首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
软件项目开发曾被喻为“野马”,如何驾驭好这匹“野马”,以适应市场的需要,提高软件开发的生产效率,是软件界一直在追寻、探讨的问题。目前国际上最有影响力的软件过程方法有:Rational统一过程(RUP),敏捷过程(AP),极限编程(xp),微软过程(MP)。通过对极限编程在一个债权管理系统中实际开发应用,阐述极限编程方法在软件项目开发中的应用特点。  相似文献   

2.
极限编程是敏捷方法中最著名的一种基于实践的软件开发方法。文章通过对极限编程在一个校产管理系统中实际开发应用,阐述了极限编程方法在软件项目开发中的应用特点。  相似文献   

3.
在许多软件企业争相实施CMM的今天,PSP、TSP是实施中主要使用的软件过程,然而对于中小项目而言,CMM的“重”是人尽皆知的问题。敏捷开发中的主流一极限编程则是一种轻量级的软件开发方法,由于它对质量和速度并重,因此对中小项目而言是相当有诱惑力的。阐述了如何在PSP、TSP的应用过程中加入极限编程的思想,提高中小软件项目的开发速度和质量。  相似文献   

4.
极限编程在进销存管理系统开发中的应用   总被引:1,自引:0,他引:1  
极限编程是敏捷方法中最著名的一种基于实践的软件开发方法.通过介绍极限编程的特点以及在进销存管理系统项目开发中的实践,探讨研究了极限编程对于需求易变的小型信息管理软件开发项目应用的优势.  相似文献   

5.
极限编程XP(cXtreme Programming)是敏捷开发的代表,是一个混乱而有序的、基于头践的软件开发方法。通过介绍极限编程的特点及其在某信息管理系统中的应用,探讨研究了极限编程在中小型需求易变的信息管理系统开发项目的实际运用和实践总结。  相似文献   

6.
引言针对政府信息安全项目需求多变和项目开发周期长以及决策环节多的特点,目前政府的信息安全软件的开发比较侧重于敏捷开发而较少采用标准的CMM体系,本文总结出一种通过XP(极限编程,以下简称XP)开发模式的过程开发机制,在提高敏捷性的同时保证了质量和可靠性。  相似文献   

7.
陈亮 《现代计算机》2009,(9):130-132
极限编程是敏捷方法中最著名的一种基于实践的软件开发方法。通过介绍极限编程的特点以及在职工培训管理信息系统项目开发中的实践.探讨研究极限编程对于需求易变的小型信息管理软件开发项目的优势。  相似文献   

8.
莫映 《程序员》2009,(11):36-37
小引 还记得2002年,自己第一次从杂志上了解到敏捷方法这样一个新鲜事物,当时着实心潮澎湃了一番,寥寥几句敏捷宣言,仿佛道出了憋在心里许久未曾吐露的心声;同样是那一年,国内的人民邮电出版社出版了一套极限编程系列丛书,这标志着作为敏捷方法诸多流派中极具影响力的一支——极限编程(eXtreme Programming),  相似文献   

9.
莫映 《程序员》2006,(6):78-81
近日,欣闻首届“敏捷中国日”开发者大会将于六月初召开,这无疑是中国敏捷开发者的一件大事。敏捷方法历经数年传布,以其注重实效的特质,已渐入人心,并开始焕发出勃勃生机。不少一线团队更是早已将其用诸实际,并从中获益良多。本文讲述了一个团队改进的故事,取自笔者近期接触的一个真实项目。希望能对那些关注敏捷方法如何应用于实际项目的读者有所帮助。文中采用的敏捷实践主要来自极限编程(Extreme Programming),读者可以从近期出版的《解析极限编程(第二版)中文版》中找到有关极限编程的详细介绍。  相似文献   

10.
敏捷需求建模的研究与设计   总被引:1,自引:0,他引:1  
文章综合研究了敏捷方法与极限编程开发过程,结合需求工程方法,设计提出了基于敏捷思想的敏捷需求建模(Agile Requiremenb Modeling。简称ARM)。敏捷需求建模作为各种敏捷方法在软件需求中的实践补充,能够满足CMMI的目标。可以为中小型软件开发组织的行动指南提供参考。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号