• TwitterFacebookGoogle PlusLinkedInRSS FeedEmail

Cocomo Model In Software Engineering Tutorial Point

5/6/2019 
  1. Amadeus (1994),Amadeus Measurement System User's Guide, Version 2.3a, Amadeus Software Research, Inc., Irvine, CA.Google Scholar
  2. Banker, R., R. Kauffman, and R. Kumar (1994), “An Empirical Test of Object-Based Output Measurement Metrics in a Computer Aided Software Engineering (CASE) Environment”,Journal of Management Information Systems, to appear.Google Scholar
  3. Banker, R., H. Chang, and C. Kemerer (1994a), “Evidence on Economics of Scale in Software Development”,Information and Software Technology, to appear.Google Scholar
  4. Behrens, C. (1983), “Measuring the Productivity of Computer Systems Development Activities with Function Points”,IEEE Transactions on Software Engineering, November.Google Scholar
  5. Boehm, B. (1981),Software Engineering Economics, Prentice-Hall.Google Scholar
  6. Boehm, B. (1983), “The Hardware/Software Cost Ratio: Is It a Myth?”Computer 16, 3, pp. 78–80.Google Scholar
  7. Boehm, B. (1985), “COCOMO: Answering the Most Frequent Questions”, InProceedings, First COCOMO Users' Group Meeting, Wang Institute, Tyngsboro, MA.Google Scholar
  8. Boehm, B. (1989),Software Risk Management, IEEE Computer Society Press, Los Alamitos, CA.Google Scholar
  9. Boehm, B., T. Gray, and T. Seewaldt (1984), “Prototyping vs. Specifying: A Multi-Project Experiment”,IEEE Transactions on Software Engineering, May, 133–145.Google Scholar
  10. Boehm, B., and W. Royce (1989), “Ada COCOMO and the Ada Process Model”,Proceedings, Fifth COCOMO Users' Group Meeting, Software Engineering Institute, Pittsburgh, PA.Google Scholar
  11. Chidamber, S., and C. Kemerer (1994), “A Metrics Suite for Object Oriented Design”,IEEE Transactions on Software Engineering, to appear.Google Scholar
  12. Computer Science and Telecommunications Board (CSTB) National Research Council (1993),Computing Professionals: Changing Needs for the 1990's, National Academy Press, Washington, DC.Google Scholar
  13. Devenny, T. (1976), “An Exploratory Study of Software Cost Estimating at the Electronic Systems Division”, Thesis No. GSM/SM/765-4, Air Force Institute of Technology, Dayton, OH.Google Scholar
  14. Gerlich, R., and U. Denskat (1994), “A Cost Estimation Model for Maintenance and High Reuse”,Proceedings, ESCOM 1994, Ivrea, Italy.Google Scholar
  15. Goethert, W., E. Bailey, and M. Busby (1992), “Software Effort and Schedule Measurement: A Framework for Counting Staff Hours and Reporting Schedule Information”, CMU/SEI-92-TR-21, Software Engineering Institute, Pittsburgh, PA.Google Scholar
  16. Goudy, R. (1987), “COCOMO-Based Personnel Requirements Model”,Proceedings, Third COCOMO Users' Group Meeting, Software Engineering Institute, Pittsburgh, PA.Google Scholar
  17. IFPUG (1994),IFPUG Function Point Counting Practices: Manual Release 4.0, International Function Point Users' Group, Westerville, OH.Google Scholar
  18. Kauffman, R. and R. Kumar (1993), “Modeling Estimation Expertise in Object Based ICASE Environments”, Stern School of Business Report, New York University.Google Scholar
  19. Kemerer, C. (1987), “An Empirical Validation of Software Cost Estimation Models”,Communications of the ACM, 416–429.Google Scholar
  20. Kominski, R. (1991),Computer Use in the United States: 1989, Current Population Reports, Series P-23, No. 171, U.S. Bureau of the Census, Washington, DC.Google Scholar
  21. Kunkler, J. (1983), “A Cooperative Industry Study on Software Development/Maintenance Productivity”, Xerox Corporation, Xerox Square — XRX2 52A, Rochester, NY 14644, Third Report.Google Scholar
  22. Miyazaki, Y. and K. Mori (1985), “COCOMO Evaluation and Tailoring”,Proceedings, ICSE 8, IEEE-ACM-BCS, London, pp. 292–299.Google Scholar
  23. Parikh, G. and N. Zvegintzov (1983), “The World of Software Maintenance”,Tutorial on Software Maintenance, IEEE Computer Society Press, pp. 1–3.Google Scholar
  24. Park, R. (1992), “Software Size Measurement: A Framework for Counting Source Statements”, CMU/SEI-92-TR-20, Software Engineering Institute, Pittsburgh, PA.Google Scholar
  25. Park, R., W. Goethert, and J. Webb (1994), “Software Cost and Schedule Estimating: A Process Improvement Initiative”, CMU/SEI-94-TR-03, Software Engineering Institute, Pittsburgh, PA.Google Scholar
  26. Paulk, M., B. Curtis, M. Chrissis, and C. Weber (1993), Capability Maturity Model for Software, Version 1.1”, CMU/SEI-93-TR-24, Software Engineering Institute, Pittsburgh, PA.Google Scholar
  27. Pfleeger, S. (1991), “Model of Software Effort and Productivity”,Information and Software Technology 33, 3, 224–231.Google Scholar
  28. Royce, W. (1990), “TRW's Ada Process Model for Incremental Development of Large Software Systems,Proceedings, ICSE 12, Nice, France.Google Scholar
  29. Ruhl, M. and M. Gunn (1991), “Software Reengineering: A Case Study and Lessons Learned”, NIST Special Publication 500-193, Washington, DC.Google Scholar
  30. Selby, R. (1988), “Empirically Analyzing Software Reuse in a Production Environment”, InSoftware Reuse: Emerging Technology, W. Tracz, Ed., IEEE Computer Society Press, pp. 176–189.Google Scholar
  31. Selby, R., A Porter, D. Schmidt, and J. Berney (1991), “Metric-Driven Analysis and Feedback Systems for Enabling Empirically Guided Software Development”,Proceedings of the Thirteenth International Conference on Software Engineering (ICSE 13), Austin, TX, pp. 288–298.Google Scholar
  32. Silvestri, G. and J. Lukasiewicz (1991), “Occupational Employment Projections”,Monthly Labor Review 114, 11, 64–94.Google Scholar
  33. SPR (1993), “Checkpoint User's Guide for the Evaluator”, Software Productivity Research, Inc., Burlington, MA.Google Scholar
  • A file extension is a way to indicate to the operating systemwhat the file format is. With the correct file extension, theoperating system knows what to do when the user opens the file. InWeek 1, you learned HTML ..
