering, and as a reference for researchers and practitioners in industry.
Software product lines represent perhaps the most exciting paradigm shift in software development since the advent of high-level programming languages. Nowhere else in software engineering have we seen such breathtaking improvements in cost, quality, time to market, and developer productivity, often registering in the order-of-magnitude range. Here, the authors combine academic research results with real-world industrial experiences, thus presenting a broad view on product line engineering so that both managers and technical specialists will benefit from exposure to this work. They capture the wealth of knowledge that eight companies have gathered during the introduction of the software product line engineering approach in their daily practice.
This book takes a formal approach to teaching software engineering, using not only UML, but also Object Constraint Language (OCL) for specification and analysis of designed models. Employing technical details typically missing from existing textbooks on software engineering, the author shows how precise specifications lead to static verification of software systems. In addition, data management is given the attention that is required in order to produce a successful software project. Uses constraints in all phases of software development Follows recent developments in software technologies Technical coverage of data management issues and software verification Illustrated throughout to present analysis, specification, implementation and verification of multiple applications Includes end-of-chapter exercises and Instructor Presentation Slides
An increasing number of systems are exploiting mixed reality but to date there are no systematic methods, techniques or guidelines for the development of such systems. In bringing together contributions on a broad range of mixed reality development issues this book provides a sound theoretical foundation for a disciplined approach to mixed reality engineering. Divided into three parts: interaction design, software design and implementation, the first section covers generic and specific mixed reality design elements and provides an overview of the design method; Part 2 addresses technical solutions for interaction techniques, development tools and a global view of the mixed reality software development process. The final section contains detailed case studies to highlight the application of mixed reality in a variety of fields including aviation, architecture, emergency management, games, and healthcare.
provides systematic solutions from formal test theory to automated test description methods, automated simulation test environment construction verifies the effectiveness of the theories, technologies and methods
Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong University.
The general theme of this conference is notations, methods, and tool support for the calculation of programs from specifications. The purpose of this working conference is to present the results of ongoing research, descriptions of existing and proposed systems, and applications to the production of practical software.
In 2013, the International Conference on Advance Information Systems Engineering (CAiSE) turns 25. Initially launched in 1989, for all these years the conference has provided a broad forum for researchers working in the area of Information Systems Engineering. To reflect on the work done so far and to examine prospects for future work, the CAiSE Steering Committee decided to present a selection of seminal papers published for the conference during these years and to ask their authors, all prominent researchers in the field, to comment on their work and how it has developed over the years. The scope of the papers selected covers a broad range of topics related to modeling and designing information systems, collecting and managing requirements, and with special attention to how information systems are engineered towards their final development and deployment as software components.With this approach, the book provides not only a historical analysis on how information systems engineering evolved over the years, but also a fascinating social network analysis of the research community. Additionally, many inspiring ideas for future research and new perspectives in this area are sparked by the intriguing comments of the renowned authors.
This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primary target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts.
The advent of new architectures and computing platforms means that synchronization and concurrent computing are among the most important topics in computing science. Concurrent programs are made up of cooperating entities -- processors, processes, agents, peers, sensors -- and synchronization is the set of concepts, rules and mechanisms that allow them to coordinate their local computations in order to realize a common task. This book is devoted to the most difficult part of concurrent programming, namely synchronization concepts, techniques and principles when the cooperating entities are asynchronous, communicate through a shared memory, and may experience failures. Synchronization is no longer a set of tricks but, due to research results in recent decades, it relies today on sane scientific foundations as explained in this book. In this book the author explains synchronization and the implementation of concurrent objects, presenting in a uniform and comprehensive way the major theoretical and practical results of the past 30 years. Among the key features of the book are a new look at lock-based synchronization (mutual exclusion, semaphores, monitors, path expressions); an introduction to the atomicity consistency criterion and its properties and a specific chapter on transactional memory; an introduction to mutex-freedom and associated progress conditions such as obstruction-freedom and wait-freedom; a presentation of Lamport's hierarchy of safe, regular and atomic registers and associated wait-free constructions; a description of numerous wait-free constructions of concurrent objects (queues, stacks, weak counters, snapshot objects, renaming objects, etc.); a presentation of the computability power of concurrent objects including the notions of universal construction, consensus number and the associated Herlihy's hierarchy; and a survey of failure detector-based constructions of consensus objects. The book is suitable for advanced undergraduate students and graduate students in computer science or computer engineering, graduate students in mathematics interested in the foundations of process synchronization, and practitioners and engineers who need to produce correct concurrent software. The reader should have a basic knowledge of algorithms and operating systems.
