用户名: 密码: 验证码:
基于用户需求的可信软件质量属性评价方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
摘要:计算机的广泛应用及网络技术的飞速发展,软件已经渗透到国民经济乃至国防建设的各个领域,成为影响人们生产、生活的重要组成部分。随着软件规模的日益增大,复杂程度越来越高,软件的风险也变得越来越难以控制,各种由于软件缺陷或故障所引起的事件频繁发生。发展高可信软件,已经成为当前国际软件技术发展的战略制高点,引起了全社会的普遍关注。
     基于多维质量属性的可信软件评价是实现软件可信、开展可信软件管理的核心基础,也是可信软件开发管理过程中急需解决的问题之一。目前,绝大部分软件质量属性的研究都是基于软件设计、开发者的视角,而忽视了软件用户在使用过程中的客观实践及主观感受。因此,研究基于用户需求的可信软件质量属性评价方法具有重要的理论价值和现实意义。
     本文首先探讨了可信软件、质量属性的界定,及其国内外研究现状,并对几个主要的软件质量模型进行了归纳总结;从软件质量度量的发展、分类及度量步骤三个方面对软件质量度量进行了研究,这些都是可信软件质量属性研究的基础性工作。
     可信软件质量属性指标体系的产生是软件质量属性评价的基础,也是评价过程中关键性的第一步。针对用户对软件质量属性的需求及可信软件的特性,本文将可信软件质量属性分成关键属性与非关键属性两大类。在此基础上,通过构建可信软件质量属性证据模型、评估体系,形成满足用户需求的可信软件质量属性评价指标体系。这是可信软件质量属性评价方法的基础。
     本文提出的可信软件质量属性评价的第一个方法是一种间接的、考虑软件使用者和软件设计开发者一致性评判的研究方法。针对可信软件的某些质量属性不可直接测量、质量属性之间不具备可比性且测量标准不统一等问题。本文研究了质量属性之间的相互关系,通过设计结构矩阵、矩阵转换、矩阵运算来解决上述问题并间接度量软件质量属性。同时,由于可信软件运行环境的不同,不同的人对于质量属性有着不同的视角、解释和判断标准,在很大程度上人们没有办法达成一致的评判准则。针对这个问题,本文通过上述间接度量模型及三个评价指标,来确定软件设计开发者和软件用户对于软件质量属性评判的一致性程度,并根据设计的准则,做出相应的决策。与其他方法相比,这种方法完全依赖于软件质量属性之间的相互关系,是一种客观的、具有统一标准和评价尺度的、考虑软件使用者和开发者一致性评价的方法。
     可信软件质量属性评价的第二个方法是一种直接的、考虑评价者有限理性的研究方法。现今绝大部分评价方法所假设的一个基本前提是评价者是完全理性的。但实际上评价者在评价过程中带有主观偏好及风险性是不可避免的。本文引入前景理论以描述、表达评价者的有限理性。通过在“框架”内,正负理想参考方案的选择、信息的处理、综合前景值的确定、比较,来判断软件质量属性的优劣。同时,考虑在评估过程中,评价者不同偏好对评价结果的影响,本文对其作了进一步的分析研究,从而使得评估方法更加严谨、科学。
     可信软件质量属性评价的第三个方法是一种动态的、考虑软件在受到干扰的环境下,其质量属性评价值是否发生变化、如何变化、软件是否总是可信的评价方法。软件系统是一个动态的系统,它总是在不断的发展、演变中,在受到干扰时,我们总是期望它能保持原来的状态,但实际上这并非总是可能的。系统运行状态的变化,必然导致系统内部能量的变化,本文创新地借助于物理学“熵”的概念来描述、表达这个现象,并针对软件状态的变化是一个时间、空间完全离散的,且后一个状态是受前一个状态影响的特征,结合元胞自动机的相关机理,对软件质量属性在受到干扰后的评价值进行了有效模拟。
     本文所提出的方法,均是基于软件用户需求的视角,对可信软件质量属性进行间接、直接、动态的全方位评价,以期有利于软件用户对可信软件质量属性进行客观评价,也有利于软件设计者在设计过程中更多的考虑用户需求提供客观依据。图54幅,表14个,参考文献
Abstract:With the widespread use of computer and rapid development of network technology, software has penetrated into all fields of the national economy as well as national defense construction, and been a very important part of human life. Followed by the increasing the size and complexity of software, it is very difficult to control the risk of software and is very frequent that the disastrous events have happened due to software defects or failures. Development of High Confidence Software has become a strategic high ground of the current international software technology development, which has caused a widespread concern in the human society.
