SlideShare a Scribd company logo
1 of 16


Software development can be treated
as an optimization problem:
maximise software quality
subject to the constraints limited resources

Software quality: number of
features, performance, reliability, etc.
 Resources: time, money, etc.



Questions to answer:
› How long it will take to complete a particular

task?
› How long it will take to test a particular
module?
› How many defects remain in a particular
module after a release?
› At a particular time, what portion of
resources should be devoted to testing as
opposed to developing new features?


How to answer the previous questions:
› By building a model



Purpose of modelling
› Predict, explain, discover, guide



Modelling is a two-steps process:
› Determine set of variables of interests

› Determine set of equations to describe how

these variables change and which kinds of
relations exist among them
Software development is an iterative
process
 The process of software developement
can be described by the phrase
evolution of software
 The phrase implies similarities with
evolution of biological systems
 How can we use this fact? – central idea
of this presentation



Bio-inspired optimization algorithms:
› Genetic algorithm – motivated by Darwin’s
›
›
›
›

principal of natural selection
Memetic algorithm – motivated by genetic +
experience
Particle swarm optimization – motivated by
behavior of a flock of birds
Ant colony optimization – motivated by
behavior of an ant-colony
Bee-inspired optimization, shuffled frog
leaping algorithm, etc.


Artificial neural networks
› It is computational structure inspired by central

nervous system



Artificial immune system
› It is computationally intelligent systems inspired

by the principles of the immune system



Capture-recapture bug-estimation method
› Statistical method developed for population

estimation in bio-ecosystems






Accepted among most major software
companies (Google, Facebook, Mozilla and
Microsoft)
Main principle - abandon long development
cycles in favor of faster releases in order to
bring the latest features and fixes to end-users
Information for making decision if software is
ready for a new release:
› Relationship between number of bugs in the

system (b(t)) and effort necessary to resolve
them (e(t)).
› The more effort is spent on defect resolving, the
less time is left for developing new features.


O1 – Increasing (or decreasing) of e(t) leads
to decreasing (or increasing) of b(t):

e(t )


e(t )

b(t )

O2 – Increasing (or decreasing) of b(t)
requires increasing (or decreasing) of e(t):

b(t )


b(t )

e(t )

b(t )

e(t )

O3 – As a result from the previous two
observation, both b(t) and e(t) exhibit
periodic oscillations.
O4 – The relationship from O1and O2 is
not linear.
 O5 – Small increase of effort can lead to
significant reduction of defects number.
 O6 –Pareto principle – majority of time is
spent on small number of difficult bugs
(approximately, removal of 30% of bugs
requires 70% of time).

O7 – Changes in code churn exhibits
growth rate which can be modeled by
sigmoid function.
 O8 – b(t) increasing is steeper than
decreasing.
 O9 – e(t) decreasing is steeper than
increasing.
 Observations O1-O9 imply similarity with
predator-prey ecosystem


› Predator – tester, programmer
› Prey - bugs


Most famous predator prey model expressed by:

db(t )
dt


b(

e)

de(t )
dt

e(

b)

Main characteristics:

› In the case e(t)=0 (no hunt for bugs), b(t) has exponential

growth.
› The rate of detecting and reducing number of bugs by
developers/testers is proportional to the number of bugs
and effort invested in bug reduction (βeb). Intuitively, if
there are more bugs in the system, it will be easier to
detect and eliminate some of them. In addition, if more
effort is invested in bugs reduction, the more bugs will be
reduced.
› In the absence of bugs (b(t)=0), effort

exponentially reduces to zero.
› The rate at which the effort grows is
proportional to the rate at which the
developers/testers encounter bugs.


Issues with the presented model:
› Extremely sensitive to small perturbations
› Allows unlimited exponential growth of

number of bugs
› Unlimited ability of a single developer/tester
to detect and eliminate bugs


Improvement of LV model which resolves
previous issues:
db(t )
dt

b
b(1
)
K

b
b k

e

de(t )
dt

e

b
b k

e

Number of bugs is limited by the size and
complexity of a project which is
specified by the parameter K.
 Rate at which a single developer/tester
detects and removes bugs is limited.





