Explain basic execution time model, Software Engineering

Assignment Help:

Q. Explain Basic Execution Time Model?

The model was developed by the J.D. MUSA in 1979(MUSA79) and is based on execution time. It is presumed that failures may occur according to a non-homogeneous Poisson Process (NHPP) Real world events may be described using Poisson processes. Instance of Poisson processes are

- A Number of telephone calls expected in a given period of time

- Expected figure of road accidents in a given period of time

- Expected figure of persons visiting in a shopping mall in a given period of time.

In this model the reduce in failure intensity as a function of the number of failures observed is constant and is given as:

288_Explain Basic Execution Time Model.png

Where Initial failure intensity at the start of execution.

V0 Number of failures experienced, if program is executed for Infinite time period μ Average as well expected number of failures experienced at a given point in time. These models imply a uniform operational profile. If every input class are selected equally often the various faults have an equal probability of manifesting themselves. The correction of whichever of those faults then contributes an equal decrease in the failure intensity. The negative sign publicized that there is a negative slope meaning thereby a decrementing trend in failure intensity.


Related Discussions:- Explain basic execution time model

What are the advantages of horizontal partitioning, What are the advantages...

What are the advantages of horizontal partitioning? i. Software is must be easy to check. ii. Software is handy to maintain. iii. Create fewer side effects. iv. Softwa

Construct an e-r diagram, Construct an E-R Diagram for the application desc...

Construct an E-R Diagram for the application described on the next page. Include any additional assumptions you made about the application requirements. The assumptions may not dir

K-map, m2+m3+m5+m7+m12+m8+m9 simplify using k-map

m2+m3+m5+m7+m12+m8+m9 simplify using k-map

What is the disadvantage of the set protocol, Question: (a) What mecha...

Question: (a) What mechanism does illegal spammers exploit to send spam? (b) What is a hoax? (c) Name two ways in which you can increase the privacy of e-mail. (d)

Class diagram, Explain the compare of class diagram

Explain the compare of class diagram

Find the decrement of failure intensity per failure, Q. Assume that a progr...

Q. Assume that a program will experience 200 failures in infinite time. It has now experienced 100. The initial failure intensity was 20 failures/CPU hr. (i) Determine the cur

Business intelligence, What are the advantages and disadvantages of using a...

What are the advantages and disadvantages of using a Business Intelligence (BI) software system in a small/medium level business?

Define the stress testing, Define the Stress testing: - It checks the r...

Define the Stress testing: - It checks the robustness of application. - It verifies that application consistently gives satisfactory performance under unfavorable and extrem

Open source software, what are the advantages of open source software?

what are the advantages of open source software?

How to write the data dictionary, Write down the Data dictionary for the da...

Write down the Data dictionary for the data item "Telephone Number". Names: Telephone number Aliases: none Where to use /How to use: assess against set-up Explanation

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd