Open Access
Issue
MATEC Web Conf.
Volume 301, 2019
The 13th International Conference on Axiomatic Design (ICAD 2019)
Article Number 00024
Number of page(s) 26
DOI https://doi.org/10.1051/matecconf/201930100024
Published online 02 December 2019
  1. Wikipedia. Borders Group. https://en.wikipedia.org/wiki/Borders_Group (accessed on July 14, 2019). [Google Scholar]
  2. Wikipedia. Power law. https://en.wikipedia.org/wiki/Power_law (accessed on July 14, 2019). [Google Scholar]
  3. E. Siegel. Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die. Wiley. 2013. [Google Scholar]
  4. J. Surowiecki. The Wisdom of Crowds. Anchor. 2005. [Google Scholar]
  5. P. M. Mell, T. Grance. The NIST Definition of Cloud Computing. Special Publication (NIST SP)- 800-145. September 28, 2011 https://www.nist.gov/publications/nistdefinition-cloud-computing [Google Scholar]
  6. T. V. Vleck. Project MAC. Available at https://multicians.org/project-mac.html (accessed on July 14, 2019). [Google Scholar]
  7. Wikipedia. Intergalactic Computer Network. https://en.wikipedia.org/wiki/Intergalactic_Computer_Network (accessed on July 14, 2019). [Google Scholar]
  8. Wikipedia. Timeline of virtualization development. https://en.wikipedia.org/wiki/Timeline_of_virtualization_development (accessed on July 14, 2019). [Google Scholar]
  9. R. Chellapp, Intermediaries in CloudComputing: A New Computing Paradigm, Presented at INFORMS Meeting, Dallas, 1997 [Google Scholar]
  10. P. P. Grassé. Insectes Sociaux VI. 79. 1959 [Google Scholar]
  11. H. V. D. Parunak. A survey of environments and mechanisms for human-human stigmergy. 2006. Environments for Multi-Agent Systems II: 163–186. [CrossRef] [Google Scholar]
  12. C. Fehling, F. Leymann, R. Retter, W. Schupeck, P. Arbitter. Cloud Computing Patterns: Fundamentals to Design, Build, and Manage Cloud Applications. Springer; 2014 [Google Scholar]
  13. T. Erl, R. Cope, A. Naserpour. Cloud Computing Design Patterns. Prentice Hall; 1 edition (March 19, 2017) [Google Scholar]
  14. S. M. F. Akhtar. Big Data Architect's Handbook: A guide to building proficiency in tools and systems used by leading big data experts. Packt Publishing, 2018 [Google Scholar]
  15. T. Erl, W. Khattak, P. Buhler. Big Data Fundamentals: Concepts, Drivers & Techniques. Prentice Hall, 2016 [Google Scholar]
  16. D. W. Tollen. The Tech Contracts Handbook: Cloud Computing Agreements, Software Licenses, and Other IT Contracts for Lawyers and Businesspeople. American Bar Association. 2016. [Google Scholar]
  17. U. Wilensky. Ants. NetLogo Models Library. http://ccl.northwestern.edu/netlogo/models/Ants 1997 [Google Scholar]
  18. J. Urquhart. Cloud is complex—deal with it. Jan 8, 2012. https://gigaom.com/2012/01/08/cloud-iscomplex-deal-with-it/ (accessed on July 14, 2019). [Google Scholar]
  19. J. H. Holland. Studying complex adaptive systems. Journal of Systems Science and Complexity 2006, 19(1), 1–8. [CrossRef] [MathSciNet] [Google Scholar]
  20. S. A. Karthikeyan. Azure Automation Using the ARM Model: An In-Depth Guide to Automation with Azure Resource Manager. Apress; 1st ed. November 12, 2017 [CrossRef] [Google Scholar]
  21. J. Thomas, A. Zaytseva. Mapping Complexity/Human Knowledge as a Complex Adaptive System. 2016 Wiley Periodicals, Inc., Vol. 21 No. S2. DOI 10.1002/cplx.21799. 24 June 2016. https://onlinelibrary.wiley.com/doi/abs/10.1002/cplx.21799 [Google Scholar]
