top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Developing a bayesian belief network model for quantifying the probability of software failure of a protection system / / prepared by: Tsong-Lun Chu [and six others]
Developing a bayesian belief network model for quantifying the probability of software failure of a protection system / / prepared by: Tsong-Lun Chu [and six others]
Autore Chu Tsong-Lun
Pubbl/distr/stampa Washington, D.C. : , : United States Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, , January 2018
Descrizione fisica 1 online resource (various pagings) : illustrations
Soggetto topico Software failures
Bayesian statistical decision theory
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910706919903321
Chu Tsong-Lun  
Washington, D.C. : , : United States Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, , January 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Development of a statistical testing approach for quantifying safety-related digital system on demand failure probability / / prepared by Tsong-Lun Chu [and nine others]
Development of a statistical testing approach for quantifying safety-related digital system on demand failure probability / / prepared by Tsong-Lun Chu [and nine others]
Autore Chu Tsong-Lun
Pubbl/distr/stampa Washington, DC : , : United States Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, , May 2017
Descrizione fisica 1 online resource (various pagings) : illustrations
Soggetto topico Nuclear power plants - Safety measures
Boiling water reactors - Analysis - Computer programs
Nuclear power plants - Computer programs
Computer software - Reliability
Software failures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910705784403321
Chu Tsong-Lun  
Washington, DC : , : United States Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, , May 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Development of quantitative software reliability models for digital protection systems of nuclear power plants [[electronic resource] ] : draft report for comments / / Tsong-Lun Chu ... [and others]
Development of quantitative software reliability models for digital protection systems of nuclear power plants [[electronic resource] ] : draft report for comments / / Tsong-Lun Chu ... [and others]
Autore Chu Tsong-Lun
Pubbl/distr/stampa Washington, DC : , : U.S. Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, , [2011]
Descrizione fisica 1 online resource (112 unnumbered pages) : illustrations
Altri autori (Persone) ChuTsong-Lun
Soggetto topico Nuclear power plants - Safety measures
Computer software - Reliability
Software failures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Development of quantitative software reliability models for digital protection systems of nuclear power plants
Record Nr. UNINA-9910701499003321
Chu Tsong-Lun  
Washington, DC : , : U.S. Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, , [2011]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse
Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Descrizione fisica 1 online resource (611 pages)
Disciplina 005.1
Soggetto topico Software failures
Software failures - Data processing
Debugging in computer science
Computer software - Quality control
ISBN 1-119-88092-0
1-119-29181-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Editor Biographies -- List of Contributors -- Chapter 1 Software Fault Localization: an Overview of Research, Techniques, and Tools -- 1.1 Introduction -- 1.2 Traditional Fault Localization Techniques -- 1.2.1 Program Logging -- 1.2.2 Assertions -- 1.2.3 Breakpoints -- 1.2.4 Profiling -- 1.3 Advanced Fault Localization Techniques -- 1.3.1 Slicing-Based Techniques -- 1.3.2 Program Spectrum-Based Techniques -- 1.3.2.1 Notation -- 1.4 Subject Programs -- 1.5 Evaluation Metrics -- 1.6 Software Fault Localization Tools -- 1.7 Critical Aspects -- 1.7.1 Fault Localization with Multiple Bugs -- 1.7.2 Inputs, Outputs, and Impact of Test Cases -- 1.7.3 Coincidental Correctness -- 1.7.4 Faults Introduced by Missing Code -- 1.7.5 Combination of Multiple Fault Localization Techniques -- 1.7.6 Ties Within Fault Localization Rankings -- 1.7.7 Fault Localization for Concurrency Bugs -- 1.7.8 Spreadsheet Fault Localization -- 1.7.9 Theoretical Studies -- 1.8 Conclusion -- 1.8 Notes -- References -- Chapter 2 Traditional Techniques for Software Fault Localization -- 2.1 Program Logging -- 2.2 Assertions -- 2.3 Breakpoints -- 2.4 Profiling -- 2.5 Discussion -- 2.6 Conclusion -- References -- Chapter 3 Slicing-Based Techniques for Software Fault Localization -- 3.1 Introduction -- 3.2 Static Slicing-Based Fault Localization -- 3.2.1 Introduction -- 3.2.2 Program Slicing Combined with Equivalence Analysis -- 3.2.3 Further Application -- 3.3 Dynamic Slicing-Based Fault Localization -- 3.3.1 Dynamic Slicing and Backtracking Techniques -- 3.3.2 Dynamic Slicing and Model-Based Techniques -- 3.3.3 Critical Slicing -- 3.3.3.1 Relationships Between Critical Slices (CS) and Exact Dynamic Program Slices (DPS) -- 3.3.3.2 Relationship Between Critical Slices and Executed Static Program Slices -- 3.3.3.3 Construction Cost.
3.3.4 Multiple-Points Dynamic Slicing -- 3.3.4.1 BwS of an Erroneous Computed Value -- 3.3.4.2 FwS of Failure-Inducing Input Difference -- 3.3.4.3 BiS of a Critical Predicate -- 3.3.4.4 MPSs: Dynamic Chops -- 3.3.5 Execution Indexing -- 3.3.5.1 Concepts -- 3.3.5.2 Structural Indexing -- 3.3.6 Dual Slicing to Locate Concurrency Bugs -- 3.3.6.1 Trace Comparison -- 3.3.6.2 Dual Slicing -- 3.3.7 Comparative Causality: a Causal Inference Model Based on Dual Slicing -- 3.3.7.1 Property One: Relevance -- 3.3.7.2 Property Two: Sufficiency -- 3.3.8 Implicit Dependences to Locate Execution Omission Errors -- 3.3.9 Other Dynamic Slicing-Based Techniques -- 3.4 Execution Slicing-Based Fault Localization -- 3.4.1 Fault Localization Using Execution Dice -- 3.4.2 A Family of Fault Localization Heuristics Based on Execution Slicing -- 3.4.2.1 Heuristic I -- 3.4.2.2 Heuristic II -- 3.4.2.3 Heuristic III -- 3.4.3 Effective Fault Localization Based on Execution Slices and Inter-block Data Dependence -- 3.4.3.1 Augmenting a Bad D(1) -- 3.4.3.2 Refining a Good D(1) -- 3.4.3.3 An Incremental Debugging Strategy -- 3.4.4 Other Execution Slicing-Based Techniques in Software Fault Localization -- 3.5 Discussions -- 3.6 Conclusion -- 3.6 Notes -- References -- Chapter 4 Spectrum-Based Techniques for Software Fault Localization -- 4.1 Introduction -- 4.2 Background and Notation -- 4.2.1 Similarity Coefficient-Based Fault Localization -- 4.2.2 An Example of Using Similarity Coefficient to Compute Suspiciousness -- 4.3 Insights of Some Spectra-Based Metrics -- 4.4 Equivalence Metrics -- 4.4.1 Applicability of the Equivalence Relation to Other Fault Localization Techniques -- 4.4.2 Applicability Beyond Fault Localization -- 4.5 Selecting a Good Suspiciousness Function (Metric) -- 4.5.1 Cost of Using a Metric -- 4.5.2 Optimality for Programs with a Single Bug.
4.5.3 Optimality for Programs with Deterministic Bugs -- 4.6 Using Spectrum-Based Metrics for Fault Localization -- 4.6.1 Spectrum-Based Metrics for Fault Localization -- 4.6.2 Refinement of Spectra-Based Metrics -- 4.7 Empirical Evaluation Studies of SBFL Metrics -- 4.7.1 The Construction of D* -- 4.7.2 An Illustrative Example -- 4.7.3 A Case Study Using D* -- 4.7.3.1 Subject Programs -- 4.7.3.2 Fault Localization Techniques Used in Comparisons -- 4.7.3.3 Evaluation Metrics and Criteria -- 4.7.3.3.1 The EXAM Score -- 4.7.3.3.2 Cumulative Number of Statements Examined -- 4.7.3.3.3 Wilcoxon Signed-Rank Test -- 4.7.3.4 Statement with Same Suspiciousness Values -- 4.7.3.5 Results -- 4.7.3.6 Effectiveness of D* with Different Values of * -- 4.7.3.7 D* Versus Other Fault Localization Techniques -- 4.7.3.8 Programs with Multiple Bugs -- 4.7.3.8.1 The Expense Score-Based Approach -- 4.7.3.8.2 The One-Bug-at-a-Time Approach -- 4.7.3.9 Discussion -- 4.7.3.9.1 Intuition -- 4.7.3.9.2 Best and Worst Effectiveness Versus Other Alternatives -- 4.7.3.9.3 Threats to Validity -- 4.8 Conclusion -- 4.8 Notes -- References -- Chapter 5 Statistics-Based Techniques for Software Fault Localization -- 5.1 Introduction -- 5.1.1 Tarantula -- 5.1.2 How It Works -- 5.2 Working with Statements -- 5.2.1 Techniques Under the Same Problem Settings -- 5.2.2 Statistical Variances -- 5.3 Working with Non-statements -- 5.3.1 Predicate: a Popular Trend -- 5.3.2 BPEL: a Sample Application -- 5.4 Purifying the Input -- 5.4.1 Coincidental Correctness Issue -- 5.4.2 Class Balance Consideration -- 5.5 Reinterpreting the Output -- 5.5.1 Revealing Fault Number -- 5.5.2 Noise Reduction -- 5.5.2 Notes -- References -- Chapter 6 Machine Learning-Based Techniques for Software Fault Localization -- 6.1 Introduction -- 6.2 BP Neural Network-Based Fault Localization.
6.2.1 Fault Localization with a BP Neural Network -- 6.2.2 Reduce the Number of Candidate Suspicious Statements -- 6.3 RBF Neural Network-Based Fault Localization -- 6.3.1 RBF Neural Networks -- 6.3.2 Methodology -- 6.3.2.1 Fault Localization Using an RBF Neural Network -- 6.3.2.2 Training of the RBF Neural Network -- 6.3.2.3 Definition of a Weighted Bit-Comparison-Based Dissimilarity -- 6.4 C4.5 Decision Tree-Based Fault Localization -- 6.4.1 Category-Partition for Rule Induction -- 6.4.2 Rule Induction Algorithms -- 6.4.3 Statement Ranking Strategies -- 6.4.3.1 Revisiting Tarantula -- 6.4.3.2 Ranking Statements Based on C4.5 Rules -- 6.4.3.2.1 Heuristic -- 6.4.3.2.2 Computing a Statement Ranking -- 6.4.3.2.3 Rule Selection -- 6.5 Applying Simulated Annealing with Statement Pruning for an SBFL Formula -- 6.6 Conclusion -- 6.6 Notes -- References -- Chapter 7 Data Mining-Based Techniques for Software Fault Localization -- 7.1 Introduction -- 7.2 Formal Concept Analysis and Association Rules -- 7.2.1 Formal Concept Analysis -- 7.2.2 Association Rules -- 7.3 Data Mining for Fault Localization -- 7.3.1 Failure Rules -- 7.3.2 Failure Lattice -- 7.4 The Failure Lattice for Multiple Faults -- 7.4.1 Dependencies Between Faults -- 7.4.2 Example -- 7.5 Discussion -- 7.5.1 The Structure of the Execution Traces -- 7.5.2 Union Model -- 7.5.3 Inter section Model -- 7.5.4 Nearest Neighbor -- 7.5.5 Delta Debugging -- 7.5.6 From the Trace Context to the Failure Context -- 7.5.7 The Structure of Association Rules -- 7.5.8 Multiple Faults -- 7.6 Fault Localization Using N-gram Analysis -- 7.6.1 Background -- 7.6.1.1 Execution Sequence -- 7.6.1.2 N-gram. Analysis -- 7.6.1.3 Linear Execution Blocks -- 7.6.1.4 Association Rule Mining -- 7.6.2 Methodology -- 7.6.3 Conclusion -- 7.7 Fault Localization for GUI Software Using N-gram Analysis -- 7.7.1 Background.
7.7.1.1 Representation of the GUI and Its Operations -- 7.7.1.2 Event Handler -- 7.7.1.3 N-gram -- 7.7.2 Association Rule Mining -- 7.7.3 Methodology -- 7.7.3.1 General Approach -- 7.7.3.2 N-gram Fault Localization Algorithm -- 7.8 Conclusion -- 7.8 Notes -- References -- Chapter 8 Information Retrieval-Based Techniques for Software Fault Localization -- 8.1 Introduction -- 8.2 General IR-Based Fault Localization Process -- 8.3 Fundamental Information Retrieval Techniques for Software Fault Localization -- 8.3.1 Vector Space Model -- 8.3.2 Topic Modeling -- 8.3.3 Word Embedding -- 8.4 Evaluation Metrics -- 8.4.1 Top-k Prediction Accuracy -- 8.4.2 Mean Reciprocal Rank (MRR) -- 8.4.3 Mean Average Precision (MAP) -- 8.5 Techniques for Different Scenarios -- 8.5.1 Text of Current Bug Report Only -- 8.5.1.1 VSM Variants -- 8.5.1.2 Topic Modeling -- 8.5.2 Text and History -- 8.5.2.1 VSM Variants -- 8.5.2.2 Topic Modeling -- 8.5.2.3 Deep Learning -- 8.5.3 Text and Stack/Execution Traces -- 8.6 Empirical Studies -- 8.7 Miscellaneous -- 8.8 Conclusion -- 8.8 Notes -- References -- Chapter 9 Model-Based Techniques for Software Fault Localization -- 9.1 Introduction -- 9.2 Basic Definitions and Algorithms -- 9.2.1 Algorithms for MBD -- 9.3 Modeling for MBD -- 9.3.1 The Value-Based Model -- 9.3.2 The Dependency-Based Model -- 9.3.3 Approximation Models for Debugging -- 9.3.4 Other Modeling Approaches -- 9.4 Application Areas -- 9.5 Hybrid Approaches -- 9.6 Conclusion -- 9.6 Notes -- References -- Chapter 10 Software Fault Localization in Spreadsheets -- 10.1 Motivation -- 10.2 Definition of the Spreadsheet Language -- 10.3 Cones -- 10.4 Spectrum-Based Fault Localization -- 10.5 Model-Based Spreadsheet Debugging -- 10.6 Repair Approaches -- 10.7 Checking Approaches -- 10.8 Testing -- 10.9 Conclusion -- 10.9 Notes -- References.
Chapter 11 Theoretical Aspects of Software Fault Localization.
Record Nr. UNINA-9910830449103321
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Incremental software architecture : a method for saving failing IT implementations / / Michael Bell
Incremental software architecture : a method for saving failing IT implementations / / Michael Bell
Autore Bell Michael <1951->
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (275 pages)
Disciplina 005
Collana THEi Wiley ebooks.
Soggetto topico Software failures
Evolutionary programming (Computer science)
Continuous improvement process
Software architecture
ISBN 1-119-21369-X
1-119-12536-7
1-119-21368-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910137488403321
Bell Michael <1951->  
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Incremental software architecture : a method for saving failing IT implementations / / Michael Bell
Incremental software architecture : a method for saving failing IT implementations / / Michael Bell
Autore Bell Michael <1951->
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (275 pages)
Disciplina 005
Collana THEi Wiley ebooks.
