752 Subject Index
components (continued)
services v., 514–18
testing, 216–19
computation independent models (CIMs), 140, 141
Computer-Aided Software Engineering tools. See
CASE tools
computer misuse, 14
concept reuse, 192, 426–27
conceptual views, 154, 172
concern-oriented requirements engineering, 577–80
concerns, separation of, 567–71
confidentiality, 14
configuration control, 684
configuration item, 684
configuration management (CM), 193, 195–96, 202,
681–704. See also change management
activities of, 195–96
architectural patterns and, 155
release management and, 682, 699–701, 702
system building and, 682, 684, 693–99, 702
version management and, 195, 682, 690–93, 702
workflow for, 52
consistency, 86, 87, 110, 603
constants, naming of, 363
construction phase (RUP), 51
consumer/producer processes (circular buffer), 544
context models, 121–24, 142, 179–81
contingency plans (risk management), 601
continuous CMMI model, 727–28
continuous integration, 65, 66, 68, 76, 78, 697, 698
control
application frameworks and, 434
security and, 303, 304
control identification (security requirements), 331
Controller component (MVC), 155
control/predictor measurements, 669
controls, architectural patterns for, 164
coordination services, 519, 534
copyright infringement, 14, 158, 450, 501
CORBA (Common Object Request Broker
Architecture), 454, 478, 482, 483, 496, 507
costs. See also estimation techniques
COCOMO II and, 642
dependability and, 294–95
fault removal, 343
formal specification, 336
maintenance/development, 244, 257
overhead, 620
software engineering, 6
software reuse and, 448
system failure, 290
COTS-based reuse, 36, 440–48
COTS-integrated systems, 445–48
COTS-solution systems, 442–44
COTS (commercial-off-the-shelf) systems, 35, 177,
276–77
CRF (change request form), 686
critical systems
agile methods and, 60, 348
business, 248, 291, 324, 387, 390
defined, 291
failure of, 290–91, 306
process assurance and, 407
SPARK/Ada language and, 336
critical systems engineering, 60, 336, 347, 348, 407, 419
Crystal, 59, 78, 80
customer involvement (agile methods), 60, 62, 65,
239, 633
customization
component model and, 459
COTS and, 440, 442
embedded systems and, 699
software products and, 7, 440
CVS, 691, 692, 704
cyclomatic complexity, 247, 668, 669, 670, 672,
673, 679
D
damage limitation, 302, 319
damages, 301
data acquisition systems, 553, 554, 560, 569
database design, 40
database support (WAFs), 433
data clumping, 251
data collection system architecture (weather station),
182, 183
data collection systems, 11
data-driven modeling, 134–35
data-flow diagrams (DFDs), 134
data management and communications layer, 264–65
data mining, 497
data reengineering, 249, 250
debugging, 41, 211, 223
decentralized P2P architecture, 500
Decorator pattern, 192
default input processing, 360–61
defect testing, 41, 206, 211, 224, 227, 401, 402, 585
demands, software failures and, 4