  22. Wikipedia. Horizontal gene transfer. https://en.wikipedia.org/wiki/Horizontal_gene_transfer (accessed on July 14, 2019) [Google Scholar]
  23. J. Lee, T. Wei, S. K. Mukhiya. Hands-On Big Data Modeling: Effective database design techniques for data architects and business intelligence professionals. Packt Publishing. 2018. [Google Scholar]
  24. D. Igbe. Defense in Breadth or Defense in Depth? https://www.cloudtechnologyexperts.com/defense-in-breadth-or-defense-in-depth/June12,2017. (accessed on July 14, 2019) [Google Scholar]
  25. P. Louridas, D. Spinellis, V. Vlachos. Power laws in software. ACM Transactions on Software Engineering and Methodology, 18(1): 1–26, September 2008. Article 2. (Doi:10.1145/1391984.1391986) [CrossRef] [Google Scholar]
  26. H. Ward. How to Hire. https://medium.com/eshares-blog/how-to-hire34f4ded5f176#.b04yy5bkaJanuary1,2016. (accessed on July 14, 2019) [Google Scholar]
  27. A. L. Barabási, R. Albert. Emergence of Scaling in Random Networks. Science 286, 509 (1999). Doi:10.1126/science.286.5439.509 [CrossRef] [MathSciNet] [PubMed] [Google Scholar]
  28. N. P. Suh. The Principles of Design. 1st ed. New York: Oxford University Press; 1990 [Google Scholar]
  29. N. P. Suh. Axiomatic Design--Advances and Applications. Oxford University Press. 2001. [Google Scholar]
  30. Wiktionary. Give a man a fish and you feed him for a day. https://en.wiktionary.org/wiki/give_a_man_a_fish_and_you_feed_him_for_a_day;_teach_a_man_to_fish_and_you_feed_him_for_a_lifetime (accessed on July 14, 2019) [Google Scholar]
  31. T. Anfodillo, M. Carrer, F. Simini, I. Popa, J. R. Banavar, A. Maritan. An allometry-based approach for understanding forest structure, predicting tree-size distribution and assessing the degree of disturbance. Royal Society Publishing. 22 January 2013. https://doi.org/10.1098/rspb.2012.2375 [Google Scholar]
  32. K. J. Niklas. Plant Allometry: The Scaling of Form and Process. University of Chicago Press. 1994 [Google Scholar]
  33. C. Z. Loboz. Cloud Resource Usage—Heavy Tailed Distributions Invalidating Traditional Capacity Planning Models. Journal of Grid Computing. December 2010. Doi:10.1145/1996109.1996112 [Google Scholar]
  34. Wikipedia. Markov property. https://en.wikipedia.org/wiki/Markov_property (accessed on July 14, 2019) [Google Scholar]
  35. J. Thomas. Archstand Theory of Design for Innovation. PhD Thesis, 1995. Available at: http://dspace.mit.edu/handle/1721.1/1172MIT (accessed on July 14, 2019) [Google Scholar]
  36. Wikipedia. Stent. https://en.wikipedia.org/wiki/Stent (accessed on July 14, 2019) [Google Scholar]
  37. Wikipedia. Ironic process theory. https://en.wikipedia.org/wiki/Ironic_process_theory (accessed on July 14, 2019) [Google Scholar]
  38. Wikipedia. SWOT analysis. https://en.wikipedia.org/wiki/SWOT_analysis (accessed on July 14, 2019) [Google Scholar]
  39. Wikipedia. Porter's five forces analysis. https://en.wikipedia.org/wiki/Porter%27s_five_forces_analysis (accessed on July 14, 2019) [Google Scholar]
  40. W. Jansen, T. Grance. Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology. Special Publication 800–144. December 2011. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf (accessed on July 14, 2019) [Google Scholar]
  41. The Open Group. Cloud Computing Governance Framework. http://www.opengroup.org/cloud/gov_snapshot/p3.htm (accessed on July 14, 2019) [Google Scholar]
