A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Scrum Investigation Analysis for Android Application
2018
Bonfring International Journal of Networking Technologies and Applications
This methodology is mainly concentrated with how the cost and the time of industrial people are utilized effectively. ...
high quality software in a cost effective and timely manner which meets the changing needs of its stakeholders. ...
The main idea of scrum is that system variables involve several technical and environmental variables (e.g. Requirements, time frame, and resources) that is likely to change during a process. ...
doi:10.9756/bijnta.8370
fatcat:ix4yrlyhhnbpbga46s34zdugcu
Constructing Digital Twins for Accurate and Reliable What-If Business Process Analysis
2021
International Conference on Business Process Management
A long-standing problem in the field of Business Process Management (BPM) is that of constructing accurate and reliable models for "what-if" business process analysis (digital process twins). ...
, machine learning, and causal inference. ...
Beyond individual variability (variability in the behavior of the same worker), there is also cross-individual variability: different workers behave differently under indistinguishable circumstances. ...
dblp:conf/bpm/Dumas21
fatcat:zfspzuckvbhivncyypmen3m2uq
Investigating an 'Agile-Rigid' Approach in Globally Distributed Requirements Analysis
2007
Pacific Asia Conference on Information Systems
This paper reports an exploratory quasi-experimental study, which investigates the performance of requirements analysis projects in an 'agile-rigid' distributed environment. ...
Our experiment indicates that project monitoring and control, project communication, and process facilitation between peer teams significantly influence the success of such projects. ...
Examples of artifacts of the requirements analysis phase include drawing context diagrams, modeling the requirements, creating prototypes, creating a data dictionary, prioritizing requirements and allocation ...
dblp:conf/pacis/YadavANS07
fatcat:yeqgvmzi4jhl7eccj3jukt5p44
A taxonomy for software change impact analysis
2011
Proceedings of the 12th international workshop and the 7th annual ERCIM workshop on Principles on software evolution and software evolution - IWPSE-EVOL '11
Change impact analysis is required for constantly evolving systems to support the comprehension, implementation, and evaluation of changes. ...
First, approaches proposed for impact analysis are explained regarding their motivation and methodology. ...
The proposed methodology infers mutual relationships between software artifacts and utilizes the Granger causality test to identify consequent changes. ...
doi:10.1145/2024445.2024454
dblp:conf/iwpse/Lehnert11
fatcat:s5ucqjzsr5c2pdoi3oeodnocpm
An Econometric Analysis of Inventory Turnover Performance in Retail Services
2005
Management science
can be applied in performance analysis and managerial decision-making. ...
Inventory turnover varies widely across retailers and over time. This variation undermines the usefulness of inventory turnover in performance analysis, benchmarking and working capital management. ...
Acknowledgements The authors thank the referees and the editors for their valuable feedback on the previous versions of this work. ...
doi:10.1287/mnsc.1040.0298
fatcat:ovpfxz4eurhdvbnvxw6lnig7le
Software Process Diversity: Conceptualization, Measurement, and Analysis of Impact on Project Performance
2015
MIS Quarterly
We empirically tested this conceptualization utilizing a discovery-oriented approach and data collected from 410 large commercial software projects. ...
Results show that higher levels of requirements volatility, design and technological novelty, and customer involvement increased software process diversity within a project. ...
This process template provides a predefined collection of artifacts that can be used to organize the workflow spanning the KPAs throughout a project's lifecycle. ...
doi:10.25300/misq/2015/39.4.3
fatcat:6ufjc4zfqnellkdxhqnioy4yke
An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System
2015
2015 IEEE International Conference on Dependable Systems and Networks Workshops
Dependability design of IT services including safety and availability analysis requires expertise and often takes long time to carry out. ...
A structure of asset for dependability analysis along with other software artifacts is presented. ...
Several intermediate artifacts, such as requirement specifications, design documents, programs and test cases are generated in and between the phases. ...
doi:10.1109/dsn-w.2015.12
dblp:conf/dsn/MachidaXTH15
fatcat:4qjwa2duebe7bgtj7slzrqgmwe
A Regression Analysis Based Model for Defect Learning and Prediction in Software Development
2021
Mehran University Research Journal of Engineering and Technology
The constructed regression rules are used for defect prediction and analysis. ...
This paper recommends Regression Analysis (RA) based defect learning and prediction Defect Prediction (RA-DP) mechanism to support the defective or non-defective prediction for quality software development ...
