The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Background: While bug bounty programs are not new in software development, an increasing number of companies, as well as open source projects, rely on external parties to perform the security assessment of their software for reward. However, there is relatively little empirical knowledge about the characteristics of bug bounty program contributors. Aim: This paper aims to understand those contributors...
In large software projects, tacit knowledge of the system is threatened by developer turnover. When a developer leaves the project, their knowledge may be lost if the other developers do not understand the design decisions made by the leaving developer. Understanding the source code written by leaving developers thus becomes a burden for their successors.In a previous paper, Rigby et al. reported...
Performance is an important aspect and critical requirement in multi-process software architecture systems such as Google Chrome. While interacting closely with members of the Google Chrome engineering team, we observed that they face a major challenge in detecting performance deviations between releases, because of their very high release frequency and therefore limited amount of data on each. This...
Web Archiving Integration Layer (WAIL) is a desktop application written in Python that integrates Heritrix and OpenWayback. In this work we recreate and extend WAIL from the ground up to facilitate collection-based personal Web archiving. Our new iteration of the software, WAIL-Electron, leverages native Web technologies (e.g., JavaScript, Chromium) using Electron to open new potential for Web archiving...
Concretely communicating technical debt and its consequences is of common interest to both researchers and software engineers. In the absence of validated tools and techniques to achieve this goal with repeatable results, developers resort to ad hoc practices. Most commonly they report using issue trackers or their existing backlog management practices to capture and track technical debt. In a manual...
As large scale software development has become more collaborative, and software teams more globally distributed, several studies have explored how developer interaction influences software development outcomes. The emphasis so far has been largely on outcomes like defect count, the time to close modification requests etc. In the paper, we examine data from the Chromium project to understand how different...
As developers face ever-increasing pressure to engineer secure software, researchers are building an understanding of security-sensitive bugs (i.e. Vulnerabilities). Research into mining software repositories has greatly increased our understanding of software quality via empirical study of bugs. However, conceptually vulnerabilities are different from bugs: they represent abusive functionality as...
Online Analytical Processing (OLAP) cube is a multi-dimensional dataset used for analyzing data in a Data Warehouse (DW) for the purpose of extracting actionable intelligence. Process mining consists of analyzing event log data produced from Process Aware Information Systems (PAIS) for the purpose of discovering and improving business processes. Process cube is a concept which falls at the intersection...
Several widely used Issue tracking systems (such as Google Issue Tracker and Bugzilla) contains an integrated threaded discussion forum to facilitate discussion between the development and maintenance team (bug reporters, bug triagers, bug fixers and quality assurance managers). We observe that several comments (and even bug report descriptions) posted to issue tracing system contains links to external...
In order to assure the quality of software, early detection of defects is highly recommended. Code review is one of effective way for such early detection of defects in software. Code review activities must contain various useful insights for software quality. However, especially in open source software developments, records of code review merely exist. In this study, we try to analyze a code review...
JavaScript is currently the dominating client-side scripting language in the web community. However, the source code of JavaScript can be easily copied through a browser. The intellectual property right of the developers lacks protection. In this paper, we consider using dynamic software birthmark for JavaScript. Instead of using control flow trace (which can be corrupted by code obfuscation) and...
Maintenance accounts for the major part of a software system's total costs. Therein, program comprehension is an important, but complex activity: Typically, up-to-date documentation is not available, so the main reliable source of information on the implementation represent the artifacts of the system's implementation. Understanding software systems is difficult, in particular, if multithreading concepts...
Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation...
Aimed at the problems of high-cost, non-completeness and ambiguity existed in the traditional assessment methods for Software Process Model (SPM), this paper proposes a qualitative and quantitative assessment method. On the basis of assessment theory and domain experience of SPM, the unclear goals in the project start-up phase are qualitatively described in the form of problem set and expert problem...
This paper proposes a maze exploring algorithm named “Partition-central Algorithm”, which is used to find the shortest path in a micromouse competition maze. A standard 16*16 units maze is divided into 12 partitions in this algorithm. Depending on the absolute direction of the micromouse and the locations of each partition, exploring rules alter when the micromouse walks to optimize the maze exploring...
In this paper, we implement and demonstrate an adaptive interference avoidance TDCS (Transform-domain Communication System) based cognitive radio via software defined radio implementation. By dynamically notching the occupied bands prior to applying IDFT, the designed cognitive radio communicates without interference to primary users and from primary users, as well as provides coexistence between...
This article introduces the concept of process control into surveillance and evaluation of e-government, use statistic process control (SPC) with the analytic hierarchy process (AHP) to surveillance and evaluation in implementation stage. Builds indicators and collects data then analyzes and calculates with SPC and AHP to gets factors that influence the process of e-government and sorts them with...
Cognitive Radios have emerged as one the most promising methods to increase wireless system efficiency through dynamic spectrum access combined with other cross-layer optimization methods. Most of the research prototypes and demonstrations have so far focused on either general platforms or scenarios that are predominantly taken from military or emergency communications domain. In this demonstration...
In this paper, we consider the problem that despite considerable Cognitive Radio (CR) research over the last decade and standardization efforts in DySPAN related topics in recent times, thus far, the commercial realisation of autonomous and intelligent networks has not been fulfilled. This is partly because of the complexity of deploying learning algorithms and protocol solutions that satisfy the...
As compared to bespoke software development, in market driven software development huge numbers of requirements that comes from many different users, customers, competitors through surveys, interviews, focus groups, and competitor analysis intimidate to over burden the requirement engineering process. So it is vital for product management to select the requirements that aligned with the overall business...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.