• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Yunjie, Zhang Xuan, Wang Xu, Ren Junmin, Tang Ziqi. A Qualitative Evaluation Approach for Requirement Change Technical Debt Based on Marginal Contribution[J]. Journal of Computer Research and Development, 2021, 58(1): 208-223. DOI: 10.7544/issn1000-1239.2021.20190459
Citation: Zhang Yunjie, Zhang Xuan, Wang Xu, Ren Junmin, Tang Ziqi. A Qualitative Evaluation Approach for Requirement Change Technical Debt Based on Marginal Contribution[J]. Journal of Computer Research and Development, 2021, 58(1): 208-223. DOI: 10.7544/issn1000-1239.2021.20190459

A Qualitative Evaluation Approach for Requirement Change Technical Debt Based on Marginal Contribution

Funds: This work was supported by the National Natural Science Foundation of China (61862063, 61502413, 61262025), the National Social Science Foundation of China (18BJL104), the Natural Science Foundation of Yunnan Province (2016FB106), the Natural Science Foundation of Key Laboratory of Software Engineering of Yunnan Province (2015SE202), and the Data Driven Software Engineering Innovative Research Team Funding of Yunnan Province (2017HC012).
More Information
  • Published Date: December 31, 2020
  • Software technical debt uses the concept of “debt” in economics to describe the technical compromise implemented in software development for the short-term benefits. However, for the long-term goal, technical debt will affect the quality, cost and development efficiency, so it is necessary to manage it systematically and effectively. Aiming at the technical debt caused by the changing requirements in the software life cycle, the requirement change technical debt is defined and quantified firstly. Then, the idea of “marginal contribution” in economics is used to obtain the marginal contributions of the changing requirements. They are the basis of the priority for the requirement changes. Then, marginal contribution analytical method provides a reference for the implementation value of requirement changes. In the experiment and case study, taking Hadoop as an example, the feasibility of the marginal benefit for requirement changes is verified. Finally, gradient boosting decision tree is used to study the history reports of requirement changes in Spring Framework. A method for analyzing the requirement changes’ marginal contribution abilities is proposed. The priority of each field in change reports to its marginal contribution is ranked. The results show that the analysis method can provide valuable results for requirement engineers to measure their workload and risks.
  • Related Articles

    [1]Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555
    [2]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [3]Zhang Ming, Hua Yu, Liu Lurong, Hu Rong, Li Ziyi. A Write-Optimized Re-computation Scheme for Non-Volatile Memory[J]. Journal of Computer Research and Development, 2020, 57(2): 243-256. DOI: 10.7544/issn1000-1239.2020.20190524
    [4]Gao Peng, Wang Dongsheng, Wang Haixia. Extending PCM Lifetime by Redirecting Writes from the Most Modified Byte[J]. Journal of Computer Research and Development, 2019, 56(12): 2733-2743. DOI: 10.7544/issn1000-1239.2019.20180267
    [5]Niu Dejiao, He Qingjian, Cai Tao, Wang Jie, Zhan Yongzhao, Liang Jun. APMSS: The New Solid Storage System with Asymmetric Interface[J]. Journal of Computer Research and Development, 2018, 55(9): 2083-2093. DOI: 10.7544/issn1000-1239.2018.20180198
    [6]Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing. Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels[J]. Journal of Computer Research and Development, 2014, 51(7): 1594-1603.
    [7]Sun Zhizhuo, Zhang Quanxin, Li Yuanzhang, Tan Yu'an, Liu Jingyu, Ma Zhongmei. Write Optimization for RAID5 in Sequential Data Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1604-1612.
    [8]Hu Chaojian, Li Zhoujun, Guo Tao, Shi Zhiwei. Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address[J]. Journal of Computer Research and Development, 2011, 48(8): 1455-1463.
    [9]Qiu Yuanjie and Liu Xinsong. Writing Mechanism in Digital Organism File System[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Huan Dandan, Li Zusong, Hu Weiwu, Liu Zhiyong. A Cache Adaptive Write Allocate Policy[J]. Journal of Computer Research and Development, 2007, 44(2): 348-354.
  • Cited by

    Periodical cited type(0)

    Other cited types(5)

Catalog

    Article views (553) PDF downloads (159) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return