Software architecture risk containers

3Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Our motivation is to determine whether risks such as implementation error-proneness can be isolated into three types of containers at design time. This paper identifies several container candidates in other research that fit the risk container concept. Two industrial case studies were used to determine which of three container types tested is most effective at isolating and predicting at design time the risk of implementation error-proneness. We found that Design Rule Containers were more effective than Use Case and Resource Containers.

Cite

CITATION STYLE

APA

Leigh, A., Wermelinger, M., & Zisman, A. (2017). Software architecture risk containers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10475 LNCS, pp. 171–179). Springer Verlag. https://doi.org/10.1007/978-3-319-65831-5_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free