SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 929 
FINE–GRAINED ANALYSIS AND PROFILING OF SOFTWARE BUGS TO FACILITATE WASTE IDENTIFICATION AND ITS MINIMIZATION S.R. Subramanya1 1School of Engineering and Computing, National University, San Diego, CA 92123, USA Abstract Software defects or bugs are among the primary causes of software development overrunning time schedules and budget costs. They are also the major cause of ‘waste’ in software development, which roughly translates to time, effort, and money spent on unproductive aspects of software. Despite several developments in software engineering and improvements in the software development process, their effects in minimizing the waste in software development process have not been remarkable in comparison with the hardware counterpart of complex chip design. This paper proposes a fine–grained approach to the analysis of the root causes of software defects (bugs) in an effort to better quantify the components of waste and its subsequent minimization. It also proposes the use of bugs profile for the allocation of resources to tackle bugs with minimal wasted resources. Keywords: Software bugs, Fine–grained analysis, Waste in software, Waste identification, Waste minimization 
----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION The development and maintenance of any software of reasonable complexity is necessarily a human–intensive, time consuming, and expensive process. Faults (bugs) are introduced into the software system in a variety of ways. Despite several developments in software engineering and improvements in the software development process, their effects in minimizing the faults (bugs) in software and thereby improving the reliability has not been remarkable in comparison with the design and development of complex microprocessor chips, and their reliability. The complete avoidance of bugs may not be possible for real– world software systems, primarily due to the fact that software development is a complex, human-intensive process. However, methodologies which would minimize the introduction of bugs into the source code in the first place (as much as possible) would be highly beneficial for reducing the high software development and maintenance costs, and for increasing the quality of software. 
Numerous studies have been done in effective software testing to enable the detection of most (if not all) of the bugs. For example, 28 best practices that contribute to improved software testing are listed in [3]. Numerous efforts have been put into finding methods for preventing developers from inadvertently introducing bugs [4, 5]. Several studies have been done to predict occurrences of bugs. For example, a methodology using software bug history data to model and predict future bug occurrences is presented in [10]. In addition to code reviews, proactively improving code quality using static and dynamic analysis is given in [2]. Analysis of some of the root causes of bugs along different dimensions such as (a) management–related, (b) design–related, (c) programming–related, and (d) human–factors–related, is given in [9]. Results from various studies have been compiled into an extremely useful and interesting list of ten items containing statistics and causes of several kinds of software defects, and means of their reduction, and is presented in [1]. It is now a well–known fact that when defects are found later in the development lifecycle, they are going to take (exponentially) more time and cost more money to fix them than if they were discovered sooner. Since software bugs are the primary „components‟ of waste, it would thus be beneficial to identify and eliminate (or at least minimize) bugs early in the process, thereby minimizing waste in the overall development process. In order to do this, this paper presents a methodology of „fine-grained‟ analysis of the causes of bugs, leading to the fine, measurable granular–causes which make up the causes. These granular-causes are better understood and steps can then be devised to tackle them. In addition, using the Pareto principle, the bugs can be analyzed, and the allocation of resources can be optimized to tackle the bugs. The next section gives brief background on the development of waste in software. Section 3 presents the proposed fine– grained analysis of the factors contributing to software bugs to derive granular causes and their use in expressing the causes of bugs. Section 4 describes the use of profiling to determine the hot spot modules contributing to bugs and a case of putting resources for tackling bugs in them, which is followed by conclusions.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 930 
2. BACKGROUND 
The notion of waste in manufacturing was popularized by the 
Toyota Production System. Since then numerous studies have 
been done to adapt the notions of waste and their 
elimination/minimization in the domain of software. The 
notion of waste in software development can be traced to [7] 
where the term lean software development was introduced. [8] 
gives a translation of the seven identified wastes in a 
manufacturing system into the seven wastes of Software 
Development, namely: Partially Done Work, Extra Features, 
Relearning, Handoffs, Delays, Task Switching, and Defects. 
Examples of waste in software, motivators for waste 
reduction, counter measures to development waste are 
presented in [6]. A common underlying theme contributing to 
waste in software is that of faults/defects/bugs. The effective 
avoidance, prediction, detection, and correction of bugs have 
been elusive, and have been the subject of numerous studies. 
3. FINE-GRAINED ANALYSIS OF FACTORS OF 
BUGS 
In the proposed scheme of fine-grained analysis of bugs, first, 
the major factors in orthogonal dimensions which cause bugs 
are determined. Then, each of these factors is analyzed in 
detail to determine numerous issues – the granular causes – 
which contribute to the given factor. Each of the granular 
causes should be simple enough for amenable solution(s). 
Since each of the granular causes for a given factor may not be 
independent, we need to find their interdependencies and find 
their collective effect on the factor causing the bug. 
Fig -1: Examples of causes of bugs 
First, as an example, we consider five major dimensions 
responsible for the introduction of bugs (faults) (see Figure 1), 
namely, (A) lack of clear understanding of existing code; (B) 
unclear design; (C) lack of established processes; (D) team 
members‟ coordination issues; (E) project management issues. 
Fig -2: Examples of two causes of bugs and their composition 
in terms of granular causes 
Figure 2 shows two of the example causes of bugs and the 
granular causes for each of them. This is also shown in Table 
1. For example the „unclear design‟ aspect contributing to the 
bugs has, in turn, six granular causes namely, (a) unclear 
requirements, (b) unclear specifications, (c) lack of 
communications, (d) absence of design review, (e) lack of 
proper design methodologies, and (f) lack of proper design 
documents. This is shown in Table 1. 
Table -1: Two example factors and corresponding granular 
causes related to software bugs 
Factors Granular causes 
Lack of 
understanding 
of existing code 
Complexity of algorithm 
Complexity of interactions 
Lack of good programming style 
Inadequate documentation 
Poor quality of code 
Lack of experience 
Lack of competence 
Lack of peer support 
Lack of time 
Unclear design 
Unclear requirements 
Unclear specifications 
Lack of communications 
Absence of design review 
Lack of design methodologies 
Lack of elaborate design documents 
We will now present the relationship of content consumption 
experience parameters with the other parameters of the factors 
influencing the content consumption experience. The causes 
of bugs, X is given by: 
X  AA'U  BB'DCC'P  DD'T  EE'M ,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 931 
where U, D, P, T, and M are vectors of granular causes 
corresponding respectively to the major example factors of 
causes of bugs, namely, lack of clear understanding of existing 
code (U); unclear design (D); lack of established processes 
(P); team members’ coordination issues (T); project 
management issues (M). 
 
