Skip to content

Research at St Andrews

What's the PREMES behind your Pattern?

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Author(s)

Jan de Muijnck-Hughes, Ishbel Mary Macdonald Duncan

School/Research organisations

Abstract

Design Patterns are supposed to be well documented, tried and tested solutions to recurrent problems. Current pattern evaluation techniques do not evaluate patterns according to the quality of pattern presented, the quality of the solution presented, nor the quality of the documentation. This paper introduces Pattern Report Cards as an evaluation process for design patterns that is demonstrable, measurable and reproducible. For the evaluation process several quality indicators have been identified from existing literature that can be used to assess the quality of a design pattern. During evaluation a collection of qualitative and quantitative evaluation techniques are used to assess how well patterns adhere to the identified quality indicators. Further, management and execution of the Pattern Report Card process is controlled by the PREMES framework. This framework provides a PDCA management cycle that facilitates the construction of bespoke evaluation systems for design patterns. Tailoring is achieved by providing guidance over selection and construction of the techniques used to assess pattern quality. Use of PREMES framework and Pattern Report Cards will lead to improvement in the quality of patterns being created by pattern writers.
Close

Details

Original languageEnglish
Title of host publicationProceedings of the 22nd Conference on Pattern Languages of Programs
PublisherACM
Number of pages16
Publication statusPublished - Oct 2015
EventPLoP 15 Pattern Languages of Programs Conference 2015 - Pittsburgh, PA, United States
Duration: 24 Oct 201526 Oct 2015

Conference

ConferencePLoP 15 Pattern Languages of Programs Conference 2015
CountryUnited States
CityPittsburgh, PA
Period24/10/1526/10/15

    Research areas

  • Software patterns, Evaluation

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. A novel method to prevent phishing by using OCR technology

    Wang, Y. & Duncan, I. M. M., 5 Jun 2019. 5 p.

    Research output: Contribution to conferencePaper

  2. Improving intrusion detection model prediction by threshold adaptation

    Al Tobi, A. M. H. & Duncan, I. M. M., 30 Apr 2019, In : Information. 10, 5, 41 p., 159.

    Research output: Contribution to journalArticle

  3. Human visual based perception of steganographic images

    Fyffe, B., Wang, Y. & Duncan, I., 2019, In : Journal of Cyber Security Technology. 3, 2, p. 61-107 47 p.

    Research output: Contribution to journalArticle

  4. KDD 1999 generation faults: a review and analysis

    Al Tobi, A. M. & Duncan, I., 2018, In : Journal of Cyber Security Technology. 2, 3-4, p. 164-200 37 p.

    Research output: Contribution to journalArticle

  5. Aerial Virtual Reality: Remote Tourism With Drones

    Fabola, A. E., Miller, A. & Duncan, I. M. M., Nov 2017.

    Research output: Contribution to conferencePaper

ID: 242951380