2014 21st Asia-Pacific Software Engineering Conference最新文献

筛选
英文 中文
Handling Emergency Mode Switch for Component-Based Systems 处理基于组件的系统的紧急模式切换
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.32
Y. Hang, H. Hansson
{"title":"Handling Emergency Mode Switch for Component-Based Systems","authors":"Y. Hang, H. Hansson","doi":"10.1109/APSEC.2014.32","DOIUrl":"https://doi.org/10.1109/APSEC.2014.32","url":null,"abstract":"Software reuse is deemed as an effective technique for managing the growing software complexity of large systems. Software complexity can also be reduced by partitioning the system behavior into different modes. Such a multi-mode system is able to dynamically change its behavior by switching between different modes. When a multi-mode system is developed by reusable software components, a crucial issue is how to achieve a seamless composition of multi-mode components and handle mode switch properly. This is the motivation for the Mode Switch Logic (MSL), supporting the development of component-based multi-mode systems by providing mechanisms for mode switch handling. In this paper, MSL is extended and adapted to systems with emergency triggering of mode switches that must be handled with minimal delay. We propose an Immediate Handling with Buffering (IHB) approach to enable the responsive handling of such an emergency event in the presence of other concurrent non-emergency mode switch events. We present a model checking based verification of IHB and illustrate its benefits by an example.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines 以评论行为中心的方法错误倾向实证分析
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.93
Hirohisa Aman, S. Amasaki, Takashi Sasaki, Minoru Kawahara
{"title":"Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines","authors":"Hirohisa Aman, S. Amasaki, Takashi Sasaki, Minoru Kawahara","doi":"10.1109/APSEC.2014.93","DOIUrl":"https://doi.org/10.1109/APSEC.2014.93","url":null,"abstract":"This paper focuses on comments described in Java programs, and conducts an empirical analysis about relationships between comments and fault-proneness in the programs. The types of comments analyzed in this paper are comments described inside a method body (inner comments), and comments followed by a method declaration (documentation comments). Although both of them play important roles in the program comprehension, they seem to be described in different purposes, The inner comments are often added to present tips about code fragments, while the documentation comments usually work as a programmer's manual. In the field of code refactoring, well-written inner comments are said to be related to \"code smell\" since they may cover a lack of readability in a complicated code fragment. This paper analyzes the associations of comments with the code quality from the aspect of fault-proneness, with using four popular open source products. The empirical results show that a method having inner comments tends to be 1.8 - 3.0 times likely to be faulty. The key contribution of this work is to reveal the usefulness of inner comments to point at faulty methods.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SYNCEYE: An Availability Measurement Tool for Embedded Systems SYNCEYE:嵌入式系统可用性测量工具
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.84
Junghwan Lee, Kwangyong Lee
{"title":"SYNCEYE: An Availability Measurement Tool for Embedded Systems","authors":"Junghwan Lee, Kwangyong Lee","doi":"10.1109/APSEC.2014.84","DOIUrl":"https://doi.org/10.1109/APSEC.2014.84","url":null,"abstract":"In case of safety-critical embedded systems, software must have high availability to provide non-stop and reliable service. Therefore, we want to measure the availability of our system. However, using past methods, it takes a long time to measure availability because of irregular occurrence of faults. In this paper, we present SYNCEYE, which is a kind of fast availability measurement tool. To get the availability in a short period, SYNCEYE only measures MTTR (or downtime) using a fault injector. And then, it just calculates the availability with the heuristic MTTF (or uptime) such as 13.89 hours for achieving 99.999% availability goal. It helps us to decide a direction of optimization of the embedded systems.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134643559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Developer Ranking Algorithm for Automatic Bug Triage Using Topic Model and Developer Relations 一种基于主题模型和开发者关系的Bug自动分类的开发者排名算法
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.43
Zhang Tao, Geunseok Yang, Byungjeong Lee, E. Lua
{"title":"A Novel Developer Ranking Algorithm for Automatic Bug Triage Using Topic Model and Developer Relations","authors":"Zhang Tao, Geunseok Yang, Byungjeong Lee, E. Lua","doi":"10.1109/APSEC.2014.43","DOIUrl":"https://doi.org/10.1109/APSEC.2014.43","url":null,"abstract":"Recently, bug resolution has become a pivotal issue for software maintenance where recommendations for appropriate fixers are an important task. Some approaches (e.g., Social network and machine learning techniques) exist that can achieve automatic bug triage (i.e., Developer recommendation). This paper proposes a new method to recommend the most suitable fixer for bug resolution. Different from previous approaches, the proposed approaches combine topic model and developer relations (e.g., Bug reporter and assignee) to capture developers' interest and experience on specific bug reports, we can arrange for the most appropriate developer to fix a new bug when it comes in. We evaluate the performance of our method using three large-scale open-source projects, including Eclipse, Mozilla Fire fox, and Net beans. The experimental results reveal that our approach outperforms other recommendation methods for developers.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132195957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Initial Industrial Experience of GQM-Based Product-Focused Project Monitoring with Trend Patterns 基于gqm的以产品为中心的项目监控趋势模式的初步工业经验
