Tổng hợp tài liệu, ebook Công Nghệ Thông Tin tham khảo.
Reviews of the software process deliverables involve a team of people who check that quality standards are being followed. In a program inspection or peer review, a small team systematically checks the code. They read the code in detail and look for possible errors and omissions Software measurement can be used to gather data about software and ...
51 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 933 | Lượt tải: 0
Estimation techniques for software may be experience-based, where managers judge the effort required, or algorithmic, where the effort required is computed from other estimated project parameters. The COCOMO II costing model is an algorithmic cost model that uses project, product, hardware and personnel attributes as well as product size and compl...
53 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 991 | Lượt tải: 0
People are motivated by interaction with other people, the recognition of management and their peers, and by being given opportunities for personal development. Software development groups should be fairly small and cohesive. The key factors that influence the effectiveness of a group are the people in that group, the way that it is organized and...
47 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 1017 | Lượt tải: 0
To identify concerns, you may use a viewpoint-oriented approach to requirements engineering to elicit stakeholder requirements and to identify cross-cutting quality of service and policy concerns. The transition from requirements to design can be made by identifying use cases, where each use case represents a stakeholder concern. The problems of...
46 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 877 | Lượt tải: 0
There are several standard patterns that can be observed in different types of embedded system. These include a pattern for monitoring the system’s environment for adverse events, a pattern for actuator control and a data-processing pattern. Designers of real-time systems have to do a timing analysis, which is driven by the deadlines for processin...
46 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 1150 | Lượt tải: 0
The service engineering process involves identifying candidate services for implementation, defining the service interface and implementing, testing and deploying the service. Service interfaces may be defined for legacy software systems which may then be reused in other applications. Software development using services involves creating programs...
53 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 906 | Lượt tải: 0
Architectural patterns for distributed systems include master-slave architectures, two-tier and multi-tier client-server architectures, distributed component architectures and peer-to-peer architectures. Distributed component systems require middleware to handle component communications and to allow components to be added to and removed from the s...
57 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 966 | Lượt tải: 0
During the CBSE process, the processes of requirements engineering and system design are interleaved. Component composition is the process of ‘wiring’ components together to create a system. When composing reusable components, you normally have to write adaptors to reconcile different component interfaces. When choosing compositions, you have to...
55 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 959 | Lượt tải: 0
Software product lines are related applications that are developed from a common base. This generic system is adapted to meet specific requirements for functionality, target platform or operational configuration. COTS product reuse is concerned with the reuse of large-scale, off-the-shelf systems. These provide a lot of functionality and their reu...
52 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 895 | Lượt tải: 0
ejbPassivate(): When the bean is being sent into the instance pool, this method is called. Enterprise beans have a context object that identifies the bean’s environment. These context objects are accessible to the beans in order to retrieve transaction and security information.
34 trang | Chia sẻ: nguyenlam99 | Ngày: 05/01/2019 | Lượt xem: 1016 | Lượt tải: 0