Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Software Engineering - Layered Technology

Although various authors have developed personal definitions of software engineering, a definition given by Fritz Bauer at the seminal conference on the subject still provides a forum for discussion:

"Software engineering is the establishment and use of sound engineering principles so as to obtain economically software that is reliable and works efficiently on real machines. "

Every reader will be tempted to add further to this definition. It says very little about the technical aspects of software quality; it does not directly state the need for customer satisfaction or in-time product delivery; it omits mention of the significance of measurement and metrics; it does not tell the significance of a mature process. And yet, Bauer's definition gives us a baseline. What are the "sound engineering principles" that can be applied to computer software development? How do we "economically" construct software so that it is "reliable"? What is the requirement to develop computer programs that work "efficiently" on not one but various different "real machines"? These are the questions that persistently challenge software engineers.

The IEEE [IEE93] has developed a more complete definition when it states;

"Software Engineering (1)  The  application of  a  systematic, disciplined, quantifiable approach to  the operation, development, and maintenance of software that is, the application of engineering to software. (2) The study of approaches as in (1) ".

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9512575

Have any Question?


Related Questions in Computer Engineering

Subject digital securityimagine a scenario that you go to a

Subject: Digital security Imagine a scenario that you go to a restaurant and pay the meal using your credit card. What communication parties are involved and what information is exchanged in order to complete this transa ...

Explain why a u s recession that occurs as the rest of the

Explain why a U. S. recession that occurs as the rest of the world is expanding will tend to reduce the U. S. Trade deficit.

A weight loss program claims that program participants have

A weight loss program claims that program participants have a mean weight loss of at least 12 pounds after 1 month. You work for a medical association and are asked to test this claim. A random sample of 30 program parti ...

What are the three most significant aspects of threat which

What are the three most significant aspects of threat which will continue to evolve for the next 20 years?

A biostatistician is investigating the timenbspt to death

A biostatistician is investigating the time,  T , to death of a mouse exposed to a newly developed pesticide. He finds that the pdf of T is given by the following formula  f(t) = 15t 2 e -5t3 . Which of the following sta ...

Refer to the reading e-business strategy how to benefit

Refer to the reading, "E-Business Strategy: How to Benefit From a Hype" and review its alignment between such models as SWOT and Five Forces and the e-business that it uses as a model. In your posting, address the follow ...

Compare and contrast static and dynamic efficiency applied

Compare and contrast static and dynamic efficiency applied to the fossil fuel market. Compare and contrast the concepts of resource rent and user cost as applied to this market and the potential differences in optimal ar ...

Sorting amp searching i need this written in cwrite a

Sorting & Searching ( I need this written in C) Write a program that will allow a user the opportunity to compare and analyze the efficiency of several sorting algorithms. The program will sort integer arrays of size 10, ...

The socket example of pages 130 and 131 of the os-book

The Socket example of pages 130 and 131 of the OS-Book (Abraham Silberschatz 8th edition) is the basis of this problem. However, instead of using the Loopback IP (127.0.0.1), which emulates the socket connection on the h ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As