- pcm This document is about Algorithm.
- TFT-PROJECT 128 TFT 屏的驱动 可以话直线 圆等等 还有assic字库调用 7*14大小
- rfc2388 defines multipart/form
- TR A maze Robot program.
- On-Adaptive-Energy-Efficient-Transmission-in-WSNs An adaptive energy efficient protocol with the paper and the entire source code. Program deals in energy
- DLAccesoDiario Document for conect
文件名称:RiskThemes-2
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:333.47kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
The output of 18 software architecture evaluations are analyzed
to find patterns in the risk themes identified in the evaluations.
The major results are:
• A categorization of risk themes
• The observation that twice as many risk themes are risks of
“omission” as are risks of “commission”.
• A failure to find a relationship between the business and
mission goals of a system and the risk themes from an
evaluation of that system.
• A failure to find a relationship between the domain of a system
being evaluated and the risk themes associated with the
development of that system.
The results of this investigation have application to practitioners
by suggesting activities on which developers should put greater
focus. They also have application to researchers by suggesting
further areas of investigation.-The output of 18 software architecture evaluations are analyzed
to find patterns in the risk themes identified in the evaluations.
The major results are:
• A categorization of risk themes
• The observation that twice as many risk themes are risks of
“omission” as are risks of “commission”.
• A failure to find a relationship between the business and
mission goals of a system and the risk themes from an
evaluation of that system.
• A failure to find a relationship between the domain of a system
being evaluated and the risk themes associated with the
development of that system.
The results of this investigation have application to practitioners
by suggesting activities on which developers should put greater
focus. They also have application to researchers by suggesting
further areas of investigation.
to find patterns in the risk themes identified in the evaluations.
The major results are:
• A categorization of risk themes
• The observation that twice as many risk themes are risks of
“omission” as are risks of “commission”.
• A failure to find a relationship between the business and
mission goals of a system and the risk themes from an
evaluation of that system.
• A failure to find a relationship between the domain of a system
being evaluated and the risk themes associated with the
development of that system.
The results of this investigation have application to practitioners
by suggesting activities on which developers should put greater
focus. They also have application to researchers by suggesting
further areas of investigation.-The output of 18 software architecture evaluations are analyzed
to find patterns in the risk themes identified in the evaluations.
The major results are:
• A categorization of risk themes
• The observation that twice as many risk themes are risks of
“omission” as are risks of “commission”.
• A failure to find a relationship between the business and
mission goals of a system and the risk themes from an
evaluation of that system.
• A failure to find a relationship between the domain of a system
being evaluated and the risk themes associated with the
development of that system.
The results of this investigation have application to practitioners
by suggesting activities on which developers should put greater
focus. They also have application to researchers by suggesting
further areas of investigation.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
RiskThemes-2.pdf
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
