skip to main content
article
Free Access

Accommodating uncertainty in software design

Published:01 May 1984Publication History
Skip Abstract Section

Abstract

Recognition that most software is domain dependent (DD) is extremely important because the most commonly used software life-cycle models are not adequate for DD software. The nature of DD software, and the need to manage its life cycle effectively, calls for a new approach to software design and the implementation of software development environments.

References

  1. 1 Belady, L.A. Evolved software for the 80s. Computer (Feb. 1979), 79-82.Google ScholarGoogle Scholar
  2. 2 Boehm, B.W. Software engineering. IEEE Trans. Comput. C-25 (Dec. 1976), 1226-1241.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Giddings, R.V, A graphics-oriented computer system to support environmental decision-making. In Computer Graphics and Environmental Planning, E. Teicholz and B. Berry, Eds. Prentice-Hall, Englewood Cliffs, N.J., 1983.Google ScholarGoogle Scholar
  4. 4 Hammer, M. What is office automation? Off. Autom. Memo 12, Laboratory for Computer Science. Massachusetts Institute of Technology, Cambridge, Jan. 1980.Google ScholarGoogle Scholar
  5. 5 Lehman, M.M. Programs, life cycles, and laws of software evolution. Proc. IEEE 68, 9 (Sept. 1980), 1060-1076.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6 Martin, J. What to plan for to manage the future of your data center. Can. Datasyst. 9, 3 (Mar. 1977), 28-32.Google ScholarGoogle Scholar
  7. 7 Parnas, D.L. Designing software for ease of extension and contraction. IEEE Trans. Comput. SE-5, 2 (Mar. 1979), 128-137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Wasserman, A.I., and Belady, L.A. Software engineering: The turning point. Computer (Sept. 1978), 30-39.Google ScholarGoogle Scholar
  9. 9 Wilner, W.T. Recursive Machines. Rep. P.800054, Xerox Palo Alto Research Center, Palo Alto, Calif., June 1980.Google ScholarGoogle Scholar

Index Terms

  1. Accommodating uncertainty in software design

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in

                    Full Access

                    • Published in

                      cover image Communications of the ACM
                      Communications of the ACM  Volume 27, Issue 5
                      May 1984
                      85 pages
                      ISSN:0001-0782
                      EISSN:1557-7317
                      DOI:10.1145/358189
                      Issue’s Table of Contents

                      Copyright © 1984 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 May 1984

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • article

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader