The Community for Technology Leaders
RSS Icon
Issue No.03 - May-June (2013 vol.15)
pp: 26-31
George F. Hurlburt , Change Index
Software integration testing has always been problematic, and current methods are becoming even less practical given today's networked software components. As the need for a more holistic approach grows, complexity theory presents opportunities for better understanding and testing of software.
Software testing, Software engineering, Information technology, Performance evaluation, Complexity theory, Network architecture, information technology, network science, complexity theory, software testing, software integration testing, software engineering
George F. Hurlburt, "Complexity Theory: A New Paradigm for Software Integration", IT Professional, vol.15, no. 3, pp. 26-31, May-June 2013, doi:10.1109/MITP.2012.87
1. D. Evans, "The Internet of Things—How the Next Evolution of the Internet Is Changing Everything," Cisco Internet Business Solutions Group, white paper, Apr. 2011.
2. M.J. Sullivan, "Joint Strike Fighter: Restructuring Added Resources and Reduced Risk, but Concurrency Is Still a Major Concern," US Government Accountability Office, GAO-12-525T, 20 Mar. 2012, p. 11;
3. D. Jackson, Software Abstractions: Logic, Language, and Analysis, MIT Press, 2011, p. 1.
4. F.P. Brooks Jr., "No Silver Bullet Essence and Accidents of Software Engineering," Computer, vol. 20, no. 4, 1987, pp. 10–19; MC.1987.1663532.
5. D. Harel and B. Rumpe, "Meaningful Modeling: What's the Semantics of 'Semantics'?" Computer, vol. 37, no. 10, 2004, pp. 64–72; MC.2004.172.
6. Y. Wang, "On the Informatics Laws and Deductive Semantics of Software," IEEE Trans. Systems, Man, and Cybernetics, vol. 36, no. 2, 2006, pp. 161–171;
7. G.F. Murray, "Categorization of Open Source Licenses: More than Just Semantics," The Computer & Internet Lawyer, vol. 26, no. 1, 2009, pp. 1–12.
8. T. O'Neill and J. Leaney, "Open Complex Computer Systems Are No Silver Bullet," Proc. 4th IEEE Int'l Conf. Engineering of Complex Computer Systems (ICECCS 98), IEEE, 1998, pp. 79–86.
9. J.A. Whittaker and J. Voas, "Toward a More Reliable Theory of Software Reliability," Computer, vol. 33, no. 12, 2000, pp. 36–42; 2.889091.
10. M. Yutao, H. Keqing, and D. Dehui, "A Qualitative Method for Measuring the Structural Complexity of Software Systems Based on Complex Networks," Proc. 12th Asia-Pacific Software Eng. Conf. (APSEC 05), IEEE, 2005.
11. L. Jing et al., "Scale Free in Software Metrics," Proc. 30th Ann. Int'l Computer Software and Applications Conf. (COMPSAC 06), IEEE, 2006, pp. 229–235.
12. B. Iyer, C.-H. Lee, and N. Venkatraman, "Managing in a 'Small World Ecosystem': Some Lessons from the Software Sector," California Management Rev., CMR337-PDF-ENG, 1 May 2006, pp. 28–48.
13. G.R. Madey, V. Freeh, and R. Tynan, "The Open Source Software Development Phenomenon: An Analysis Based on Social Network Theory," Proc. Americas Conf. Information Systems (AMCIS 02), AMCIS, 2002, pp. 1806–1813.
14. H. Benbya and B. McKelvey, "Toward a Complexity Theory of Information Systems Development," Information Technology & People, vol. 19, no. 1, 2006, pp. 12–34.
15. T. Nakamura and K. Kijima, "Method for Visualizing Risk Factors of System Failures and Its Application to ICT Systems" Proc. 55th Ann. Meeting of the Int'l Society for the Systems Sciences, International Society for the Systems Sciences, 2011.
16. Ultra-Large-Scale Systems: The Software Challenge of the Future, Software Eng. Inst., Carnegie Mellon Univ., 2006.
17. J. Markoff, "How Many Computers to Identify a Cat? 16,000," The New York Times,25 June 2012, p. B1.
18. M. Krigsman, "Worldwide Cost of IT Failure (Revisited): $3 Trillion," ZDNet,10 Apr. 2012; 15424.
19. S.R. Meier, "Causal Inferences on the Cost Overruns and Schedule Delays of Large-Scale US Federal Defense and Intelligence Acquisition Programs," Project Management J., vol. 41, no. 1, 2010, pp. 28–39.
20. M.E.J. Newman, Networks: An Introduction, Oxford Univ. Press, 2010.
21. T. LaToza and B. Myers, "Visualizing Call Graphs," IEEE Symp. Visual Languages and Human-Centric Computing (VL/HCC 11), IEEE, 2011, pp. 117–124.
22. D.E. Sanger, "Obama Order Sped Up Wave of Cyberattacks against Iran," New York Times, Middle East, 1 Jun. 2012; obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all.
23. Y.L. Yang-Yu, J.J. Slotin, and A-L Barabási, "Observability of Complex Systems," Proc. National Academy of Sciences, vol. 110, no. 7, 2013, p. 2465.
24. P. Basaras and D. Katsaros, "Detecting Influential Spreaders in Complex Dynamical Systems," Computer, IEEE, April 2013, Volume 46, Number 4, pp. 22-29.
25. "The DoDAF Architecture Framework Version 2.02," US Dept. of Defense, Aug. 2010; http://dodcio.defense.govdodaf20.aspx.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool