Comparison and Choice of Computational Architectures Based on Cost-Value Approach
DOI:
https://doi.org/10.5753/isys.2021.968Keywords:
Engenharia de Requisitos, Elicitação de requisitos, requisitos não funcionais, arquitetura computacional, avaliação de custo-benefícioAbstract
Software engineers make use of several computational architectures (CA) to host an application, such as desktop, web, and cloud computing ar- chitectures. As the requirements vary according to the desired CA, developers may face two problems: determining which requirement better fulfills a CA and determining which CA fulfills a given set of requirements. This paper presents a new approach based on the Cost-Value Approach (CVA). We have slightly modified the CVA method (SCVA method) and also developed a new method for choosing the most appropriate CA (MMACA method). Our results provide a set of requirements ordered by priority for each CA. Finally, we discuss the current and most appropriate CA for a real project solution.
Downloads
Referências
[Achimugu et al. 2014] Achimugu, P., Selamat, A., Ibrahim, R., and Mahrin, M. N. (2014).A systematic literature review of software requirements prioritization research.Infor-mation and Software Technology, 56(6):568–585
[Agarwal et al. 2013] Agarwal, E., Aharwal, R., Garg, R. D., and Garg, P. K. (2013). De-lineation of groundwater potential zone: An AHP/ANP approach.Journal of EarthSystem Science, 122(3):887–898.
[Ahuja et al. 2016] Ahuja, H., Sujata, and Purohit, G. N. (2016). Understanding require-ment prioritization techniques. In5th International Conference on Computing, Com-munication and Automation (ICCCA), pages 257–262, Greater Noida, India. IEEE.
[Armbrust et al. 2009] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Kon-winski, A., Lee, G., Patterson, D. A., Rabkin, A., and Zaharia, M. (2009). Above theclouds: A berkeley view of cloud computing. Technical report.
[Beaty et al. 2009] Beaty, K., Kochut, A., and Shaikh, H. (2009). Desktop to cloud trans-formation planning. In23rd IEEE International Symposium on Parallel & DistributedProcessing (IPDPS), pages 1–8, Rome, Italy. IEEE.
[Belout and Gauvreau 2004] Belout, A. and Gauvreau, C. (2004).Factors influencingproject success: the impact of human resource management.International Journalof Project Management, 22(1):1 – 11.
[Bessa et al. 2016] Bessa, S., Valente, M. T., and Terra, R. (2016). Modular Specification of Architectural Constraints. In10th Brazilian Symposium on Software Components,Architectures and Reuse (SBCARS), pages 31–40, Maring ́a, PR, BR. SBC.
[Bhandari and Sehgal 2014] Bhandari, P. and Sehgal, R. (2014). An evaluation of methods to prioritize requirements.International Journal of Computer Science and MobileComputing, 3(4):1336–1341.
[Boehm and Huang 2013] Boehm, B. and Huang, L. (2013). Value-Based Software Engi-neering: Reinventing “Earned Value” Monitoring and Control .ACM Software Engi-neering Notes, 28(2):1–7.
[Bonomi et al. 2012] Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012). Fog Comput-ing and Its Role in the Internet of Things. In1st Workshop on Mobile Cloud Computing(MCC), pages 13–16, New York, NY, USA. ACM.
[Bourque and Fairley 2014] Bourque, P. and Fairley, R. E. (2014).SWEBOK: Guide to theSoftware Engineering Body of Knowledge. IEEE Computer Society.
[Chaudhary et al. 2016] Chaudhary, P., Chhetri, S. K., Joshi, K. M., Shrestha, B. M., andKayastha, P. (2016). Application of an Analytic Hierarchy Process (AHP) in the GISinterface for suitable fire site selection: A case study from Kathmandu MetropolitanCity, Nepal.Socio-Economic Planning Sciences, 53(1):60–71.
[Chiam et al. 2013] Chiam, Y. K., Staples, M., Ye, X., and Zhu, L. (2013). Applying a Selec-tion Method to Choose Quality Attribute Techniques.Inf. Softw. Technol., 55(8):1419–1436.
[Chien et al. 2003] Chien, A., Calder, B., Elbert, S., and Bhatia, K. (2003). Entropia: archi-tecture and performance of an enterprise desktop grid system.Journal of Parallel and Distributed Computing, 63(5):597–610.
