Preface |
|
xvii | |
Acknowledgments |
|
xxi | |
Authors |
|
xxiii | |
Section I: Introduction |
|
|
Chapter 1 An Overview of Knowledge Maps |
|
|
5 | (24) |
|
1.1 Introduction: Key Concepts-Software Stable Models, Knowledge Maps, Pattern Language, Goals, Capabilities (Enduring Business Themes + Business Objects) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
1.5 Overview of Software Stability Concepts |
|
|
8 | (1) |
|
1.6 Overview of Knowledge Maps |
|
|
8 | (1) |
|
1.7 Pattern Languages versus Knowledge Maps: A Brief Comparison |
|
|
9 | (2) |
|
|
11 | (1) |
|
1.9 Knowledge Maps Methodology or Concurrent Software Development Model |
|
|
11 | (3) |
|
|
14 | (2) |
|
1.10.1 Research Methodology Undertaken |
|
|
14 | (1) |
|
1.10.2 Research Verification and Validation |
|
|
15 | (1) |
|
1.10.3 The Stratification of This Book |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (3) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (9) |
|
Chapter 2 Abstraction: Knowledge Maps, Stability, and Patterns |
|
|
29 | (20) |
|
|
29 | (1) |
|
2.2 Levels of Abstraction in Knowledge Maps |
|
|
30 | (1) |
|
2.3 Mapping Elements in Knowledge Maps to Software Stability Concepts and Patterns |
|
|
31 | (1) |
|
2.4 The Software Stability Model |
|
|
32 | (7) |
|
|
33 | (1) |
|
|
34 | (1) |
|
2.4.3 Knowledge Maps: Formation and Stable Architectural Patterns |
|
|
35 | (1) |
|
2.4.4 Development Scenarios |
|
|
36 | (2) |
|
2.4.5 Deployment and Verification and Validation |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (8) |
Section II: Goals of the Knowledge Maps |
|
|
Chapter 3 The Goals: Significance and Identification |
|
|
49 | (24) |
|
|
49 | (1) |
|
3.2 Significance of Goals |
|
|
50 | (3) |
|
3.2.1 An Example: A Simple E-Commerce Application |
|
|
52 | (1) |
|
3.3 Dealing with Goals: Extraction and Assessment |
|
|
53 | (2) |
|
3.4 Extracting the Goals of a Discipline: The Process |
|
|
55 | (3) |
|
3.4.1 Dealing with Subgoals |
|
|
57 | (1) |
|
3.5 Goals of Knowledge Maps |
|
|
58 | (4) |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
60 | (2) |
|
|
62 | (1) |
|
3.6.1 Use an Analogy: Marriage or Friendship |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (2) |
|
|
67 | (6) |
|
Chapter 4 Discovery Stable Analysis Pattern |
|
|
73 | (36) |
|
|
73 | (1) |
|
4.2 Discovery Stable Analysis Pattern |
|
|
74 | (25) |
|
4.2.1 Pattern Name: Discovery Stable Analysis Pattern |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (3) |
|
4.2.4.1 Functional Requirements |
|
|
76 | (2) |
|
4.2.4.2 Nonfunctional Requirements |
|
|
78 | (1) |
|
4.2.5 Challenges and Constraints |
|
|
78 | (2) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (6) |
|
|
83 | (3) |
|
|
86 | (1) |
|
|
86 | (4) |
|
4.2.8.1 Case Study 1: Discovery of a New Vitamin K |
|
|
86 | (4) |
|
4.2.9 Related Patterns and Measurability |
|
|
90 | (2) |
|
|
90 | (1) |
|
|
91 | (1) |
|
4.2.10 Modeling Issues, Criteria, and Constraints |
|
|
92 | (1) |
|
4.2.10.1 Modeling Heuristics |
|
|
92 | (1) |
|
4.2.11 Design and Implementation Issues |
|
|
92 | (2) |
|
4.2.11.1 Delegation versus Inheritance |
|
|
93 | (1) |
|
4.2.11.2 Model Implemented with Delegation |
|
|
93 | (1) |
|
|
94 | (1) |
|
4.2.13 Formalization Using Object Constraint Language, Z++ or Object Z, and/or Extended Backus-Naur Form |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
97 | (1) |
|
4.2.14.2 Business Integration |
|
|
98 | (1) |
|
