Change Impact Analysis for the Software Development Phase: State-of-the-art

Size: px
Start display at page:

Download "Change Impact Analysis for the Software Development Phase: State-of-the-art"

Transcription

1 Change Impact Analysis for the Software Development Phase: State-of-the-art Nazri Kama Advanced Informatics School, Universiti Teknologi Malaysia, Malaysia Abstract Impact analysis predicts the parts of the software system that can be affected by changes in the system. Selecting the approach to perform impact analysis in the software development phase requires consideration of the class artifact status. Static analysis approaches do not require class artifacts to be fully developed. However, the analysis tends to overestimate the number of affected classes. So it is of little practical use. On the other hand, dynamic analysis approaches expect all the class artifacts to be fully developed. So the analysis tends to be imprecise when not all class artifacts are fully developed. This paper reviews current impact analysis techniques capability from the perspective of supporting the software development phase implementation. Based on this review, the needs of a new impact analysis technique for the software development phase are then constructed. Keywords: Impact Analysis, Software Development Phase, Traceability 1. Introduction Impact analysis is the activity of estimating the effect either before or after making a set of changes to a software system [1, 2]. If the estimation is conducted before making changes, the impact analysis helps software developers to determine components of software to be affected. This estimation is also known as a predictive impact analysis. Conversely if the estimation is conducted after making changes, the impact analysis guides software testers to run regression test efforts by reducing the set of test cases to be run to those cases that traverse the change. Conducting IA activity requires different approaches and implementations [3] for different software phases such as software maintenance and software development. Most existing IA work in the software maintenance phase are CI analyses [4-7] where the main artifact of analysis is the class. Unfortunately, in the software development phases, where the software is still under development, not all the classes are completely developed [4]. Therefore, the existing IA approaches are not suitable for software development phases. There is a major challenge for the current impact analysis techniques to be applied for the software development phase which is the existence of the partially developed class in the class artifacts. Therefore, this paper provides a comprehensive review on the current impact analysis techniques capabilities. This review identifies which capabilities can be used and which capabilities can be improved from the current techniques to support impact analysis implementation for the software development phase. This paper is laid out as follows: Section 2 justifies related work. Next, Section 3 proposes a set of reviewing criteria. Then, Section 4 analyses current change impact analysis 235

2 techniques capability and proposes a set of criteria of a new impact analysis technique for the software development phase. Finally, Section 5 concludes the study. 2. Related Work To describe the impact analysis area, two main aspects are reviewed which are definition of impact analysis, impact analysis process and current impact analysis techniques. 2.1 Impact Analysis One of the most referred definitions of impact analysis is a process of identifying potential consequences of a change, or estimating what needs to be modified to accomplish a change [1].The motivation behind the impact analysis activity is to identify software artifacts (i.e., requirement, design, class and test artifacts) that are potentially to be affected by a change. The change can be in a form of addition, removal and modification of new or existing software artifacts. With information on potentially affected software artifacts, effective planning can be made on what action will be undertaken with respect to the change. There are two main perspectives to impact analysis which are the dependency analysis and the traceability analysis. Typically, the dependency analysis is also known as a program analysis. The program analysis focuses on identifying relationships among class artifacts or source codes by exploring the internal structure of the codes [1]. This analysis aims to determine what elements in the source codes could be potentially affected by a change. There are many types of program analysis techniques that have been introduced, such as the control dependency and the data dependency [8]. The control dependency uses a program s conditional structures for the analysis whereas the data dependency analyses the program s variable. Comparatively to the program analysis, the traceability analysis is the analysis of relationships between software artifacts across different software phases. Since this analysis involves various software artifacts across different software phases, some researchers use this analysis to support impact analysis activity for the software development phase [9-14]. The difference between this analysis and the program analysis is that this analysis focuses on the dependencies between software artifacts in different software phases instead of a single software artifact. There are two types of traceability analysis which are the Pre-traceability analysis and the Post-traceability analysis [15]. The pre-requirement traceability provides a mechanism to verify that all requirements have been described in a formal requirement specification document. On the other hand, the post-requirement traceability provides a mechanism to ensure all requirements in the formal requirement specification document have been implemented and how they have been implemented in the software. Much of the work on impact analysis has been limited to source code analysis [3-6] using the dependency analysis approach. Relying on the source code analysis does not account for the overall impact to a software project. Software artifacts such as design and test artifacts should be kept up-to-date according to the change. This indirectly shows that these software artifacts are part of the impacted artifacts by the change. Thus, to identify thorough consequences of making a change in a software project, an effective combination between the traceability analysis and the dependency analysis is important. 2.2 Impact Analysis Process There are three main steps in the impact analysis process [16] which are: analyzing change specification and software artifacts; tracing potential impacts; and implementing the requested changes. The first step identifies a set of impacted artifacts that is thought to be initially 236

3 affected by the change specification. The initial set of impacted artifacts is called the Starting Impact Set (SIS). After the SIS identification, the next step analyses the SIS to trace potential impacts by filtering the unnecessary or false artifacts. The filtered result from this analysis is the Candidate Impact Set (CIS) (or also called the Estimated Impact Set (EIS)). Finally, the last step identifies a set of impacted artifacts that is actually modified during the actual change implementation. This set is of impacted artifacts called the Actual Impact Set (AIS). The structure of the impact analysis process is an iterative process. During actual change implementation, new impacted artifacts might be discovered along the process. The new impacted artifacts are called the Discovered Impact Set (DIS). The DIS is considered as the under-estimate impact set in the CIS. Since not all artifacts in the CIS are in AIS, the false artifacts in the CIS are called the False Positive Impact Set (FPIS). The FPIS is considered as the over-estimate impact set in the CIS. The combination of artifacts in CIS with artifacts in DIS and the elimination of FPIS artifacts in that combination should be in the AIS results, i.e., AIS = CIS + DIS FPIS. There are several metrics that can be used to evaluate the accuracy of CIS produced by the impact analysis process [17-19]. The metrics aim to evaluate the closeness between CIS and AIS results. The closer the results between CIS and AIS are, the higher the accuracy of CIS will be. For example, in [19] evaluation metrics, they use three metrics to evaluate the effectiveness of CIS results produced by impact analysis process. The metrics are the Completeness, the Correctness and the Kappa Value [20]. The Correctness Metric represents the percentage of the actual predicting impacted classes from the overall actual impacted classes, the Completeness Metric represents the percentage of the actual impacted classes from the overall predicting impacted classes and the Kappa Value Metric is used to represent the level of agreement between the predicted set of potential impacted classes (CIS) and the actual set of impacted classes (AIS). 2.3 Current Impact Analysis Techniques There are two categories of impact analysis techniques [21] which are the static analysis technique and the dynamic analysis technique. The static analysis technique develops a set of potential impacted classes by analyzing program static information that is generated from software artifacts (i.e., requirement, design, class and test artifacts). Conversely for the dynamic analysis technique, this technique develops a set of potential impacted classes by analyzing program dynamic information or executing code. The following sub-sections describe each impact analysis category Static Analysis: There are three most related current static analysis techniques to the new proposed approach which are the Use Case Maps (UCM) technique [3], the requirement interdependency technique [22], and the class interactions prediction with impact prediction filters (CIP-IPF) technique [10]. The UCM technique [3]: This technique uses the UCM model [23] to perform impact analysis on the functional requirements and the high level design model. This technique assumes that all the functional requirements and the high level design model are completely developed. This technique has two limitations which are: (1) there is no traceability technique used from the functional requirements and the high level design artifacts to the actual source codes. This technique only makes an assumption that the content of these two artifacts that is represented using the UCM model are reflected to the class artifacts. Any affected elements in the UCM model are indirectly reflected to the affected class artifacts; and (2) there is no dynamic analysis or source code analysis involved in this technique. Based on the precept that 237

