S. Wagner, K. Lochmann, Sebastian Winter, A. Goeb, Michael Kläs
{"title":"Quality models in practice: A preliminary analysis","authors":"S. Wagner, K. Lochmann, Sebastian Winter, A. Goeb, Michael Kläs","doi":"10.1109/ESEM.2009.5316003","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5316003","url":null,"abstract":"This paper presents the findings of a survey on quality models in practice conducted among four software companies in Germany. In the first phase of the study, 25 quality managers and users of software quality models were interviewed regarding the use of quality models, quality assurance techniques, and problems arising from the current situation in their companies. We present qualitative and quantitative findings as well as our plans for the second study phase including an international online questionnaire.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical results from the transformation of a large commercial technical computing environment","authors":"R. Razdan, S. Esposito, J. Lawrence, Peter Conner","doi":"10.1109/ESEM.2009.5316000","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5316000","url":null,"abstract":"Technical computing has unique requirements which are exemplified by factors such as: an extreme focus on run-time performance, a high degree of responsiveness to the customer base, a continued focus on innovation, concurrent support on multiple computing platforms and most importantly, a very limited set of deep subject matter experts who have the skills to build the solution. Exacerbating the above issues is the fact that the field has traditionally seen a great deal of mergers and acquisition activity which leads quickly to an accumulation of disjoint software development systems. This paper describes a detailed case study built within a leading technical computing company which achieved significant success by focusing relentlessly on enhancing the productivity of the individual developer. The work was driven by the author as the general manager of the organization, and measured results of the transformation will be presented in this paper.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using differences among replications of software engineering experiments to gain knowledge","authors":"Natalia Juristo Juzgado, S. Vegas","doi":"10.1109/MSR.2010.5463362","DOIUrl":"https://doi.org/10.1109/MSR.2010.5463362","url":null,"abstract":"In no science or engineering discipline does it make sense to speak of isolated experiments. The results of a single experiment cannot be viewed as representative of the underlying reality. The concept of experiment is closely related to replication. Experiment replication is the repetition of an experiment to double-check its results. Multiple replications of an experiment increase the credibility of its results. Software engineering has tried its hand at the identical repetition of experiments in the way of the natural sciences (physics, chemistry, etc.). After numerous attempts over the years, excepting experiments repeated by the same researchers at the same site, no exact replications have yet been achieved. One key reason for this is the complexity of the software development setting. This complexity prevents the many experimental conditions from being reproduced identically. This paper reports research into whether non-exact replications can be of any use. We propose a process that allows researchers to generate new knowledge when running non-exact replications. To illustrate the advantages of the proposed process, two different replications of an experiment are shown.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117274701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing video data: A study of programming behavior under two software engineering paradigms","authors":"Huijuan Wu, Yuepu Guo, C. Seaman","doi":"10.1109/ESEM.2009.5315995","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5315995","url":null,"abstract":"Video is widely used as a data collection method in observational research. However, the process of analyzing video data can be overwhelming. In this study, we discuss several issues that we found during analyzing video data, such as the boundary of behaviors, priority for intertwined behaviors, and misunderstanding of behavior codes among analysts. We propose an iterative approach with reliability analysis to refine the coding scheme and solve these problems. This process involves two analyses, alternating between independent coding and coding in pairs.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"457 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhongpeng Lin, Fengdi Shu, Ye Yang, Chenyong Hu, Qing Wang
{"title":"An empirical study on bug assignment automation using Chinese bug data","authors":"Zhongpeng Lin, Fengdi Shu, Ye Yang, Chenyong Hu, Qing Wang","doi":"10.1109/ESEM.2009.5315994","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5315994","url":null,"abstract":"Bug assignment is an important step in bug life-cycle management. In large projects, this task would consume a substantial amount of human effort. To compare with the previous studies on automatic bug assignment in FOSS (Free/Open Source Software) projects, we conduct a case study on a proprietary software project in China. Our study consists of two experiments of automatic bug assignment, using Chinese text and the other non-text information of bug data respectively. Based on text data of the bug repository, the first experiment uses SVM to predict bug assignments and achieve accuracy close to that by human triagers. The second one explores the usefulness of non-text data in making such prediction. The main results from our study includes that text data are most useful data in the bug tracking system to triage bugs, and automation based on text data could effectively reduce the manual effort.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126605897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting defects with program dependencies","authors":"Thomas Zimmermann, Nachiappan Nagappan","doi":"10.1109/ESEM.2009.5316024","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5316024","url":null,"abstract":"Software development is a complex and error-prone task. An important factor during the development of complex systems is the understanding of the dependencies that exist between different pieces of the code. In this paper, we show that for Windows Server 2003 dependency data can predict the defect-proneness of software elements. Since most dependencies of a component are already known in the design phase, our prediction models can support design decisions.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115288187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantitative analysis of information security interdependency between industrial sectors","authors":"Hideyuki Tanaka","doi":"10.1109/ESEM.2009.5314218","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5314218","url":null,"abstract":"This paper employs Input-Output analysis to quantitatively analyze cross-sectoral security interdependency in terms of economic activity. Previous studies using the Inoperability Input-Output Model (IIM) have demonstrated the impact of cross-sectoral security incidents from the viewpoint of interdependency. However, the two primary limitations of these studies are that (1) they do not consider each sector's features in terms of information technology (IT) and information security (IS), and (2) they focus on the damage caused by IS incidents to sectors and do not consider the level of security interdependency itself. The author proposes a practical methodology to measure sectoral IS interdependency by introducing forward linkage and backward linkage analyses into an IIM. The methodology assesses the dependency of each sector with respect to IT and the level of IS measures. Furthermore, the paper applies the methodology to recent statistical economic data of Japanese industrial sectors and illustrates the implications of cross-sectoral security interdependency.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A detailed examination of the correlation between imports and failure-proneness of software components","authors":"Ekwa Duala-Ekoko, M. Robillard","doi":"10.1109/ESEM.2009.5316047","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5316047","url":null,"abstract":"Research has provided evidence that type usage in source files is correlated with the risk of failure of software components. Previous studies that investigated the correlation between type usage and component failure assigned equal blame to all the types imported by a component with a failure history, regardless of whether a type is used in the component, or associated to its failures. A failure-prone component may use a type, but it is not always the case that the use of this type has been responsible for any of its failures. To gain more insight about the correlation between type usage and component failure, we introduce the concept of a failure-associated type to represent the imported types referenced within methods fixed due to failures. We conducted two studies to investigate the tradeoffs between the equal-blame approach and the failure-associated type approach. Our results indicate that few of the types or packages imported by a failure-prone component are associated with its failures — less than 25% of the type imports, and less than 55% of the packages whose usage were reported to be highly correlated with failures by the equal-blame approach, were actually correlated with failures when we looked at the failure-associated types.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117072481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Feldman, Carl J. Mueller, D. Tamir, Oleg V. Komogortsev
{"title":"Usability testing with total-effort metrics","authors":"L. Feldman, Carl J. Mueller, D. Tamir, Oleg V. Komogortsev","doi":"10.1109/ESEM.2009.5316022","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5316022","url":null,"abstract":"Usability testing activities have numerous benefits in theory, yet they are often overlooked or disregarded in practice. A testing paradigm which yields objective, quantitative results would likely lead to more widespread adoption of usability evaluation activities. Total-Effort Metrics is such a novel framework. This paper describes a usability study conducted using a total-effort metrics approach. In this study, subjects interact with three interfaces which have varying element layout proximities. The time and effort measures of time-on-task, total keystrokes, correctional keystrokes, saccade amplitude (point-to-point eye movement) and gaze-path traversal are recorded and analyzed. The findings of the study demonstrate a correlation between the intrinsic effort of an interface and its usability as predicted by extant interface layout guidelines.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"587 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Corazza, S. Martino, F. Ferrucci, C. Gravino, E. Mendes
{"title":"Applying support vector regression for web effort estimation using a cross-company dataset","authors":"A. Corazza, S. Martino, F. Ferrucci, C. Gravino, E. Mendes","doi":"10.1109/ESEM.2009.5315991","DOIUrl":"https://doi.org/10.1109/ESEM.2009.5315991","url":null,"abstract":"Support Vector Regression (SVR) is a new generation of Machine Learning algorithms, suitable for predictive data modeling problems. The objective of this paper is to investigate the effectiveness of SVR for Web effort estimation, in particular when dealing with a cross-company dataset. To gain a deeper insight on the method, we carried out an empirical study using four kernels for SVR, namely linear, polynomial, Gaussian, and sigmoid. Moreover, we used two variables' preprocessing strategies (normalization and logarithmic), and two different dependent variables (effort and inverse effort). As a result, SVR was applied using six different configurations for each kernel. As for the dataset, we employed the Tukutuku database, which is widely adopted in Web effort estimation studies. A hold-out approach was adopted to evaluate the prediction accuracy for all the configurations, using two training sets, each containing data on 130 projects randomly selected, and two test sets, each containing the remaining 65 projects. As benchmark, SVR-based predictions were also compared to predictions obtained using Manual StepWise Regression, Case-Based Reasoning, and Bayesian Networks. Our results suggest that SVR performed well, since on the first hold-out, the linear kernel with a logarithmic transformation of variables provided significantly superior prediction accuracy than all the other techniques, while for the second hold-out, the Gaussian kernel achieved significantly superior predictions than all other techniques, except for Manual StepWise Regression.","PeriodicalId":128479,"journal":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}