Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Software Reuse: Methods, Models, Costs, second edition
Software Reuse: Methods, Models, Costs, second edition
Software Reuse: Methods, Models, Costs, second edition
Ebook665 pages9 hours

Software Reuse: Methods, Models, Costs, second edition

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This book is an updated edition of the previous McGraw-Hill edition, which was an essential guide to successful reuse across the entire software life cycle. It explains in depth the fundamentals, economics, and metrics of software reuse. The bottom line is good news for designers of complex systems: Systematic software reuse can succeed, even if the underlying technology is changing rapidly.

Software reuse has been called the central technical concept of object-oriented design. This book covers reuse in object-oriented systems, but goes far beyond in its coverage of complex systems – the type that may evolve into “systems of systems.”

Important new material has been added to this edition on the changed state-of-the-art and state-of-the-practice of software reuse, on product-line architectures, on the economics of reuse, on the maintenance of COTS-based systems. A case study using DoDAF (The Department of Defense Architectural Framework) in system design has been included to show some new thinking about reuse and some attributes of large-scale components of very large systems.

After an introduction to basics, the book shows you how to:

1. Access reuse and disadvantages for your systems.
2.Understand and use domain analysis.
3.Estimate total costs, including maintenance, using life-cycle-based models.
4.Organize and manage reuse libraries.
5.Certify software components that have been created at any phase of the software life cycle your organization uses.
6.Implement systematic reuse using COTS (commercial, off-the-shelf) components and other existing software.

The book includes several models and reengineering checklists, as well as important case studies. These models and checklists help anyone faced with the problem of whether to build, buy, reuse, or reengineer any software component, system, or subsystem of reasonable complexity. Such components, subsystems, and systems often fit into the new paradigms of service-oriented architectures (SOA) and software-as-a-service (SaAS).

Software Reuse: Methods, Models, Costs emphasizes the cost efficient development of high-quality software systems in changing technology environments. Our primary example of domain analysis, which is the analysis of software into potentially reusable artifacts, often at a higher level than simply source code modules, is the assessment of possibilities for reuse in the Linux kernel.

There are eight chapters in Software Reuse: Methods, Models, Costs: What is Software Reuse?, Techniques (which included domain analysis), Reuse Libraries, Certification of Reusable Software Components, The Economics of Software Reuse, Reengineering, Case Studies, and Tools For Software Reuse.

LanguageEnglish
Release dateMay 10, 2013
ISBN9781301139187
Software Reuse: Methods, Models, Costs, second edition
Author

Ronald J. Leach

About the Author I recently retired from being a professor of computer science at Howard University for over 25 years, with 9 of those years as a department chair.  (I was a math professor for 16 years before that.)  While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States.  We also established a graduate certificate program in computer security, which became the largest certificate program at the university.  I had major responsibility for working with technical personnel to keep our department’s hundreds of computers functional and virus-free, while providing email service to several hundred users.  We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems. As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads.  I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications.  My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists.  More than 5,000 people have attended my lectures on identity theft; many others have seen them on closed-circuit television. I have written more than twenty books, and more than 120 technical articles, most of which are in technical areas. My interests in data storage and access meshed well with my genealogical interests when I wrote the Genealogy Technology column of the Maryland Genealogical Society Journal for several years.   I was the editor or co-editor of that society’s journal for many years.

Read more from Ronald J. Leach

Related to Software Reuse

Related ebooks

Software Development & Engineering For You

View More

Related articles

Reviews for Software Reuse

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Software Reuse - Ronald J. Leach

