Archive for the ‘Reuse Books and Papers’ Category

Virginia Tech – Software Reuse and Domain Engineering Lab

February 13, 2010

http://www.cs.vt.edu/node/698

ICSR11 Proceedings on Google Books

January 26, 2010

http://rmc.ncr.vt.edu/forum/index.php/topic,303.msg397.html#msg397

ICSR11 Accepted Papers

July 23, 2009

http://icsr11.isase.org/index.php/attendees/program.html

Upcoming book on PLE

May 25, 2009

Applied Software Product-line Engineering

Author: Kyo C. Kang, Sooyong Park, Vijayan Sugumaran
Format: Hardcover
Publish Date: November 2009
ISBN-10: 1420068415
ISBN-13: 9781420068412
List Price: $89.95

Computing Research Repository

May 19, 2009

http://arxiv.org/corr/home

John Favaro Blog – Agile and Reuse

April 14, 2009

#mce_temp_url#

ICSR 10 Proceedings Available

July 29, 2008
10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings
Book Series Lecture Notes in Computer Science
Publisher Springer Berlin / Heidelberg
ISSN 0302-9743 (Print) 1611-3349 (Online)
Volume Volume 5030/2008
DOI 10.1007/978-3-540-68073-4
Copyright 2008
ISBN 978-3-540-68062-8
Subject Collection Computer Science
SpringerLink Date Tuesday, July 29, 2008

DARE bibliography

July 24, 2008

Frakes, W., Prieto-Diaz, R., & Fox, C. (1998). “DARE: Domain Analysis and Reuse Environment”. Annals of Software Engineering (5), , pp. 125-141.

This is the main paper describing DARE.

Frakes, W., R. Prieto-Diaz, and C. Fox. “DARE-COTS A Domain Analysis Support Tool”. in XVII International Confernce of the Chilean Computer Society. 1997. Valparaiso, Chile: IEEE Computer Society Press. pp. 73-77.

Describes a version of DARE built using COTS tools.

Frakes, W. (2000, Nov. 6-9). “A Method for Bounding Domains”. In IASTED International Conference Software Engineering and Applications 2000 (SEA 2000), Las Vegas, NV:

This paper describes the domain bounding method used in the current version of DARE.

DAREonline: A Web-Based Domain Engineering Tool
Raimundo F. Dos Santos and William B. Frakes, Proceedings of ICSR11, 2009

describes an online version of DARE Р  http://208.29.54.207:8080/dareonline/

Frakes, W.B. and Kyo Kang, (2005), “Software Reuse Research: Status and Future”, IEEE Transactions on Software Engineering, 31(7), July, pp. 529-536.

An overview of reuse and domain engineering providing a brief description of DARE and other domain engineering methods.

Edelman, A., Frakes, W.B., and Lillie, C. (2008). SAM: Simple API for Object-Oriented Code Metrics. 10 International Conference on Software Reuse. H. Mei. Beijing, Springer. LNCS 5030: 347-359.

Describes the use of DARE to analyze part of the software metrics domain and the development of a domain implementation for metrics tools.

Generating Text Search Applications for Databases. Omar Alonso. May 2003. IEEE Software, Volume 20 Issue 3. Publisher: IEEE Computer Society Press

Describes the use of DARE at Oracle Corp.

Alonso, O., & Frakes, W. B. (2000, August 10-13th). “DARE-Web: Domain Analysis in a Web Environment”. In AMCIS 2000 Americas Conference on Information Systems, . Long Beach, CA:

Describes a web based implementation of DARE.

Frakes, Bill, “Linking Domain Analysis and Domain Implementation”, Proceedings of Fifth ¬†International Conference on Software Reuse. 1998. Victoria, BC: IEEE CS Press, pp. 348-349.

Describes how the outputs of DARE can serve as inputs to the design of an application generator.

Yilmaz, O. and W. B. Frakes (2009). A Case Study of Using Domain Analysis for the Conflation Algorithms Domain. 11th International Conference on Software Reuse. Falls Church, VA Springer.

Describes the use of DARE to analyze and create a generator for conflation algorithms.

Journal of the Brazilian Computer Society Special Software Reuse Issue

March 13, 2008

Journal of the Brazilian Computer Society Special Issue on Software Reuse

Software Architecture Refs

March 1, 2008

From Tom Plunkett
Software IT Architect
Fairfax, VA
Here are some references and links. Some of the web links may be IBM
internal only. Some of these references are duplicated (I gathered from
several sources).

References
? IBM Global Services Method
?http://method.ibm.com
? Software Architecture in Practice, Bass, Clements, and Kazman,
Addison-Wesley, 2003

Tom Gilb, Software Engineering Management, ISBN 0-201-19246-2
? IEEE Software Engineering Committee, IEEE Recommended
Practice for Software Requirements Specifications, ISBN 1-55937-
395-4
? Defining Nonfunctional Requirements, GS Method Technique
Paper
? Shaw and Garlan, Software Architecture, Perspectives on an
Emerging Discipline, ISBN 0-13-182957-2
? Bass, Clements and Kazman, Software Architecture in Practice,
ISBN 0-201-19930-0
? Barry Boehm and Hoh In, “Identifying Quality-Requirement
Conflicts”, IEEE Software, 2 March 1996, pp. 25-35

