Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

B7 (Seven Basic) Tools

    cause-and-effect diagrams

         classifying processes with

         definition of

         elements of

         identifying causes with

         purpose of

         recommended applications

    check sheets

         definition of

         example of

     compared to 7MP Tools (Seven Management and Planning Tools)

    control charts

         control limits

         definition of

         R charts

         recommended applications

         X-Barcharts

         XmR charts

     in DFTS context

     discussion questions

    flowcharts

         creating

         definition of

         detailed flowcharts

         high-level flowcharts

         purpose of

         recommended applications

         swim lane flowcharts

         symbols

    graphs

         bar charts

         definition of

         pie charts

         recommended applications

         run charts

    histograms

         definition of

         distribution patterns

         recommended applications

         specifications

         stratification

     Ishikawa, Kaoru

     key points

     overview of

    Pareto charts

         example of

         recommended applications

     review questions

    scatter diagrams

         definition of

         recommended applications

         scatter plot analysis

backlog management index (BMI)

balanced scorecard 2nd

bar charts

belief systems

between-product noise

black belt training 2nd

black box testing

Blitz QFD 2nd 3rd 4th

     additional resources

     analyzing customer's needs 2nd

     analyzing essential tasks 2nd

     Critical Chain project management

     deploying high-value customer needs 2nd

     in DFTS

     discussion questions

     follow-up

     gemba visits 2nd

     identifying customer's needs 2nd

         changing requirements

         Customer Voice Table (CVT)

         stated requirements

         unstated requirements

    implementing

         challenges and pitfalls

         questions to ask

         social aspects

     in-depth analysis

     Internet exercises

     Kano model

     key customer segments

     key points

     key process steps

     key project goals

     precedence diagrams

     prioritizing customer's needs 2nd

     problems with new development

         coherent development

         incoherent development

     rapid application development (RAD)

     review questions

     Six Sigma projects

     structuring customer's needs 2nd

BMI (backlog management)

body deployment (MD Robotics case study)

     body motion hierarchy

     primary structure of triceratops

     storyboards vs. body motion matrix

Borland JBuilder

bottom-up integration testing

boundary systems

brainstorming 2nd

brand-new products, QFD for customer needs, defining

     customer context analysis

         customer environment analysis

         Kansei Engineering

         Theory of Constraints (TOC) 2nd

         Voice of Customer Analysis

     customer requirements

     layers of resistance to change

     marketing

     overview

     value

Brassard's Full Analytical Criteria Method

     alternative solutions

     criteria

     goals

BS 15000-1

BS 15000-2

bugs

build-and-fix software development model

Building a Secure Platform for Trustworthy Computing (white paper)

business integrity, Microsoft Trustworthy Computing Initiative

buy-to-build

Категории