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.91
H. Nakai, Kiyoshi Honda, H. Washizaki, Y. Fukazawa, Ken Asoh, Kazuyoshi Takahashi, Kentarou Ogawa, M. Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, S. Yamada, Daisuke Miyazaki
{"title":"Initial Industrial Experience of GQM-Based Product-Focused Project Monitoring with Trend Patterns","authors":"H. Nakai, Kiyoshi Honda, H. Washizaki, Y. Fukazawa, Ken Asoh, Kazuyoshi Takahashi, Kentarou Ogawa, M. Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, S. Yamada, Daisuke Miyazaki","doi":"10.1109/APSEC.2014.91","DOIUrl":"https://doi.org/10.1109/APSEC.2014.91","url":null,"abstract":"It is important for project stakeholders to identify the states of projects and quality of products. Although metrics are useful for identifying them, it is difficult for project stake-holders to select appropriate metrics and determine the purpose of measuring metrics. We propose an approach that defines the measured metrics by GQM method to identify tendency in projects and products based on Trend Pattern. Additionally, we implement a tool as a Jenkins Plug in to visualize an evaluation results based on GQM method. We perform an industrial case study, which objects are two software development projects. In our industrial case study, we can identify the problem that product contains. As our future work, we will adopt our approach and GQM Plug in to software development project continuously to assess their effectiveness in the long term.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122426102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Application-Device Matching Method for the Mobile Software Ecosystem 移动软件生态系统中一种高效的应用设备匹配方法
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.36
Heuijin Lee, Sungwon Kang, Myung-Gyun Kim
{"title":"An Efficient Application-Device Matching Method for the Mobile Software Ecosystem","authors":"Heuijin Lee, Sungwon Kang, Myung-Gyun Kim","doi":"10.1109/APSEC.2014.36","DOIUrl":"https://doi.org/10.1109/APSEC.2014.36","url":null,"abstract":"In the mobile software ecosystem, a method that finds out the applications that are compatible with the device of an end user is called application-device matching. In the current mobile software environment, the device fragmentation causes substantial degree of inaccuracy in matching applications with devices as the traditional platform-centric method handles only the features of platform vendors without considering the unique feature set of a certain device, such as device-manufacturer's features, resulting in a low accuracy in matching applications and devices. This paper proposes a new matching method that is device-centric, which achieves high accuracy in application-device matching by grouping features of existing devices and then using it as criteria of application-device matching. To demonstrate the performance of our method, we conduct a case study with 22 devices and 10 applications in the Google Android mobile software ecosystem. The result of case study shows our proposed method shows a higher accuracy.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data Flow Based Integration Testing for Embedded System Using Interaction Model 基于交互模型的嵌入式系统数据流集成测试
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.68
Hossain Muhammad Iqbal, W. Lee
{"title":"Data Flow Based Integration Testing for Embedded System Using Interaction Model","authors":"Hossain Muhammad Iqbal, W. Lee","doi":"10.1109/APSEC.2014.68","DOIUrl":"https://doi.org/10.1109/APSEC.2014.68","url":null,"abstract":"Embedded system covers a large range of highly sensitive area where a slightest error can damage large number of resources even cost human life. So testing embedded system is extremely essential concern in computer science industry. Errors can lies between interacting software and hardware module of embedded system. This interactions can be modeled in terms of data flows between subsystems, i.e. Module, component etc. Tracking data flow across different components is important because applications use this to activate interactions that acquire different values and resources in ways that may ultimately exercise faults. Integration testing is a verification technique of the interfaces among system parts. The integration test of software components is especially concerned with the detection and uncover of interface errors, which are not detectable during unit testing. Existing integration testing approaches typically focused on direct interaction of subsystems which is done by function call but there exists other interactions for indirect dependencies between subsystems, which may occur faults in the system. There are no specific general models for representing all interactions. In this paper we propose an interaction model to cover all possible direct and indirect interaction and provide an integration testing approach using data flow analysis to generate minimal test cases efficiently.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SHAP: Suppressing the Detection of Inconsistency Hazards by Pattern Learning 用模式学习抑制不一致危险的检测