4 some of the effect of a change from a class to other class(es) may only be visible through dynamic or behavior analysis of the changed class, results from this technique tend to miss some actual impacted classes. The requirement interdependency technique [22]: This technique uses a combination of requirement interdependency model and horizontal traceability analysis. For the requirement interdependency model, the requirement interdependency detection technique from [24] is used whereas for the horizontal traceability analysis, the Information Retrieval technique [25] is employed. As with the UCM technique [3], this technique assumes that the requirements and the class artifacts are completely developed prior to implementing the technique. One main advantage of this technique compared to the UCM technique is that this technique has included traceability link detection between the requirements artifacts and the class artifacts. This detection is important as impact of changes can be navigating to the class artifacts effectively. However, there are two limitations of this technique. (1) First, this technique does not involve design artifacts. It is known that not all requirements can be directly mapped to class artifacts [26]. Some requirements need design artifacts as a mediator to map to the class artifacts. Thus, not all impacted classes can be detected based on the impacted requirements as in some circumstances design decision is required to support the detection [12-13]. (2) There is no dynamic analysis or source code analysis involved in this technique. Based on the precept that some of the effect of a change from a class to other class(es) may only be visible through dynamic or behavior analysis of the changed class [27-28], results from this technique tend to miss some actual impacted classes. The Class Interactions Prediction with Impact Prediction Filters (CIP-IPF) technique [10]: This technique uses a class interactions prediction as a model for detecting impacted classes. This technique is almost similar to the requirement interdependency technique [7] as changes to a requirement will be mapped to the class artifacts. However, the differences between these techniques are this technique: (1) develops its own requirement interactions detection technique; (2) uses the Rule-based technique [29] for the horizontal traceability analysis detection and (3) assumes that some classes are partially developed and some of them are fully developed. This technique has its strength compared to the UCM technique [3] and the requirement interdependency technique [22]. First, comparing to the UCM technique, this technique has traceability link detection between the requirements artifacts and the class artifacts feature. This feature is used to navigate impact of changes at the requirement level to the class artifacts. Next, comparing to the requirement interdependency technique, this technique introduces a design artifacts analysis as part of its process to identify impacted class artifacts Dynamic Analysis: There are two techniques which are the Influence Mechanism technique [5] and the Path Impact technique [6]. Basically, these techniques predict the impact set (classes or methods) based on method level analysis. The Influence Mechanism technique: This technique introduces the Influence Graph (IG) as a model to identify impacted classes. This technique uses the class artifacts as a source of analysis and assumes that the class artifacts are completely developed. The advantage of this technique can be considered when its uses a combination of the static analysis and the dynamic analysis techniques during its impact analysis implementation. The static analysis intends to give preliminary results of the impacted class artifacts prior to performing the dynamic analysis. Only the preliminary affected classes will be further investigated to detect more affected classes using the dynamic analysis. This ultimately improves the effectiveness of the technique s implementation. However, there is a limitation for this technique which is there is no formal mapping or traceability process from requirements artifacts or design 238

5 artifacts to class artifacts. This process is important in impact analysis process as changes not only come from class artifacts but it also comes from design and/or requirements artifacts. Since design and requirements artifacts do interact among them vertically (between two different artifacts of a same type) and horizontally (between requirement and design artifacts), changes that happen to them could contribute to different affected class artifacts. In some circumstances, focusing on the source code analysis may not able to detect those affected classes. The Path Impact technique: This technique uses the Whole Path DAG (directed Acyclic Graph) model [30] as a model to identify impacted classes. The concept of implementation for this technique is almost similar to the Influence Mechanism technique as this technique uses the class artifacts as a source of analysis and assumes that the class artifacts are completely developed. Also, this technique performs a preliminary analysis prior to performing a detail analysis. The advantage of this technique compared to the Influence Mechanism technique is that this technique performs impact analysis at the method level instead of class level analysis using the SEQUITUR algorithm [31]. The results of the analysis will ultimately give higher accuracy than the results produced at the class level analysis. However, there are two limitations of this technique. First, the implementation is time consuming as the technique opens to a huge number of data when the analysis goes to a large application. Next, there is no formal mapping process from requirements artifacts or design artifacts to class artifacts. As described earlier, this process is important in impact analysis process as changes not only come from class artifacts but also from design and/or requirements artifacts. 3. Reviewing Criteria To review the capability of current impact analysis techniques to support impact analysis for the software development phase, we developed four reviewing elements [3,4]. These elements are considered as important elements to support impact analysis for the software development phase. The elements are: (1) the source of data to develop the impact analysis model; (2) impact analysis model development technique; (3) partially developed class consideration; and (4) impact analysis implementation. Source of data element: This element is used to develop the impact analysis model. Some techniques use the class artifact or source code and some of them use the requirement artifact and the design artifact as the source of developing the model. In the impact analysis technique for the software development phase, the requirement artifact and the design artifact are considered to be the practical source of development since they are the most stable and completed forms of user requirements compared to class artifact or source code [3,4]. Impact analysis model development technique element: This element defines a technique that the impact analysis technique used to develop the impact analysis model. There are two techniques that can be used to develop the model which are the reverse engineering or the forward engineering (or predictive technique). Since the class artifact or source code is not practical as the source of model development for the software development phase, the reverse engineering technique is indirectly considered to be impractical as the model development technique [6, 9]. Partially developed class consideration element: This element defines capability of the impact analysis technique to include partially developed class analysis in its implementation. This consideration is important for the impact analysis technique as not all classes in the software development phase are fully developed [32]. Analysis technique element: This element defines how a technique analyses the impact analysis model to identify impacted artifacts. The analysis can be: (1) static analysis 239

