Document 11082209

advertisement
Dewey
HD28
.M414
^0
f JAN 28
1^<^-
mS%m
Center for Information Systems Research
Massachusetts
Institute of
Alfred P. Sloan School of
Technology
Management
50 Memorial Drive
Cambridge, Massachusetts, 02139
617 253-1000
1982
TOWARDS AN AXIOMATIC APPROACH
TO
INFORMATION SYSTEMS DEVELOPMENT
John J. Donovan
Steven H. Kim
August 1981
CISR No. 77
Sloan WP No. 1260-81
To be presented at the Second International Conference on Information Systems
Cambridge
December 1981
(c)
1981 John J. Donovan and Steven H. Kim
Center for Information Systems Research
Sloan School of Management
Massachusetts Institute of Technology
M.I.T.
LIBRARIES
JAN 2 8
1982
RECEIVED
Page
10/02/81
Axiomatics
1
ABSTRACT
method)
This paper advocates an approach (called the axiomatic
to reduce
the
costs
of
constructing
system.
information
an
method to
Further, we contrast the applicability of the axiomatic
the
more
traditional
approach of enumerating alternatives (the
algorithmic method) in constructing an information system.
We delineate the steps involved
system,
theorems.
present
a
in
set of pilot axioms,
building
an
information
and offer some derivative
We then apply these axioms and theorems to each
(specification,
design,
implementation
information system life cycle, and confirm
phase
and maintenance) of the
a
number of
empirical
results other information system builders have observed.
0''/43€.X4
Axiomatics
10/02/81
1
Page 2
INTRODUCTION
.
Our discussion of PRODUCTIVITY pertains to
time
and
cost
involved
information system
(specification,
maintenance).
include
We
computer-based
system
information.
This
in
used
operational examples
such
the
as
the
in
building an
of
implementation
design,
and
term INFORMATION SYSTEM any
analyze
store,
to
includes
phases
four
all
in
reduction
the
spectrum
systems
accounting
payroll
present
and
of
from
decision
to
support systems for strategic planning.
The purpose of this paper is to present
whittling
for
construction
down
that
builder
system
a
must
systematic
method
and cost; this is to be
time
achieved by strategically reducing
a
number
the
when
evaluate
of
alternatives
constructing
an
information system.
We use the term INFORMATION SYSTEM CONSTRUCTION to
four
all
phases
of
system life cycle.
the
apply
to
Likewise the term
INFORMATION SYSTEM BUILDER refers to the person(s) in
charge
of
these four phases.
BACKGROUND ON AXIOMATICS
1.1
In some areas
that
always
certain
appear
such as manufacturing,
design
to
decisions
yield
(e.g.
superior
it
has
been
recognized
maintaining
modularity)
This
observation
designs.
10/02/81
Axiomatics
the
suggests
the process.
3
existence of basic natural principles which govern
If
these principles or axioms can be
crystallized
and
Page
information
for
systems,
tracked
down
we may establish
a
scientific approach to design.
AXIOMS
general
are
counter-examples.
truths
immune
violations
to
or
are to be taken as first principles and
They
are intrinsically unprovable.
THEOREMS may be defined as readily derivable
consequences
of
axioms, while COROLLARIES are readily deducible results of axioms
and theorems.
FUNCTIONAL REQUIREMENTS are the
specifications
include
the
transactions,
security,
completely
that
capacity
degree
of
of
minimum
define
the
database,
the
independent
of
Examples
tasks.
number
multiprogramming,
daily
of
level of read/write
and extent of backup to allow complete reconstruction.
In addition to functional requirements,
needed
set
to
specify
limits
on
constraints are
byproducts
or
often
effects.
side
CONSTRAINTS are specifications that define the boundaries
attributes
which
of these side effects are acceptable.
within
Examples
include upper limits on cooling requirements or mean time between
failures, or lower limits on the accuracy of numerical solutions.
White and Booth [21], for example, recommend the inclusion
of
these specifications for software design:
1.
Functional
specifications.
Definition
of
each
data
element and the control structure among various tasks.
2.
Performance constraints.
Specification of
each
subtask
Axiomatics
10/02/81
operate
to
within
its
Page
time
4
and space constraints and to
allow the overall task to do the same.
HEURISTICS are similar to
working
guidelines.
an axiom.
1.
But
a
axioms
in
that
they
offer
both
heuristic doesn't carry the weight of
Example heuristics might be:
accounts
"If your average
receivable
is
over
$1,000,
ignore those under $10."
"For clarity and readability,
keep subroutines
under
30
These are heuristics because they provide rules of thumb with
no
2.
executable source statements." [20]
claim to ALWAYS yielding the best result.
definition
are always valid.
those of Thermodynamics,
of
a
were
to
reveal
contrast, axioms by
such as the First Law:
system is constant."
be promoted to axioms
In
Perhaps the most famous axioms are
"The total energy
(The two sample heuristics
if industrial
above
may
or psychological case studies
that they always produce the most profitable or
readable results.)
1.2
FRAMEWORK FOR INFORMATION SYSTEMS DEVELOPMENT
The phases involved in constructing an information system
be
classified in
a
variety of ways [14],
the development phases as:
1.
Specification
In
may
this paper, we view
a.
functional requirements
b.
constraints
5
Architectural design
2.
a.
hardware
b.
software
Implementation
3.
a.
hardware selection
b.
code generation
c.
testing
Maintenance
4.
These phases are not intended to be
according
example,
Page
10/02/81
Axiomatics
one
to
partitioned.
strictly
For
method of software development, the
encoding and testing of modules should proceed side by side.
In
addition,
a
backtracking
necessitate
arising
development
to an earlier one.
program error detected in testing may require
coding or even the software design stage.
process
occurs
often
enough
to
at
In
a
the
might
illustration,
a
regression to the
In fact,
reverse
this
prompt investigation:
McClean and Urfrig [2] have shown that
errors
phase
one
in
cost
of
Boehm,
correcting
coding time is about twice that of changing it at the
design stage;
and finding it at
testing
time
costs
times that during design.
2.
ALGORITHMIC VERSUS AXIOMATIC APPROACH
about
10
Axiomatics
10/02/81
Page
6
ALGORITHMICS
2.1
The techniques for evaluating alternative
may
subdivided
be
into
basic
two
information
efficiently identify
the
approach
algorithmic
is
global
and
set of rules which
a
optimum.
contrast,
In
the
for considering
method
procedural
a
algorithmic
types,
The axiomatic method is based on
axiomatic.
systems
categories:
alternatives, and may be subdivided further into two
exhaustive and rapid search methods.
EXHAUSTIVE SEARCH
2.1.1
One algorithmic
approach
configurations
possible
— EXHAUSTIVE
SEARCH
choices.
and
— enumerates
all
drawback
The
with
exhaustive search with respect to information system construction
lies in the myriad technical choices and the explosive number
requirements
functional
demanded of new systems. To illustrate,
consider the recent design of an information system at
Associates
or
of
example
say
5
type
CPU,
programming
— that
Microwave
Burlington, Massachusetts: some design attributes
of
dimensions considered were the
size
of
language.
of
data
choice
of
representation,
Suppose
— in
this
operating
system,
and selection of
small
fancifully
there are only 10 such attributes to consider, with
choices
per
attribute.
million, design possibilities.
weekends to evaluate them all.
2.1 .2 RAPID SEARCH
The result is 5**10,
It would take
more
or over
than
a
9
few
.
10/02/81
Axiomatics
Page 7
Another algorithmic approach is RAPID SEARCH, in which
of guidelines constrain the domain of evaluation.
branch
which
bound,
and
seeks
to
a
set
One example is
discard entire branches of
inferior alternatives in the design tree.
Another example is stagewise optimization: as
is optimized,
attribute
each
the next attribute is evaluated cc nditionally under
the constraint that the preceding attribute chojces will prevail.
Consider again the
attributes
4
mentioned.
The
steps
for
stagewise optimization are:
Step
Identify all attributes and all choices within
1.
Optionally,
attribute.
each
these attributes might be ranked in
order of importance.
Step 2. Select the best choice of operating system.
Suppose
CI.
Step
3.
C2.
Say C2
CI
=
VM/370.
Select the size of CPU given that
=
=
CI
Call it
given
CI
and
C2
CI,
C2,
and
relational data model.
Step 5. Select the programming language given
Suppose C4
C3.
holds.
1024K.
