2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)最新文献

筛选
英文 中文
A case study in object-oriented patterns identified during manual refactoring 在手工重构期间确定的面向对象模式的案例研究
Brian S. Dillon
{"title":"A case study in object-oriented patterns identified during manual refactoring","authors":"Brian S. Dillon","doi":"10.1109/SERA.2016.7516133","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516133","url":null,"abstract":"Software design patterns are often-repeated implementations that have been identified and cataloged. These are commonly seen as useful and good patterns to implement. Occasionally the term “anti-pattern” has been used to identify less-useful patterns that also appear regularly. The exact definition of an anti-pattern is somewhat subjective, and the term has even been applied to some recognized design patterns. This paper discusses four manual refactoring case studies where patterns were discovered and cataloged. Evidence observed in the source code is used to infer how these patterns evolved. Based on these findings, preventive development practices are suggested. Potential improvements to development tools and a new method for pattern classification are suggested as subjects for future work.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the gamification of human-centric traceability tasks in software testing and coding 论软件测试和编码中以人为中心的可追溯性任务的游戏化
R. Parizi
{"title":"On the gamification of human-centric traceability tasks in software testing and coding","authors":"R. Parizi","doi":"10.1109/SERA.2016.7516146","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516146","url":null,"abstract":"Traceability is the ability to trace the influence of one software artifact on another by linking dependencies. Test-to-code traceability (relationships between test and system code) plays a vital role in the production, verification, reliability and certification of highly dependable systems. In practical settings, however, traceability tasks are most often observed in the breach by human developers/testers. Prior research works on test-to-code traceability in software engineering do not provide high traceability output and accuracy as they mainly rely on sought-after approaches to recover links. Gamified Software Engineering (GSE) is a growing field that in particular taps into gamification, the application of game mechanics in non-game contexts, to address human-related concerns in the field of SE. This paper argues that a new gamified approach is necessary to tackle the human issue of capturing traceability information in a by-product manner. Thus, it advocates for the induction of gamification concepts in software traceability. We propose a conceptual framework where the gamification is infusing engagement into human-centric traceability tasks to record trace links. An empirical evaluation was performed to assess the performance of the framework compared with a state-of-the-art approach.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124946703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Data mining of genomic data generated from soybean treated with different phytohormones 不同激素处理大豆基因组数据的数据挖掘
M. Tavakolan, N. Alkharouf
{"title":"Data mining of genomic data generated from soybean treated with different phytohormones","authors":"M. Tavakolan, N. Alkharouf","doi":"10.1109/SERA.2016.7516128","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516128","url":null,"abstract":"Plant hormones, or phytohormones, have been implicated in a range of defensive reactions in plants. They have been found to help plants ward off pathogenic infections ranging from fungi to nematodepest infections. Soybean (Glycine max) is the second most valuable agricultural commodity and an inexpensive source of proteins for humans and animals in the United States. In this study we use next generation sequencing (Illumina, RNASeq) and Bioinformatics analysis methods to study the impact of four natural phytohormones on soybeans and it's resistance to a nematode called the soybean cyst nematode (SCN), which causes over 1 billion dollars in losses to US farmers per annum. To that end we have developed a relational database that stores genomic information from soybean in addition to the RNASeq data from each hormone treated soybean sample. Together the database provide a resource to mine the data to find key genes and pathways. The database can be accessed from: http://bioinformatics.towson.edu/soybean/D efault.aspx","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117051132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMA2AOP: From the AADL Error Model Annex to aspect language towards fault tolerant systems EMA2AOP:从AADL错误模型附件到面向容错系统的方面语言
Wafa Gabsi, Bechir Zalila, M. Jmaiel
{"title":"EMA2AOP: From the AADL Error Model Annex to aspect language towards fault tolerant systems","authors":"Wafa Gabsi, Bechir Zalila, M. Jmaiel","doi":"10.1109/SERA.2016.7516141","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516141","url":null,"abstract":"Fault tolerance, one of the means of dependability, is defined as the capability of a system to continue providing offered services even in the presence of errors. Modelling fault tolerant systems is becoming a serious challenge due to emerging requirements suh as dynamism, distribution and system evolution. In this context, AADL is extended by the Error Model Annex to design architectural error model even for critical systems for analysis and assessment purposes. In this paper, we define a model driven approach to generate fault tolerant application code using aspect oriented programming. First, we integrate fault tolerance elements since the modelling step of a system using AADL and its annex Error Model Annex. Second, we define a set of transformation rules from the EMA annex to the AO4AADL annex, an extension of the AADL language by architectural aspects. The model transformation is generic and not specific to a language. AO4AADL is transformed into aspect code using the same target language as the functional code. Therefore, we ensure separation of concerns at the model level as well as the application level. To validate our approach, we apply it to an infant incubator system.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting hidden structures from Arabic electronic documents: Application to the legal field 侦测阿拉伯文电子文件的隐藏结构:在法律领域的应用
Imen Bouaziz Mezghanni, F. Gargouri
{"title":"Detecting hidden structures from Arabic electronic documents: Application to the legal field","authors":"Imen Bouaziz Mezghanni, F. Gargouri","doi":"10.1109/SERA.2016.7516131","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516131","url":null,"abstract":"Dealing with unstructured information is currently a hot research topic since most documents exist in an unstructured form. The effective exploitation of unstructured document, although intricate, is of paramount importance to Information Retrieval (IR). The key to using unstructured data set is to identify the hidden structures within the data set. In this paper, we present an approach to recognize the semantic structure of documents in Arabic legal data. Several main concepts of a document are expressed in this structure, which includes title, the headings of the chapters, sections, subsections, etc. This structural information is employed to obtain a richer and more fine-grained annotation of documents forming a useful and coherent infrastructure ready for IR. Some experiments were conducted in order to evaluate our approach. The initial results seem promising.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126334909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A message from the conference chair 会议主席的留言
