A real-world MCDA application: evaluating software
نویسندگان
چکیده
منابع مشابه
The Real World Software Process
The industry-wide demand for rapid development in concert with greater process maturity has seen many software development firms adopt tightly structured iterative processes. While a number of commercial vendors offer suitable process infrastructure and tool support, the cost of licensing, configuration and staff training may be prohibitive for the Small and Medium size Enterprises (SMEs) which...
متن کاملTruth { A Real { World Application in
Truth is a design and veriication platform for concurrent systems, which is mainly implemented in the Haskell programming language. It is being developed and maintained by the Modeling Concurrent Systems Group at Aachen University of Technology. This paper gives a report on the experiences acquired by employing a functional language. It motivates the choice of Haskell as the main implementation...
متن کاملAn integrated MCDA software application for forest planning: a case study in southwestern Sweden
Forest planning in Sweden today translates not only into planning of timber production, but also for the provision of other functions and services. Multi-criteria decision analysis (MCDA) methods provide a way to take also non-monetary values into account in planning. The purpose of this study was to gain experience on how to use a forest decision support system combined with an MCDA tool in pr...
متن کاملEvaluating Software Architectures for Real-Time Systems
Software architecture has emerged as the foundational linch pin for designing systems that meet their behavioral and quality requirements, which include real-time constraints. Since architects presumably do not work randomly, but make architectural design decisions based on rational goal-based considerations, it follows that architectures (the sum of their design decisions) can be evaluated to ...
متن کاملFormally Verified Software in the Real World
We present an approach for building highly-dependable systems that derive their assurance from a formally-verified operatingsystem which guarantees isolation between subsystems. We leverage those guarantees to enforce security through non-bypassable architectural constraints, and through generation of code and proofs from the architecture. We show that this approach can produce a system that is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Multi-Criteria Decision Analysis
سال: 2000
ISSN: 1057-9214,1099-1360
DOI: 10.1002/1099-1360(200009)9:5<205::aid-mcda277>3.0.co;2-o