Comparison and Choice of Computational Architectures Based on Cost-Value Approach


  • Elivaldo Lozer Ribeiro Universidade Federal da Bahia (UFBA)
  • Daniela Barreiro Claro Universidade Federal da Bahia (UFBA)
  • Rita Suzana Maciel Universidade Federal da Bahia (UFBA)



Requirements engineering, Requirements elicitation, non-functional requirements, computational architecture, cost-value evaluation


Software engineers make use of several computational architectures (CA) to host an application, such as desktop, web, and cloud computing ar- chitectures. As the requirements vary according to the desired CA, developers may face two problems: determining which requirement better fulfills a CA and determining which CA fulfills a given set of requirements. This paper presents a new approach based on the Cost-Value Approach (CVA). We have slightly modified the CVA method (SCVA method) and also developed a new method for choosing the most appropriate CA (MMACA method). Our results provide a set of requirements ordered by priority for each CA. Finally, we discuss the current and most appropriate CA for a real project solution.


Download data is not yet available.


[Achimugu et al. 2014] Achimugu, P., Selamat, A., Ibrahim, R., and Mahrin, M. N. (2014).A systematic literature review of software requirements prioritization research.Infor-mation and Software Technology, 56(6):568–585

[Agarwal et al. 2013] Agarwal, E., Aharwal, R., Garg, R. D., and Garg, P. K. (2013). De-lineation of groundwater potential zone: An AHP/ANP approach.Journal of EarthSystem Science, 122(3):887–898.

[Ahuja et al. 2016] Ahuja, H., Sujata, and Purohit, G. N. (2016). Understanding require-ment prioritization techniques. In5th International Conference on Computing, Com-munication and Automation (ICCCA), pages 257–262, Greater Noida, India. IEEE.

[Armbrust et al. 2009] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Kon-winski, A., Lee, G., Patterson, D. A., Rabkin, A., and Zaharia, M. (2009). Above theclouds: A berkeley view of cloud computing. Technical report.

[Beaty et al. 2009] Beaty, K., Kochut, A., and Shaikh, H. (2009). Desktop to cloud trans-formation planning. In23rd IEEE International Symposium on Parallel & DistributedProcessing (IPDPS), pages 1–8, Rome, Italy. IEEE.

[Belout and Gauvreau 2004] Belout, A. and Gauvreau, C. (2004).Factors influencingproject success: the impact of human resource management.International Journalof Project Management, 22(1):1 – 11.

[Bessa et al. 2016] Bessa, S., Valente, M. T., and Terra, R. (2016). Modular Specification of Architectural Constraints. In10th Brazilian Symposium on Software Components,Architectures and Reuse (SBCARS), pages 31–40, Maring ́a, PR, BR. SBC.

[Bhandari and Sehgal 2014] Bhandari, P. and Sehgal, R. (2014). An evaluation of methods to prioritize requirements.International Journal of Computer Science and MobileComputing, 3(4):1336–1341.

[Boehm and Huang 2013] Boehm, B. and Huang, L. (2013). Value-Based Software Engi-neering: Reinventing “Earned Value” Monitoring and Control .ACM Software Engi-neering Notes, 28(2):1–7.

[Bonomi et al. 2012] Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012). Fog Comput-ing and Its Role in the Internet of Things. In1st Workshop on Mobile Cloud Computing(MCC), pages 13–16, New York, NY, USA. ACM.

[Bourque and Fairley 2014] Bourque, P. and Fairley, R. E. (2014).SWEBOK: Guide to theSoftware Engineering Body of Knowledge. IEEE Computer Society.

[Chaudhary et al. 2016] Chaudhary, P., Chhetri, S. K., Joshi, K. M., Shrestha, B. M., andKayastha, P. (2016). Application of an Analytic Hierarchy Process (AHP) in the GISinterface for suitable fire site selection: A case study from Kathmandu MetropolitanCity, Nepal.Socio-Economic Planning Sciences, 53(1):60–71.

[Chiam et al. 2013] Chiam, Y. K., Staples, M., Ye, X., and Zhu, L. (2013). Applying a Selec-tion Method to Choose Quality Attribute Techniques.Inf. Softw. Technol., 55(8):1419–1436.

[Chien et al. 2003] Chien, A., Calder, B., Elbert, S., and Bhatia, K. (2003). Entropia: archi-tecture and performance of an enterprise desktop grid system.Journal of Parallel and Distributed Computing, 63(5):597–610.