Chao Lu
{"title":"A message from the conference chair","authors":"Chao Lu","doi":"10.1109/SERA.2016.7516119","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516119","url":null,"abstract":"It is my great pleasure to extend a welcome to all of you who are participating in SERA2016 (the 14th IEEE/ACIS International Conference on Software Engineering, Research, Management & Applications) being held at Baltimore, Maryland, USA, June 8 to 10, 2016. The conference is sponsored by the IEEE Computer Society and the International Association for Computer and Information Sciences (ACIS), hosted by Towson University. The SERA 2016 conference provides an international forum where researchers, practitioners and advanced graduate students are invited to share their experience and exchange new ideas related to all aspects of software engineering research and applications. The conference particularly welcomes contributions at the junction of theory and practice, which serve to disseminate research with an immediate impact on applications. The conference is structured to cover the complete software lifecycle from design through deployment to maintenance and evolution. In this conference, we will have keynote speech by Professor Lawrence Chung, University of Texas at Dallas, who has been well-recognized expert in Requirements Engineering, System/Software Architecture and Systems Engineering. Hope that his talk will be fruitful to all of us who are participating in SERA2016.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134618786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation and improvements for agile planning tools 敏捷规划工具的评估和改进
Sultan Alyahya, Manal Alqahtani, Mohamed Maddeh
{"title":"Evaluation and improvements for agile planning tools","authors":"Sultan Alyahya, Manal Alqahtani, Mohamed Maddeh","doi":"10.1109/SERA.2016.7516149","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516149","url":null,"abstract":"Planning is an integral part of agile software project management. Several agile software planning tools were developed; they grow in number and complexity. Our analysis of 30 of the most known agile planning tools shows that while the majority of them support the key agile planning activities, they still have limitations. In this paper, we presented three limitations to the current agile planning tools and we developed three features to overcome them. A questionnaire is used to evaluate the identified limitations and the proposed features. The evaluation shows that the identified limitations are sound and exist in the real software projects. In addition, most of the participants agree about how to implement the first and second proposed features (providing task effort notification and improving user story prioritization). The evaluation of the third feature (adding new user story/re-prioritize user story by customer) shows that the simple implementation provided for this feature is not sufficient and, hence, there is a need for a more thorough study to best involve customers through agile planning tools. This research contributes in developing advanced agile planning tools supporting the key agile planning activities.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123180568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Trust analysis of composite service evolution 组合服务演化的信任分析
Li Liao, ShanShan Qi, Bixin Li
{"title":"Trust analysis of composite service evolution","authors":"Li Liao, ShanShan Qi, Bixin Li","doi":"10.1109/SERA.2016.7516123","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516123","url":null,"abstract":"Changes to a composite service need to be well analyzed in order to ensure its trust is maintained. In this paper, we propose a trust analysis model to analyze the impact of three kinds of evolution operations performed on a composite service: business process changes, binding changes and interface changes. A trust dependency graph is introduced to analyze the impact on the trust of component services; a XBFG (eXtensible BPEL Flow Graph) is introduced to evaluate the impact on the trust of the composite service. Three metrics are introduced to evaluate the impact of these evolution operations. The case study shows how these evolution operations affect the trust of other component services and the composite service.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the prevalence of function side effects in general purpose open source software systems 通用开源软件系统中功能副作用的普遍性
Saleh M. Alnaeli, A. D. A. Taha, T. Timm
{"title":"On the prevalence of function side effects in general purpose open source software systems","authors":"Saleh M. Alnaeli, A. D. A. Taha, T. Timm","doi":"10.1109/SERA.2016.7516139","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516139","url":null,"abstract":"A study that examines the prevalence and distribution of function side effects in general-purpose software systems is presented. The study is conducted on 19 open source systems comprising over 9.8 Million lines of code (MLOC). Each system is analyzed and the number of function side effects is determined. The results show that global variables modification and parameters by reference are the most prevalent side effect types. Thus, conducting accurate program analysis for many adaptive changes processes (e.g., automatic parallelization to improve their parallelizability to better utilize multi-core architectures) becomes very costly or impractical to conduct. Analysis of the historical data over a seven-year period for 10 systems show that there is a relatively large percentage of affected functions over the lifetime of the systems. The trend is flat in general, therefore posing further problems for inter-procedural analysis.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"497 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127586436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid DS-FH-THSS approach anti-jamming in Wireless Sensor Networks 无线传感器网络中DS-FH-THSS混合抗干扰方法
Nejla Rouissi, H. Gharsellaoui, Sadok Bouamama
{"title":"A hybrid DS-FH-THSS approach anti-jamming in Wireless Sensor Networks","authors":"Nejla Rouissi, H. Gharsellaoui, Sadok Bouamama","doi":"10.1109/SERA.2016.7516138","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516138","url":null,"abstract":"Wireless Sensor Networks (WSNs) technologies have been successfully applied to a great variety of outdoor scenarios but, in practical terms, little effort has been applied for indoor environments, and even less in the field of industrial applications. This paper work presents an intelligent hybrid WSN application for an indoor and industrial scenario, with the aim of improving and increasing the levels of human safety and to avoid the denial of service (DoS) attacks. Since its operates on a wireless network, an adversary can always perform a DoS attack by jamming the radio channel with a strong signal. The main contribution of our work is to use a hybrid approach that handles the problem of jamming. The proposed solution improves security by protecting against DoS and returns near-optimal solutions. The paper shows the viability of our approach in terms of performance, scalability, modularity and safety.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133112059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信