     Trustworthy software evaluation based on multi-quality-attributes becomes the core foundation to achieve software trustworthiness and carry out the management of trustworthy software, which is also an urgently resolved problem in the process of trustworthy software development and management. Currently, the major research on quality attributes of software is based on the developer's perspective, ignoring the objective practice and subjective experience of software users in the process of using software. So the research based on user requirements in the field of trustworthy software has become very important for theory and practice.
     This paper discusses the definition of trustworthy software and quality attributes firstly, particularly pays attention to overseas and domestic research status about them, and summarizes several major software quality models, researches on software quality metrics from three aspects of development, classification and procedure. All these are the basic work to research trustworthy software quality attributes.
     It is not only a basic work but also a crucial step to build the index system of trustworthy software quality attributes for evaluating them. Based on the users'requirements and the features of trustworthy software, this paper divides the quality attributes into two categories, which are key attributes and non-key attributes respectively. And after building the quality attributes evidence model and the quality evaluation system for trustworthy software, an evaluational criteria system for meeting user requirement is built. All these are the basis to evaluation method for trustworthy software quality attributes.
     The first evaluation method of trustworthy software quality attributes in this paper is an indirect method, which considers that software users and software developers should have a consistent evaluation for quality attributes. Because some quality attributes can't be measured accurately or be compared directly, this paper researches the interrelation of quality attributes in the component, proposes design structure matrix to describe their interrelation, and computer their relative importance by matrix shift. Meanwhile, the running environment of trustworthy software is different, and different people have different perspectives, different explanation and different criteria, they can't gain the consistent criteria to a large degree when evaluating quality attributes. With respond to these difficulties, this paper poses an evaluation method based on above measurement model and three indices. Compared with other methods, our approach depends on the interrelation of quality attributes, which make result objective and have a unified standards and evaluation criteria, considering the consistency of software users and developers for evaluation result.
     The second evaluation method of trustworthy software quality attributes in this paper is a direct method, which considers the valuators' bounded rationality. Most evaluation methods in the past have suppoosed that the evalutor are entire rationality, but in fact all kinds of subjective factors, such as risk preference, subjective preference, affect the valuator's evaluation result. This paper introduces the prospect theory, which is widely used in the field of psychology and behavioral science. Found the positive, negative ideal solution in the framework, the comprehensive prospect value of software quality attributes can be calculated and ranked to find the best software quality attributes. Because in the evaluation process the risk preference from valuators can affect result, we further analyze relevant parameters in the prospect theory, which make our method more rigorous and more scientific.
     The third evaluation method of trustworthy software quality attributes in this paper is a dynamic method, considering whether the evaluation result of quality attributes will change, how change, and whether software is trustworthy when the software suffers interference or continuous interference. Software system is a dynamic system with constant development and evolution, when disturbed, the system always is expected to maintain the original state, but in reality it is not always possible. It is inevitable that energy changes in the system with the changing of statement, the paper uses entropy, a physics concepts, to describe the phenomenon. When software suffered interference, its status change shows that it is completely discrete process in time and space, and the subsequent state is affected by previous one. The cellular automation can meet these conditions and simulate this process to gain the evaluation result of software quality attributes.
     This paper evaluates the trustworthy software quality attributes based on the perspective of software user requirement indirectly, directly and dynamic. It is benefit to evaluate the quality attributes objectively for the software users and to provide an objective basis for software developers, who consider users'requirement a bit more in the process of designing the software.
引文
[1]Jones C., Gray G., Gold A., et al. Strategies for improving system development project success [J]. Issues in Information Systems,2010,1:164-173.
    [2]Selding P. B. Faulty software caused Ariane 5 failure [J]. Space News,1996, 25(7):24-30.
    [3]Leveson N. G, Turner C S. An investigation of the Therac-25 accident [J]. IEEE Computer,1993,26(7):18-41.
    [4]Leveson N. G, Software:System Safety and Computers [M]. Addison Wesley,1995.
    [5]黄锡滋.软件可靠性、安全性与质量保证[M].电子工业出版社,2002.
    [6]朱鸿,金凌紫.软件质量保障与测试[M].科学出版社,1997.
    [7]瑞得米尔(英),德尔(英)编著,郑人杰等.计算机应用系统的可信性实践[M].清华大学出版社,2003.
    [8]G. Helmer, J. Wong, M. Slagell., et al. A Software fault tree approach to requirements analysis [J]. Requirements Engineering,2002(7):207-220.
    [9]刘克,单志广,王戟,何积丰等.“可信软件基础研究”重大研究计划综述[J].中国科学基金,2008(3):145-151.
    [10]朱名勋,可信软件非功能需求获取与分析研究[D],中南大学,2012.
    [11]Steffen Becker, Wilheml Hasselbring, Marko Boskovic, et al. Trustworthy software system:a discussion of basic concepts and terminology[J]. ACM SIGSOFT Software Engineering Notes,2006,31(6):1-18.