[Chieu et al. 2009] Chieu, T. C., Mohindra, A., Karve, A. A., and Segal, A. (2009). Dy-namic scaling of web applications in a virtualized cloud computing environment. In6th International Conference on E-Business Engineering (ICEBE), pages 281–286,Macau, China. IEEE.

[Christensen 2009] Christensen, J. H. (2009). Using RESTful web-services and cloud com-puting to create next generation mobile applications. In24th International ConferenceCompanion on Object Oriented Programming Systems Languages and Applications(OOPSLA), pages 627–634, Portland, Oregon, USA. ACM.

[Chung et al. 2006] Chung, L., Hung, F., Hough, E., and Ojoko-Adams, D. (2006). Secu-rity Quality Requirements Engineering (SQUARE): Case Study Phase III (CMU/SE-2006-SR-003). Technical report, Software Engineering Institute, Carnegie Mellon Uni-versity, Pittsburgh.

[Cunsolo et al. 2009] Cunsolo, V. D., Distefano, S., Puliafito, A., and Scarpa, M. (2009).Volunteer computing and desktop cloud: The Cloud@Home paradigm. In8th Inter-national Symposium on Network Computing and Applications (NCA), pages 134–139,Cambridge, MA, USA. IEEE.

[Cyr and Francis 1992] Cyr, L. and Francis, K. (1992). Measures of clinical agreementfor nominal and categorical data: The kappa coefficient.Computers in Biology andMedicine, 22(4):239 – 246.

[Dorado et al. 2014] Dorado, R., G ́omez-Moreno, A., Torres-Jiménez, E., and López-Alba,E. (2014). An AHP application to select software for engineering education.ComputerApplications in Engineering Education, 22(2):200–208.

[dos Santos et al. 2016] dos Santos, J. R. F., Albuquerque, A. B., and Pinheiro, P. R. (2016).Requirements Prioritization in Market-Driven Software: A Survey Based on LargeNumbers of Stakeholders and Requirements. In10th International Conference onthe Quality of Information and Communications Technology (QUATIC), pages 67–72,Lisbon, PT. IEEE.

[Erdogmus 2009] Erdogmus, H. (2009). Cloud computing: Does nirvana hide behind thenebula?IEEE Software, 26(2):4–6.[Fleiss et al. 1971] Fleiss, J. et al. (1971). Measuring nominal scale agreement among manyraters.Psychological Bulletin, 76(5):378–382.

[Galster et al. 2010] Galster, M., Eberlein, A., and Moussavi, M. (2010). Systematic selec-tion of software architecture styles.IET Software, 4(5):349–360.

[Garg and Singhal 2017] Garg, U. and Singhal, A. (2017). Software requirement prioritiza-tion based on non-functional requirements. In7th International Conference on CloudComputing, Data Science Engineering (Confluence), pages 793–797, Noida, India.IEEE.

[Huang et al. 2013] Huang, D., Xing, T., and Wu, H. (2013). Mobile cloud computing ser-vice models: A user-centric approach.IEEE Network, 27(5):6–11.

[Karlsson and Ryan 1997] Karlsson, J. and Ryan, K. (1997). A cost-value approach forprioritizing requirements.IEEE Software, 14(5):67–74.[Karlsson et al. 1998] Karlsson, J., Wohlin, C., and Regnell, B. (1998). An evaluation ofmethods for prioritizing software requirements.Information and Software Technology,39(14):939–947.

[Kaur and Aggrawal 2013] Kaur, B. P. and Aggrawal, H. (2013). Exploration of Success Factors of Information System.International Journal of Computer Science Issues,10(2):226–235.

[Kazman et al. 1996] Kazman, R., Abowd, G., Bass, L., and Clements, P. (1996). Scenario-based analysis of software architecture.IEEE software, 13(6):47–55.

[Kazman et al. 2002] Kazman, R., Asundi, J., and Klein, M. (2002). Making architecturedesign decisions: An economic approach. Technical Report CMU/SEI-2002-TR-035,Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.

[Khajeh-Hosseini et al. 2010] Khajeh-Hosseini, A., Sommerville, I., and Sriram, I. (2010).Research challenges for enterprise cloud computing.CoRR, 1(18):1–11.

[Kitchenham and Charters 2007] Kitchenham, B. and Charters, S. (2007). Guidelines forperforming Systematic Literature Reviews in Software Engineering. Technical report,Keele University and Durham University Joint Report.

[Maenhaut et al. 2016] Maenhaut, P.-J., Moens, H., Ongenae, V., and Turck, F. D. (2016).Migrating legacy software to the cloud: Approach and verification by means of twomedical software use cases.Softw. Pract. Exper., 46(1):31–54.