6 technique; or (2) dynamic analysis technique. Some techniques use either the static analysis technique or the dynamic analysis technique only and some of them combine between the static analysis technique and the dynamic analysis technique. Since the static analysis technique has an advantage when partially developed class involved in the analysis [13] and the dynamic analysis technique has an advantage when all classes are fully developed compared to the static analysis technique, the combination of both techniques is considered as the best analysis technique for impact analysis in the software development phase. However, the dynamic analysis technique will only be implemented if some potential impacted classes produced by the static analysis technique are fully developed. In other words, the dynamic analysis technique will be implemented if possible. 4. Analysis Results Table below summarizes current impact analysis techniques based on the fourth reviewing elements. Table 1. Current Impact Analysis Techniques Strengths and Weaknesses Technique Name Use Case Maps Requirement Interdependency Reviewing Elements Source of analysis: Requirement artifact and design artifact Predictive technique Partially developed class consideration: Not included Analysis Technique: Static analysis only Predictive technique Source of analysis: Requirement artifact only Analysis Technique: Static analysis only Class Interactions Prediction CoverageImpact Source of analysis: Requirement artifact and design artifact Predictive technique Partially developed class consideration: Not included Analysis Technique: Static analysis only Source of analysis: Class artifact or source code Reverse engineering technique Partially developed class consideration: Not included Analysis Technique: Dynamic analysis only 240

7 PathImpact Influence Graph Source of analysis: Class artifact or source code Reverse engineering technique Partially developed class consideration: Not included Analysis Technique: Dynamic analysis only Analysis Technique: Static and dynamic analysis Source of analysis: Class artifact or source code Reverse engineering technique Partially developed class consideration: Not included Looking at the above table, we could say that none of the current impact analysis techniques support all the important elements for impact analysis implementation in the software development phase. For example, the Use Case Maps technique only supports the source of analysis element through the use of requirement and design artifacts and the impact analysis model development technique element through the use of the predictive technique. However, this technique does not include the partially developed class consideration and only uses the static analysis technique for its implementation. Since, these two elements do not comply with the reviewing elements, this technique will not be effectively used for the software development phase. Therefore, we claim that a new impact analysis technique needs to be constructed. The new impact analysis technique will exhibit four characteristics: (1) uses high level artifacts (i.e., requirement and design artifacts) as the source of developing the impact analysis model; (2) applies the predictive technique as the impact analysis model development technique; (3) includes partially developed class analysis in the dynamic analysis technique implementation; and (4) combines the static analysis technique and the dynamic analysis technique to implement impact analysis. 5 Conclusion This paper presents a comprehensive analysis of current impact analysis technique from the perspective of supporting software development phase implementation. From the analysis, we propose that the new impact analysis technique needs to have four main characteristics. The characteristics are: (1) the new technique uses high level artifacts (i.e., requirement and design artifacts) as the source of developing the impact analysis model; (2) applies the predictive technique as a technique for developing the impact analysis model; (3) introduce a partially developed class analysis as part of its dynamic analysis technique; and (4) combines the static analysis technique and the dynamic analysis technique for impact analysis implementation. As for the future work, we intend to develop a new impact analysis technique that is based on the fourth characteristics. Acknowledgements We would like to thank to Universiti Teknologi Malaysia (UTM) for financial support under the Potential Academic Staff (PAS) grant Vot No 0K001. Also to final year postgraduate students of software engineering course at the Advanced Informatics School, Universiti Teknologi Malaysia who have been involved in the study. 241

8 References [1] S. Bohner and R. Arnold, Impact Analysis - Towards a Framework for Comparison, Proceeding of the International Conference on Software Maintenance, (1993) September 27-30, Montreal, Canada. [2] R. J. Turver and M. Munro, An Early Impact Analysis Technique for Software Maintenance, Journal of Software Maintenance: Research and Practice. vol. 6, no. 1, (1993). [3] J. Hassine, J. Rilling, J. Hewitt and R. Dssouli, Change Impact Analysis for Requirement Evolution Using Use Case Maps, Proceeding of the 8th International Workshop on Principles of Software Evolution, (2005) September 5, Washington, US. [4] M. Shiri, J. Hassine and J. Rilling, A Requirement Level Modification Analysis Support Framework, Proceeding of the 3rd International IEEE Workshop on Software Evolvability, (2007) October 1, Montreal, Canada. [5] B. Breech, A. Danalis, S. Shindo and L. Pollock, Online Impact Analysis via Dynamic Compilation Technology, Proceeding of the 20th IEEE International Conference on Software Maintenance, (2004) September 11-17, Washington, US. [6] J. Law and G. Rothermal, Incremental Dynamic Impact Analysis for Evolving Software Systems, Proceeding of the 14th International Symposium on Software Reliability Engineering, (2003) November 17-20, Washington, US. [7] K. H Bennet and V. T. Rajlich, Software Maintenance and Evolution: A Roadmap, Proceeding of the International Conference on the Future of Sofware Engineering, (2003) May 3-10, New York, USA. [8] S. Horwitz, T. Reps and D. Binkley, Interprocedural slicing using dependence graphs, ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 12, no. 7, (1990). [9] N. Kama, T. French and M. Reynolds, Impact Analysis using Class Interactions Prediction Approach, Proceedings of the 9th New Trends in Software Methodologies, Tools and Techniques, (2012) September 29 October 1, Yokohama, Japan. [10] N. Kama and F. Azli, Requirement Level Impact Analysis with Impact Prediction Filter, Proceeding of the 4th International Conference on Software Technology and Engineering, (2012) September 1-2, Phuket Thailand. [11] N. Kama, T. French and M. Reynolds, Predicting Class Interaction from Requirement Interaction, Proceeding of the 13th IASTED International Conference on Software Engineering and Application, (2009) December 2-5, Boston, US. [12] N. Kama, T. French and M. Reynolds, Predicting Class Interaction from Requirement Interaction: Evaluating A New Filtration Approach, Proceeding of the 13th IASTED International Conference on Software Engineering, (2010) April 6-8, Innsbruck, Austria. [13] N. Kama, T. French and M. Reynolds, Considering Patterns in Class Interactions Prediction, Advances in Software Engineering Book, 117, (2010). [14] N. Kama, T. French and M. Reynolds, Design Patterns Consideration in Class Interactions Prediction Development, International Journal of Advanced Science and Technology, vol. 28, (2011), pp. 6. [15] O. C. Z. Gotel, Contribution Structures for Requirements Traceability, University of London, London, (1995). [16] S. A. Bohner, Software Change Impacts- An Evolving Perspective, Proceedings of International Conference on Software Maintenance, (2002) October 3-6, Montreal, Canada. [17] A. Bianchi, A. R. Fasolino and G. Visaggio, An Exploratory Case Study of the Maintenance Effectiveness of Traceability Models, Proceedings of the 8th International Workshop on Program Comprehension, (2000) June 10-11, Limerick, Ireland. [18] A. R. Fasolino and G. Visaggio, Improving Software Comprehension Through an Automated Dependency Tracer, Proceedings of Seventh International Workshop on Program Comprehension, (1999) May 5-7, Pittsburgh, USA. [19] M. Lindvall and K. Sandahl, How Well Do Experienced Software Developers Predict Software Changes, Journal of Systems and Software, vol. 43, no. 1, (1998). [20] J. Cohen, A Coefficient of Agreement for Nominal Scales, Journal of Educational and Psychological Measurement, vol. 20, no. 1, (1960). [21] M. A. Jashki, R. Zafarani and E. Bagheri, Towards a More Efficient Static Software Change Impact Analysis Method, Proceedings of the 8th ACM SIGPLAN-SIGSOFT Workshop on Program analysis for Software Tools and Engineering, (2008) November 9-10, Atlanta, Georgia. [22] Y. Li, J. Li, Y. Yang and L. Mingshu, Requirement-centric Traceability for Change Impact Analysis: A Case Study in Making Globally Distributed Software Development a Success Story, vol. 5007, (2008). 242