    [12]国家自然科学基金重大研究计划,http://www.nsfc.gov.cn/nsfc/fj/20070919_fj01. Doc
    [13]Michael W. Focke. James E.Knoke. Paul A. Barbieri. et al. TRUSTED COMPUTER SYSTEM, US AMERICAN:7103914B2[P],2005-06-01
    [14]Rein Turn. Trusted computer systems[M].//RAND Corporation:Reports and Bookstore,1981:2798-2811, http://www.rand.org/pubs/reports/R2811.html
    [15]Liu Qiu, Yin Zhang, Feng Wang. Trusted Computer System Evaluation Criteria (TCSEC) [M]. US:National Computer Security Center,1985:22-49.
    [16]ISO/IEC 15408-1-2005. Information Technology-Security Techniques Evaluation Criteria for IT Security, Part I:Introduction and General Model,2005.
    [17]Laprie J C. Dependability:Basic concepts and terminology [M]. Vienna:Springer-Verlag,1991.
    [18]Algirdas Avizienis, Jean-claude Laprie, Brian Randell. Fundamental concepts of computer system dependability [J]. IARP/IEEE-RAS Workshop on Robot Dependability:Technological, Challenge of Dependable Robots in Human Environments,2001,2(5):1-16.
    [19]Algirdas A., Laprie J. C., Brian R. et al.. Basic concepts and taxonomy of dependable and secure [J]. Computing. IEEE Trans. Dependable Secure,2004,1(Ⅰ):11-33.
    [20]NSTC. Research Challenges in High Confidence Systems. In:Proceedings of the Committee on Computing Information and Communications Workshop,1997.
    [21]陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(12A):2-7.
    [22]David L. Parnas, A. John Van Schouwen, Shu Po Kwan. Evaluation of safety-critical software [J]. Communications of the ACM,1990,3(6):636-648.
    [23]F. B. Sehneider. Trust in Cyberspace [M]. USA, Washington, DC-National AcademyPress,1999:24-36,56-72.
    [24]Wilhelm Hasselbring, Ralf Reussner. Toward trustworthy software systems [J]. IEEE Computer,2006,39(4):91-92.
    [25]王怀民,尹刚.网络时代的软件可信演化[J].中国计算机学会通讯,2010,6(2):28-36.
    [26]Trustie课题组,Trustie系列技术规范(VZ. O), http://www. trustie. net,2009.9.
    127]郎波,刘旭东,王怀民等.一种软件可信分级模型[J].计算机科学与探索,2010,4(3):231-239.
    [28]Guerra PAD, Rubira CMF, de Lemos, R.. A fault-tolerant software architecture for component-based systems [J]. Lecture Notes in Computer Science,2003,2677: 129-149.
    [29]Barry Boehm, Victor Ft. Basili. Software defect reduction top 10 list [J]. Computer, 2001,1:135-137.
    [30]Reznik, J., Ritter, T., Schreiner, R., Lang, U. Model driven development of security aspects[J]. Electronic Notes in Theoretical Computer Science,2007,163(1):65-79.
    [31]战德臣,冯锦丹,聂兰顺等.基于分层递增验证的可信管理软件构造方法[J].哈尔滨工业大学学报,2012,44(5):75-80.
    [32]ZHENG ZhiMing, MA ShiLong, LI Wei, et al. Dynamical characteristics of software trustworthiness and t heir evolutionary complexity [J]. Science in China Series F: Information Sciences,2009,52(8):1328-1334.
    [33]ZHENG ZhiMing, MA ShiLong, LI Wei, et al. Complexity of software trustworthiness and its dynamical statistical analysis methods[J]. Science in China Series F: Information Sciences,2009,52(9):1651-1657.
    [34]Jeffrey Voas. Trusted Software's Holy Grail [J]. Software Quality Journal,2003,11(1): 9-17.
    [35]李珍,田俊峰、赵鹏远,基于分级属性的软件监控点可信行为模型[J].电子与信息学报,2012,34(6):1446-1451.
    [36]Barry Boehm, Software risk management[J]. Lecture Notes in Computer Science, 1989,387:1-19.
    [37]LiGuo Huang. A value-based process for achieving software dependability[C]. International Software Process Workshop. UNIFYING THE SOFTWARE PROCESS SPECTRUM.2005:108-121.
    [38]Jianping Li, Minglu Li, Dengsheng Wu, et al. An integrated risk measurement and optimization model for trustworthy software process management [J]. Information Sciences,2012,19:47-60.
    [39]W.Hasselbring. On defining computer science terminology [J]. Communication of the ACM,42(2):88-91,February 1999.
