Software estimation, Computer Engineering

Software Estimation

The statement of scope helps the planner to established estimates using one or more method which fail into two wide categories: empirical modeling and decomposition.

Decomposition method offered a delineation of major software functions which is followed through estimates of either the size or the number of person months needed to implement each function.

Empirical method use empirically derived expressions for time and effort to predict these project quantities. The automated tools can be used to implement a specific empirical model.

Accurate the project estimates mainly make use of at least 2 of the 3 techniques noted as earlier. By comparing and reconciling estimates derived using various methods the planner is more likely to derive an accurate estimate. The Software project estimation is never be an exact science but a combination of systematic techniques and good historical data can improve estimation accuracy

 

Posted Date: 10/18/2012 7:54:06 AM | Location : United States







Related Discussions:- Software estimation, Assignment Help, Ask Question on Software estimation, Get Answer, Expert's Help, Software estimation Discussions

Write discussion on Software estimation
Your posts are moderated
Related Questions
Described Instruction or control hazard? Ans: The pipeline can be stalled due to delay in the availability of an instruction. For instance, this may be a result of a miss in t

draw input and output charectoristics of BJT and justify CE configuration provides large current amplification

Real time (transaction) processing In real time (transaction) processing files are generally updated in real time (for example when booking flights on an airplane); however in

Synchronized with a clock signal Memory system considerations Speed Cost Size of chip Power dissipation Memory controller Refresh Overhead

Explain the functioning of Firewall Using Screening Router. Firewall Using Screening Router: The risk of break-within is large along with this form of firewall: Eve

FACSIMILE : This is often known as 'fax' and it represents the interface between reprographic and computer technology. By using fax, the contents of a sheet of paper (text or illu

PVM is mainly a simulation of a computer machine running parallel programs. It is a software package that allows a heterogeneous collection of UNIX and/or Windows computers hooked

Q. Describe the basic aspects of ENIAC? The main aspects of ENIAC can be summarized as: ENIAC was a general purpose-computing machine in that vacuum tube technology was

Rigging is use for if we need to give animation for any object or character then we apply to character or object internal bone setting(like our bones).that is known as rigging. Whe

Constant Current Sources An ideal constant current source delivers a given current to a circuit regardless of the voltage required to do so. . Constant current supplies are r