skip to main content
research-article
Free Access

Large-scale complex IT systems

Published:01 July 2012Publication History
Skip Abstract Section

Abstract

The reductionism behind today's software-engineering methods breaks down in the face of systems complexity.

References

  1. Antoniou, G. and van Harmelen, F. A Semantic Web Primer, Second Edition. MIT Press, Cambridge, MA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Baxter, G. and Sommerville, I. Socio-technical systems: From design methods to systems engineering. Interacting with Computers 23, 1 (Jan. 2011), 4--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Calinescu, R., Grunske, L., Kwiatkowska, M., Mirandola, R., and Tamburrelli, G. Dynamic QoS management and optimisation in service-based systems. IEEE Transactions on Software Engineering 37, 3 (Mar. 2011), 387--409. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Calinescu, R. and Kwiatkowska, M. Using quantitative analysis to implement autonomic IT systems. In Proceedings of the 31st International Conference on Software Engineering (Vancouver, May). IEEE Computer Society Press, Los Alamitos, CA, 2009, 100--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cliff, D., Calinescu, R., Keen, J., Kelly, T., Kwiatkowska, M., McDermid, J., Paige, R., and Sommerville, I. The U.K. Large-Scale Complex IT Systems Initiative 2010; http://lscits.cs.bris.ac.uk/docs/lscits_overview_2010.pdfGoogle ScholarGoogle Scholar
  6. Cliff, D. and Northrop, L. The Global Financial Markets: An Ultra-Large-Scale Systems Perspective. Briefing paper for the U.K. Government Office for Science Foresight Project on the Future of Computer Trading in the Financial Markets, 2011; http://www.bis.gov.uk/assets/bispartners/foresight/docs/computer-trading/11-1223-dr4-global-financial-markets-systems-perspective.pdfGoogle ScholarGoogle Scholar
  7. Commodity Futures Trading Commission and Securities and Exchange Commission (U.S.). Findings Regarding the Market Events of May 6th, 2010. Report of the CFTC and SEC to the Joint Advisory Committee on Emerging Regulatory Issues, 2010; http://www.sec.gov/news/studies/2010/marketevents-report.pdfGoogle ScholarGoogle Scholar
  8. Ge, X., Paige, R.F., and McDermid, J.A. Analyzing system failure behaviors with PRISM. In Proceedings of the Fourth IEEE International Conference on Secure Software Integration and Reliability Improvement Companion (Singapore, June). IEEE Computer Society Press, Los Alamitos, CA, 2010, 130--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ge, X., Paige, R.F., and McDermid, J.A. An iterative approach for development of safety-critical software and safety arguments. In Proceedings of Agile 2010 (Orlando, FL, Aug.). IEEE Computer Society Press, Los Alamitos, CA, 2010, 35--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Goth, G. Ultralarge systems: Redefining software engineering. IEEE Software 25, 3 (May 2008), 91--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kwiatkowska, M., Norman, G., and Parker D. PRISM: Probabilistic model checking for performance and reliability analysis. ACM SIGMETRICS Performance Evaluation Review 36, 4 (Oct. 2009), 40--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Maier, M.W. Architecting principles for system of systems. Systems Engineering 1, 4 (Oct. 1998), 267--284.Google ScholarGoogle ScholarCross RefCross Ref
  13. Northrop, L. et al. Ultra-Large-Scale Systems: The Software Challenge of the Future. Technical Report. Carnegie Mellon University Software Engineering Institute, Pittsburgh, PA, 2006; http://www.sei.cmu.edu/library/abstracts/books/0978695607.cfmGoogle ScholarGoogle Scholar
  14. Paige, R.F., Charalambous, R., Ge, X., and Brooke, P.J. Towards agile development of high-integrity systems. In Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (Newcastle, U.K., Sept.) Springer-Verlag, Heidelberg, 2008, 30--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Rittel, H. and Webber, M. Dilemmas in a general theory of planning. Policy Sciences> 4 (Oct. 1973), 155--73.Google ScholarGoogle Scholar
  16. Rushby, J. Software verification and system assurance. In Proceedings of the Seventh IEEE International Conference on Software Engineering and Formal Methods (Hanoi, Nov.). IEEE Computer Society Press, Los Alamitos, CA, 2009, 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sillitto, H.T. In Proceedings of the 20th International Council for Systems Engineering International Symposium (Chicago, July). Curran & Associates, Inc., Red Hook, NY, 2010.Google ScholarGoogle Scholar
  18. Sommerville, I. Designing for Recovery: New Challenges for Large-scale Complex IT Systems. Keynote address, Eighth IEEE Conference on Composition-Based Software Systems (Madrid, Feb. 2008); http://sites.google.com/site/iansommerville/keynote-talks/DesigningForRecovery.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. U.K. Cabinet Office. Programme Assessment Review of the National Programme for IT. Major Projects Authority, London, 2011; http://www.cabinetoffice.gov.uk/resource-library/review-department-healthnational-programme-itGoogle ScholarGoogle Scholar
  20. University of York. The LSCITS Engineering Doctorate Centre, York, England, 2009; http://www.cs.york.ac.uk/EngD/Google ScholarGoogle Scholar

Index Terms

  1. Large-scale complex IT systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 55, Issue 7
              July 2012
              120 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/2209249
              Issue’s Table of Contents

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 July 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format