Skip to main content

Mobile Application Development: How to Estimate the Effort?

  • Conference paper
Computational Science and Its Applications – ICCSA 2014 (ICCSA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8583))

Included in the following conference series:

Abstract

The context of mobile applications, is a technological scenario that is emerging with new requirements and restrictions requires a reevaluation of current knowledge about the processes of planning and building software systems. These new systems have different characteristics and, therefore, an area in particular that demands such adaptation is software estimation. The estimation processes, in general, are based on characteristics of the systems, trying to quantify the complexity of implementing them. For this reason, it is important to analyze the methods currently proposed for software projects estimation and evaluate their applicability to this new context of mobile computing. Hence, the main objective of this paper is to present a partial validation of the proposed model estimate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Jaroodi, J., Al-Dhaheri, A., Al-Abdouli, F., Mohamed, N.: A survey of security middleware for pervasive and ubiquitous systems. In: International Conference on Network-Based Information Systems, NBIS 2009, pp. 188–193. IEEE (2009)

    Google Scholar 

  2. Rogov, I., Erlick, D., Gerbert, A., Mandadi, A., Mudegowder, D.: Mobile applications: Characteristics & group project summary. In: Mobile Application Development. Google (2009)

    Google Scholar 

  3. COSMIC-Common Software Measurement International Consortium, et al.: The cosmic functional size measurement method-version 3.0 measurement manual (the cosmic implementation guide for iso/iec 19761: 2003) (2007)

    Google Scholar 

  4. Engelhart, J., Langbroek, P., et al.: Function Point Analysis (FPA) for Software Enhancement. In: NESMA (2001)

    Google Scholar 

  5. Feng, H.: A literature analysis on the adoption of mobile commerce. In: IEEE International Conference on Grey Systems and Intelligent Services, GSIS 2009, pp. 1353–1358. IEEE (2009)

    Google Scholar 

  6. Finnish Software Measurement Association FiSMA. Fisma functional size measurement method version 1-1 (2004)

    Google Scholar 

  7. Forselius, P.: Finnish software measurement association (fisma), fsm working group: Fisma functional size measurement method v. 1.1 (2004)

    Google Scholar 

  8. Gencel, C., Heldal, R., Lind, K.: On the conversion between the sizes of software products in the life cycle

    Google Scholar 

  9. Giessmann, A., Stanoevska-Slabeva, K., de Visser, B.: Mobile enterprise applications–current state and future directions. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 1363–1372. Google (2012)

    Google Scholar 

  10. Hameed, K., et al.: Mobile applications and systems (2010)

    Google Scholar 

  11. Hayenga, M., Sudanthi, C., Ghosh, M., Ramrakhyani, P., Paver, N.: Accurate system-level performance modeling and workload characterization for mobile internet devices. In: Proceedings of the 9th Workshop on MEmory Performance: DEaling with Applications, Systems and Architecture, MEDEA 2008, pp. 54–60. ACM, New York (2008)

    Google Scholar 

  12. Husted, N., Saïdi, H., Gehani, A.: Smartphone security limitations: conflicting traditions. In: Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies, GTIP 2011, pp. 5–12. ACM, New York (2011)

    Chapter  Google Scholar 

  13. Ketykó, I., Moor, K.D., Pessemier, T.D., Verdejo, A.J., Vanhecke, K., Joseph, W., Martens, L., Marez, L.D.: Qoe measurement of mobile youtube video streaming. In: Proceedings of the 3rd Workshop on Mobile Video Delivery, MoViD 2010, pp. 27–32. ACM, New York (2010)

    Google Scholar 

  14. Kitchenham, B.: Procedures for performing systematic reviews. Keele, UK, Keele University 33 (2004)

    Google Scholar 

  15. Maji, A.K., Hao, K., Sultana, S., Bagchi, S.: Characterizing failures in mobile oses: A case study with android and symbian. In: 2010 IEEE 21st International Symposium on Software Reliability Engineering (ISSRE), pp. 249–258. IEEE (2010)

    Google Scholar 

  16. Lowe, R., Mandl, P., Weber, M.: Context directory: A context-aware service for mobile context-aware computing applications by the example of google android. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 76–81 (2012)

    Google Scholar 

  17. Mukhtar, H., Belaïd, D., Bernard, G.: A model for resource specification in mobile services. In: Proceedings of the 3rd International Workshop on Services Integration in Pervasive Environments, SIPE 2008, pp. 37–42. ACM, New York (2008)

    Google Scholar 

  18. Oligny, S., Desharnais, J.-M., Abran, A.: A method for measuring the functional size of embedded software. In: 3rd International Conference on Industrial Automation, pp. 7–9 (1999)

    Google Scholar 

  19. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: A comprehensive security assessment. IEEE Security Privacy 8(2), 35–44 (2010)

    Article  Google Scholar 

  20. Sohn, J.-H., Woo, J.-H., Lee, M.-W., Kim, H.-J., Woo, R., Yoo, H.-J.: A 50 mvertices/s graphics processor with fixed-point programmable vertex shader for mobile applications. In: 2005 IEEE International Solid-State Circuits Conference, ISSCC. Digest of Technical Papers, vol. 1, pp. 192–592. Google (2005)

    Google Scholar 

  21. Symons, C.: Come back function point analysis (modernized)–all is forgiven!). In: Proc. of the 4th European Conference on Software Measurement and ICT Control, FESMA-DASMA, pp. 413–426 (2001)

    Google Scholar 

  22. Yang, C.-C., Yang, H.-W., Huang, H.-C.: A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, pp. 1198–1202. ACM, New York (2010)

    Google Scholar 

  23. Yang, S.-Y., Lee, D.L., Chen, K.-Y.: A new ubiquitous information agent system for cloud computing - example on gps and bluetooth techniques in google android platform. In: 2011 International Conference on Electric Information and Control Engineering (ICEICE), pp. 1929–1932 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

de Souza, L.S., de Aquino, G.S. (2014). Mobile Application Development: How to Estimate the Effort?. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2014. ICCSA 2014. Lecture Notes in Computer Science, vol 8583. Springer, Cham. https://doi.org/10.1007/978-3-319-09156-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09156-3_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09155-6

  • Online ISBN: 978-3-319-09156-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics