Function point measurement from Java']Java programs

被引:0
|
作者
Kusumoto, S [1 ]
Imagawa, M [1 ]
Inoue, K [1 ]
Morimoto, S [1 ]
Matsusita, K [1 ]
Tsuda, M [1 ]
机构
[1] Osaka Univ, Grad Sch Engn Sci, Toyonaka, Osaka, Japan
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Function point analysis (FPA) was proposed to help measure the functionality of software systems. It is used to estimate the effort required for the software development. However, it has been reported that since function point measurement involves judgment on the part of the measurer, differences for the same product may occur even in the same organization. Also, if an organization tries to introduce FPA, FP will have to be measured from the past software developed there, and this measurement is cost-consuming. In this paper, we intend to examine the possibility to measure FP from source code automatically. At first, we propose measurement rules to count data and transactional functions for object-oriented program based on IFPUG method and develop the function point measurement tool. Then, we have applied the tool to practical Java programs in a computer company and examined the difference between the FP values obtained by the tool and those of an FP measurement specialist. As the results, the number of data and transactional functions extracted by the tool is similar to ones by the specialist though for the classification of each function there is some difference between them.
引用
收藏
页码:576 / 582
页数:7
相关论文
共 50 条
  • [1] Function point measurement from Java programs
    Osaka University, Toyonaka, Osaka, Japan
    [J]. Proc Int Conf Software Eng, 1600, (576-582):
  • [2] Measurement and analysis of runtime profiling data for Java']Java programs
    Horgan, J
    Power, J
    Waldron, J
    [J]. FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 122 - 130
  • [3] A Detection and Measurement Approach for Memory Leaked Objects in Java']Java Programs
    Yu, Qiao
    Jiang, Shujuan
    Liu, Yingqi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (05): : 1053 - 1061
  • [4] Inferring visual contracts from Java']Java programs
    Alshanqiti, Abdullah
    Heckel, Reiko
    Kehrer, Timo
    [J]. AUTOMATED SOFTWARE ENGINEERING, 2018, 25 (04) : 745 - 784
  • [5] Extracting Visual Contracts from Java']Java Programs
    Alshanqiti, Abdullah
    Heckel, Reiko
    [J]. 2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 104 - 114
  • [6] Changing Java']Java programs
    Eisenbach, S
    Sadler, C
    [J]. IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS: SYSTEMS AND SOFTWARE EVOLUTION IN THE ERA OF THE INTERNET, 2001, : 479 - 487
  • [7] On the visualization of Java']Java programs
    Eichelberger, H
    von Gudenberg, JW
    [J]. SOFTWARE VISUALIZATION, 2002, 2269 : 295 - 306
  • [8] The treewidth of Java']Java programs
    Gustedt, J
    Mæhle, OA
    Telle, JA
    [J]. ALGORITHM ENGINEERING AND EXPERIMENTS, 2002, 2409 : 86 - 97
  • [9] Formal analysis of Java']Java programs in Java']JavaFAN
    Farzan, A
    Chen, F
    Meseguer, J
    Rosu, G
    [J]. COMPUTER AIDED VERIFICATION, 2004, 3114 : 501 - 505
  • [10] LeakWatch: Estimating Information Leakage from Java']Java Programs
    Chothia, Tom
    Kawamoto, Yusuke
    Novakovic, Chris
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 219 - 236