Journal of Guangxi Normal University(Natural Science Edition) ›› 2014, Vol. 32 ›› Issue (2): 48-54.

Previous Articles     Next Articles

Optimum Software Release Based on G-O Model and VaR Constraint

TAN Hong-jian, YANG Ya-hui, DONG Ming-gang   

  1. Department of Computer Application, Guilin University of Technology, Guilin Guangxi 541004, China
  • Received:2014-02-20 Online:2014-06-25 Published:2018-09-25

Abstract: The paper studies optimal software release time problem based on G-O software reliability model, and proposes a new minimum software test cost model with VaR constraint. The analytic formula of VaR based on non-homogeneous Poisson process is obtained, and the optimal release time of software is calculated by numeric experiments based on Monte Carlo simulation. The results and sensitivity coefficients are analyzed, which shows that decision variables of the model well presents the risk preference of software project manager. The comparison of classic G-O model and VaR constrain G-O model is conducted, and the resuls show the G-O model underestimats the extreme risk of multi-faults of software after release comparing with VaR constrain G-O model.

Key words: G-O software reliability model, software optimal release, VaR constraint, minimal expect cost

CLC Number: 

  • TP309
[1] GOEL A L, OKUMOTO K. Time-dependent error-detection rate model for software reliability and other performance measures [J]. IEEE Transaction on Reliability, 1979, 28(3): 206-211.
[2] OKUMOTO K, GOEL A L. Optimum release for software systems based on reliability and cost criteria [J]. Journal of Systems and Software, 1980, 1(4): 315-318.
[3] NISHIO Y, DOHI T. Determination of the optimal software release time based on proportional hazards software reliability growth models. [J]. Journal of Quality in Maintenance Engineering, 2003, 9(1): 48-65.
[4] CHATTERJEE S, SINGH J B. A NHPP based software reliability model and optimal release policy with logistic-exponential test coverage under imperfect debugging[J]. International Journal of System Assurance Engineering and Management, 2013:1-8.
[5] HUANG C Y, LIN Chu-ti. Analysis of software reliability modeling considering testing compression factor and failure-to-fault relationship[J]. IEEE Transactions on Computers, 2010, 59(2): 283-288.
[6] QUADRI S M K, AHMAD N. Software reliability growth modeling with new modified weibull testing-effort and optimal release policy[J]. International journal of computer applications, 2010, 6(12): 1-10.
[7] KAPUR P K, PHAM H, Chanda U, et al. Optimal allocation of testing effort during testing and debugging phases: a control theoretic approach[J]. International Journal of Systems Science, 2013, 44(9): 1639-1650.
[8] PHAM Hoang, Zhang Xue-mei, A software cost model with warranty and risk costs [J]. IEEE Transactions on Computers, 1999, 48(1): 71-75。
[9] HUANG Chin-yu. Cost-reliability optimal release policy for software reliability models incorporating improvements in testing efficiency [J]. Journal of Systems and Software, 2005, 77(2): 139-155.
[10] XIE Min, LI Xiang, NG S H. Risk-based software release policy under parameter uncertainty[J]. Journal of Risk and Reliability, 2011, 225(1): 42-49.
[11] LI Xiang, XIE Min, NG S H. Multi-Objective Optimization Approaches to Software Release Time Determination[J]. Asia-Pacific Journal of Operational Research, 2012, 29(3): 1240019.
[12] 张烨,吴开贵. 考虑发布后故障发现概率的软件费用模型[J]. 计算机系统应用,2012, 21(1): 90-93.
[13] 胡海宏,沈元隆. 基于用户要求并考虑软件失效的费用模型[J]. 计算机技术与发展,2011, 21(7): 91-95.
[1] GE Lina, LIU Jinhui. Privacy Preserving Method Based on k-isomorphism and Local Randomization [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(4): 1-8.
[2] HOU You-li, YANG Xiong. Technology Research about Two-stage Encryption Key of DatabaseSecurity Based on DES Encryption Algorithm [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 125-130.
[3] HUANG Tian-qiang, LI Kai, ZHENG Zhi. Algorithm of Supervised Learning on Outlier Manifold [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 131-135.
[4] WANG Han, WANG Xu’an, ZHOU Neng, LIU Yudong. Blockchain-based Public Verifiable Scheme for Sharing Data [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 1-7.
[5] ZHANG Yongsheng, ZHU Wenjun, SHI Ruoqi, DU Zhenhua, ZHANG Rui, WANG Zhi. A Confidence-guided Hybrid Android Malware DetectionSystem with Multiple Heterogeneous Algorithms [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 19-28.
[6] WANG Tao, MA Chuan. Data Race Detection for Multi-threaded Programsin Android Based on Pi Calculus [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 29-42.
[7] ZHOU Yan-yan, FENG Jia-li. Algorithm of Digital Audio Watermarking Based on Qualitative Mapping [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(2): 200-204.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!