N. Yusop, Jean-Guy Schneider, J. Grundy, Rajesh Vasa
{"title":"What Influences Usability Defect Reporting? — A Survey of Software Development Practitioners","authors":"N. Yusop, Jean-Guy Schneider, J. Grundy, Rajesh Vasa","doi":"10.1109/APSEC.2016.014","DOIUrl":"https://doi.org/10.1109/APSEC.2016.014","url":null,"abstract":"Software development organizations invest in test automation tools and methods to optimize defect discovery rates. The true value of these tools is realized when the defects are addressed before release, and hence good quality defect reports are critical. We describe a survey we conducted to better understand usability defect reporting, in particular, influences on the quality of usability defect reports. We analyze feedback from nearly 150 software developers and usability defect reporters and identify key determinants of quality defect reports, aspects of usability defects that are challenging to report and directions for future research into usability defect reporting tools to improve usability defect reports quality.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129506805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suhyun Kim, Hyungjong Lee, Y. kwon, Myeong-Hwan Yu, Hyeeun Jo
{"title":"Our Journey to Becoming Agile: Experiences with Agile Transformation in Samsung Electronics","authors":"Suhyun Kim, Hyungjong Lee, Y. kwon, Myeong-Hwan Yu, Hyeeun Jo","doi":"10.1109/APSEC.2016.064","DOIUrl":"https://doi.org/10.1109/APSEC.2016.064","url":null,"abstract":"For traditional consumer electronics companies, it is important that requirements are clearly described and design based on the requirement analysis is well-defined in the early phases of a project, because well-defined design and interfaces guarantee that all necessary tasks for the project are identified and assigned to the appropriate teams to maximize the constructive interactions among multiple teams. There are several benefits to this; however, there are also some weaknesses. Changing or adding features are usually not permitted, and 'organizational silos' that decrease efficient cooperation among teams are inadvertently formed. We thought that our company could overcome these weaknesses using agile development methodologies, so we decided to transform our organization to become more agile from being reliant on traditional development process. In this paper, we describe our efforts to achieve this agile transformation including our road map, process revision, master plan to adopt engineering practices, cross functional team formations, and cultivation of an agile culture.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127615081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yao Wang, Yiying Ng, Hucheng Zhou, Yuan Dong, Zhiyuan Ji
{"title":"The Improvement of the Trustworthiness of Android App Stores in China","authors":"Yao Wang, Yiying Ng, Hucheng Zhou, Yuan Dong, Zhiyuan Ji","doi":"10.1109/APSEC.2016.059","DOIUrl":"https://doi.org/10.1109/APSEC.2016.059","url":null,"abstract":"The absence of Google Play has created a booming area for Android app distribution through third-party app stores in China. Since the study showed that the trustworthy level of app stores was fairly low in 2014, much attention should be paid on the changes of the trustworthiness of Android app stores. In this paper, we present a method to analyze the changes of trustworthiness of the top popular Android app stores in China. In this method, we evaluate the target app stores by analyzing the sampled apps hosted in them. Further more, we have used this method to track the changes of trustworthy level of Android app stores in China about two years. The results indicate that the trustworthy level of the top popular Android app stores in China has been improved 24% on average. It can be seen that the positive changes may be related to the development of the China's mobile market, the improvement of Android system, and the introduced policies. Although the trustworthy level of top popular Android app stores in China is still low, it is predicted to be improving in the future.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130692138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Find your Open Source License Now!","authors":"G. Kapitsaki, G. Charalambous","doi":"10.1109/APSEC.2016.012","DOIUrl":"https://doi.org/10.1109/APSEC.2016.012","url":null,"abstract":"Open Source software is widely used from end-users, software engineers and researchers. The license that accompanies such software is very important for its further use and distribution. However, engineers and researchers are many times not able to choose the appropriate license based on the purpose of the product under development due to the lack of sufficient information on the specifics of each license. In this work, we are addressing the above issue by introducing findOSSLicense that recommends appropriate licenses to users. We are employing a hybrid recommendation using constraint-based, content-based and collaborative approaches. Licenses are recommended based on user needs, on the licenses found in similar open source projects and on the licenses used by similar users. A three-phase process that considers different sources of information is used. We have evaluated findOSSLicense using its initial set of users. The results demonstrate the usefulness of findOSSLicense in the license guiding process.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132259572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compositional Symbolic Execution: Incremental Solving Revisited","authors":"Yude Lin, Tim Miller, H. Søndergaard","doi":"10.1109/APSEC.2016.046","DOIUrl":"https://doi.org/10.1109/APSEC.2016.046","url":null,"abstract":"Symbolic execution can automatically explore different execution paths in a system under test and generate tests to precisely cover them. It has two main advantages—being automatic and thorough within a theory—and has many successful applications. The bottleneck of symbolic execution currently is the computation consumption for complex systems. Compositional Symbolic Execution (CSE) introduces a summarisation module to eliminate the redundancy in the exploration of repeatedly encountered code. In our previous work, we generalised the summarisation for any code fragments instead of functions. In this paper, we transplant this idea onto LLVM with many additional features, one of them being the use of incremental solving. We show that the combination of CSE and incremental solving is mutually beneficial. The obvious weakness of CSE is the lack of context during summarisation. We discuss the use of assumption-based features, available in modern constraint solvers, as a way to overcome this problem.