SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Empirical Research Methods for Software Engineering ,[object Object],Prepared by: Dr. Sarfraz Nawaz Brohi & Dr. MervatAdibBamiah,[object Object]
Agenda,[object Object],1. Introduction to Empirical and Experimental Software Engineering ,[object Object],2. Empirical Research Methods ,[object Object],2.1 Case Study  ,[object Object],2.2 Experimental Reserach,[object Object],2.4 Survey ,[object Object],2.4 Post Mortem Analysis  ,[object Object],3. Guidelines for Empirical Research in Software Engineering ,[object Object],3. Conclusion,[object Object]
Experimental & Empirical Software Engineering ,[object Object],[object Object],Text,[object Object],Text,[object Object],Text,[object Object],Text,[object Object],[object Object],[object Object]
  Empirical studies determine the differences among alternative software techniques.For example experiment on quality and cost of a software product.,[object Object]
How Empirical study helps software engineering Research ,[object Object]
Empirical Research Methods,[object Object]
Case Study,[object Object],[object Object],[object Object]
  This overflow wasn’t monitored and therefore caused the entire control system to stop, and …boom!
  The program causing the overflow wasn’t needed during flight, but only during initialization (up to -9s launch time).
  It was kept running for 50 s into the flight to avoid re-initialization time of several hours in case of an aborted launch.
  The software was designed for the Ariane 4 rocket, where this particular overflow could not happen.
  So the error was a software-reuse error, caused by missing specifications of the conditions under which the software worked correctly.,[object Object]
  Case studies are also useful for describing and understanding rare events (such as disasters caused by software failures).
  Case studies are limited, because the cause of a specific event cannot be determined with any degree of certainty. To establish cause and events reliably, we need experiments.,[object Object]
  Experimental are also referred to as research-in-small because their scope is limited.
  When experimenting random tests are conducted.
  For- Example comparison between  various processors. ,[object Object]
Survey,[object Object],[object Object]
  Example: “If the president were elected tomorrow, whom would you vote?”
  Surveys collect frequency data, but also information about reasons and preferences.
  Example: “Why do you prefer a certain brand of car Surveys also test who holds certain preferences (male/female, age, ethnicity, income, location, etc
  Surveys help understand why a certain phenomenon occurred and increase our ability to predict it.
  Question: „What has caused the most difficulty  when trying to understand object-oriented software?“1. Missing or inadequate design documentation ,[object Object],(16.8%),[object Object],2. Inheritance (15.5%),[object Object],3. Poor or inappropriate design (12.9%).,[object Object]
Survey,[object Object]

Contenu connexe

Tendances

Quantitative Methods of Research
Quantitative Methods of ResearchQuantitative Methods of Research
Quantitative Methods of ResearchJan Ine
 
Meta analysis - qualitative research design
Meta analysis - qualitative research designMeta analysis - qualitative research design
Meta analysis - qualitative research designDinesh Selvam
 
2 defining the research problem
2 defining the research problem2 defining the research problem
2 defining the research problemVinay Jeengar
 
Research methods
Research methodsResearch methods
Research methodsA M
 
RESEARCH PARADIGMS WORLD VIEWS
RESEARCH PARADIGMS WORLD VIEWSRESEARCH PARADIGMS WORLD VIEWS
RESEARCH PARADIGMS WORLD VIEWSAIMS Education
 
Ch .Steps In Research Process
Ch .Steps In Research ProcessCh .Steps In Research Process
Ch .Steps In Research ProcessJackson
 
Quantitative and Qualitative Research
Quantitative and Qualitative ResearchQuantitative and Qualitative Research
Quantitative and Qualitative ResearchTheScntst
 
Session 2 Literature Review
Session 2 Literature ReviewSession 2 Literature Review
Session 2 Literature Reviewenglishonecfl
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyRavindra Sharma
 
Research methodology
Research methodologyResearch methodology
Research methodologyPaul Roja
 
difference between the qualitative and quantitative researcher, variables, co...
difference between the qualitative and quantitative researcher, variables, co...difference between the qualitative and quantitative researcher, variables, co...
difference between the qualitative and quantitative researcher, variables, co...laraib asif
 

Tendances (20)

Research types
Research typesResearch types
Research types
 
Types of research
Types of researchTypes of research
Types of research
 
Quantitative Methods of Research
Quantitative Methods of ResearchQuantitative Methods of Research
Quantitative Methods of Research
 
Meta analysis - qualitative research design
Meta analysis - qualitative research designMeta analysis - qualitative research design
Meta analysis - qualitative research design
 
2 defining the research problem
2 defining the research problem2 defining the research problem
2 defining the research problem
 
Research Design
Research Design Research Design
Research Design
 
Systematic Literature Review
Systematic Literature ReviewSystematic Literature Review
Systematic Literature Review
 
TYPES OF RESEARCH
TYPES OF RESEARCHTYPES OF RESEARCH
TYPES OF RESEARCH
 
Research methods
Research methodsResearch methods
Research methods
 
RESEARCH PARADIGMS WORLD VIEWS
RESEARCH PARADIGMS WORLD VIEWSRESEARCH PARADIGMS WORLD VIEWS
RESEARCH PARADIGMS WORLD VIEWS
 
