Lightweight development techniques (e.g., Extreme Programming) promise important benefits for software development with small teams in the face of unstable and vague requirements. software development organizations ar...
详细信息
The task of finding an optimal selection of requirements for the next release of a software system is difficult as requirements may depend on each other in complex ways. The paper presents the results from an in-depth...
详细信息
The task of finding an optimal selection of requirements for the next release of a software system is difficult as requirements may depend on each other in complex ways. The paper presents the results from an in-depth study of the interdependencies within 5 distinct sets of requirements, each including 20 high-priority requirements of 5 distinct products from 5 different companies. The results show that: (1) roughly 20% of the requirements are responsible for 75% of the interdependencies; (2) only a few requirements are singular; (3) customer-specific bespoke development tend to include more functionality- related dependencies whereas market-driven product development have an emphasis on value-related dependencies. Several strategies for reducing the effort needed for identifying and managing interdependencies are outlined. A technique for visualization of interdependencies with the aim of supporting release planning is also discussed. The complexity of requirements interdependency analysis is studied in relation to metrics of requirements coupling. Finally, a number of issues for further research are identified.
Various approaches are presented in the literature to identify faultprone components. The approaches represent a wide range of characteristics and capabilities, but they are not comparable, since different aspects are...
详细信息
The use of commercial-off-the-shelf (COTS) software has become more and more important in state-of-the-art and state-of-the-practice software and system development. The use of COTS software promises faster time-to-ma...
详细信息
ISBN:
(纸本)0769510434
The use of commercial-off-the-shelf (COTS) software has become more and more important in state-of-the-art and state-of-the-practice software and system development. The use of COTS software promises faster time-to-market, reduced development costs, increased productivity, and the possibility for companies to focus on their own core competencies. At the same time, COTS software increases risks, such as the economic instability of the COTS software vendor, unknown quality properties of the COTS software in use, and side-effects of the COTS software on the final product. Typically, COTS-based development, in parallel with the traditional development cycle (e.g. waterfall, spiral), consists of four phases. The first phase (COTS assessment and selection) is the most crucial phase in the COTS-based cycle, since long-term decisions about which COTS software to use in a software system are made there. A late recognition that the "wrong" COTS software was used can become extremely costly for a software organization. This paper presents a repeatable, cost-efficient and systematic method for performing measurement-based COTS assessment and selection. Moreover, cost/benefit analysis results of two industrial pilot projects, in which the method was successfully applied, are presented.
software inspection is one of the most effective methods to detect defects. Reinspection repeats the inspection process for software products that are suspected to contain a significant number of undetected defects af...
ISBN:
(纸本)9780769510507
software inspection is one of the most effective methods to detect defects. Reinspection repeats the inspection process for software products that are suspected to contain a significant number of undetected defects after an initial inspection. As a reinspection is often believed to be less efficient than an inspection an important question is whether a reinspection justifies its *** this paper we propose a cost-benefit model for inspection and reinspection. We discuss the impact of cost and benefit parameters on the net gain of a reinspection with empirical data from an experiment in which 31 student teams inspected and reinspected a requirements *** findings of the experiment are: a) For reinspection benefits and net gain were significantly lower than for the initial inspection. Yet, the reinspection yielded a positive net gain for most teams with conservative cost-benefit assumptions. b) Both the estimated benefits and number of major defects are key factors for reinspection net gain, which emphasizes the need for appropriate estimation techniques.
Broadband integrated services digital networks (B-ISDN) are aimed to transport both real-time traffic and non real-time traffic. Many of these applications require quality of service (QoS) guarantees. In the literatur...
详细信息
ISBN:
(纸本)0769511864
Broadband integrated services digital networks (B-ISDN) are aimed to transport both real-time traffic and non real-time traffic. Many of these applications require quality of service (QoS) guarantees. In the literature, not much work is found to provide QoS guarantees based on fault tolerance. Reliability of network links is considered as one of the parameters when providing QoS guarantees to applications. Considering reliability of network links as a parameter for QoS guarantees gives the applications more flexibility in choosing the network resources. A new terminology for dispersity routing is presented which will be useful in providing QoS guarantees based on reliability. Dispersity routing transmits the traffic along multiple paths. Also, a reliable backup resource allocation method is presented that can be used in the context of dispersity routing for fault tolerant real-time networks. An assumption is made that higher capacity is assigned to the links which are more reliable. This will help in availability of resources for a longer period of time. Also, reliability of links is considered to compute multiple paths along with shortest path metric.
This is a case study on using a DSP board to construct an encryption/decryption module embedded in a e-commerce Web server. The idea of using DSP is to push beyond the key length limits of encryption/decryption algori...
详细信息
This is a case study on using a DSP board to construct an encryption/decryption module embedded in a e-commerce Web server. The idea of using DSP is to push beyond the key length limits of encryption/decryption algorithms and computational power in a software environment while avoiding the heavy investment in a dedicated hardware encryptor/encryptor. The low cost, high computational power, high flexibility of DSP and the ubiquitous availability of a PC peripheral component interconnect slot for the DSP can provide any Web browser or Web server an excellent cost-effective option to improve the security level of Internet applications. The paper provides a step-by-step procedure and reveals every detail of a successful implementation of a DSP RSA encryptor/decryptor for an e-commerce Web server by using the latest TMS320C6000/sup TM/ Evaluation Module (EVM) DSP hardware. A strong prime concept and Garner algorithm are introduced to generate more secure keys and compute encryption/decryption more efficiently than that of recent publications. Experiments show that the performance of using DSP hardware encryption can be 300 times faster than that in software environment.
Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the def...
详细信息
ISBN:
(纸本)0769513069
Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the defect content after a review. The methods are highly reliant on the quality of the data. If the number of reviewers is fairly small, it becomes difficult or even impossible to get reliable estimates. This paper presents a comprehensive study of estimates based on two reviewers, using real data from reviews. Three experience-based defect content estimation methods are evaluated vs. methods that use data only from the current review. Some models are possible to distinguish from each other in terms of statistical significance. In order to gain an even better understanding, the best models are compared subjectively. It is concluded that the experience-based methods provide some good opportunities to estimate the defect content after a review.
software product lines have numerous members. Thus, a product line infrastructure must cover various systems. This is the significant difference to usual softwaresystems and the reason for additional requirements on ...
详细信息
ISBN:
(纸本)1581133588
software product lines have numerous members. Thus, a product line infrastructure must cover various systems. This is the significant difference to usual softwaresystems and the reason for additional requirements on the various assets present during software product line engineering. It is imperative that they support the description of the product line as a whole, as well as its instantiation for the derivation of individual products.
Literature has already addressed how to create and instantiate generic product line assets, such as domain models and architectures to generate instance specific ones [1, 2, 3], yet little attention has been given on how to actually deal with this genericity at the code level.
This paper addresses the issue of handling product line variability at the code level. To this end various implementation approaches are examined with respect to their use in a product line context.
暂无评论