Explain basic execution time model, Software Engineering

Assignment Help:

Q. Explain Basic Execution Time Model?

The model was developed by the J.D. MUSA in 1979(MUSA79) and is based on execution time. It is presumed that failures may occur according to a non-homogeneous Poisson Process (NHPP) Real world events may be described using Poisson processes. Instance of Poisson processes are

- A Number of telephone calls expected in a given period of time

- Expected figure of road accidents in a given period of time

- Expected figure of persons visiting in a shopping mall in a given period of time.

In this model the reduce in failure intensity as a function of the number of failures observed is constant and is given as:

288_Explain Basic Execution Time Model.png

Where Initial failure intensity at the start of execution.

V0 Number of failures experienced, if program is executed for Infinite time period μ Average as well expected number of failures experienced at a given point in time. These models imply a uniform operational profile. If every input class are selected equally often the various faults have an equal probability of manifesting themselves. The correction of whichever of those faults then contributes an equal decrease in the failure intensity. The negative sign publicized that there is a negative slope meaning thereby a decrementing trend in failure intensity.


Related Discussions:- Explain basic execution time model

Searching the database - micro cds/isis application, Searching the Database...

Searching the Database: Searching the database and printing the results of a search are important features associated with CDS/ISIS package. The query formulation strategy pro

Explain in detail about functional modeling, Explain in detail about Functi...

Explain in detail about Functional Modeling. This model explains the computations that take place within a system. This model is useful when the transformation from the i

Whta is boundary value analysis, Boundary Value Analysis:    It's widely ex...

Boundary Value Analysis:    It's widely examined that input values at the extreme ends of input domain cause more errors in system. More application errors happen at the boundaries

What is security testing, What is security testing? Security testing at...

What is security testing? Security testing attempts to determine that protection mechanism built into a system will protect it from improper penetration.

Incomplete wrong Lisp code with error, Check mail from for assignment. ...

Check mail from for assignment. Are you kidding with me. What kind of code you sent. Did you even execute before sending. It has error. Either do it as per the assignment or

Explain document interchange standards, Document interchange standards ...

Document interchange standards Interchange standards permit electronic documents to be exchanged mailed, etc.  Documents are produced using dissimilar systems and on differe

Project, hello, i am struggling with my final year project and i dont have ...

hello, i am struggling with my final year project and i dont have that huge amount of time to do it??

What are the merits of incremental model, What are the merits of incrementa...

What are the merits of incremental model? i. The incremental model can be adopted when there is less number of people included in the project. ii. Technical risks can be ma

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd