2015 24th Australasian Software Engineering Conference最新文献

筛选
英文 中文
Software Architecture Decision-Making Practices and Challenges: An Industrial Case Study 软件架构决策实践和挑战:一个工业案例研究
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.20
Sandun Dasanayake, Jouni Markkula, Sanja Aaramaa, M. Oivo
{"title":"Software Architecture Decision-Making Practices and Challenges: An Industrial Case Study","authors":"Sandun Dasanayake, Jouni Markkula, Sanja Aaramaa, M. Oivo","doi":"10.1109/ASWEC.2015.20","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.20","url":null,"abstract":"Software architecture decision-making is critical to the success of a software system as software architecture sets the structure of the system, determines its qualities, and has far-reaching consequences throughout the system life cycle. The complex nature of the software development context and the importance of the problem has led the research community to develop several techniques, tools, and processes to assist software architects in making better decisions. Despite these effort, the adoption of such systematic approaches appears to be quite limited in practice. In addition, the practitioners are also facing new challenges as different software development methods suggest different approaches for architecture design. In this paper, we study the current software architecture decision-making practices in the industry using a case study conducted among professional software architects in three different companies in Europe. As a result, we identified different software architecture decision-making practices followed by the software teams as well as their reasons for following them, the challenges associated with them, and the possible improvements from the software architects' point of view. Based on that, we recognized that improving software architecture knowledge management can address most of the identified challenges and would result in better software architecture decision-making.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
UNISON: Towards a Middleware Architecture for Autonomous Cyber Defence 面向自主网络防御的中间件架构
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.29
Michael Docking, Anton V. Uzunov, Chris Fiddyment, Richard Brain, Scott Hewett, L. Blucher
{"title":"UNISON: Towards a Middleware Architecture for Autonomous Cyber Defence","authors":"Michael Docking, Anton V. Uzunov, Chris Fiddyment, Richard Brain, Scott Hewett, L. Blucher","doi":"10.1109/ASWEC.2015.29","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.29","url":null,"abstract":"The ability of cyber defence systems to support rich sensing, fast response, intelligent decision making and a high degree of autonomy places many demands on the functionality of supporting middleware platforms, necessitating, for example, flexible data persistence that does not rely on dedicated resource pools, as well as reliable, decentralized communications. In this paper we describe the UNISON middleware architecture, which seeks to provide such functionality in the form of loosely-coupled, distributed publish/subscribe messaging, distributed key-value data persistence, and basic local component control. Taken in isolation, the individual parts of UNISON encompass features already present in existing systems and infrastructures, however, UNISON combines these into a consistent whole, providing data storage/distribution and messaging/control in a simple, light-weight and unified fashion. We have prototyped UNISON as a self-standing middleware platform, and have used the resulting prototype to support a (similarly prototypical) generic, autonomous cyber defence system from DST Group's HINDER project. We discuss our experiences with UNISON in the context of this system. As the UNISON architecture is still work in progress, our aim in this paper is to describe its current state, with the belief that the underlying design decisions will provide valuable insight when attempting to design related software infrastructures for supporting cyber defence systems.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130286131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Does Detecting more Defects Contribute to Better Estimation? An Empirical Investigation to the Capture-Recapture Method 检测更多的缺陷是否有助于更好的评估?“捕获-再捕获”方法的实证研究
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.35
Guoping Rong, He Zhang, Dong Shao
{"title":"Does Detecting more Defects Contribute to Better Estimation? An Empirical Investigation to the Capture-Recapture Method","authors":"Guoping Rong, He Zhang, Dong Shao","doi":"10.1109/ASWEC.2015.35","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.35","url":null,"abstract":"Capture-recapture method is a promising technique to estimate post-inspection residual defects in the inspected software artifacts. Since decisions such as whether a re-inspection is required usually rely on the estimated number of undiscovered defects, accuracy of the capture-recapture estimates hence become one of the critical factors impacting the decisions. Among many attempts to improve the accuracy of the capture-recapture estimates, most believe (implicitly or explicitly) that an effective approach to improve the estimation accuracy is to increase inspectors' capability to detect more defects. However, few empirical evidence has been reported to support this claim. For most capture-recapture estimators, the correlation is not crystal clear between the number of detected defects and the estimation accuracy. Therefore, it is necessary to empirically evaluate this claim so as to support the rationale that inspectors improve their capability on detecting more defects in order to achieve a higher estimation accuracy. We carried out an empirical study to investigate the relationship between the estimation accuracy (represented by Relative Error) and the percentage of the number of unique defects to the total number of seeded defects (denoted by Detection Rate). Results indicate that the above claim can be safely accepted in most cases, which supports the attempts to increasing capture-recapture estimation accuracy by improving inspectors' detection capability. However, there still could be chances that the strategy to improve estimation accuracy may fail, which implies that more strategies should be explored to improvement the application of the capture-recapture method.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Datalog Source-to-Source Translator for Static Program Analysis: An Experience Report 一个用于静态程序分析的数据源到源转换器:一份经验报告
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.15
Bernhard Scholz, Kostyantyn Vorobyov, P. Krishnan, T. Westmann
{"title":"A Datalog Source-to-Source Translator for Static Program Analysis: An Experience Report","authors":"Bernhard Scholz, Kostyantyn Vorobyov, P. Krishnan, T. Westmann","doi":"10.1109/ASWEC.2015.15","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.15","url":null,"abstract":"Static program analysis has many applications including bug checking for large scale code that requires a points-to analysis. To express static program analysis frameworks concisely, it is advantageous to employ a domain-specific language. In the last two decades, Data log has emerged as a domain-specific language for static program analysis. However, existing Data log systems have problems solving large scale code with millions of program variables. This work reports on techniques that translate a Data log program to SQL queries, which are executed on a relational database system. The advantage of a relational database system as an execution platform is the effective use of memory and disks. Further, we can also use an off-the shelf tool to execute the SQL queries. In order to achieve performance, we explore some of the design choices for a source-to-source translation from Data log to SQL that implement stratified negations, totally ordered domains, and comparisons. For each design point, we explain how Data log can be efficiently translated to SQL using the semi-naive evaluation approach. We report the results of our experiments using large data-sets including the OpenJDK7-b147 dataset for points-to, which guided us in the design of our translation schemes.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128697479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Learning Enterprise Agile Software Engineering: Scaling Agility at the Enterprise Level 学习企业敏捷软件工程:在企业层面扩展敏捷性
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.26
A. Gill
{"title":"Learning Enterprise Agile Software Engineering: Scaling Agility at the Enterprise Level","authors":"A. Gill","doi":"10.1109/ASWEC.2015.26","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.26","url":null,"abstract":"Agile software engineering practices, originated in the context of individual software project development, are getting vast attention from enterprises for handling multiple agile software engineering projects at a large program and portfolio level. Adoption of agility at a large scale is a challenging task. The success of agility adoption at a large scale is dependent on the knowledge and skills of people involved. This suggests that agile software engineering education and training remains one of the important factors for organizations pursuing to scale agile practices for large environments. However, the teaching of agile software engineering practices for a large scale poses many challenges to software engineering educators. These difficulties include how to establish and simulate an appropriate large scale software engineering environment. This paper presents learnings from teaching agile software engineering practices for large scale at the University of Technology - Sydney (UTS), Australia. The learnings from this paper can be used by other educators who are aiming to teach enterprise scale agile software engineering practices.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114291146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lexical Parsing Expression Recognition Schemata 词汇解析表达式识别模式
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.27
M. Lumpe
{"title":"Lexical Parsing Expression Recognition Schemata","authors":"M. Lumpe","doi":"10.1109/ASWEC.2015.27","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.27","url":null,"abstract":"Parsing expression grammars (PEGs) have emerged as a promising substitute for context-free grammars (CFGs) and regular expressions (REs) in programming language specification. The benefits of PEGs are twofold. First, parsing expression grammars replace unordered choice between alternatives by prioritized choice, which naturally solves the ubiquitous \"dangling else\" problem in grammar definitions. Second, PEGs employ \"character-level syntax\" specifications that eliminate the need to separate the lexical and hierarchical components of a language specification. However, there is \"no free lunch\" in PEGs. PEGs capture only syntactic relationships, but many language constructs cannot be parsed without additional semantic information. Moreover, character-level specifications can become unwieldy, as every aspect of the language, including spacing, has to be accounted for. To overcome these issues, we extend the original PEG formalism to incorporate semantic predicates that yield a programmatic means for state-based token recognition control. Furthermore, rather than requiring a single complete specification, we capture lexical components as PEG closures that provide a self-contained token recognition mechanism to reduce the clutter associated with purely character-level PEGs. To test the effectiveness of our approach, we use it for the construction of a Delphi language front-end and practically confirm that Ford's theoretical linear-time result also holds for PEG closures.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Runtime Recovery Actions Selection for Sporadic Operations on Cloud 云上零星操作的运行时恢复操作选择
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.33
Min Fu, Liming Zhu, Daniel W. Sun, Anna Liu, L. Bass, Q. Lu
