The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This technical briefing provides an overview of how quantitative empirical research methods can be combined with qualitative ones generating the family of empirical software engineering approaches known as mixed-methods. The ultimate aim of such mixed-methods is supporting cause-effect claims combining multiple data types, sources and analyses that provide software practitioners and academicians solid...
In model driven engineering (MDE), meta-models are the central artifacts. As a complement, the Object Constraint Language (OCL) is a language used to express constraints and operations on meta-models. The Eclipse Modeling Framework (EMF) provides an implementation of OCL, enabling OCL-annotated meta-models. Existing empirical studies of the OCL have been conducted on small collections of data. To...
Emotional arousal increases activation and performance but may also lead to burnout in software development. We present the first version of a Software Engineering Arousal lexicon (SEA) that is specifically designed to address the problem of emotional arousal in the software developer ecosystem. SEA is built using a bootstrapping approach that combines word embedding model trained on issue-tracking...
The use of Application Programming Interfaces (APIs) is pervasive in software systems; it makes the development of new software much easier, but remembering large APIs with sophisticated usage protocol is arduous for software developers. Code recommendation systems alleviate this burden by providing developers with a ranked list of API usages that are estimated to be most useful to their development...
A large corpora of software-related documents is available on the Web, and these documents offer the unique opportunity to learn from what developers are saying or asking about the code snippets that they are discussing. For example, the natural language in a bug report provides information about what is not functioning properly in a particular code snippet. Previous research has mined information...
Infrastructure as Code (IaC) is the practice of specifying computing system configurations through code, and managing them through traditional software engineering methods. The wide adoption of configuration management and increasing size and complexity of the associated code, prompt for assessing, maintaining, and improving the configuration code's quality. In this context, traditional software engineering...
Past research has proposed association rule mining as a means to uncover the evolutionary coupling from a system’s change history. These couplings have various applications, such as improving system decomposition and recommending related changes during development. The strength of the coupling can be characterized using a variety of interestingness measures. Existing recommendation engines typically...
The Android platform is designed to support mutually un-trusted third-party apps, which run as isolated processes but may interact via platform-controlled mechanisms, called Intents. Interactions among third-party apps are intended and can contribute to a rich user experience, for example, the ability to share pictures from one app with another. The Android platform presents an interesting point in...
Typing is a well known concept to prepare services for data processing for instance by choosing the correct service to a mime type for processing. But a lot more metadata elements, like availability and access conditions, provenance, processing preconditions or integrity parameters, are useful to be known in advance for preprocessing data services. In order to expose such metadata independently from...
Choosing the right career can be difficult for students, because they have to take into considerations many elements, in order to be on the best path. Several studies in many disciplines have cooperate to help students making their career decision. The purpose of this work is to invest the subject of school orientation, identifying its background and studying some related works. This paper aims also...
Open Source Software (OSS) hosted in Repositories such as GitHub can be valuable as a source of information for requirements engineers, especially in the apprentice phase of a new application. In this context, we propose a strategy to speed up the discovery of valuable information, since manual search may be time consuming in the vast dataset of GitHub projects. Our strategy is based on the identification...
A task at the beginning of the software development process is the creation of a requirements specification. The requirements specification is usually created by a software engineering expert. We try to substitute this expert by a domain expert (the user) and formulate the problem of creating requirements specifications as a search-based software engineering problem. The domain expert provides only...
Classification rule mining is one of important areas of data mining, and it is a hot subject at present. In this paper, we introduce some definitions: relevant concept, pseudo concept, and relevant concept cover. Then we presents an algorithm to compute relevant concept cover, which divides the context into subsets, calculate the set of relevant concepts by the value of concept shannon entropy, and...
Bodies of Knowledge (BOK), contain the relevant knowledge for a disciplines as example Software Engineering (SE), System Information (SI), Information Technology (IT), Computer Science (CS), Medicine, Economics, and others areas of knowledge. BOK describes relevant knowledge for a discipline, and will need show the consensus in the Knowledge Areas (KA), and related disciplines. The development of...
The use of Computer-Assisted Audit Tools and Techniques can promote the efficacy and the efficiency of auditors' work in attendance control. This control is similar in almost all companies and data extracted from Human Resourses' software is easily accessed and is not complex. After data validation, the procedures that are recommended in this paper can be adapted to any company. Therefore, is our...
Users context is exploited by an increased number of applications, especially mobile ones, in order to provide their clients with context-oriented services. With our work we try to extend the usage context to laptop and desktop applications and environments. This paper aims analyzing user behavior on three different habitats: at work, at school and at home. The main purpose of this paper is to find...
To find opportunities for applying prefactoring, several techniques for detecting bad smells in source code have been proposed. Existing smell detectors are often unsuitable for developers who have a specific context because these detectors do not consider their current context and output the results that are mixed with both smells that are and are not related to such context. Consequently, the developers...
Context: Success of any software depends on the successful implementation of all of its Requirements. There exist a lot of challenges in successful implementation of requirement engineering (RE) process especially when we talk about global software development (GSD). Objective: The objective is to find challenges and barriers in path of RE in context of GSD and analyze the factors which influence...
Dynamic metrics are known to assess the actual behavior of software systems as they are extracted from runtime data obtained during program execution. However, recent literature indicates that dealing with dynamic information remains a formidable challenge due to the huge size of execution data at hand, resulting in long processing delays. We present an efficient and scalable technique to extract...
Temporal properties are useful for describing and reasoning about software behavior, but developers rarely write down temporal specifications of their systems. Prior work on inferring specifications developed tools to extract likely program specifications that fit particular kinds of tool-specific templates. This paper introduces Texada, a new temporal specification mining tool for extracting specifications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.