  42. E. Passmore. Migrating Large-Scale Services to the Cloud: A master checklist of everything you need to know to move to the Cloud. Apress. 2016. [Google Scholar]
  43. Cloud Industry Forum. 8 Criteria to ensure you select the right cloud service provider. https://www.cloudindustryforum.org/content/8-criteria-ensure-you-select-right-cloud-serviceprovider (accessed on July 14, 2019) [Google Scholar]
  44. D. J. Snowden, M. E. Boone. A Leader’s Framework for Decision Making. Harvard Business Review. November 2007. https://hbr.org/2007/11/a-leaders-framework-for-decision-making (accessed on July 14, 2019) [Google Scholar]
  45. G. Wong. Jumping the S-curve. September 29, 2011. https://cognitive-edge.com/blog/jumpingthe-s-curve/ (accessed on July 14, 2019) [Google Scholar]
  46. J. Thomas, P. Mantri. Axiomatic Design/Design Patterns Mashup: Part 1. In: 9th International Conference on Axiomatic Design (ICAD), Procedia CIRP, 2015, 34, 269–275. Available at: http://www.sciencedirect.com/science/article/pii/S2212827115008501 [Google Scholar]
  47. J. Thomas, P. Mantri. Axiomatic Design/Design Patterns Mashup: Part 2. In: 9th International Conference on Axiomatic Design (ICAD), Procedia CIRP, 2015, 34, 276–283. Available at: https://www.sciencedirect.com/science/article/pii/S2212827115008513 [Google Scholar]
  48. Wikipedia. Democritus. https://en.wikipedia.org/wiki/Democritus (accessed on July 14, 2019) [Google Scholar]
  49. Wikipedia. Aristotle. https://en.wikipedia.org/wiki/Aristotle (accessed on July 14, 2019) [Google Scholar]
  50. J. Sonmez. Soft Skills: The software developer's life manual. Manning Publications. 2014. [Google Scholar]
  51. N. P. Suh. Complexity: Theory and Applications. 1st ed. New York: Oxford University Press; 2005 [Google Scholar]
  52. R. Coram. Boyd: The Fighter Pilot Who Changed the Art of War. Little, Brown and Company. 2002 [Google Scholar]
  53. Wikipedia. OODA loop. https://en.wikipedia.org/wiki/OODA_loop (accessed on July 14, 2019) [Google Scholar]
  54. C. Richards. Certain to Win: The Strategy of John Boyd, Applied to Business. Xlibris. 2004 [Google Scholar]
  55. D. Newman-Toker. Diagnostic Errors More Common, Costly And Harmful Than Treatment Mistakes. April 23, 2013. https://www.hopkinsmedicine.org/news/media/releases/diagnostic_errors_more_common_costly_and_harmful_than_treatment_mistakes (accessed on July 14, 2019) [Google Scholar]
  56. J. Weinman. The 10 Laws of Cloudonomics. Sep 7, 2008. https://gigaom.com/2008/09/07/the-10-laws-ofcloudonomics/ (accessed on July 14, 2019) [Google Scholar]
  57. DevOps@Logicworks. ArchOps vs. DevOps: Foundation and Automation. https://www.logicworks.com/blog/2015/03/aws-devops-archops-automation/ (accessed on July 14, 2019) [Google Scholar]
  58. G. Hohpe. The Architect Elevator — Visiting the upper floors. https://martinfowler.com/articles/architectelevator.html#ArchopsBuildAVerticalArchitectureTeam (accessed on July 14, 2019) [Google Scholar]
  59. Wikipedia. Matthew 6: 3. https://en.wikipedia.org/wiki/Matthew_6:3 (accessed on July 14, 2019) [Google Scholar]
  60. D. Snowden. Safe-fail or Fail-safe. https://cognitive-edge.com/blog/safe-fail-orfail-safe/September2,2006. (accessed on July 14, 2019) [Google Scholar]
  61. J. Kern. Agile in the Context of a Holistic Approach. https://www.infoq.com/articles/agile-holisticapproach/October01,2018 (accessed on July 14, 2019) [Google Scholar]
  62. B. Meyer. Agile!: The Good, the Hype and the Ugly. Springer. 2014 [Google Scholar]
