An effort re-estmation technique using defect analysis and risk assessment
暂无分享,去创建一个
[1] Robert Milne,et al. Predicting paper making defects on-line using data mining , 1998, Knowl. Based Syst..
[2] Xiaoning Zhang,et al. Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods , 2001, Decis. Sci..
[3] Andrew Glover,et al. Continuous Integration: Improving Software Quality and Reducing Risk (The Addison-Wesley Signature Series) , 2007 .
[4] Andreas Golze,et al. Optimize Quality for Business Outcomes: A Practical Approach to Software Testing, 3rd Edition , 2008 .
[5] Naveen Kumar,et al. Data Mining for Business Intelligence–Concepts, Techniques, and Applications in Microsoft Office Excel® with XLMiner® , 2012 .
[6] Lionel C. Briand,et al. Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software , 2007, The 18th IEEE International Symposium on Software Reliability (ISSRE '07).
[7] P. Jalote,et al. Using defect analysis feedback for improving quality and productivity in iterative software development , 2005, 2005 International Conference on Information and Communication Technology.
[8] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .