Now showing items 1-5 of 5
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
COSMIC Base Functional Components in Functional Size Based Effort Estimation Models
Software effort estimation models has been an area of considerable research for many years and it is still a challenge for software engineering. Although Functional Size Measurement (FSM) methods have become widely used, ...
An empirical evaluation of NASA-MDP data sets using a genetic defect-proneness prediction framework
In software engineering, software quality is an important research area. Automated generation of learning schemes plays an important role and represents an efficient way to detect defects in software projects, thus ...
A user interaction bug analyzer based on image processing
Mobile applications support a set of user-interaction features that are independent of the application logic. Rotating the device, scrolling, or zooming are examples of such features. Some bugs in mobile applications can ...
Function Point Structure and Applicability: A Replicated Study
The complexity of providing accurate functional software size and effort prediction models is well known in the software industry. Function point analysis (FPA) is currently one of the most accepted software functional ...