Proceedings of 2011 International Conference on Computer Science and Network Technology 2011
DOI: 10.1109/iccsnt.2011.6181977
|View full text |Cite
|
Sign up to set email alerts
|

Comparison between Adaptive Software Development and Feature Driven Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Each iteration usually lasts one to three weeks. Customers are given work packages to test after they are completed [17]. The FDD lifecycle is shown in Fig.…”
Section: Feature Driven Development (Fdd)mentioning
confidence: 99%
See 2 more Smart Citations
“…Each iteration usually lasts one to three weeks. Customers are given work packages to test after they are completed [17]. The FDD lifecycle is shown in Fig.…”
Section: Feature Driven Development (Fdd)mentioning
confidence: 99%
“…ASD was introduced by James A. Highsmith in 2000 [17]. Instead of the static software development life cycle of plan design build, he proposed a dynamic Speculate collaborate learn software development life cycle [17].…”
Section: F Adaptive Software Development (Asd)mentioning
confidence: 99%
See 1 more Smart Citation
“…This approach significantly speeds up the process of designing software in an unfamiliar domain.  FDD (Features Driven Development) [8] attempts to combine the most recognized software development methodologies in the industry, based on important functionality (properties) of the developed software for the customer. The main goal of this methodology is to systematically develop real, working software within the set deadlines.…”
Section: Fig 2 Approach To End-to-end Testing Of the Considered Appli...mentioning
confidence: 99%
“…However, a problem remains in that there are no security elements inside FDD. Additionally, there is no specific security role inside FDD [66][67][68]. Of course there are many security methods that been applied in the real world [69][70][71][72][73][74][75][76][77][78][79][80], especially in Malaysia [80] and India [81].There is also discussion and much awareness among IT organizations regarding software security practices [82] and the human factors that could attribute to software security [83].However, there is no specific research regarding the integration of security and FDD.…”
Section: Q3: How Is the Integration Between Security And Fddmentioning
confidence: 99%