 
 
 
 
 
 
 
 
 
 
 
 
Nx x 
x 
x 
X 
 
2 
1 
is a vector of parameters corresponding to the causes of bugs. 
These parameters are as non–overlapping (orthogonal) as 
possible. 
 
 
 
 
 
 
 
 
 
 
 
 
 
Ni u 
u 
u 
U 
 
2 
1 
is a vector of granular causes related to the “lack of clear 
understanding of existing code” factor of bugs causes. The 
granular causes, may in turn, consist of a set of attributes, each 
of which will have a defined range of values. The other 
vectors D, P, T, and M are similarly defined. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Nx Nx Nx Ni 
Ni 
Ni 
a a a 
a a a 
a a a 
A 
,1 ,2 , 
2,1 2,2 2, 
1,1 1,2 1, 
 
 
 
 
is an x i N  N 
cross correlation matrix whose elements 
capture the dependences among the granular causes of U and 
the parameters of X. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Ni Ni Ni Ni 
Ni 
Ni 
a a a 
a a a 
a a a 
A 
,1 ,2 , 
2,1 2,2 2, 
1,1 1,2 1, 
' ' ' 
' ' ' 
' ' ' 
' 
 
 
 
 
is an i i N  N 
matrix whose elements represent the correlation 
among the granular causes of U. 
Therefore, 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Ni Ni Ni Ni Ni 
Ni 
Ni 
Nx Nx Nx Ni 
Ni 
Ni 
U 
U 
U 
a a a 
a a a 
a a a 
a a a 
a a a 
a a a 
AAU 
 
 
 
 
 
 
 
 
 
2 
1 
,1 ,2 , 
2,1 2,2 2, 
1,1 1,2 1, 
,1 ,2 , 
2,1 2,2 2, 
1,1 1,2 1, 
' 
which yields a 
1 x N 
vector which captures the dependences 
among the granular causes of U (lack of clear understanding 
of existing code) as well as their dependence on the 
parameters of X (bugs causes). The other products, BB’D, 
CC’P, DD’T, and EE’M are similarly defined. The sum of all 
these products thus represents the effects of the granular 
causes of lack of clear understanding of existing code, unclear 
design, lack of established processes, team members‟ 
coordination issues, and project management issues, upon the 
causes of bugs. 
Thus, in essence, the proposed scheme expresses the causes of 
bugs in terms a few (orthogonal) parameters. The parameters 
are expressed in terms of several factors of bugs causes, and 
each of the factors is expressed in terms of granular causes, 
each of which is simple and measurable. This facilitates the 
understanding of the complex relationships among the 
granular causes and their combined effect on the causes of 
bugs. This can be used to device methods to minimize waste 
in terms of time and effort in detecting and correcting bugs, as 
well as in proactively having measures to minimize (avoid) 
introduction of bugs in the first place. 
4. PROFILING OF BUGS 
In this section, we present the profiling of bugs so that the 
distribution of bugs across different modules in huge software 
can be determined, and also predicted. This enables 
minimization of waste by optimal allocation of resources to 
proactively and effectively tackle the bugs. 
The Pareto principle, named after Italian economist Vilfredo 
Pareto, (also known as the 80-20 rule or the law of the vital 
few) states that, for many phenomena, 80% of the 
consequences stem from 20% of the causes. For example, 80% 
of income goes to 20% of the population, 80% of the sales 
come from 20% of the products, 80% of the resources are 
typically used by 20% of the operations, we wear our 20% 
most favored clothes about 80% of the time, etc. 
In software engineering, it is also often the case that 80% of 
the development effort is spent in 20% of the system 
(modules), 80% of the execution time of a computer program 
is spent executing 20% of the code, 80% of the debugging 
time/effort is taken by 20% of the bugs, etc. Thus, it is 
important to identify the „critical‟ 20% parts – the hotspots,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 932 
which need the most attention in terms of improvements. Improvements to this critical 20% of the software system (or process) would result in improvements in the 80% of the result that this system influences. For example, the modules which account for the most faults/bugs can be identified, and made the targets for improvements. 4.1 Fault/bug Profiles It is beneficial to perform „bug profiling‟ – to determine which modules cause the most number of bugs. Distribution of bugs across various modules of a mobile handset software is shown in Figure 3. This is based on the actual data from the QM (quality management) group running black-box tests on the software during development. It is interesting to note that the distribution follows the Pareto principle – about 20% of the modules account for about 80% of the bugs. Of course, the number of bugs that are caused by a given module depend upon a complex set of factors including (i) how complex a module is, (ii) how clear the specifications are, (iii) how many persons are involved in the development of the module and their experience, (iv) the number of other modules that this module interacts with, etc. The important thing to be learned is that of predicting the bugs that a module could cause and taking appropriate actions proactively. For example, assigning experienced engineers, allocation of more resources as necessary, spending more effort in better design, etc., would help in minimizing the bugs, and hence the time and effort wasted. 
Fig -1: Distribution of bugs reported by QM for a mobile handset software during development In the long term, it is also beneficial to study correlations between bugs and other factors such as the base lines used, number of newer features implemented, number of files touched, number of deliveries, etc. These facilitate bug predictions, and appropriate proactive solutions. Another experiment of interest is to study the spread of bugs among modules / functions, i.e., a new bug arising in a module due to a change or new code in a module results in a previously unknown bug appearing in another module. Detailed analysis of the results could be used beneficially in the design of modules with less coupling. 
5. CONCLUSIONS 
Software defects or bugs are the major causes of „waste‟ in software development translating to time, effort, and money spent on unproductive aspects of software. This paper proposed a fine–grained approach to the analysis of the root causes of software defects (bugs) in an effort to better quantify the components of waste and its subsequent minimization. It also proposed the use of bugs profile for allocating of resources to tackle bugs using minimal resources, contributing to reduced waste. REFERENCES [1]. B. Boehm and V.R. Basili, “Software Defect Reduction Top 10 List”, IEEE Computer, January 2001, pp135–137. [2]. K.A. Briski, et. al., “Minimizing Code Defects to Improve Software Quality and Lower Development Costs”, IBM Development Solutions Whitepaper, Oct. 2008. [3]. R. Chillarege, “Software Testing Best Practices”, IBM Research Technical Report, RC 21457, April 1999. [4]. D. Huizinga and A. Kolawa, “Automated Defect Prevention: Best Practices in Software Management”, Wiley– IEEE Computer Society Press (ISBN 0470042125). [5]. M. McDonald, R. Musson, and R. Smith, “The Practical Guide to Defect Prevention”, Microsoft Press (ISBN 0735622531). [6]. “The Yin and Yang of Software Development: 5 Best Practices that Allow Efficiency and Creativity to Productively Coexist”, Parasoft White Paper, 2013. [7]. M. Poppendieck and T. Poppendieck, Lean Software Development: An Agile Toolkit, Addison-Wesley, 2003. [8]. M. Poppendieck and T. Poppendieck, Implementing Lean Software Development: From Concept to Cash. Addison- Wesley, 2006 [9]. S.R. Subramanya, “Analysis of Some of the Root Causes of Bugs in a Mobile Phone Software Development Environment”, International Conference on Computer Applications in Industry and Engineering, Honolulu, HI, Nov. 16–18, 2011, pp. 210–215. [10]. C. Zhang, H. Joshi, S. Ramaswamy and C. Bayrak, “A Dynamic Approach to Software Bug Estimation”, in Advances in Computer and Information Sciences and Engineering, Springer, 2008 (978-1-4020-8741-7).

