共查询到16条相似文献,搜索用时 15 毫秒
1.
2.
An Extended Replication of an Experiment for Assessing Methods for Software Requirements Inspections
Kristian Sandahl Ola Blomkvist Joachim Karlsson Christian Krysander Mikael Lindvall Niclas Ohlsson 《Empirical Software Engineering》1998,3(4):327-354
We have performed an extended replication of the Porter-Votta-Basili experiment comparing the Scenario method and the Checklist method for inspecting requirements specifications using identical instruments. The experiment has been conducted in our educational context represented by a more general definition of a defect compared to the original defect list. Our study involving 24 undergraduate students manipulated three independent variables: detection method, requirements specification, and the order of the inspections. The dependent variable measured is the defect detection rate. We found the requirements specification inspected and not the detection method to be the most probable explanation for the variance in defect detection rate. This suggests that it is important to gather knowledge of how a requirements specification can convey an understandable view of the product and to adapt inspection methods accordingly. Contrary to the original experiment, we can not significantly support the superiority of the Scenario method. This is in accordance with a replication conducted by Fusaro, Lanubile and Visaggio, and might be explained by the lack of individual defect detection skill of our less experienced subjects. 相似文献
3.
Software inspection is an effective method of defect detection. Recent research activity has considered the development of tool support to further increase the efficiency and effectiveness of inspection, resulting in a number of prototype tools being developed. However, no comprehensive evaluations of these tools have been carried out to determine their effectiveness in comparison with traditional paper-based inspection. This issue must be addressed if tool-supported inspection is to become an accepted alternative to, or even replace, paper-based inspection. This paper describes a controlled experiment comparing the effectiveness of tool-supported software inspection with paper-based inspection, using a new prototype software inspection tool known as ASSIST (Asynchronous/Synchronous Software Inspection Support Tool). 43 students used ASSIST and paper-based inspection to inspect two C++ programs of approximately 150 lines. The subjects performed both individual inspection and a group collection meeting, representing a typical inspection process. It was found that subjects performed equally well with tool-based inspection as with paper-based, measured in terms of the number of defects found, the number of false positives reported, and meeting gains and losses. 相似文献
4.
An Experimental Evaluation of an Experience-Based Capture-Recapture Method in Software Code Inspections 总被引:1,自引:0,他引:1
In order to improve the efficiency of inspections, quantitative data on defect content have to be the basis for decisions in the inspection process. An experience-based capture-recapture method is proposed, which overcomes some problems with the basic pre-requisites of the original method. A C-code inspection experiment is conducted to evaluate the enhanced method and its applicability to software code inspections. It is concluded that the experience-based estimation procedure gives significantly better estimates than the maximum-likelihood method and the estimates are not very sensitive to changes in the inspection data. 相似文献
5.
本文介绍了在大型的分布式应用中,采用数据库对称复制技术的概念和利用软件实现双数据库对称复制的一种思想方法。 相似文献
6.
Using a Reliability Growth Model to Control Software Inspection 总被引:1,自引:0,他引:1
After a software inspection the project manager has to decide whether he can pass a product on to the next software development stage or whether it still contains a substantial number of defects and should be reinspected to further improve its quality. While a substantial number of defects remaining in a product after inspection is a reasonable precondition to schedule a reinspection, it is also important to estimate whether the likely number of defects to be found with a reinspection will lower the defect density under the target threshold. In this work we propose a reliability growth model and two heuristic linear models for software inspection, which estimate the likely number of additional defects to be found during reinspection. We evaluate the accuracy of these models with time-stamped defect data from a large-scale controlled inspection experiment on reinspection. Main findings are: (a) The two best models estimated the defect detection capability for reinspection with good accuracy: over 80% of the estimates had an absolute relative error of under 10%; (b) The reinspection decision correctness based on the estimates of all investigated models, overall around 80% correct decisions, was much better than the trivial models to always or never reinspect; the latter is the default decision in practice. 相似文献
7.
随着电脑科技的不断发展,电脑已经在各行各业中被普遍应用,在提升工作效率方面起到良好的推动作用。同时。电脑故障也给使用者带来一定的麻烦,利用有效的方法对电脑故障进行基本的检测,是现代电脑使用者必须具备的技能。将中医的“望”、“闻”、“问”、“切”四诊法加以转换后对电脑故障进行检测,是检测电脑故障行之有效的方法。 相似文献
8.
Kothari S.C. Bishop Luke Sauceda Jeremias Daugherty Gary 《Software Quality Journal》2004,12(2):99-120
This paper presents a pattern-based framework for developing tool support to detect software anomalies. The use of a pattern-based approach is important because it provides the flexibility needed to address domain-specific needs, with respect to the types of problems the tools detect and the strategies used to inspect and adapt the code. Patterns can be used to detect a variety of problems, ranging from simple syntactic issues to difficult semantic problems requiring global analysis. Patterns can also be used to describe transformations of the software, used to rectify problems detected through software inspection, and to support interactive inspection and adaptation when full automation is impractical. This paper describes a part of the Knowledge Centric Software (KCS) framework that embodies the pattern-based approach and provides capabilities for addressing different languages and different application domains. While only the part of the framework relevant to code inspections is addressed in this paper, in future, we also expect to address UML analysis and design models. As an application of the research, we present an overview of an inspection tool being developed for high assurance software for avionics systems. 相似文献
9.
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System 总被引:2,自引:0,他引:2
Guy Helmer Johnny Wong Mark Slagell Vasant Honavar Les Miller Robyn Lutz 《Requirements Engineering》2002,7(4):207-220
Requirements analysis for an intrusion detection system (IDS) involves deriving requirements for the IDS from analysis of
the intrusion domain. When the IDS is, as here, a collection of mobile agents that detect, classify, and correlate system
and network activities, the derived requirements include what activities the agent software should monitor, what intrusion
characteristics the agents should correlate, where the IDS agents should be placed to feasibly detect the intrusions, and
what countermeasures the software should initiate. This paper describes the use of software fault trees for requirements identification
and analysis in an IDS. Intrusions are divided into seven stages (following Ruiu), and a fault subtree is developed to model
each of the seven stages (reconnaissance, penetration, etc.). Two examples are provided. This approach was found to support
requirements evolution (as new intrusions were identified), incremental development of the IDS, and prioritisation of countermeasures.
Correspondence and offprint requests to: G. Helmer, Department of Computer Science, 226 Atanasoff Hall, Iowa State University, Ames, Iowa 50011, USA. Email: ghelmer@cs.iastate.edu 相似文献
10.
反射式中间件是中间件研究的热点,其反射特性能够对中间件的灵活性和自适应性提供良好支持。数据网格通常处于动态变化的环境和不同的用户需求之中。一个良好的数据网格和数据复制系统应该具有很好的灵活性和自适应性。通过动态配置数据和存储元素SE的优先级,DRMDP提供了这一支持。使用OptorSim仿真的结果表明,DRMDP具有良好的性能。 相似文献
11.
Alex Koohang Joanna Paliszkiewicz Jerzy Gołuchowski Jeretta Horn Nord 《Journal of Computer Information Systems》2016,56(3):238-243
This paper replicates a previous study that used an active learning for knowledge construction in the e-learning model with three stages of underpinning, ownership, and engaging hypothesizing that the underpinning and ownership stages positively and significantly contribute to the engaging stage where the actual knowledge construction takes place. The findings of the present study have ensured the validity and the generalizability of the previous study results. Also, the findings reiterated the efficacy of the model for active learning for knowledge construction in e-learning. The paper concludes with implications and recommendations for future research. 相似文献
12.
