Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.最新文献

筛选
英文 中文
The challenges of software engineering education 软件工程教育的挑战
C. Ghezzi, D. Mandrioli
{"title":"The challenges of software engineering education","authors":"C. Ghezzi, D. Mandrioli","doi":"10.1145/1062455.1062578","DOIUrl":"https://doi.org/10.1145/1062455.1062578","url":null,"abstract":"We discuss the technical skills that a software engineer should possess. We take the viewpoint of a school of engineering and put the software engineer's education in the wider context of engineering education. We stress both the common aspects that crosscut all engineering fields and the specific issues that pertain to software engineering. We believe that even in a continuously evolving field like software, education should emphasize principles and recognize what are the stable and long-lasting design concepts. Even though the more mundane technological solutions cannot be ignored, the students should be equipped with skills that allow them to dominate the evolution of technology.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125159231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 113
A framework of greedy methods for constructing interaction test suites 构建交互测试套件的贪婪方法框架
Renée C. Bryce, C. Colbourn, M. B. Cohen
{"title":"A framework of greedy methods for constructing interaction test suites","authors":"Renée C. Bryce, C. Colbourn, M. B. Cohen","doi":"10.1145/1062455.1062495","DOIUrl":"https://doi.org/10.1145/1062455.1062495","url":null,"abstract":"Greedy algorithms for the construction of software interaction test suites are studied. A framework is developed to evaluate a large class of greedy methods that build suites one test at a time. Within this framework are many instantiations of greedy methods generalizing those in the literature. Greedy algorithms are popular when the time for test suite construction is of paramount concern. We focus on the size of the test suite produced by each instantiation. Experiments are analyzed using statistical techniques to determine the importance of the implementation decisions within the framework. This framework provides a platform for optimizing the accuracy and speed of \"one-test-at-a-time\" greedy methods.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 133
Software architecture in an open source world 开源世界中的软件架构
R. Fielding
{"title":"Software architecture in an open source world","authors":"R. Fielding","doi":"10.1145/1062455.1062474","DOIUrl":"https://doi.org/10.1145/1062455.1062474","url":null,"abstract":"Summary form only given. In spite of the hype and hysteria surrounding open source software development, there is very little that can be said of open source in general. Open source projects range in scope from the miniscule, such as the thousands of non-maintained code dumps left behind at the end of class projects, dissertations, and failed commercial ventures, to the truly international, with thousands of developers collaborating, directly or indirectly, on a common platform. One characteristic that is shared by the largest and most successful open source projects, however, is a software architecture designed to promote anarchic collaboration through extensions while at the same time preserving centralized control over the interfaces. This paper features a survey of the state-of-the-practice in open source development in regards to software architecture, with particular emphasis on the modular extensibility interfaces within several of the most successful projects, including Apache httpd, Eclipse, Mozilla Firefox, Linux kernel, and the World Wide Web (which few people recognize as an open source project in itself). These projects fall under the general category of collaborative open source software development, which emphasizes community aspects of software engineering in order to compensate for the often-volunteer nature of core developers and take advantage of the scalability obtainable through Internet-based virtual organizations.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Emergent process design 应急流程设计
Olga Jaufman
{"title":"Emergent process design","authors":"Olga Jaufman","doi":"10.1145/1062455.1062587","DOIUrl":"https://doi.org/10.1145/1062455.1062587","url":null,"abstract":"The typical situation in software developing organizations can be characterized by two extremes: in some organizations or organizational units, software development processes are partly defined, whereas in organizations or organizational units where the processses are well defined, these processes are usually only valid at the project start. For design of a process that is able to fulfil the requirements, the author proposes an emergent process design (EPD) approach. The EPD approach guides the extraction and the adaptation of a project-specific process. This is done as follows. Initially, the project-specific process frame is extracted by tailoring one of the process variants provided in a process line. The first development is based on the tailored process frame. For further development iterations or projects that are to utilize this frame, the frame is adapted and refined to the project-specific process based on the logs of the performed tasks in the previous process iteration. In order to insure the desired quality of the final product, the project-specific process becomes more stringent over the course of the project.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying safety policies with size properties and alias controls 验证具有大小属性和别名控件的安全策略
W. Chin, Siau-Cheng Khoo, S. Qin, C. Popeea, Huu Hai Nguyen
{"title":"Verifying safety policies with size properties and alias controls","authors":"W. Chin, Siau-Cheng Khoo, S. Qin, C. Popeea, Huu Hai Nguyen","doi":"10.1145/1062455.1062500","DOIUrl":"https://doi.org/10.1145/1062455.1062500","url":null,"abstract":"Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typing) has been successfully applied to declarative programs, and to restricted imperative programs; but it has been elusive for object-based programs. The main challenge is that objects may mutate and they may be aliased. In this paper, we show how safety policies of programs can be analysed by tracking size properties of objects and be enforced by objects' invariants and the preconditions of methods. We propose several new ideas to allow both mutability and sharing of objects, whilst aiming for precision in our analysis. We introduce the concept of size-immutability to facilitate sharing, and also a set of alias controls to track unaliased objects whose size properties may change. We formalise our results through a set of advanced type checking rules for an object-based imperative language. We re-affirm the utility of the proposed type system by showing how a variety of software properties can be automatically verified according to size-inspired safety policies.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
SQL DOM: compile time checking of dynamic SQL statements SQL DOM:动态SQL语句的编译时检查
Russell A. McClure, Ingolf Krüger
{"title":"SQL DOM: compile time checking of dynamic SQL statements","authors":"Russell A. McClure, Ingolf Krüger","doi":"10.1145/1062455.1062487","DOIUrl":"https://doi.org/10.1145/1062455.1062487","url":null,"abstract":"Most object oriented applications that involve persistent data interact with a relational database. The most common interaction mechanism is a call level interface (CLI) such as ODBC or JDBC. While there are many advantages to using a CLI - expressive power and performance being two of the most key - there are also drawbacks. Applications communicate through a CLI by constructing strings that contain SQL statements. These SQL statements are only checked for correctness at runtime, tend to be fragile and are vulnerable to SQL injection attacks. To solve these and other problems, we present the SQL DOM: a set of classes that are strongly-typed to a database schema. Instead of string manipulation, these classes are used to generate SQL statements. We show how to extract the SQL DOM automatically from an existing database schema, demonstrate its applicability to solve the mentioned problems, and evaluate its performance.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114071150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 235
Monitoring and control in scenario-based requirements analysis 基于场景的需求分析中的监视和控制
Emmanuel Letier, J. Kramer, J. Magee, Sebastián Uchitel
{"title":"Monitoring and control in scenario-based requirements analysis","authors":"Emmanuel Letier, J. Kramer, J. Magee, Sebastián Uchitel","doi":"10.1145/1062455.1062527","DOIUrl":"https://doi.org/10.1145/1062455.1062527","url":null,"abstract":"Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the software-to-be and agents in the environment. Interactions correspond to the occurrence of an event that is controlled by one agent and monitored by another. This paper presents a technique to analyse requirements-level scenarios for unforeseen, potentially harmful, consequences. Our aim is to perform analysis early in system development, where it is highly cost-effective. The approach recognises the importance of monitoring and control issues and extends existing work on implied scenarios accordingly. These so-called input-output implied scenarios expose problematic behaviours in scenario descriptions that cannot be detected using standard implied scenarios. Validation of these implied scenarios supports requirements elaboration. We demonstrate the relevance of input-output implied scenarios using a number of examples.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
An empirical evaluation of test case filtering techniques based on exercising complex information flows 基于复杂信息流的测试用例过滤技术的经验评估
David Leon, Wes Masri, Andy Podgurski
{"title":"An empirical evaluation of test case filtering techniques based on exercising complex information flows","authors":"David Leon, Wes Masri, Andy Podgurski","doi":"10.1145/1062455.1062531","DOIUrl":"https://doi.org/10.1145/1062455.1062531","url":null,"abstract":"Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially important basis for filtering test cases. We report the results of an empirical evaluation of several test case filtering techniques that are based on exercising complex information flows. Both coverage-based and profile-distribution-based filtering techniques are considered. They are compared to filtering techniques based on exercising basic blocks, branches, function calls, and def-use pairs, with respect to their effectiveness for revealing defects.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125759046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
The software engineer and the development, management and use of intellectual property 软件工程师和知识产权的开发、管理和使用
H. B. Rockman, V. Khodosh
{"title":"The software engineer and the development, management and use of intellectual property","authors":"H. B. Rockman, V. Khodosh","doi":"10.1109/ICSE.2005.1553674","DOIUrl":"https://doi.org/10.1109/ICSE.2005.1553674","url":null,"abstract":"This full day tutorial will offer instruction on patent, copyright, trade secret and other intellectual property issues faced by developers and users of software in protecting their innovations, including information on avoiding infringing the intellectual property rights of others in the software development process. The course is directed to conference attendees who are involved in any aspect of the development, management or use of intellectual property, including those in the private sector, universities and government. The course will be presented at a basic and understandable, level tailored for the software engineer audience. The course will comprise an oral presentation of nine (9) 30-35 minute segments, with 10 minute breaks for refreshments and specific attendee questions. The instructors will remain available for questions from attendees during breaks. Answers to questions will also be provided during each session. Power Point slides will be used, and actual anecdotal experiences will be presented to illustrate important points.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129478228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assurance patterns for distributed real-time embedded systems 分布式实时嵌入式系统的保证模式
S. Konrad
{"title":"Assurance patterns for distributed real-time embedded systems","authors":"S. Konrad","doi":"10.1145/1062455.1062591","DOIUrl":"https://doi.org/10.1145/1062455.1062591","url":null,"abstract":"Recently, there has been a significant increase in demand for distributed real-time embedded systems (DREs). As the demand for DREs has increased, so has the complexity of these systems, thus prompting the need for more rigorous, repeatable, and cost-effective development techniques. We propose to make several contributions in the rigorous development of DREs: object analysis patterns, specification patterns, and an integrated modeling and analysis approach for the formal analysis of DRE system models. These contributions are presented collectively as assurance patterns that emphasize the analysis phase of DREs, with the intent of preventing and detecting errors in the early stages of development prior to coding and fabrication. Industrial projects play a major role in validating our techniques.","PeriodicalId":217879,"journal":{"name":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信