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.64
Wang Xi, Chang Xu, Wenhua Yang, Ping Yu, Xiaoxing Ma, Jiang Lu
{"title":"SHAP: Suppressing the Detection of Inconsistency Hazards by Pattern Learning","authors":"Wang Xi, Chang Xu, Wenhua Yang, Ping Yu, Xiaoxing Ma, Jiang Lu","doi":"10.1109/APSEC.2014.64","DOIUrl":"https://doi.org/10.1109/APSEC.2014.64","url":null,"abstract":"Context-aware applications rely on contexts derived from sensory data to adapt their behavior. However, contexts can be inconsistent and cause application anomaly or crash. One popular solution is to detect and resolve context inconsistencies at runtime. However, we observe that many detected inconsistencies do not indicate real context problems. Instead, they are caused by improper inconsistency detection. These inconsistencies are harmless, and their resolution is unnecessary or may even cause new problems. We name them inconsistency hazards. Inconsistency hazards should be suppressed, but their occurrences resemble normal inconsistencies. In this paper, we present a pattern-learning based approach SHAP to suppressing the detection of inconsistency hazards. Our key insight is that the detection of such hazards is subject to certain patterns of context changes. These patterns, although difficult to specify manually, can be learned effectively from historical inconsistency detection data. We evaluated our SHAP experimentally through three context-aware applications. The results reported that SHAP can automatically suppress the detection of over 90% inconsistency hazards, while preserving the detection of over 98% normal inconsistencies, with only negligible overhead.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Weaknesses Detection by Symbolic Analysis of Scenarios 基于场景符号分析的安全弱点检测
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.61
Boutheina Bannour, J. Escobedo, Christophe Gaston, P. L. Gall, Gabriel Pedroza
{"title":"Security Weaknesses Detection by Symbolic Analysis of Scenarios","authors":"Boutheina Bannour, J. Escobedo, Christophe Gaston, P. L. Gall, Gabriel Pedroza","doi":"10.1109/APSEC.2014.61","DOIUrl":"https://doi.org/10.1109/APSEC.2014.61","url":null,"abstract":"Remotely-communicating software-based systems are tightly present in modern industrial society and securing their complex architecture is recognized as crucial. In particular, the perspectives to reinforce their security by monitoring are promising. However, monitoring schemes still face challenges as the presence of untrusted components seems unavoidable. Specially, since untrusted components may be placed in unsupervised areas, making them ideal targets for attackers. In this work, we propose a framework intended to support designers during systems conception. The approach mainly relies upon Security Watchdogs committed to detect and signal distrustful activity. A model-based framework is introduced to ease attacks descriptions upon scenarios in the form of UML sequence diagrams. The scenarios endowed with predefined attack patterns are analyzed using models transformations and symbolic techniques. By doing so, the effectiveness of watchdogs is confronted against attacks and the results can be used to reinforce the overall security of the system. The applicability of the proposed method is also shown by means of a Smart Grid case study.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Design and Verification of Zone Controller 区域控制器的形式化设计与验证
2014 21st Asia-Pacific Software Engineering Conference Pub Date : 2014-12-01 DOI: 10.1109/APSEC.2014.62
Jie Qian, Jing Liu, Xiang Chen, Junfeng Sun
{"title":"Formal Design and Verification of Zone Controller","authors":"Jie Qian, Jing Liu, Xiang Chen, Junfeng Sun","doi":"10.1109/APSEC.2014.62","DOIUrl":"https://doi.org/10.1109/APSEC.2014.62","url":null,"abstract":"iCMTC is an advanced Communication Based Train Control system developed by CASCO Signal Ltd. For China's mass transit transportation. Some subsystems of iCMTC has been applied in Shanghai Metro Line 10. Zone Controller (ZC) is one of the subsystems of iCMTC. Modeling and verifying ZC is challenging due to the complexity of the block system and the behavior itself. We propose a formal approach to gradually specify the block system and lower complexity of the verification of ZC behavior. In recent years, there are many researches on railway systems. However, these studies use simple track networks, which makes them inadequate in industrial practice. To address this problem, we define specific block layouts (i.e., Double slip connection) as relations on sets. We also define mathematical properties of the relations so that the block system can be precisely described. For the purpose of reducing the complexity of verification, we propose an improved refinement mechanism based on the Event-B notation. Based on this refinement mechanism, we develop a Rodin plug-in to help us refine the system. We use this mechanism in modeling the ZC behavior, and achieve good results in automated proof. Several safety properties are considered and verified to ensure the safety and correctness of ZC.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信