The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Context: This research is positioned in the field of methods for creating software design and the teaching thereof. Goal: The goal of this research is to study the effects of using a collection of examples for creating a software design. Method: We ran a controlled experiment for evaluating the use of a broad collection of examples for creating software designs by software engineering students. In...
As the size and complexity of automotive software increases, software requirements specification (SRS) is gaining importance in automotive software system development. However, the diversity in SRSs, which comes from the difference between product characteristics, is becoming an impediment for systematic inspection. We propose a two-stage inspection that combines first-stage inspection by third-party...
Many organizations adopt software to support their business process and business logic is embedded in their systems. To meet ever-changing business needs, business logic in software must be continuously changed and renewing the whole system as known as software modernization is performed for systems running for a long time. When modernizing especially large scale system, many developers are involved...
Functional scenario-based specification animation is a practical and effective technique for validating formal specifications but faces a scenario explosion problem. In this paper, we tackle this problem by proposing a new approach to selecting only consistent and meaningful functional scenarios in order to reduce the number of scenarios for animation. We define the concept of consistency for functional...
Eye-tracking studies are getting more prevalent in software engineering. Researchers often use different metrics when publishing their results in eye-tracking studies. Even when the same metrics are used, they are given different names, causing difficulties in comparing studies. To encourage replications and facilitate advancing the state of the art, it is important that the metrics used by researchers...
Informal and semi-formal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requirements is usually difficult to perform. The common reason for the difficulty is that the specifications are often misinterpreted by the stakeholders due to the ambiguity of the natural language...
Software productivity is influenced by how efficiently programmers execute tasks assigned to them. For executing a task, programmers execute several steps. How the execution of these steps is organized by a programmer is referred to as task process. While overall software process has been well studied, the impact of task processes has not been studied much. In this work, we study the impact of task...
The objective of the tutorial is to discuss the emerging concept of Software Defined Storage (SDS) with practical example. The overall objective of the tutorial: Participants can view a complete picture of storage -- the traditional storage, storage in the cloud and the emerging Software Defined Storage. Providers of storage hardware and software solutions can understand the software defined storage...
Dynamic reconfiguration enables components of a distributed system to be updated without restarting the whole system. One major challenge of this technology lies in how to preserve the system consistency while minimizing the disruption. Ma et al. proposed an approach to meet the challenge by managing runtime dependencies among components. However, this approach puts heavy burden on network communication...
It is useful if a bug tracking system can detect bug report duplication with unfinished bug reports. To investigate the feasibility, we study relations between accuracy of duplicate bug report detection using features extracted from textual information in bug reports and the number of words in bug reports in this paper. The results show that increasing the number of words to be used in duplicate detection...
The configuration of a system determines the system behavior and wrong configuration settings can adversely impact system's availability, performance, and correctness. We refer to these wrong configuration settings as configuration bugs. The importance of configuration bugs has prompted many researchers to study it, and past studies can be grouped into three categories: detection, localization, and...
With user experience becoming richer and richer on Android smartphones, limited battery capacity has become a major concern for users. It is a good practice for Android to tell users where the battery power has gone. Android achieves this by a power profile provided by OEMs that specifies the power usage rate for each system component staying at each specific state. According to a recent study, screen...
Even though software systems in some domains are expected to provide continuous services, most of them must undergo some form of changes. It leads to the emergence of dynamic software updating, a technique for updating a running software system without incurring any downtime. One of the challenges of designing a correct dynamic update is to identify a set of update points where the update can be safely...
A bug report is mainly used to find a fault location in software maintenance. It contains several fields such as summary, description, status and version. The description field includes detail scenario and stack traces if exceptional messages are presented. Recently researchers have proposed several approaches for automatic bug localization by using information retrieval and data mining. We propose...
Modeling languages evolve regularly. Companies need to maintain all those models that are used in running projects, which can cause these projects to fall back in their schedules. Since 10 years research addresses this issue with approaches for automating co-evolution. The dominant core of these approaches are model resolution strategies. They define 1) how models have to be changed in reaction to...
Identifying features and creating a feature model during the process of software product line engineering is time-consuming and requires substantial effort from modelers. In recent years, a number of approaches that map goal models to feature models have been proposed so as to avoid creating the feature model from scratch. However, these approaches can only map part of the elements, such as the goals...
It is still a challenge to select "good" test inputs for concurrent programs within limited testing resources. We present in this paper a test case diversity metric for multi-threaded programs, which evaluates a test input with its effect in exposing concurrent thread interactions. We then propose an input-driven active testing approach with two test input selection strategies based on our...
With the rise of the services-based economy and the democratization of on-line services, more and more users (individual and/or business) use on-line applications in their daily lives. Usually personal data transits between different actors involved in a service's delivery chain (e.g. application/storage service providers) and thus might raise some privacy issues. Accountability, which is the property...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.