Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Enhanced Intelligent Risk Divination Using Added Quality Attributes Injected ATAM and Design Patterns
N.Sankar Ram, Paul Rodrigues
Pages - 27 - 34 | Revised - 15-04-2008 | Published - 30-04-2008
MORE INFORMATION
KEYWORDS
ABSTRACT
Architectural Tradeoff Analysis Method is a method for evaluation of architecture-level designs and identifies trade-off points between attributes, facilitates communication between stakeholders. ATAM has got the limitations like not a predictor of quality achievement, not deals more quality attributes, Efficiency always depends on the expertise and potential of stakeholders. In this paper we have proposed a system which uses ATAM to predict the risk analysis, with more possible quality attributes. We have used artificial intelligence to predict the risk of the SA based on the Knowledge base of the Stakeholder Experts.
1 | Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291. |
A. BinSubaih, S.C. Maddock (2006), "Using ATAM to Evaluate a Game-based Architecture", Workshop on Architecture-Centric Evolution (ACE 2006), Hosted at the 20th European Conference on Object-Oriented Programming ECOOP 2006, July 3-7, 2006, Nantes, France. | |
Adrian G. Bors, “Introduction of the Radial Basis Function (RBF) Networks”, Department of Computer Science, University of York, UK. | |
Ali Babar, M., Kitchenham, B., “Assessment of a Framework for Comparing Software Architecture Analysis Methods”, in Proceedings of the 11th International Conference on Evaluation and Assessment in Software Engineering, 2007, Keele, England. | |
Arnon Rotem-Gal-Oz, “Architecture Tradeoff Analysis Method“ www.rgoarchitects.com/Files / ATAM.ppt. | |
“Software Architecture for Software-Intensive Systems” from www.sei.cmu.edu/architecture /ata_ method.html | |
Bate, I. and N. Audsley (2002): “Architecture Trade-off Analysis and the Influence on Component Design”. Proceedings of Workshop on Component-Based Software Engineering: Composing Systems from Components | |
Beck, K. “Implementation Patterns” Pearson Education, Proceedings of the 18th International Conference on Software Engineering. October 2007. | |
Biffl S., Denger C., Elberzhager F., Winkler D.: "Quality Assurance Tradeoff Analysis Method (QATAM) - An Empirical Quality Assurance Planning and Evaluation Framework", Technische Universität Wien, Technical Report IFS-QSE-07/04, 2007 | |
Bors, A.G., Pitas, I., (1999) " Object classification in 3-D images using alpha-trimmed mean radial basis function network," IEEE Trans. on Image Processing, vol. 8, no. 12, pp. 1744-1756. | |
Broomhead, D.S., Lowe, D. (1988) “Multivariable functional interpolation and adaptive networks," Complex Systems, vol.2, pp.321-355. | |
Cha, I., Kassam, S.A., (1996) " RBFN restoration of nonlinearly degraded images," IEEE Trans. on Image Processing, vol. 5, no. 6, pp. 964-975. | |
Chatzis, V., Bors, A. G., Pitas, I., (1999) "Multimodal decision-level fusion for person authentification," IEEE Trans. on Systems, Man, and Cybernetics, part A: Systems and Humans, vol. 29, no.6, pp. 674-680. | |
DEFSTAN 00-55, “The Procurement of Safety Critical Software in Defence Equipment: Part 1 Requirements & Part 2: Guidance.” UK Ministry of Defence, 1 August 1997. | |
Dongyun Liu “Mapping requirements to software architecture by feature-orientation” Hong Mei in Institute of Software, School of Electronics Engineering and Computer Science Peking University, Beijing 100871, P.R.China. | |
Dulce Domingos et al., “Workflow Access Control from a Business Perspective” In Proceedings of the 6th International Conference on Enterprise Information Systems (ICEIS’ 04) | |
Femi G. Olumofin and Vojislav B. Mi?si´c ” Extending the ATAM Architecture Evaluation to Product Line Architectures” in Department of Computer Science, University of Manitoba Winnipeg, Manitoba, Canada R3T 2N2 June 2005. | |
Freeman, Eric; Elisabeth Freeman, Kathy Sierra, and Bert Bates (2004). “Head First Design Patterns”. O'Reilly Media. | |
Gabriel Richard (1996). “Patterns of Software: Tales from the Software Community”. Oxford University Press. | |
Gamma Erich, Richard Helm, Ralph Johnson, and John Vlissides (1995). “Design Patterns: Elements of Reusable Object-Oriented Software”, hardcover, 395 pages, Addison-Wesley. | |
Haykin, S. (1994) “Neural Networks: A comprehensive Foundation”. Upper Saddle River, NJ; Prentice Hall. | |
Houmb, Siv Hilde; Georg, Geri; Jürjens, Jan; France, Robert: “An Integrated Security Verification and Security Solution Design Trade-Off Analysis Approach”. Integrating Security and Software Engineering: Advances and Future Visions / Mouratidis, Haralambos; Giorgini, Paolo: Idea Group Inc, 2006, 190-219 | |
Liming Zhu, Muhammad Ali Babar, Ross Jeffery” Distilling Scenarios from Patterns for Software Architecture Evaluation – A Position Paper” EWSA 2004: 225-229. | |
Mildred N. Ambe, Frederick Vizeacoumar ” Evaluation of two architectures Using the Architecture Tradeoff Analysis Method (ATAM)”, 2002. | |
N. Sankar Ram And Dr.Paul Rodrigues " Intelligent Risk Prophecy Using More Quality Attributes Injected ATAM and Design Patterns" 7th WSEAS Int. Conf. on Software Engineering, Parallel And Distributed Systems (SEPADS '08),University of Cambridge, UK, Feb 20-22, 2008 | |
Panda, Sudhanshu S., Chakraborty, Debabrata, and Pal, Surjya K., “Prediction of Drill Flank Wear Using Radial Basis Function Neural Network”, Proceedings of the National Conference on Soft Computing Techniques for Engineering Applications, NIT Rourkela, 2006, pp. 94-102. | |
Paul Clements, John Bergey and Dave Mason,” Using the SEI Architecture Tradeoff Analysis Method to Evaluate WIN-T: A Case Study” CMU SEI Technical Note CMU/SEI-2005-TN-027. Software Engineering Institute, Pittsburgh, PA, 2005. | |
R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. Lipson, and J. Carriere, “The Architecture Tradeoff Analysis Method”, Proceedings of ICECCS'98, 8-1-1998. | |
R.L. Nord, M.R. Barbacci, P. Clements, R. Kazman, M. Klein, L. O'Brien, J.E. Tomayko, “Integrating the Architecture Tradeoff Analysis Method (ATAM) with the cost benefit analysis method (CBAM)”, CMU SEI Technical Note CMU/SEI-2003-TN-038, Software Engineering Institute, Pittsburgh, PA, 2003. | |
Sunyoung Lee, Sungzoon Cho, and Patrick Wong "Rainfall Prediction using Artificial Neural Networks", Journal of Geographic Information and Decision Analysis, Vol. 2, No. 2, pp. 253-264, 1998. | |
Wei, G.-Q., Hirzinger, G., (1997) " Parametric shape -from-shading by radial basis functions, " IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 353-365. | |
Zhou, Guozhong, McCalley, James D. and Honavar, Vasant (1997) “Power System Security Margin Prediction Using Radial Basis Function Networks”. Technical Report TR97-10, Department of Computer Science, Iowa State University. | |
Dr. N.Sankar Ram
Professor - India
sankarramphd@yahoo.com
Dr. Paul Rodrigues
Computer Science and Engineering - India
|
|
|
|
View all special issues >> | |
|
|