SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Pierre Bourque, Serge Oligny, Alain Abran, Bertr, Fournier. Developing Project Duration Models in Software Engineering[J]. Journal of Computer Science and Technology, 2007, 22(3): 348-357. |
[1] |
Angelis L, Stamelos I, Morisio M. Building a software cost estimation model based on categorical data. In -\it Proc. Seventh International Software Metrics Symposium}, London, England, 2001, pp.4∼15.
|
[2] |
Boehm B W, Abts C, Chulani S. Software development cost estimation approaches. -\it Annals of Software Engineering}, 2000, 10(1∼4): 177∼205.
|
[3] |
Briand L, Langley T, Wieczorek I. A replicated assessment and comparison of common software cost modeling techniques. In -\it Proc. 22nd International Conference on Software Engineering (ICSE)}, Limerick, Ireland, 2000, pp.377∼386.
|
[4] |
Dolado J J. On the problem of the software cost function. -\it Information and Software Technology}, 2001, 43(1): 61∼72.
|
[5] |
Jeffery R, Ruhe M, Wieczorek I. A comparative technique of two software development cost modeling techniques using multi-organizational and company-specific data. -\it Information and Software Technology}, 2000, 42(14): 1009∼1016.
|
[6] |
Kitchenham B, Pfleeger S L, McColl B, Eagan S. An empirical study of maintenance and development estimation accuracy. -\it Journal of Systems and Software}, 2002, 64(1): 57∼77.
|
[7] |
Smith R, Hale J E, Parrish A S. An empirical study using task assignment patterns to improve the accuracy of software estimation. -\it IEEE Transactions on Software Engineering}, 2001, 27(3): 264∼271.
|
[8] |
Stewart B. Predicting project delivery rates using the naives-Bayes classifier. -\it Journal of Software Maintenance and Evolution: Research and Practice}, 2002, 14(3): 161∼179.
|
[9] |
Wieczorek I, Ruhe M. How valuable is company specific data compared to multiple-company data for software cost estimation. In -\it Proc. Eighth IEEE Symposium on Software Metrics}, Ottawa, Canada, 2002, pp.237∼246.
|
[10] |
Kitchenham B A, Pfleeger S L, Pickard L M \it et al. \rm Preliminary guidelines for empirical research in software engineering. -\it IEEE Transactions on Software Engineering}, 2002, 28(8): 721∼734.
|
[11] |
Heemstra F J. Software cost estimation. -\it Information and Software Technology}, 1992, 34(10): 627∼639.
|
[12] |
Kitchenham B. Empirical studies of assumptions that underlie software cost-estimation models. -\it Information and Software Technology}, 1992, 34(4): 211∼218.
|
[13] |
Ferens D V. The conundrum of software estimation models. In -\it Proc. IEEE Aerospace and Electronic Systems Magazine}, 1999, pp.23∼29.
|
[14] |
Jones C. Software cost estimation in 2002. -\it Crosstalk: The Journal of Defense Software Engineering}, 2002, 15(6).
|
[15] |
Jones C. Determining software schedules. -\it Computer}, 1995, 28(2): 73∼75.
|
[16] |
Park R E, Goethert W B, Webb J T. Software cost and schedule estimating: A process improvement initiative. -\it Software Engineering Institute}, Pittsburgh, U.S.A., 1994, http:// www.sei.cmu.edu/pub/documents/94.reports/pdf/sr03.94.pdf.
|
[17] |
Lokan C, Wright T, Hill P, Stringer M. Organizational benchmarking using the ISBSG data repository. -\it IEEE Software}, 2001, 18(5): 26∼32.
|
[18] |
Oligny S, Bourque P, Abran A. An empirical assessment of project duration models in software engineering. In -\it Proc. 8th European Software Control and Metrics Conference ESCOM}, Berlin, Germany, 1997.
|
[19] |
Stensrud E, Foss T, Kitchenham B, Myrtveit I. An empirical validation of the relationship between the magnitude of relative error and project size. In -\it Proc. Eighth IEEE Symposium on Software Metrics}, Ottawa, Canada, 2002, pp.3∼12.
|
[20] |
D'Agostino R B, Belanger A, D'Agostino J. A suggestion for using powerful and informative tests of normality. -\it The American Statistician}, 1990, 44(4): 316∼321.
|
[21] |
Boehm B W. Software Engineering Economics. Prentice Hall, 1981.
|
[22] |
Neder J W W, Kutner M. Applied Linear Regression Model. 2nd Edition, Richard D (ed.), Homewood: Irwin Inc., IL, 1989.
|
[1] | Yuan Li, Xing-Chen Wang, Lin Huang, Yun-Lei Zhao. Order-Revealing Encryption: File-Injection Attack and Forward Security[J]. Journal of Computer Science and Technology, 2021, 36(4): 877-895. DOI: 10.1007/s11390-020-0060-y |
[2] | Yan-Hong Fan, Mei-Qin Wang, Yan-Bin Li, Kai Hu, Mu-Zhou Li. A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks[J]. Journal of Computer Science and Technology, 2021, 36(2): 419-433. DOI: 10.1007/s11390-020-9831-8 |
[3] | Qi-Qi Lai, Bo Yang, Yong Yu, Zhe Xia, Yan-Wei Zhou, Yuan Chen. Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes[J]. Journal of Computer Science and Technology, 2018, 33(6): 1243-1260. DOI: 10.1007/s11390-018-1885-5 |
[4] | Jing Xu, Wen-Tao Zhu. A Generic Framework for Anonymous Authentication in Mobile Networks[J]. Journal of Computer Science and Technology, 2013, 28(4): 732-742. DOI: 10.1007/s11390-013-1371-z |
[5] | Yan Zhu, Hong-Xin Hu, Gail-Joon Ahn, Huai-Xi Wang, Shan-Biao Wang. Provably Secure Role-Based Encryption with Revocation Mechanism[J]. Journal of Computer Science and Technology, 2011, 26(4): 697-710. DOI: 10.1007/s11390-011-1169-9 |
[6] | Hai-Bo Tian, Willy Susilo, Yang Ming, Yu-Min Wang. A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles[J]. Journal of Computer Science and Technology, 2008, 23(5): 832-842. |
[7] | Yong-Dong Zhang, Sheng Tang, Jin-Tao Li. Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication[J]. Journal of Computer Science and Technology, 2007, 22(4): 618-625. |
[8] | Sin-Kyu Kim, Jae-Woo Choi, Dae-Hun Nyang, Gene-Beck Hahn, Joo-Seok Song. Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN[J]. Journal of Computer Science and Technology, 2007, 22(3): 476-480. |
[9] | Qing-Hua Zheng, David L. Pepyne, Qing Wang. New Approach to WLAN Security with Synchronized Pseudo Random[J]. Journal of Computer Science and Technology, 2004, 19(6). |
[10] | ZHENG Dong, CHEN Kefei, YOU Jinyuan. Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party[J]. Journal of Computer Science and Technology, 2002, 17(6). |