ESEC '97/FSE-5最新文献

筛选
英文 中文
Refining data flow information using infeasible paths 使用不可行的路径精炼数据流信息
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267921
R. Bodík, Rajiv Gupta, M. Soffa
{"title":"Refining data flow information using infeasible paths","authors":"R. Bodík, Rajiv Gupta, M. Soffa","doi":"10.1145/267895.267921","DOIUrl":"https://doi.org/10.1145/267895.267921","url":null,"abstract":"Experimental evidence indicates that large programs exhibit significant amount of branch correlation amenable to compile-time detection. Branch correlation gives rise to infeasible paths, which in turn make data flow information overly conservative. For example, def-use pairs that always span infeasible paths cannot be tested by any program input, preventing 100% def-use testing coverage. We present an algorithm for identifying infeasible program paths and a data flow analysis technique that improves the precision of traditional def-use pair analysis by incorporating the information about infeasible paths into the analysis. Infeasible paths are computed using branch correlation analysis, which can be performed either intra- or inter-procedurally. The efficiency of our technique is achieved through demand-driven formulation of both the infeasible paths detection and the def-use pair analysis. Our experiments indicate that even when a simple form of intraprocedural branch correlation is considered, more than 2% of def-use pairs in the SPEC95 benchmark programs can be found infeasible.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125098338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 130
Developing multimedia applications with the WinWin spiral model 使用win螺旋模型开发多媒体应用程序
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267899
B. Boehm, Alexander Egyed, Julie Kwan, R. Madachy
{"title":"Developing multimedia applications with the WinWin spiral model","authors":"B. Boehm, Alexander Egyed, Julie Kwan, R. Madachy","doi":"10.1145/267895.267899","DOIUrl":"https://doi.org/10.1145/267895.267899","url":null,"abstract":"Fifteen teams recently used the WinWin Spiral Model to perform the system engineering and architecting of a set of multimedia applications for the USC Library Information Systems. Six of the applications were then developed into an Initial Operational Capability. The teams consisted of USC graduate students in computer science. The applications involved extensions of USC's UNIX-based, text-oriented, client-server Library Information System to provide access to various multimedia archives (films, videos, photos, maps, manuscripts, etc.).","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A pattern-based application generator for building simulation 用于构建模拟的基于模式的应用程序生成器
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267927
Martin Schütze, Jan Peter Riegel, G. Zimmermann
{"title":"A pattern-based application generator for building simulation","authors":"Martin Schütze, Jan Peter Riegel, G. Zimmermann","doi":"10.1145/267895.267927","DOIUrl":"https://doi.org/10.1145/267895.267927","url":null,"abstract":"This paper describes a domain-specific software development method based on object-oriented modeling, design patterns, and code generation principles. The example domain is building simulation, however, the approach is general and may be applied to other domains as well. Patterns are used to describe how the simulation objects interact. Code-templates associated with every pattern are used to generate the final application code. The method can be applied to generate large families of customized application frameworks from variations of the models. This is particularly useful for domains where applications have to exist in individually tailored versions for every project.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"896 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126511776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A C++ data model supporting reachability analysis and dead code detection 支持可达性分析和死代码检测的c++数据模型
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267924
Y. Chen, E. Gansner, E. Koutsofios
{"title":"A C++ data model supporting reachability analysis and dead code detection","authors":"Y. Chen, E. Gansner, E. Koutsofios","doi":"10.1145/267895.267924","DOIUrl":"https://doi.org/10.1145/267895.267924","url":null,"abstract":"A software repository provides a central information source for understanding and reengineering code in a software project. Complex reverse engineering tools can be built by analyzing information stored in the repository without reparsing the original source code. The most critical design aspect of a repository is its data model, which directly affects how effectively the repository supports various analysis tasks. This paper focuses on the design rationales behind a data model for a C++ software repository that supports reachability analysis and dead code detection at the declaration level. These two tasks are frequently needed in large software projects to help remove excess software baggage, select regression tests, and support software reuse studies. The language complexity introduced by class inheritance, friendships, and template instantiations in C++ requires a carefully designed model to catch all necessary dependencies for correct reachability analysis. We examine the major design decisions and their consequences in our model and illustrate how future software repositories can be evaluated for completeness at a selected abstraction level. Examples are given to illustrate how our model also supports variants of reachability analysis: impact analysis, class visibility analysis, and dead code detection. Finally, we discuss the implementation and experience of our analysis tools on a C++ software project.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Security issues in distributed software 分布式软件中的安全问题
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267902
R. Kemmerer
{"title":"Security issues in distributed software","authors":"R. Kemmerer","doi":"10.1145/267895.267902","DOIUrl":"https://doi.org/10.1145/267895.267902","url":null,"abstract":"As more business activities are being automated and an increasing number of computers are being used to store vital and sensitive information the need for secure computer systems becomes more apparent. This need is even more apparent as the systems and applications are being distributed and access is via an insecure network. The security of these systems can be achieved only through systematic design; they can not be achieved through haphazard seat-of-the-pants methods.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128936613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Validating the defect detection performance advantage of group designs for software reviews: report of a laboratory experiment using program code 验证软件评审组设计的缺陷检测性能优势:使用程序代码的实验室实验报告
