Software Requirements: Encapsulation, Quality, and ReuseCRC Press, 2016. gada 19. apr. - 264 lappuses Software Requirements: Encapsulation, Quality, and Reuse describes how to make requirements easy to change by using encapsulation. It introduces the Freedom methodology that shows how to encapsulate requirements thereby promoting reuse and quality. Encapsulating requirements reduces software life cycle costs by making requirements and the code that |
No grāmatas satura
1.–5. rezultāts no 75.
iv. lappuse
... identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Lutowski, Rick. Software requirements : encapsulation, quality, and reuse / Rick Lutowski. p. cm. Includes bibliographical ...
... identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Lutowski, Rick. Software requirements : encapsulation, quality, and reuse / Rick Lutowski. p. cm. Includes bibliographical ...
3. lappuse
... identifies stimuli. Stimuli produce responses. Responses are specified in a set of “behavior tables.” These tables record the “meat” of the requirements, that is, the required behavior of the software, in a notation that is directly ...
... identifies stimuli. Stimuli produce responses. Responses are specified in a set of “behavior tables.” These tables record the “meat” of the requirements, that is, the required behavior of the software, in a notation that is directly ...
10. lappuse
... Identify and hide volatile information. “Volatile” information is data or algorithms for which the implementation details have a External Interface Access Program Access Program Access Program Hidden Information 10 Software Requirements ...
... Identify and hide volatile information. “Volatile” information is data or algorithms for which the implementation details have a External Interface Access Program Access Program Access Program Hidden Information 10 Software Requirements ...
11. lappuse
... identified, and declared in such a way as to make that information inaccessible to other modules. If an object-oriented language such as Java is being used, such data are declared private to the module. If a traditional language such as ...
... identified, and declared in such a way as to make that information inaccessible to other modules. If an object-oriented language such as Java is being used, such data are declared private to the module. If a traditional language such as ...
15. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Saturs
Chapter 10 | 111 |
Chapter 11 | 145 |
Chapter 12 | 155 |
Chapter 13 | 169 |
Chapter 14 | 199 |
Appendix A | 223 |
Appendix B | 227 |
Appendix C | 235 |
Citi izdevumi - Skatīt visu
Software Requirements: Encapsulation, Quality, and Reuse Rick Lutowski Ierobežota priekšskatīšana - 2016 |
Software Requirements: Encapsulation, Quality, and Reuse Rick Lutowski Priekšskatījums nav pieejams - 2005 |
Bieži izmantoti vārdi un frāzes
activate app server behavior table black box capability requirements categ Chapter Checkbox Classification SS cohesion command stimuli command-data stream common service modules communication protocols context diagram cost create stimuli data declarations data stimulus descrip development team device drivers end of method enterprise model Equation external interface mockup external system Figure FileDialog Formal methods fully implemented functional simulation functionality module functionality screen functionality tree Furmasco Furniture Data SS Furniture List SS human interface human user interface Identify information-hiding input interface prototype Internal Response inventory system list of furniture look and feel ments message area method that performs Mode SS modify percent postal address priority private void programmatic protocol public void quality attributes quality requirements quantity Reqmts requirements encapsulation requirements reuse response behavior response method reusable requirements component selected shipping wt software system stim stimulus methods Stimulus Normal NSR stimulus set stimulus–response TextField this.add xxx xxxxxxxxxxxxxxxxxxxxxx