Nothing Special   »   [go: up one dir, main page]

Skip to main content

Software System Theory of the Forbidden Within Discrete Design

  • Conference paper
  • First Online:
Software Technologies (ICSOFT 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 743))

Included in the following conference series:

Abstract

Many “theoretical” frameworks have been proposed for software systems design with a plethora of techniques, scopes and degrees of sophistication. However, a clear delineation of the forbidden in software design terms is almost universally absent in all these frameworks. This absence is surprising, as other engineering disciplines obviously display forbidden regions. This paper claims that an acceptable software design theory should clearly demarcate the forbidden in contrast to the possible. Algebra is argued to be the mathematical field appropriate to determine boundaries of forbidden regions. To this end, a spectral approach is demonstrated, in which matrix eigenvectors play a central role. Such boundaries of forbidden regions are illustrated by a case study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Abbot, J.J., Marayong, P., Okamura, A.M.: Haptic virtual fixtures for robot-assisted manipulation. In: Thrun, S., Brooks, R., Durrant-Whyte, H. (eds.) Robotics Research. Springer Tracts in Advanced Robotics, vol. 28, pp. 49–64. Springer, Berlin (2007). doi:10.1007/978-3-540-48113-3_5

    Chapter  Google Scholar 

  2. Aneja, Y.P., Parlar, M.: Algorithms for weber facility location in the presence of forbidden regions and/or barriers to travel. Transp. Sci. 28(1), 70–76 (1994). doi:10.1287/trsc.28.1.70

    Article  MATH  Google Scholar 

  3. Brooks, F.P.: The Mythical Man-Month - Essays in Software Engineering – Anniversary. Addison-Wesley, Boston (1995)

    Google Scholar 

  4. Devadas, V., Aydin, H.: Real-time dynamic power management through device forbidden regions. In: Proceeding IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 34–44 (2008). doi:10.1109/RTAS.2008.21

  5. Exman, I.: Linear software models, extended abstract. In: Jacobson, I., Goedicke, M., Johnson, P. (eds.) Proceeding. GTSE 2012, SEMAT Workshop on a General Theory of Software Engineering, pp. 23–24. KTH Royal Institute of Technology, Stockholm (2012)

    Google Scholar 

  6. Exman, I.: Linear Software Models, GTSE 2012, SEMAT Workshop on a General Theory of Software Engineering. KTH Royal Institute of Technology, Stockholm (2012). Video presentation of Ref. [5]: http://www.youtube.com/watch?v=EJfzArH8-ls

  7. Exman, I.: Linear software models: standard modularity highlights residual coupling. Int. J. Softw. Eng. Knowl. Eng. 24(2), 183–210 (2014). doi:10.1142/S0218194014500089

    Article  Google Scholar 

  8. Exman, I.: Linear software models: decoupled modules from modularity matrix eigenvectors. Int. J. Softw. Eng. Knowl. Eng. 25(8), 1395–1426 (2015). doi:10.1142/S0218194015500308

    Article  Google Scholar 

  9. Exman, I., Sakhnini, R.: Linear software models: modularity analysis by the Laplacian matrix. In: Proceeding 11th International Joint Conference on Software Technologies, ICSOFT-PT, vol. 2, pp. 100–108, Lisbon, Portugal (2016). doi:10.5220/0005985601000108

  10. Exman, I., Speicher, D.: Linear software models: equivalence of modularity matrix to its modularity lattice. In: Proceeding 10th ICSOFT International Joint Conference on Software Technologies, Colmar, France, pp. 109–116 (2015). doi:10.5220/0005557701090116

  11. Exman, I.: Software theory of the forbidden in a discrete design space. In: Proceeding 11th International Joint Conference on Software Technologies, ICSOFT-PT, vol. 2, pp. 131–137. Lisbon, Portugal, SciTePress (2016a). doi:10.5220/0006004601310137

  12. Exman, I.: The modularity matrix as a source of software conceptual integrity. In: Proceeding SKY 2016 - 7th International Workshop on Software Knowledge, Porto, Portugal, pp. 27–35. SciTePress (2016b)

    Google Scholar 

  13. Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns. Addison-Wesley, Boston (1995)

    MATH  Google Scholar 

  14. Jackson, D.: Conceptual design of software: a research agenda. CSAIL Technical report, MIT-CSAIL-TR-2013-020 (2013). http://dspace.mit.edu/bitstream/handle/1721.1/79826/MIT-CSAIL-TR-2013-020.pdf?sequence=2

  15. Li, X.-Y., Guo, L.: Constructing affinity matrix in spectral clustering based on neighbor propagation. Neurocomputing 97, 125–130 (2012). doi:10.1016/j.neucom.2012.06.023

    Article  Google Scholar 

  16. Messiah, A.: Quantum Mechanics, vol. I. North-Holland Publishing Co., Amsterdam (1961). Chap. III, Reprinted by Dover Publications (2014)

    MATH  Google Scholar 

  17. Payandeh, S., Stanisic, Z.: On application of virtual fixtures as an aid for telemanipulation and training. In: Proceeding HAPTICS 2002 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, pp. 18–23 (2002). doi:10.1109/HAPTIC.2002.998936

  18. Particle in a Box. https://en.wikipedia.org/wiki/Particle_in_a_box

  19. Simon, H.A.: The Sciences of the Artificial, 3rd edn. MIT Press, Cambridge (1996)

    Google Scholar 

  20. Slinky (2016a). https://en.wikipedia.org/wiki/Slinky

  21. Slinky, Wave Phase changes at fixed end (2016b). http://hyperphysics.phy-astr.gsu.edu/hbase/sound/slinkv.html#c1

  22. Standing wave (2016a). https://upload.wikimedia.org/wikipedia/commons/7/7d/ Standing_wave_2.gif

  23. Standing wave, Standing waves on a Slinky (2016b). http://hyperphysics.phy-astr.gsu.edu/hbase/sound/slnksw.html#c1

  24. Sullivan, K.J., Griswold, W.G., Cai, Y., Hallen, B.: The structure and value of modularity in software design. In: Proceeding ESEC/FSE 8th European Software Engineering Conference and 9th SIGSOFT International Symposium Foundations Software Engineering, pp. 99–108. ACM (2001). doi:10.1145/503209.503224

  25. UML, Specification, OMG (Object Management Group) (2015). http://www.omg.org/spec/UML/

  26. Weisstein, E.W.: Laplacian Matrix, From Mathworld–A Wolfram Web Resource (2016). http://mathworld.wolfram.com/LaplacianMatrix.html

  27. Wu, Y., Patel, J.M., Jagadish, H.V.: Estimating answer sizes for XML queries. In: Jensen, C.S. et al. (ed.) EDBT 2002. LNCS, vol. 2287, pp. 590–608. Springer, Heidelberg (2002). doi:10.1007/3-540-45876-X_37

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iaakov Exman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Exman, I. (2017). Software System Theory of the Forbidden Within Discrete Design. In: Cabello, E., Cardoso, J., Ludwig, A., Maciaszek, L., van Sinderen, M. (eds) Software Technologies. ICSOFT 2016. Communications in Computer and Information Science, vol 743. Springer, Cham. https://doi.org/10.1007/978-3-319-62569-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62569-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62568-3

  • Online ISBN: 978-3-319-62569-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics