• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Jing, Liu Hongwei, Cui Gang, and Yang Xiaozong. A Software Reliability Growth Model Considering Differences Between Testing and Operation[J]. Journal of Computer Research and Development, 2006, 43(3): 503-508.
Citation: Zhao Jing, Liu Hongwei, Cui Gang, and Yang Xiaozong. A Software Reliability Growth Model Considering Differences Between Testing and Operation[J]. Journal of Computer Research and Development, 2006, 43(3): 503-508.

A Software Reliability Growth Model Considering Differences Between Testing and Operation

More Information
  • Published Date: March 14, 2006
  • The testing and operation environment may be essentially different, and thus the fault detection rate of testing is different from that of the operation phase. Based on the G-O model, the representative of non-homogeneous Poisson process (NHPP), the fault detection rate from testing to operation is transformed considering the differences of profile of these two phases, and then a more precise NHPP model (TO-SRGM) considering the differences of fault intensity of testing and operation phases is obtained. Finally, the unknown parameters are estimated by the least-squares method based on normalized data set. Experiments show that the goodness-of-fit of the TO-SRGM is better than those of the G-O model and PZ-SRGM on a data set.
  • Related Articles

    [1]Hou Bingnan, Liu Ning, Li Xionglüe, Zhou Tongqing, Chen Yingwen, Cai Zhiping, Lu Kai. Survey on Target-Generated IPv6 Network Address Scanning[J]. Journal of Computer Research and Development, 2024, 61(9): 2307-2320. DOI: 10.7544/issn1000-1239.202330335
    [2]Chen Xiaofeng, Song Zhaoxiong, Zheng Peiyu, Zhang Jun, Yu Zhi, Sun Yi. A Multichain-Collaborating Governing Chain-Supervising-Chain Supervision Framework[J]. Journal of Computer Research and Development, 2024, 61(9): 2290-2306. DOI: 10.7544/issn1000-1239.202330279
    [3]Duan Tiantian, Guo Yi, Li Bo, Zhang Hanwen, Song Zhaoxiong, Li Zhongcheng, Zhang Jun, Sun Yi. PieBridge:An On-Demand Scalable Cross-Chain Architecture[J]. Journal of Computer Research and Development, 2023, 60(11): 2520-2533. DOI: 10.7544/issn1000-1239.202230284
    [4]Chen Liangyin, Li Zhanghua, Wang Chaolong, Zhang Jingyu, Yan Bingshu, Liu Yan, Yin Feng, Chen Pengpeng. RBSA: Repeatedly-Woken Based Scanning Algorithm for Road Network Surveillance[J]. Journal of Computer Research and Development, 2014, 51(5): 974-983.
    [5]Bao Xiao'an, Yao Lan, Zhang Na, and Song Jinyu. Adaptive Software Testing Based on Controlled Markov Chain[J]. Journal of Computer Research and Development, 2012, 49(6): 1332-1338.
    [6]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [7]Guo Chi, Wang Lina, Guan Yiping, Zhang Xiaoying. A Network Immunization Strategy Based on Dynamic Preference Scan[J]. Journal of Computer Research and Development, 2012, 49(4): 717-724.
    [8]Zhou Yong, Xia Shixiong, Ding Shifei, Zhang Lei, Ao Xin. An Improved APIT Node Self-Localization Algorithm in WSN Based on Triangle-Center Scan[J]. Journal of Computer Research and Development, 2009, 46(4): 566-574.
    [9]Dong Jie, Hu Yu, Han Yinhe, Li Xiaowei. A Multiple-Scan-Chain Test Approach Based on Combinational Decompression Circuits[J]. Journal of Computer Research and Development, 2006, 43(6): 1001-1007.
    [10]Liu Lijun and Huai Jinpeng. Research of a Network Scan Detection Algorithm Based on the FSA Model[J]. Journal of Computer Research and Development, 2006, 43(3): 417-422.

Catalog

    Article views (753) PDF downloads (665) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return