    [40]Chung L, B. A. Nixon, E. Yu, et al. Non-functional requirements in Software Engineering[M]. Kluwer Academic Publishers,2000.
    [41]Chung L, J. do Prado Leite. On non-functional requirements in software engineering, conceptual modeling:foundations and applications[J]. Lecture Notes in Computer Science,2009,5600:363-379.
    [42]Chung L., Nixon B. A., Yu E., et al. Non-functional requirements in software engineering. Springer[M]. Norwell, MA:Kluwer Academic Publishers.1999.
    [43]Tonu S. Incorporating non-functional requirements with UML models [M]. Unpublished M. A. Sc. dissertation, University of Waterloo, Ontario, Canada. 2006.
    [44]萨默维尔著,程成等译.软件工程[M].机械工业出版社,2011.
    [45]Zheng Q, Jiankuan Xing, Xiang Zheng. Software Architecture[M].浙江法学出版社, 2008
    [46]Joe Zou/E Christopher J.Pavlovski. Control case approach to record and model non-functional requirements[J]. Information Systems and E-Business Management,2008,6:49-67.
    [47]Agustin Casamayor, Daniela Godoy, Marcelo Campo. Identification of non-functional requirements in textual specifications:A semi-supervised learning approach[J]. Information and Software Technology,2010,52(4):436-445.
    [48]Kassab M., O. Ormandjieva, et al.. Non-functional requirements size measurement method (NFSM) with COSMIC-FFP[J]. Software Process and Product Measurement,2008,4895:168-182.
    [49]Nelson S. Rosa, George R. R. Justo, Paulo R. F. Cunha. Incorporating non-functional requirements into software architectures [J]. Parallel and Distributed Processing, Lecture Notes in Computer Science,2000,1800:1009-1018.
    [50]Carlo Ghezzi, Amir Molzam Sharifloo. Model-based verification of quantitative non-functional properties for software product lines [J]. Information and Software Technology,2012,17(7):258-275.
    [51]Lars Grunske, Aldeida Aleti. Quality optimisation of software architectures and design specifications[J]. Journal of Systems and Software,2013,6
    [52]Yoji Akao, Glenn H. Mazur, Ann Arbor. The leading edge in QFD:past, present and future [J]. International Journal of Quality & Reliability Management,2003,20(1): 20-35.
    [53]Chang Che-Wei, Wu Cheng-Ru, Lin Hung-Lung. Integrating fuzzy theory and hierarchy concepts to evaluate software quality [J]. Software Quality Journal, 2008,16(2):263-276.
    [54]Frank Liu, Kunio Noguchi, Anuj Dhungana, et al. A quantitative approach for setting technical targets based on impact analysis in software quality function deployment (SQFD) [J]. Software Quality Journal,2006,14(2):113-134.
    [55]Miroslaw Staron, Ludwik Kuzniarz, Claes Wohlin. Empirical assessment of using stereotypes to improve comprehension of UML models:A set of experiments [J]. Journal of Systems and Software,2006,79(5):727-742.
    [56]Miroslaw Staron, Wilhelm Meding, Christer Nilsson. A framework for developing measurement systems and its industrial evaluation [J].Information and Software Technology,2009,51(4):721-737.
    [57]Haigh, Maria. Software quality, non-functional software requirements and IT-business alignment [J]. Software Quality Journal,2010,18(3):361-385.
    [58]Ceyda Gungor Sen, Hayri Baracli. Fuzzy quality function deployment based methodology for acquiring enterprise software selection requirements [J]. Expert Systems with Applications,2010,37(4)3415-3426.
    [59]Meyerhofer, M., K. Meyer-Wegener. Estimating non-functional properties of component-based software based on resource consumption [J]. Electronic Notes in Theoretical Computer Science,2005,114:25-45.
    [60]Zeynep Sener. E, Ertugrul Karsak. A fuzzy regression and optimization approach for setting target levels in software quality function deployment [J]. Software Quality Journal,2010,18(3):323-339.
    [61]Shuai Ding, Shan-Lin Yang, Chao Fu. A novel evidential reasoning based method for software trustworthiness evaluation under the uncertain and unreliable environment [J]. Expert Systems with Applications,2012,39:2700-2709.
    [62]熊伟,渡边喜道,新藤久和.用HOQ拓展概念的软件描述及其定量结构化方法[J].软件学报,2005,16(1):8-15.
    [63]熊伟,王娟丽,蔡铭.基于QFD技术的软件可信性评估研究[J].计算机应用研究,2010,27(8):29912994.
    [64]熊伟,新藤久和,渡边喜道.软件需求定量分析及其映射的模糊层次分析法[J].软件学报,2005,16(3):427-433.
