skip to main content
article

Use cases modeling and software estimation: applying use case points

Published:01 November 2006Publication History
Skip Abstract Section

Abstract

This article discusses software size/effort estimation by the Use Case Points method (UCP). It is based on the experience accumulated during deployment of the UCP in a software development department of a major financial institution. Typical for such an environment is that software is developed on top of existing applications, and that there are significant differences between projects in business domains, scope, size, complexity, project management details, etc. In a previous article [3] an extension of the Use Case Points method, called UCPm, was described that addresses these issues.Due to their level, use cases make high-level estimation easier. However, this article, presenting a number of real world situations, demonstrates that to obtain reasonably accurate estimates we need to reflect in use case models some aspects of the existing application and of the current project. It also suggests some clarifications of the concept of use case transaction and outlines some ways to support use case models consistency within and across projects.

References

  1. Karner, Gustav. Metrics for Objectory. Diploma thesis, University of Linköping, Sweden. No. LiTHIDA-Ex-9344:21. December 1993.Google ScholarGoogle Scholar
  2. Schneider, Geri, Winters, Jason P. Applying Use Cases: A Practical Guide. Addison-Wesley, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Diev, Sergey. Software estimation in the maintenance context. ACM SIGSOFT Software Engineering Notes. Volume 31, Issue 2 (March 2006), 8 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Function Point Counting Practices Manual. Release 4.2. The International Function Point Users Group, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Use cases modeling and software estimation: applying use case points
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader