Export Citations
Newsletter Downloads
TLRO based modeling of alternative commands and its application to generalized distributed resource allocation problem
There are systems where alternative constructs need to be used for its description. In weakest precondition calculus disjunction of the post conditions of constituent guarded commands is used as the post condition of an alternative construct. Such ...
Fuzzy cognitive map based approach for software quality risk analysis
This paper presents a software risk prediction tool for risk analysis during the development of a software product. The term "Risk" refers to a problem that can threaten the success of the software project but has not happened yet. Risks are uncertain. ...
Empirical analysis of object-oriented design metrics for predicting high, medium and low severity faults using mallows Cp
An object-oriented approach has become a commonly-used method in software-related activities. Many design metrics for object-oriented systems have been proposed and also employed for predicting and managing the quality of processes and products. To ...
Measuring bug complexity in object oriented software system
Bugs are inevitable in any software development life cycle. Most bugs are detected and removed in the testing phase. In software, we can classify bugs into two categories: (1) bugs of different severity, from a user's perspective,(how much damage the ...
Measuring software reliability: a fuzzy model
Software reliability is an essential part of software engineering to ensure the quality of a system. There are various techniques, which can be used in building models for predicting quality attributes. This paper presents a Fuzzy model for software ...
A composite complexity measure for component-based systems
The increasing importance of software measurement has led to design and development of new software measures. Controlling and minimizing software complexity is the most important objective of each software development paradigm because it affects all ...
Using static analysis tools to detect and correct non-compliant cryptography
Security is an increasing concern for application developers, whether they are targeting internal customers, organizations or the general public. Particularly for the US public sector with requirements like FIPS 140, developers need to identify and ...
Time boxing planning: buffered moscow rules
Time boxing is a management technique which prioritizes schedule over deliverables but time boxes which are merely a self, or an outside, imposed target without agreed partial outcomes and justified certainty are at best, an expression of good will on ...
Industry linked graduate software engineering curriculum
In recent years, Software Engineering (SE) has emerged as an independent and mature discipline. In this context, various studies are being done to provide guidelines for undergraduate about graduate software engineering curriculum design. This article ...
Survey on agile metrics and their inter-relationship with other traditional development metrics
In our civilized world today, measurement is very important in every aspect of our lives as a means of quantifying our success or progress in whatever activity we involve ourselves in. Consequently, this paper outlines the various metrics that are ...
Analyzing test case selection & prioritization using ACO
Regression testing is primarily a maintenance activity that is performed frequently to ensure the validity of the modified software. In such cases, due to time and cost constraints, the entire test suite cannot be run. Thus, it becomes essential to ...
Identifying structural similarity of methods using isomorphic graphs
It is a recommended practice to use overloaded methods in a class for a group of similar operations and functions. However, it is possible that software developers may violate the rule of overloaded methods. In addition, non-overloaded method is used ...
DWEVOLVE: a requirement based framework for data warehouse evolution
Data warehouse integrate information from numerous data sources under a unified schema and format to provide effective results from multidimensional data analysis in order to facilitate reporting and trend analysis. These information sources are dynamic ...
Reliability of component based systems: a critical survey
Software reliability is defined as the probability of the failure free operation of a software system for a specified period of time in a specified environment. Day by day software applications are growing more complex and with more emphasis on reuse. ...
Coevolution of information ecosystems: a study of the statistical relations among the growth rates of hardware, system software, and application software
With the increasing use of information technology, information ecosystems have emerged. Information ecosystems not only include software products, but also include hardware products. For example, application software depends on system software, and both ...