? IBM System Journal, Vol 38, No. 1, 1999. Special issue on Enterprise
Solutions
Structure
? http://www.research.ibm.com/journal/sj38-1.html
? UML Distilled, Martin Fowler and Kendal Scott, Addison-Wesley, 1999,
ISBN: 0-
201-65783-X.
? UML Components, John Cheesman & John Daniels, Addison-Wesley, 2000,
ISBN: 0-201-70851-0:
? http://www.umlcomponents.com
? A System of Patterns: Pattern Oriented Software Architecture, Frank
Buschmann et al, Wiley, 1996, ISBN: 0-471-95869-7.
? Software Architecture Documentation in Practice: Documenting
Architectural
Layers, Felix Bachmann et al, SEI, 2000:
? http://www.sei.cmu.edu/ata/ata_init.html
? Architectural Blueprints?The ?4+1? View Model of Software Architecture,
Philippe Kruchten, Rational Software Corp, 1995:
? http://www-306.ibm.com/software/rational/

e-business patterns
? http://www.ibm.com/software/developer/web/patterns/

[Coad 92] Object-Oriented Patterns, P. Coad; CACM, 9/
[Gamma 93] Design Patterns: Abstraction and Reuse of Object-Oriented
Design,
Gamma, et al.; ECOOP ’93
[Johnson 92] Documenting Frameworks using Patterns, R. Johnson; OOPSLA
’92
[Lloyd 99] Technical Reference Architectures, P. T. L. Lloyd and Dr.
Galambos; IBM
Systems Journal, Volume 38, No.1, 1999
(www.research.ibm.com/journal/sj/381/lloyd.html)
[Plachy 99] Enterprise Solutions Structure, E. Plachy and P. Hauser; IBM
Systems
Journal, Volume 38, No.1, 1999
(www.research.ibm.com/journal/sj/381/plachy.html)
[Youngs 99] A standard for architecture description, R. Youngs, D.
Redmond-Pyle, P.
Spaas, and E. Kahan.; IBM Systems Journal, Volume 38, No.1, 1999
(www.research.ibm.com/journal/sj/381/youngs.html)
URL Links
Enterprise Solution Structure Knowledge Network:
w3.ibm.com/services/icm-assetweb/ess.nsf?opendatabase
Patterns for e-business: http://www.ibm.com/developerworks/patterns
Patterns Library: http://hillside.net/patterns/
Events /Conferences
Pattern Languages of Programs (PLoP), ChiliPLoP, EuroPLoP, KoalaPLoP,
Mensore PLoP,
SugarLeaf PLoP, Viking PLoP
Object-Oriented Programming Systems, Languages, and Applications
(OOPSLA)
European Conference on Object-Oriented Programming (ECOOP)

Complex Cost Benefit Analysis – Principles of Corporate Finance
by Richard Brealey and Stewart
?http://www.mindtools.com
Designing for Availability technique paper?IBM Global Services
Method:
?http://method.ibm.com
Method for Analyzing System Availability (MASA)
?https://w3-1.ibm.com/services/kportal search for MASA
Disaster Recovery Planning – Strategies for Protecting Critical
Information Assets by Jon William Toigo. Has a foreword by
Todd Graham of IBM Global Services.
Scalability
? IBM WebSphere V5.1 Performance, Scalability, and High Availability, IBM
Redbook SG24-
6198
? Implementing a Scalable Architecture, Microsoft Corporation, November
2002,
http://nti.raleigh.ibm.com/Development/Conferences/Launch2003/IT/Scalarch.doc
? On Demand Operating Environment: An Overview and Implementation Guide,
IBM
Redpaper REDP3858
Legacy Integration:
? Enterprise Integration Patterns, Greg Hohpe et al, Addison Wesley, ISBN:
20040-321-20068-
3, http://www.enterpriseintegrationpatterns.com/
reserved.
Security:
? A Method for Designing Secure Solutions, J.J Whitmore, IBM Systems
Journal, September
2001, http://researchweb.watson.ibm.com/journal/sj/403/whitmore.html
? Enterprise Security Architecture Using IBM Tivoli Security Solutions,
IBM Redbook SG24-
6014,
? Secrets and Lies: Digital Security in a Networked World, Bruce Schneier,
John Wiley, 2000,
ISBN: 0-471-25311-1, http://www.schneier.com/book-sandl.html
Systems Management:
? ITIL – IT Infrastructure Library,
http://www-1.ibm.com/services/us/index.wss/of/its/a1000429
? Designing Tivoli Solutions for End-to-End Systems and Service
Management, IBM Redbook
SG24-5104
Usability:
? IBM Ease of Use, http://www.ibm.com/easy
? User Experience Portal, http://ue.torolab.ibm.com/ue/portal
? User Centred Design,
http://ue.torolab.ibm.com/ue/pages/html/C7/started!2Fucd_main.html
? User-Centered Design: An Integrated Approach, K Vredenburg et al,
Prentice Hall, 2001,
ISBN 0-130-91295-6
Accessibility:
? The Access Board, http://www.access-board.gov
? Section 508, http://www.section508.gov

? IEEE Recommended Practice for Architectural Description
IEEE-Std 1471-2000
? ?The 4+1 View Model of Architecture,? P. Krutchen, IEEE Software
12(6).
http://www.rational.com/media/whitepapers/Pbk4p1.pdf
? Software Architecture Documentation in Practice: Documenting
Architectural Layers, F. Bachmann et al, CMU/SEI 2000.
http://www.sei.cmu.edu/publications/documents/00.reports/00sr004.html