2010 IEEE International Conference on Software Maintenance最新文献

筛选
英文 中文
Hidden dependencies in software systems 软件系统中隐藏的依赖关系
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609657
R. Vanciu, V. Rajlich
{"title":"Hidden dependencies in software systems","authors":"R. Vanciu, V. Rajlich","doi":"10.1109/ICSM.2010.5609657","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609657","url":null,"abstract":"In this paper, we study the hidden dependencies that are a special kind of data flows. They play an important role in software maintenance and evolution because they propagate changes among the classes and they are hard to detect. We propose a technique that finds hidden dependencies through the computation of an “execute completely after” relation that is filtered using dynamically generated preconditions and postconditions. We show that these hidden dependencies exist even in well-structured software, like the open source programs JUnit, Drawlets, and Apache FtpServer. We also discuss the precision of this technique.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Domain-based change propagation analysis: An enterprise system case study 基于域的变更传播分析:一个企业系统案例研究
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609743
Amir Aryani, I. Peake, M. Hamilton
{"title":"Domain-based change propagation analysis: An enterprise system case study","authors":"Amir Aryani, I. Peake, M. Hamilton","doi":"10.1109/ICSM.2010.5609743","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609743","url":null,"abstract":"Change propagation has mainly been estimated by maintenance history or source code analysis. However, sometimes history and code are inaccessible, or impractical to analyse, such as for heterogeneous sources.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Teaching undergraduate software engineering 软件工程本科教学
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609587
V. Rajlich
{"title":"Teaching undergraduate software engineering","authors":"V. Rajlich","doi":"10.1109/ICSM.2010.5609587","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609587","url":null,"abstract":"During the last decade, software engineering changed rapidly, from the emphasis on waterfall lifecycle to the emphasis on software evolution and agile programming. This tutorial provides a brief introduction and overview of the results of this development. It presents agile programming, Personal and Team Software Process, software change, concept location, refactoring, and so forth. The organizing principle is an outline of an undergraduate software engineering course that is based on these results. The audience interested in this tutorial may be teachers of software engineering, and also software practitioners who want learn how these results fit together and how to apply them in software projects.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125137382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MooseJEE: A moose extension to enable the assessment of JEAs MooseJEE:用于评估JEAs的moose扩展
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609569
F. Perin
{"title":"MooseJEE: A moose extension to enable the assessment of JEAs","authors":"F. Perin","doi":"10.1109/ICSM.2010.5609569","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609569","url":null,"abstract":"Java Enterprise Applications (JEAs) are large systems that integrate multiple technologies and programming languages. With the purpose to support the analysis of JEAs we have developed MooseJEE an extension of the Moose environment capable to model the typical elements of JEAs.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117304805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system 用于在迁移遗留系统时强制执行线程内一致锁的静态分析
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609727
M. Ceccato, P. Tonella
{"title":"Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system","authors":"M. Ceccato, P. Tonella","doi":"10.1109/ICSM.2010.5609727","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609727","url":null,"abstract":"Often, legacy data management systems provide no native support to transactions. Programmers protect data from concurrent access by adopting commonly agreed patterns, relying on low level concurrency primitives, such as semaphores. In such cases, consistent data access is granted only if all code components are compliant with the adopted mutual exclusion patterns.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117033348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verifying the design of an outsourced COBOL system with IntensiVE 用IntensiVE验证外包COBOL系统的设计
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609534
Andy Kellens, Carlos Noguera, T. D'Hondt, Luc Jorissen, Bart Van Passel
{"title":"Verifying the design of an outsourced COBOL system with IntensiVE","authors":"Andy Kellens, Carlos Noguera, T. D'Hondt, Luc Jorissen, Bart Van Passel","doi":"10.1109/ICSM.2010.5609534","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609534","url":null,"abstract":"Companies nowadays rely on outsourcing for the implementation of their software. While outsourcing can reduce the actual development costs for a piece of software, it can also reduce a company's control over the quality of the delivered software. In light of obtaining maintainable software, it is however important that the delivered software is well-structured and obeys the various design rules that were postulated by a company using an outsourcing partner. This paper reports on a collaboration between academia and industry, where the research tool IntensiVE has been applied to verify the design rules underlying a large-scale COBOL system. We describe how the IntensiVE tool was customized in order to support verification of the COBOL system, and how this academic tool aided in providing an initial quality assessment of the outsourced software system.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for the evaluation of specification miners based on finite state machines 基于有限状态机的规范矿工评价框架
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609576
Michael Pradel, Philipp Bichsel, T. Gross
{"title":"A framework for the evaluation of specification miners based on finite state machines","authors":"Michael Pradel, Philipp Bichsel, T. Gross","doi":"10.1109/ICSM.2010.5609576","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609576","url":null,"abstract":"Software maintenance tasks, such as testing and program understanding, can benefit from formal specifications that describe how a program should use an API. Recently, there has been increasing interest in specification miners that automatically extract finite state specifications of method ordering constraints from existing software. However, comparing different mining approaches is difficult, because no common ground to evaluate the effectiveness of specification miners has been established yet. We present a framework for evaluating to which extent specification miners find valid finite state descriptions of API usage constraints. The framework helps in creating reference specifications and includes metrics to compare mined specifications to the reference specifications. The metrics are tailored for evaluating specification miners and account for imprecision and incompleteness in mined specifications. We use the framework to compare the effectiveness of three mining approaches and to show their respective benefits.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126443317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Fuzzy set approach for automatic tagging in evolving software 进化软件自动标注的模糊集方法
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609751
Jafar M. Al-Kofahi, Ahmed Tamrawi, T. Nguyen, H. Nguyen, T. Nguyen
{"title":"Fuzzy set approach for automatic tagging in evolving software","authors":"Jafar M. Al-Kofahi, Ahmed Tamrawi, T. Nguyen, H. Nguyen, T. Nguyen","doi":"10.1109/ICSM.2010.5609751","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609751","url":null,"abstract":"Software tagging has been shown to be an efficient, lightweight social computing mechanism to improve different social and technical aspects of software development. Despite the importance of tags, there exists limited support for automatic tagging for software artifacts, especially during the evolutionary process of software development. We conducted an empirical study on IBM Jazz's repository and found that there are several missing tags in artifacts and more precise tags are desirable. This paper introduces a novel, accurate, automatic tagging recommendation tool that is able to take into account users' feedbacks on tags, and is very efficient in coping with software evolution. The core technique is an automatic tagging algorithm that is based on fuzzy set theory. Our empirical evaluation on the real-world IBM Jazz project shows the usefulness and accuracy of our approach and tool.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Physical and conceptual identifier dispersion: Measures and relation to fault proneness 物理和概念标识符分散:测量和与故障倾向性的关系
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609748
V. Arnaoudova, L. Eshkevari, R. Oliveto, Yann-Gaël Guéhéneuc, G. Antoniol
{"title":"Physical and conceptual identifier dispersion: Measures and relation to fault proneness","authors":"V. Arnaoudova, L. Eshkevari, R. Oliveto, Yann-Gaël Guéhéneuc, G. Antoniol","doi":"10.1109/ICSM.2010.5609748","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609748","url":null,"abstract":"Poorly-chosen identifiers have been reported in the literature as misleading and increasing the program comprehension effort. Identifiers are composed of terms, which can be dictionary words, acronyms, contractions, or simple strings. We conjecture that the use of identical terms in different contexts may increase the risk of faults. We investigate our conjecture using a measure combining term entropy and term context coverage to study whether certain terms increase the odds ratios of methods to be fault-prone. Entropy measures the physical dispersion of terms in a program: the higher the entropy, the more scattered across the program the terms. Context coverage measures the conceptual dispersion of terms: the higher their context coverage, the more unrelated the methods using them. We compute term entropy and context coverage of terms extracted from identifiers in Rhino 1.4R3 and ArgoUML 0.16. We show statistically that methods containing terms with high entropy and context coverage are more fault-prone than others.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"39 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
History-sensitive recovery of product line features 产品线特性的历史敏感恢复
2010 IEEE International Conference on Software Maintenance Pub Date : 2010-09-12 DOI: 10.1109/ICSM.2010.5609561
Camila Nunes, Alessandro F. Garcia, C. Lucena
{"title":"History-sensitive recovery of product line features","authors":"Camila Nunes, Alessandro F. Garcia, C. Lucena","doi":"10.1109/ICSM.2010.5609561","DOIUrl":"https://doi.org/10.1109/ICSM.2010.5609561","url":null,"abstract":"Since software product lines (SPLs) increasingly have to satisfy additional requirements, their designs might degenerate over time. The degeneration is caused by various reasons. For instance, the features suddenly start to be realized and they evolved in inconsistent ways across multiple products. In an extreme case, the SPL code is fully or partially replicated and individually changed across several evolving products. In order to regain control of the SPL assets, a key activity is the design recovery of features from existing applications. However, existing techniques for feature analysis are not effective as they tend to explicitly rely on a single project history. They do not take into consideration change histories of features across multiple evolving products of a SPL. This research proposes a novel technique for history-sensitive feature recovery while repairing degenerated SPL designs. Our technique is ought to encompass a set of heuristics for facilitating SPL design recovery. We aim at investigating to what extent exploiting multi-product change histories allow accurate identification of: (i) code elements that contribute to each feature realization; and (ii) variability properties of the feature code. The empirical evaluation of our technique will be based on two industry case studies.","PeriodicalId":101801,"journal":{"name":"2010 IEEE International Conference on Software Maintenance","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133668850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信