The following normative documents contain provisions which, through reference in this text, constitute provisions of this part of ISO/IEC/IEEE For dated. ISO/IEC IEEE Std Software Engineering — Software Life. Cycle Processes — Maintenance. Fabio Carollo. Institute of Electrical and. ISO/IEC. IEEE. Std Second edition. Software Engineering — Software Life. Cycle Processes — Maintenance.
|Genre:||Health and Food|
|Published (Last):||11 September 2005|
|PDF File Size:||9.46 Mb|
|ePub File Size:||19.19 Mb|
|Price:||Free* [*Free Regsitration Required]|
Best practices for managing your software investment.
Burt Swanson, The dimensions of maintenance. Key technical issues are: Computer architecture Embedded system Real-time computing Dependability.
Maintenance may span for 20 years, [ citation needed ] whereas development may be 1—2 years. Hear about relevant training courses in your area. Computer programming Requirements engineering Software deployment Software design Software maintenance Software testing Systems analysis Formal methods. Software development process Requirements analysis Software design Software construction Software deployment Software maintenance Programming team Open-source model.
Standard: IEEE Std 14764-2006 – Software Engineering & Software Life Cycle Processes & Maintenance
So any work done isee change the software after it is in operation is considered to be maintenance work. Key management issues are: Major fields of computer science.
As they evolve, they grow more complex unless some action such as code refactoring is taken to reduce the complexity. It should specify how users will request modifications or report problems. There are a number of processes, activities and practices that are unique to maintainers, for example:. Not only are error-prone modules troublesome, but many other factors can degrade performance too. An integral part of software is the maintenance one, which requires an accurate maintenance plan to be prepared during the software development.
A username and password 147664 required for access to the resources.
Search SE Goldmine Search this site: This article has multiple issues. Note also that some academic institutions [ who? Retrieved 5 November Interaction design Social computing Ubiquitous computing Visualization Accessibility.
Computer science Computer engineering Project management Risk management Systems engineering.
Adopted From Standards Australia Standard: Learn how and when to remove these template messages. Wikipedia references cleanup from September All articles needing references cleanup Articles covered by WikiProject Wikify from September All ieef covered by WikiProject Wikify Articles needing additional references from January All articles needing additional references Articles with multiple maintenance issues All articles with unsourced statements Articles with unsourced statements from January Articles with unsourced statements from October All articles with specifically marked weasel-worded phrases Articles with specifically marked weasel-worded phrases from January Wikipedia articles with BNF identifiers Wikipedia articles with GND identifiers Wikipedia articles with LCCN identifiers.
Please help improve this article by adding 147644 to reliable sources. Assessing Evidence from Change Management Data. The management of coupling and cohesion of the software. Supervised learning Unsupervised ieed Reinforcement learning Multi-task learning Cross-validation.
Software maintenance – Wikipedia
Software maintenance in software engineering is the modification of a software product after delivery to correct faults, to improve performance or other attributes.
From Wikipedia, the free encyclopedia. The value can be enhanced by expanding the customer base, meeting additional requirements, becoming easier to use, more efficient and employing newer technology. They categorized maintenance activities into four classes:. Over a period of twenty years, his research led to the formulation of Lehman’s Laws Lehman September Learn how and when to remove this template message.
Most access requests are approved.