Effort estimation factors for component-based software

被引:0
|
作者
Yu, Xuejun [1 ]
Zhang, Shujie [1 ]
机构
[1] School of Software Engineering, Beijing University of Technology, Beijing 100022, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:99 / 101
相关论文
共 50 条
  • [1] Effort estimation of component-based software development - a survey
    Wijayasiriwardhane, T.
    Lai, R.
    Kang, K. C.
    IET SOFTWARE, 2011, 5 (02) : 216 - 228
  • [2] A Component-based Approach to Effort Estimation
    Wu, Simon
    Kuan, Iok
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12429 - 12435
  • [3] A New Model for Reliability Estimation of Component-Based Software
    Singh, Aditya Pratap
    Tomar, Pradeep
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1431 - 1436
  • [4] The reliability estimation, prediction and measuring of component-based software
    Palviainen, Marko
    Evesti, Antti
    Ovaska, Eila
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (06) : 1054 - 1070
  • [5] A validation of the component-based method for software size estimation
    Dolado, JJ
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (10) : 1006 - 1021
  • [6] Component-Based Software
    P C Magazine: The Independent Guide to IBM - Standard Personal Computers, 16 (08):
  • [7] On the estimation of software reliability of component-based dependable distributed systems
    Dimov, A
    Punnekkat, S
    QUALITY OF SOFTWARE ARCHITECTURES AND SOFTWARE QUALITY, PROCEEDINGS, 2005, 3712 : 171 - 187
  • [8] On the Evolution of Component-Based Software
    Cote, Isabelle
    Heisel, Maritta
    Souquieres, Jeanine
    ADVANCES IN SOFTWARE ENGINEERING TECHNIQUES, 2012, 7054 : 54 - +
  • [9] A component-based software process
    Capretz, LF
    OOIS 2001: 7TH INTERNATIONAL CONFERENCE ON OBJECT-ORIENTED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 523 - 529
  • [10] Component-Based Software Development
    Sharma, Virendra Kumar
    Gupta, Narendra Prakash
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 132 - 134