[32] utilized to improve the prediction of the cross-company's defect utilizing the Nearest Neighbor's (NN) filter. ...
doi:10.22581/muet1982.2103.15
fatcat:akvwktnilzewrog5opu7cito7i
Empirical Software Change Impact Analysis using Singular Value Decomposition
2008
2008 International Conference on Software Testing, Verification, and Validation
Verification and validation techniques often generate various forms of software development artifacts. ...
We further compared our technique against two other impact analysis techniques (PathImpact and CoverageImpact) and found that our technique provided comparable results, while also identifying non-source ...
The association clusters specifically illuminated areas of the code base where cross-component dependencies existed and components that included files that would not normally be examined in an analysis ...
doi:10.1109/icst.2008.25
dblp:conf/icst/SherriffW08
fatcat:qcs4gm3l65eblnan6dqhjoqzcm
World Terrorism Attack Analysis: A Data Science Approach
2020
Zenodo
This may lead to additional research utilizing Deep Learning (DL) to create a recommendation engine that will inform and shape decisions makers thinking. ...
Psychologists would agree that terrorists are not highly likely to volunteer as experiment test subjects to be psychoanalyzed. ...
Terrorism Groups fracture combine and morph throughout their lifecycles. How do these changes affect our historical analysis or future predictions? ...
doi:10.5281/zenodo.3813858
fatcat:sxxdlyu3afbjdc55iav2av253q
A Web-Scale Analysis of the Community Origins of Image Memes
2022
Proceedings of the ACM on Human-Computer Interaction
However, a replication analysis that follows the traditional approach of testing the same question only within a single large community, Reddit, finds the regression coefficients reversed---underscoring ...
the importance of engaging in web-scale, cross-community analyses. ...
Acknowledgments The authors thank for their support: Stanford MediaX, the Stanford Cyber Initiative, the Google Cloud Credits program, and the Office of Naval Research (N00014-16-1-2894). ...
doi:10.1145/3512921
fatcat:c5whrztdyzbedonlkdmzls4iwe
A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing
2015
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering
During the evaluation, we identified major goals and strategies associated with (integrated) model-based analysis and testing and evaluated the improvements achieved. ...
Compared with these cost savings, improvements regarding test coverage (~8%), number of remaining defects (~13%), and time to market (~8%) appear less noticeable. ...
We would also like to thank all study participants for their support and Liliana Guzmán and Sonnhild Namingha for their initial review of this paper.
(ARTEMIS project MBAT) and from the German ...
doi:10.1109/icse.2015.141
dblp:conf/icse/KlasBDSH15
fatcat:bad5llerbvbn3otdecmvkpnwci
Modular norm models: practical representation and analysis of contractual rights and obligations
2019
Requirements Engineering
Analysis of legal text using logic-based models can help developers understand requirements for the development and use of software-intensive systems throughout its lifecycle. ...
Compliance analysis requires legal counsel but is generally unavailable in many software projects. ...
The treatment group used the same artifacts as the control group for session
Experimental variables In this section, we identify the independent variables manipulated by the experiment design and elaborate ...
doi:10.1007/s00766-019-00323-y
fatcat:z2mmtglhazezpbksce2skbanoe
Object-Oriented Software Development Effort Prediction Using Design Patterns from Object Interaction Analysis
2010
2010 Fifth International Conference on Systems
Object-Oriented Software Development Effort Prediction Using Design Patterns from Object Interaction Analysis. ...
Moreover, a comparative analysis is carried out; taking into account several other size measures. ...
The PP method utilizes artifacts from the late object-oriented analysis phase to produce an effort estimate. ...
doi:10.1109/icons.2010.16
fatcat:gmoal7isqnf3fevxoauvsttude
Testing variability-intensive systems using automated analysis: an application to Android
2014
Software quality journal
In this paper, we present TESting vAriAbiLity Intensive Systems (TESALIA), an approach that uses automated analysis of feature models to optimize the testing of variability intensive systems. ...
We model test value and cost as feature attributes and then we use a constraint satisfaction solver to prune, prioritize and package product line tests complementing prior work in the software product ...
, THEOS (TIC-5906) projects and COPAS (TIC-1867). ...
doi:10.1007/s11219-014-9258-y
fatcat:jtfzqennbjganbpc2kewdpazi4
« Previous
Showing results 1 — 15 out of 3,310 results