    [65]邓韬,徐培德,凌云翔等.基于模糊回归分析方法的C31系统效能评估研究[J].计算机仿真,2005,22(15):35-37.
    [66]袁正刚,黄志军,朱继梅.基于PCA的软件质量度量模型[J].舰船电子工程,2005,25(6):23-29.
    [67]Liao Jin-shun, He Pei. Method of software quality evaluation based on fuzzy neural network [J]. Computer Technology and Development,2006,16(2):194-196.
    [68]Tony Rosqvist, Mika Koskela, Hannu Harju. Software quality evaluation based on expert judgement [J]. Software Quality Journal,2003,11(1):39-55.
    [69]Kevin K F Y, Henry C W L. A fuzzy group analytical hierarchy process approach for software quality assurance management:Fuzzy logarithmic least squares method [J]. Expert System with Applications,2011,38(8):10292-10302.
    [70]Kirti Tyagi, Arun Sharma. A rule-based approach for estimating the reliability of component-based systems [J]. Advances in Engineering Software,2012,54, 24-29.
    [71]Benhai Yu, Qing Wang, Ye Yang. The Trustworthiness Metric Model of Software Process Quality Based-on Life Circle[C]. Management and Service Science,2009. International Conference on MASS'09,1-5.
    [72]McCall, J. A., Richards, P. K., and Walters, G. F., Factors in Software Quality [J], Nat'l Tech. Information Service,1977,1-3.
    [73]Marciniak, J. J., Encyclopedia of software engineering[J]. Chichester:Wiley,2002. 2nd.
    [74]Kitchenham, B., Pfleeger, S. L., Software quality:the elusive target [J]. IEEE Software,1996:12-21.
    [75]J McCall, P Richards, G Walters. Factors in Software Quality. Voll[R]. Technical Report CDRL A003, US Rome Air Development Centre,1977.
    [76]B. W. Boehm, J. R. Brown, M. Lipow. Quantitative evaluation of software quality[C]. Proceedings of the 2nd international conference on Software engineering, San Francisco, California, United States,1976:592-605.
    [77]Grady, R. B., Practical software metrics for project management and process improvement[M]. USA:Prentice Hall,1992:88-105.
    [78]Dromey, R. G.. Concerning the Chimera software quality [J]. IEEE Software,1996,1: 33-43.
    [79]Dromey, R. G.. A model for software product quality[J]. IEEE Transactions on Software Engineering,1995,2:146-163.
    [80]中华人民共和国国家质量监督检验检疫总局,中国国家标准化管理委员会,GB/T 16260.12006/ISO/IEC 9126-1:2001.软件工程-产品质量,第1部分:质量模型[S].中国标准出版社,2006.7.
    [81]Pressman R.S.,软件工程--实践者的研究方法[M].北京:机械工业出版社,1999:56-67.109-118.
    [82]E.R.Baker, M.J.Fisher.Basic principles and concepts for achieving quality [M/OL]. Process Strategies Inc. and U.S. Department of Defense,2007.http:// www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA479804
    [83]ISO 8402:Quality management and quality assurance-Vocabulary,1994
    [84]余为峰,黄松.软件质量度量分析与研究[J].电脑知识与技术,2010,6(18):5106-5108
    [85]Boehm Brown B W, Kaspar H. Characteristics of software quality. TRW serious of software technology Vol.1[M]. New York:North-Holland,1978.
    [86]Fentonne E., Pfleeger S.L.,软件度量[M].第二版.北京:机械工业出版社,2004.
    [87]Halstead M. H.. Elements of Software Science (Operating and programming system series) [M]. USA:Elsevier Science Inc.,1977
    [88]McCabe, T. Jo. A complexity measure [J]. IEEE Transactions on Software Engineering,1976,10(2):308-320.
    [89]梅宏,谢涛,袁望洪,等.青鸟构件库的构件度量[J].软件学报,2000(11):634-641.
    [90]Minkiewicz A F. Measuring object oriented software with predictive object point [J]. PRICE Systems,1997:221-234.
    [91]Vector D, Daily K.. Software estimation at the task level-the specter approach, Project Control:Satisfying the Customer[C]. Proceedings of ESCOM-SCOPE,2001
    [92]Washizaki H., Yamamoto, H., Fukazawa Y. A metrics suite for measuring reusability of software components[C].Proceedings ninth international software metrics symposium,2003:211-223.
    [93]Hastings T.E, Sajeev A. A vector-based approach to software size measurement and effort estimation [J]. IEEE Transactions on Software Engineering,2001,4: 337-350.
    [94]Gyimothy T, Ferenc R., Siket I., Empirical validation of object-oriented metrics on open source software for fault prediction [J]. IEEE Transactions on Software Engineering,2005,31(10):897-910.
