Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement 2014
DOI: 10.1145/2652524.2652590
|View full text |Cite
|
Sign up to set email alerts
|

Empirical and face validity of software maintenance defect models used at the jet propulsion laboratory

Abstract: Context: At the Mission Design and Navigation Software Group at the Jet Propulsion Laboratory we make use of finite exponential based defect models to aid in maintenance planning and management for our widely used critical systems. However a number of pragmatic issues arise when applying defect models for a post-release system in continuous use. These include: how to utilize information from problem reports rather than testing to drive defect discovery and removal effort, practical model calibration, and align… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…That is, we may not know all potential causes of failure -hazards (in the case of safety) or vulnerabilities (in the case of security) -along with their impacts. For both safety and security, the likelihood of a defect becoming a failure and impact of that failure tends to follow a distribution with large variability and generally be positively skewed [19]. But unlike a failure from a safety hazard, when a security vulnerability is exploited, one must assume the impact will reach its maximum potential due to the presence of a persistent intelligent agent.…”
Section: Background and Contextmentioning
confidence: 99%
“…That is, we may not know all potential causes of failure -hazards (in the case of safety) or vulnerabilities (in the case of security) -along with their impacts. For both safety and security, the likelihood of a defect becoming a failure and impact of that failure tends to follow a distribution with large variability and generally be positively skewed [19]. But unlike a failure from a safety hazard, when a security vulnerability is exploited, one must assume the impact will reach its maximum potential due to the presence of a persistent intelligent agent.…”
Section: Background and Contextmentioning
confidence: 99%