Softwaretechnik
Lecturer | Prof. Dr. Peter Thiemann |
Time and Place | Mo 14-16, HS 00-026, Geb. 101 |
Do 12-13, HS 00-026, Geb. 101 | |
Assistants |
Manuel Geffken Matthias Keil |
Exercise
Time and Place | Do 13-14, HS 00-026, Geb. 101 |
Tutors | Betim Musa (musab@info...) |
Sprechstunde: Di 13-14, Raum 079-00-018, Geb 079 | |
Tobias Wieland (wielandt@info...) | |
Sprechstunde: Do 15-16, Raum 079-00-018, Geb 079 |
Exam
Time and Place | Friday, 13.09.2013, 9:00 - 10:30 |
Aids | Two sheets (four pages) A4 of handwritten notes. Nevertheless, the kind of exercises will be comparable to previous exams. |
News
09.04.2014 | The post-exam review (Klausureinsicht) will take place on Monday, April 28., 9am-11am, building 079, room 00-019. |
27.09.2013 | The post-exam review (Klausureinsicht) will take place on Monday, October 7., 10am-12noon, building 079, room 00-019. |
04.07.2013 | Course evaluation! Please fill in this form (till Thursday, 2013-07-11): Course evaluation for Softwaretechnik 2013. |
18.06.2013 | Please participate in our online evalutation regarding the exercise sheet submission process. |
30.04.2013 | From this week, please submit your exercise sheets in the "Softwaretechnik" mail box in building 051, EG. |
25.04.2013 | Please check whether you are registered with Daphne for SWT 2013. If not, please register. We have started assigning tutors to the already registered students. |
8.04.2013 | Forum for the discussion of questions and problems. |
Slides
Exercises
Exercise sheet 1 is linked to below. Other exercise sheets are available via Daphne.
Date | Due date | Sheet | Material |
---|---|---|---|
2013-04-18 | 2013-04-25 | ex01.pdf | |
2013-04-25 | 2013-05-02 | ex02.pdf | |
2013-05-02 | 2013-05-10 | ex03.pdf | |
2013-05-08 | 2013-05-16 | ex04.pdf | Design Patterns (cont) |
2013-05-16 | 2013-05-30 | ex05.pdf | |
2013-05-29 | 2013-06-06 | ex06.pdf | |
2013-06-06 | 2013-06-13 | ex07.pdf | |
2013-06-13 | 2013-06-20 | ex08.pdf | ex08-example.xml, ex08-parser.c, ex08-parser.zip |
2013-06-20 | 2013-06-27 | ex09.pdf | |
2013-06-27 | 2013-07-04 | ex10.pdf | |
2013-07-04 | 2013-07-11 | ex11.pdf | |
2013-07-11 | 2013-07-18 | ex12.pdf |
Course Management
Please register with the Daphne course management system before submitting any exercises.
Literature
General
- Steven McConnell. Code Complete, 2ed.. Microsoft Press.
- Object-Oriented Software Engineering Using UML, Patterns, and Java (3rd Edition). Bernd Bruegge and Allen H. Dutoit. Prentice Hall.
- Ian Summerville. Software Engineering. Pearson Studium.
- Helmut Balzert. Lehrbuch der Softwaretechnik: Basiskonzepte und Requirements Engineering. Spektrum Akademischer Verlag.
- Bernd Oestereich. Analyse und Design mit UML 2.3. Oldenbourg Verlag, München.
Specific
- Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley. 1994.
- Martin Fowler. UML Distilled: A Brief Guide to the Standard Object Modeling Language. Addison-Wesley. 2003.
- Steve Schneider. The B-Method: an Introduction, Palgrave Cornerstones in Computer Science. 2001.
- Thomas Stahl, Markus Völter. Model-Driven Software Development. Wiley & Sons. 2006.
- Anneke Kleppe, Jos Warmer. MDA Explained: The Model Driven Architecture: Practice and Promise. Pearson. 2003.
- Stephen J. Mellor, Axel Uhl, Kendall Scott, Dirk Weise. MDA Distilled: Solving the Integration Problem with the Model Driven Architecture. Pearson. 2004.
Additional Information
Gastvortrag Matthias Neubauer: Entwicklung sicherheitsgerichteter Software nach IEC 61508
Die von der Internationalen Electronical Commission (IEC) herausgegeben Norm IEC 61508 mit dem Titel "Funktionale Sicherheit sicherheitsbezogener elektrischer/elektronischer/programmierbarer elektronischer Systeme" wird überall dort eingesetzt, wo Systeme, die eine Sicherheitsfunktion umsetzen und deren Ausfall ein maßgebliches Risiko für Mensch oder Umwelt bedeutet, entwickelt werden.
Der Vortrag gibt eine Einführung in die Norm IEC 61508, erläutert Anforderungen an den Softwareentwicklungsprozess von sicherheitsbezogener Software solcher Systeme und präsentiert Anwendungsbeispiele aus der Entwicklungspraxis von Sicherheitssensoren der Firma SICK AG.