Approach to a Theory of Software Process and Software

نویسنده

  • M M Lehman
چکیده

Three FEAST workshops were held at Imperial College during 1994/5 [fea94/5] to explore the FEAST hypothesis, itself formulated in 1993 [leh94]. The FEAST/1 project (1996-8) [leh95] funded by EPSRC followed and led, in turn, to FEAST/2 (1999-2001) [leh98]. Many of the results of these studies have been published over the past few years. They may be found on the FEAST web site at As part of their investigation, the projects obtained evolution data on a number of systems from the formal collaborators, ICL, Logica, Matra-BAE and MoD-DERA and BT (FEAST/2). Similar data was also received from Lucent Technologies through the good offices of Professor Dewayne Perry, who, together with Professor Wlad Turski, are EPSRC Senior Visiting Fellows to the projects. The release-based systems studied had each been evolved in a sequence of from 15 to 30 releases over some eight to twenty years. Models and analysis of the data and interpretation of the results revealed striking similarities in the evolutionary patterns and long term trends of these systems. Moreover the newly observed patterns and trends were strikingly similar to those of OS/360 and several other systems studied in the 70s [leh98b]. This despite the fact that the systems studied were developed and evolved by different organisations, addressed different application areas and implemented distinct architectures using different languages. Moreover the systems studied differed in their size by up to two orders of magnitude and in the number of persons involved in their evolution by even more. Since the day to day control of the evolution process was in the hands of humans, differences between the several systems in their short term evolutionary behaviour were to be expected. The similarity of their long term behaviour, however, would have come as a surprise had not the 70s and 80 interpretation of the initial OS/360 observations, their subsequent phenomenological interpretation and the encapsulation of the observations and their interpretations in a set of laws of software evolution [leh74,78,80,96] prepared the investigators for such commonality. Thus the FEAST/1 results were seen as further support for six of the eight laws and supported many of the other conclusions that had been reached. The new evidence did, however, suggest some minor changes to the wording of the laws [leh98b]. As the laws developed over a period of fifteen years no thought was given to any relationship between them. The observed behaviour was regarded as characterising industrial team …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

The Qualitative Study of Factors Affecting Relapse to Drug Abuse and Addiction with a Grounded Theory Approach

Objective: The present study aimed to perform a qualitative study of the factors affecting relapse to drug abuse and addiction with a grounded theory approach. Method: The method of the current research was the grounded theory qualitative method. The statistical population of the current study included all individuals referring to an addiction treatment clinic in the city of Qorveh in 2020 who ...

متن کامل

Elicitation Strategies for Web Application Using Activity Theory

Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...

متن کامل

Elicitation Strategies for Web Application Using Activity Theory

Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...

متن کامل

Developing Reliable yet Flexible Software through If-Then Model Transformation Rules

Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...

متن کامل

Export performance improvement model of Iranian farmed shrimp with grounded theory approach

The purpose of this study was to present a model of export performance development of ‎farmed shrimp in Iran. The research method is qualitative and is based on ‎Grounded Theory. Theoretical sampling was performed using snowball technique based on ‎which, 16 interviews were conducted with the scientific and practical experts of the Iranian ‎shrimp industry (Fisheries Organization managers, Iran...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000