Filters








64,366 Hits in 5.5 sec

Using Software Development Progress Data to Understand Threats to Project Outcomes

T. Hall, A. Rainer, D. Jagielska
11th IEEE International Software Metrics Symposium (METRICS'05)  
We discuss how we used project metrics data collected by the development team to identify threats to project outcomes.  ...  We have analysed project data to pinpoint the sources of threats to the project. The data we have used is embedded in the project's fortnightly progress reports produced by the project team.  ...  We show how re-analysing existing data can be used to identify and quantify threats to progress and outcomes in software projects.  ... 
doi:10.1109/metrics.2005.52 dblp:conf/metrics/HallRJ05 fatcat:mwxjttjonjcofnmbbomzemo3vq

Supporting Software Decision Meetings: Heatmaps for Visualising Test and Code Measurements

Robert Feldt, Miroslaw Staron, Erika Hult, Thomas Liljegren
2013 2013 39th Euromicro Conference on Software Engineering and Advanced Applications  
However, even if this information is available in test logs and code repositories it is seldomly put to good use in supporting decision processes in software development.  ...  To achieve software quality it is critical to quickly understand the current test status, its changes over time as well as its relation to source code changes.  ...  ACKNOWLEDGMENT The authors thank RUAG Space AB and the Swedish Space Agency for the collaboration and financing the project.  ... 
doi:10.1109/seaa.2013.61 dblp:conf/euromicro/FeldtSHL13 fatcat:w6plj7yldzdq7pgxgicxtb2jtm

Reducing estimation uncertainty with continuous assessment

Pongtip Aroonvatanaporn, Chatchai Sinthop, Barry Boehm
2010 Proceedings of the IEEE/ACM international conference on Automated software engineering - ASE '10  
To address this problem, we have developed and used a framework to continuously monitor the software project progress and readjust the estimated effort utilizing the Constructive Cost Model II (COCOMO  ...  This information is then used to assess and re-estimate the effort required to complete the remainder of the project.  ...  One of the major threats to our experiment was the survey data that we received from the developers of both teams.  ... 
doi:10.1145/1858996.1859065 dblp:conf/kbse/AroonvatanapornSB10 fatcat:h7ndl4ubo5hwraciv2mwcqog6q

Milestone-Oriented Usage of Key Performance Indicators -- An Industrial Case Study

Miroslaw Staron, Kent Niesel, Niclas Bauman
2018 e-Informatica Software Engineering Journal  
Conclusions: Despite the documented good practices of using KPIs for project monitoring, it is difficult to develop a clear status-picture solely using quantitative data from progress reporting tools.  ...  The data from the project progress reporting on tools was collected and triangulated with data from interviews conducted with experts from the company.  ...  Acknowledgements We would like to thank the Volvo Car Group for letting us conduct the study. We are also grateful to the anonymous reviewers for advice and help in improving the paper.  ... 
doi:10.5277/e-inf180109 dblp:journals/eInformatica/StaronNB18 fatcat:spu3yete5fce3f4cayy5mgfevy

Discovering Software Process Deviations Using Visualizations [chapter]

Anna-Liisa Mattila, Kari Systä, Outi Sievi-Korte, Marko Leppänen, Tommi Mikkonen
2017 Lecture Notes in Business Information Processing  
In this paper we introduce an industrial case where data visualization of issue management system was used to investigate software projects.  ...  That data can be used for understanding and improving software processes without any manual data collection.  ...  Threats to internal validity concern causality and threats to conclusions about relationships between treatment and outcome.  ... 
doi:10.1007/978-3-319-57633-6_18 fatcat:m6bixibcsnbhxhydhreuiuinmq

Release Planning with Feature Trees: Industrial Case [chapter]

Samuel Fricker, Susanne Schumacher
2012 Lecture Notes in Computer Science  
Such requirements structuring can be used to hide incompleteness and to support abstraction.  ...  [Contribution] The paper describes how to utilize feature trees for planning the releases of an evolving software solution and evaluates the effects of the approach on effort, decision-making, and trust  ...  The resulting tree can be used for planning the development of the specified software and for controlling development progress.  ... 
doi:10.1007/978-3-642-28714-5_26 fatcat:b626v2bxejc5bfvj4rsw4soenm

Software, Attacker and Asset-centric Approach for Improving Security in System Development Process [article]

Abdul Hadi bin Abdul Rahman, Abdullah Nazir, Kim Tae Hyun, Tan Horng Yarng, Fatima-tuz-Zahra
2020 arXiv   pre-print
To comply with future demands and threats, security concerns need to be involved in all phases while developing a software system.  ...  Secure development process is a procedure taken by developers to ensure the programs developed are following the general security standards and will always be up to date so that the outcomes are well secured  ...  Microsoft's SDL uses software centric threat modelling [33] . Another approach is attacker centric approach, this approach is based on understanding the attacker to make software more secure.  ... 
arXiv:2012.10881v1 fatcat:jgstgnrjondzrc36t2o3scbyzi

Agile Software Development in Practice [chapter]

