Approach to a Theory of Software Process and Software
نویسنده
چکیده
Three FEAST workshops were held at Imperial College during 1994/5 [fea94/5] to explore the FEAST hypothesis, itself formulated in 1993 [leh94]. The FEAST/1 project (1996-8) [leh95] funded by EPSRC followed and led, in turn, to FEAST/2 (1999-2001) [leh98]. Many of the results of these studies have been published over the past few years. They may be found on the FEAST web site at As part of their investigation, the projects obtained evolution data on a number of systems from the formal collaborators, ICL, Logica, Matra-BAE and MoD-DERA and BT (FEAST/2). Similar data was also received from Lucent Technologies through the good offices of Professor Dewayne Perry, who, together with Professor Wlad Turski, are EPSRC Senior Visiting Fellows to the projects. The release-based systems studied had each been evolved in a sequence of from 15 to 30 releases over some eight to twenty years. Models and analysis of the data and interpretation of the results revealed striking similarities in the evolutionary patterns and long term trends of these systems. Moreover the newly observed patterns and trends were strikingly similar to those of OS/360 and several other systems studied in the 70s [leh98b]. This despite the fact that the systems studied were developed and evolved by different organisations, addressed different application areas and implemented distinct architectures using different languages. Moreover the systems studied differed in their size by up to two orders of magnitude and in the number of persons involved in their evolution by even more. Since the day to day control of the evolution process was in the hands of humans, differences between the several systems in their short term evolutionary behaviour were to be expected. The similarity of their long term behaviour, however, would have come as a surprise had not the 70s and 80 interpretation of the initial OS/360 observations, their subsequent phenomenological interpretation and the encapsulation of the observations and their interpretations in a set of laws of software evolution [leh74,78,80,96] prepared the investigators for such commonality. Thus the FEAST/1 results were seen as further support for six of the eight laws and supported many of the other conclusions that had been reached. The new evidence did, however, suggest some minor changes to the wording of the laws [leh98b]. As the laws developed over a period of fifteen years no thought was given to any relationship between them. The observed behaviour was regarded as characterising industrial team …
منابع مشابه
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملThe Qualitative Study of Factors Affecting Relapse to Drug Abuse and Addiction with a Grounded Theory Approach
Objective: The present study aimed to perform a qualitative study of the factors affecting relapse to drug abuse and addiction with a grounded theory approach. Method: The method of the current research was the grounded theory qualitative method. The statistical population of the current study included all individuals referring to an addiction treatment clinic in the city of Qorveh in 2020 who ...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملDeveloping Reliable yet Flexible Software through If-Then Model Transformation Rules
Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...
متن کاملExport performance improvement model of Iranian farmed shrimp with grounded theory approach
The purpose of this study was to present a model of export performance development of farmed shrimp in Iran. The research method is qualitative and is based on Grounded Theory. Theoretical sampling was performed using snowball technique based on which, 16 interviews were conducted with the scientific and practical experts of the Iranian shrimp industry (Fisheries Organization managers, Iran...
متن کامل