Step 4. Select the data representation,
Say it's C3
Call it
=
PL/I.
Then the design with {CI C2 C3 04} will be the stagewise optimal.
,
Suppose there are
n
,
,
attributes, with m choices per
Then the stagewise algorithm requires
n
M
=
E
m.
attribute.
Axiomatics
10/02/81
evaluations.
Page
the exhaustive search method requires
In contrast,
n
N
=
es
5
,
The efficacy of the stagewise method for
evaluations.
with
m
n
•
a
problem
choices in each of 10 dimensions is
n
N
."-
e^s
N
^
1=1
SW
m.
'
"
m.
T.
1
10
c
b
-
^
2 *
10
5 * 10
i-1
In
the
class
well-specified
of
search
rapid
techniques
(e.g.
drawback
of
rapid
search
only
is
global
its
optimum.
lack
of
producing the global optimum: the union of optimized
does not necessarily yield
a
few
a
branch and bound) can lay claim
to solution algorithms that yield the
the
methods,
Usually
guarantee of
subproblems
global optimum unless the components
are mutually independent.
2.2
AXIOMATICS
The question now arises: Does there exist
principles
which
always
provides
subsets of design configurations?
attempt to specify those rules.
rules
a
set
of
general
for eliminating large
The AXIOMATIC APPROACH
is
an
10/02/81
Axiomatics
Page
9
PRESENTATION OF AXIOMS
3.
SOME DEFINITIONS
3.1
We may define
a
FEASIBLE
system
configuration
as
that
one
satisfies the functional requirements and constraints.
Then PRODUCTIVITY may be defined
[8],
with
time
in
Consider two feasible configurations A and
that
say
A
A are
For our purposes,
[9].
sense
B.
In this paper,
we
is more productive than B if both the time and cost
required to build
ways
Pareto-optimal
a
and monetary costs as attributes or dimensions.
The
less than that of
B.
INFORMATION may be defined in
information content involved in
might be characterized by the number of bits
fully describe the design.
variety
a
a
of
system design
needed to
encode
or
When communication between modules is
involved, information might be taken as defined by Shannon [171:
E
-
P.-log^
p.
1
where
p
is the probability of transmitting the ith message,
and
the summation occurs over all possible messages.
The concept of ENTROPY may be defined loosely as randomness or
disorder.
In the sense
of
information
theory
or
statistical
mechanics, entropy may be defined as the negative of information.
This relationship will be explored further in the future.
3.2
AXIOMS
Axiomatics
10/02/81
Page 10
We propose the following axioms as the set applicable
to
the
construction of information systems:
A1
:
Productivity
increases
information
when
content
is
minimized.
A2
:
increases
Entropy
over
time,
or
remains
best
at
constant.
A3:
Productivity
increases
when
independence
the
of
functional requirements is maintained.
calls
A1
for
Intuitively,
we
a
minimization
expect
information
of
the cost and complexity of
implementation to rise with
a
a
rise in the information
content.
particular
must
that
be used to define the system.
A2
refers to the viability of implemented systems.
that randomness or disorder in
time.
Eventually
must
system tends
functional
the
deteriorates to the point
system
a
where
a
implies
increase
to
modularity
completely
It
the
of
over
system
information
new
This concept is discussed further
be built afresh.
in connection with the theorems given below.
A3
calls
for
requirements
which
solution
satisfies
A
a
change
attribute
this
would
in
one
require
allows
for
functional
triggers
a
change
in
the collective optimization of the
entire set of interacting components.
independence
the
optimum is difficult to
global
independently.
attain when
others:
a
modular
In
contrast,
optimization
maintaining
in
which
10/02/81
Axiomatics
Page
optimization of each component may proceed independently
others.
independent
more
The
of
11
the
components, the better the
the
solution.
These axioms are adopted from those that have been applied
fields.
other
is
A2
thermodynamics;
A1
a
restatement
and A3 have been
of
Second
the
applied
by
Law
Bell
Suh,
to
of
and
Gossard [18] to manufacturing systems.
4.
APPLICATION OF THE AXIOMS
In this section we describe how the
number
theorems
of
pertaining
information system life cycle.
axioms
give
various
to
rise
phases
to
of
a
the
We also indicate how the theorems
might be proved.
