Enhancing Software Quality Using Agile Techniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 2
Abstract
Agile techniques may produce software faster as well as enhance software quality so that they fulfill quality requirements of the product. In this paper we have considered some quality factors and we have shown how agile techniques enhance software quality. We have presented an agile development life cycle that showing its software quality support processes. Finally we have shown summarization of software quality evaluation with agile techniques that enhance software quality.
Authors and Affiliations
Amran Hossain
User Profile Completion with Online Social Circles
User profile is a kind of most effective feature and cue of user behavioranalysis. However, most ofusers'profiles are incomplete and untruthful, and users' tag and profile data are rathersparse on social media. It...
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizontal Aggregations
Data mining refers to the process of analyzing the data from different perspectives and summarizing it into useful information that is mostly used by the different users for analyzing the data as well as for p...
Filter Based addressing protocol for effective Node Auto configuration in Ad hoc Network
MANET is used for many distributed network, the lack of a centralized administration makes these networks attractive for several distributed applications, such as sensing, Internet access to deprived communities, and dis...
Design and Developing a Multicast Routing Protocol for Link Failure and Reliable Data Delivery.
MANET is a mobile Ad hoc network. It is a wireless and self organized network without infrastructure support. Ad hoc networks systems possess rapid deployment, robustness and flexibility. The problems of Ad ho...
Protocols for detection of node replication attack on wireless sensor network
Wireless sensor network has many small sensor nodes that work in collaborative manner to achieve a specific task. But it is deployed in unattended environment and that is why it is prone to attacks. These a...