metrics


    CIS 635

    Fall 2013 Assignment #3 Due:March 4, 4 PM

    1. A critical software has been developed. It is estimated that the probability that the software has critical error is 0.4, and the loss from critical error when actually occurs is $20 million dollars.The management is contemplating on whether to perform 1) an independent V & V or 2) to do a walkthrough to reduce the risk of critical errors.The probability of critical error can be reduced to 0.05 if V& V is done, but it will cost 2 million dollars to perform such a task. The probability of critical error can be reduced to 0.01 if walkthroughis done, but it will cost 0.2 million dollars.

    a)Give the equation definition and explanation of Risk Reduction Leverage (RRL).

    b)Find the RRL for each risk reduction approach.

    2. South Cleveland University (SCU) has three major campuses, each of which has a main library which will provide LSDI services. Each of three campuses operates a server running a COTS client-server library services package. The COTS package provides Internet capabilities enabling a client at any campus to deal with any of three servers.

    The SCU Library, Computer Sciences Department, and Computing Services Operation have been funded to develop an experimental Selective Dissemination of Information (SDI) system to provide SCU users with information about new library acquisitions of interest. It will do this by comparing attributes of new library acquisitions with interest profiles provided by library users. The grant provides $850K to develop the system.

    The SDI software will acquire data on recent library acquisitions, compare it with library user interest profiles, generate user notices, and support query, browsing, and request functions for the new acquisitions. It will have a number of subsidiary functions for user interest profile management, access control, user interface functions, and usage monitoring. It will communicate with users via the COTS client-server package.

    Candidate Software Functions

    • User Interest Profile Management (4 KDSI). User interest profile creation, deletion, update, query, etc.
    • Access Control
      • Basic (5 KDSI). Basic password access control.
      • Extended (10 KDSI). Basic plus authentication, authorization, instruction deletion.
      • Rigorous (15 KDSI). Extended plus formal specification and verification.
    • Acquisition Data Handling and Profile Checking: acquisition record and file access, validity checking, logging, storage, etc. Determination of matches between acquisition and interest profiles.
      • Basic Service (3 KDSI). simple matching; standard library categories.
      • Extended Service (6 KDSI). Conditional matching; standard plus locally-defined categories.
    • User Interface and Services
      • Basic Service (7 KDSI). Acquisition-match query, browse, and request functions. Basic help and profile management functions.
      • Extended Service (12 KDSI). Basic Service plus tutorial functions, interoperability with COTS user interface.
    • Usage Monitoring (5 KDSI). Recording and summarizing system usage by time of day/week/year, by user attributes, by acquisition attributes.
    • Trend Analysis (4 KDSI) Extrapolation of rates of increase, decrease, or cyclical trends in services.
    • Library network access (5 KDSI). Extension of acquisition notification to cover acquisitions from a regional network of 10 additional universities.
    • COTS integration. Software needed to integrate SDI functions with COTS library information functions:
      • 5 KDSI for processor X;
      • 8 KDSI for processor Y.

    COCOMO II software development and cost drivers

    Some of the COCOMO II cost drivers are associated with hardware options to be specified in the next section. Below are the ratings determined for the reminder of the LSDI system cost drivers. Most of them are the same for all of the candidate software functions; any differences are identified on the following page

    Effort Multipliers:

    • RELY Nominal, except for Access Control, which is High
    • DATA High
    • CPLX Nominal, except for Access Control (High) and COTS Integration (High)
    • RUSE Nominal
    • DOCU Nominal
    • STOR Nominal
    • PVOL Low
    • ACAP Nominal
    • PCAP Nominal
    • AEXP Low
    • PCON High
    • LTEX High
    • SITE Very High
    • SCED Nominal

    Scale Factors:

    • PREC Nominal
    • FLEX High
    • RESL Nominal
    • TEAM Very High
    • PMAT Nominal

    Hardware Options

    There are two hardware options for SDI functions. Processor X is a more mature but slower processor, with better tool support. Processor Y is a fast, new processor with a lower level of tool support and virtual machine experience. A summary of their comparative cost/performance/risk feature is as follows:

    Processor X

    Processor Y

    COCOMO TIME rating

    High

    Nominal

    COCOMO PEXP rating

    Nominal

    Low

    COCOMO TOOL rating

    High

    Nominal

    Nominal response time

    5 sec

    1 sec

    System development risk

    Low

    High

    Hardware cost

    $12K

    $30K

    Do the following two COCOMO II LSDI Cost Estimation Exercises:

    1) Develop a pair of conservative software development cost and schedule estimates for the LSDI system. covering the use of both Processor X and Processor Y, and using the following assumptions:

    – Include all of the candidate software functions, and use their largest options.
    – Use the indicated cost drivers for Processor X and Y.
    – Use $6,300/person-month as the cost for all personnel.

    2) Using the same parameters as above, determine a processor and appropriate subset of LSDI functions and options which fits within the available budget of $850K





                                                                                                                                      Order Now