Untitled Document
   
You are from : ( )  
     
Untitled Document
Untitled Document
 

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

In our research paper we have discussed about different defect prevention techniques   that are widely being used in the software engineering industry in order to present our apprehension of defect prevention. Advantages and disadvantages of the defect prevention techniques have also been presented. Defect prevention techniques that are being used in each phase of the software development are also discussed in this paper. Clear motivation of our study has been presented

Keywords :

: Not available ...

References :

  1. Liam Feldman , Carl J. Mueller , Dan Tamir ,   Oleg V. Komogortsev, Usability testing with total-effort metrics, Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement, p.426-429, October 15-16, 2009.
  2. Eickelmann, N.S. Empirical Studies to Identify Defect Prevention Opportunities Using Process Simulation Technologies. Software Engineering Workshop, Proceedings.26th Annual NASA Goddard. 2001. Pages 22-25.
  3. Williams, L. Instilling a Defect Prevention Philosophy. Frontiers in Education Conference. 1998. Pages1308-1312.  http://software.isixsigma.com
  4. Stamatia-Ann Katriou , Evangelos Tolias, From twin training to pair programming, Proceeding of the 2nd annual conference on India software engineering conference, February 23-26, 2009, Pune, India.
  5. K. Adeel, S. Ahmad, and S. Akhtar, “Defect Prevention Techniques and its Usage in Requirements Gathering - Industry Practices,” Engineering Sciences and Technology, 2005. SCONEST 2005. Student Conference on, 2005, pp. 1-5.
  6. D. Huizinga and A. Kolawa, Automated defect prevention : Best Practices in Software Management, Wiley-IEEE Computer Society P, 2007.
  7. M.C.Yatco,University of Missouri St.Louis, “Joint Application Design/Development”, 1999.
  8. A. Cockburn and L. Williams, “The costs and benefits of pair programming,” Extreme programming examined, Addison-Wesley Longman Publishing Co., Inc., 2001, pp. 223-243.
  9. P.A. Hausler, R.C. Linger, and C.J. Trammell, “Adopting Cleanroom software engineering with a phased approach,” IBM Syst. J., vol. 33, 1994, pp. 89-109.
  10. C. Hofmeister, R. Nord, and D. Soni, Applied Software Architecture, Addison-Wesley Professional, 1999.
  11. R. Miller, “Demystifying Extreme Programming: Test Driven Programming", 2003.
  12. Modelling and Analysing of Software Defect Prevention Using ODC, International Journal of Advanced Computer Science and Applications,Vol. 1, No. 3, September 2010
  13. R.C. Linger, “Cleanroom Process Model,” IEEE Softw., vol. 11, 1994, pp. 50-58.
  14. S.S.G., Defect tracking and correction, 2004.
  15. T. Thai, “Joint application development presentation,” Dec. 2009.

Untitled Document
     
Untitled Document
   
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.