Soggetto topico Software failures
Evolutionary programming (Computer science)
Continuous improvement process
Software architecture
ISBN 1-119-21369-X
1-119-12536-7
1-119-21368-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910813128103321
Bell Michael <1951->  
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Noise channels [[electronic resource] ] : glitch and error in digital culture / / Peter Krapp
Noise channels [[electronic resource] ] : glitch and error in digital culture / / Peter Krapp
Autore Krapp Peter
Pubbl/distr/stampa Minneapolis, : University of Minnesota Press, 2011
Descrizione fisica 1 online resource (188 p.)
Disciplina 302.23/1
Collana Electronic mediations
Soggetto topico Computers - Social aspects
Cyberspace - Social aspects
Digital media - Philosophy
Software failures
Serendipity
Soggetto genere / forma Electronic books.
ISBN 1-4529-4779-1
0-8166-7872-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hypertext and its anachronisms -- Terror and play, or What was hacktivism? -- Noise floor : between tinnitus and raw data -- Gaming the glitch : room for error -- Machinima and the suspensions of animation.
Record Nr. UNINA-9910461023803321
Krapp Peter  
Minneapolis, : University of Minnesota Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Noise channels [[electronic resource] ] : glitch and error in digital culture / / Peter Krapp
Noise channels [[electronic resource] ] : glitch and error in digital culture / / Peter Krapp
Autore Krapp Peter
Pubbl/distr/stampa Minneapolis, : University of Minnesota Press, 2011
Descrizione fisica 1 online resource (188 p.)
Disciplina 302.23/1
Collana Electronic mediations
Soggetto topico Computers - Social aspects
Cyberspace - Social aspects
Digital media - Philosophy
Software failures
Serendipity
ISBN 1-4529-4779-1
0-8166-7872-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hypertext and its anachronisms -- Terror and play, or What was hacktivism? -- Noise floor : between tinnitus and raw data -- Gaming the glitch : room for error -- Machinima and the suspensions of animation.
Record Nr. UNINA-9910789707803321
Krapp Peter  
Minneapolis, : University of Minnesota Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Noise channels [[electronic resource] ] : glitch and error in digital culture / / Peter Krapp
Noise channels [[electronic resource] ] : glitch and error in digital culture / / Peter Krapp
Autore Krapp Peter
Pubbl/distr/stampa Minneapolis, : University of Minnesota Press, 2011
Descrizione fisica 1 online resource (188 p.)
Disciplina 302.23/1
Collana Electronic mediations
Soggetto topico Computers - Social aspects
Cyberspace - Social aspects
Digital media - Philosophy
Software failures
Serendipity
ISBN 1-4529-4779-1
0-8166-7872-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hypertext and its anachronisms -- Terror and play, or What was hacktivism? -- Noise floor : between tinnitus and raw data -- Gaming the glitch : room for error -- Machinima and the suspensions of animation.
Record Nr. UNINA-9910825310503321
Krapp Peter  
Minneapolis, : University of Minnesota Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Refactoring for software design smells : managing technical debt / / Girish Suryanarayana, Ganesh Samarthyam, Tushar Sharma
Refactoring for software design smells : managing technical debt / / Girish Suryanarayana, Ganesh Samarthyam, Tushar Sharma
Autore Suryanarayana Girish
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts ; : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (259 p.)
Disciplina 005.1/6
Soggetto topico Software refactoring
Software failures
Soggetto genere / forma Electronic books.