    See Answer
  • Question 1 (20 marks) Identifying network design faults Jim has given you a diagram showing the current state of the network using the only tool he has available to him: PowerPoint. Examine the associated PowerPoint ..
    See Answer
  • I have a Marklogic database, which has 1000's of XML documents,i am querying for a doc with a nested near queries, but i amgetting irrelevant document when i am executing a query inunfiltered mode, but while execu..
    See Answer
  • Hi so we have this extra credit in class and I dont know if thisis only for people who already knows some programming because thisquestion is from my class right now which is introduction toprogramming class but w..
    See Answer
  • This part of the project requires that you write an APAformatted report which identifies the deficiencies in the currentsituation, research remedies, and make recommendations to improvethe overall security. Your w..
    See Answer
  • Subject Information Technology Threat Analysis: What are goodnews sources to use to stay abreast of new security risks? Why arethey good sources. Identify the top three newest informationsecurity concepts / techno..
    See Answer
  • STUDENT szd char (6) stame varchar (45) Cnochar (6) sMajor ehar (3) SOPA double SRCTION COURS INSTRUCTOR SId char(6) Inane varchar (45) Ititie varchar (45) Cno ehar(6) Sno char (4) Cno char (6) Ceredit int Sno char (..
    See Answer
  • I have a Marklogic database, which has 1000's of XML documents,i am querying for a doc with a nested near queries, but i amgetting irrelevant document when i am executing a query inunfiltered mode, but while execu..
    See Answer
  • 4 Directed graphs Directed graphs are sometimes used operating systems when trying to avoid deadlock, which is a condition when several processes are waiting for a resource to become available, but this will never ha..
    See Answer
  • I need some help< I keep getting this wrong and don’tunderstand why 2. 5. ChallengeChildren filesLet’s test your file creation skills.Make sure you are on the ~/workspace directory and: 1.Create the fo..
    See Answer
  • Create a Web application thet replicates the Brozx Zoo's animallocation webpage http://bronxzoo.com/animals which inform thevisitors the location of the selected animal and it take to user tocorresponding webpage ..
    See Answer
  • Given: 31. some code here 32. try t 33. II some code here 34. catch (SomeException se) f 35. II some code here 36. finally 37. Il some code here 38. Under which three circumstances will the code on line 37 be execute..
    See Answer
  • Activity 1: Develop and desk-check the pseudocode for the following algorithms: 1. A program that asks the user for two numbers Output the remainder of the first number divided by the second. 2. A program that asks t..
    See Answer
  • 4 Directed graphs Directed graphs are sometimes used operating systems when trying to avoid deadlock, which is a condition when several processes are waiting for a resource to become available, but this will never ha..
    See Answer
  • Computer Science & Engineering Departmen COE221-2 Digital Design Final Exam Name: ID: Section: Attempt ALL questions - to earn full credit you will need to clearly show and document your steps towards the final answe..
    See Answer
  • 13. Suppose Alice and Bob are working en the Ja e for cint - Systom.eut primin(averoge)
    See Answer
  • Views PROPERTY [pid, stno, stname, sttype, suburb, state, postcode, carspaces] Write the following queries in SQL in your PROPERTY database: SHAREDPROPERTY unitno,pid, proptype] AGENCY [agencylicence, agencyname, web..
    See Answer
  • Activity 1: Develop and desk-check the pseudocode for the following algorithms: 1. A program that asks the user for two numbers Output the remainder of the first number divided by the second. 2. A program that asks t..
    See Answer
  • Given 33. try t 34. II some code here 35. catch (NullPointerException e1) 36. System.out.print('a'); 37. catch (Exception e2) 38. System.out.print('b') 39. finally 40. System.out.print('c'); 41. If some sort of excep..
    See Answer
  • 10 11 Activity 3: First Algorithm Exercises Work with your group to outline the following tasks as algorithms: Finding the largest number in a list of ten user-specified numbers 1. Finding the smallest number in a li..
    See Answer
See more related Q&A