SlideShare uma empresa Scribd logo
1 de 18
Whatprediction  model should be? Institute of Software Chinese Academy of Sciences Qing Wang
Why we use prediction model? Understand the past behavious of  process Control the present behavious of process  Predict the future behavious of process 2
How to understand the past behavious? Based on the historical data  which has been collected from relative processes Apply appropriate measure and analysis techniques to analyze the data quantitatively. Try to find some nature characteristics Is stable?Nature bounds? Does some quantitative relationship among process attributes? Can be stratified /segmented or composed further? 3
How to control the present behavious? Based on the nature bounds (baselines) to establish the desired objectives  of project Compare the present data to say if it is compliant with the nature bounds. Take proper action to correct the deviation Monitor and evaluate the effect of correct action  4
How to predict the future behavious? Based on the quantitative relationship which established depend on the understanding of past behavious. Predict the interim outcome and final outcome of project to know if the project is going well toward the project objectives. 5
What is the essential ? Differ from estimation model Deterministic,  uncertainty, …… Use past and present data to predict future Some dependent X factors,  predict independent  Y outcomes The measurement for Xs and Y make sense Data collection timely and frequently Dynamical  Statistical, probability, simulation-based 6
Must be careful when establish prediction model? Use real world and relevant data Align the necessary project objectives SMART principle Specific Measurable Attainable Relevant Time-bound Cost-benefit balance Feedback and refinement 7
Practical Case – A CMMI ML4 organization Issue: the organization found there are more than 90% projects delay is due to test and fix bugs need much more time than estimated Question: How to predict the effort and schedule of test process? Method:  Identify the factors which impact the effort and schedule of test process Establish a prediction model use these factors Measure and control these factors Predict the effort and schedule of test based on the factors when they were got
The process Each user case has been implemented by requirement analyze, design and coding reviews for each user case for each development activity were conducted respectively and defect data was recorded Each iteration has a unique testing and data was recorded The subsystem of each iteration was delivered to customer as a intermediate result, they must be on schedule and have good quality System testing was conducted when all iterations were completed (each release)
Process improvement objectives Goal G1: manage the schedule of each iteration and reduce the defect as soon as possible G2: manage the system test to detect and fix defects as many as possible
G1: in each iteration  All defect data related requirement analysis, design and coding were collected before testing Can we find some quantitative relationship between these data and the effort of testing process?  There are two primary activities in testing process Detect defects Fix defects
Get data from 16 history projects
Defect injection analysis - 1 13 Defect injected in requirement analysis Defect injected in design
Defect injection analysis - 2 Defect injected in coding The factor can be control , it can be used to establish prediction model Y is the effort of fix defects.       If the predicted effort beyond estimate, they should assign more engineers to assure on schedule deliver of each iteration.
G2: for system testing
Use controllable factor to predict 16 Similar prediction model for system testing can be established. The possible impact factors could be: The defects injected in requirement, design and coding The defects removed respectively The defects removed in integrated testing of each iteration ……
Summary  17 All data can be get The factors which used to establish prediction model are controllable and independent  Statistical techniques are used to do analysis Prediction object is relevant to the organization process improvement objectives The prediction model can be refined along with the using and more data was got
Thanks! 18

Mais conteúdo relacionado

Mais procurados

Cost Estimation methods
Cost Estimation methodsCost Estimation methods
Cost Estimation methodsMRA7860
 
Risk and Testing
Risk and TestingRisk and Testing
Risk and TestingNolaCita
 
Software Estimation - part 1 of 2
Software Estimation - part 1 of 2Software Estimation - part 1 of 2
Software Estimation - part 1 of 2Adi Dancu
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysisjohnchuddle
 
Managing in the Presence of Uncertanty
Managing in the Presence of UncertantyManaging in the Presence of Uncertanty
Managing in the Presence of UncertantyGlen Alleman
 
6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verification6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verificationPaolo Croce
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information Systemtulipbiru64
 
Dylan Wiliam
Dylan WiliamDylan Wiliam
Dylan Wiliamservusuk
 
Bt0092, software project management
Bt0092, software project managementBt0092, software project management
Bt0092, software project managementsmumbahelp
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based TestingJeff Findlay
 
Parameter tuning or default values
Parameter tuning or default valuesParameter tuning or default values
Parameter tuning or default valuesVivek Nair
 
Quiz1FinalPeriod
Quiz1FinalPeriodQuiz1FinalPeriod
Quiz1FinalPeriodlearnt
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of DefectsDavid Gevorgyan
 
Estimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & TechnicsEstimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & TechnicsAlex Tymokhovsky
 
Measurement Strategy for Software Companies
Measurement Strategy for Software CompaniesMeasurement Strategy for Software Companies
Measurement Strategy for Software Companiesnazlitemu
 
MSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSAMSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSAMatt Hansen
 

Mais procurados (20)

Cost Estimation methods
Cost Estimation methodsCost Estimation methods
Cost Estimation methods
 
Default Credit Loss
Default Credit LossDefault Credit Loss
Default Credit Loss
 
Risk and Testing
Risk and TestingRisk and Testing
Risk and Testing
 
Software Estimation - part 1 of 2
Software Estimation - part 1 of 2Software Estimation - part 1 of 2
Software Estimation - part 1 of 2
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
Managing in the Presence of Uncertanty
Managing in the Presence of UncertantyManaging in the Presence of Uncertanty
Managing in the Presence of Uncertanty
 
[Mush Honda] Metrics & Reports from Test Teams (QA)
[Mush Honda] Metrics & Reports from Test Teams (QA)[Mush Honda] Metrics & Reports from Test Teams (QA)
[Mush Honda] Metrics & Reports from Test Teams (QA)
 
6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verification6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verification
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information System
 
Dylan Wiliam
Dylan WiliamDylan Wiliam
Dylan Wiliam
 
Bt0092, software project management
Bt0092, software project managementBt0092, software project management
Bt0092, software project management
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based Testing
 
Parameter tuning or default values
Parameter tuning or default valuesParameter tuning or default values
Parameter tuning or default values
 
Quiz1FinalPeriod
Quiz1FinalPeriodQuiz1FinalPeriod
Quiz1FinalPeriod
 
forecasting
forecastingforecasting
forecasting
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
C & E matrix
C & E matrixC & E matrix
C & E matrix
 
Estimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & TechnicsEstimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & Technics
 
Measurement Strategy for Software Companies
Measurement Strategy for Software CompaniesMeasurement Strategy for Software Companies
Measurement Strategy for Software Companies
 
MSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSAMSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSA
 

Semelhante a PROMISE 2011: What Prediction Model Should Be?

Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4Prince Bhanwra
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsarah david
 
Six sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingSix sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingsadia butt
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsarah david
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsarah david
 
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018Association for Project Management
 
Software development o & c
Software development o & cSoftware development o & c
Software development o & cAmit Patil
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsarah david
 
Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)MuskanSony
 
Value Summary 2.0 Overview
Value Summary 2.0 OverviewValue Summary 2.0 Overview
Value Summary 2.0 Overviewbpatterson888
 
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
 Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ... Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...Seapine Software
 
Practical Software Measurement
Practical Software MeasurementPractical Software Measurement
Practical Software Measurementaliraza786
 
9.process improvement chapter 9
9.process improvement chapter 99.process improvement chapter 9
9.process improvement chapter 9Warui Maina
 
Fundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptxFundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptxMusaBashir9
 
What is Forecasting.pdf
What is Forecasting.pdfWhat is Forecasting.pdf
What is Forecasting.pdfPankaj Chandel
 
Data science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enoughData science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enoughTristan Wiggill
 
Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application tanveer ahmad
 
Demand Forecasting
Demand ForecastingDemand Forecasting
Demand ForecastingAnupam Basu
 

Semelhante a PROMISE 2011: What Prediction Model Should Be? (20)

Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdf
 
Six sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingSix sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison making
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdf
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptx
 
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
 
Demand forecasting
Demand forecastingDemand forecasting
Demand forecasting
 
Software development o & c
Software development o & cSoftware development o & c
Software development o & c
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptx
 
Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)
 
Value Summary 2.0 Overview
Value Summary 2.0 OverviewValue Summary 2.0 Overview
Value Summary 2.0 Overview
 
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
 Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ... Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
 
Practical Software Measurement
Practical Software MeasurementPractical Software Measurement
Practical Software Measurement
 
9.process improvement chapter 9
9.process improvement chapter 99.process improvement chapter 9
9.process improvement chapter 9
 
1120 track1 grossman
1120 track1 grossman1120 track1 grossman
1120 track1 grossman
 
Fundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptxFundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptx
 
What is Forecasting.pdf
What is Forecasting.pdfWhat is Forecasting.pdf
What is Forecasting.pdf
 
Data science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enoughData science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enough
 
Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application
 
Demand Forecasting
Demand ForecastingDemand Forecasting
Demand Forecasting
 

Mais de CS, NcState

Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdecCS, NcState
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringCS, NcState
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest linkCS, NcState
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...CS, NcState
 
Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9CS, NcState
 
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).CS, NcState
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceCS, NcState
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits CS, NcState
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab templateCS, NcState
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUCS, NcState
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements EngineeringCS, NcState
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginiaCS, NcState
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software EngineeringCS, NcState
 
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)CS, NcState
 
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceTim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceCS, NcState
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1CS, NcState
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataCS, NcState
 

Mais de CS, NcState (20)

Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdec
 
Future se oct15
Future se oct15Future se oct15
Future se oct15
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software Engineering
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest link
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9
 
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data Science
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab template
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSU
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software Engineering
 
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)
 
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceTim Menzies, directions in Data Science
Tim Menzies, directions in Data Science
 
Goldrush
GoldrushGoldrush
Goldrush
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
 
Know thy tools
Know thy toolsKnow thy tools
Know thy tools
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software Data
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

PROMISE 2011: What Prediction Model Should Be?

  • 1. Whatprediction model should be? Institute of Software Chinese Academy of Sciences Qing Wang
  • 2. Why we use prediction model? Understand the past behavious of process Control the present behavious of process Predict the future behavious of process 2
  • 3. How to understand the past behavious? Based on the historical data which has been collected from relative processes Apply appropriate measure and analysis techniques to analyze the data quantitatively. Try to find some nature characteristics Is stable?Nature bounds? Does some quantitative relationship among process attributes? Can be stratified /segmented or composed further? 3
  • 4. How to control the present behavious? Based on the nature bounds (baselines) to establish the desired objectives of project Compare the present data to say if it is compliant with the nature bounds. Take proper action to correct the deviation Monitor and evaluate the effect of correct action 4
  • 5. How to predict the future behavious? Based on the quantitative relationship which established depend on the understanding of past behavious. Predict the interim outcome and final outcome of project to know if the project is going well toward the project objectives. 5
  • 6. What is the essential ? Differ from estimation model Deterministic, uncertainty, …… Use past and present data to predict future Some dependent X factors, predict independent Y outcomes The measurement for Xs and Y make sense Data collection timely and frequently Dynamical Statistical, probability, simulation-based 6
  • 7. Must be careful when establish prediction model? Use real world and relevant data Align the necessary project objectives SMART principle Specific Measurable Attainable Relevant Time-bound Cost-benefit balance Feedback and refinement 7
  • 8. Practical Case – A CMMI ML4 organization Issue: the organization found there are more than 90% projects delay is due to test and fix bugs need much more time than estimated Question: How to predict the effort and schedule of test process? Method: Identify the factors which impact the effort and schedule of test process Establish a prediction model use these factors Measure and control these factors Predict the effort and schedule of test based on the factors when they were got
  • 9. The process Each user case has been implemented by requirement analyze, design and coding reviews for each user case for each development activity were conducted respectively and defect data was recorded Each iteration has a unique testing and data was recorded The subsystem of each iteration was delivered to customer as a intermediate result, they must be on schedule and have good quality System testing was conducted when all iterations were completed (each release)
  • 10. Process improvement objectives Goal G1: manage the schedule of each iteration and reduce the defect as soon as possible G2: manage the system test to detect and fix defects as many as possible
  • 11. G1: in each iteration All defect data related requirement analysis, design and coding were collected before testing Can we find some quantitative relationship between these data and the effort of testing process? There are two primary activities in testing process Detect defects Fix defects
  • 12. Get data from 16 history projects
  • 13. Defect injection analysis - 1 13 Defect injected in requirement analysis Defect injected in design
  • 14. Defect injection analysis - 2 Defect injected in coding The factor can be control , it can be used to establish prediction model Y is the effort of fix defects. If the predicted effort beyond estimate, they should assign more engineers to assure on schedule deliver of each iteration.
  • 15. G2: for system testing
  • 16. Use controllable factor to predict 16 Similar prediction model for system testing can be established. The possible impact factors could be: The defects injected in requirement, design and coding The defects removed respectively The defects removed in integrated testing of each iteration ……
  • 17. Summary 17 All data can be get The factors which used to establish prediction model are controllable and independent Statistical techniques are used to do analysis Prediction object is relevant to the organization process improvement objectives The prediction model can be refined along with the using and more data was got