9 [23] D. Amyot and G. Mussbacher, URN: Towards a New Standard for the Visual Description of Requirements, in E. Sherratt, ed., Telecommunications and Beyond: The Broader Applicability of SDL and MSC, vol. 2599, (2003). [24] A. G. Dahlstedt and A. Persson, Requirements Interdependencies: Moulding the State of Research into a Research Agenda, Proceeding of the 9th International Workshop on Requirements Engineering Foundation for Software Quality in conjunction with CAiSE, (2003) June 16-17, Klagenfurt/Velden, Austria. [25] G. Antoniol, G. Canfora and G. Casazza, Information Retrieval Models For Recovering Traceability Links Between Source Code and Documentation, Proceedings of the International Conference on Software Maintenance (ICSM '02), (2002) October 3-6, Montréal, Canada. [26] A. Rohatgi, A. Hamou-Lhadj and J. Rilling, An Approach for Mapping Features to Code Based on Static and Dynamic Analysis, Proceeding of the 16th IEEE International Conference on Program Comprehension, (2008) June 30 July 2, Amsterdam, The Netherlands. [27] L. Huang, and Y. T Seong, Dynamic Impact Analysis Using Execution Profile Tracing, Proceeding of the 4th International Conference on Software Engineering Research, Management and Applications, (2006) August 9-11, Washington, USA. [28] L. Huang, and Y. T Seong, Precise Dynamic Impact Analysis with Dependency Analysis for Object- Oriented Programs, Proceeding of the 5th ACIS International Conference on Software Engineering Research, Management & Applications, (2007) August 20-22, Washington, USA. [29] G. Spanoudakis, Plausible and Adaptive Requirements Traceability Structures, Proceedings of the 14th International Conference on Software Engineering and Knowledge Engineering, (2002) July 15-19, New York, US. [30] J. R. Larus, Whole Program Paths, Proceeding of the ACM SIGPLAN Conference on Programming Language Design and Implementation, (1999) May 20-22, New York, US. [31] C. G. N. Manning and I. H. Witten, Linear-time Incremental Hierarchy Inference for Compression, Proceeding of the Data Compression Conference, (1997) March 25-27, Snowbird, Utah, USA. [32] J. S. O'Neal and D. L. Carver, Analyzing the Impact of Changing Requirements, Proceedings of IEEE International Conference on Software Maintenance, (2001) November 6-10, Florence, Italy. Author Nazri Kama received his Master Degree in Real-time Software Engineering and Bachelor Degree in Management Information System from Universiti Teknologi Malaysia in 2002 and 2000 respectively. He then obtained his PhD degree at The University of Western Australia in His research interests are in software development, software maintenance, impact analysis, traceability, and requirement interactions. 243

10 244

A Change Impact Analysis Tool for Software Development Phase

A Change Impact Analysis Tool for Software Development Phase , pp. 245-256 http://dx.doi.org/10.14257/ijseia.2015.9.9.21 A Change Impact Analysis Tool for Software Development Phase Sufyan Basri, Nazri Kama, Roslina Ibrahim and Saiful Adli Ismail Advanced Informatics

More information

Extending Change Impact Analysis Approach for Change Effort Estimation in the Software Development Phase

Extending Change Impact Analysis Approach for Change Effort Estimation in the Software Development Phase Extending Change Impact Analysis Approach for Change Effort Estimation in the Software Development Phase NAZRI KAMA, MEHRAN HALIMI Advanced Informatics School Universiti Teknologi Malaysia 54100, Jalan

More information

Different Approaches using Change Impact Analysis of UML Based Design for Software Development

Different Approaches using Change Impact Analysis of UML Based Design for Software Development Different Approaches using Change Impact Analysis of UML Based Design for Software Development Ali Tariq Bhatti 1, Muhammad Murad Haider 2, Zill-e-Subhan 2 1 North Carolina A&T State University, Greensboro

More information

Software Traceability and Impact Analysis of Network Marketing Systems

Software Traceability and Impact Analysis of Network Marketing Systems The International Arab Journal of Information Technology, Vol. 2, No. 4, October 2005 301 Integrating Software Traceability for Change Impact Analysis Suhaimi Ibrahim 1, Norbik Bashah Idris 1, Malcolm

More information

A Comparison of Online and Dynamic Impact Analysis Algorithms

A Comparison of Online and Dynamic Impact Analysis Algorithms A Comparison of Online and Dynamic Impact Analysis Algorithms Ben Breech, Mike Tegtmeyer and Lori Pollock Department of Computer and Information Sciences University of Delaware, Newark, DE 19716 {breech,

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs

Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Ryosuke Tsuchiya 1, Hironori Washizaki 1, Yoshiaki Fukazawa 1, Keishi Oshima 2, and Ryota Mibe

More information

A REQUIREMENTS TRACEABILITY TO SUPPORT CHANGE IMPACT ANALYSIS

A REQUIREMENTS TRACEABILITY TO SUPPORT CHANGE IMPACT ANALYSIS A REQUIREMENTS TRACEABILITY TO SUPPORT CHANGE IMPACT ANALYSIS Suhaimi Ibrahim, Norbik Bashah Idris Centre For Advanced Software Engineering, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia *suhaimi@case.utm.my

More information

A Traceability Approach to Support Object-oriented Software

A Traceability Approach to Support Object-oriented Software A Traceability Approach to Support Object-oriented Software Othman Mohd Yusop Centre for Advanced Software Engineering Universiti Teknologi Malaysia 54100 Jln Semarak, K. Lumpur othmanyusop@utm.my Dr.

More information

A Framework of Model-Driven Web Application Testing

A Framework of Model-Driven Web Application Testing A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China

More information

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization KanwalpreetKaur #, Satwinder Singh * #Research Scholar, Dept of Computer Science and

More information

An Experiment on the Effect of Design Recording on Impact Analysis

An Experiment on the Effect of Design Recording on Impact Analysis An Experiment on the Effect of Design Recording on Impact Analysis F. Abbattista, F. Lanubile, G. Mastelloni, and G. Visaggio Dipartimento di Informatica University of Bari, Italy Abstract An experimental

More information

Industrial Adoption of Automatically Extracted GUI Models for Testing

Industrial Adoption of Automatically Extracted GUI Models for Testing Industrial Adoption of Automatically Extracted GUI Models for Testing Pekka Aho 1,2 pekka.aho@vtt.fi, Matias Suarez 3 matias.suarez@f-secure.com, Teemu Kanstrén 1,4 teemu.kanstren@vtt.fi, and Atif M. Memon

More information

A survey of code-based change impact analysis techniques

A survey of code-based change impact analysis techniques SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. (2012) Published online in Wiley Online Library (wileyonlinelibrary.com)..1475 A survey of code-based change impact analysis techniques

More information

IMPLEMENTING A DOCUMENT-BASED REQUIREMENTS TRACEABILITY: A CASE STUDY

IMPLEMENTING A DOCUMENT-BASED REQUIREMENTS TRACEABILITY: A CASE STUDY IMPLEMENTING A DOCUMENT-BASED REQUIREMENTS TRACEABILITY: A CASE STUDY Suhaimi Ibrahim, Norbik Bashah Idris Centre For Advanced Software Engineering, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia

More information

A Requirement Level Modification Analysis Support Framework

A Requirement Level Modification Analysis Support Framework A Requirement Level Modification Analysis Support Framework Maryam Shiri, Jameleddine Hassine, Juergen Rilling Concordia University, Montreal, Canada {ma_shiri,j_hassin, rilling}@cse.concordia.ca Abstract

More information

Traceability Method for Software Engineering Documentation

Traceability Method for Software Engineering Documentation www.ijcsi.org 216 Traceability Method for Software Engineering Documentation Nur Adila Azram 1 and Rodziah Atan 2 1 Department of Information System, Universiti Putra Malaysia, Company Serdang, Selangor,

More information

Evaluating Software Maintenance Testing Approaches to Support Test Case Evolution

Evaluating Software Maintenance Testing Approaches to Support Test Case Evolution Evaluating Software Maintenance Testing Approaches to Support Test Case Evolution Othman Mohd Yusop and Suhaimi Ibrahim Advanced Informatics School Universiti Teknologi Malaysia, International Campus 54100

More information

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs

More information

Empirical Software Change Impact Analysis using Singular Value Decomposition

Empirical Software Change Impact Analysis using Singular Value Decomposition Empirical Software Change Impact Analysis using Singular Value Decomposition Mark Sherriff and Laurie Williams University of Virginia, North Carolina State University sherriff@cs.virginia.edu, williams@csc.ncsu.edu

More information

ANALYZING THE IMPACT OF CHANGING SOFTWARE REQUIREMENTS: A TRACEABILITY-BASED METHODOLOGY

ANALYZING THE IMPACT OF CHANGING SOFTWARE REQUIREMENTS: A TRACEABILITY-BASED METHODOLOGY ANALYZING THE IMPACT OF CHANGING SOFTWARE REQUIREMENTS: A TRACEABILITY-BASED METHODOLOGY A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical

More information

Enhancing Requirement Traceability Link Using User's Updating Activity

Enhancing Requirement Traceability Link Using User's Updating Activity ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Techniques and Tools for Rich Internet Applications Testing

Techniques and Tools for Rich Internet Applications Testing Techniques and Tools for Rich Internet Applications Testing Domenico Amalfitano Anna Rita Fasolino Porfirio Tramontana Dipartimento di Informatica e Sistemistica University of Naples Federico II, Italy

More information

Enabling Continuous Delivery by Leveraging the Deployment Pipeline

Enabling Continuous Delivery by Leveraging the Deployment Pipeline Enabling Continuous Delivery by Leveraging the Deployment Pipeline Jason Carter Principal (972) 689-6402 Jason.carter@parivedasolutions.com Pariveda Solutions, Inc. Dallas,TX Table of Contents Matching

More information

Towards Collaborative Requirements Engineering Tool for ERP product customization

Towards Collaborative Requirements Engineering Tool for ERP product customization Towards Collaborative Requirements Engineering Tool for ERP product customization Boban Celebic, Ruth Breu, Michael Felderer, Florian Häser Institute of Computer Science, University of Innsbruck 6020 Innsbruck,

More information

Towards Improving Object-Oriented Software Maintenance during Change Impact Analysis

Towards Improving Object-Oriented Software Maintenance during Change Impact Analysis Towards Improving Object-Oriented Software Maintenance during Change Impact Analysis Bassey Isong 1 and Obeten Ekabua 2 Department of Computer Science, North-West University, Mmabatho, Mafikeng, South

More information

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, nmansour@lau.edu.lb Keywords: Regression

More information

Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development

Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development ARBI GHAZARIAN University of Toronto Department of Computer Science 10 King s College Road, Toronto,

More information

Measuring the Impact of Changing Requirements on Software Project Cost: An Empirical Investigation

Measuring the Impact of Changing Requirements on Software Project Cost: An Empirical Investigation www.ijcsi.org 170 Measuring the Impact of Changing Requirements on Software Project Cost: An Empirical Investigation Bushra Sharif 1, Dr. Shoab A. Khan 2, Muhammad Wasim Bhatti 3 1&2 Department of Computer

More information

interactive automatic (rules) automatic (patterns) interactive REP ENVIRONMENT KERNEL

interactive automatic (rules) automatic (patterns) interactive REP ENVIRONMENT KERNEL AN APPROACH TO SOFTWARE CHANGE MANAGEMENT SUPPORT Jun Han Peninsula School of Computing and Information Technology Monash University, McMahons Road, Frankston, Vic 3199, Australia phone: +61 3 99044604,

More information

RETRATOS: Requirement Traceability Tool Support

RETRATOS: Requirement Traceability Tool Support RETRATOS: Requirement Traceability Tool Support Gilberto Cysneiros Filho 1, Maria Lencastre 2, Adriana Rodrigues 2, Carla Schuenemann 3 1 Universidade Federal Rural de Pernambuco, Recife, Brazil g.cysneiros@gmail.com

More information

Change Pattern-Driven Traceability of Business Processes

Change Pattern-Driven Traceability of Business Processes Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I,, March 12-14, 2014, Hong Kong Change Pattern-Driven Traceability of Business Processes Watcharin Uronkarn

More information

Study of Impact Analysis of Software Requirement Change in SAP ERP

Study of Impact Analysis of Software Requirement Change in SAP ERP Study of Impact Analysis of Software Requirement Change in SAP ERP S. M. Ghosh 1, H. R. Sharma 1, V. Mohabay 2 1 Chhatrapati Shivaji Institute of Technology, Durg (CG) INDIA 2 Department of Electronics

More information

A review of software change impact analysis

A review of software change impact analysis Steffen Lehnert A review of software change impact analysis Technische Universität Ilmenau Ilmenau, 2011 URN: urn:nbn:de:gbv:ilm1-2011200618 A Review of Software Change Impact Analysis Steffen Lehnert

More information

Lecture 20: Software Evolution

Lecture 20: Software Evolution Lecture 20: Software Evolution Basics of Software Evolution Laws of software evolution Requirements Growth Software Aging Basics of Change Management Baselines, Change Requests and Configuration Management

