Better Management of Defects for Improving Software Processes
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2011, Vol 11, Issue 2
Abstract
Every software after development needs to get tested. No software can be built “Defect Free”. After testing defects are reported by the use of a tool called “Defect Tracking System”. Also Defects reported can be managed for enhancing the quality of software. This paper present the view of how defects are managed and the approach used for managing defect i.e. defect management process. Also it can be used for process improvement which means to prevent future occurrence of similar defects in processes.
Authors and Affiliations
Shruti Mittal , Kamna Solanki , Anuja Saroha
Collection of Data in Secure Way in Wireless Sensor Networks
Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks...
An Intelligent Fuzzy Based Scheme To Analyze Heart Diseases
The main objective of this research work is to define some fuzzy based ruleset to identify the patient disease based on person medical related information. This information includes the person age, calestrol level, heart...
Awareness of Open Source Software (OSS): Promises, Reality and Future
Open source is a development method for software that harnesses the power of distributed peer review and transparency of process. The Open Source Initiative Approved License trademark and program creates a nexus of trus...
CONCURRENT ENGINEERING FOR PROCESS IMPROVEMENT OF PRODUCT
Nowadays the competition among companies is so compelling that they should not only be on the top of technology in the area, but also run their business according to life-long models. The emphasis on the product post-sal...
A Survey on Protocols & Attacks in MANET Routing
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to...