Maureen Doyle, Laurie Williams, Mike Cohn, Kenneth S. Rubin
2014 Lecture Notes in Business Information Processing  
Agile software development methods have been around since the mid 1990s.  ...  The Burkhardt Consulting Center provided a thorough review of the data analysis. Brittany Campbell provided technical support in meeting LNCS style guidelines.  ...  Northern Kentucky University provided financial support to the first author for travel. The Scrum Alliance provided financial support for the second author.  ... 
doi:10.1007/978-3-319-06862-6_3 fatcat:cj7dadfmgjgs7ajyqeuu6jguyi

Toward An Integrated Framework of Software Project Threats

Paul L. Bannerman
2008 Australian Software Engineering Conference : Proceedings  
This paper proposes an integrated threat management framework to improve outcomes of software projects. Current best practice prescribes risk management and issue management to control threats.  ...  The framework provides a basis to extend efforts in research and practice to improve the capability of organizations to manage uncertainty and improve project results.  ...  It is unrealistic to expect that every potential threat to a software development project effort can be foreseen.  ... 
doi:10.1109/aswec.2008.4483202 fatcat:umvy7uqpsne4fck4wvsxbwgyui

Risk and risk management in software projects: A reassessment

Paul L. Bannerman
2008 Journal of Systems and Software  
Controlling risk in software projects is considered to be a major contributor to project success. This paper reconsiders the status of risk and risk management in the literature and practice.  ...  For example, it was found that software projects do not conform to a uniform structure, as assumed in much of the literature.  ...  For example, using independent testers and test scripts to verify and validate software progressively throughout the development and integration stages of a project may reduce the likelihood of defects  ... 
doi:10.1016/j.jss.2008.03.059 fatcat:pnhmwz673zg7rpupew54drdok4

Results Chains: a Tool for Conservation Action Design, Management, and Evaluation

Richard Margoluis, Caroline Stem, Vinaya Swaminathan, Marcia Brown, Arlyne Johnson, Guillermo Placci, Nick Salafsky, Ilke Tilders
2013 Ecology and Society  
This is comprehensive software for conservation project management that includes steps to http://www.ecologyandsociety.org/vol18/iss3/art22/ help teams develop results chains, using the common concept  ...  Similarly, CMP has developed Miradi adaptive management software (https://miradi.org/).  ... 
doi:10.5751/es-05610-180322 fatcat:uhjyod6uyvaaplpepbnu2nvtwq

Understanding challenges to adoption of the Microsoft elevation of privilege game

Inger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela Cruzes
2018 Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security - HoTSoS '18  
Microsoft has tried to lower the bar through creating a threat modelling game called Elevation of Privilege (EoP), but anecdotal evidence suggests that it has seen little use in actual development projects  ...  Threat modelling is considered to be a key activity, but can be challenging to perform for developers.  ...  ACKNOWLEDGMENT This work was supported by the SoS-Agile: Science of Security in Agile Software Development project, funded by the Research Council of Norway (grant number 247678).  ... 
doi:10.1145/3190619.3190633 dblp:conf/hotsos/TondelOJC18 fatcat:ysbn5bn5ozgstdphipt5hyv4lu

Simulation Based Studies in Software Engineering: A Matter of Validity

Breno Bernard Nicolau de França, Guilherme H. Travassos
2015 CLEI Electronic Journal  
These results were used to make available an improved set of guidelines regarding the planning and reporting of SBS in SE.  ...  RESULTS: The analysis of data extracted from 15 technical papers allowed the identification and classification of 28 different threats to validity concerned with SBS in SE according Cook and Campbell's  ...  The basis for developing his Software Project Integrated Model, using the System Dynamics (SD) approach, was field interviews with software project managers in five organizations, supplemented by an extensive  ... 
doi:10.19153/cleiej.18.1.4 fatcat:ls74bhonfnathlj7y4xgf5rodq

Recurring opinions or productive improvements—what agile teams actually discuss in retrospectives

Timo O. A. Lehtinen, Juha Itkonen, Casper Lassenius
2016 Empirical Software Engineering  
Team-level retrospectives are widely used in agile and lean software development, yet little is known about what is actually discussed during retrospectives or their outcomes.  ...  In this paper, we synthesise the outcomes of sprint retrospectives in a large, distributed, agile software development organisation.  ...  We interviewed one of the Scrum masters in order to better understand the software development activities. This interview was not used directly as data to answer the research questions.  ... 
doi:10.1007/s10664-016-9464-2 fatcat:ve53fiuzlzfg3gyuwfozezkw5e

Perspectives on the Open Standards for the Practice of Conservation

Mark W. Schwartz, Kristy Deiner, Tavis Forrester, Patrick Grof-Tisza, Matthew J. Muir, Maria J. Santos, Levi E. Souza, Marit L. Wilkerson, Maxine Zylberberg
2012 Biological Conservation  
, spatial planning tools); (4) clearly distinguishing between using threats rankings for action prioritization given expert opinion versus testing hypotheses to gain a mechanistic understanding of cause  ...  and effect; and (5) developing rapid assessment tools for the OS to better discern when conservation projects should invest in the cost of fully developing a plan using the OS.  ...  Along with the development of the OS framework, the desktop software package Miradi was developed to operationalize the use of the OS (Miradi, 2007) .  ... 
doi:10.1016/j.biocon.2012.06.014 fatcat:o7kmm3eqvzfmjjvh34mvaobh3a
« Previous Showing results 1 — 15 out of 64,366 results