4.2.14.3 Business Enduring Themes |
|
|
98 | (1) |
|
|
98 | (1) |
|
4.2.16 Tips and Heuristics |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (2) |
|
|
105 | (4) |
|
Chapter 5 The Knowledge Stable Analysis Pattern |
|
|
109 | (26) |
|
|
109 | (1) |
|
5.2 Pattern Documentation |
|
|
110 | (18) |
|
5.2.1 Pattern Name: Knowledge Stable Analysis Pattern |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (2) |
|
5.2.4.1 Functional Requirements |
|
|
111 | (2) |
|
5.2.4.2 Nonfunctional Requirements |
|
|
113 | (1) |
|
5.2.5 Challenges and Constraints |
|
|
113 | (1) |
|
5.2.6 Solution: Pattern Structure and Participants |
|
|
114 | (6) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (5) |
|
5.2.7 Applicability with Illustrated Examples |
|
|
120 | (7) |
|
5.2.7.1 Scenario 1-Autonomic Computing Context |
|
|
120 | (3) |
|
5.2.7.2 Scenario 2-CRM System |
|
|
123 | (4) |
|
5.2.8 Related Patterns and Measurability |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Review Questions 129 Exercise |
|
|
130 | (1) |
|
|
130 | (5) |
Section III: Knowledge Map Capabilities |
|
|
Chapter 6 Capabilities: The Heart of Business |
|
|
135 | (22) |
|
|
135 | (9) |
|
6.1.1 The Heart of the Business |
|
|
135 | (2) |
|
6.1.2 Work Flow Metaphor-Workhorses |
|
|
137 | (1) |
|
6.1.3 Dealing with Capabilities: Identification and Assessment |
|
|
137 | (2) |
|
6.1.3.1 The Impact of BO on Creating Multiple Applications: Generality |
|
|
139 | (1) |
|
6.1.3.2 BO = Stable Design Patterns |
|
|
139 | (1) |
|
6.1.3.3 Essential Properties of BO |
|
|
139 | (1) |
|
6.1.4 A Goal with No Capability |
|
|
139 | (1) |
|
6.1.5 A Capability with No Goal |
|
|
140 | (1) |
|
6.1.6 Identification Process of Capabilities: An Example |
|
|
141 | (3) |
|
6.2 Capabilities of Knowledge Maps |
|
|
144 | (4) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (2) |
|
|
152 | (5) |
|
Chapter 7 AnyMap Stable Design Pattern |
|
|
157 | (58) |
|
|
157 | (3) |
|
7.2 Pattern Documentation |
|
|
160 | (47) |
|
7.2.1 Pattern Name: AnyMap Stable Design Pattern |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (7) |
|
7.2.4.1 Functional Requirements |
|
|
162 | (6) |
|
7.2.4.2 Nonfunctional Requirements |
|
|
168 | (1) |
|
7.2.5 Challenges and Constraints |
|
|
169 | (2) |
|
|
169 | (1) |
|
|
170 | (1) |
|
7.2.6 Solution Structure and Participants |
|
|
171 | (7) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (6) |
|
|
178 | (1) |
|
7.2.8 Applicability with Illustrated Examples |
|
|
178 | (10) |
|
7.2.8.1 Case Study 1: Navigation-Google Road Map for Planning Driving Routes |
|
|
178 | (4) |
|
7.2.8.2 Case Study 2: Mathematical Mapping |
|
|
182 | (6) |
|
7.2.9 Related Patterns and Measurability |
|
|
188 | (3) |
|
7.2.9.1 Traditional Model versus SSM |
|
|
188 | (2) |
|
|
190 | (1) |
|
7.2.10 Modeling Issues, Criteria, and Constraints |
|
|
191 | (2) |
|
|
191 | (2) |
|
7.2.11 Design and Implementation Issues |
|
|
193 | (1) |
|
|
194 | (8) |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
205 | (1) |
|
7.2.16 Tips and Heuristics |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (2) |
|
|
209 | (1) |
|
|
210 | (1) |
|
Indexing and Dictionary Search |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (4) |
|
Chapter 8 AnyContext Stable Design Pattern |
|
|
215 | (16) |
|
|
215 | (1) |
|
8.2 Pattern Documentation |
|
|
216 | (10) |
|
8.2.1 Pattern Name: AnyContext Stable Design Pattern |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
