Automatic Creation of Countermeasure Plan against Process Delay: Creation of Countermeasures based on Crashing and Fast-tracking
نویسندگان
چکیده
Success or failure of a software project mainly depends on the management capability of the project manager. Therefore, EVA (Earned Value Analysis) is gaining much attention recently as a method of managing a project in an integrated fashion by introducing a unified metric called EV (Earned Value) and quantitatively measuring and analyzing the cost and schedule of a project. Project managers can use EVA to estimate SEAC (Schedule Estimate At Completion) and EAC (Estimate At Completion). However, since EVA does not include constraints as a factor for assigning human resources, such as the available periods of each person, etc., EVA quite often generates inaccurate estimations for SEAC and EAC. In addition, suppose that a situation arises due to a delay in project progress, in which the deadline cannot be met if the project proceeds as is with no countermeasures adopted. In this case, it is necessary to provide a prospect that indicates whether the project can be completed within the original delivery deadline (i.e., the original delivery deadline can be met) or not if any countermeasures are adopted to recover the process delay. If there is some way to bring the project back to its original schedule and complete it within the assigned time table, it is necessary to be able to present the countermeasure or an actual development plan. However, EVA cannot be used to show such a prospect or present the means to restore the project to its original timeline even if such countermeasures exist. This paper proposes a method to solve these problems and discusses its effectiveness by comparing the authors’ approach with that of the EVA. Key-Words: Schedule Planning for Software Development, Countermeasure Plan against Process Delay, Crashing, Fast-tracking
منابع مشابه
Automatic Creation of Countermeasure Plans against Process Delay: Creation of Countermeasures based on Holiday Work
The authors have been developing the automatic scheduling systems for software development project, which deliver scheduling and worker assignment. Their earlier works were designed to draw on crashing and fast tracking to produce countermeasure plans against process delay. However, process delay can be recovered not only by crashing or fast tracking but also by using holiday works. Their earli...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملLow Cost Countermeasure at Authentication Protocol Level against Electromagnetic Side Channel Attacks on RFID Tags
Radio Frequency Identification (RFID) technology is widely spread in many security applications. Producing secured low-cost and low-power RFID tags is a challenge. The used of lightweight encryption algorithms can be an economic solution for these RFID security applications. This article proposes low cost countermeasure to secure RFID tags against Electromagnetic Side Channel Attacks (EMA). Fir...
متن کاملExpendable Countermeasure Effectiveness against Imaging Infrared Guided Threats
The following investigation evaluated the effectiveness of expendable infrared countermeasures (flares) in the protection of a fast jet against imaging infrared seekers. The report presents an effectiveness evaluation process and analyzes the results of Monte Carlo simulation runs. The goal of the investigation was to determine if expendable countermeasures (specifically spatially distributed f...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کامل