固定某物 发表于 2025-3-28 18:36:08

http://reply.papertrans.cn/88/8710/870963/870963_41.png

nugatory 发表于 2025-3-28 20:50:54

Applying Test Case Metrics in a Tool Supported Iterative Architecture and Code Improvement Processdium sized software company to evaluate our approach. The main part of this paper is dedicated to the interpretation and comparison of the metrics. Finally their application in an iterative code improvement process is investigated.

Nomogram 发表于 2025-3-29 00:35:29

Empirical Evaluation of Hunk Metrics as Bug Predictorsain the classifier and each hunk metric is evaluated for its bug prediction capabilities. Our classifier can classify individual hunks as buggy or bug-free with 86 % accuracy, 83 % buggy hunk precision and 77% buggy hunk recall. We find that history based and change level hunk metrics are better predictors of bugs than code level hunk metrics.

apiary 发表于 2025-3-29 07:02:13

978-3-642-05414-3Springer-Verlag Berlin Heidelberg 2009

mighty 发表于 2025-3-29 08:26:09

http://reply.papertrans.cn/88/8710/870963/870963_45.png

surmount 发表于 2025-3-29 15:13:34

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/870963.jpg

欺骗世家 发表于 2025-3-29 17:39:22

http://reply.papertrans.cn/88/8710/870963/870963_47.png

Embolic-Stroke 发表于 2025-3-29 19:48:06

Psychological Needs, that it is not our intent to summarize all of them here. Many, if not most, of these theories have suffered from a lack of empirical validation, so that their application to marketing is questionable. We have seen Freud, for example, applied vigorously to advertising in the 40s and 50s, but with do

Inveterate 发表于 2025-3-30 00:27:55

White Coat Hypertension: To Treat or Not to Treat,s that because it does not differ from normotension, white coat hypertension needs no therapeutic intervention, the only requirement being remeasurements of in and out-o-office blood pressure, at various intervals after this condition has been detected . The second view points out that in

变化无常 发表于 2025-3-30 06:36:36

Bridging Model-Based and Language-Based Security,hole development process from requirements to code. We have provided support for software development using UML diagrams so that the code produced can be be validated by a language-based checker, in our case Jif (Java information flow). We demonstrate that the combination of model-based and language-based security is compelling.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Software Process and Product Measurement; International Confer Alain Abran,René Braungarten,Jacob Brunekreef Conference proceedings 2009 Sp