8.2.5 Challenges and Constraints |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
8.2.6 Solution: Pattern Structure and Participants |
|
|
218 | (14) |
|
|
220 | (1) |
|
|
221 | (1) |
|
8.2.6.3 Applicability with Illustrated Examples |
|
|
221 | (5) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (4) |
Section IV: Knowledge Maps, Development, and Deployment |
|
|
Chapter 9 Knowledge Maps: System of Patterns |
|
|
231 | (32) |
|
|
231 | (1) |
|
9.2 Representation of Knowledge Maps: Structure, Quality Factors, and Properties |
|
|
232 | (15) |
|
9.2.1 Structure of the Knowledge Maps |
|
|
233 | (15) |
|
9.2.1.1 The Notation Used in Knowledge Map Structures |
|
|
233 | (1) |
|
9.2.1.2 Knowledge Map Template |
|
|
234 | (2) |
|
9.2.1.3 Structure of Knowledge Maps and Its Relationship with UML |
|
|
236 | (3) |
|
9.2.1.4 Quality Factors in Knowledge Maps |
|
|
239 | (1) |
|
9.2.1.5 Properties of Knowledge Maps |
|
|
240 | (7) |
|
9.3 Knowledge Maps versus Traditional Pattern Languages |
|
|
247 | (1) |
|
|
248 | (3) |
|
|
248 | (2) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (2) |
|
|
253 | (2) |
|
|
255 | (1) |
|
|
255 | (8) |
|
Chapter 10 Development Scenarios: Setting the Stage |
|
|
263 | (18) |
|
|
263 | (1) |
|
10.2 Implementation Issues of the Knowledge Maps |
|
|
264 | (8) |
|
10.2.1 Type versus Class within TOP |
|
|
264 | (2) |
|
10.2.2 Design Type Specification Template |
|
|
266 | (1) |
|
10.2.2.1 Design Type Specification Template 1: EBT |
|
|
267 | (1) |
|
10.2.2.2 Design Type Specification Template 2: BO |
|
|
267 | (1) |
|
10.2.3 The Uses of Contracts in the Specification of Design Types |
|
|
267 | (1) |
|
10.2.4 The Hook Specification Template |
|
|
268 | (1) |
|
10.2.5 Specification of the User Model or Storyteller |
|
|
268 | (3) |
|
10.2.5.1 Packages Overview |
|
|
269 | (2) |
|
|
271 | (1) |
|
10.3 Aspect-Oriented Modeling |
|
|
272 | (6) |
|
10.3.1 Aspects as Core Design Features in a System |
|
|
273 | (1) |
|
10.3.2 Difference between the Aspect-Oriented Design Approach and SSM |
|
|
274 | (2) |
|
10.3.3 Identification of Whether Aspects Will Be All the EBTs and All the BOs in a System |
|
|
276 | (1) |
|
10.3.4 Understanding Whether Aspects in AOP Will Represent either EBTs or BOs of SSM in a System |
|
|
277 | (1) |
|
10.3.5 Comparison between Extraction of Aspects in AOP, EBTs, and BOs in SSM |
|
|
277 | (1) |
|
10.3.6 Modeling EBTs and BOs as Aspects |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Chapter 11 Deployment, Verification and Validation, and Quality Factors |
|
|
281 | (10) |
|
|
281 | (1) |
|
11.2 Deployment of Knowledge Maps |
|
|
282 | (2) |
|
11.2.1 The Conceptual Point of View of Deployment |
|
|
282 | (1) |
|
11.2.2 The Practical Point of View of Deployment |
|
|
283 | (1) |
|
11.3 The Quality Factors of Deployment |
|
|
284 | (1) |
|
11.4 Deployment-V&V Process |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (3) |
Section V: Case Studies of the Knowledge Maps |
|
|
Chapter12 Knowledge Map Engine: Initial Work |
|
|
291 | (12) |
|
|
291 | (1) |
|
12.2 Interfaces Supported by the Knowledge Map Engine |
|
|
291 | (1) |
|
12.3 Implementations of the Interfaces |
|
|
292 | (2) |
|
|
294 | (3) |
|
12.5 Construction Heuristics of Engines |
|
|
297 | (1) |
|
12.6 The Hooking Facility of the Knowledge Map Engine |
|
|
298 | (3) |
|
12.6.1 An Example: Creating Associations between BOs and IOs |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