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267917
L. Land, C. Sauer, D. R. Jeffery
{"title":"Validating the defect detection performance advantage of group designs for software reviews: report of a laboratory experiment using program code","authors":"L. Land, C. Sauer, D. R. Jeffery","doi":"10.1145/267895.267917","DOIUrl":"https://doi.org/10.1145/267895.267917","url":null,"abstract":"It is widely accepted that software development technical reviews (SDTRs) are a useful technique for finding defects in software products. Recent debates centre around the need for review meetings (Porter and Votta 1994, Porter et al 1995, McCarthy et al 1996, Lanubile and Visaggio 1996). This paper presents the findings of an experiment that was conducted to investigate the performance advantage of interacting groups over average individuals and artificial (nominal) groups. We found that interacting groups outperform the average individuals and nominal groups. The source of performance advantage of interacting groups is not in finding defects, but rather in discriminating between true defects and false positives. The practical implication for this research is that nominal groups constitute an alternative review design in situations where individuals discover a low level of false positives.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Towards an adaptation of the COCOMO cost model to the software measurement theory COCOMO成本模型与软件度量理论的适应
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267932
A. Idri, B. Griech, A. E. Iraki
{"title":"Towards an adaptation of the COCOMO cost model to the software measurement theory","authors":"A. Idri, B. Griech, A. E. Iraki","doi":"10.1145/267895.267932","DOIUrl":"https://doi.org/10.1145/267895.267932","url":null,"abstract":"When the COCOMO cost model was published in the beginning of the eighties, software measurement was not grounded on solid theoretical foundations. This has been achieved until the nineties by Fenton and others. Thus, it is not surprising that some of the concepts defined or used in the COCOMO model are somewhat incompatible with the software measurement theory. In this work, we mainly stress some of the incompatibilities and propose alternaive ways to avoid them.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The design of a next-generation process language 下一代过程语言的设计
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267908
S. Sutton, L. Osterweil
{"title":"The design of a next-generation process language","authors":"S. Sutton, L. Osterweil","doi":"10.1145/267895.267908","DOIUrl":"https://doi.org/10.1145/267895.267908","url":null,"abstract":"Process languages remain a vital area of software process research. Among the important issue for process languages are semantic richness, ease of use, appropriate abstractions, process composability, visualization, and support for multiple paradigms. The need to balance semantic richness with ease of use is particularly critical. JIL addresses these issues in a number of innovative ways. It models processes in terms of steps with a rich variety of semantic attributes. The JIL control model combines proactive and reactive control, conditional control, and more simple means of control-flow modeling via step composition and execution constraints. JIL facilitates ease of use through semantic factoring, the accommodation of incomplete step specifications, the fostering of simple sub-languages, and the ability to support visualizations. This approach allows processes to be programmed in a variety of terms, and to a variety of levels of detail, according to the needs of particular processes, projects, and programmers.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
Making design patterns explicit in FACE: a frame work adaptive composition environment 在FACE中明确设计模式:一个框架工作自适应组合环境
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267905
T. Meijler, S. Demeyer, Robert Engel
{"title":"Making design patterns explicit in FACE: a frame work adaptive composition environment","authors":"T. Meijler, S. Demeyer, Robert Engel","doi":"10.1145/267895.267905","DOIUrl":"https://doi.org/10.1145/267895.267905","url":null,"abstract":"Tools incorporating design patterns combine the advantage of having a high-abstraction level of describing a system and the possibility of coupling these abstractions to some underlying implementation. Still, all current tools are based on generating source code in which the design patterns become implicit. After that, further extension and adaptation of the software is needed but this can no longer be supported at the same level of abstraction. This paper presents FACE, an environment based on an explicit representation of design patterns, sustaining an incremental development style without abandoning the higher-level design pattern abstraction. A visual composition tool for FACE has been developed in the Self programming language.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Generic fuzzy reasoning nets as a basis for reverse engineering relational database applications 通用模糊推理网络作为逆向工程关系数据库的基础应用
ESEC '97/FSE-5 Pub Date : 1997-11-01 DOI: 10.1145/267895.267911
J. Weber, Wilhelm Schäfer, Albert Zündorf
{"title":"Generic fuzzy reasoning nets as a basis for reverse engineering relational database applications","authors":"J. Weber, Wilhelm Schäfer, Albert Zündorf","doi":"10.1145/267895.267911","DOIUrl":"https://doi.org/10.1145/267895.267911","url":null,"abstract":"Object-oriented technology has become mature enough to satisfy many new requirements coming from areas like computer-aided design (CAD), computer-integrated manufacturing (CIM), or software engineering (SE). However, a competitive information management infrastructure often demands to merge data from CAD-, CIM-, or SE-systems with business data stored in a relational system. One approach for seamless integration of objectoriented and relational systems is to migrate from a relational to an objectoriented system. The first step in this migration process is reverse engineering of the legacy database. In this paper we propose a new graphical and executable language called Generic Fuzzy Reasoning Nets for modelling and applying reverse engineering knowledge. In particular, this language enables to define and analyse fuzzy knowledge which is usually all what is available when an existing database schema has to be reverse engineered into an object-oriented one. The analysis process is based on executing a fuzzy petri net which is parameterized with the fuzzy knowledge about a concrete database application.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132774540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信