Robust design - the big picture Technical report
نویسندگان
چکیده
Computer system development consists of fulfillment of two kind of constraints, functional and nonfunctional. Different traditional computer system development methods are compared in the aspect of how functional and non functional constraints are handled. It is stated that development most probable will have to be iterative and therefore further work should be focused on how to minimize the number of iterations and as a result of this the total development cost. One of the problems with less sophisticated development strategies is that they may have cheap iterations but no strategy to predict problems later on in development. The conclusions drawn are that non-functional constraints have to be handled during the whole development process and that future problems should be predicted using some kind of solution space exploration.
منابع مشابه
A novel approach in robust group decision making for supply strategic planning
Long-term planning is a challenging process for dealing with problems in big industries. Quick and flexible process of responding to the existing variable requirements are considered in such problems. Some of important strategic decisions which should be made in this field are, namely the way that manufacturing facilities should be applied as well as assignment and design the system of delivery...
متن کاملRobust Design of Dynamic Cell Formation Problem Considering the Workers Interest
To enhance agility and quick responding to customers' demand, manufacturing processes are rearrenged according to different systems. The efficient execution of a manufacturing system depends on various factors. Among them, cell design and human issue are the pivotal ones. The proposed model designs cellular manufacturing systems using three objective functions from three different perspectives,...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملBig Graph Analytics Platforms
Due to the growing need to process large graph and network datasets created by modern applications, recent years have witnessed a surging interest in developing big graph platforms. Tens of such big graph systems have already been developed, but there lacks a systematic categorization and comparison of these systems. This article provides a timely and comprehensive survey of existing big graph ...
متن کاملBIG BANG – BIG CRUNCH ALGORITHM FOR LEAST-COST DESIGN OF WATER DISTRIBUTION SYSTEMS
The Big Bang-Big Crunch (BB–BC) method is a relatively new meta-heuristic algorithm which inspired by one of the theories of the evolution of universe. In the BB–BC optimization algorithm, firstly random points are produced in the Big Bang phase then these points are shrunk to a single representative point via a center of mass or minimal cost approach in the Big Crunch phase. In this paper, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003