The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In open software development environment, a large number of feature requests with mixed quality are often posted by stakeholders and usually managed in issue tracking systems. Thoroughly understanding and analyzing the real intents that feature requests imply is a labor-intensive and challenging task. In this paper, we introduce an approach to understand feature requests automatically. We generate...
Modern software development is increasingly collaborative. Open Source Software (OSS) are the bellwether; they support dynamic teams, with tools for code sharing, communication, and issue tracking. The success of an OSS project is reliant on team communication. E.g., in issue discussions, individuals rely on rhetoric to argue their position, but also maintain technical relevancy. Rhetoric and technical...
Virtual assistants are promoted by the software industry as a radically new species of tools, but a clear definition of their specific way to interact with human users missing. The explicit goal of virtual assistants is to support human users by interacting with them in a fluent way, inspired by natural human communication and collaboration, which are now well understood by human sciences. This paper...
Feedback communication channels allow end-users to express their needs, which can be considered in software development and evolution. Although feedback gathering and analysis have been identified as an important topic and several researchers have started their investigation, information is scarce on how software companies currently elicit end-user feedback. In this study, we explore the experiences...
Vagueness in software requirements documents can lead to several maintenance problems, especially when the customer and development team do not share the same language. Currently, companies rely on human translators to maintain communication and limit vagueness by translating the requirement documents by hand. In this paper, we describe two approaches that automatically identify vagueness in requirements...
Intensive development of information systems has led to an increase in malicious software, which is associated with the emergence of new types of cyber attacks. Expanding impact of cyber attacks aimed at a variety of resources information system initiates creation of special countermeasures that can be effective in the emergence of new types of threats from unknown or ill-defined properties. There...
University Course Timetabling Problem (UCTP) is common problem on high school and university. This problem is already solved by numerous method such as genetic algorithm, reinforcement learning algorithm, ant colony algorithm, or combination between them. Although the algorithms solved the timetabling problem, the previous researches limited discuss the pseudocode implementation only. This research...
This paper proposes a methodology based on Analytical Hierarchical Process (AHP) and Fuzzy Inference Systems (FIS), to obtain a better selection of Enterprise Resource Planning (ERP). The company, which are going to acquire the software, bases this selection on their own imposed criteria and the ERPs alternatives based on some supplier's information. To select the most appropriate ERP, at the beginning,...
Software Development Effort Estimation (SDEE) plays a primary role in software project management. Among several techniques suggested for estimating software development effort, analogy-based software effort estimation approaches stand out as promising techniques.In this paper, the performance of Fuzzy Analogy is compared with that of six other SDEE techniques (Linear Regression, Support Vector Regression,...
It is assumed that Japanese can analogize the meaning of original text if they read the original text according to the commonality of written expressions, such as the commonality of Kanji and Chinese characters in case of Chinese-Japanese translations. In this study, participants rewrote translated sentences while viewing simultaneously the original sentences written in Chinese and the translated...
While agile has become a go-to methodology for software engineers engaged in software development, little research has explored the specific language choices used by these engineers in their agile-oriented processes. This study examines the language used by a Scrum team during the meetings of a 5-week sprint. Specifically, this study explores how certainty is presented by the group members through...
Meta-modeling has been a topic of interest in the modeling community for many years, yielding substantial number of papers describing its theoretical concepts. Many of them are aiming to solve the problem of traditional UML based domain-specific meta-modeling related to its non-compliance to the strict meta-modeling principle, such as the deep meta-modeling approach. In this paper, we show the practical...
Existing registries organize functionally similar services into groups without considering past service-usage from the consumers' perspective, a.k.a. pragmatics. Pragmatics can help registries to calculate service similarity more effectively and improve organization schemes. However, pragmatics are not available beforehand and their highly accumulated number over time creates time and space efficiency...
Modern telecommunication networks include different software kinds and operation systems with a large number of vulnerabilities. It is very important to assess risk levels for them. We suggested a method for vulnerability risk assessment in telecommunication networks. It is based on the Common Vulnerability Scoring System (CVSS) V3, expert judgments and fuzzy logic. We used fuzzy production rules...
Employee performance appraisal is vital activity that contributes to the competitiveness of the organization in its business domain. The appraisal criteria often chosen are primarily in qualitative nature, though there can be instances that associate with matric. Latest methods of evaluating employees use rating scale; however, it is incapable of providing real time performance feedback, in particular...
Automated test generation tools have been widely investigated with the goal of reducing the cost of testing activities. However, generated tests have been shownnot to help developers in detecting and finding more bugs even though they reach higher structural coverage compared to manual testing. The main reason is that generated tests are difficult to understand and maintain. Our paper proposes an...
Should the people performing a system’s architecture work also develop some of the system’s production code? Involving architects in carefully selected implementation tasks, such as testing, refactoring, or architectural spikes, can yield positive returns on investment for both the architects and their teams.
Defects uncovered during software testing usually consume a considerable amount of the overall project's budget. Unfortunately, project managers are not well-equipped with techniques to estimate such cost overrun. Moreover, incorporating defects removal process as part of the software testing activities has made the project managers overlook this important cost component during their planning processes...
To quickly locate the source code that maps to a specific change described in change history, establishing traceability links between release notes and source code is a necessary task. Current works on the traceability link recovery can be used to find out source code changes which are of higher textual similarities with the release note. However, these approaches rely on consistency of the text used...
Automated or semi-automated analysis of requirements specification documents, expressed in Natural Language (NL), has always been desirable. An important precursor to this goal is the identification and correction of potentially ambiguous requirements statements. Pronominal Anaphora ambiguity is one such type of pragmatic or referential ambiguity in NL requirements, which needs attention. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.