Entity

Time filter

Source Type

Winter Park, FL, United States

Liu G.,Nanjing University | Rong G.,Software Techniques | Zhang H.,Nanjing University | Shan Q.,Nanjing University
ACM International Conference Proceeding Series | Year: 2015

Context: Capture-recapture method has long been adopted in software engineering as a relatively objective way for de- fect estimation. While many relevant studies have been carried out to evaluate various capture-recapture models and estimators, there still lacks common understanding on the adoption status of the method in software engineering. It is necessary to systematically collect empirical evidence of Capture-recapture adoption hence form necessary under- standing on the method. Objective: This study aims to synthesize relevant primary studies on the adoption of capture-recapture method in soft- ware engineering, and try to identify possible gaps between the state-of-practice and the state-of-art so as to provide clues for future research. Method: By following the guidelines of Kitchenham, we conducted a Systematic Literature Review(SLR) on studies of the adoption of capture-recapture method in software en- gineering. Results: From 5 common digital libraries, we retrieved 506 published articles, among them 44 were identified as relevant primary studies. We identified 18 capture-recapture estima- tors under 4 basic models. Types of the currently existing studies as well as the relevant in uencing factors to adoption of the capture-recapture method are also discussed. Conclusion: Results show that there are no conclusive de- cisions on the best capture-recapture models and estimators. Besides, the number of inspectors and their capability to de- tect defects as well as the difficulty to detect defects are most critical in uencing factors. In addition, lacking of industrial application may be the major issue of current adoption sta- tus of capture-recapture method in software engineering. Copyright 2015 ACM. Source


Trademark
Software Techniques | Date: 2002-07-16

computer software for time accounting of employees.


Trademark
Software Techniques | Date: 2003-10-27

COMPUTER SOFTWARE FOR ACTIVELY IDENTIFYING AND FILTERING AN UNSOLICITED MESSAGE; AND FOR REDIRECTING AN UNSOLICITED MESSAGE TO ITS ORIGIN WITH A CEASE AND DESIST REQUEST.


Trademark
Software Techniques | Date: 2003-08-19

Computer software for local, state, and county government in the area of property appraisal and taxation.


Chen S.,Software Techniques | Li J.,Software Techniques | Wang X.,University of Sydney
Proceedings - 6th International Conference on Image and Graphics, ICIG 2011 | Year: 2011

Euclidean distance transform is widely used in many applications of image analysis and processing. Traditional algorithms are time-consuming and difficult to realize. This paper proposes a novel fast distance transform algorithm. Firstly, mark each foreground's nearest background pixel's position in the row and column; and then use the marks scan the foreground area and figure out the first foreground pixel distance transform information; According to the first pixel' information, design four small regions for its 4-adjacent foreground pixel and also based on the marks search out each adjacent foreground pixel's nearest background pixel. As the region growing, iteratively process each adjacent pixel until all the foreground pixels been resolved. Our algorithm has high efficiency and is simple to implement. Experiments show that comparing to the existing boundary striping and contour tracking algorithm, our algorithm demonstrates a significant improvement in time and space consumption. © 2011 IEEE. Source

Discover hidden collaborations