Cocomo Model In Software Engineering Tutorial Point
5/6/2019
Amadeus (1994),Amadeus Measurement System User's Guide, Version 2.3a, Amadeus Software Research, Inc., Irvine, CA.Google Scholar
Banker, R., R. Kauffman, and R. Kumar (1994), “An Empirical Test of Object-Based Output Measurement Metrics in a Computer Aided Software Engineering (CASE) Environment”,Journal of Management Information Systems, to appear.Google Scholar
Banker, R., H. Chang, and C. Kemerer (1994a), “Evidence on Economics of Scale in Software Development”,Information and Software Technology, to appear.Google Scholar
Behrens, C. (1983), “Measuring the Productivity of Computer Systems Development Activities with Function Points”,IEEE Transactions on Software Engineering, November.Google Scholar
Boehm, B. (1981),Software Engineering Economics, Prentice-Hall.Google Scholar
Boehm, B. (1983), “The Hardware/Software Cost Ratio: Is It a Myth?”Computer 16, 3, pp. 78–80.Google Scholar
Boehm, B. (1985), “COCOMO: Answering the Most Frequent Questions”, InProceedings, First COCOMO Users' Group Meeting, Wang Institute, Tyngsboro, MA.Google Scholar
Boehm, B. (1989),Software Risk Management, IEEE Computer Society Press, Los Alamitos, CA.Google Scholar
Boehm, B., T. Gray, and T. Seewaldt (1984), “Prototyping vs. Specifying: A Multi-Project Experiment”,IEEE Transactions on Software Engineering, May, 133–145.Google Scholar
Boehm, B., and W. Royce (1989), “Ada COCOMO and the Ada Process Model”,Proceedings, Fifth COCOMO Users' Group Meeting, Software Engineering Institute, Pittsburgh, PA.Google Scholar
Chidamber, S., and C. Kemerer (1994), “A Metrics Suite for Object Oriented Design”,IEEE Transactions on Software Engineering, to appear.Google Scholar
Computer Science and Telecommunications Board (CSTB) National Research Council (1993),Computing Professionals: Changing Needs for the 1990's, National Academy Press, Washington, DC.Google Scholar
Devenny, T. (1976), “An Exploratory Study of Software Cost Estimating at the Electronic Systems Division”, Thesis No. GSM/SM/765-4, Air Force Institute of Technology, Dayton, OH.Google Scholar
Gerlich, R., and U. Denskat (1994), “A Cost Estimation Model for Maintenance and High Reuse”,Proceedings, ESCOM 1994, Ivrea, Italy.Google Scholar
Goethert, W., E. Bailey, and M. Busby (1992), “Software Effort and Schedule Measurement: A Framework for Counting Staff Hours and Reporting Schedule Information”, CMU/SEI-92-TR-21, Software Engineering Institute, Pittsburgh, PA.Google Scholar
Goudy, R. (1987), “COCOMO-Based Personnel Requirements Model”,Proceedings, Third COCOMO Users' Group Meeting, Software Engineering Institute, Pittsburgh, PA.Google Scholar
IFPUG (1994),IFPUG Function Point Counting Practices: Manual Release 4.0, International Function Point Users' Group, Westerville, OH.Google Scholar
Kauffman, R. and R. Kumar (1993), “Modeling Estimation Expertise in Object Based ICASE Environments”, Stern School of Business Report, New York University.Google Scholar
Kemerer, C. (1987), “An Empirical Validation of Software Cost Estimation Models”,Communications of the ACM, 416–429.Google Scholar
Kominski, R. (1991),Computer Use in the United States: 1989, Current Population Reports, Series P-23, No. 171, U.S. Bureau of the Census, Washington, DC.Google Scholar
Kunkler, J. (1983), “A Cooperative Industry Study on Software Development/Maintenance Productivity”, Xerox Corporation, Xerox Square — XRX2 52A, Rochester, NY 14644, Third Report.Google Scholar
Miyazaki, Y. and K. Mori (1985), “COCOMO Evaluation and Tailoring”,Proceedings, ICSE 8, IEEE-ACM-BCS, London, pp. 292–299.Google Scholar
Parikh, G. and N. Zvegintzov (1983), “The World of Software Maintenance”,Tutorial on Software Maintenance, IEEE Computer Society Press, pp. 1–3.Google Scholar
Park, R. (1992), “Software Size Measurement: A Framework for Counting Source Statements”, CMU/SEI-92-TR-20, Software Engineering Institute, Pittsburgh, PA.Google Scholar
Park, R., W. Goethert, and J. Webb (1994), “Software Cost and Schedule Estimating: A Process Improvement Initiative”, CMU/SEI-94-TR-03, Software Engineering Institute, Pittsburgh, PA.Google Scholar
Paulk, M., B. Curtis, M. Chrissis, and C. Weber (1993), Capability Maturity Model for Software, Version 1.1”, CMU/SEI-93-TR-24, Software Engineering Institute, Pittsburgh, PA.Google Scholar
Pfleeger, S. (1991), “Model of Software Effort and Productivity”,Information and Software Technology 33, 3, 224–231.Google Scholar
Royce, W. (1990), “TRW's Ada Process Model for Incremental Development of Large Software Systems,Proceedings, ICSE 12, Nice, France.Google Scholar
Ruhl, M. and M. Gunn (1991), “Software Reengineering: A Case Study and Lessons Learned”, NIST Special Publication 500-193, Washington, DC.Google Scholar