    [95]陶红伟.基于属性的软件可信性度量模型研究[D].上海:华东师范大学,2011.
    [96]杨善林,丁帅,褚伟.一种基于效用和证据理论的可信软件评估方法[J].计算机研究与发展,2009,46(7):1152-1159.
    [97]蔡斯博,邹艳珍,邵凌霜等.一种支持软件资源可信评估的框架[J].软件学报,2010,21(2):359-372.
    [98]郑志明,马世龙,李未等.软件可信性动力学特征及其演化复杂性[J].中国科学,2009,39(9):946-950.
    [99]郑志明,马世龙,李未等.软件可信复杂性及其动力学统计分析方法[J].中国科学,2009,39(10):1050-054.
    [100]Ben Haiyu, Qing Wang, Ye Yang. Research on a software trustworthy measure model[C]. In:Proceedings of 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing,2010:518-521.
    [101]Liang Chen, Ping Cheng, Wei Liu. The model and method of trustworthiness level evaluation for software product[C]. In:Proceedings of 2010 Sixth International Conference on Natural Computation (ICNC2010),2010:709-715.
    [102]Li Shi, Shanlin Yang. The evaluation of software trustworthiness with FAHP and FTOPSIS methods[C]. In:Proceeding of International Conference on Computational Intelligence and Software Engineering,2009:1-4.
    [103]Tie Bao, Shufen Liu, Lu Han. Research on an analysis method for software trustworthiness based on rules[C]. In:Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work Design,2010:43-47.
    [104]Hong Hou, QinBao Song, Jing Yang, et al. The research of BPM software trustworthy evaluation model (based on AHP and group decision-making in linguistic scale)[C]. In:Proceedings of 2009 First International Workshop on Education Technology and Computer Science,2009:816-823.
    [105]Ben Wang, Xingshe Zhou, Gang Yang, Yalei Yang. DS Theory-Based Software Trustworthiness Classification Assessment[C]. In:Proceedings of 2010 Symposia and Workshops on Ubiquitous, Automatic and Trusted Computing,2010: 434-438.
    [106]Xia Zhenghong, Pan Wenjun. Research on the trustworthiness of software[C]. In: Proceeding of 2010 2nd International Conference on Information Science an Engineering (ICISE),2010:1-4.
    [107]Yuyu Yuan, Qiang Han. Data mining based measurement method for software trustworthiness[C]. In:Proceedings of 2010 International Symposium on Intelligence Information Processing and Trusted Computing,2010:293-296.
    [108]王怀民,唐扬斌,尹刚等,互联网软件的可信机理.中国科学[J],2006,36(10):1156-1169.
    [109]汤永新,刘增良.软件可信性度量模型研究进展.计算机工程与应用[J],2010,46(27):12-16.
    [110]R. J. Ellison, D. A. Fiseher, R. C. Linger, et al. Survivable network systems:an emerging discipline[J]. Camegle Mellon University, Software Engineering Institute, Technical Report CMU/SEI-97-TR-013,1997,11.
    [111]Ellison Robert J., Fisher David A., Linger Richard C. et al. Survivability:Protecting your critical systems [J]. IEEE Internet Computing,1999,3(6):55-63.
    [112]Ming-xun Zhu, LUO Xin-xing, Chen Xiao-hong, et al. A non-functional requirements tradeoff model in Trustworthy Software, Information Science, 2012,19(5):61-75.
    [113]文杏梓,罗新星.考虑一致性评判的可信软件非功能需求决策模型[J].系统管理学报,2013,22(6)"861-868.
    [114]Wenxingzi, Luo Xingxin, Ouyang Junlin. A novel evaluation model for non-functional requirements in trustworthy software [J]. Journal of Information & Computational Science,2013,10(11):3561-3577.
    [115]Hongwei Tao, Yixiang Chen. A new metric model for trustworthiness of software [J]. Telecommunication system.2012,51(2-3):95-105.
    [116]Hongwei Tao, Yixiang Chen. Another metric model for trustworthiness of software based on partition [J]. Advances in Intelligent and Soft Computing, 2010,82:695-705.
    [117]S Nahmias.. Fuzzy variables[J].Fuzzy Sets and Systems,1978,1:97-110.
    [118]文杏梓,罗新星,欧阳军林.基于决策者信任度的风险型混合多属性群决策方法[J].控制与决策,2014,
    [119]Gulgin Buyukozkan, Gizem Cifci. A new incomplete preference relations based approach to quality function deployment [J]. Information Science,2012,206: 30-41
    [120]毛晓光,邓勇进,基于构件软件的可靠性通用模型[J].软件学报,2004,15(1):27-32.
