SHADD: A scenario-based approach to software architectural defects detection

被引:2
|
作者
Sharafi, Sayed Mehran [1 ]
机构
[1] Islamic Azad Univ, Najafabad Branch, Fac Comp Engn, Esfahan, Iran
关键词
Software architectures; Problems; Architectural defects; Scenario-based evaluation; ATAM; SHADD; SPECIFICATIONS;
D O I
10.1016/j.advengsoft.2011.10.012
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Although a good architecture is not sufficient to guarantee the success of a software product, undoubtedly it is essential to support the product quality. Evaluating software architecture provides early insight into product capabilities and limitations. The earlier in the life cycle the problems are detected, the cheaper it is to fix them. In this paper, at first, a review on well-known scenario-based methods to evaluate software architectures is presented, and their advantages and limitations are discussed. Then, a method named SHADD with different characteristics is introduced to detect architectural defects. Using a scenario-based approach, the proposed method finds out the critical aspects and potential problems threatening the system from the stakeholder's point of view. Scenarios are then used as a basis for the process of architectural defects detection. SHADD and its elements are specified in a systematic form and an illustration of its application on the architecture of a real system is also presented. The results show that SHADD can be used to detect those architectural defects which may be uncovered during the application of conventional evaluation methods. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:341 / 348
页数:8
相关论文
共 50 条
  • [21] Validation of reactive software from scenario-based models
    Ribeiro, Oscar R.
    Fernandes, Joao M.
    QUATIC 2007: 6TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, PROCEEDINGS, 2007, : 213 - 217
  • [22] A Scenario-Based Framework for the Security Evaluation of Software Architecture
    Alkussayer, Abdulaziz
    Allen, William H.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 687 - 695
  • [23] Lightweight formal methods for scenario-based software engineering
    Bontemps, Y
    Heymans, P
    Schobbens, PY
    SCENARIOS: MODELS, TRANSFORMATIONS AND TOOLS, 2005, 3466 : 174 - 192
  • [24] A scenario-based distributed testing model for software applications
    Mehmood, Mirza Aamir
    Mahmood, Azhar
    Khan, Muhammad Naeem Ahmed
    Khatoon, Shaheen
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2016, 3 (10): : 64 - 71
  • [25] Comparison of scenario-based software architecture evaluation methods
    Babar, MA
    Gorton, I
    11TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 600 - 607
  • [26] The architecture of a tool for scenario-based software architecture evaluation
    Usman, Muhammad
    Ikram, Naveed
    10TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE 2006, PROCEEDINGS, 2006, : 288 - +
  • [27] Scenario-based System Test of Software Product Families
    Reuys, Andreas
    Kamsties, Erik
    Pohl, Klaus
    Reis, Sacha
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2005, 20 (1-2): : 33 - 44
  • [28] Scenario-based comparison of clone detection techniques
    Roy, Chanchal K.
    Cordy, James R.
    PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, 2008, : 153 - 162
  • [29] Scenario-based threat detection and attack analysis
    Hsiu, PC
    Kuo, CF
    Kuo, TW
    Juan, EYT
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 279 - 282
  • [30] Stochastic constraint programming: A scenario-based approach
    Tarim, S. Armagan
    Manandhar, Suresh
    Walsh, Toby
    CONSTRAINTS, 2006, 11 (01) : 53 - 80