{"title":"Evaluating Cloud Platform Architecture with the CARE Framework","authors":"Liang Zhao, Anna Liu, J. Keung","doi":"10.1109/APSEC.2010.17","DOIUrl":"https://doi.org/10.1109/APSEC.2010.17","url":null,"abstract":"There is an emergence of Cloud application platforms such as Microsoft’s Azure, Google’s App Engine and Amazon’s EC2/SimpleDB/S3. Startups and Enterprise alike, lured by the promise of ‘infinite scalability’, ‘ease of development’, ‘low infrastructure setup cost’ are increasingly using these Cloud service building blocks to develop and deploy their web based applications. However, the precise nature of these Cloud platforms and the resultant Cloud application runtime behavior is still largely an unknown. Given the black box nature of these platforms, and the novel programming and data models of Cloud, there is a dearth of tools and techniques for enabling the rigorously evaluation of Cloud platforms at runtime. This paper introduces the CARE (Cloud Architecture Runtime Evaluation) approach, a framework for evaluating Cloud application development and runtime platforms. CARE implements a unified interface with WSDL and REST in order to evaluate different Cloud platforms for Cloud application hosting servers and Cloud databases. With the unified interface, we are able to perform selective high stress and low stress evaluations corresponding to desired test scenarios. Result shows the effectiveness of CARE in the evaluation of Cloud variations in terms of scalability, availability and responsiveness, across both compute and storage capabilities. Thus placing CARE as an important tool in the path of Cloud computing research.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127814855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Du, Ye Yang, Zhongpeng Lin, Qing Wang, Mingshu Li, Feng Yuan
{"title":"A Case Study on Usage of a Software Process Management Tool in China","authors":"Jing Du, Ye Yang, Zhongpeng Lin, Qing Wang, Mingshu Li, Feng Yuan","doi":"10.1109/APSEC.2010.57","DOIUrl":"https://doi.org/10.1109/APSEC.2010.57","url":null,"abstract":"Nowadays, commercial or in-house customized process management tools have been prevalently adopted for supporting software project management and process improvement. In this paper we report a case study to empirically investigate and evaluate the usage status and implications of a supporting tool named QONE in industrial environment in China. Decision theory is adopted in study design. The analysis is mainly based on the usage data from a typical industrial project. Further questionnaires and follow-up interviews with the end-users are also conducted. The analysis results reveal that 1) the effects of such supporting tool vary with respect to different task types, 2) tasks with smaller granularity are comparatively easier to predict and control, 3) missing data reporting analysis helps to reveal opportunities for further process improvement and tool enhancement. This investigation aims to help us take advantages of such supporting tools and benefit software development eventually.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongyu Pei Breivold, Muhammad Aufeef Chauhan, M. Babar
{"title":"A Systematic Review of Studies of Open Source Software Evolution","authors":"Hongyu Pei Breivold, Muhammad Aufeef Chauhan, M. Babar","doi":"10.1109/APSEC.2010.48","DOIUrl":"https://doi.org/10.1109/APSEC.2010.48","url":null,"abstract":"Software evolution relates to how software systems evolve over time. With the emergence of the open source paradigm, researchers are provided with a wealth of data for open source software evolution analysis. In this paper, we present a systematic review of open source software (OSS) evolution. The objective of this review is to obtain an overview of the existing studies in open source software evolution, with the intention of achieving an understanding of how software evolvability (i.e., a software system’s ability to easily accommodate changes) is addressed during development and evolution of open source software. The primary studies for this review were identified based on a pre-defined search strategy and a multi-step selection process. Based on their research topics, we have identified four main categories of themes: software trends and patterns, evolution process support, evolvability characteristics addressed in OSS evolution, and examining OSS at software architecture level. A comprehensive overview and synthesis of these categories and related studies is presented as well.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131972633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing Inter-layer and Inter-task Interactions in RTES Applications","authors":"A. Sung, W. Srisa-an, G. Rothermel, Tingting Yu","doi":"10.1109/APSEC.2010.38","DOIUrl":"https://doi.org/10.1109/APSEC.2010.38","url":null,"abstract":"Real-time embedded systems (RTESs) are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques could improve the dependability of these systems. In this paper we present an approach for testing RTESs, intended specifically to help RTES application developers detect faults related to functional correctness. Our approach consists of two techniques that focus on exercising the interactions between system layers and between the multiple user tasks that enact application behaviors. We present results of an empirical study that shows that our techniques are effective at detecting faults.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117305970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Duplicate Bug Report Using Character N-Gram-Based Features","authors":"A. Sureka, P. Jalote","doi":"10.1109/APSEC.2010.49","DOIUrl":"https://doi.org/10.1109/APSEC.2010.49","url":null,"abstract":"We present an approach to identify duplicate bug reports expressed in free-form text. Duplicate reports needs to be identified to avoid a situation where duplicate reports get assigned to multiple developers. Also, duplicate reports can contain complementary information which can be useful for bug fixing. Automatic identification of duplicate reports (from thousands of existing reports in a bug repository) can increase the productivity of a Triager by reducing the amount of time a Triager spends in searching for duplicate bug reports of any incoming report. The proposed method uses character N-gram-based model for the task of duplicate bug report detection. Previous approaches are word-based whereas this study investigates the usefulness of low-level features based on characters which have certain inherent advantages (such as natural-language independence, robustness towards noisy data and effective handling of domain specific term variations) over word-based features for the problem of duplicate bug report detection. The proposed solution is evaluated on a publicly-available dataset consisting of more than 200 thousand bug reports from the open-source Eclipse project. The dataset consists of ground-truth (pre-annotated dataset having bug reports tagged as duplicate by the Triager). Empirical results and evaluation metrics quantifying retrieval performance indicate that the approach is effective.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128925028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Data Deluge -- How Software Engineering Can Help","authors":"J. Bishop","doi":"10.1109/APSEC.2010.59","DOIUrl":"https://doi.org/10.1109/APSEC.2010.59","url":null,"abstract":"The world is focused on data as never before. Everything we do, from our professional, academic and social lives, relies on being able to receive, process, analyze and display vast amounts of intricately connected information, represented in many different ways. We show how we can draw on the experience of existing systems that process data and come up with success factors that enable software engineers to make data widely and easily available in different forms at many levels.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125444223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bridging the Gap between Fault Trees and UML State Machine Diagrams for Safety Analysis","authors":"Hyeon-Jeong Kim, W. Wong, V. Debroy, Doo-Hwan Bae","doi":"10.1109/APSEC.2010.31","DOIUrl":"https://doi.org/10.1109/APSEC.2010.31","url":null,"abstract":"Poorly designed software systems are one of main causes of accidents in safety-critical systems, and thus, the importance of safety analysis for software has greatly increased over the recent years. Software safety can be improved by analyzing both its desired and undesired behaviors, and this in turn requires expressive power such that both can be modeled. However, there is a considerable gap between modeling methods for desired and undesired behaviors. Therefore, we propose a method to bridge the gap between fault trees (for undesired behavior) and UML state machine diagrams (for desired behavior). More specifically, we present rules and algorithms that facilitate the transformation of a hazard (in the context of fault trees) to a UML state machine diagram. We illustrate our proposed approach via an example on a microwave-oven system. Our proposed transformation can help engineers identify how the hazards may occur, thereby allowing them to prevent the hazard from occurring.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Julio Sincero, Wolfgang Schröder-Preikschat, O. Spinczyk
{"title":"Approaching Non-functional Properties of Software Product Lines: Learning from Products","authors":"Julio Sincero, Wolfgang Schröder-Preikschat, O. Spinczyk","doi":"10.1109/APSEC.2010.26","DOIUrl":"https://doi.org/10.1109/APSEC.2010.26","url":null,"abstract":"Approaching the configuration of non-functional properties (NFPs) in traditional software systems is not an easy task, addressing the configuration of these properties in software product lines (SPLs) imposes even further challenges. Therefore, we have devised the Feedback Approach, which extends the traditional SPL development techniques in order to improve the configuration of NFPs. In this work we present the general guidelines of our approach and also we show the feasibility of the idea by presenting a case study using the Linux Kernel.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117126184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hierarchical Model for Regression Test Selection and Cost Analysis of Java Programs","authors":"Chuanqi Tao, Bixin Li, Xiaobing Sun, Ying Zhou","doi":"10.1109/APSEC.2010.41","DOIUrl":"https://doi.org/10.1109/APSEC.2010.41","url":null,"abstract":"Regression testing is an important but expensive stage of software maintenance. Regression test selection addresses the problem of reducing testing cost through selecting a subset of the existing test cases or rerun. Cost-effectiveness is an indispensable factor to consider when developing a regression testing technique. Cost models are created for the purpose of assessing cost-effectiveness of these techniques. The current regression test selection strategies or cost analysis seldom consider hierarchy, which is an inherent characteristic of object-oriented program. In addition, selecting test cases at different levels influences the precision and efficiency of selection. This paper presents a hierarchical regression test selection technique for Java programs to stepwise select test cases from high level of program to low level of program. To effectively evaluate the correlative overall cost, this paper also proposes a hierarchical cost model for analyzing the cost-effectiveness of selection level according to hierarchy step by step. The empirical studies show that our approach can reduce the total cost and achieve more cost-effective results.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123326496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Software Tag Generation System to Realize Software Traceability","authors":"Shinya Yamada, Masataka Ugumori, S. Kusumoto","doi":"10.1109/APSEC.2010.55","DOIUrl":"https://doi.org/10.1109/APSEC.2010.55","url":null,"abstract":"This paper describes a system that supports to generate the software tag which makes software development visible to software purchaser (users). A software tag is a partial set of empirical data about a software development project shared between the purchaser and developer. The purchaser uses the software tag to evaluate the software project, allowing them to recognize the quality level of the processes and products involved. In order to implement the mechanism to use the software tag effectively, it is necessary to support generating the software tag. We have implemented a system named Collect Tag that supports to collect data and generate the software tag. We conducted a case study to evaluate the usefulness of Collect Tag and generated software tag. The results show that using Collect Tag requires low cost to generate the software tag.","PeriodicalId":161686,"journal":{"name":"2010 Asia Pacific Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}