﻿ COSMIC度量中持久存储器的识别方法

# COSMIC度量中持久存储器的识别方法Recognition Method of COSMIC Measurement in the Persistent Storage

COSMIC方法是当前用于软件规模度量的一种全功能点估算方法。目前，该方法适用的项目很广泛，计数规则也比较简单，易于学习和掌握，已经被更多的软件组织所接受。运用COSMIC度量方法，其中有一项重要工作，就是识别持久存储器，为识别数据移动和计算功能点提供判定依据。但是，由于COSMIC度量手册中仅对识别持久存储器的一些原则和规则进行了规定和说明，有较大的模糊和不确定性，并且没有给出行之有效的操作方法，使得度量人员在实践度量中，存在较大的主观性，由此导致度量结果存在较大偏差。本文在遵循COSMIC度量手册原则和规则的基础上，结合实践度量实验，提出了一种可实施的识别持久存储器的方法步骤。

Abstract: COSMIC method is a full function point counting method which is currently used for software size measurement. At present, this method’s applicable project is very wide and its counting rules are simple and easy to learn and master. It has been accepted by more and more software organizations. An important job of using the COSMIC measurement is to identify the persistent storage and to provide decision basis to identify the data movement and the calculation function point. However, the COSMIC Functional Size Measurement Method Version only regulates and explains some principles and rules to identify the persistent storage. So, it has lager fuzzy and uncertainty. It also doesn’t give an effective operation method, which makes the measurement personnel have a big subjectivity in the practical measurement. They lead to a great deviation in the measurement results. On the basis of the principles and rules of the COSMIC Functional Size Measurement Method Version, combined with the practical measurement experiment, this paper proposes procedures that can be carried out to identify the persistent storage.

[1] 卢潇, 孙璐, 刘娟, 等. 软件工程[M]. 北京: 清华大学出版社, 2005: 2-23.

[2] McGarry, J., Card, D. JONESC [J]. 实用软件度量, 2003, 5(1): 80-86.

[3] 周泽龙. 可实施的COSMIC方法研究[D]: [硕士学位论文]. 长沙: 国防科技大学, 2013: 4.

[4] COSMIC (2015) COSMIC Method v4. 0. 1 Measurement Manual. No. 4.

[5] 朱明阳, 程江涛. 一种度量算法的功能点方法[C]. 2014全国网络与信息安全学术会议, 2014: 5.

[6] 买新晖. COSMIC度量一致性控制的方法研究[J]. 电脑知识与技术, 2014, 10(2): 322-324.

[7] COSMIC-Case Study (2002) ISDN Loop Back Tester. No. 2.

[8] COSMIC-Case Study (2008) C-Registration System. No. 1

[9] 程江涛, 朱明阳. COSMIC度量中功能用户的识别方法[C]. 2014全国网络与信息安全学术会议, 2014: 5.

Top