Selby, R. (1988), “Empirically Analyzing Software Reuse in a Production Environment”, InSoftware Reuse: Emerging Technology, W. Tracz, Ed., IEEE Computer Society Press, pp. 176–189.Google Scholar
Selby, R., A Porter, D. Schmidt, and J. Berney (1991), “Metric-Driven Analysis and Feedback Systems for Enabling Empirically Guided Software Development”,Proceedings of the Thirteenth International Conference on Software Engineering (ICSE 13), Austin, TX, pp. 288–298.Google Scholar
Silvestri, G. and J. Lukasiewicz (1991), “Occupational Employment Projections”,Monthly Labor Review 114, 11, 64–94.Google Scholar
SPR (1993), “Checkpoint User's Guide for the Evaluator”, Software Productivity Research, Inc., Burlington, MA.Google Scholar
A file extension is a way to indicate to the operating systemwhat the file format is. With the correct file extension, theoperating system knows what to do when the user opens the file. InWeek 1, you learned HTML ..
See Answer
Question 1 (20 marks) Identifying network design faults Jim has given you a diagram showing the current state of the network using the only tool he has available to him: PowerPoint. Examine the associated PowerPoint ..
See Answer
I have a Marklogic database, which has 1000's of XML documents,i am querying for a doc with a nested near queries, but i amgetting irrelevant document when i am executing a query inunfiltered mode, but while execu..
See Answer
Hi so we have this extra credit in class and I dont know if thisis only for people who already knows some programming because thisquestion is from my class right now which is introduction toprogramming class but w..
See Answer
This part of the project requires that you write an APAformatted report which identifies the deficiencies in the currentsituation, research remedies, and make recommendations to improvethe overall security. Your w..
See Answer
Subject Information Technology Threat Analysis: What are goodnews sources to use to stay abreast of new security risks? Why arethey good sources. Identify the top three newest informationsecurity concepts / techno..
I have a Marklogic database, which has 1000's of XML documents,i am querying for a doc with a nested near queries, but i amgetting irrelevant document when i am executing a query inunfiltered mode, but while execu..
See Answer
4 Directed graphs Directed graphs are sometimes used operating systems when trying to avoid deadlock, which is a condition when several processes are waiting for a resource to become available, but this will never ha..
See Answer
I need some help< I keep getting this wrong and don’tunderstand why 2. 5. ChallengeChildren filesLet’s test your file creation skills.Make sure you are on the ~/workspace directory and: 1.Create the fo..
See Answer
Create a Web application thet replicates the Brozx Zoo's animallocation webpage http://bronxzoo.com/animals which inform thevisitors the location of the selected animal and it take to user tocorresponding webpage ..
See Answer
Given: 31. some code here 32. try t 33. II some code here 34. catch (SomeException se) f 35. II some code here 36. finally 37. Il some code here 38. Under which three circumstances will the code on line 37 be execute..
See Answer
Activity 1: Develop and desk-check the pseudocode for the following algorithms: 1. A program that asks the user for two numbers Output the remainder of the first number divided by the second. 2. A program that asks t..
See Answer
4 Directed graphs Directed graphs are sometimes used operating systems when trying to avoid deadlock, which is a condition when several processes are waiting for a resource to become available, but this will never ha..
See Answer
Computer Science & Engineering Departmen COE221-2 Digital Design Final Exam Name: ID: Section: Attempt ALL questions - to earn full credit you will need to clearly show and document your steps towards the final answe..
See Answer
13. Suppose Alice and Bob are working en the Ja e for cint - Systom.eut primin(averoge)
See Answer
Views PROPERTY [pid, stno, stname, sttype, suburb, state, postcode, carspaces] Write the following queries in SQL in your PROPERTY database: SHAREDPROPERTY unitno,pid, proptype] AGENCY [agencylicence, agencyname, web..
See Answer
Activity 1: Develop and desk-check the pseudocode for the following algorithms: 1. A program that asks the user for two numbers Output the remainder of the first number divided by the second. 2. A program that asks t..
See Answer
Given 33. try t 34. II some code here 35. catch (NullPointerException e1) 36. System.out.print('a'); 37. catch (Exception e2) 38. System.out.print('b') 39. finally 40. System.out.print('c'); 41. If some sort of excep..
See Answer
10 11 Activity 3: First Algorithm Exercises Work with your group to outline the following tasks as algorithms: Finding the largest number in a list of ten user-specified numbers 1. Finding the smallest number in a li..