[Chieu et al. 2009] Chieu, T. C., Mohindra, A., Karve, A. A., and Segal, A. (2009). Dy-namic scaling of web applications in a virtualized cloud computing environment. In6th International Conference on E-Business Engineering (ICEBE), pages 281–286,Macau, China. IEEE.
[Christensen 2009] Christensen, J. H. (2009). Using RESTful web-services and cloud com-puting to create next generation mobile applications. In24th International ConferenceCompanion on Object Oriented Programming Systems Languages and Applications(OOPSLA), pages 627–634, Portland, Oregon, USA. ACM.
[Chung et al. 2006] Chung, L., Hung, F., Hough, E., and Ojoko-Adams, D. (2006). Secu-rity Quality Requirements Engineering (SQUARE): Case Study Phase III (CMU/SE-2006-SR-003). Technical report, Software Engineering Institute, Carnegie Mellon Uni-versity, Pittsburgh.
[Cunsolo et al. 2009] Cunsolo, V. D., Distefano, S., Puliafito, A., and Scarpa, M. (2009).Volunteer computing and desktop cloud: The Cloud@Home paradigm. In8th Inter-national Symposium on Network Computing and Applications (NCA), pages 134–139,Cambridge, MA, USA. IEEE.
[Cyr and Francis 1992] Cyr, L. and Francis, K. (1992). Measures of clinical agreementfor nominal and categorical data: The kappa coefficient.Computers in Biology andMedicine, 22(4):239 – 246.
[Dorado et al. 2014] Dorado, R., G ́omez-Moreno, A., Torres-Jiménez, E., and López-Alba,E. (2014). An AHP application to select software for engineering education.ComputerApplications in Engineering Education, 22(2):200–208.
[dos Santos et al. 2016] dos Santos, J. R. F., Albuquerque, A. B., and Pinheiro, P. R. (2016).Requirements Prioritization in Market-Driven Software: A Survey Based on LargeNumbers of Stakeholders and Requirements. In10th International Conference onthe Quality of Information and Communications Technology (QUATIC), pages 67–72,Lisbon, PT. IEEE.
[Erdogmus 2009] Erdogmus, H. (2009). Cloud computing: Does nirvana hide behind thenebula?IEEE Software, 26(2):4–6.[Fleiss et al. 1971] Fleiss, J. et al. (1971). Measuring nominal scale agreement among manyraters.Psychological Bulletin, 76(5):378–382.
[Galster et al. 2010] Galster, M., Eberlein, A., and Moussavi, M. (2010). Systematic selec-tion of software architecture styles.IET Software, 4(5):349–360.
[Garg and Singhal 2017] Garg, U. and Singhal, A. (2017). Software requirement prioritiza-tion based on non-functional requirements. In7th International Conference on CloudComputing, Data Science Engineering (Confluence), pages 793–797, Noida, India.IEEE.
[Huang et al. 2013] Huang, D., Xing, T., and Wu, H. (2013). Mobile cloud computing ser-vice models: A user-centric approach.IEEE Network, 27(5):6–11.
[Karlsson and Ryan 1997] Karlsson, J. and Ryan, K. (1997). A cost-value approach forprioritizing requirements.IEEE Software, 14(5):67–74.[Karlsson et al. 1998] Karlsson, J., Wohlin, C., and Regnell, B. (1998). An evaluation ofmethods for prioritizing software requirements.Information and Software Technology,39(14):939–947.
[Kaur and Aggrawal 2013] Kaur, B. P. and Aggrawal, H. (2013). Exploration of Success Factors of Information System.International Journal of Computer Science Issues,10(2):226–235.
[Kazman et al. 1996] Kazman, R., Abowd, G., Bass, L., and Clements, P. (1996). Scenario-based analysis of software architecture.IEEE software, 13(6):47–55.
[Kazman et al. 2002] Kazman, R., Asundi, J., and Klein, M. (2002). Making architecturedesign decisions: An economic approach. Technical Report CMU/SEI-2002-TR-035,Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
[Khajeh-Hosseini et al. 2010] Khajeh-Hosseini, A., Sommerville, I., and Sriram, I. (2010).Research challenges for enterprise cloud computing.CoRR, 1(18):1–11.
[Kitchenham and Charters 2007] Kitchenham, B. and Charters, S. (2007). Guidelines forperforming Systematic Literature Reviews in Software Engineering. Technical report,Keele University and Durham University Joint Report.
[Maenhaut et al. 2016] Maenhaut, P.-J., Moens, H., Ongenae, V., and Turck, F. D. (2016).Migrating legacy software to the cloud: Approach and verification by means of twomedical software use cases.Softw. Pract. Exper., 46(1):31–54.