Design thinking as a user-centric innovation method has become more and more widespread during the past years. An increasing number of people and institutions have experienced its innovative power. While at the same time the demand has grown for a deep, evidence-based understanding of the way design thinking functions. This challenge is addressed by the Design Thinking Research Program between Stanford University, Palo Alto, USA and Hasso Plattner Institute, Potsdam, Germany. Summarizing the outcomes of the 5th program year, this book imparts the scientific findings gained by the researchers through their investigations, experiments and studies. The method of design thinking works when applied with diligence and insight. With this book and the underlying research projects, we aim to understand the innovation process of design thinking and the people behind it. The contributions ultimately center on the issue of building innovators. The focus of the investigation is on what people are doing and thinking when engaged in creative design innovation and how their innovation work can be supported.Therefore, within three topic areas, various frameworks, methodologies, mind sets, systems and tools are explored and further developed. The book begins with an assessment of crucial factors for innovators such as empathy and creativity, the second part addresses the improvement of team collaboration and finally we turn to specific tools and approaches which ensure information transfer during the design process. All in all, the contributions shed light and show deeper insights how to support the work of design teams in order to systematically and successfully develop innovations and design progressive solutions for tomorrow.
Users increasingly demand more from their software than ever before more features, fewer errors, faster runtimes. To deliver the best quality products possible, software engineers are constantly in the process of employing novel tools in developing the latest software applications. Progressions and Innovations in Model-Driven Software Engineering investigates the most recent and relevant research on model-driven engineering. Within its pages, researchers and professionals in the field of software development, as well as academics and students of computer science, will find an up-to-date discussion of scientific literature on the topic, identifying opportunities and advantages, and complexities and challenges, inherent in the future of software engineering.
The idea for this workshop originated when I came across and read Martin Zelkowitz's book on Requirements for Software Engineering Environments (the proceedings of a small workshop held at the University of Maryland in 1986). Although stimulated by the book I was also disappointed in that it didn't adequately address two important questions - "Whose requirements are these?" and "Will the environment which meets all these requirements be usable by software engineers?." And thus was the decision made to organise this workshop which would explicitly address these two questions. As time went by setting things up, it became clear that our workshop would happen more than five years after the Maryland workshop and thus, at the same time as addressing the two questions above, this workshop would attempt to update the Zelkowitz approach. Hence the workshop acquired two halves, one dominated by discussion of what we already know about usability problems in software engineering and the other by discussion of existing solutions (technical and otherwise) to these problems. This scheme also provided a good format for bringing together those in the HeI community concerned with the human factors of software engineering and those building tools to solve acknowledged, but rarely understood problems.
"Iterating Infusion: Clearer Views of Objects, Classes, and Systems" is a one-of-a-kind book, not dependent on any single technology. Rather, it provides a way to integrate the most efficient techniques from a variety of programming methods, in a manner that makes designing and programming software look easy. "Iterating Infusion" presents comprehensive tools for you to best manage and work with object orientation. These include simplified fundamental concepts, popular language comparisons, advanced designing strategies, a broad usage progression, thorough design notations (interaction algebra), and data-oriented (fundamentally-OO) languages. The title, "Iterating Infusion," alludes to the fact that any system has multiple, coexisting functional levels and that new levelsboth lower and higherare continually added to the same functional area. The practical effect is to bring processes into more focus, always clarifying the vague. The extreme form of this is when separate but compatible technologies are brought together to create advancements; these can be baby-steps or great leaps, with varying amounts of effort. In more general terms, the same thing in a different context can take on much more power. And actually, this phenomenon is at the heart of object-oriented software. Readers have been confirming that, compared to books on just low-level details, "Iterating Infusion" presents cohesive insights that allow you to solve more problems with the same effort in more key places.
