首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
To address the issues of software product quality, the Joint Technical Committee 1 of the International Organization for Standardization and International Electrotechnical Commission published a set of software product quality standards known as ISO/IEC 9126. These standards specify software product quality's characteristics and subcharacteristics and their metrics. Based on a user survey, this study of the standard helps clarity quality attributes and provides guidance for the resulting standards.  相似文献   

2.
Singh  R. 《Computer》1995,28(11):89-90
A new standard, Software Life Cycle Processes (ISO/IEC 12207), developed over the past six years, has recently been approved by JTC1 (Joint Technical Committee 1 of the International Organization for Standardization and the International Electrotechnical Commission). While software has been established as an integral part of scientific and business disciplines, environments for developing and managing software have proliferated without a common, uniform framework for the software life cycle. This standard provides such a framework, so that software practitioners can speak the same language when they create and manage software. Practitioners can use the framework to acquire, supply, develop, operate, and maintain software  相似文献   

3.
This paper describes the basic concepts for the Image Interchange Format (IIF) for the first International Image Processing and Interchange Standard (IPI), which is under elaboration by ISO/IEC JTC1/SC24 (International Standards Organization/International Electronics Commission, Joint Technical Committee, Computer Graphics)—i.e., “information processing”/“computer graphics”—committee work. Starting with a discussion of existing image formats and current image interchange practices, this study outlines the need for a new approach to a general image interchange format. A requirements list and corresponding design goals for the IIF are presented. Finally, the relation to the other parts of the IPI standard are described. The authors are coworkers and contributors to the relevant committees within the ISO/IEC and the DIN German Institute for Standardization (DIN Deutsches Institut für Normung).  相似文献   

4.
Matras  J.R. 《Computer》1993,26(5):76-79
The IEEE Nuclear Engineering Committee has standards that address hardware issues. The IEEE Computer Society has standards addressing software. The P-7-4.3.2, IEEE standard criteria for digital computers in safety systems of nuclear power generating stations, which brings together standards from both groups to address the integration of computer hardware and software with noncomputer hardware, is discussed. P-7-4.3.2 is being developed to show the interrelationship of software and hardware requirements as they apply throughout the development process. The influence of system design development on system quality, system qualification, and system integrity, are described  相似文献   

5.
In June 1991, the International Standards group for Software Engineering approved a study period to investigate the need and requirements for a standard for software process management. A new international work item has been subsequently raised. The resulting project is named SPICE (Software Process Improvement and Capability Determination). The project aims to build on the best features of existing software assessment methods.  相似文献   

6.
International Journal on Software Tools for Technology Transfer - Many software systems are variational: they can be configured to meet diverse sets of requirements. They can produce a (potentially...  相似文献   

7.
New corporate developments, such as globalization, diversification and process orientation, are posing a challenge to the degree of integration of business application software. International standard software designed to meet the requirements of all types of business is acquiring greater strategic significance. The increased need for flexibility, localization, and scalable growth makes it necessary for highly integrated businesses applications to be distributable. Possible scenarios reflect managerial and organizational requirements. Additional mechanisms must be incorporated and business processes adapted to compensate for the increased autonomy of sub-applications. Reprint of an article from WIRTSCHAFTSINFORMATIK 35(5)1993:455–464.  相似文献   

8.
International Journal on Software Tools for Technology Transfer - Critical (software) systems are all around us. These systems are typically characterised by stringent dependability requirements...  相似文献   

9.
On June 1, 2012, the Information Display Measurement Standard version 1 was released. This is the first standard from the worldwide standard group, the International Committee for Display Metrology, a standards committee within SID, and it culminates several years worth of development from many contributors at various levels. It has 26 top‐level chapters and a total over 450 sections of all parts, including over 200 measurement sections and 8 appendices that cover 133 topics of display metrology, tutorials, technical discussions, and references. Herein is an overview of the Information Display Measurement Standard version 1, including the structure of the document, tips, tricks, and hidden features, how it is maintained, support material, a breakdown of its contents, and finally, a sampling of four of the over 200 measurements. The standard is available as a free download and can be found on the International Committee for Display Metrology home page — http://www.icdm‐sid.org .  相似文献   