4.1
PHASE
The
SPECIFICATION
1:
theorem
first
follows
from
A1
,
which
calls
for
a
minimization of information:
T1.1
Productivity increases when the number
of
functional
requirements are minimized.
Obviously
the
information
content
incorporated
in
a
system
specification can only increase with an increase in the number of
functional
requirements
and
constraints.
The
resulting
Axiomatics
10/02/81
complexity
assertion
n,2
This
cost.
.
PHASE 2: ARCHITECTURAL DESIGN
In the following theorems,
may
construction
increase
consistent also with the behavior of manufacturing
is
systems [22]
only
then
can
Page 12
either
apply
"component"
the terms "module" and
hardware or software in the architectural
to
design phase:
Productivity
T2.1
increased
with
increases
use
of
standardized or interchangeable modules.
T2.2
a
A
design should incorporate functional requirements in
single module if
these
requirements
can
be
kept
from
mutually interacting.
requirements,
If a design exhibits coupled functional
T2.3
these requirements should be segregated or decoupled.
The first theorem (T2.1) springs from
minimization of information.
description
or
specification
When
is
a
A1
requires
which
,
a
standard module is used, its
required
only
once.
If the
module is needed again, it may be specified simply by referencing
the original module.
T2.2 derives from
discrete
modules
A1
,
since
minimizes
a
reduction
as
A3
requires,
the
number
of
information that would otherwise be
needed to specify how all the original
However,
in
modules
would
interact.
the functional requirements must still
10/02/81
Axiomatics
be independent of each other;
result
interdependencies
the
if not,
overall information requirements.
increased
in
Page 13
may
This is
the idea behind theorem T2.3.
The use of T2.3 may be illustrated by an example from
writers'
the
personal experience.
one
of
The setting involved the Pan
Am reservation system which was experiencing
phenomenal
growth.
system retrieved data through linear search methods; but the
The
increasing size of the database led to
retrieval
in
which
time,
transactions
processed.
requirements
pertaining
in
In
the
to
corresponding
a
turn
reduced
this
case,
size
increase
the daily rate of
the
functional
the database and the
of
transaction processing rate had become coupled.
A
this
decoupling of these functional requirements
was
was
in
order;
by converting the method to hashing
accomplished
For low record densities in
a
hashed system,
the
accessing
[5].
rate
(hence the transaction processing rate) is largely independent of
the database size.
4.2.1
PARTITIONING OF FUNCTIONAL REQUIREMENTS
The complete independence of
ideal
As
a
to strive for,
practical matter,
requirements
functional
is
an
but may be difficult to attain in practice.
a
partial independence
among
subsets
of
functional requirements may be better than none.
We may invoke
T2.4
A1
and A2 to yield the following theorem:
Functional requirements should
be
partitioned
into
Axiomatics
10/02/81
Page 14
smaller groups with minimal interaction between groups.
Consider
According
applications
financial
a
theorem,
this
to
package,
example.
for
change in the credit check module
a
should not disturb the billing module.
optimally
To
partition
groups,
smaller
functional
important
is
it
between
relationships
the
to
requirements.
those
requirements
into
evaluate
first
These
the
functional
dependencies may then be represented by an undirected graph (See,
Andreu
example,
for
survey
brief
offers
a
and
[1]
method
better
Huff [?]).
Wong [23] presents
graph-decomposition
existing
of
for
finding
techniques
subgroups of independent
His technique is discussed
functional requirements.
a
and
in
greater
detail in the Attachment.
4.3
PHASE
IMPLEMENTATION
3:
From axiom
A1
we also propose another
theorem
applicable
to
Phase 3b (software design) of the information systems development
life cycle:
T3.1
The number of program statements should be minimized.
This is consistent
with
the
empirical
observation
increases disproportionately with program size [11]:
Effort
=
Constant
*
(Number of instructions)
'
that
cost
10/02/81
Axiotnatics
Another theorem due to
A1
Page 15
is
Productivity increases with the use of
T3.2
a
higher-level
language.
Taliaffero [19] reports that productivity is
statements
Fortran
per
year
productivity
by
whether
Nelson
Cobol.
or
factor
a
a
at
2,400
program is written in assembler,
also
[12]
of
constant
shows
an
increase
in
or more by using higher-level
3
languages.
