首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
通过分析软件开发过程中存在的问题,引入软件工程的概念,并概括了利用软件工程进行软件开发中最重要的3个方面.传统的软件工程方法将被面向对象的方法所取代,组件技术必将越来越倍受重视,同时更加新颖、更加先进的方法也必将会出现.  相似文献   

2.
传统的软件工程方法曾经给软件产业带来巨大进步,部分的缓解了软件危机,使用这种方法开发的许多中、小规模软件项目都获得了成功.但是随着大型软件产品的不断开发,传统软件工程方法已经不能够满足大型软件产品的开发需求.而目前面向对象方法已经成为人们在开发软件时首选的范型.面向对象技术已经成为当前最好的软件开发工具.  相似文献   

3.
随着面向对象研究的不断深入,面向对象技术的应用越来越广泛,面向对象的思想被应用到许多不同的领域。在介绍软件工程方法的基础上分析了面向对象的软件工程方法的分析技术、设计及软件开发方法,从而说明了面向对象技术贯穿于软件开发的全过程。  相似文献   

4.
随着软件技术的发展,基于构件技术的软件工程(component-based software engineering,CBSE)方法已经日趋成熟。基于构件的软件工程旨在通过对标准化软件构件的复用,采用"搭积木"的方式生产软件,解决传统软件开发质量和进度难以得到保证的问题。对基于构件软件工程的软件质量、软件生产率和软件成本进行了经济学分析,阐述了基于构件软件开发各经济因子间的关系。  相似文献   

5.
软件工程是一个年轻并且充满活力的研究领域。60年代末期以来人们为克服"软件危机"在这一领域做了大量工作,逐渐形成了系统的软件开发理论、技术和方法,它们在软件开发实践中发挥了重要作用。今天,现代科学技术将人类带入了信息社会,计算机软件扮演着十分重要的角色,软件工程已成为信息社会高技术竞争的关键领域之一,本文就其发展及应用进行了探索和研究。  相似文献   

6.
软件体系结构已经成为软件工程领域的一个新的研究方向,软件体系结构的提出对软件重用机制和软件开发效率的提高具有非常重要的意义。本文对软件体系结构的定义、评价指标、建模方法进行研究,进而列砚令软件体系结构的软件开发模型进行比较分析,以其能够寻找一种提高软件开发的质量、减少软件开销和促进软件生产率提高的有效方法。  相似文献   

7.
利用旱已定义好的方法集和符号表示习惯来组织软件生产的过程是软件工程的开发方法。根据用户需求在规定的时间和投资内开发出高质量的软件是软件开发的目标,然而计算机软件开发生产效率却远远跟不上计算机应用的要求,软件成本逐步上升,质量没有可靠的保证,而软件的维修与保护却需要花费很大的代价,软件已经成为约束计算机系统发展的关键因素。为解决软件开发与维护的问题,一门新兴的工程学一软件工程逐渐发展起来。软件工程从技术和管理两个方面研究怎样更好地维护,开发计算机软件的问题,很好地解了软件产业中的一系列问题。  相似文献   

8.
一些工科院校在培养复合型、应用型会计信息化人才方面创新出了新的模式,该模式具有专业新颖性、学科复合性和交叉性等特点,但也存在不足.本文在多年的软件工程(会计学)教学经验的基础上,总结出了软件工程(会计学)人才培养的特点和存在的问题,并提出了相应的解决措施,以期更加完善具有会计学背景的复合型、应用型软件工程人才培养体系.  相似文献   

9.
王竹云 《消费导刊》2009,(11):18-20
我国软件业与世界先进国家相比,差距甚远,其主要原因是软件工程化技术没有得到广泛的应用。今天,软件开发不再是软件开发人员的个人行为而是团队行为,对软件开发机构来说,如何在要求的时间内、合理的投资下保质保量地交付软件产品是一个巨大的挑战。无论是在软件水平最高的美国还是在我国,软件开发项目超期、超预算、最终的软件产品的质量不能使最终用户满意等问题,都是困扰软件开发机构的重大问题。本文从建立专职质量提升组织、软件开发过程的质量识别与控制、完善的测试手段与软件过程能力成熟度模型的应用等方面来叙述提高软件的质量控制的途径。  相似文献   

10.
基于构件技术的软件工程方法,将整个软件开发过程划分为构件开发和构件组装两大部分。在构件组装工具的研究中,涉及到体系结构、构件模型、构件描述语言、构件组装机制、组装工具的可视化等多个方面。面向互联网应用的构件组装中间件技术是近年来研究的热点。本文介绍了目前主流的构件组装模型及其最佳实现方法,通过几个案例,展示了国内业界在这一领域的研究成果。  相似文献   

11.
Interaction effects in software piracy   总被引:2,自引:0,他引:2  
The paper presents an exploratory attempt to analyse self-reported leniency toward software piracy systematically, using an approach based on empirical factors, rather than ethical factors. The empirical factors studied were: (i) social acceptance of software piracy; (ii) the cost of original software; (iii) urgency of the subject's need for software; (iv) availability of original software; (v) knowledge of computer software copyright law; (vi) gender; (vii) monthly household income; and (viii) education level. It provides new insights to software companies and government officials who are developing programmes to promote the concept of anti-piracy among software consumers. This is also the first exploratory research to study the interaction effects among factors influencing the reported leniency towards software piracy, at the individual level.  相似文献   

12.
This paper examines the relationship between the rate of software diffusion and piracy. Literature suggests that tolerating some piracy can be justified since it speeds up software diffusion. The question is, how much should be tolerated? Using innovation diffusion models of software adoption by legal buyers and pirates, answers to this question are obtained for the three scenarios of monopoly, multiple generations of software and competitive markets. Results include, for example, that a monopoly should start with minimum protection of its software but well before the product has diffused half way, impose maximum protection and maintain it thereafter. The results provide important strategic guidelines for firms in the software industry for managing piracy.  相似文献   

