Architecture Analysis Method Study Based on EID

Article Preview

Abstract:

Extended Influence Diagram (EID) is a graph model for modeling and solving decision problems under uncertainty, extended from the Influence Diagram. Architecture analysis is one of the main contents of architecture lifecycle. This paper introduces the modeling elements and architecture analysis process of EID, specifics probability elicitation procedure of directly controllable node according to DM2, discusses architecture maintainability by EID, finally summarizes this method's advantages and disadvantages.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1479-1485

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Robert Lagerstr¨om, Ulrik Franke, Pontus Johnson, Johan Ullberg. A Method for Creating Enterprise Architecture Metamodels-Applied to Systems Modifiability Analysis[J]. International Journal of Computer Science and Applications. 2009, 6(5): 89-120.

Google Scholar

[2] Pontus Johnson, Robert Lagerstr¨om, Per N¨arman , M°arten Simonsson. Enterprise Architecture Analysis with Extended Influence Diagrams[J]. Information Systems Frontiers. 2007, 9(2-3): 163-180.

DOI: 10.1007/s10796-007-9030-y

Google Scholar

[3] Pontus Johnson, Robert Lagerstr¨om, Per N¨arman, Marten Simonsson. Extended Influence Diagrams for System Quality Analysis[J]. Journal of Software. 2007, 3(2): 30-42.

Google Scholar

[4] Lagerström, Robert. Analyzing System Maintainability Using Enterprise Architecture Models[J]. Journal of Enterprise Architecture. 2007, 3: 33-42.

Google Scholar

[5] Teodor Sommestad, Mathias Ekstedt, Pontus Johnson. Combining defense graphs and enterprise architecture models for security analysis[C]. 12th International IEEE Enterprise Distributed Object Computing Conference. (2008).

DOI: 10.1109/edoc.2008.37

Google Scholar

[6] Teodor Sommestad, Mathias Ekstedt, Pontus Johnson. Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models[C]. Proceedings of the 42nd Hawaii International Conference on System Sciences. (2009).

DOI: 10.1109/hicss.2009.141

Google Scholar

[7] Ulrik Franke, Teodor Sommestad, Mathias Ekstedt, Pontus Johnson. Defense Graphs and Enterprise Architecture for Information Assurance Analysis[C]. (2008).

Google Scholar

[8] R. Lagerström1, P. Johnson1,P. Närman1. Extended Influence Diagram Generation[C]. In Proceedings of the Interoperability for Enterprise Software and Applications Conference. (2007).

Google Scholar

[9] Oman. P, Hagemeister. J, Ash. D. A Definition and Taxonomy for Software Maintainability[J]. (1992).

Google Scholar

[10] Granja-Alvarez, J.C. and Barranco-García, M.J. A Method for Estimating Maintenance Cost in a Software Project: A case study[J]. Software Maintenance: Research and Practice. 1997, 9: 161-175.

DOI: 10.1002/(sici)1096-908x(199705)9:3<161::aid-smr148>3.0.co;2-8

Google Scholar

[11] Aggarwal, K., Singh, Y. and Chlabra, J.K. An Integrated Measure of Software Maintainability[C]. In the 2002 Proceedings Annual Reliability and Maintainability Symposium, (2002).

DOI: 10.1109/rams.2002.981648

Google Scholar

[12] Matinlassi, M. and Niemelä, E. The Impact of Maintainability on Component-based Software Systems[C]. In the Proceedings of the 29th EUROMICRO Conference New Waves in System Architecture, (2003).

Google Scholar

[13] ISO/IEC. (2001). ISO/IEC 9126-1, Software Engineering – Product Quality.

Google Scholar

[14] DOD Architecture Framework Working Group. DOD Architecture Framework Version 2. 0 Volume 2. (2009).

Google Scholar

[15] Xie Wencai, Luo Xueshan, Hangfu Xianpeng. Meta-Model Based Methodology of C4ISR System Architecture Development. 2011 International Conference on Computer Science and Information Technology, (2011).

Google Scholar