Quantitative Evaluation across Software Development Life Cycle Based on Evidence Theory

  • Weixiang Zhang
  • Wenhong Liu
  • Xin Wu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7996)


The paper brings out a method on quantitative software trustworthy evaluation across software development life cycle. First, build hierarchical assessment model with decomposition of software trustworthy on every stages and design appropriate quantitative or qualitative metrics; then, take advantage of knowledge discovery in database techniques to obtain the weights of all software trustworthy characteristics; finally, make use of evidence theory to pretreatment and reason a huge number of multi-type measurement data. The example from engineering shows that it can effectively improve objectiveness and accuracy of the assessment results.


Software Quantitative Evaluation Evidence Theory Software Development Life Cycle (SDLC) Data Fusion Trustworthy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Liu, K., Shan, Z., Wang, J.: Overview on major research plan of trustworthy software. Bulletin of National Natural Science Foundation of China 22(3), 145–151 (2008)MathSciNetGoogle Scholar
  2. 2.
    McCall, J.: The Automated Meaz of Software Quality. In: 5th COMMPSAC (1981)Google Scholar
  3. 3.
    ISO/IEC 9126 Information Technology—Software Product Evaluation—Quality Characteristics and Guidelines for Their Use, 1st edn. (1991) Google Scholar
  4. 4.
    Zhang, W., Liu, W., Du, H.: A software quantitative assessment method based on software testing. In: Huang, D.-S., Ma, J., Jo, K.-H., Gromiha, M.M. (eds.) ICIC 2012. LNCS (LNAI), vol. 7390, pp. 300–307. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  5. 5.
    Wang, S.Z., Xian, M., Wang, X.S.: Study on synthetic evaluation method of software quality. Computer Engineering and Design 23(4), 16–18 (2002) (in Chinese) zbMATHGoogle Scholar
  6. 6.
    Dong, J.L., Shi, N.G.: Research and improvement of the fuzzy synthesis evaluation algorithm based on software quality. Computer Engineering and Science 29(1), 66–68 (2007) (in Chinese) Google Scholar
  7. 7.
    Yang, S.L., Ding, S., Chu, W.: Trustworthy Software Evaluation Using Utility Based Evidence Theory. Journal of Computer Research and Development 46(7), 1152–1159 (2009) (in Chinese) Google Scholar
  8. 8.
    Kang, Y.H.: Data Fusion Theory and Application. Electronic Technology University Press, Xi’an (1997) (in Chinese) Google Scholar
  9. 9.
    Li, Y., Cai, Y., Yin, R.P.: Supprot vector machine ensemble based on evidence theory for multi-class classification. Journal of Computer Research and Development 45(4), 571–578 (2008) (in Chinese) Google Scholar
  10. 10.
    Shafer, G.: A Mathematical Theory of Evidence. Princeton U P, Princetion (1976)zbMATHGoogle Scholar
  11. 11.
    Yager, R.R.: On the D-S framework and new combination rules. Information Sciences 41(2), 93–138 (1987)MathSciNetzbMATHCrossRefGoogle Scholar
  12. 12.
    Sun, Q., Ye, X.Q., Gu, W.K.: A New Combination Rules of Evidence Theory. ACTA Electronicia Sinica 28(8), 117–119 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Weixiang Zhang
    • 1
  • Wenhong Liu
    • 1
  • Xin Wu
    • 1
  1. 1.Beijing Institute of Tracking and Telecommunications TechnologyBeijingChina

Personalised recommendations