13.
Efforts to counter software piracy are an increasing focus of software publishers. This study attempts to develop a profile of those who illegally copy software by looking at undergraduate and graduate students and the extent to which they pirate software. The data indicate factors that can be used to profile the software pirater. In particular, males were found to pirate software more frequently than females and older students more than younger students, based on self-reporting. Ronald R. Sims is the Floyd Dewey Gottwald Professor of Business Administration, The College of William and Mary. He is the author or coauthor of more than sixty articles and eleven books. His two most recent books are: Ethics and Organizational Decision Making: A Call for Renewal and Corporate Misconduct: The Legal, Societal and Management Issues.Hsing Kenneth Cheng is Assistant Professor of Information Technology at the Graduate School of Business Administration, The College of William and Mary. His research interests include information systems economics, managing the risks of computer system breakdowns, and analyzing the impacts and policy implications of information technology on society.  相似文献   

14.
介绍了卫星技术的发展对未来载荷软件设计的要求,提出了层次化设计这样一种新的 思路。通过对载荷软件功能的分析、提炼和抽象,将载荷软件划分为相对独立的3个层次, 即 系统层、协议层和应用层,采用这样的分层架构设计,可以最大限度地实现软件的高内聚、 低耦合,提高软件的可移植性、可重用性和可靠性,节省研制时间及成本。  相似文献   

15.
The design, manufacture, distribution, and sale of software constitutes a rapidly growing and remarkably lucrative global industry. Leaders of most software companies understand that intellectual property rights (IPR) typically are vital to competitive advantage and company success. Theft of intellectual property (IP) in the form of software piracy is brazen, extremely costly, lowers incentives to innovate, and threatens the very existence of some companies. IP theft, therefore, is a daunting challenge for managers of software firms. In this article, we make several contributions that should prove helpful to software designers, managers, responsible users, and broad stakeholders of software innovation and use—that is, almost all of us. In doing so, we provide an overview of international legal, ethical, economic, and systemic considerations, and we share an analysis of the drivers of consumer software piracy. We then discuss strategic considerations and introduce a decision-making typology, which may help legitimate companies to devise strategies and tactics to manage their software IP in the face of widespread piracy.  相似文献   

16.
信息物理融合系统(CPS)软件可信性建模是CPS可信软件开发过程中至关重要的一环,现有的形式化方法、软件验证技术并不适合对CPS软件可信性动态演化进行描述和分析。在深入分析CPS可信软件动态演化过程的基础上,结合非线性动力学的基本理论和方法,研究CPS软件可信性演化的动力学机制,对CPS软件在内外双重因素影响下的可信性演化过程进行建模,并分析其可信性演化规律,为CPS软件可信性研究提供了一种新手段。通过对一个工业控制领域中CPS软件的建模与分析,验证了该方法的可行性。  相似文献   

17.
This study examines the persistence of software piracy with internet penetration vis-à-vis of PC users, conditional on Intellectual Property Rights (IPRs) institutions. The empirical evidence is based on a panel of 99 countries for the period 1994–2010 and the Generalised Method of Moments. The main finding is that, compared to internet penetration, PC usage is more responsible for the persistence of global software piracy. Knowing how technology affects the persistence of piracy is important because it enables more targeted policy initiatives. We show that the sensitivity of software piracy to IPR mechanisms is contingent on the specific technology channels through which the pirated software is consumed.  相似文献   

18.
针对无人机控制站难以与多型无人机互联互通的问题,从通用控制软件的角度开展研究,分析了设计需求,提出了一种采用平台+插件的软件架构,并分析了软件架构、基于XML技术的帧格式信号和参数信息描述、动态报文解析和组包、软件界面定制等关键技术。在车载控制站和便携控制站的工程验证表明,所提解决方案实现了对多型无人机的控制,具有良好的通用性、扩展性,并支持用户自定义对外通信协议和人机交互功能、界面。  相似文献   

19.
通过分析影响机载数据质量的因素,建立了机载软件数据传输模型。提出了机载软件数据质量的定性评价方法,按照机载软件对于数据的需求及相关工业标准要求,总结了层次化的机载软件数据质量评价参数。根据不同安全关键等级的数据需求,提出了针对性的数据质量确认、验证方法及其实现。本研究对于机载软件数据库的审定和机载软件数据质量的验证有一定的理论价值。  相似文献   

20.
Situational determinants of software piracy: An equity theory perspective   总被引:10,自引:0,他引:10  
Software piracy has become recognized as a major problem for the software industry and for business. One research approach that has provided a theoretical framework for studying software piracy has been to place the illegal copying of software within the domain of ethical decision making assumes that a person must be able to recognize software piracy as a moral issue. A person who fails to recognize a moral issue will fail to employ moral decision making schemata. There is substantial evidence that many individuals do not perceive software piracy to be an ethical problem. This paper applies social exchange theory, in particular equity theory, to predict the influence of situational factors on subjects' intentions to participate in software piracy. Consistent with the predictions of equity theory this study found that input and outcome situational variables significantly effect a person's intentions to commit software piracy.Richard S. Glass is an Assistant Professor of Computer Information Systems at Bryant College in Smithfield RI. His current research interests include the ethical use of information technology, decision making, decision support systems and expert systems.Wallace A. Wood is a Professor of Computer Information Systems at Bryant College in Smithfield RI. His current research interests include the ethical use of information technology and the effective use of information systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号