Relationship among
parameters defines
two main regions.
Model allows regular
oscillations (suitable
for the beginning
and the middle of
project) as well as
dumped oscillations
(suitable for project
near completion)


Normalized values of e(t) and b(t)

Conclusions:
› The model was
evaluated on real-life
small size project
developed under RR
methodology
› The model fairly
accurately captures
observations O1-O9
› Future work:
investigate if the

results can be
generalized for
description of
projects with different
characteristics.

More Related Content

Similar to Biological modeling of software development dynamics

Towards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction TechniquesTowards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction Techniques1crore projects
 
Towards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniquesTowards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniquesPvrtechnologies Nellore
 
L'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsL'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsGiulio Vian
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET Journal
 
2013 ucar best practices
2013 ucar best practices2013 ucar best practices
2013 ucar best practicesc.titus.brown
 
54 C o m m u n i C at i o n s o F t h e a C m j u.docx
54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx
54 C o m m u n i C at i o n s o F t h e a C m j u.docxevonnehoggarth79783
 
L'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsL'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsGiulio Vian
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyCSEIJJournal
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys BldgUSeP
 
Can we induce change with what we measure?
Can we induce change with what we measure?Can we induce change with what we measure?
Can we induce change with what we measure?Michaela Greiler
 
Problems of testing 64-bit applications
Problems of testing 64-bit applicationsProblems of testing 64-bit applications
Problems of testing 64-bit applicationsPVS-Studio
 
Measure It! How to measure quality in (not only) large software projects, OW2...
Measure It! How to measure quality in (not only) large software projects, OW2...Measure It! How to measure quality in (not only) large software projects, OW2...
Measure It! How to measure quality in (not only) large software projects, OW2...OW2
 
Kelis king - software engineering and best practices
Kelis king -  software engineering and best practicesKelis king -  software engineering and best practices
Kelis king - software engineering and best practicesKelisKing
 
Workshop BI/DWH AGILE TESTING SNS Bank English
Workshop BI/DWH AGILE TESTING SNS Bank EnglishWorkshop BI/DWH AGILE TESTING SNS Bank English
Workshop BI/DWH AGILE TESTING SNS Bank EnglishMarcus Drost
 
Feature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax auditFeature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax auditMichael BENESTY
 

Similar to Biological modeling of software development dynamics (20)

Defect Age
Defect  AgeDefect  Age
Defect Age
 
Towards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction TechniquesTowards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction Techniques
 
Towards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniquesTowards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniques
 
L'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsL'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOps
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
 
Thinking in software testing
Thinking in software testingThinking in software testing
Thinking in software testing
 
2013 ucar best practices
2013 ucar best practices2013 ucar best practices
2013 ucar best practices
 
54 C o m m u n i C at i o n s o F t h e a C m j u.docx
54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx
54 C o m m u n i C at i o n s o F t h e a C m j u.docx
 
L'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsL'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOps
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection Strategy
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys Bldg
 
Can we induce change with what we measure?
Can we induce change with what we measure?Can we induce change with what we measure?
Can we induce change with what we measure?
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
Problems of testing 64-bit applications
Problems of testing 64-bit applicationsProblems of testing 64-bit applications
Problems of testing 64-bit applications
 
Measure It! How to measure quality in (not only) large software projects, OW2...
Measure It! How to measure quality in (not only) large software projects, OW2...Measure It! How to measure quality in (not only) large software projects, OW2...
Measure It! How to measure quality in (not only) large software projects, OW2...
 
midterm_fa07.pdf
midterm_fa07.pdfmidterm_fa07.pdf
midterm_fa07.pdf
 
SAD15 - Maintenance
SAD15 - MaintenanceSAD15 - Maintenance
SAD15 - Maintenance
 
Kelis king - software engineering and best practices
Kelis king -  software engineering and best practicesKelis king -  software engineering and best practices
Kelis king - software engineering and best practices
 
Workshop BI/DWH AGILE TESTING SNS Bank English
Workshop BI/DWH AGILE TESTING SNS Bank EnglishWorkshop BI/DWH AGILE TESTING SNS Bank English
Workshop BI/DWH AGILE TESTING SNS Bank English
 
Feature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax auditFeature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax audit
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Biological modeling of software development dynamics

