{"title":"Linked Data driven development","authors":"Jan Božnik, V. Podgorelec, M. Heričko, Crt Gerlec","doi":"10.1109/CEE-SECR.2011.6188467","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188467","url":null,"abstract":"In this paper we introduce Linked Data driven development, a lightweight methodology for using Linked Data throughout the software life cycle. We explain the idea of Linked Data and how it plays an important role in the semantic web. Furthermore, we describe the necessary steps and approaches when using Linked Data for improving the software development process and give a discussion on the bonuses and pitfalls of such usage. Finally, some open questions and possible future work is proposed at the end.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126882930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to measure “soft” things?","authors":"Arsen Shoukourian, Emma Danielyan","doi":"10.1109/CEE-SECR.2011.6188466","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188466","url":null,"abstract":"Constant growth of business needs forces companies spare no effort on various regulations both inside and outside the company to minimize all the risks that are present on the long way of a product from being just an idea to becoming a final product delivered to customers. A huge set of processes has already been designed to ensure successful flow of a development. In particular, development of software is being regulated via processes as well. This paper is to outline specifics of time tracking process's design, implementation and application for non-development departments, such as System Configuration Management (SCM), Quality Assurance (QA) and Operations (OPS) in CQG, a company that provides financial software solutions for over 30 years.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"446 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126936001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining source code changes from software repositories","authors":"Crt Gerlec, A. Krajnc, M. Heričko, Jan Božnik","doi":"10.1109/CEE-SECR.2011.6188468","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188468","url":null,"abstract":"The primary goal of software repositories is to store the source code of software during its development. Developers constantly store small parts (i.e. software modifications) of code into the repository and share those parts with others until the software is finished. However, software repositories store a significant amount of information about software and development processes. With the appropriate tool, source code modifications could be identified. In the article, we will introduce a tool for identifying structural source code changes from software repositories. With this tool, three open source projects were analyzed and different source code changes were identified during their development. We showed that the tool could be used to identify source code changes from software repositories.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidelines for framework development process","authors":"Vojislav Stanojevic, Sinisa Vlajic, Milos Milic, Marina Ognjanovic","doi":"10.1109/CEE-SECR.2011.6188465","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188465","url":null,"abstract":"Framework as a term is very frequently used in software engineering, especially in relation to object-oriented software design and implementation. In general, a framework could be defined as an application generator for one particular domain, or more to the point, it represents a skeleton of an application, that includes the complete code for the basic functions of a system, which can be conformed to the needs of one specific application. In this paper, the definitions and properties of frameworks development process are presented. The second part of the paper will present guidelines for design and implementation of framework for developing desktop applications based on relationship meta-data. The framework should, on the basis of an arbitrary problem domain represented by a meta model, generate application skeleton using three-tier architecture and then implement basic CRUD database operations for the defined problem domain. Finally, conclusion summarizes all done and notes guidelines for further improvements of the implemented framework.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126378688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing integrated measurement and evaluation strategies: A case study","authors":"L. Olsina, M. Papa, Pablo Becker","doi":"10.1109/CEE-SECR.2011.6188462","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188462","url":null,"abstract":"This paper presents a case study aimed at understanding and comparing integrated strategies for software measurement and evaluation, considering a strategy as a resource from the assessed entity standpoint. The evaluation focus is on the quality of the capabilities of a measurement and evaluation strategy taking into account three key aspects: i) the conceptual framework, centered on a terminological base, ii) the explicit specification of the process, and iii) the methodological/technological support. We consider a strategy is integrated if to great extent these three capabilities are met simultaneously. In the illustrated case study two strategies i.e. GQM+Strategies (Goal-Question-Metric), and GOCAME (Goal-Oriented Context-Aware Measurement and Evaluation) are evaluated. The given results allowed us the understanding of strengths and weaknesses for both strategies, and planning improvement actions as well.