Contenu connexe

Tendances

Is software engineering research addressing software engineering problems?
Is software engineering research addressing software engineering problems?Is software engineering research addressing software engineering problems?
Is software engineering research addressing software engineering problems?Gail Murphy
 
Software Engineering Sample Question paper for 2012
Software Engineering Sample Question paper for 2012Software Engineering Sample Question paper for 2012
Software Engineering Sample Question paper for 2012Neelamani Samal
 
Analysis of software cost estimation using
Analysis of software cost estimation usingAnalysis of software cost estimation using
Analysis of software cost estimation usingijfcstjournal
 
Unsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsUnsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsCAST
 
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...IJCSES Journal
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class qualityIAEME Publication
 
Icsme 2021-keynote-creating-usable-and-useful-software-tools
Icsme 2021-keynote-creating-usable-and-useful-software-toolsIcsme 2021-keynote-creating-usable-and-useful-software-tools
Icsme 2021-keynote-creating-usable-and-useful-software-toolsGail Murphy
 
Wait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debtWait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debtRungrojMaipradit1
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionYasir Raza Khan
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
 
Developing Effective Software Productively
Developing Effective Software ProductivelyDeveloping Effective Software Productively
Developing Effective Software ProductivelyGail Murphy
 
Programmer Productivity Enhancement Through Controlled Natural Language Input
Programmer Productivity Enhancement Through Controlled Natural Language InputProgrammer Productivity Enhancement Through Controlled Natural Language Input
Programmer Productivity Enhancement Through Controlled Natural Language Inputijseajournal
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsIvan Ruchkin
 
Model-Based Systems Engineering in the Execution of Search and Rescue Operations
Model-Based Systems Engineering in the Execution of Search and Rescue OperationsModel-Based Systems Engineering in the Execution of Search and Rescue Operations
Model-Based Systems Engineering in the Execution of Search and Rescue OperationsSpencer Hunt
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET Journal
 
STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...
STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...
STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...ijseajournal
 

Tendances (18)

Is software engineering research addressing software engineering problems?
Is software engineering research addressing software engineering problems?Is software engineering research addressing software engineering problems?
Is software engineering research addressing software engineering problems?
 
Software Engineering Sample Question paper for 2012
Software Engineering Sample Question paper for 2012Software Engineering Sample Question paper for 2012
Software Engineering Sample Question paper for 2012
 
Analysis of software cost estimation using
Analysis of software cost estimation usingAnalysis of software cost estimation using
Analysis of software cost estimation using
 
Unsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable AppsUnsustainable Regaining Control of Uncontrollable Apps
Unsustainable Regaining Control of Uncontrollable Apps
 
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class quality
 
Icsme 2021-keynote-creating-usable-and-useful-software-tools
Icsme 2021-keynote-creating-usable-and-useful-software-toolsIcsme 2021-keynote-creating-usable-and-useful-software-tools
Icsme 2021-keynote-creating-usable-and-useful-software-tools
 
Wait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debtWait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debt
 
Systematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd editionSystematic software development using vdm by jones 2nd edition
Systematic software development using vdm by jones 2nd edition
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
 
Cm24585587
Cm24585587Cm24585587
Cm24585587
 
Developing Effective Software Productively
Developing Effective Software ProductivelyDeveloping Effective Software Productively
Developing Effective Software Productively
 