    [121]王丹,张帆,张志鸿.基于构件的多层体系结构的研究与应用[J].计算机工程与设计,2010,31(6):1255-1259.
    [122]梅宏,陈锋,冯耀东,等.ABC:基于软件体系结构、面向构件的软件开发方法[J].软件学报,2003,14(4):721-732.
    [123]Yang N, Yu H Q, Qian Z L. Modeling and quantitatively predicting software security based on stochastic Petri nets [J]. Mathematical and Computer Modelling,2012,55:102-212.
    [124]Roman G C. A taxonomy of current issues in requirements engineering [J].IEEE Computer,1985,18(4):14-23.
    [125]D. V. Steward. The design structure system:a method for managing the design of complex system [J]. IEEE Trans.on Engineering Management,1981,8:71-74.
    [126]Tyson R,. Applying the design structure matrix to system decomposition and integration problem:a review and new directions [J]. IEEE Transactions on Engineering Management,2001,48(3):292-306.
    [127]M Danilovic, TR Browning. Managing complex product development projects with design structure matrices and domain mapping matrices [J]. International Journal of Project Management,2007,25(3):300-314.
    [128]Dunbing Tang, Renmiao Zhu, Jicheng Tang, Ronghua Xu, Rui He. Product design knowledge management based on design structure matrix [J]. Advanced Engineering Informatics,2010,24(2):159-166.
    [129]Yun Fu, Minqiang Li, Fuzan Chen. Impact propagation and risk assessment of requirement changes for software development projects based on design structure matrix[J]. International Journal of Project Management,2012, 30(3):363-373.
    [130]Mark S. Avnet, Annalisa L. Weigel. An application of the design structure matrix to integrated concurrent engineering [J]. Acta Astronautica,2010,66(5-6): 937-949.
    [131]Xiaoguang Deng, Greg Huet, Suo Tan, et al. Product decomposition using design structure matrix for intellectual property protection in supply chain outsourcing [J]. Computers in Industry,2012,63(6):632-641.
    [132]程平,刘伟,陈艳.基于矩阵变换的软件可信性演化波及效应[J].系统工程理论与实践,2010,30(5):778-785.
    [133]程平,刘伟.基于结构分解的软件可信性变化传播模式研究[J].科技管理研究,2010,5:170-173.
    [134]文杏梓,罗新星.基于设计结构矩阵的可信软件非功能需求评价模型研究[J].计算机应用研究,2012,29(10):3787-3790.
    [135]Atanassov KT. Intuitionistic fuzzy sets [J]. Fuzzy Sets and Systems,1986,20(1): 87-96.
    [136]Atanassov KT. Two theorems for intuitionistic fuzzy sets[J].Fuzzy Sets and Systems, 2000,110(2):267-269
    [137]毕林.数字采矿软件平台关键技术研究[D].中南大学,2010.
    [138]李德、王李管.我国数字采矿软件研究开发现状与发展[J].金属矿山,2010(12):107-112.
    [139]Kahneman D, Tversky A. Prospect theory:an analysis of decision under risk [J]. Econometrica:Journal of the Econometric Society,1979,47(2):263-291.
    [140]Wu G, Gonzalez R. Curvature of the probability weighting function[J]. Management Science,1996,42(12):1676-1690.
    [141]Vicky Henderson. Prospect theory, liquidation, and the disposition effect[J]. Management Science,2012,58(2):445-460.
    [142]Bromiley, P. Looking at prospect theory[J]. Strategic Management Journal,2010, 31:1357-1370.
    [143]Gomes F J. Portfolio choice and trading volume with loss-averse investor[J]. Journal of Financial Economics,2005,78:311-339.
    [144]Berkelaar A, Kouwenberg R,. From boom'til bust:How loss aversion affect asset price[J]. Journal of Banking and Finance,2009,33:1005-1013.
    [145]Short, J C., Palmer, T. B.. Organizational performance referents:An empirical examination of their content and influences[J]. Organizational Behavior and Human Decision Processes,2003,90:209-224.
    [146]Wong, K F. E., Kwong, J. Y. Y. Between-individual comparisons in performance evaluation:A perspective from prospect theory[J]. Journal of Applied Psychology, 2005,90:284-294.
    [147]Wong, K F. E., Kwong, J. Y Y.. Comparing two tiny giants or two huge dwarfs? Preference reversals owing to number size framing[J].Organizational Behavior and Human Decision Processes,2005,98:54-65.
    [148]Holmes R. M, Bromiley. P, Devers. C. E, etc. Management theory applications of prospect theory:accomplishments, challenges, and opportunities[J]. Journal of Management,2011,37(4):1069-1107
    [149]刘培德.一种基于前景理论的不确定语言变量风险型多属性决策方法[J].控制与决策,2011,26(6):893-897.