[Mell and Grance 2011] Mell, P. M. and Grance, T. (2011). SP 800-145. The NIST Defini-tion of Cloud Computing. Technical report.

[Olsson et al. 2019] Olsson, T., Wnuk, K., and Gorschek, T. (2019). An empirical studyon decision making for quality requirements.Journal of Systems and Software,149(1):217 – 233.

[Pallis 2010] Pallis, G. (2010). Cloud computing: The new frontier of internet computing.IEEE Internet Computing, 14(5):70–73.

[Patterson and Hennessy 2013] Patterson, D. A. and Hennessy, J. L. (2013).Computer Or-ganization and Design: The Hardware/Software Interface. Morgan Kaufmann Pub-lishers Inc., 3 edition.

[Pegoraro and Paula 2017] Pegoraro, C. and Paula, I. C. A.-s. d. (2017).Requirementsprocessing for building design: a systematic review .Production, 27(1):1–18.

[Rewatkar and Lanjewar 2010] Rewatkar, L. R. and Lanjewar, U. L. (2010). Implemen-tation of cloud computing on web application.International Journal of ComputerApplications, 2(8):28–32.

[Ribeiro et al. 2019] Ribeiro, E. L. F., Vieira, M. A., Claro, D. B., and Silva, N. (2019).Interoperability between saas and data layers: Enhancing the midas middleware. InMu ̃noz, V., Ferguson, D., Helfert, M., and Pahl, C., editors,Cloud Computing andServices Science (CLOSER 2018), chapter 6, pages 102–125. Springer.

[Riegel and Doerr 2015] Riegel, N. and Doerr, J. (2015). A Systematic Literature Review ofRequirements Prioritization Criteria. In21st Requirements Engineering: Foundationfor Software Quality (REFSQ), pages 300–317, Cham. Springer International Publish-ing.

[Ruhe 2005] Ruhe, G. (2005).Software Release Planning, chapter 13, pages 365–393.

[Saaty 1987] Saaty, R. W. (1987). The analytic hierarchy process: what it is and how it isused.Mathematical Modelling, 9(3):161–176.

[Saaty 1980] Saaty, T. L. (1980).The Analytic Hierarchy Process, Planning, Piority Setting,Resource Allocation. McGraw-Hill.

[Santos et al. 2016] Santos, R., Albuquerque, A., and Pinheiro, P. R. (2016). Towards theApplied Hybrid Model in Requirements Prioritization.Procedia Computer Science,91(1):909–918.

[Thurimella and Padmaja 2014] Thurimella, A. K. and Padmaja, T. M. (2014). Economicmodels and value-based approaches for product line architectures. In Mistrik, I., Bah-soon, R., Kazman, R., and Zhang, Y., editors,Economics-Driven Software Architec-ture, pages 11–36. Morgan Kaufmann, Boston.

[van Lamsweerde 2009] van Lamsweerde, A. (2009).Requirements Engineering: FromSystem Goals to UML Models to Software Specifications. Wiley Publishing.

[Voda 2014] Voda, I. (2014). Migrating Existing PHP Web Applications to the Cloud.In-formatica Economica, 18(4):62–72.

[Wang et al. 2009] Wang, H. J., Moshchuk, A., and Bush, A. (2009). Convergence of Desk-top and Web Applications on a Multi-service OS. In 4th Conference on Hot Topics inSecurity (USENIX), pages 1–6, Berkeley, CA, USA. USENIX Association.

[Wohlin et al. 2012] Wohlin, C., Runeson, P., Hst, M., Ohlsson, M. C., Regnell, B., andWessln, A. (2012).Experimentation in Software Engineering. Springer PublishingCompany, Incorporated.

[Zampoglou et al. 2016] Zampoglou,M.,Papadopoulos,S.,Kompatsiaris,Y.,Bouwmeester, R., and Spangenberg, J. (2016).Web and social media imageforensics for news professionals. In Heravi, B. R. and Zubiaga, A., editors,SocialMedia in the Newsroom, Papers from the 2016 ICWSM Workshop, volume WS-16-19ofAAAI Workshops, Cologne, Germany. AAAI Press.




How to Cite

Ribeiro, E. L., Claro, D. B., & Maciel, R. S. (2021). Comparison and Choice of Computational Architectures Based on Cost-Value Approach. ISys - Brazilian Journal of Information Systems, 14(1), 56–88.



Regular articles