Programmer Productivity Enhancement Through Controlled Natural Language Input
Programmer Productivity Enhancement Through Controlled Natural Language InputProgrammer Productivity Enhancement Through Controlled Natural Language Input
Programmer Productivity Enhancement Through Controlled Natural Language Input
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
 
Model-Based Systems Engineering in the Execution of Search and Rescue Operations
Model-Based Systems Engineering in the Execution of Search and Rescue OperationsModel-Based Systems Engineering in the Execution of Search and Rescue Operations
Model-Based Systems Engineering in the Execution of Search and Rescue Operations
 
Vol 1 issue 2 june 2015
Vol 1 issue 2 june 2015Vol 1 issue 2 june 2015
Vol 1 issue 2 june 2015
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
 
STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...
STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...
STRUCTURAL COMPLEXITY ATTRIBUTE CLASSIFICATION FRAMEWORK (SCACF) FOR SASSY CA...
 

En vedette

Seismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for baseSeismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for baseeSAT Publishing House
 
Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...eSAT Publishing House
 
Estimation of morphometric parameters and
Estimation of morphometric parameters andEstimation of morphometric parameters and
Estimation of morphometric parameters andeSAT Publishing House
 
Development of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parametersDevelopment of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parameterseSAT Publishing House
 
Influence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of hollowInfluence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of holloweSAT Publishing House
 
Seismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storeySeismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storeyeSAT Publishing House
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...eSAT Publishing House
 
Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...eSAT Publishing House
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment applicationeSAT Publishing House
 
A study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildingsA study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildingseSAT Publishing House
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
 
Design of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live videoDesign of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live videoeSAT Publishing House
 
Modern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using armModern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using armeSAT Publishing House
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Al-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota DumaiAl-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota DumaiSanti Hendrayani
 
Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)Thai Chamroeun
 
An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)Thai Chamroeun
 

En vedette (17)

Seismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for baseSeismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for base
 
Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...
 
Estimation of morphometric parameters and
Estimation of morphometric parameters andEstimation of morphometric parameters and
Estimation of morphometric parameters and
 
Development of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parametersDevelopment of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parameters
 
Influence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of hollowInfluence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of hollow
 
Seismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storeySeismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storey
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
 
A study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildingsA study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildings
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
 
Design of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live videoDesign of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live video
 
Modern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using armModern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using arm
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Al-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota DumaiAl-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota Dumai
 
Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)
 
An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)
 

Similaire à Fine–grained analysis and profiling of software bugs to facilitate waste identification and its minimization

Defect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect OriginDefect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect Originijseajournal
 
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...ijseajournal
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in softwareIAEME Publication
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using associationiaemedu
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using associationiaemedu
 
Art of software defect association & correction using association rule mining
Art of software defect association & correction using association rule miningArt of software defect association & correction using association rule mining
Art of software defect association & correction using association rule miningIAEME Publication
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using associationiaemedu
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...iosrjce
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design IJECEIAES
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ijseajournal
 
Abstract.doc
Abstract.docAbstract.doc
Abstract.docbutest
 
Software testing defect prediction model a practical approach
Software testing defect prediction model   a practical approachSoftware testing defect prediction model   a practical approach
Software testing defect prediction model a practical approacheSAT Journals
 
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation TechniquesReview on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniquesijtsrd
 
Lecture 7 Software Metrics.ppt
Lecture 7 Software Metrics.pptLecture 7 Software Metrics.ppt
Lecture 7 Software Metrics.pptTalhaFarooqui12
 

Similaire à Fine–grained analysis and profiling of software bugs to facilitate waste identification and its minimization (20)

Defect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect OriginDefect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect Origin
 
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in software
 
E018132735
E018132735E018132735
E018132735
 
Correctness
CorrectnessCorrectness
Correctness
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using association
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using association
 
Art of software defect association & correction using association rule mining
Art of software defect association & correction using association rule miningArt of software defect association & correction using association rule mining
Art of software defect association & correction using association rule mining
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using association
 
Lopez
LopezLopez
Lopez
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
 
F017652530
F017652530F017652530
F017652530
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
 
Abstract.doc
Abstract.docAbstract.doc
Abstract.doc
 
Software testing defect prediction model a practical approach
Software testing defect prediction model   a practical approachSoftware testing defect prediction model   a practical approach
Software testing defect prediction model a practical approach
 
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation TechniquesReview on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
 
Lecture 7 Software Metrics.ppt
Lecture 7 Software Metrics.pptLecture 7 Software Metrics.ppt
Lecture 7 Software Metrics.ppt
 
E0361038043
E0361038043E0361038043
E0361038043
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Dernier (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

Fine–grained analysis and profiling of software bugs to facilitate waste identification and its minimization

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 929 FINE–GRAINED ANALYSIS AND PROFILING OF SOFTWARE BUGS TO FACILITATE WASTE IDENTIFICATION AND ITS MINIMIZATION S.R. Subramanya1 1School of Engineering and Computing, National University, San Diego, CA 92123, USA Abstract Software defects or bugs are among the primary causes of software development overrunning time schedules and budget costs. They are also the major cause of ‘waste’ in software development, which roughly translates to time, effort, and money spent on unproductive aspects of software. Despite several developments in software engineering and improvements in the software development process, their effects in minimizing the waste in software development process have not been remarkable in comparison with the hardware counterpart of complex chip design. This paper proposes a fine–grained approach to the analysis of the root causes of software defects (bugs) in an effort to better quantify the components of waste and its subsequent minimization. It also proposes the use of bugs profile for the allocation of resources to tackle bugs with minimal wasted resources. Keywords: Software bugs, Fine–grained analysis, Waste in software, Waste identification, Waste minimization ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION The development and maintenance of any software of reasonable complexity is necessarily a human–intensive, time consuming, and expensive process. Faults (bugs) are introduced into the software system in a variety of ways. Despite several developments in software engineering and improvements in the software development process, their effects in minimizing the faults (bugs) in software and thereby improving the reliability has not been remarkable in comparison with the design and development of complex microprocessor chips, and their reliability. The complete avoidance of bugs may not be possible for real– world software systems, primarily due to the fact that software development is a complex, human-intensive process. However, methodologies which would minimize the introduction of bugs into the source code in the first place (as much as possible) would be highly beneficial for reducing the high software development and maintenance costs, and for increasing the quality of software. Numerous studies have been done in effective software testing to enable the detection of most (if not all) of the bugs. For example, 28 best practices that contribute to improved software testing are listed in [3]. Numerous efforts have been put into finding methods for preventing developers from inadvertently introducing bugs [4, 5]. Several studies have been done to predict occurrences of bugs. For example, a methodology using software bug history data to model and predict future bug occurrences is presented in [10]. In addition to code reviews, proactively improving code quality using static and dynamic analysis is given in [2]. Analysis of some of the root causes of bugs along different dimensions such as (a) management–related, (b) design–related, (c) programming–related, and (d) human–factors–related, is given in [9]. Results from various studies have been compiled into an extremely useful and interesting list of ten items containing statistics and causes of several kinds of software defects, and means of their reduction, and is presented in [1]. It is now a well–known fact that when defects are found later in the development lifecycle, they are going to take (exponentially) more time and cost more money to fix them than if they were discovered sooner. Since software bugs are the primary „components‟ of waste, it would thus be beneficial to identify and eliminate (or at least minimize) bugs early in the process, thereby minimizing waste in the overall development process. In order to do this, this paper presents a methodology of „fine-grained‟ analysis of the causes of bugs, leading to the fine, measurable granular–causes which make up the causes. These granular-causes are better understood and steps can then be devised to tackle them. In addition, using the Pareto principle, the bugs can be analyzed, and the allocation of resources can be optimized to tackle the bugs. The next section gives brief background on the development of waste in software. Section 3 presents the proposed fine– grained analysis of the factors contributing to software bugs to derive granular causes and their use in expressing the causes of bugs. Section 4 describes the use of profiling to determine the hot spot modules contributing to bugs and a case of putting resources for tackling bugs in them, which is followed by conclusions.