{"title":"Runtime Recovery Actions Selection for Sporadic Operations on Cloud","authors":"Min Fu, Liming Zhu, Daniel W. Sun, Anna Liu, L. Bass, Q. Lu","doi":"10.1109/ASWEC.2015.33","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.33","url":null,"abstract":"Sporadic operations such as rolling upgrade or machine instance redeployment are prone to unpredictable failures in the cloud largely due to the inherent high variability nature of cloud. Previous dependability research has established several recovery methods for cloud failures. In this paper, we first propose eight recovery patterns for sporadic operations. We then present the filtering process which filters applicable recovery patterns for a given operational step. We also propose a methodology to evaluate the recovery actions generated for the applicable recovery patterns based on the metrics of Recovery Time, Recovery Cost and Recovery Impact. This quantitative evaluation will lead to selection of optimal recovery actions. We implement a recovery service and illustrate its applicability by recovering from errors occurring in Asgard rolling upgrade operation on cloud. The experimental results show that the recovery service enhances automated recovery from operational failures by selecting the optimal recovery actions.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130306376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Non-functional Requirements Based Model-Driven Agent Development 基于模型驱动Agent开发的动态非功能需求
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.24
Joshua Z. Goncalves, A. Krishna
{"title":"Dynamic Non-functional Requirements Based Model-Driven Agent Development","authors":"Joshua Z. Goncalves, A. Krishna","doi":"10.1109/ASWEC.2015.24","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.24","url":null,"abstract":"The Belief-Desire-Intention (BDI) agent model is one of the more favoured models used to develop various agents due to both its flexibility and conceptual adaptability. This is mainly with regards to its ability to distinguish between a series of plans through a tailored plan selection function such that the plan most suitable to the current situation is selected. Since BDI agents were first proposed however, their creation process has mainly been entirely functional. This means that in order to properly implement them, specific expertise and knowledge is required. In sight of this, we propose in this paper an entirely model-driven approach based on the Extended Non-Functional Requirements framework. This approach allows agents to be directly derived from an accompanying extended NFR-framework model. The developer therefore only requires knowledge and expertise in this specific framework, which is significantly easier to understand. This derived agent can then select plans from the model's entities with respect to their hierarchy, and influenced by any contributions that they may make, selecting plans which exhibit the highest benefit to the overall system. This model-driven approach is focused on operating within a dynamic environment, which to our knowledge, is the first of its kind. This approach is evaluated experimentally.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Code Comprehension Activities in Undergraduate Software Engineering Course - A Case Study 软件工程本科课程中的代码理解活动-个案研究
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.18
Saikrishna Sripada, Y. R. Reddy
{"title":"Code Comprehension Activities in Undergraduate Software Engineering Course - A Case Study","authors":"Saikrishna Sripada, Y. R. Reddy","doi":"10.1109/ASWEC.2015.18","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.18","url":null,"abstract":"In industry, inspections, reviews, and refactoring are considered as necessary software engineering activities for enhancing quality of code. In academia, such activities are rarely taught and practiced at Undergraduate level due to various reasons like limited skill set, limited knowledge of the available tools, time constraints, project setting, project client availability, flexibility with Syllabus, etc. However, we argue that such activities are an essential part of introductory software engineering courses and can result in improvement of coding skills, knowledge of coding standard and compliance to the same, and peer communication within teams. We have studied the use of such activities in a sophomore level Software Engineering course consisting of more than 200 students working in teams on projects from start-ups and present our experiences, findings and challenges. We present the results of quantitative evaluation of the impact of code comprehension activities before and after each iteration of the team projects.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127291706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Satisfying the Android OS Community: User Feedback Still Central to Developers' Portfolios 满足Android OS社区:用户反馈仍然是开发者投资组合的核心
2015 24th Australasian Software Engineering Conference Pub Date : 2015-09-28 DOI: 10.1109/ASWEC.2015.19
Sherlock A. Licorish, Amjed Tahir, M. Bosu, Stephen G. MacDonell
{"title":"On Satisfying the Android OS Community: User Feedback Still Central to Developers' Portfolios","authors":"Sherlock A. Licorish, Amjed Tahir, M. Bosu, Stephen G. MacDonell","doi":"10.1109/ASWEC.2015.19","DOIUrl":"https://doi.org/10.1109/ASWEC.2015.19","url":null,"abstract":"End-users play an integral role in identifying requirements, validating software features' usefulness, locating defects, and in software product evolution in general. Their role in these activities is especially prominent in online application distribution platforms (OADPs), where software is developed for many potential users, and for which the traditional processes of requirements gathering and negotiation with a single group of end-users do not apply. With such vast access to end-users, however, comes the challenge of how to prioritize competing requirements in order to satisfy previously unknown user groups, especially with early releases of a product. One highly successful product that has managed to overcome this challenge is the Android Operating System (OS). While the requirements of early versions of the Android OS likely benefited from market research, new features in subsequent releases appear to have benefitted extensively from user reviews. Thus, lessons learned about how Android developers have managed to satisfy the user community over time could usefully inform other software products. We have used data mining and natural language processing (NLP) techniques to investigate the issues that were logged by the Android community, and how Google's remedial efforts correlated with users' requests. We found very strong alignment between end-users' top feature requests and Android developers' responses, particularly for the more recent Android releases. Our findings suggest that effort spent responding to end-users' loudest calls may be integral to software systems' survival, and a product's overall success.","PeriodicalId":310799,"journal":{"name":"2015 24th Australasian Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信