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114085317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Achieving High Code Coverage in Android UI Testing via Automated Widget Exercising","authors":"Y. Arnatovich, M. Ngo, Hee Beng Kuan Tan, C. Soh","doi":"10.1109/APSEC.2016.036","DOIUrl":"https://doi.org/10.1109/APSEC.2016.036","url":null,"abstract":"Automated functional user interface (UI) testing of mobile apps is a challenging task due to the highly interactive nature of the app UIs, and thus it commonly fails to provide high code coverage. In this paper, we present DroidDEV, an automated UI exerciser which aims to achieve high code coverage for real-world Android apps. DroidDEV dynamically builds a finite UI flow graph, generates and injects UI-context-aware inputs to exercise all the widgets on all the UI screens through a best-first search path finding algorithm. We have evaluated DroidDEV on 20 real-world open-source Android apps and compared it with manual UI testing and two other prevalent automated approaches including MobiGUITAR and Monkey. On these subjects, DroidDEV reports code coverage similar to manual UI testing, and it outperforms MobiGUITAR and Monkey in terms of code coverage and exercising time.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RE_PROV: Modeling Requirement Provenance with PROV","authors":"Yangfan He, Xiaojian Li","doi":"10.1109/APSEC.2016.069","DOIUrl":"https://doi.org/10.1109/APSEC.2016.069","url":null,"abstract":"Requirements are complex by nature. When describing something that has not been realized, users may find it difficult to interpret it accurately. Many problems cannot be discovered until some abstract concepts become concrete and some details have been confirmed. So checking the origination and processing history of the requirements and making adjustments are very normal practice. Requirement provenance records which have well-defined syntax and explicit semantics can provide solid support for requirement traceability analysis. By setting up the mapping between PROV and a typical requirement framework, this paper proposes RE_PROV, a novel model for the description of requirement provenance. The rationales of the mapping are explained and a comprehend example of an embedded software design is provided to show possible usage.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Schemata, Acculturation, and Cognition: Expatriates in Japan’s Software Industry","authors":"W. Baber, Arto Ojala","doi":"10.1109/APSEC.2016.054","DOIUrl":"https://doi.org/10.1109/APSEC.2016.054","url":null,"abstract":"This multiple case based empirical study expands the knowledge around North American software and IT workers in Japan as well as the expatriate literature and discussion of cognitive schemata in cross cultural settings. The study includes eleven individuals, nine of them in software. Evidence of selection, rejection, and adjustment of cognitive schemata found in Japan's business world is presented. Changes in schemata drive cultural adjustment and acculturation. North American software and IT workers in Japan must maneuver through unfamiliar and often complex schemata to motivate, lead, manipulate, and communicate with coworkers and partners and thereby gain success.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"117 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132494414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Task Recommendation with Developer Social Network in Software Crowdsourcing","authors":"Ning Li, Wenkai Mo, Beijun Shen","doi":"10.1109/APSEC.2016.013","DOIUrl":"https://doi.org/10.1109/APSEC.2016.013","url":null,"abstract":"Recently, crowdsourcing has been increasingly used in software industry to lower costs and increase innovations, by utilizing experiences, labor, or creativity of developers worldwide. In software crowdsourcing platforms, developers expect to find suitable tasks for their interests and abilities. So it is significant for software crowdsourcing to build a recommender system to match developers with suitable tasks. However, there are a significant number of inactive developers who have very sparse historical behavior records in the platform, and thus state-of-the-art recommendation approaches in software crowdsourcing, such as collaborative filtering, suffer from this cold-start problem. In this paper, a social influence-based method is proposed to recommend suitable tasks for both active and inactive developers. The essential idea of the novel method is (1) to construct developer social network from developer behaviors, such as browsing and bidding for tasks, (2) to calculate the influence degrees between developers using developer social network, (3) to recommend tasks to active developers using SiSVD, and (4) to recommend tasks to inactive developers by combining the recommended tasks of their friends. We have evaluated our method on a large real data set from the JointForce, a popular software crowdsourcing platform in China. The results show that our method is feasible and practical for recommendation in software crowdsourcing. In particular, the F1-Measure of our method for inactive developers with task-bidding friends is increased by 16.7% than other previous approaches averagely.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117162961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-Based API-Call Constraint Checking for Automotive Control Software","authors":"Dongwoo Kim, Yoohee Chung, Yunja Choi","doi":"10.1109/APSEC.2016.039","DOIUrl":"https://doi.org/10.1109/APSEC.2016.039","url":null,"abstract":"Operating systems for embedded software publish a set of API functions together with a set of API-call constraints that have to be followed by application software running on the OS. If the embedded software is controlling safety-critical systems, a violation of those constraints may be a source of massive property damage or human injury. As a light-weight support for pre-checking such constraints during the development of embedded software, this work presents an API-call constraint checker for automotive control software. The checker converts application source code into formal models and checks violations of a set of pre-defined constraint patterns from OSEK/VDX international standard using model checker NuSMV. It is capable of checking local constraints within a task as well as global constraints involving task scheduling without suffering from false/missed alarms, by using formal models of the underlying operating system. We demonstrate the efficiency and effectiveness of the checker through comparative experiments with our previous checker which did not use the formal OS model.","PeriodicalId":339123,"journal":{"name":"2016 23rd Asia-Pacific Software Engineering Conference (APSEC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125548949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}