2014 9th International Conference on the Quality of Information and Communications Technology 2014
DOI: 10.1109/quatic.2014.8
|View full text |Cite
|
Sign up to set email alerts
|

Software Defects: Stay Away from Them. Do Inspections!

Abstract: All software system fails. However, a development team can identify and remove as probability of software to fail. Identifying and throughout the software development proce important approach to improve software qu evidence about the feasibility, efficiency and software inspections to support the identific Besides their low cost, the performance of in positively influenced by the technique used Despite all these benefits, the use of inspectio place in the software industry. Therefore, this Q speech intends to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 44 publications
(46 reference statements)
0
6
0
Order By: Relevance
“…Two studies are empirically evidenced and one study is non-evidenced. Thus, such common defect types existing in the literature occurs in the three studies of Travassos et al (1999;Rocha et al, 2015;Travassos, 2014) non-evidenced. The next discussions of each study of such domain are presented as follows:…”
Section: Research Question 1 (Rq1a and Rq1b)mentioning
confidence: 96%
See 2 more Smart Citations
“…Two studies are empirically evidenced and one study is non-evidenced. Thus, such common defect types existing in the literature occurs in the three studies of Travassos et al (1999;Rocha et al, 2015;Travassos, 2014) non-evidenced. The next discussions of each study of such domain are presented as follows:…”
Section: Research Question 1 (Rq1a and Rq1b)mentioning
confidence: 96%
“…Continue Felderer et al (2014) On the role of defect taxonomy types for testin 2014 IEEE Xplore requirements: Results of a controlled experiment Rodriguez et al (2014) Preliminary comparison of techniques for dealing with 2014 ACM Digital Library imbalance in software defect prediction Femmer et al (2014) Rapid requirements checks with requirements smells: 2014 ACM Digital Library Two case studies Yusop et al (2016) Reporting usability defects: Do reporters report what 2016 ACM Digital Library software developers need? Cavezza et al (2014) Reproducibility of environment-dependent software 2014 IEEE Xplore failures: An experience report Langenfeld et al (2016) Requirements defects over a project lifetime: An 2016 Compendex SpringerLink empirical analysis of defect data from a 5-year automotive project at bosch Saito et al (2014) RISDM: A requirements inspection systems design 2014 IEEE Xplore methodology -perspective-based design of the pragmatic quality model and question set to SRS Travassos (2014) Software defects: Stay away from them. Do inspections!…”
Section: Data Sources X Rqs X Research Typesmentioning
confidence: 99%
See 1 more Smart Citation
“…The main ones are Checklist-Based Reading (CBR) [1], [2], [27], Perspective-Based Reading (PBR) [16], [20], [32], [34] and Ad hoc technique [31]. CBR uses a document in a checklist format with clear items (yes/no) stated in the form of questions.…”
Section: Software Inspectionmentioning
confidence: 99%
“…Verification & Validation (V&V) is a process that aims to ensure the quality of software [50], where: validation "is the process of evaluating software at the end of software development to ensure compliance with intended usage", and verification "is the process of determining whether the products of a given phase of the software development process fulfill the requirements established during the previous phase" [10, p. 11 ].…”
Section: Static Analysismentioning
confidence: 99%