  63. G. S. Winters. Why Agile is Failing at Large Companies. Ty yn Goch Forrest Publications. 2016 [Google Scholar]
  64. T. J. Brizard. Broken Agile. Apress. 2015. [CrossRef] [Google Scholar]
  65. E. Puik, D. Ceglarek. Application of Axiomatic Design for Agile Product Development. MATEC Web of Conferences 223, 01004 (2018). ICAD 2018 https://doi.org/10.1051/matecconf/201822301004 [CrossRef] [EDP Sciences] [Google Scholar]
  66. M. K. Thompson. Where is the 'Why' in Axiomatic Design? ICAD2014. The Eighth International Conference on Axiomatic Design. Campus de Caparica – September 24–26, 2014 [Google Scholar]
  67. K. M. Adams. Non-functional Requirements in Systems Analysis and Design. Springer. 2016. [Google Scholar]
  68. P. Sroczkowski. Cloud: IaaS vs PaaS vs SaaS vs DaaS vs FaaS vs DBaaS. https://brainhub.eu/blog/cloud-architecturesaas-faas-xaas/ (accessed on July 14, 2019). [Google Scholar]
  69. N. Levy. Amazon and Capital One face legal backlash after massive hack affects 106M customers. August 9, 2019. https://www.geekwire.com/2019/amazoncapital-one-face-lawsuits-massive-hack-affects106m-customers/ [Google Scholar]
  70. C. Morris. A Goldmine for Identity Thieves: Unprotected Database Puts 65% of American Households at Risk. April 29, 2019. http://fortune.com/2019/04/29/security-gappersonal-information-breach/ [Google Scholar]
  71. D. O'Sullivan. Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts. December 12, 2018. https://www.upguard.com/breaches/verizoncloud-leak [Google Scholar]
  72. B. Roussey. 10 biggest 2018 data breaches — and what they mean for 2019. March 22, 2019. http://techgenix.com/2018-data-breaches/ [Google Scholar]
  73. H. Schulze. Cloud Security Report-2018. https://pages.cloudpassage.com/rs/857-FXQ-213/images/2018-Cloud-SecurityReport%20%281%29.pdf [Google Scholar]
  74. R. Ross, M. McEvilley, J. C. Oren. Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. NIST Special Publication 800-160. November 2016. https://doi.org/10.6028/NIST.SP.800-160 [Google Scholar]
  75. N. Statt. Apple’s cloud business is hugely dependent on Amazon. Apr 22, 2019. https://www.theverge.com/2019/4/22/18511148/apple-icloud-cloud-services-amazon-aws-30-million-per-month (accessed on July 14, 2019) [Google Scholar]
  76. J. Weinman. Cloudonomics: The Business Value of Cloud Computing. Wiley. 2012. [CrossRef] [Google Scholar]
  77. G. Roumeliotis. U.S. blocks MoneyGram sale to China's Ant Financial on national security concerns. https://www.reuters.com/article/usmoneygram-intl-m-a-ant-financial/u-s-blocksmoneygram-sale-to-chinas-ant-financial-onnational-security-concerns-idUSKBN1ER1R7January2,2018. (accessed on July 14, 2019) [Google Scholar]
  78. K. E. Weick, J. D. Orton. Loosely Coupled Systems: A Reconceptualization. Loosely Coupled Systems: A Reconceptualization. Academy of Management Renew, 1990, Vol. 15, No.2, 203–223 [Google Scholar]
  79. K. E. Weick. Educational Organizations as Loosely Coupled Systems. Administrative Science Quarterly. Vol. 21, No. 1 (Mar., 1976), pp. 1–19. Published by: Sage Publications, Inc. [CrossRef] [Google Scholar]
  80. K. E. Weick. Making Sense of the Organization, Oxford, England: Blackwell Publishers. (2001). [Google Scholar]
  81. J. Thomas, P. Mantri. Complex Adaptive Blockchain Governance. MATEC Web of Conferences 223, 01010 (2018) https://doi.org/10.1051/matecconf/201822301010 [CrossRef] [EDP Sciences] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.