Chapter 13 CRC Cards Knowledge Map |
|
|
303 | (34) |
|
|
303 | (1) |
|
13.2 What Makes Effective CRC Cards |
|
|
304 | (1) |
|
13.3 CRC Cards Knowledge Classification |
|
|
305 | (2) |
|
13.4 Toward a Knowledge Map for CRC Cards |
|
|
307 | (2) |
|
13.4.1 Goals or Classification |
|
|
307 | (1) |
|
13.4.2 Capabilities or Properties |
|
|
307 | (1) |
|
13.4.3 Development Scenarios |
|
|
308 | (1) |
|
|
308 | (1) |
|
13.4.5 Family of Patterns-Bird's-Eye View |
|
|
308 | (1) |
|
13.5 Knowledge Map for CRC Cards |
|
|
309 | (16) |
|
13.5.1 The Main Step in the Classification |
|
|
309 | (1) |
|
13.5.2 Pattern 1-Brainstorming Stable Analysis Pattern |
|
|
310 | (3) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (2) |
|
|
313 | (1) |
|
13.5.3 Pattern 2-Engagement Stable Analysis Pattern |
|
|
313 | (2) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
13.5.3.4 Example: Conceptual Map Creation |
|
|
314 | (1) |
|
13.5.4 Pattern 3-CRC Card Modeling Stable Analysis Pattern |
|
|
315 | (4) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (2) |
|
13.5.5 The Main Step in the Capability |
|
|
319 | (1) |
|
13.5.6 Pattern 4-Effective CRC Card Format Pattern |
|
|
319 | (42) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (4) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (2) |
|
|
327 | (8) |
|
|
335 | (2) |
|
Chapter 14 Future Work and Conclusions |
|
|
337 | (4) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
Appendix A: Pattern Documentation Templates |
|
341 | (10) |
|
A.1 Pattern Documentation-Detailed Template (Preferred) |
|
|
341 | (9) |
|
A.2 Pattern Documentation-Short Template |
|
|
350 | (1) |
Appendix B: Other Templates |
|
351 | (6) |
|
B.1 Fayad's Class Responsibility and Collaboration Card Layout |
|
|
351 | (1) |
|
B.2 Fayad's Use Case Template |
|
|
351 | (1) |
|
B.3 Fayad's Stable Analysis/Design/Architectural Patterns (Layout) |
|
|
352 | (1) |
|
B.3.1 Stable Analysis Pattern or Stable Design Pattern Layout (1 EBT and 2-14 BOs) |
|
|
352 | (1) |
|
B.3.2 Stable Architectural Patterns Layout (2-5 EBTs Where 3 Is the Most Common) |
|
|
353 | (1) |
|
B.4 Fayad's Stable Analysis/Design Pattern Applications Layout |
|
|
353 | (1) |
|
B.4.1 Stable Analysis Pattern or Stable Design Pattern Applications Layout |
|
|
353 | (1) |
|
B.4.2 Stable Architectural Pattern Applications Layout |
|
|
354 | (1) |
|
B.5 Fayad's Knowledge Map Template |
|
|
354 | (3) |
Appendix C: Stable Patterns Catalog |
|
357 | (2) |
|
C.1 Stable Analysis Patterns |
|
|
357 | (1) |
|
C.2 Stable Design Patterns |
|
|
357 | (2) |
Appendix D: Sample Requirements |
|
359 | (46) |
|
D.1 Ocean Resources Management System |
|
|
359 | (6) |
|
|
359 | (1) |
|
D.1.2 Description of Domain |
|
|
359 | (1) |
|
|
360 | (1) |
|
D.1.4 Description of the Program That Is Wanted |
|
|
360 | (1) |
|
D.1.5 Detailed Requirements |
|
|
361 | (2) |
|
D.1.5.1 Functional Requirements |
|
|
361 | (2) |
|
D.1.5.2 Nonfunctional Requirements |
|
|
363 | (1) |
|
D.1.6 Use Case and User Context |
|
|
363 | (2) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
D.2 Dengue Fever Prevention and Outbreak Management System |
|
|
365 | (4) |
|
|
365 | (1) |
|
D.2.2 Description of Domain |
|
|
365 | (1) |
|
D.2.3 Description of the Program That Is Required |
|
|
366 | (1) |
|
D.2.4 Detailed Requirements |
|
|
366 | (1) |
|
D.2.5 Use Cases and User Context |
|
|
367 | (2) |
|
|
369 | (1) |
|
D.3 Organizing Cricket World Cup |
|
|
370 | (6) |
|
|
370 | (1) |
|
D.3.2 Description of the Program That Is Wanted |
|
|
370 | (1) |
|
D.3.3 Detailed Requirements |
|
|
371 | (2) |
|
D.3.4 Use Cases and User Context |
|
|
373 | (3) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (5) |
|
D.4.1 Description of Domain |
|
|
376 | (1) |
|
|
377 | (1) |
|
D.4.3 Description of the Program That Is Wanted |
|
|
377 | (1) |
|
D.4.4 Detailed Requirements |
|
|
377 | (1) |
|
D.4.4.1 Functional Requirements |
|
|
377 | (1) |
|
D.4.4.2 Nonfunctional Requirements |
|
|
378 | (1) |
|
D.4.5 Use Cases and User Context |
|
|
378 | (3) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
D.5 Natural Disaster Tracking System |
|
|
381 | (6) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
D.5.7 Description of the Domain |
|
|
383 | (1) |
|
|
383 | (1) |
|
D.5.9 Use Cases and User Context |
|
|
384 | (2) |
|
D.5.9.1 Use Case: Gather Satellite Information |
|
|
384 | (1) |
|
D.5.9.2 Use Case: Communicate with Media |
|
|
384 | (1) |
|
D.5.9.3 Use Case: Manage and Model Data |
|
|
384 | (1) |
|
D.5.9.4 Use Case: Backup and Transfer Information |
|
|
384 | (1) |
|
D.5.9.5 Use Case: Monitor in Real Time |
|
|
385 | (1) |
|
D.5.9.6 Use Case: Gather Remote Aerial Sensor Data |
|
|
385 | (1) |
|
D.5.9.7 Use Case: Correlate Information |
|
|
385 | (1) |
|
D.5.9.8 Use Case: Allocate and Manage Resources |
|
|
385 | (1) |
|
D.5.9.9 Use Case: Track Natural Disasters |
|
|
386 | (1) |
|
D.5.10 Detailed Requirements |
|
|
386 | (1) |
|
D.5.10.1 Nonfunctional Requirements |
|
|
386 | (1) |
|
D.5.10.2 Functional Requirements |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
D.6 Global Warming Control System |
|
|
387 | (6) |
|
D.6.1 Description of the Domain |
|
|
389 | (1) |
|
D.6.2 Description of the Program That Is Required |
|
|
389 | (1) |
|
D.6.3 Detailed Requirements |
|
|
390 | (1) |
|
D.6.3.1 Functional Requirements |
|
|
390 | (1) |
|
D.6.3.2 Nonfunctional Requirements |
|
|
391 | (1) |
|
|
391 | (2) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (5) |
|
D.7.1 Description of the Domain |
|
|
393 | (1) |
|
D.7.2 Description of the Program That Is Wanted |
|
|
394 | (1) |
|
D.7.2.1 Detailed Requirements |
|
|
395 | (1) |
|
D.7.3 Use Cases and User Context |
|
|
395 | (3) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (7) |
|
|
398 | (1) |
|
|
398 | (1) |
|
D.8.3 Description of Domain |
|
|
398 | (1) |
|
D.8.4 Jurassic Park Block Diagram |
|
|
399 | (3) |
|
D.8.4.1 Description of the Program That Is Wanted |
|
|
399 | (1) |
|
D.8.4.2 Detailed Requirements |
|
|
400 | (2) |
|
|
402 | (2) |
|
D.8.5.1 Use Case 1: Attack by Velociraptor, While Releasing |
|
|
402 | (1) |
|
D.8.5.2 Use Case 2: Tour at the Park |
|
|
402 | (1) |
|
D.8.5.3 Use Case 3: Attempt to Steal Dinosaur Embryo |
|
|
402 | (1) |
|
D.8.5.4 Use Case 4: Attack Due to Park's Shut Down Security System |
|
|
402 | (1) |
|
D.8.5.5 Use Case 5: Visiting Paleontologist and Children Hike to Safety |
|
|
403 | (1) |
|
D.8.5.6 Use Case 6: Attempt to Restart Computer and Power |
|
|
403 | (1) |
|
D.8.5.7 Use Case 7: Children and Visiting Paleontologist Reach the Shelter |
|
|
403 | (1) |
|
D.8.5.8 Use Case 8: Children Are Attacked by Raptors |
|
|
403 | (1) |
|
D.8.5.9 Use Case 9: Raptors Attack the Control Room |
|
|
403 | (1) |
|
D.8.5.10 Use Case 10: Escape from the Island |
|
|
404 | (1) |
|
|
404 | (1) |
References |
|
405 | (12) |
Index |
|
417 | |