More information

A Visualization Method to Support Impacts Analysis in Program Understanding

A Visualization Method to Support Impacts Analysis in Program Understanding A Visualization Method to Support Impacts Analysis in Program Understanding Rita Noremi Bt Mohamad Centre for Advanced Software Engineering (CASE) Universiti Teknologi Malaysia Kuala Lumpur, Malaysia rit_emi78@yahoo.com

More information

Using Requirements Traceability Links At Runtime A Position Paper

Using Requirements Traceability Links At Runtime A Position Paper Using Requirements Traceability Links At Runtime A Position Paper Alexander Delater, Barbara Paech University of Heidelberg, Institute of omputer Science Im Neuenheimer Feld 326, 69120 Heidelberg, Germany

More information

The «SQALE» Analysis Model An analysis model compliant with the representation condition for assessing the Quality of Software Source Code

The «SQALE» Analysis Model An analysis model compliant with the representation condition for assessing the Quality of Software Source Code The «SQALE» Analysis Model An analysis model compliant with the representation condition for assessing the Quality of Software Source Code Jean-Louis Letouzey DNV IT Global Services Arcueil, France jean-louis.letouzey@dnv.com

More information

GRCM: A Model for Global Requirements Change Management

GRCM: A Model for Global Requirements Change Management GRCM: A Model for Global Requirements Change Management Waqar Hussain, Tony Clear Auckland University of Technology {waqar.hussain,tclear}@aut.ac.nz http://www.aut.ac.nz Abstract. [Context and motivation]

More information

Efficient and Precise Dynamic Impact Analysis Using Execute-After Sequences

Efficient and Precise Dynamic Impact Analysis Using Execute-After Sequences Efficient and Precise Dynamic Impact Analysis Using Execute-After Sequences Taweesup Apiwattanapong, Alessandro Orso, and Mary Jean Harrold College of Computing Georgia Institute of Technology Atlanta,

More information

The Role of Agile Methodology in Project Management

The Role of Agile Methodology in Project Management Edith Cowan University Research Online Australian Information Warfare and Security Conference Security Research Institute Conferences 2010 Success of Agile Environment in Complex Projects Abbass Ghanbary

More information

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen

More information

Requirements-Based Testing: Encourage Collaboration Through Traceability

Requirements-Based Testing: Encourage Collaboration Through Traceability White Paper Requirements-Based Testing: Encourage Collaboration Through Traceability Executive Summary It is a well-documented fact that incomplete, poorly written or poorly communicated requirements are

More information

Innovation Goals in Software Development for Business Applications Bob Arnold*, M. Reza Shadnam*

Innovation Goals in Software Development for Business Applications Bob Arnold*, M. Reza Shadnam* Evolving Trends in Engineering and Technology Vol. 1 (2014) pp 53-62 Online: 2014-08-04 (2014) SciPress Ltd., Switzerland doi:10.18052/www.scipress.com/etet.1.53 Innovation Goals in Software Development

More information

Soft Skills Requirements in Software Architecture s Job: An Exploratory Study

Soft Skills Requirements in Software Architecture s Job: An Exploratory Study Soft Skills Requirements in Software Architecture s Job: An Exploratory Study 1 Faheem Ahmed, 1 Piers Campbell, 1 Azam Beg, 2 Luiz Fernando Capretz 1 Faculty of Information Technology, United Arab Emirates

More information

Driving Your Business Forward with Application Life-cycle Management (ALM)

Driving Your Business Forward with Application Life-cycle Management (ALM) Driving Your Business Forward with Application Life-cycle Management (ALM) Published: August 2007 Executive Summary Business and technology executives, including CTOs, CIOs, and IT managers, are being

More information

The Improvement of Test Case Selection for the Process Software Maintenance

The Improvement of Test Case Selection for the Process Software Maintenance The Improvement of Test Case Selection for the Process Software Maintenance Adtha Lawanna* Abstract following topics in software-development life cycle (SDLC) Software maintenance is one of the critical

More information

KEEP THIS COPY FOR REPRODUCTION PURPOSES. I ~~~~~Final Report

KEEP THIS COPY FOR REPRODUCTION PURPOSES. I ~~~~~Final Report MASTER COPY KEEP THIS COPY FOR REPRODUCTION PURPOSES 1 Form Approved REPORT DOCUMENTATION PAGE I OMS No. 0704-0188 Public reoorting burden for this collection of information is estimated to average I hour

More information

A Visualization Approach for Bug Reports in Software Systems

A Visualization Approach for Bug Reports in Software Systems , pp. 37-46 http://dx.doi.org/10.14257/ijseia.2014.8.10.04 A Visualization Approach for Bug Reports in Software Systems Maen Hammad 1, Somia Abufakher 2 and Mustafa Hammad 3 1, 2 Department of Software

More information

A comparison of programmers opinions in change impact analysis

A comparison of programmers opinions in change impact analysis Ŕ periodica polytechnica Electrical Engineering 54/3-4 (2010) 111 121 doi: 10.3311/pp.ee.2010-3-4.05 web: http:// www.pp.bme.hu/ ee c Periodica Polytechnica 2010 A comparison of programmers opinions in

More information

A Configuration Management Model for Software Product Line

A Configuration Management Model for Software Product Line A Configuration Management Model for Software Product Line Liguo Yu 1 and Srini Ramaswamy 2 1 Computer Science and Informatics Indiana University South Bend South Bend, IN 46634, USA ligyu@iusb.edu 2 Computer

More information

Using a Multi-Agent Architecture to Manage Knowledge in the Software Maintenance Process

Using a Multi-Agent Architecture to Manage Knowledge in the Software Maintenance Process Using a Multi-Agent Architecture to Manage Knowledge in the Software Maintenance Process Oscar M. Rodríguez 1, Aurora Vizcaíno 2, Ana I. Martínez 1, Mario Piattini 2, Jesús Favela 1 1 CICESE, Computer

More information

A Process for ATLAS Software Development

A Process for ATLAS Software Development Atlas Software Quality Control Group A Process for ATLAS Software Development Authors : Atlas Quality Control Group M. Asai, D. Barberis (chairman), M. Bosman, R. Jones, J.-F. Laporte, M. Stavrianakou

More information

Change Impact Analysis

Change Impact Analysis Change Impact Analysis Martin Ward Reader in Software Engineering martin@gkc.org.uk Software Technology Research Lab De Montfort University Change Impact Analysis Impact analysis is a process that predicts

More information

Advanced TTCN-3 Test Suite validation with Titan

Advanced TTCN-3 Test Suite validation with Titan Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 273 281 doi: 10.14794/ICAI.9.2014.2.273 Advanced TTCN-3 Test Suite validation

More information

A Case Study Research on Software Cost Estimation Using Experts Estimates, Wideband Delphi, and Planning Poker Technique

