An Efficient Approach for Requirement Traceability Integrated With Software Repository
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 4
Abstract
Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques are applied on source code and requirements document to generate baseline traceability links. Concurrently, software repositories are also mined to generate validating traceability links i.e. Histrace links which are then called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking the experts and finds most traceable links. The proposed approach is able to improve the precision and recall values of the traceability links.
Authors and Affiliations
P. M. G. Jegathambal
A Hybrid Approach for Performance Enhancement of VANETusing CSMA-MACA: a Review
Abstract: A wireless sensor network (WSNs) have increased gigantic consideration for their extensive varietyof utilization, for example, environmental checking, military consideration, medical services, fiascoadmin...
Frequent Pattern Mining with Serialization and De-Serialization
Abstract : Competent frequent pattern mining techniques be critical for finding relationship rules. Here, examination of subject of finding association rules for objects into an enormous DB of customer purchaseentries i...
Managing IoT data using relational schema and JSON fields, a comparative study
Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections us...
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Abstract: Computational Intelligence is the study of the design of intelligent agents. An agent is something that react according to an environment—it does something. Agents includes worms, dogs, thermostats, airplanes,...
Skew Detection based on Bounding Edge Approximation
Abstract: Any paper document when converted to electronic form through standard digitizing devices, like scanners, is subject to a small tilt or skew. With recent advances of hand-held devices such as cell-phones,...