Wang, A., & Stamelos, I. presented a case study

Wang, X., & Wang, L. (2010). Raising software quality, less time and effort is considered to be what makes the software components so important in the modern world’s technology. Reusable software component Management and retrieval process are factors that are so important to reuse software in a successful manner. The number of Reusable components increases on a continuous base which makes the component to be a major asset in a large corporation; this large number of components that adapts to technology evolution needs automatic retrieving tools to search for a specific component from the library of the software component to be reused later. A formula is used to calculate the reusable cost by having these factors (Retrieving cost, understanding cost, and modifying cost) 21.  Reusable cost = retrieving cost + understanding cost + modifying cost. In order to retrieve a component effectively using a mechanism that can reduce retrieval and understanding cost. As well it is very important to have a management process that can help in classifying the library of software components to reduce the time of retrieving causing the reusable cost to be reduced as well 21.  Zaimi, A., Ampatzoglou, A., Triantafyllidou, N., Chatzigeorgiou, A., Mavridis, A., Chaikalis, T., Deligiannis, I., Sfetsos, P. & Stamelos, I. investigated the reuse processes considering the following aspects: Software functionality built from (scratch/ reused); reuse decision modification frequency, and reuse effects on product quality of the software project. The results suggested that reuse decisions are not frequently revisited after establishment, the reuse opportunity is high and intense across time; Authors cannot confirm that the reuse decision is a quality driven 30.Open-source libraries are considered as a common example of third-party libraries; the advantages or main objectives of third-party libraries are: (a) It is available for free, (b) Increases reusability, (c) Ad-hoc concept, (d) Less time and effort for software developers. Open-source projects depend on the reuse of third-party libraries. Reusing open-source libraries in a software project is done using a black-box reuse which is concerned with reusing external libraries that are represented in a binary form; the source code of these libraries are hidden, therefore it cannot be accessed nor to be modified  22. Paschali, M., Ampatzoglou, A., Bibi, S., Chatzigeorgiou, A., & Stamelos, I. presented a case study on game development; they performed multiple case studies on around a (110 games that are open-sourced specific). A large-scale repository of Open source software components is used for investigating the availability of reusable component of (open source type) for game development from the following aspects 23:Which game type can have an advantage from reusing open-source components?Requirement mapping between available open-source components and game requirement.Paschali, M. et al. (2016) their study case results suggested that games that have a complex game logic such as strategist games have a high opportunity of reuse, and requirements that are more common and frequently used by reusing open-source software components are relative in characters and scenario-cases 23. The empirical study explored game development by exploring existing games for reusing its open-source components from two aspects used as parameters that can be effective on reusability degree of the component; those aspects are: the game type (sub-domain of the game) and certain requirements that can be specifically used to fulfill the needed software component. Examining the relations between these aspects resulted from a huge amount of retrieved components from different open-source games suggesting that game type presents a high reusability degree than others 23.A secure software architecture for distributed software applications a design had been proposed by  Shin, M., Gomaa, H., & Pathirage, D. (2016) of a reusable secure connector that can be used within the software architecture. Secure connectors are designed by reusing the most suitable (appropriate) communication pattern between components; as well as the security services that are required by the component 24.Secure connectors are designed as a composite component that encapsulates security services and communication pattern combined, integrated by a security coordinator; the main advantage or objective of designing a secure connector conducted from this research is to be designed separately from the application component in order to be reused in different applications 24.

x

Hi!
I'm Brenda!

Would you like to get a custom essay? How about receiving a customized one?

Check it out