A Case Study Research on Software Cost Estimation Using Experts Estimates, Wideband Delphi, and Planning Poker Technique , pp. 173-182 http://dx.doi.org/10.14257/ijseia.2014.8.11.16 A Case Study Research on Software Cost Estimation Using Experts Estimates, Wideband Delphi, and Planning Poker Technique Taghi Javdani Gandomani

More information

Applying Social Network Analysis to the Information in CVS Repositories

Applying Social Network Analysis to the Information in CVS Repositories Applying Social Network Analysis to the Information in CVS Repositories Luis Lopez-Fernandez, Gregorio Robles, Jesus M. Gonzalez-Barahona GSyC, Universidad Rey Juan Carlos {llopez,grex,jgb}@gsyc.escet.urjc.es

More information

Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics

Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics Kumi Jinzenji NTT Software Innovation Canter NTT Corporation Tokyo, Japan jinzenji.kumi@lab.ntt.co.jp Takashi

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

General Flow-Sensitive Pointer Analysis and Call Graph Construction

General Flow-Sensitive Pointer Analysis and Call Graph Construction General Flow-Sensitive Pointer Analysis and Call Graph Construction Endre Horváth, István Forgács, Ákos Kiss, Judit Jász and Tibor Gyimóthy University of Szeged 4D Soft Ltd. Aradi Vértanúk tere 1. Soroksári

More information

Incremental Dynamic Impact Analysis for Evolving Software Systems

Incremental Dynamic Impact Analysis for Evolving Software Systems Incremental Dynamic Impact Analysis for Evolving Software Systems James Law Computer Science Dept. Oregon State University Corvallis, OR law@cs.orst.edu Gregg Rothermel Computer Science Dept. Oregon State

More information

Cost-Effective Traceability Links for Architecture-Level Software Understanding: A Controlled Experiment

Cost-Effective Traceability Links for Architecture-Level Software Understanding: A Controlled Experiment Cost-Effective Traceability Links for Architecture-Level Software Understanding: A Controlled Experiment Muhammad Atif Javed, Srdjan Stevanetic and Uwe Zdun Software Architecture Research Group University

More information

VisCG: Creating an Eclipse Call Graph Visualization Plug-in. Kenta Hasui, Undergraduate Student at Vassar College Class of 2015

VisCG: Creating an Eclipse Call Graph Visualization Plug-in. Kenta Hasui, Undergraduate Student at Vassar College Class of 2015 VisCG: Creating an Eclipse Call Graph Visualization Plug-in Kenta Hasui, Undergraduate Student at Vassar College Class of 2015 Abstract Call graphs are a useful tool for understanding software; however,

More information

Web Application Regression Testing: A Session Based Test Case Prioritization Approach

Web Application Regression Testing: A Session Based Test Case Prioritization Approach Web Application Regression Testing: A Session Based Test Case Prioritization Approach Mojtaba Raeisi Nejad Dobuneh 1, Dayang Norhayati Abang Jawawi 2, Mohammad V. Malakooti 3 Faculty and Head of Department

More information

A Requirements-to-Implementation Mapping Tool for Requirements Traceability

A Requirements-to-Implementation Mapping Tool for Requirements Traceability A Requirements-to-Implementation Mapping Tool for Requirements Traceability Jorge Esparteiro Garcia1,3*, Ana C. R. Paiva2,3 1 Polytechnic Institute of Viana do Castelo, Praca General Barbosa, Viana do

More information

Using the Ripple Effect to Measure Software Quality

Using the Ripple Effect to Measure Software Quality Using the Ripple Effect to Measure Software Quality Haider Bilal and Sue Black Centre for Systems and Software Engineering, Faculty of Business, Computing and Information Management London South Bank University

More information

Applying Dynamic Change Impact Analysis in Component-based Architecture Design

Applying Dynamic Change Impact Analysis in Component-based Architecture Design Applying Dynamic Change Impact Analysis in Component-based Architecture Design Tie Feng College of Computer Science and Technology Jilin University, China Changchun Jilin 130012 fengtie@jlu.edu.cn Abstract

More information

Confirmation Bias as a Human Aspect in Software Engineering

Confirmation Bias as a Human Aspect in Software Engineering Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD Data Science Laboratory, Department of Mechanical and Industrial Engineering, Ryerson University Why Human Aspects in Software

More information

Defect Detection in a Distributed Software Maintenance Project

Defect Detection in a Distributed Software Maintenance Project Defect Detection in a Software Maintenance Alessandro Bianchi, Danilo Caivano, Filippo Lanubile, Giuseppe Visaggio Dipartimento di Informatica Università di Bari - Via Orabona, 4, 70126 Bari Italy {bianchi,

More information

Change Impact Analysis of Crosscutting in Software Architectural Design

Change Impact Analysis of Crosscutting in Software Architectural Design Change Impact Analysis of Crosscutting in Software Architectural Design Klaas van den Berg Software Engineering Group, University of Twente 7500 AE Enschede, the Netherlands K.G.vandenBerg@ewi.utwente.nl

More information

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,

More information

Open Source Software: How Can Design Metrics Facilitate Architecture Recovery?

Open Source Software: How Can Design Metrics Facilitate Architecture Recovery? Open Source Software: How Can Design Metrics Facilitate Architecture Recovery? Eleni Constantinou 1, George Kakarontzas 2, and Ioannis Stamelos 1 1 Computer Science Department Aristotle University of Thessaloniki

More information

An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology

An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology A.Fatemi 1, N.NematBakhsh 2,B. Tork Ladani 3 Department of Computer Science, Isfahan University,

More information

Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH

Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri

More information

A Framework for Automatic Performance Monitoring, Analysis and Optimisation of Component Based Software Systems

A Framework for Automatic Performance Monitoring, Analysis and Optimisation of Component Based Software Systems A Framework for Automatic Performance Monitoring, Analysis and Optimisation of Component Based Software Systems Ada Diaconescu *, John Murphy ** Performance Engineering Laboratory Dublin City University,

More information

An Exception Monitoring System for Java

An Exception Monitoring System for Java An Exception Monitoring System for Java Heejung Ohe and Byeong-Mo Chang Department of Computer Science, Sookmyung Women s University, Seoul 140-742, Korea {lutino, chang@sookmyung.ac.kr Abstract. Exception

More information

Change Management: Modeling Software Product Lines Evolution

Change Management: Modeling Software Product Lines Evolution Change Management: Modeling Software Product Lines Evolution Samuel A. Ajila, Ph.D. MIEEE Department of Systems & Computer Engineering, Carleton University, 25 Colonel By Drive, Ottawa, Ontario, KS 5B6,

More information

Agilent OSS Customer-Centric Service Manager

Agilent OSS Customer-Centric Service Manager Agilent OSS Customer-Centric Service Manager Deliver the high-quality wireless experience your high-value customers demand Agilent OSS Customer-Centric Service Manager (CCSM) provides the end-toend, real-time

More information

TPI a model for Test Process Improvement

TPI a model for Test Process Improvement TPI a model for Test Process Improvement Jari Andersin Helsinki, 5th October 2004 Seminar on Quality Models for Software Engineering Department of Computer Science UNIVERSITY OF HELSINKI ii TPI a model

More information

Quality Validation for Mobile Embedded Software

Quality Validation for Mobile Embedded Software International Journal of Advanced Science and Technology 43 Quality Validation for Mobile Embedded Software Haeng-Kon Kim 1, Roger Y Lee 2 1 Dept. of Computer information & Communication Engineering Catholic

More information

AN ALTERNATIVE MODEL OF ERP MAINTENANCE STRATEGY

AN ALTERNATIVE MODEL OF ERP MAINTENANCE STRATEGY AN ALTERNATIVE MODEL OF ERP MAINTENANCE STRATEGY Muhammad Rofi IMTIHAN 1, Mohd. Salihin NGADIMAN, Habibollah HARON Department of Modelling and Industrial Computing Faculty of Computer Science and Information

More information

Business Process and Regulations Compliance Management Technology

Business Process and Regulations Compliance Management Technology Business Process and Regulations Compliance Management Technology Ilze Buksa Riga Technical University, Institute of Applied Computer Systems, Meza street 1/4, LV-1048, Riga, Latvia ilze.buksa@rtu.lv Supervisor

More information

PUBBLICAZIONI SCIENTIFICHE DEL DOTT. FAUSTO FASANO

PUBBLICAZIONI SCIENTIFICHE DEL DOTT. FAUSTO FASANO PUBBLICAZIONI SCIENTIFICHE DEL DOTT. FAUSTO FASANO Pubblicazioni Scientifiche del dott. Fausto Fasano 2 Dissertazioni T1 F. Fasano, Fine-grained management of Software Artefacts, Tesi di Dottorato di Ricerca

More information

SEO Techniques for various Applications - A Comparative Analyses and Evaluation

SEO Techniques for various Applications - A Comparative Analyses and Evaluation IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 20-24 www.iosrjournals.org SEO Techniques for various Applications - A Comparative Analyses and Evaluation Sandhya

More information

Student Intelligence and Academic Achievement in Albanian Universities. Case of Vlora University

Student Intelligence and Academic Achievement in Albanian Universities. Case of Vlora University Student Intelligence and Academic Achievement in Albanian Universities. Case of Vlora University Ilirjan LIPI 1 Abstract: This study involves students of economic faculty that were attending bachelor in

More information

A Security Domain Model for Static Analysis and Verification of Software Programs

A Security Domain Model for Static Analysis and Verification of Software Programs A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA abshaffe@nps.edu Abstract- Unauthorized

More information

Influence of Solar Radiation Models in the Calibration of Building Simulation Models

Influence of Solar Radiation Models in the Calibration of Building Simulation Models Influence of Solar Radiation Models in the Calibration of Building Simulation Models J.K. Copper, A.B. Sproul 1 1 School of Photovoltaics and Renewable Energy Engineering, University of New South Wales,

More information

Up/Down Analysis of Stock Index by Using Bayesian Network

Up/Down Analysis of Stock Index by Using Bayesian Network Engineering Management Research; Vol. 1, No. 2; 2012 ISSN 1927-7318 E-ISSN 1927-7326 Published by Canadian Center of Science and Education Up/Down Analysis of Stock Index by Using Bayesian Network Yi Zuo

More information

COMPUTING DURATION, SLACK TIME, AND CRITICALITY UNCERTAINTIES IN PATH-INDEPENDENT PROJECT NETWORKS

COMPUTING DURATION, SLACK TIME, AND CRITICALITY UNCERTAINTIES IN PATH-INDEPENDENT PROJECT NETWORKS Proceedings from the 2004 ASEM National Conference pp. 453-460, Alexandria, VA (October 20-23, 2004 COMPUTING DURATION, SLACK TIME, AND CRITICALITY UNCERTAINTIES IN PATH-INDEPENDENT PROJECT NETWORKS Ryan

More information

Intelligent and Automated Software Testing Methods Classification

Intelligent and Automated Software Testing Methods Classification Intelligent and Automated Software Testing Methods Classification Seyed Reza Shahamiri Department of Software Engineering Faculty of Computer Science and Information s University Teknologi Malaysia (UTM)

More information

Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams

Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams Position Paper Ulrich A. Nickel, Robert Wagner University of Paderborn Warburger Straße 100 D-33098 Paderborn Germany [duke, wag25]@uni-paderborn.de

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.

More information

The Intelligent Resource Managment For Local Area Networks

The Intelligent Resource Managment For Local Area Networks Intelligent Resource Management for Local Area Networks: Approach and Evolution 1 Roger Meike Martin Marietta Denver Aerospace Space Station Program P.O. Box 179 (MS 01744) Denver, Co. 80201 Abstract The

More information

Bayesian Network Model of XP

Bayesian Network Model of XP BAYESIAN NETWORK BASED XP PROCESS MODELLING Mohamed Abouelela, Luigi Benedicenti Software System Engineering, University of Regina, Regina, Canada ABSTRACT A Bayesian Network based mathematical model has

More information

Automated Validation & Verification of Software Paper Presentation

Automated Validation & Verification of Software Paper Presentation Regression Test Selection for Java Software Salvador Valencia Rodríguez Automated Validation & Verification of Software Paper Presentation Paper authors Mary Jean Harrold James A. Jones Tongyu Li Donglin

More information

Automated Classification of Change Messages in Open Source Projects

Automated Classification of Change Messages in Open Source Projects Automated Classification of Change Messages in Open Source Projects Ahmed E. Hassan School of Computing Queen s University Kingston, Canada ahmed@cs.queensu.ca ABSTRACT Source control systems permit developers

More information

Software Development and Testing: A System Dynamics Simulation and Modeling Approach

Software Development and Testing: A System Dynamics Simulation and Modeling Approach Software Development and Testing: A System Dynamics Simulation and Modeling Approach KUMAR SAURABH IBM India Pvt. Ltd. SA-2, Bannerghatta Road, Bangalore. Pin- 560078 INDIA. Email: ksaurab5@in.ibm.com,

More information

The Role of CM in Agile Development of Safety-Critical Software

The Role of CM in Agile Development of Safety-Critical Software The Role of CM in Agile Development of Safety-Critical Software Tor Stålhane1, Thor Myklebust 2 1 Norwegian University of Science and Technology, N-7491, Trondheim, Norway 2 SINTEF ICT, Strindveien 2,

More information

SystemDesign Methodologies

SystemDesign Methodologies SystemDesign Methodologies CM 3380-3 Maintenance is not part of the design process by Claudia Buder, bq923372 Anne Holzapfel, hq923380 Abstract In context of the level three module of System design Methodology

More information

Theme 1 Software Processes. Software Configuration Management

Theme 1 Software Processes. Software Configuration Management Theme 1 Software Processes Software Configuration Management 1 Roadmap Software Configuration Management Software configuration management goals SCM Activities Configuration Management Plans Configuration

More information