The Certified Function Point Specialist Examination Guide provides a complete and authoritative review of the rules and guidelines prescribed in the release of version 4.3 of the Function Point Counting Practices Manual (CPM). Providing a fundamental understanding of the IFPUG Functional Size Measurement method, this is the ideal study guide for the CFPS examination. The text:
Active members of the Counting Practices Committee and a past president of the IFPUG supply time-tested insight on how to use the CPM manual effectively and efficiently during the exam. The two sample exams and detailed examples throughout the text help to ensure readers develop the comprehension required to attain certification the first time around. Following certification, this book is a valuable reference for applying the IFPUG method for sizing proficient software design, development, and deployment. Praise for the book: While there are a number of solid books on counting function
points, this new book fills a gap in the function point literature
by providing useful information on the specifics of becoming a
certified function point counter. The authors are all qualified for
the work at hand, and indeed have contributed to the function point
counting methodology.
Welcome to the 5th International Conference on Open Source Systems! It is quite an achievement to reach the five-year mark - that's the sign of a successful enterprise. This annual conference is now being recognized as the primary event for the open source research community, attracting not only high-quality papers, but also building a community around a technical program, a collection of workshops, and (starting this year) a Doctoral Consortium. Reaching this milestone reflects the efforts of many people, including the conference founders, as well as the organizers and participants in the previous conferences. My task has been easy, and has been greatly aided by the hard work of Kevin Crowston and Cornelia Boldyreff, the Program Committee, as well as the Organizing Team led by Bjoern Lundell. All of us are also grateful to our attendees, especially in the difficult economic climate of 2009. We hope the participants found the conference valuable both for its technical content and for its personal networking opportunities. To me, it is interesting to look back over the past five years, not just at this conference, but at the development and acceptance of open source software. Since 2004, the business and commercial side of open source has grown enormously. At that time, there were only a handful of open source businesses, led by RedHat and its Linux distribution. Companies such as MySQL and JBoss were still quite small.
Explores the history of telepresence from the 1948 developments of master-slave manipulation, through to current telepresence technology used in space, undersea, surgery and telemedicine, operations in nuclear and other hazardous environments, policing and surveillance, agriculture, construction, mining, warehousing, education, amusement, social media and other contexts Reviews the differing technologies for visual, haptic, tactile remote sensing at the remote site, and the corresponding means of the display to the human operator Reviews the sensing and control technology, its history, and likely future, and discusses the many research and policy issues Reviews psychological experiments in telepresence with relation to virtual and augmented reality Examines social and ethical concerns: ease of spying, mischief, and crime via remote control of an avatar
Take the pain out of managing serverless applications. Knative, a collection of Kubernetes extensions curated by Google, simplifies building and running serverless systems. Knative in Action guides you through the Knative toolkit, showing you how to launch, modify, and monitor event-based apps built using cloud-hosted functions like AWS Lambda. You'll learn how to use Knative Serving to develop software that is easily deployed and autoscaled, how to use Knative Eventing to wire together disparate systems into a consistent whole, and how to integrate Knative into your shipping pipeline. about the technologyWith Knative, managing a serverless application's full lifecycle is a snap. Knative builds on Kubernetes orchestration features, making it easy to deploy and run serverless apps. It handles low-level chores-such as starting and stopping instances-so you can concentrate on features and behavior. about the book Knative in Action teaches you to build complex and efficient serverless applications. You'll dive into Knative's unique design principles and grasp cloud native concepts like handling latency-sensitive workloads. You'll deliver updates with Knative Serving and interlink apps, services, and systems with Knative Eventing. To keep you moving forward, every example includes deployment advice and tips for debugging. what's inside Deploy a service with Knative Serving Connect systems with Knative Eventing Autoscale responses for different traffic surges Develop, ship, and operate software about the readerFor software developers comfortable with CLI tools and an OO language like Java or Go. about the author Jacques Chester has worked in Pivotal and VMWare R&D since 2014, contributing to Knative and other projects. |
![]() ![]() You may like...
Knowledge-Based Intelligent Techniques…
Lakhmi C. Jain, Beatrice Lazzerini
Paperback
R1,266
Discovery Miles 12 660
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, …
Hardcover
R3,038
Discovery Miles 30 380
Hybrid Intelligent Systems for…
Anuradha D. Thakare, Shilpa Laddha, …
Hardcover
R3,956
Discovery Miles 39 560
Shaping the Future of ICT - Trends in…
Ibrahiem M.M.El Emary, Anna Brzozowska
Paperback
R1,506
Discovery Miles 15 060
|