10.
Stucki  L.G. 《Computer》1975,8(7):77-78
Complementing the 1975 International Cnference on Reliable Soft-held April 21-23 in Los Angeles (see May Computer), a workshop was held April 24-25 to survey the current status of program testing tools. Co- sponsored by the U.S. National Bureau of Standards, ACM, and the IEEE Computer Society (Technical Committee on Software Engineering), the workshop was held at the Airport Marina in Los Angeles on 24-25 April 1975. Attendance was 160 and represented many diverse interests. The fact that software is rapidly becoming recognized, by those outside as well as inside the programming profession, as one of the most complex human activities yet undertaken–set the stage for the discussions which emerged.  相似文献   

11.
Designs almost always require tradeoffs between competing design choices to meet system requirements. We present a framework for evaluating design choices with respect to meeting competing requirements. Specifically, we develop a model to estimate the performance of a UML design subject to changing levels of security and fault-tolerance. This analysis gives us a way to identify design solutions that are infeasible. Multi-criteria decision making techniques are applied to evaluate the remaining feasible alternatives. The method is illustrated with two examples: a small sensor network and a system for controlling traffic lights. Dr. Anneliese Amschler Andrews is Professor and Chair of the Department of Computer Science at the University of Denver. Before that she was the Huie Rogers Endowed Chair in Software Engineering at Washington State University. Dr. Andrews is the author of a text book and over 130 articles in the area of Software Engineering, particularly software testing and maintenance. Dr. Andrews holds an MS and PhD from Duke University and a Dipl.-Inf. from the Technical University of Karlsruhe. She served as Editor-in-Chief of the IEEE Transactions on Software Engineering. She has also served on several other editorial boards including the IEEE Transactions on Reliability, the Empirical Software Engineering Journal, the Software Quality Journal, the Journal of Information Science and Technology, and the Journal of Software Maintenance. She was Director of the Colorado Advanced Software Institute from 1995 to 2002. CASI's mission was to support technology transfer research related to software through collaborations between industry and academia. Ed Mancebo studied software engineering at Milwaukee School of Engineering and computer science at Washington State University. His masters thesis explored applying systematic decision making methods to software engineering problems. He is currently a software developer at Amazon.com. Dr. Per Runeson is a professor in software engineering at Lund University, Sweden. His research interests include methods to facilitate, measure and manage aspects of software quality. He received a PhD from Lund University in 1998 and has industrial experience as a consulting expert. He is a member of the editorial board of Empirical Software Engineering and several program committees, and currently has a senior researcher position funded by the Swedish Research Council. Robert France is currently a Full Professor in the Department of Computer Science at Colorado State University. His research interests are in the area of Software Engineering, in particular formal specification techniques, software modeling techniques, design patterns, and domain-specific modeling languages. He is an Editor-in-Chief of the Springer journal on Software and System Modeling (SoSyM), and is a Steering Committee member and past Steering Committee Chair of the MoDELS/UML conference series. He was also a member of the revision task forces for the UML 1.x standards.  相似文献   

12.
Among the Earth Observation (EO) instruments used in environmental and agricultural applications, the SPOT4-VEGETATION (SPOT4-VGT) instrument allows daily monitoring of terrestrial vegetation cover through remote sensing, at regional and global levels. The characterization of the geometric and radiometric performances of remote sensing data and their temporal stability play an important role in the analysis of EO images and are essential in environmental and agricultural monitoring applications. The validation and characterization of the SPOT4-VGT image geometric performances and temporal stability are investigated in this letter. Three time series of data acquired during 1999, 2000 and 2001 were used for this purpose. These images were downlinked by several VGT L-band receiving stations and processed by the SPACE-VGT software. From analyses made, it can be concluded that the geometric characteristics of the VGT L-band images agree with the VGT International User Committee requirements: the multispectral registration has a root mean square (RMS) error in the range of 0.25±0.17 pixels for B2, B3 and MIR bands, and 0.48±0.21 pixels for B0 band; the multi-temporal registration has a RMS error in the range of 0.38±0.23 pixels; and the absolute geo-location has a RMS error in the range of ±660?m.  相似文献   

13.
为适应国际海事组织船舶能效设计指数对绿色船舶的要求,以46 000 t油船为例,采用CAD软件FRIENDSHIP对船舶进行参数化建模,同时集成CFD软件Shipflow,搭建船型优化平台,实现参数化船型自动生成、性能计算及优化,获得阻力性能较好的船型。研究结果表明:所采用的46 000 t油船型线优化方法具有可行性,可为46 000 t油船型线设计提供参考。该研究方法可实现仿真驱动设计,对缩短设计周期具有重要意义。  相似文献   