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 930 2. BACKGROUND The notion of waste in manufacturing was popularized by the Toyota Production System. Since then numerous studies have been done to adapt the notions of waste and their elimination/minimization in the domain of software. The notion of waste in software development can be traced to [7] where the term lean software development was introduced. [8] gives a translation of the seven identified wastes in a manufacturing system into the seven wastes of Software Development, namely: Partially Done Work, Extra Features, Relearning, Handoffs, Delays, Task Switching, and Defects. Examples of waste in software, motivators for waste reduction, counter measures to development waste are presented in [6]. A common underlying theme contributing to waste in software is that of faults/defects/bugs. The effective avoidance, prediction, detection, and correction of bugs have been elusive, and have been the subject of numerous studies. 3. FINE-GRAINED ANALYSIS OF FACTORS OF BUGS In the proposed scheme of fine-grained analysis of bugs, first, the major factors in orthogonal dimensions which cause bugs are determined. Then, each of these factors is analyzed in detail to determine numerous issues – the granular causes – which contribute to the given factor. Each of the granular causes should be simple enough for amenable solution(s). Since each of the granular causes for a given factor may not be independent, we need to find their interdependencies and find their collective effect on the factor causing the bug. Fig -1: Examples of causes of bugs First, as an example, we consider five major dimensions responsible for the introduction of bugs (faults) (see Figure 1), namely, (A) lack of clear understanding of existing code; (B) unclear design; (C) lack of established processes; (D) team members‟ coordination issues; (E) project management issues. Fig -2: Examples of two causes of bugs and their composition in terms of granular causes Figure 2 shows two of the example causes of bugs and the granular causes for each of them. This is also shown in Table 1. For example the „unclear design‟ aspect contributing to the bugs has, in turn, six granular causes namely, (a) unclear requirements, (b) unclear specifications, (c) lack of communications, (d) absence of design review, (e) lack of proper design methodologies, and (f) lack of proper design documents. This is shown in Table 1. Table -1: Two example factors and corresponding granular causes related to software bugs Factors Granular causes Lack of understanding of existing code Complexity of algorithm Complexity of interactions Lack of good programming style Inadequate documentation Poor quality of code Lack of experience Lack of competence Lack of peer support Lack of time Unclear design Unclear requirements Unclear specifications Lack of communications Absence of design review Lack of design methodologies Lack of elaborate design documents We will now present the relationship of content consumption experience parameters with the other parameters of the factors influencing the content consumption experience. The causes of bugs, X is given by: X  AA'U  BB'DCC'P  DD'T  EE'M ,
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 931 where U, D, P, T, and M are vectors of granular causes corresponding respectively to the major example factors of causes of bugs, namely, lack of clear understanding of existing code (U); unclear design (D); lack of established processes (P); team members’ coordination issues (T); project management issues (M).              Nx x x x X  2 1 is a vector of parameters corresponding to the causes of bugs. These parameters are as non–overlapping (orthogonal) as possible.              Ni u u u U  2 1 is a vector of granular causes related to the “lack of clear understanding of existing code” factor of bugs causes. The granular causes, may in turn, consist of a set of attributes, each of which will have a defined range of values. The other vectors D, P, T, and M are similarly defined.                Nx Nx Nx Ni Ni Ni a a a a a a a a a A ,1 ,2 , 2,1 2,2 2, 1,1 1,2 1,     is an x i N  N cross correlation matrix whose elements capture the dependences among the granular causes of U and the parameters of X.                Ni Ni Ni Ni Ni Ni a a a a a a a a a A ,1 ,2 , 2,1 2,2 2, 1,1 1,2 1, ' ' ' ' ' ' ' ' ' '     is an i i N  N matrix whose elements represent the correlation among the granular causes of U. Therefore,                                          Ni Ni Ni Ni Ni Ni Ni Nx Nx Nx Ni Ni Ni U U U a a a a a a a a a a a a a a a a a a AAU          2 1 ,1 ,2 , 2,1 2,2 2, 1,1 1,2 1, ,1 ,2 , 2,1 2,2 2, 1,1 1,2 1, ' which yields a 1 x N vector which captures the dependences among the granular causes of U (lack of clear understanding of existing code) as well as their dependence on the parameters of X (bugs causes). The other products, BB’D, CC’P, DD’T, and EE’M are similarly defined. The sum of all these products thus represents the effects of the granular causes of lack of clear understanding of existing code, unclear design, lack of established processes, team members‟ coordination issues, and project management issues, upon the causes of bugs. Thus, in essence, the proposed scheme expresses the causes of bugs in terms a few (orthogonal) parameters. The parameters are expressed in terms of several factors of bugs causes, and each of the factors is expressed in terms of granular causes, each of which is simple and measurable. This facilitates the understanding of the complex relationships among the granular causes and their combined effect on the causes of bugs. This can be used to device methods to minimize waste in terms of time and effort in detecting and correcting bugs, as well as in proactively having measures to minimize (avoid) introduction of bugs in the first place. 