참고문헌
- 윤청, 성공적인 소프트웨어 개발 방법론, 생능출판사, 1999. 08
- 허원실, 시스템 분석과 설계, 한빛미디어, 2006.05
- Software process improvement forum, KASPA SPI-7, 2002
- 신경애, “결함중요도 단계를 고려한 소프트웨어 신뢰도 성장 모델에 관한 연구,” 컴퓨터 산업교육기술 학회 논문지, Vol.03 No.07 pp.0837-0844, 2000
- Robert h. dunn, “Software defect removal,” Mcgraw-hill, 1984
- Ram chillarrege, Kothandar. prasad, “Test and development process retrospective a case study using ODC triggers,” IEEE computer society, 2002
- McCall, P.K. richards and G.F. walters, “Factors in software quality,” Vol.1, 2 and 3. Springfield VA, AD/A-049-014/015/055, 1997
- Wohlin, Runeson, “Defect content estimations from review data,” Proceedings international conference on software engineering ICSE pp.400-409, 1998 https://doi.org/10.1109/ICSE.1998.671393
- Gaffney, John, “Some models for software defect analysis,” Lockheed martin, 1996
- L.hatton, “Is modularization always good idea,” Information and software technology, Vol.38, pp.719-721. 1996 https://doi.org/10.1016/0950-5849(96)01120-2
- B. compton and C. withrow, “Prediction and control of ada software defects,” J. systems and software, Vol.12, pp.199-207, 1990 https://doi.org/10.1016/0164-1212(90)90040-S
- Rogers. pressman “Software engineering” Mcgraw-hill international edition, 1997
- Tim kasse, “Actin focused assessment for software process improvement, Artech house, 2002
- Victor basili, G. caldiera and D. rombach, “The goal question metric approach,” Wiley, 1994
- Victor basili, “The experience factory and its relationship to other improvement paradigms,” Lecture notes in computer science, 1993 https://doi.org/10.1007/3-540-57209-0_6
- Paulish, and Carleton, “Case studies of software process improvement measurement,” Computer, Vol.27, No.9, 1994
- Roger s. pressman, “Software engineering: A practitioner's approach,” Mcrwa-hill international editions, 1997
- 이은서, 이경환, “소프트웨어 결함 분석을 위한 트리거 설계,” 한국정보처리학회 논문지, 2003
- 이은서, 이경환, 소프트웨어 결함 처리를 위한 Opportunity Tree 및 알고리즘 설계, 제11-D권 제4호 PP873, 정보처리학회논문지D, 2003. 08
피인용 문헌
- A Study of Process Milestone for the Analysis of Risk Items vol.16D, pp.1, 2009, https://doi.org/10.3745/KIPSTD.2009.16-D.1.105
- Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing vol.16D, pp.1, 2009, https://doi.org/10.3745/KIPSTD.2009.16-D.1.1