Some other consequences of
T3.3
A
A1
are:
system should be decomposed
smaller
into
logical
units.
Separate subroutines
T3.4
should
be
designed
for
each
elementary task.
Here,
information is minimized because the interaction among
elements
of the system are localized within each
situation,
any
accomplished
as
interaction
between
modules
i
nodule.
and
the
In this
j
are
components in their entirety, without the need
for one to keep track of the function of each element within
the
other module.
One rule of thumb calls for
modules
a
partitioning of
functions
into
until each module includes no two elements that might be
useful in isolation.
Another
rule
claims
that
each
program
10/02/81
Axiomatics
module
should
be
enough
small
allowing comprehension at
Page 16
fit
to
one page,
on
thereby
single glance.
a
The drive toward modularity is not costless,
Camp
of course.
Jensen [4] report that modularity results in an extra 20-35%
and
overhead in memory and another 10-15X excess in run time
with
the
maintenance.
of software analysts,
increase
will
words,
overhead.
For
As
and cost by 50 to 100%.
example,
module
as
module
who believe that doubling the
complexity
the recommended average module size is
module
triple
with the concensus opinion
This may be compared
doubles.
size
costs
complexity and
In fact,
a
during development and
savings in productivity
major
over
but these costs are small in comparison
monolithic architecture;
if
to
3
the
5
times
a
the
size
result,
average
module overhead is 10
then the average module size should be
30
to
50
words,
including the overhead.
A1
and T3
T3.5
. 1
suggest this result:
The number of instructions coded is not
a
measure
of
productivity.
Intuitively,
instructions.
large-scale
But
A1
and T3
of instructions generated.
by total program size.
4.4
systems
PHASE 4: MAINTENANCE
. 1
require
will
call for
a
many
program
reduction in the number
Hence productivity cannot be measured
10/02/81
Axiomatics
Page 17
Axiom A2 suggests the following theorem:
The usability of
T4.1
a
decreases
system
over
time,
and
will eventually vanish.
Brooks [3] maintains that all information systems die eventually.
This is attributed to the inevitable patches or fixes to software
errors,
and the resulting decay in the
The need for fixes arise from
the sytem.
a)
conceptual
integrity
of
variety of factors.
a
Bugs.
Bugs in large systems
According
Brooks
to
Pikul and Wojcik
verminous
[15]
attacks.
fixing
[33,
introduce another with 20
As
remarkably
are
-
one
50 % probability.
offer
shown
the
bugs detected rises steeply at the outset
then
around
A
a
drops.
But
of
for
the rate of
any
program.
the attack rate eventually
it rises once again,
to oscillate
steady-state value within an attenuated envelope.
highly damped version of this
slow
model
following
in the diagram,
As debugging proceeds in earnest,
peaks,
creatures.
hardy
error will merely
decay
to
steady-state
model
value,
(steep
without
rise
the
and
minor
oscillations) is supported also by Ramamoorthy and Ho [16].
b)
Changes in user requirements.
In practice,
system,
they
as users become proficient with a particular
begin
to
demand
higher
performance.
They
change the original functional requirements by stretching an
existing
one
or
even
even
adding
new ones.
An airline
10/02/81
Axiomatics
Page 18
Rate of
Software
Errors
Detected
Cumulative number of program
ru-'is
reservation system, for example, may begin
simple
passenger
booking system.
is expanded to allow for kosher
fuel
distribution,
and
other
operation
meals,
addition of new code could easily mean
that
a
scheduling,
flight
functions.
as
the system
In due course
rate
The
the
bugs
of
are
proliferating faster than they are being eliminated,
c)
Changes due to hardware.
Technological advances may dictate the switch from,
an
IBM/370
to
a
/3033 for increased processing speed.
say,
Any
Page 19
10/02/81
Axiomatics
such transformation is rife with conversion problems.
5.
RELATIONSHIPS BETWEEN THEOREMS
The precedence relationships among the axioms and theorems may
be summarized as follows,
"derived from":
where arrows indicate the
relationship
Axiomatics
A
10/02/81
question which might arise is,
play
building
in
analysis in the
information
construction
Page 20
"What
role
systems?"
of
does
creativity
Creativity
information
precedes
systems;
it
is
important in the generation of alternative designs, without which
there can be no comparative evaluation.
methods are available for stimulating
A variety of
One of these is the trigger word method involving questions
[6].
what
about
[13]
creativity
"Magnify?",
The
design
the
is based on
a
The checklist method
such
as
"Rearrange?" or "Combine?"
morphological
attributes
is supposed to do.
series of questions on modification,
method
listing
involved,
[24]
requires
and
them,
determining
considering
all
the
the
resulting combinations.
Brainstorming refers to the animated generation of ideas by
heterogeneous group of participants,
new
a
The purpose is to produce
possible, however unorthodox they may be.
This paper, however,
se.
some of whom may be entirely
to the concepts under discussion.
as many ideas as
is not intended to address creativity per
The aim of axiomatics is to channel creativity by
set of guidelines.
designs,
but
a
providing
The objective lies not in the generation of
in the assignment of relative merit to alternative
configurations.
7.
CLOSURE
10/02/81
Axiomatics
Page 21
application
This paper has introduced the
of
axiomatic
the
approach to productivity in constructing information systems.
three
enumerated
have
pilot
proposed
axioms,
theorems, and indicated how the theorems spring from
upon
draw
and
empirical
results
from
the
We
number
a
of
axioms
the
construction
of
information systems.
We note that axiomatics is not
candidate
but
designs,
a
process of evaluating them.
to supplant algorithmics.
streamlining
in
the
methodology
a
generating
for
for use in the decision-making
tool
Further, axiomatics is not
intended
they will reinforce each other
Rather,
development process, as illustrated by the
use of the decomposition algorithms discussed in Section 4.2.1.
We hope that this paper
informations
systems
will
start
community,
so
a
that
dialogue
we
within
may collectively
generate the analytical and experimental results needed to
concept further.
this
only
a
pilot set,
the
carry
The axioms and theorems proposed here are
and may require changing,
deleting or adding to
in the light of experience.
In the future we would
compact
set,
to
like
refine
to
rephrase them in
a
in
systems
development.
axioms
into
a
more quantitative form from
which to prove the theorems, and to validate
studies
the
them
through
case
The successful development of
the axiomatic approach should open up new avenues for
increasing
productivity in the construction of information systems.
Axiomatics
10/02/81
Page 22
ACKNOWLEDGEMENTS
We gratefully acknowledge our debt to those who
before
us,
to Professor Nam P.
fields.
Recognition
field
colleagues
and
suggestions.
due
in
to
those
in
of thermodynamics who initially applied the axiomatic
method to the analysis of physical systems.
Lattin
is
Suh and his colleagues at the MIT
Laboratory for Manufacturing and Productivity, and
the
written
both in information systems and in the application of
the axiomatic method in other
particular
have
at
the
Mike
Sloan
School of Management
Treacy--for
their
also
We
—
thoughtful
thank
our
Tony Wong, Jim
comments
and
Page 23
10/02/81
Axiomatics
ATTACHMENT- DECOMPOSITION OF FUNCTIONAL REQUIREMENTS
BY THE HIGH-DENSITY CLUSTERING METHOD
A.I
GRAPHICAL REPRESENTATION OF FUNCTIONAL REQUIREMENTS
The first task in partitioning functional requirements
them
represent
of a graph,
nodes
as
between them as arc weights.
is
to
and the interdependencies
information
In building an
system,
some examples of functional requirements might be:
1.
The users will be guided by menus.
2.
A
report-writing facility will allow
users
to
develop
customized reports.
3.
the
to
Reports can be directed
line
printer
may
be
or
the
user's terminal.
Each
these
of
graphically
functional
as
requirements
functional
a
node
in
requirements,
interrelationship
we
between
design graph.
a
consider
can
the
nodes.
The
represented
For each pair of
degree
the
extent
of
this
of
association can be characterized as the weight on the link or arc
between the pair.
and
For convenience the weights are normalized between
If
two
functional
requirements
are
deemed
interdependency, the system builder might assign
0.3;
to
a
have
link weight of
an average degree of coupling may be represented by 0.5;
strong
relationship
deemed independent,
by 0.8.