[Mell and Grance 2011] Mell, P. M. and Grance, T. (2011). SP 800-145. The NIST Defini-tion of Cloud Computing. Technical report.
[Olsson et al. 2019] Olsson, T., Wnuk, K., and Gorschek, T. (2019). An empirical studyon decision making for quality requirements.Journal of Systems and Software,149(1):217 – 233.
[Pallis 2010] Pallis, G. (2010). Cloud computing: The new frontier of internet computing.IEEE Internet Computing, 14(5):70–73.
[Patterson and Hennessy 2013] Patterson, D. A. and Hennessy, J. L. (2013).Computer Or-ganization and Design: The Hardware/Software Interface. Morgan Kaufmann Pub-lishers Inc., 3 edition.
[Pegoraro and Paula 2017] Pegoraro, C. and Paula, I. C. A.-s. d. (2017).Requirementsprocessing for building design: a systematic review .Production, 27(1):1–18.
[Rewatkar and Lanjewar 2010] Rewatkar, L. R. and Lanjewar, U. L. (2010). Implemen-tation of cloud computing on web application.International Journal of ComputerApplications, 2(8):28–32.
[Ribeiro et al. 2019] Ribeiro, E. L. F., Vieira, M. A., Claro, D. B., and Silva, N. (2019).Interoperability between saas and data layers: Enhancing the midas middleware. InMu ̃noz, V., Ferguson, D., Helfert, M., and Pahl, C., editors,Cloud Computing andServices Science (CLOSER 2018), chapter 6, pages 102–125. Springer.
[Riegel and Doerr 2015] Riegel, N. and Doerr, J. (2015). A Systematic Literature Review ofRequirements Prioritization Criteria. In21st Requirements Engineering: Foundationfor Software Quality (REFSQ), pages 300–317, Cham. Springer International Publish-ing.
[Ruhe 2005] Ruhe, G. (2005).Software Release Planning, chapter 13, pages 365–393.
[Saaty 1987] Saaty, R. W. (1987). The analytic hierarchy process: what it is and how it isused.Mathematical Modelling, 9(3):161–176.
[Saaty 1980] Saaty, T. L. (1980).The Analytic Hierarchy Process, Planning, Piority Setting,Resource Allocation. McGraw-Hill.
[Santos et al. 2016] Santos, R., Albuquerque, A., and Pinheiro, P. R. (2016). Towards theApplied Hybrid Model in Requirements Prioritization.Procedia Computer Science,91(1):909–918.
[Thurimella and Padmaja 2014] Thurimella, A. K. and Padmaja, T. M. (2014). Economicmodels and value-based approaches for product line architectures. In Mistrik, I., Bah-soon, R., Kazman, R., and Zhang, Y., editors,Economics-Driven Software Architec-ture, pages 11–36. Morgan Kaufmann, Boston.
[van Lamsweerde 2009] van Lamsweerde, A. (2009).Requirements Engineering: FromSystem Goals to UML Models to Software Specifications. Wiley Publishing.
[Voda 2014] Voda, I. (2014). Migrating Existing PHP Web Applications to the Cloud.In-formatica Economica, 18(4):62–72.
[Wang et al. 2009] Wang, H. J., Moshchuk, A., and Bush, A. (2009). Convergence of Desk-top and Web Applications on a Multi-service OS. In 4th Conference on Hot Topics inSecurity (USENIX), pages 1–6, Berkeley, CA, USA. USENIX Association.
[Wohlin et al. 2012] Wohlin, C., Runeson, P., Hst, M., Ohlsson, M. C., Regnell, B., andWessln, A. (2012).Experimentation in Software Engineering. Springer PublishingCompany, Incorporated.
[Zampoglou et al. 2016] Zampoglou,M.,Papadopoulos,S.,Kompatsiaris,Y.,Bouwmeester, R., and Spangenberg, J. (2016).Web and social media imageforensics for news professionals. In Heravi, B. R. and Zubiaga, A., editors,SocialMedia in the Newsroom, Papers from the 2016 ICWSM Workshop, volume WS-16-19ofAAAI Workshops, Cologne, Germany. AAAI Press.
Downloads
Published
Como Citar
Issue
Section
Licença
Copyright (c) 2021 The authors
Este trabalho está licenciado sob uma licença Creative Commons Attribution 4.0 International License.