ISBN 0-12-801646-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FrontCover; Refactoring forSoftware DesignSmells; Copyright; Dedication; Contents; Foreword by Grady Booch; Foreword by Dr. Stéphane Ducasse; Preface; WHAT IS THIS BOOK ABOUT?; WHAT DOES THIS BOOK COVER?; WHO SHOULD READ THIS BOOK?; WHAT ARE THE PREREQUISITES FOR READING THIS BOOK?; HOW TO READ THIS BOOK?; WHERE CAN I FIND MORE INFORMATION?; WHY DID WE WRITE THIS BOOK?; Acknowledgments; Chapter 1 - Technical Debt; 1.1 WHAT IS TECHNICAL DEBT?; 1.2 WHAT CONSTITUTES TECHNICAL DEBT?; 1.3 WHAT IS THE IMPACT OF TECHNICAL DEBT?; 1.4 WHAT CAUSES TECHNICAL DEBT?; 1.5 HOW TO MANAGE TECHNICAL DEBT?
Chapter 2 - Design Smells2.1 WHY CARE ABOUT SMELLS?; 2.2 WHAT CAUSES SMELLS?; 2.3 HOW TO ADDRESS SMELLS?; 2.4 WHAT SMELLS ARE COVERED IN THIS BOOK?; 2.5 A CLASSIFICATION OF DESIGN SMELLS; Chapter 3 - Abstraction Smells; 3.1 MISSING ABSTRACTION; 3.2 IMPERATIVE ABSTRACTION; 3.3 INCOMPLETE ABSTRACTION; 3.4 MULTIFACETED ABSTRACTION; 3.5 UNNECESSARY ABSTRACTION; 3.6 UNUTILIZED ABSTRACTION; 3.7 DUPLICATE ABSTRACTION; Chapter 4 - Encapsulation Smells; 4.1 DEFICIENT ENCAPSULATION; 4.2 LEAKY ENCAPSULATION; 4.3 MISSING ENCAPSULATION; 4.4 UNEXPLOITED ENCAPSULATION; Chapter 5 - Modularization Smells
5.1 BROKEN MODULARIZATION5.2 INSUFFICIENT MODULARIZATION; 5.3 CYCLICALLY-DEPENDENT MODULARIZATION; 5.4 HUB-LIKE MODULARIZATION; Chapter 6 - Hierarchy Smells; 6.1 MISSING HIERARCHY; 6.2 UNNECESSARY HIERARCHY; 6.3 UNFACTORED HIERARCHY; 6.4 WIDE HIERARCHY; 6.5 SPECULATIVE HIERARCHY; 6.6 DEEP HIERARCHY; 6.7 REBELLIOUS HIERARCHY; 6.8 BROKEN HIERARCHY; 6.9 MULTIPATH HIERARCHY; 6.10 CYCLIC HIERARCHY; Chapter 7 - The Smell Ecosystem; 7.1 THE ROLE OF CONTEXT; 7.2 INTERPLAY OF SMELLS; Chapter 8 - Repaying Technical Debt in Practice; 8.1 THE TOOLS; 8.2 THE PROCESS; 8.3 THE PEOPLE
Appendix A - Software Design PrinciplesA.1 ABSTRACTION; A.2 ACYCLIC DEPENDENCIES PRINCIPLE; A.3 DON'T REPEAT YOURSELF PRINCIPLE; A.4 ENCAPSULATION; A.5 INFORMATION HIDING PRINCIPLE; A.6 KEEP IT SIMPLE SILLY; A.7 LISKOV'S SUBSTITUTION PRINCIPLE; A.8 HIERARCHY; A.9 MODULARIZATION; A.10 OPEN/CLOSE PRINCIPLE; A.11 SINGLE RESPONSIBILITY PRINCIPLE; A.12 VARIATION ENCAPSULATION PRINCIPLE; Appendix B - Tools for Repaying Technical Debt; Appendix C - Notations for Figures; Appendix D - Suggested Reading; D.1 ESSENTIALS; D.2 REFACTORING AND REENGINEERING; D.3 PATTERNS AND ANTI-PATTERNS
D.4 TECHNICAL DEBTBibliography; Index
Record Nr. UNISA-996426333603316
Suryanarayana Girish  
Waltham, Massachusetts ; : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui