2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA) 2016
DOI: 10.1109/wicsa.2016.34
|View full text |Cite
|
Sign up to set email alerts
|

An Evaluation of Design Rule Spaces as Risk Containers

Abstract: Abstract-It is well understood that software development can be a risky enterprise and industrial projects often overrun budget and schedule. Effective risk management is, therefore, vital for a successful project outcome. Design Rule Spaces (DRSpaces) have been used by other researchers to understand why implemented software is error-prone [1, 2]. This industrial case study evaluates whether such spaces are durable, meaningful, and isolating risk containers. DRSpaces were created from UML class diagrams of ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(17 citation statements)
references
References 14 publications
1
16
0
Order By: Relevance
“…The work in [1] [2] describes DR Containers derived from the Design Rule Spaces (DRSpaces) proposed by Xiao et al [3]. DRSpaces are graphs based on design rules (key interfaces) that split an architecture into independent modules.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The work in [1] [2] describes DR Containers derived from the Design Rule Spaces (DRSpaces) proposed by Xiao et al [3]. DRSpaces are graphs based on design rules (key interfaces) that split an architecture into independent modules.…”
Section: Related Workmentioning
confidence: 99%
“…Risk containers are defined as architecture subsets that can be used to separate areas of low and high risk within an overall architecture. The work in [1] [2] suggests that risk containers based on design rules support the isolation of error-proneness risks at design time. The ability to isolate risks does not mitigate the risk by itself.…”
Section: Introductionmentioning
confidence: 99%
“…DR Containers were constructed using the method described in Leigh et al (2016). Each design rule class was used as a container basis before expansion with subordinate classes by consulting design relationships.…”
Section: Risk Container Creationmentioning
confidence: 99%
“…We used again the 75th percentile of bugs per KLOC as the threshold (Leigh et al 2016). Bug identifiers were extracted from the Subversion commit messages for each implementation file.…”
Section: Figure 1 Example Container Population and Coupling Calculationmentioning
confidence: 99%
See 1 more Smart Citation