An Efficient Approach for Requirement Traceability Integrated With Software Repository
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 4
Abstract
Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques are applied on source code and requirements document to generate baseline traceability links. Concurrently, software repositories are also mined to generate validating traceability links i.e. Histrace links which are then called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking the experts and finds most traceable links. The proposed approach is able to improve the precision and recall values of the traceability links.
Authors and Affiliations
P. M. G. Jegathambal
A Comparative study on Intelligent Tutoring Systems fostering Self Regulated Learning
Educational data mining is an emerging research area where the traditional data mining techniques are applied on Intelligent Tutoring System (ITS) to study the learning pattern of students. This paper conducts a survey o...
Review paper on adapting data stream mining concept drift using ensemble classifier approach
Abstract: Data stream is massive, fast changing and infinite in nature. It is very natural that large amount of unlabeled data and small amount labeled are available in data stream environments. Storing and labelin...
Growth and Development Strategy of It Software and Service Industry
A Novel identity based secure distributed data storage scheme
Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for...
Migrate and Map: A Framework to Access Data from Mysql, Mongodb or Hbase Using Mysql Queries
Abstract: Due to ever-increasing amount of data, scalability factor of the databases becomes a major constraint. Moreover, traditional relational databases fix the user’s perspective to view data in tabular format. Paral...