Negotiating stakeholder WinWin relationships among software quality requirements is a technique that emerged during the 1990's in order to overcome the difficulties arising from contract-oriented specification compliance (popular in the 1970's) and service-oriented customer satisfaction (popular in the 1980's). Obstacles to adoption of negotiated win-win relationships include coordination of multiple stakeholder interests and priorities, reasoning of complicated dependencies, and scalability of an exponentially increasing resolution option space. Conflict identification and resolution techniques are key success factors to overcome the obstacles. This paper describes two exploratory knowledge-based tools (called QARCC and S-COST)* for conflict identification and resolution and how they were used in the digital library projects of a USC Software Engineering class during the 1996/97 school year. A comparative analysis with the artifacts surfaced by stakeholders and the artifacts generated and analyzed by QARCC and S-COST focused on the conflict resolution process, stakeholders' roles and their relationships to quality artifacts, and tool effectiveness. We conclude that the tools helped stakeholders: (1) surface and negotiate conflicts; (2) identify conflicts among functional and quality requirements; and (3) generate, visualize, and negotiate potential resolution options for the conflicts. 相似文献
13.
R. Govindarajan N. S. S. Narasimha Rao E. R. Altman Guang R. Gao 《International journal of parallel programming》2000,28(1):1-46
Instruction scheduling methods which use the concepts developed by the classical pipeline theory have been proposed for architectures involving deeply pipelined function units. These methods rely on the construction of state diagrams (or automatons) to (i) efficiently represent the complex resource usage pattern; and (ii) analyze legal initiation sequences, i.e., those which do not cause a structural hazard. In this paper, we propose a state-diagram based approach for modulo scheduling or software pipelining, an instruction scheduling method for loops. Our approach adapts the classical pipeline theory for modulo scheduling, and, hence, the resulting theory is called Modulo-Scheduled pipeline (MS-pipeline) theory. The state diagram, called the Modulo-Scheduled (MS) state diagram is helpful in identifying legal initiation or latency sequences, that improve the number of instructions initiated in a pipeline. An efficient method, called Co-scheduling, which uses the legal initiation sequences as guidelines for constructing software pipelined schedules has been proposed in this paper. However, the complexity of the constructed MS-state diagram limits the usefulness of our Co-scheduling method. Further analysis of the MS-pipeline theory, reveals that the space complexity of the MS-state diagram can be significantly reduced by identifying primary paths. We develop the underlying theory to establish that the reduced MS-state diagram consisting only of primary paths is complete; i.e., it retains all the useful information represented by the original state diagram as far as scheduling of operations is concerned. Our experiments show that the number of paths in the reduced state diagram is significantly lower—by 1 to 3 orders of magnitude—compared to the number of paths in the original state diagram. The reduction in the state diagram facilitate the Co-scheduling method to consider multiple initiations sequences, and hence obtain more efficient schedules. We call the resulting method, enhanced Co-scheduling. The enhanced Co-scheduling method produced efficient schedules when tested on a set of 1153 benchmark loops. Further the schedules produced by this method are significantly better than those produced by Huff's Slack Scheduling method, a competitive software pipelining method, in terms of both the initiation interval of the schedules and the time taken to construct them. 相似文献
14.
计算机科学中,基准测试已经用来比较计算机系统性能、检索算法信息、数据库和其他一些技术。在研究领域,基准测试的创建和普遍使用经常伴随着快速的技术进步和团队建设。这些形成了科学学科的基准测试理论。基于这个理论,通过团队工作的方式定义基准测试来挑战软件工程研究,变得越来越具有科学性和需要。本文介绍一个成功使用基准测试促进研究状况的个案研究——逆向工程。 相似文献
15.
16.
土地利用/覆被变化是全球环境变化研究的核心问题之一,选择适当的变化检测方法在江苏海岸带土地利用/覆被变化研究工作中具有重要意义。本研究选取江苏海岸带具有典型代表性的大丰市作为变化检测方法比较研究的试验区,采用1992年和2002年两期Landsat TM影像,分别运用主成分分析法、混合变化检测法和变化矢量分析法进行变化检测,提取土地利用/覆被变化信息,并对每种变化检测方法进行定量分析和综合比较。研究表明,主成分分析法对于试验区的土地利用/覆被变化研究具有检测速度快、检测精度高等优点,适合试验区以及整个江苏海岸带的土地利用/覆被变化的检测。最终,综合运用主成分分析法和分类后比较法获得了5期近30年江苏海岸带土地覆被分类图,证明了主成分分析法可有效应用于江苏海岸带的变化检测。 相似文献