5 research outputs found

    Uso de revisiones sistemáticas como estrategia de generación de conocimientos para mejora continua

    Get PDF
    En el presente trabajo se describe cómo las Revisiones Sistemáticas (una estrategia científica que apunta a generar piezas de conocimiento de alto nivel) pueden ayudar al proceso de “mejora continua” que propone CMMI a las empresas que desean certificar los más altos niveles de madurez.Workshop de Ingeniería de Software y Bases de Datos (WISBD)Red de Universidades con Carreras en Informática (RedUNCI

    Uso de revisiones sistemáticas como estrategia de generación de conocimientos para mejora continua

    Get PDF
    En el presente trabajo se describe cómo las Revisiones Sistemáticas (una estrategia científica que apunta a generar piezas de conocimiento de alto nivel) pueden ayudar al proceso de “mejora continua” que propone CMMI a las empresas que desean certificar los más altos niveles de madurez.Workshop de Ingeniería de Software y Bases de Datos (WISBD)Red de Universidades con Carreras en Informática (RedUNCI

    Impact of maintainability defects on code inspections

    Get PDF
    Software inspections are effective ways to detect defects early in the development process. In this paper, we analyze the impact of certain defect types on the effectiveness of code inspection. We conducted an experiment in an academic environment with 88 subjects to empirically investigate the effect of two maintainability defects, i.e., indentation and naming conventions, on the number of functional defects found, the effectiveness of functional defect detections, and the number of false positives reported during individual code inspections. Results show that in cases where both naming conventions and indentation defects exist, the participants found minimum number of defects and reported the highest number of false positives, as compared to the cases where either indentation or naming defects exist. Among maintainability defects, indentation seems to significantly impact the number of functional defects found by the inspector, while the presence of naming conventions defects seems to have no significant impact on the number of functional defects detected. The presence of maintainability defects significantly impacts the number of false positives reported. On the effectiveness of individual code inspectors we observed no significant impact originated from the presence of indentation or naming convention defects. © 2010 ACM

    Gamifying Software Testing – A Focus on Strategy & Tools Development

    Get PDF
    This study aims to introduce new software testing strategies and tools with the aim of creating a more engaging and rewarding environment for software testers. For this purpose, gamification has been selected as a potential solution to raise the performances of testers. Empirical experiments were conducted to validate key factors and metrics influencing the design and development of a gamified software testing system

    The Development and evaluation of three diverse techniques for object-oriented code inspection

    No full text
    This paper describes the development and evaluation of a rigorous approach aimed at the effective and efficient inspection of object-oriented (OO) code. Since the time that inspections were developed they have been shown to be powerful defect detection strategies. However, little research has been done to investigate their application to OO systems, which have very different structural and execution models compared to procedural systems. This suggests that inspection techniques may not be currently being deployed to their best effect in the context of large-scale OO systems. Work to date has revealed three significant issues that need to be addressed - the identification of chunks of code to be inspected, the order in which the code is read, and the resolution of frequent nonlocal references. Three techniques are developed with the aim of addressing these issues: one based on a checklist, one focused on constructing abstract specifications, and the last centered on the route that a use case takes through a system. The three approaches are evaluated empirically and, in this instance, it is suggested that the checklist is the most effective approach, but that the other techniques also have potential strengths. For the best results in a practical situation, a combination of techniques is recommended, one of which should focus specifically on the characteristics of OO
    corecore