1.
weak
a
a
If two functional requirements are
the link weight is 0.0,
is eliminated from the design graph.
and the
link
itself
10/02/81
Axiomatics
Returning
to
requirements
functional
therefore assigned
But
nodes).
two
example
our
above,
may
aids
must
a
be
the
the
first
considered
link weight of
a
,
since
requirements
of
and
between
the
this
way
report
the
directing
So the link weight is
be made available to the user.
value
and
no link
(i.e.
second
and
independent
first and third may be viewed to have an
average degree of interdependency
given
Page 24
the
0.5.
In
their
interdependencies
set
may
functional
of
be
represented
graphically.
DENSITY CONTOURS
A. 2
This section outlines the high-density clustering
functional decomposition proposed by Wong [233.
consisting
of nodes and unweighted arcs.
other
and
1
0-7
— O-
linked
to
In the figure below,
should belong in the same cluster,
a
for
graph
Intuitively, two nodes
belong to the same group or cluster if they are
and to many nodes in common.
method
Consider
while
nodes
i
each
nodes
k
and
j
->D
4should
be in separate cluster:
le
DKNSITY CONTOUR on the link
Axiomatics
10/02/81
between any two nodes
i
and
j
Page 25
is defined as:
No. of nodes connected tc both
i
and
j
(including
i
and
j
ij
U
"^J
No.
of nodes connected to either
i
or j or both (includii
and
i
,
If two nodes are unlinked,
their contour is defined to be zero.
The figure below illustrates the use of this definition.
example,
the contour between nodes
d*
For weighted arcs,
=
1
For
and 2 is 3/5.
2/8
the corresponding definition for
the
density
Axiomatics
10/02/81
Page 26
contour is
^ "ij ' '/^ tecC'ik ^
"it'
"ij
U-'iJ
where
W^-
•
weight on the link between nodes
=
nodes connected to both
i
and
(excluding
j
and j; C
i
set
r
and j).
i
Now we turn to the idea of grouping individual nodes.
DENSITY
CLUSTER
level
at
d*
on
graph
a
is
G,
by
links with density contour
—'d*.
in the preceding figure represent the density
HIGH
A
subgraph
a
that S is maximal among connected sets of nodes whose
connected
of
S
such
nodes
are
The nested loops
contours
for
the
given graph.
The family of high-density clusters on
form
a
at level d* expands
until
a
splitting
cluster joins with
smoothly.
This
level
is
a
c^
previously
graph may be shown to
gradual
reached,
disjoint
clusters, called BRANCHING CLUSTERS,
splitting
level is d*
=
2/8;
the cluster S
expansion
occurs
at which point the
cluster.
These
two
are useful in suggesting the
number of subgraphs in the original graph.
the
a
As the density level d* is decreased,
tree.
In the diagram above,
the two branching clusters are
{1,2,3,4,5} and {6,7,8,9,10}.
A. 3
IDENTIFYING
AND
PARTITIONING
THE
TREE
OF
HIGH-DENSITY
CLUSTERS
Consider
a
set of N nodes with density contours
d(i,j).
The
10/02/81
Axiomatics
Page 2?
algorithm to identify the tree of high-density clusters is:
STEP1. Let
i
and
j
be the pair of nodes with
Combine them to form
a
between that cluster and any node
d(l,k)
STEP2.
j.
Repeat STEP1
,
=
max [d(
treating
1
k
a
i, k) ,d( j,
k)]
as a node and ignoring
nodes
and
are
the
to
minimum
spanning
The drawback of this procedure is that the tree
of clusters does not explicitly yield
functional
i
single large cluster.
The foregoing procedure is equivalent
algorithm.
link.
by
The aggregation of nodes continues until all
absorbed into
tree
densest
cluster 1; define the density contour
requirements.
This
algorithm given by Lattin
[10],
the
optimal
grouping
of
last step may be effected by an
which
identifies
subgraphs of functional requirements from the tree.
the
optimal
Axiomatics
10/02/81
Page 28
REFERENCES
R.C.
Andreu,
A
systematic approach to the design and
[I]
structuring
of
complex software
systems.
Unpublished Ph.D.
thesis, Sloan School of Management, MIT, 1978.
Boehm, B.
McClean, R. and Urfrig, D.
[2]
Some experience with
automated aids to the design of large scale reliable software.
Proc. International Conference on Reliable Software, Los Angeles,
CA, April 1975, pp. 105-113.
,
Brooks,
F.P.,
Jr.
The Mythical
Man - Month
Essavs
[3]
Addison-Wesley, Reading, MA, 1975.
Software Engineering.
:
xm
[M]
Camp, J.W., and Jensen, E.P.
Cost
of modularity.
Proc.
Symposium on Computer Software Engineering, April 20-22, 1976,
Polytechnic Press, New York, 1976.
[5]
1972,
Donovan, J.J.
pp. 91-95.
[6]
Harrisburger,
Belmont, CA, I966.
Systems Programming
.
McGraw-Hill, New
Engineer smanship
.
Brooks/Cole
L.
York,
Publising,
Huff, S.L.
A
systematic methodology for designing the
[7]
architecture of complex software systems.
Technical Report No.
Naval
Systems
Electronic
Command, Washington, D.C., 1979.
12,
[8]
Keeney,
Objectives
.
and
R.L.
Raiffa,
John Wiley, New York,
H.
1976,
Decisions With
pp. 69-77.
Multiple
Kim,
S.H.
Manufacturing
axiomatics,
with
special
[9]
application to air compressor design.
Unpublished S.M. thesis.
Department of Mechanical Engineering, MIT, 1978.
Implementation and evaluation of a graph
[10] Lattin, J.M.
partitioning technique based on a high-density clustering model.
Technical Report #15, Center for
Information Systems Research,
MIT,
1981.
[II]
Nanus,
B.
and
Farr,
L.
Some cost contributors
to
large-scale programs, AFIPS Proc. SJCC, Spring 1964, pp. 239-248.
[12] Nelson, E.A.
Management
Computer Programming Costs.
^
TM-3225, pp. 66-67.
Handbook for the Estimation of
Systems Development Corp., Report
10/02/81
Axiomatics
[13] Osborn, A.F.
New York, 1963.
Applied Imagination.
Page 29
Charles Scribner's Sons,
and
L.L.
L.J.
Tripp,
A
Peters,
model
of
software
Proc.
3rd
International Conference on Software
engineering.
Engineering, Atlanta, GA, May 10-12, 1978, pp. 63-70.
.[14]
Wojcik,
R.T.
Software effectiveness:
[15] Pikul, R.A. and
a
growth
approach.
reliability
Proc.
Symposium on Computer
Software Engineering, April 20-22, 1976, Polytechnic Press,
New
York,
1976.
[16] Ramamoorthy, C.V. and Ho, B.F.
Testing large software with
automated software evaluation systems.
IEEE
Transactions on
No. 1, pp. 46-58.
Software Enginerring, SE-1
,
The
Mathematical Theory
[17] Shannon, C.E.
of Illinois Press, Urbana, IL, 1949.
Univ.
of
Communication,.'
[18] Suh, N.P., Bell, A.C., and Gossard, D.G.
On
an
approach to manufacturing and manufacturing systems.
the ASME 77-WA/PROD- 14, 1977.
W.M.
[19] Taliafero,
Software
potential.
,
1,
axiomatic
Trans,
Modularity,
the
key to system
3 (July 1971), pp. 245-57.
Weinberg,
G.M.
[20]
PL/I
McGraw-Hill, New York, 1970.
Progr amming;
A
Manual
of
of
growth
—
Style.
[21] White, J.R. and Booth, T.L.
Towards an engineering approach
to
software design.
Proc.
2nd
International Conference on
Software Engineering, Oct. 13-15, IEEE, 1976, pp. 214-222.
[22] Wilson, D.R., Bell, A.C., Suh, N.P., van Dyck, F.
and Tice,
Manufacturing axioms and their corollaries.
Proc.
North
American Metalworking Research Conference, May 13-16, 1979.
,
W.W.
A
graph decomposition technique based on a
[23] Wong, M.A.
high-density clustering model on graphs.
Technical Report #14,
Center for Information Systems Research, MIT, I98O.
F.
[24] Zwicky,
Discovery,
Invention,
Research
Morphological Approach.
MacMillan, New York, 1969.
through
the
vV
^C
5'B2
-uate uu
ENT
HD28.IVI414 no.l260' 81
Donovan, John /Towards an axiomatic ap
D'^BKS
743614
.001365.6.9.
_
3
TDflO
_
0D2 D42 751
Download