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concordant suite of process models","authors":"Grigory I. Gusev","doi":"10.1109/CEE-SECR.2011.6188464","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188464","url":null,"abstract":"Software outsourcing companies working for several customers face the requirements to comply with many standards and methodologies. Formal compliance to several models without carefully thought tactics generates separate sets of disposable documentation that define the same practices from different points of view and take significant consistency maintenance effort, which often ends up by chaos. Experience of the Luxoft company proves that implementation of every next model should start with the analysis of new requirements not stated by the previously implemented models. Being effective in that analysis requires establishing the suites of detailed mappings of model requirements to company's policies, work instructions and templates. As a result, the company enjoys a single set of process documents, every part of which is clearly traceable to the source process requirements.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software risk management","authors":"S. Avdoshin, E. Pesotskaya","doi":"10.1109/CEE-SECR.2011.6188471","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188471","url":null,"abstract":"Modern software development faces many challenges nowadays. In order to avoiding, minimizing, and monitoring the risks and their impact, it is important to identify, estimate and evaluate the risks. The study addresses software risk management in software development area. An approach to analysis, structuring, and usage is proposed for the information technology (IT) projects in the risk management context. It is based on the study of the existing theoretical knowledge and practices and examples of better management. The author provides recommendations on software risk management and gives a brief overview of the automated software tools.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating multiple alignment on FPGA with a high-level hardware description language","authors":"Oleg Medvedev","doi":"10.1109/CEE-SECR.2011.6188461","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188461","url":null,"abstract":"The paper describes an experience of creating a hardware implementation of a pairwise sequence alignment algorithm in a high-level hardware description language. The implementation is created to be run on an FPGA with a high latency interface to a PC (ethernet). Thus, a lot of control logic is implemented in hardware together with the main pipeline. We use a HaSCoL hardware description language for that purpose and discuss pros and cons of this approach compared to software implementation of the control logic on an embedded processor. We also discuss how the language helps to describe hardware and how it could help more as well.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126153195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huiming Yu, Nadia Jones, G. Bullock, Xiaohong Yuan
{"title":"Teaching secure software engineering: Writing secure code","authors":"Huiming Yu, Nadia Jones, G. Bullock, Xiaohong Yuan","doi":"10.1109/CEE-SECR.2011.6188473","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188473","url":null,"abstract":"Writing secure code is critical because a large fraction of security incidents result from flaws in the code. In order to effectively teaching knowledge of secure software engineering we have developed a course module titled “Introduction to Writing Secure Code”. This paper presents the content of this module and reports our teaching experiences. This module has been successfully taught in GEEN 163 Introduction to Java Programming class and GEEN 165 Computer Programming Design class in Spring 2011 in the Department of Computer Science at xxx University. Our experience exhibits that teaching this module in freshman and sophomore levels help students not only understand the impacts of insecure code, but also gain significant knowledge of safe programming practice. Students' survey and feedback reflected that this module is very valuable in their educational experience. This module could be taught in first year freshman and second year sophomore classes of software engineering, computer science and information technology.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software reliability estimation based on static error detection","authors":"M. Glukhikh, M. Moiseev, A. Karpenko, H. Richter","doi":"10.1109/CEE-SECR.2011.6188470","DOIUrl":"https://doi.org/10.1109/CEE-SECR.2011.6188470","url":null,"abstract":"The estimation of a programs' reliability is an essential part in the process of software development. Existing methods for the analysis of software reliability are based on run-time data, program metrics, and properties of development process or program architecture. The disadvantage of these methods is that they use indirect information about the errors, which are the main cause of program unreliability. In the paper we present a novel approach for software reliability estimation. This approach is based on error detection using static source code analysis. We extend static analysis with developed algorithms which calculate error probabilities and program reliability characteristics. The characteristics are the probability of successfull program termination, the probability of the program is operable after execution of n statements, and mean number of executed statements before failure. The suggested approach has been implemented in the AEGIS tool and tested in numerous real-world software projects.","PeriodicalId":131009,"journal":{"name":"2011 7th Central and Eastern European Software Engineering Conference (CEE-SECR)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}