    [150]王坚强.信息不完全的Fuzzy群体多准则决策的规划方法[J].系统工程与电子技术,2004,26(11):1604-1605.
    [151]Z-p Fan, Y Liu. A method for group decision-making based on multi-granularity uncertain linguistic information [J]. Expert systems with Applications,2010, 37:4000-4008.
    [152]Tversky A, Kahneman D. Advanees in prospect theory:cumulative representation of uncertainty[J]. Tversky A, Kahneman D,1992,5(4):297-323.
    [153]Briand L. C., Melo W. L. and Wust J. Assessing the Applicability of Fault-Proneness Models across Object-Oriented Software Projects[J]. IEEE Transactions on Software Engineering,2002,28(7):706-720.
    [154]T. M. Khoshgoftaar, E. B. Allen, K. S. Kalaichelvan and N. Goel. Early quality prediction:a case study in telecommunications[J]. IEEE Software,1996, 13(1):65-71.
    [155]Zhengping Ren, Song Huang, Yi Yao et al. Confidence Measures Analysis of Software Security Evaluation [J]. Procedia Engineering,2011,15:3505-3510.
    [156]Kanmani S., Uthariaraj V. R., Sankaranarayanan V. Object-oriented software fault prediction using neural networks[J]. Information and Software Technology,2007, 49(5):483-492.
    [157]Elish K. O.,Elish M. O. Predicting defect-prone software modules using support vector machines[J]. Journal of Systems and Software,2008,81(5):649-660.
    [158]黄鹏.基于广义半监督学习方法的软件质量预测研究[D].上海交通大学,2010.
    [159]NianhuaYang, HuiqunYu, ZhilinQian, et al. Modeling and quantitatively predicting software security based on stochastic Petri nets[J]. Mathematical and Computer Modelling,2012,55:102-112.
    [160]Peng Liang, Anton Jansen, Paris Avgeriou. et al. Advanced quality prediction model for software architectural knowledge sharing[J]. The Journal of Systems and Software.2011,84:786-802.
    [161]Von Neumann J. V. Theory of self-Reproducing automata[M]. Urbana:University of Illinois Press,1966:66-109.
    [162]Wolfram S. Statistical mechanics of cellular automata[J]. Rev Modern Phys,1983, 55(3):601-612.
    [163]荣盘祥.复杂系统脆性理论及其理论框架的研究[D].黑龙江:哈尔滨工程大学,2006.
    [164]李才伟.元胞自动机及复杂系统的时空演化模拟[D].武汉:华中理工大学,1997.
    [165]Wolf D E.. Celluala automata for traffic simulations[J]. Physica A,1999, 263(1-4):438-451.
    [166]Fuentes M A.. Kuperman M N. Cellular automata and epidemiological models with spatial dependence[J]. Physica A,1999,367(3):471-486.
    [167]Bhargava S C, et al. A stochastic cellular model of innovation diffusion[J]. Technological Forecasting and Social Change,1993,44(1):87-97.
    [168]Moldovan S, Goldenberg J.. Cellular automata modeling of resistance to innovation:effects and solutions[J]. Technological Forecasting & Social Change, 2004,71(5):425-442.
    [169]陈荣,顾斌.元胞自动机在经验型连带外部效用市场模拟中的应用[J].科研管理,2001,22(6):128-134.
    [170]应尚军,等.基于元胞自动机的股票市场复杂性研究-投资者心理与市场行为[J].系统工程理论与实践,2003,23(12):18-24.
    [171]张廷,宜慧玉,高宝俊.寡头垄断市场广告投放效果的元胞自动机仿真[J].系统工程学报,2008,23(6):309-315.
    [172]高建,董秀成.基于元胞自动机的石油企业技术创新竞争演化研究[J].科技进步与对策,2008,25(12):141143.
    [173]张廷,高宝俊,宜慧玉.创新扩散中广告投放效果的元胞自动机仿真[J].科技进步与对策,2009,26(1):134-137.
    [174]寇勇刚,吴桐水,柳青.基于元胞自动机的民航运输产业竞争演化模拟[J].系统工程理论与实践,2011,31(9):10711076.
    [175]寇勇刚,吴桐水,朱金福.航空服务创新的元胞自动机竞争演化模拟[J].系统工程理论与实践,2011,31(6):1680-1686.
    [176]邢修三.物理熵、信息熵及其演化方程[J].中国科学(A辑).2001,31(1):77-84.
    [177]布里渊.物理熵与信息(II).系统论控制论信息论经典文献选编[M].北京:求实出版社,1989:649-664.
    [178]格雷,熵与信息论(影印版)[M].北京:科技出版社,2012:45-56.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700