2014 21st Asia-Pacific Software Engineering Conference最新文献

筛选
英文 中文
API Document Quality for Resolving Deprecated APIs 解决弃用API的API文档质量
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.87
Deokyoon Ko, Kyeongwook Ma, S. Park, Suntae Kim, Dongsun Kim, Yves Le Traon
{"title":"API Document Quality for Resolving Deprecated APIs","authors":"Deokyoon Ko, Kyeongwook Ma, S. Park, Suntae Kim, Dongsun Kim, Yves Le Traon","doi":"10.1109/APSEC.2014.87","DOIUrl":"https://doi.org/10.1109/APSEC.2014.87","url":null,"abstract":"Using deprecated APIs often results in security vulnerability or performance degradation. Thus, invocations to deprecated APIs should be immediately replaced by alternative APIs. To resolve deprecated APIs, most developers rely on API documents provided by service API libraries. However, the documents often do not have sufficient information. This makes many deprecated API usages remain unresolved, which leads programs to vulnerable states. This paper reports a result of studying document quality for deprecated APIs. We first collected 260 deprecated APIs of eight Java libraries as well as the corresponding API documents. These documents were manually investigated to figure out whether it provides alternative APIs, rationales, or examples. Then, we examined 2,126 API usages in 249 client applications and figured out whether those were resolved in the subsequent versions. This study revealed that 1) 3.6 APIs was deprecated and 3.6 deprecated APIs are removed from the library a month on average, 2) only 61% of API documents provided alternative APIs while rationale and examples were rarely documented, and 3) 62% of deprecate API usages in client applications were resolved if the corresponding API documents provided alternative APIs while 49% were resolved when the documents provided no alternative APIs. Based on these results, we draw future directions to encourage resolving deprecated APIs.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123052704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A CMMI-Based Automated Risk Assessment Framework 基于cmmi的自动化风险评估框架
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.95
Morakot Choetkiertikul, K. Dam, A. Ghose, T. Sunetnanta
{"title":"A CMMI-Based Automated Risk Assessment Framework","authors":"Morakot Choetkiertikul, K. Dam, A. Ghose, T. Sunetnanta","doi":"10.1109/APSEC.2014.95","DOIUrl":"https://doi.org/10.1109/APSEC.2014.95","url":null,"abstract":"Risk assessment is crucial to the increase of software development project success. Current risk assessment approaches provide only a rough guide. Risk assessment experts and domain experts are required in conducting risk assessments in software projects. Therefore, traditional risk assessment approaches require extra activities besides development tasks, and possibly leading to extra costs. We believe that an effective risk assessment approach should be transparently embedded in software development process. This paper aims to present an automated risk assessment framework using CMMI and risk taxnomy as a guidance to develop a risk assessment model. A pragmatic approach will be applied as a basis in building this suggested risk prediction model and the case studies of our practice. These studies are considered as our proof of concept.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Verifying Secure Interface Composition for Component-Based System Designs 基于组件的系统设计安全接口组成的验证
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.60
Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma
{"title":"Verifying Secure Interface Composition for Component-Based System Designs","authors":"Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma","doi":"10.1109/APSEC.2014.60","DOIUrl":"https://doi.org/10.1109/APSEC.2014.60","url":null,"abstract":"Information flow security has been considered as a critical requirement on software systems, especially when heterogeneous components from different parties cooperate to achieve end-to-end enforcement on data confidentiality. Enforcing the information flow security properties on complicated systems faces a great challenge because the properties cannot be preserved under composition and most of the current approaches are not scalable enough. To address this problem, there have been several recent efforts on the compositional information flow analyses developed for different abstraction levels. But these approaches have rarely been considered to incorporate with the process of system design. Integrating the security enforcement with the model-based development process can provide the designer with ability to verify information flow security in the early stage of system development. We propose a compositional information flow verification which is integrated with model-based system design in Sys ML by an automated model translation from semi-formal behavior and structure models to interface automata. Our compositional approach is general to support the complex security lattices and a variety of in distinguish ability relations. The evaluation results show the usability of our approach on practical system designs and the scalability of the compositional verification.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126888497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Recovery of Object Oriented Features from C++ Binaries 从c++二进制文件中恢复面向对象的特性
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.44
Kyungjin Yoo, R. Barua
{"title":"Recovery of Object Oriented Features from C++ Binaries","authors":"Kyungjin Yoo, R. Barua","doi":"10.1109/APSEC.2014.44","DOIUrl":"https://doi.org/10.1109/APSEC.2014.44","url":null,"abstract":"Reverse engineering is the process of examining and probing a program to determine the original design. Over the past ten years researchers have produced a number of capabilities to explore, manipulate, analyze, summarize, hyperlink, synthesize, componentize, and visualize software artifacts. Many reverse engineering tools focus on non-object-oriented software binaries with the goal of transferring discovered information into the software engineers trying to reengineer or reuse it. In this paper, we present a method that recovers object-oriented features from stripped C++ binaries. We discover RTTI information, class hierarchies, member functions of classes, and member variables of classes. The information obtained can be used for reengineering legacy software, and for understanding the architecture of software systems. Our method works for stripped binaries, i.e., Without symbolic or relocation information. Most deployed binaries are stripped. We compare our method with the same binaries with symbolic information to measure the accuracy of our techniques. In this manner we find our methods are able to identify 80% of virtual functions, 100% of the classes, 78% of member functions, and 55% of member variables from stripped binaries, compared to the total number of those artifacts in symbolic information in equivalent non-stripped binaries.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121575801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
pIML -- An Interrupt Program Modelling Language for Real-Time and Embedded Systems 一种实时和嵌入式系统的中断程序建模语言
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.21
X. Li, Yanhong Huang, Jianqi Shi, Jian Guo, Huibiao Zhu, Yuanmin Xu
{"title":"pIML -- An Interrupt Program Modelling Language for Real-Time and Embedded Systems","authors":"X. Li, Yanhong Huang, Jianqi Shi, Jian Guo, Huibiao Zhu, Yuanmin Xu","doi":"10.1109/APSEC.2014.21","DOIUrl":"https://doi.org/10.1109/APSEC.2014.21","url":null,"abstract":"In the design of dependable software for real-time and embedded systems, the quantitative analysis of program behavior and system performance is a crucial but extremely difficult issue, the challenge of which is exacerbated due to the random city and nondeterminism of interrupt events and the corresponding handling behaviors. Moreover, time analysis is also need to be taken into account for such kinds of systems. Thus the research on a theory which integrates interrupt behaviors and time analysis seems to be important and challenging. In this paper, we propose an interrupt modeling language pIML including the probabilistic feature to describe the programs with interrupts. We explore a probabilistic operational semantics to depict the actions of pIML. Meanwhile, we also implement this operational semantics we proposed on Maude platform, which fill the gap between the theory and practice. Maude supports rewriting logic, equational logic, and etc. The rewrite rules of rewriting logic can very well implement the transition rules of probabilistic operational semantics. Based on this implementation, it is very convenient to simulate the program written in pIML and analyze the behaviors of program in the presence of interrupts quantitatively.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What Community Contribution Pattern Says about Stability of Software Project? 社区贡献模式对软件项目的稳定性有何影响?
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.88
Ayushi Rastogi, A. Sureka
{"title":"What Community Contribution Pattern Says about Stability of Software Project?","authors":"Ayushi Rastogi, A. Sureka","doi":"10.1109/APSEC.2014.88","DOIUrl":"https://doi.org/10.1109/APSEC.2014.88","url":null,"abstract":"Free/Libre Open Source Software (FLOSS) community management is an important issue. Contributor churn (joining or leaving a project) causes failure of the majority of software projects. In this paper, we present a framework to characterize stability of the community in software maintenance projects by mining Issue Tracking System (ITS). We identify key stability indicators and propose metrics to measure them. We conduct time series analysis on metrics data to examine the stability of the community. We model community participation patterns and forecast future behavior to help plan and support informed decision making. We present a case study of four years data of Google Chromium Project and investigate the inferential ability of the framework.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Goal-Oriented Design Methodology of IT-Driven Business Architecture 面向目标的it驱动业务架构设计方法
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.83
Masahiro Ide, Tomoko Kishida, M. Aoyama, Yasuhiro Kikushima
{"title":"A Goal-Oriented Design Methodology of IT-Driven Business Architecture","authors":"Masahiro Ide, Tomoko Kishida, M. Aoyama, Yasuhiro Kikushima","doi":"10.1109/APSEC.2014.83","DOIUrl":"https://doi.org/10.1109/APSEC.2014.83","url":null,"abstract":"We propose a design methodology of IT-driven business architecture to realize the business model utilizing information technology. As a component technology, they propose a business architecture design method using the goal model. A business goal to be met in business and a system goal to be met by system for business goal meet are defined. This study proposes a design methodology of business architecture and system architecture to meet business goal. The authors apply the proposed method to the case of mobile music delivery business and evaluate its effectiveness.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Next Changes at the Fine-Grained Level 在细粒度级别预测下一个变化
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.27
Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, S. Kusumoto
{"title":"Predicting Next Changes at the Fine-Grained Level","authors":"Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, S. Kusumoto","doi":"10.1109/APSEC.2014.27","DOIUrl":"https://doi.org/10.1109/APSEC.2014.27","url":null,"abstract":"Changing source code is not an easy task. Developers occasionally change source code incorrectly. Such mistakes entail additional cost in having to reedit the source code correctly, and repeated changes themselves can be a vulnerability to software quality. We are conducting research into realizing automated code changing as a countermeasure for human errors. As the first step of this research, we propose a technique to predict the types of program elements deleted and added in a next change to Java methods. This technique is designed to support developers in deciding how to change source code after they have identified a method to be changed. We evaluated predictions using the proposed technique with two thresholds, which are sizes of source code changes. For predictions with the smaller threshold where only a single type of program element was added or deleted, the accuracy of the proposed technique was 74% -- 85%. However, for the larger threshold, where 5 or fewer types of program elements were added or deleted, the accuracy was 44% -- 48%.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Migrated Question Prediction on StackExchange 在StackExchange上迁移问题预测
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.89
Sangeeta Lal, D. Correa, A. Sureka
{"title":"Migrated Question Prediction on StackExchange","authors":"Sangeeta Lal, D. Correa, A. Sureka","doi":"10.1109/APSEC.2014.89","DOIUrl":"https://doi.org/10.1109/APSEC.2014.89","url":null,"abstract":"Stack Exchange (SE) is a network of popular Community based Question and Answering (CQA) websites. Each SE Q&A website is created to address questions on specific user interest or domain. However, often users post questions on SE websites that do not match the domain of the website. Such questions are considered as Off-topic for the origin site. Off-topic questions must be detected and migrated to more appropriate On-Topic site in SE network. Off-topic questions are migrated manually to other sites by moderators or experts users (through a voting process). The process of migrating questions from one site to other is known as Question Migration. We study migrated questions on SE Q&A website. We identify several distinguishing features of migrated questions and propose a machine learning based framework to predict migrating questions. Effectiveness of proposed model is tested on five SE Q&A sites. Experimental results demonstrate that the proposed model is effective (maximum accuracy of 73%) in predicting migrating questions.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an Architecture Quality Index for the Behavior of Software Systems 面向软件系统行为的体系结构质量指标
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.97
Ana Dragomir, H. Lichter
{"title":"Towards an Architecture Quality Index for the Behavior of Software Systems","authors":"Ana Dragomir, H. Lichter","doi":"10.1109/APSEC.2014.97","DOIUrl":"https://doi.org/10.1109/APSEC.2014.97","url":null,"abstract":"Software architecture lies at the backbone of any software system and its choice directly influences important non-functional characteristics such as maintainability, extensibility, etc. Up-to-date software architecture descriptions should be at any time available to support the analysis and evaluation of the current state of the architecture. However the current state of the art lacks both methodologies and tools for ensuring availability of architecture descriptions and fails to offer objective means for evaluating software architectures. Currently, no generally accepted method for comparing software from an architecture point of view exists. In this paper, we present our current results towards creating a so-called architecture quality index that includes a bidirectional architecture quality model as well as a quality benchmark created for the context of the ARAMIS research project. The proposed architecture quality index aims to support the architects to evaluate and compare the architecture of software systems based on information extracted during the considered systems' run-time.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信