    |Zcbook_preview_excerpt.html}rX mVDRI, MPRa&b^cO2gLPER{"Lr󝃗W/,ɫۏ2y S6^~#v 'Q=~I:26h]yDˢ.<'nrYvVms/ɢæN-mFY5 c6㰶"n;'Qiet\Uݴȧy2$7&̈́W{{E'vqME^&Y޺H/ytvД%,'M܇. woȢYLOjá:vwg?xt bf<&[Vwyt@[+4OҼmijO]ޤUZdè|-`Gxv8g.OLD0xOC[w2.[y( ":,MZQ?^4_v/Ë  @ ⎼ v^NLdToTYvS(ϝa)㩎Rm%\膙Wފ+&K $QoFY(}A;4 ;/[F˫%%Ii6h/*[뀍GDESnb]`Ǿ#<ӟO軜Y5dz9ޥȉ=Yx/:8:~s|0:>?O_Eo> /gGgW|ÔSe {BxlA6zm lUoHT*+~?9x HKv_ >pW=AE3 eW}wrsOxGƖ7]t,54KL ll5q לe*99k5[x0,b6/r"PyQGla0h$~t(::8?;?=>D u3 %ҩm)*2SU>2ڲ.L K@i<-v\ml0pt¤1;}^{BW_'%/ jP6x7{=+<~ҽu⿌JCTĺjZnh&Lg}Fr(.b<_y8pD0҆꽎| {,2\mʓ+;#"kn9ǏǡAЙmW2z!XW?n <f,f!9~Rri$5WIoO4͜ b8f4h}@"D \”Ey-"Go.688ESV/=sk= rov/\YL`T-wx~t0uQs`@x ig TI68&KCK^DGW/ wxv*洒TD?1Ej ~ j tT6eNuwNwcS {x#hv=Txh;4WmB+?Ы`w]qa([qWR[3`i!fbs"xdzdo^DW"7W;Y,)T30^|;ԧ[nQ˯gɺ@/`L ҙzZ_}W|T C aho 덥Ԋ!sGq" cHAIb;0#x{f76;iÛ\<: zbˀQ)L8|ig(j ¯0nyPò_~3rm}i1淰~ %tĘ+%9 /IW^{cֱvWevCڳa@xHC Nt߁6;ۡ>C3#a8oA>gn:o5'a ϫ~; yi @2nx؂{n-J=q=<98fW `ӻ Ot_4+ V`7z3v`c{7@_~|uDqf"^u]^~Un6}prtqdτ83-M`3pX` GFT=6Ӽ/ȓD2KbZ `̔VC# d5ݢ{s}åX/1򄘟D\xk2e\T5G _K 6Yh AL+܎E| ];VbM2c3i@megeQ䝾[LiJ#HUE:8,.YQ8U:ZC"i-e1c\w +!!.L0 7dqf7H2`~J李T =P7.C;A*p$TqzEk8^x>5JT @ X -f6%ʼaQx&Cf6[ޛڈ9Ĥh@@ZaXxa7VJ 2"@$aV1`~S3MкAuh/#1> jw1FGiGm@G곱.d='c)c[8LIHiWd]0I6wY9ArFp{TQ}ekKEH؄  3Oydهigv@hWİ :l='ёC-  )zehʘ/EOy(RM8,}mfrjjF!hGJPGO K. Za=b{S |OJ.^~|J! r CB{cg5HZ\%v$zZG9[^^2\S"0W(@D!^79)@'EUug6`_QU"GYvK\Uks^L'xd}uV,w>Gef6bsQb&H+V $3Y QD>İ`CZ5%f0US&p@$k74FXJ y,̙Yd'1XK-9bgCeD f,B ŝ~CGI}xiyIPdh1.Q|?V"&EWDZ$njC?o`aB_S@ZZi$4]:oՓHAf<ͨ7lbd(˙[1>U]R*sEaK wˬ% Sc>SK6D"N"yE<먛^=]|]W4]D'.eLbX-?gg 2-$8L #k(@2M/T:DMxJ+S%kL`dpDkũ$MaA{ɖ=*]*"u\ N6pZZٌlo9 U#֐ЈIˉVE#QqGy?b6pxW{z`ۗ&ϣl>U+H*Z]A.ǎ9pơ tQƝu,uv΀ut"&8@i1q|_hd|{4gat z\yzt,tn7ymu џ`*y *DmQ|H r “nѧK^yϹPX/c4P.(Z> j0FY;΁90"+^J*u>-~'a HbZ+`VXx bqل2:_RԀ2mEqjR=*(@X ݛ a\c4aPBew=ѰڈR't|3(9>(J~@Y}.#3)OhL- 3r,"L픣w$I<\:tմh2'7d-j+F52.W]I  nrS1r2U̱/nksΈn`(k:P`IOf(K]].+vy=At&Ip!O䓐PJ56Yk䌆n{`WSqh] H :/C6\`< #1CˑCdS}G@?I{ ”Gcd1tI xoOag hK':9?`Kf&1 cTXTU tuyt N)\do$, pKzH>0Uq" 9 `j% y#H /CCC0R%5q2t<<eNYy #$A7ZhsWf8e?_A`,N&VDp`TAwβqCJI%:h +rӤk~7dܹ, VS da=5Tƙ{pSϑF}aV-;&夷{׼ev HV (XN! uf,F\ UF8x:&bVST. 3\R=&ߦ%}|FPiq7N(I>r-CΠY r2ߪjnж"Z ]&K YX?s )`=iӸArc*'Hrl.Lvo0WgThwס 譇qu!AIPc.*\vCD{njҊm9sNixW%)&96ƺg" pj sEA#(RvV%jU :G(t9!N Ê2W eYb-1i-]Ki)~ !g < AsT%bQ,t9!y!ŃԴ*TIu!R!^{"r@);L E5,vMAQ*OC훊OY͟+{u O=^S)ܗxcX ´nP˲Ye9ҳʞŞ`6.o 5 r l(AwZ%70a%(mCSFvi0ضZ*窱\0O\B jsxm+cme2N!@nåcGܐN0{x9 `L5AXD_tԕ֭.6&nEOZ .[L:;'hRϯrɋ *&凿~ W|X /\ݠ;feV tNxW__n{-.LK:P#h Um+s]+ywйLpf=#cJn p)A:wCi`}T5VԹ0wb.Ā#K+0R+K: JJ' ~ovoksha+IV,>Q/PLmBZ6!*BRuJirؔ#o c l m,+IR+d= A qROjl^A 6s-[ $./4>0³'F\Ïi/=M 62T-ù3WC%|*H[Iۄq/^q Ic\=&( @slHG.ro/1(õ׋4:w ^+%b_nRijF*ՖH1.U;0 ňb2(k*1 wc|phVrBxOU&? Af4~;$*#dR a@)9'=$CK,\ gk5H ,B/Hiw*J;fn>UCsL~`7堚U/@N#y{4s\.^0Q]`B/,TB[0$~6 :c2]ٲc׏J G&֒]s?B'@7<(~{]Np5cV^L2&RYڤ5o"ٻOvJ xЦ|%m'`0VRObU+}OjйmʕH\?Kfs{Ao}>:IMZ" SefcȢXjWnL M\2Ƙn5o@V!;\4uA@Y|H>.w;$kq4$v"ެᜪ*TӨ}Rے UJ3nONï,Q'K'k]T) /*ɷ:~ sJҟ~]ٚWxCaA|O*" 57);O׮iM_lœ0\jtcl;}I{ Kq %EcBZpqׂ}_V_Z4WJN_C,
    Enjoying the preview?
    Page 1 of 1