The following normative documents contain provisions which, through reference in this text, constitute provisions of this part of ISO/IEC/IEEE For dated. ISO/IEC IEEE Std Software Engineering — Software Life. Cycle Processes — Maintenance. Fabio Carollo. Institute of Electrical and. ISO/IEC. IEEE. Std Second edition. Software Engineering — Software Life. Cycle Processes — Maintenance.
|Published (Last):||27 February 2005|
|PDF File Size:||8.48 Mb|
|ePub File Size:||7.65 Mb|
|Price:||Free* [*Free Regsitration Required]|
Archived from the original PDF on The budget should include resource and cost estimates. Software maintenance is a very broad activity that 14674 error correction, enhancements of capabilities, deletion of obsolete capabilities, and optimization. Because change is inevitable, mechanisms must be developed for evaluation, controlling and making modifications. Natural language processing Knowledge representation and reasoning Computer vision Automated planning and scheduling Ieef methodology Control method Philosophy of artificial intelligence Distributed artificial intelligence.
Software maintenance in software engineering is the modification of a software product after delivery to correct faults, to improve performance or other attributes.
Studies show that contribution of end user is crucial during the new requirement data gathering and analysis. This article has multiple issues. So software maintenance is important because it consumes a large part of the overall lifecycle costs and also the inability to change software quickly and reliably means that business opportunities are lost. Proceedings of the 2nd international conference on Software engineering, San Francisco,pp — “.
Iese Evidence from Change Management Data. Supervised learning Unsupervised learning Reinforcement learning Multi-task learning Cross-validation. The management of coupling and cohesion of the software. Data modeling Enterprise architecture Functional specification Modeling language Orthogonality Programming paradigm Software Software archaeology Software architecture Software configuration management Software development methodology Software development process Software quality Software quality assurance Software verification and validation Structured analysis.
Learn how and when to remove these template messages. The references used may be made clearer with a different or consistent style of citation and footnoting. P P P P P Database management system Information storage systems Enterprise information system Social information systems Geographic information system Decision support system Process control system Multimedia information system Data mining Digital library Computing platform Digital marketing World Wide Web Information retrieval.
And this is the main cause of any problem during software evolution and maintenance.
Software maintenance – Wikipedia
As they evolve, they grow more complex unless some action such as code refactoring is taken to reduce the complexity. Note also that some academic institutions [ who? An integral part of software is the maintenance one, which requires an accurate maintenance plan to be 114764 during the software development.
Software maintenance and evolution of systems was first addressed by Meir M.
Access the SE Goldmine A username and password is required for access to the resources. This article has an unclear citation style. The contents of this Web Site are copyright of Project Performance Australia Pty Ltd and are made available for your information only, on the condition that you do not incorporate their contents, in whole or 147664 part, into any other material of any nature without permission in writing from Project Performance Australia Pty Ltd.
Things like compliance with coding standards that includes software maintainability goals. Over a period of twenty years, his research led to the formulation of Lehman’s Laws Lehman Discrete mathematics Probability Statistics Mathematical software Information theory Mathematical analysis Numerical analysis.
Interaction design Social computing Ubiquitous computing Visualization Accessibility. Most access requests are approved. Wikipedia references cleanup from September All articles needing references cleanup Articles ieer by WikiProject Wikify from September All articles ueee by WikiProject Wikify Articles needing additional references from January All articles needing additional references Articles with multiple maintenance issues All articles with 147644 statements Articles with unsourced statements from January Articles with unsourced statements from October All articles with specifically marked weasel-worded phrases Articles with specifically marked weasel-worded phrases from January Wikipedia articles with BNF identifiers Wikipedia articles with GND identifiers Wikipedia articles ieeee LCCN identifiers.
Algorithm design Analysis of algorithms Algorithmic efficiency Randomized algorithm Computational geometry. Model of computation Formal language Automata theory Computational complexity theory Logic Semantics.
From Wikipedia, the free encyclopedia.
E-commerce Enterprise software Computational mathematics Computational physics Computational chemistry Computational biology Computational social science Computational engineering Computational healthcare Ieeee art Electronic publishing Cyberwarfare Electronic voting Video games Word processing Operations research Educational technology Document management. Programming paradigm Programming language Compiler Domain-specific language Modeling language Software framework Integrated development environment Software configuration management Software library Software repository.
Search SE Goldmine Search this site: If you are not a client of PPI or CTI, limited access which permits download access to many of these resources may be available on an approved-registration basis. ISO standards by standard number. The selection of proper enforcement of standards is the challenging task right from early stage of software engineering which has not got definite importance by the concerned stakeholders.
If you are a client of PPI or subsidiary company CTI and wish to obtain a username and password, please use the email contact form. Retrieved 5 November The value can be enhanced by expanding the customer base, meeting additional requirements, becoming easier to use, more efficient and employing newer technology. Cryptography Formal methods Security services Intrusion detection system Hardware security Network security Information security Application security.
Iwee help improve it or discuss these issues on the talk page.
You are authorised to print the contents provided that this copyright notice is included. Key findings of his research include that maintenance is really evolutionary development and that maintenance decisions are aided by understanding what happens to systems and software over time.
Concurrent computing Parallel eiee Distributed computing Multithreading Multiprocessing. Computer science Computer engineering Project management Risk management Systems engineering.