Ch .Steps In Research Process
Ch .Steps In Research ProcessCh .Steps In Research Process
Ch .Steps In Research Process
 
Quantitative and Qualitative Research
Quantitative and Qualitative ResearchQuantitative and Qualitative Research
Quantitative and Qualitative Research
 
Ppt on research design
Ppt on research designPpt on research design
Ppt on research design
 
Research design
Research designResearch design
Research design
 
Session 2 Literature Review
Session 2 Literature ReviewSession 2 Literature Review
Session 2 Literature Review
 
Research proposal writing 2013
Research proposal writing 2013Research proposal writing 2013
Research proposal writing 2013
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Research methodology
Research methodologyResearch methodology
Research methodology
 
Research proposal
Research proposal Research proposal
Research proposal
 
difference between the qualitative and quantitative researcher, variables, co...
difference between the qualitative and quantitative researcher, variables, co...difference between the qualitative and quantitative researcher, variables, co...
difference between the qualitative and quantitative researcher, variables, co...
 

En vedette

RESEARCH in software engineering
RESEARCH in software engineeringRESEARCH in software engineering
RESEARCH in software engineeringIvano Malavolta
 
Identifying An Empirical Research Article
Identifying An Empirical Research ArticleIdentifying An Empirical Research Article
Identifying An Empirical Research Articlewsuinst
 
Selecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software EngineeringSelecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software EngineeringDaniel Cukier
 
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...Jean-Pierre Poulain
 
Empirical Research presentation
Empirical Research presentationEmpirical Research presentation
Empirical Research presentationmichyli
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering MethodologiesDamian T. Gordon
 
RMMM-Risk Management,Mitigation and Monitoring.
RMMM-Risk Management,Mitigation and Monitoring.RMMM-Risk Management,Mitigation and Monitoring.
RMMM-Risk Management,Mitigation and Monitoring.Aparna Nayak
 

En vedette (15)

RESEARCH in software engineering
RESEARCH in software engineeringRESEARCH in software engineering
RESEARCH in software engineering
 
Identifying An Empirical Research Article
Identifying An Empirical Research ArticleIdentifying An Empirical Research Article
Identifying An Empirical Research Article
 
Computer Programming
Computer Programming Computer Programming
Computer Programming
 
Developing research skills
Developing research skillsDeveloping research skills
Developing research skills
 
Selecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software EngineeringSelecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software Engineering
 
Introduction to research
Introduction to researchIntroduction to research
Introduction to research
 
Empirical research process
Empirical research processEmpirical research process
Empirical research process
 
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
 
Sociology
SociologySociology
Sociology
 
Empirical Research presentation
Empirical Research presentationEmpirical Research presentation
Empirical Research presentation
 
Historical research
Historical researchHistorical research
Historical research
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering Methodologies
 
Historical research
Historical researchHistorical research
Historical research
 
Research Paradigms:Ontology's, Epistemologies & Methods
Research Paradigms:Ontology's, Epistemologies & MethodsResearch Paradigms:Ontology's, Epistemologies & Methods
Research Paradigms:Ontology's, Epistemologies & Methods
 
RMMM-Risk Management,Mitigation and Monitoring.
RMMM-Risk Management,Mitigation and Monitoring.RMMM-Risk Management,Mitigation and Monitoring.
RMMM-Risk Management,Mitigation and Monitoring.
 

Similaire à Empirical research methods for software engineering

Testing 1 - the Basics
Testing 1 - the BasicsTesting 1 - the Basics
Testing 1 - the BasicsArleneAndrews2
 
Applied Observational Study.pptx
Applied Observational Study.pptxApplied Observational Study.pptx
Applied Observational Study.pptxMussieKebede3
 
GBS MSCBDA - Dissertation Guidelines.pdf
GBS MSCBDA - Dissertation Guidelines.pdfGBS MSCBDA - Dissertation Guidelines.pdf
GBS MSCBDA - Dissertation Guidelines.pdfStanleyChivandire1
 
2 . fundamental test process
2 . fundamental test process2 . fundamental test process
2 . fundamental test processsabrian SIF
 
Testing 2 - Thinking Like A Tester
Testing 2 - Thinking Like A TesterTesting 2 - Thinking Like A Tester
Testing 2 - Thinking Like A TesterArleneAndrews2
 
MIT521 software testing (2012) v2
MIT521   software testing  (2012) v2MIT521   software testing  (2012) v2
MIT521 software testing (2012) v2Yudep Apoi
 
Fundamental test process
Fundamental test processFundamental test process
Fundamental test processDinul
 
Fundamental test process (TESTING IMPLEMENTATION SYSTEM)
Fundamental test process (TESTING IMPLEMENTATION SYSTEM)Fundamental test process (TESTING IMPLEMENTATION SYSTEM)
Fundamental test process (TESTING IMPLEMENTATION SYSTEM)Putri nadya Fazri
 