  • 1.
  • 2.  Software development can be treated as an optimization problem: maximise software quality subject to the constraints limited resources Software quality: number of features, performance, reliability, etc.  Resources: time, money, etc. 
  • 3.  Questions to answer: › How long it will take to complete a particular task? › How long it will take to test a particular module? › How many defects remain in a particular module after a release? › At a particular time, what portion of resources should be devoted to testing as opposed to developing new features?
  • 4.  How to answer the previous questions: › By building a model  Purpose of modelling › Predict, explain, discover, guide  Modelling is a two-steps process: › Determine set of variables of interests › Determine set of equations to describe how these variables change and which kinds of relations exist among them
  • 5. Software development is an iterative process  The process of software developement can be described by the phrase evolution of software  The phrase implies similarities with evolution of biological systems  How can we use this fact? – central idea of this presentation 
  • 6.  Bio-inspired optimization algorithms: › Genetic algorithm – motivated by Darwin’s › › › › principal of natural selection Memetic algorithm – motivated by genetic + experience Particle swarm optimization – motivated by behavior of a flock of birds Ant colony optimization – motivated by behavior of an ant-colony Bee-inspired optimization, shuffled frog leaping algorithm, etc.
  • 7.  Artificial neural networks › It is computational structure inspired by central nervous system  Artificial immune system › It is computationally intelligent systems inspired by the principles of the immune system  Capture-recapture bug-estimation method › Statistical method developed for population estimation in bio-ecosystems
  • 8.    Accepted among most major software companies (Google, Facebook, Mozilla and Microsoft) Main principle - abandon long development cycles in favor of faster releases in order to bring the latest features and fixes to end-users Information for making decision if software is ready for a new release: › Relationship between number of bugs in the system (b(t)) and effort necessary to resolve them (e(t)). › The more effort is spent on defect resolving, the less time is left for developing new features.
  • 9.  O1 – Increasing (or decreasing) of e(t) leads to decreasing (or increasing) of b(t): e(t )  e(t ) b(t ) O2 – Increasing (or decreasing) of b(t) requires increasing (or decreasing) of e(t): b(t )  b(t ) e(t ) b(t ) e(t ) O3 – As a result from the previous two observation, both b(t) and e(t) exhibit periodic oscillations.
  • 10. O4 – The relationship from O1and O2 is not linear.  O5 – Small increase of effort can lead to significant reduction of defects number.  O6 –Pareto principle – majority of time is spent on small number of difficult bugs (approximately, removal of 30% of bugs requires 70% of time). 
  • 11. O7 – Changes in code churn exhibits growth rate which can be modeled by sigmoid function.  O8 – b(t) increasing is steeper than decreasing.  O9 – e(t) decreasing is steeper than increasing.  Observations O1-O9 imply similarity with predator-prey ecosystem  › Predator – tester, programmer › Prey - bugs
  • 12.  Most famous predator prey model expressed by: db(t ) dt  b( e) de(t ) dt e( b) Main characteristics: › In the case e(t)=0 (no hunt for bugs), b(t) has exponential growth. › The rate of detecting and reducing number of bugs by developers/testers is proportional to the number of bugs and effort invested in bug reduction (βeb). Intuitively, if there are more bugs in the system, it will be easier to detect and eliminate some of them. In addition, if more effort is invested in bugs reduction, the more bugs will be reduced.
  • 13. › In the absence of bugs (b(t)=0), effort exponentially reduces to zero. › The rate at which the effort grows is proportional to the rate at which the developers/testers encounter bugs.  Issues with the presented model: › Extremely sensitive to small perturbations › Allows unlimited exponential growth of number of bugs › Unlimited ability of a single developer/tester to detect and eliminate bugs
  • 14.  Improvement of LV model which resolves previous issues: db(t ) dt b b(1 ) K b b k e de(t ) dt e b b k e Number of bugs is limited by the size and complexity of a project which is specified by the parameter K.  Rate at which a single developer/tester detects and removes bugs is limited. 
  • 15.   Relationship among parameters defines two main regions. Model allows regular oscillations (suitable for the beginning and the middle of project) as well as dumped oscillations (suitable for project near completion)
  • 16.  Normalized values of e(t) and b(t) Conclusions: › The model was evaluated on real-life small size project developed under RR methodology › The model fairly accurately captures observations O1-O9 › Future work: investigate if the results can be generalized for description of projects with different characteristics.