14.
Bamford  R.C. Deibler  W.J.  II. 《Computer》1993,26(10):68-70
The Carnegie Mellon University Software Engineering Institutes's (SEI's) five-level framework for engineering practices in a successful software development organization and the International Organization for Standardization's ISO 9000 series of standards, which describes the key requirements for companies and organizations doing business in the European Community, are reviewed. The origins of the models are discussed, and the two models are compared and contrasted  相似文献   

15.
16.
Originally written to provide the file compression feature, computer software such as WinRAR and WinZip now also provide encryption features due to the rising need for security and privacy protection of files within a computer system or for sharing within a network. However, since compression has been much in use well before users saw the need for security, most are more familiar with compression software than they are with security ones. Therefore, encryption-enabled compression software such as WinRAR and WinZip tend to be more widely used for security than a dedicated security software. In this paper, we present several attacks on the encryption feature provided by the WinRAR compression software. These attacks are possible due to the subtlety in developing security software based on the integration of multiple cryptographic primitives. In other words, no matter how securely designed each primitive is, using them especially in association with other primitives does not always guarantee secure systems. Instead, time and again such a practice has shown to result in flawed systems. Our results, compared to recent attacks on WinZip by Kohno, show that WinRAR appears to offer slightly better security features. Gary S.-W. Yeo completed his B.Eng in Electronics & Computer Systems in the first half of 2005, and is currently working as an electronics engineer with a semiconductor fab facility. Raphael C.-W. Phan is currently Director of the Information Security Research (iSECURES) Laboratory at the Swinburne University of Technology (Sarawak Campus) – SUTS, Kuching, Malaysia. Raphael researches on cryptography, cryptanalysis, authentication and key exchange protocols, smart card security, hash functions and digital watermarking. His work has been published in refereed journals published by IEE, IEEE, Elsevier Science and US Military Academy; and in internationally refereed cryptology conferences published by Springer-Verlag, Germany. He is referee for several IEEE journals on the area of information security. He is General Chair of Mycrypt '05 and Asiacrypt '07, Program Chair of the International Workshop on Information Security & Hiding (ISH '05), and technical Program Committee member of Mycrypt '05, the International Conference on Information Security & Cryptology (ICISC '05) and International Conference on Applied Cryptography & Network Security (ACNS '06).  相似文献   

17.
Donner  I.H. 《Computer》1995,28(10):84-85
U.S. Congressman Joe Knollenberg (R-Mich.) has introduced a bill to let third-party computer-service companies provide maintenance to licensed software. The bill is under consideration in the Subcommittee on Courts and Intellectual Property, part of the House Judiciary Committee. This article explains the steps one should take before servicing software: (1) examine user rights; (2) determine the type of agreement; and (3) identify specific restrictions  相似文献   

18.
《智能系统学报》2018,(5):817-817
The Organizing Committee is pleased to announce that 2019 2nd International Conference on Big Data and Smart Computing(ICBDSC 2019)will take place in Bali,Indonesia on January 10–13,2019 as a workshop of ICSIM 2019.The conference is addressed to academics,researchers and professionals with a particular interest related to the  相似文献   

19.
This paper describes an integrated approach to safety analysis of software requirements and demonstrates the feasibility and utility of applying the individual techniques and the integrated approach on the requirements specification of a guidance system for a high-speed civil transport being developed at NASA Ames. Each analysis found different types of errors in the specification; thus together the techniques provided a more comprehensive safety analysis than any individual technique. We also discovered that the more the analyst knew about the application and the model, the more successful they were in finding errors. Our findings imply that the most effective safety-analysis tools will assist rather than replace the analyst. A shorter version of this paper appeared in the Proceedings of the 3rd International Symposium on Requirements Engineering, Annapolis, Maryland, January 1997. The research described has been partly funded by NASA/Langley Grant NAG-1-1495, NSF Grant CCR-9396181, and the California PATH Program of the University of California  相似文献   

20.
In software development, it has been pointed out that software engineers must pay attention to software requirements definition. One of the important problems in software engineering is to rationalize the processes from requirements definition to design. Computer tools are most useful and efficient for this purpose. This paper proposes a computer-aided software design system (CASDS), which supports software engineers with a series of structural modeling. As is well-known in systems planning, structural modeling helps to extract concepts from many fuzzy requirements. This system contains three structural modeling methods. They are used 1) to determine functional terms from fuzzy software requirements, 2) to obtain modules by structuring the functions with respect to the data flows, and 3) to make a program skeleton by imposing control flows on the functional elements obtained by breaking down the modules.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号