4. PROFILING OF BUGS In this section, we present the profiling of bugs so that the distribution of bugs across different modules in huge software can be determined, and also predicted. This enables minimization of waste by optimal allocation of resources to proactively and effectively tackle the bugs. The Pareto principle, named after Italian economist Vilfredo Pareto, (also known as the 80-20 rule or the law of the vital few) states that, for many phenomena, 80% of the consequences stem from 20% of the causes. For example, 80% of income goes to 20% of the population, 80% of the sales come from 20% of the products, 80% of the resources are typically used by 20% of the operations, we wear our 20% most favored clothes about 80% of the time, etc. In software engineering, it is also often the case that 80% of the development effort is spent in 20% of the system (modules), 80% of the execution time of a computer program is spent executing 20% of the code, 80% of the debugging time/effort is taken by 20% of the bugs, etc. Thus, it is important to identify the „critical‟ 20% parts – the hotspots,
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 932 which need the most attention in terms of improvements. Improvements to this critical 20% of the software system (or process) would result in improvements in the 80% of the result that this system influences. For example, the modules which account for the most faults/bugs can be identified, and made the targets for improvements. 4.1 Fault/bug Profiles It is beneficial to perform „bug profiling‟ – to determine which modules cause the most number of bugs. Distribution of bugs across various modules of a mobile handset software is shown in Figure 3. This is based on the actual data from the QM (quality management) group running black-box tests on the software during development. It is interesting to note that the distribution follows the Pareto principle – about 20% of the modules account for about 80% of the bugs. Of course, the number of bugs that are caused by a given module depend upon a complex set of factors including (i) how complex a module is, (ii) how clear the specifications are, (iii) how many persons are involved in the development of the module and their experience, (iv) the number of other modules that this module interacts with, etc. The important thing to be learned is that of predicting the bugs that a module could cause and taking appropriate actions proactively. For example, assigning experienced engineers, allocation of more resources as necessary, spending more effort in better design, etc., would help in minimizing the bugs, and hence the time and effort wasted. Fig -1: Distribution of bugs reported by QM for a mobile handset software during development In the long term, it is also beneficial to study correlations between bugs and other factors such as the base lines used, number of newer features implemented, number of files touched, number of deliveries, etc. These facilitate bug predictions, and appropriate proactive solutions. Another experiment of interest is to study the spread of bugs among modules / functions, i.e., a new bug arising in a module due to a change or new code in a module results in a previously unknown bug appearing in another module. Detailed analysis of the results could be used beneficially in the design of modules with less coupling. 5. CONCLUSIONS Software defects or bugs are the major causes of „waste‟ in software development translating to time, effort, and money spent on unproductive aspects of software. This paper proposed a fine–grained approach to the analysis of the root causes of software defects (bugs) in an effort to better quantify the components of waste and its subsequent minimization. It also proposed the use of bugs profile for allocating of resources to tackle bugs using minimal resources, contributing to reduced waste. REFERENCES [1]. B. Boehm and V.R. Basili, “Software Defect Reduction Top 10 List”, IEEE Computer, January 2001, pp135–137. [2]. K.A. Briski, et. al., “Minimizing Code Defects to Improve Software Quality and Lower Development Costs”, IBM Development Solutions Whitepaper, Oct. 2008. [3]. R. Chillarege, “Software Testing Best Practices”, IBM Research Technical Report, RC 21457, April 1999. [4]. D. Huizinga and A. Kolawa, “Automated Defect Prevention: Best Practices in Software Management”, Wiley– IEEE Computer Society Press (ISBN 0470042125). [5]. M. McDonald, R. Musson, and R. Smith, “The Practical Guide to Defect Prevention”, Microsoft Press (ISBN 0735622531). [6]. “The Yin and Yang of Software Development: 5 Best Practices that Allow Efficiency and Creativity to Productively Coexist”, Parasoft White Paper, 2013. [7]. M. Poppendieck and T. Poppendieck, Lean Software Development: An Agile Toolkit, Addison-Wesley, 2003. [8]. M. Poppendieck and T. Poppendieck, Implementing Lean Software Development: From Concept to Cash. Addison- Wesley, 2006 [9]. S.R. Subramanya, “Analysis of Some of the Root Causes of Bugs in a Mobile Phone Software Development Environment”, International Conference on Computer Applications in Industry and Engineering, Honolulu, HI, Nov. 16–18, 2011, pp. 210–215. [10]. C. Zhang, H. Joshi, S. Ramaswamy and C. Bayrak, “A Dynamic Approach to Software Bug Estimation”, in Advances in Computer and Information Sciences and Engineering, Springer, 2008 (978-1-4020-8741-7).