POLIT.pptx
POLIT.pptxPOLIT.pptx
POLIT.pptxbeminaja
 
Fundamental test process
Fundamental test processFundamental test process
Fundamental test processmuhammad afif
 
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...Tiara Ramadhani
 
Software testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.comSoftware testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.comwww.testersforum.com
 
Fundamental test process (andika m)
Fundamental test process (andika m)Fundamental test process (andika m)
Fundamental test process (andika m)Andika Mardanu
 

Similaire à Empirical research methods for software engineering (20)

Testing 1 - the Basics
Testing 1 - the BasicsTesting 1 - the Basics
Testing 1 - the Basics
 
Applied Observational Study.pptx
Applied Observational Study.pptxApplied Observational Study.pptx
Applied Observational Study.pptx
 
GBS MSCBDA - Dissertation Guidelines.pdf
GBS MSCBDA - Dissertation Guidelines.pdfGBS MSCBDA - Dissertation Guidelines.pdf
GBS MSCBDA - Dissertation Guidelines.pdf
 
Research methodology presentation
Research methodology presentationResearch methodology presentation
Research methodology presentation
 
2 . fundamental test process
2 . fundamental test process2 . fundamental test process
2 . fundamental test process
 
Dc35579583
Dc35579583Dc35579583
Dc35579583
 
Testing 2 - Thinking Like A Tester
Testing 2 - Thinking Like A TesterTesting 2 - Thinking Like A Tester
Testing 2 - Thinking Like A Tester
 
MIT521 software testing (2012) v2
MIT521   software testing  (2012) v2MIT521   software testing  (2012) v2
MIT521 software testing (2012) v2
 
Fundamental test process
Fundamental test processFundamental test process
Fundamental test process
 
Fundamental test process (TESTING IMPLEMENTATION SYSTEM)
Fundamental test process (TESTING IMPLEMENTATION SYSTEM)Fundamental test process (TESTING IMPLEMENTATION SYSTEM)
Fundamental test process (TESTING IMPLEMENTATION SYSTEM)
 
POLIT.pptx
POLIT.pptxPOLIT.pptx
POLIT.pptx
 
Fundamental test process
Fundamental test processFundamental test process
Fundamental test process
 
Fundamental test process
Fundamental test processFundamental test process
Fundamental test process
 
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
 
Too many files
Too many filesToo many files
Too many files
 
Software testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.comSoftware testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.com
 
Fundamental Test Process
Fundamental Test ProcessFundamental Test Process
Fundamental Test Process
 
Fundamental test process (andika m)
Fundamental test process (andika m)Fundamental test process (andika m)
Fundamental test process (andika m)
 
Test planning
Test planningTest planning
Test planning
 
Test analysis
Test analysisTest analysis
Test analysis
 

Dernier

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 

Dernier (20)

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 

Empirical research methods for software engineering

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. This overflow wasn’t monitored and therefore caused the entire control system to stop, and …boom!
  • 9. The program causing the overflow wasn’t needed during flight, but only during initialization (up to -9s launch time).
  • 10. It was kept running for 50 s into the flight to avoid re-initialization time of several hours in case of an aborted launch.
  • 11. The software was designed for the Ariane 4 rocket, where this particular overflow could not happen.
  • 12.
  • 13. Case studies are also useful for describing and understanding rare events (such as disasters caused by software failures).
  • 14.
  • 15. Experimental are also referred to as research-in-small because their scope is limited.
  • 16. When experimenting random tests are conducted.
  • 17.
  • 18.
  • 19. Example: “If the president were elected tomorrow, whom would you vote?”
  • 20. Surveys collect frequency data, but also information about reasons and preferences.
  • 21. Example: “Why do you prefer a certain brand of car Surveys also test who holds certain preferences (male/female, age, ethnicity, income, location, etc
  • 22. Surveys help understand why a certain phenomenon occurred and increase our ability to predict it.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. The reviewer of a paper prior to its publication.
  • 28. The authors of a paper.
  • 29. Researchers planning an empirical study.
  • 30.
  • 31. Experimental design
  • 32. Conduct of the experiment and Data collection
  • 33. Analysis
  • 34. Presentation of results
  • 35.
  • 36.
  • 37.
  • 38. Define the process by which the subjects and objects were selected.
  • 39. Define the process by which subjects and objects are assigned to treatments.
  • 40. Restrict yourself to simple study designs or, at least, to designs that are fully analyzed in the literature.
  • 41. Define the experimental unit.
  • 42. For formal experiments, perform a pre-experiment or pre-calculation to identify or estimate the minimum required sample size.
  • 43. Use appropriate levels of blinding.
  • 44.
  • 45. Fully define all treatments (interventions).
  • 46.
  • 47.
  • 48.
  • 49. Consider using blind analysis.
  • 50. Perform sensitivity analyses.
  • 51. Ensure that the data do not violate the assumptions of the tests used on them.
  • 52.
  • 53. Report the statistical package used.
  • 54.
  • 55.
  • 56. Differentiate between statistical significance and practical importance.
  • 57. Define the type of study.
  • 58.