The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Natural language processing (NLP) and requirements engineering (RE) have had a long relationship, yet their combined use isn’t well established in industrial practice. This situation should soon change. The future evolution of the application of NLP technologies in RE can be viewed from four dimensions: discipline, dynamism, domain knowledge, and datasets.
A glossary is an important part of any software requirements document. By making explicit the technical terms in a domain and providing definitions for them, a glossary helps mitigate imprecision and ambiguity. A key step in building a glossary is to decide upon the terms to include in the glossary and to find any related terms. Doing so manually is laborious, particularly for large requirements documents...
In open software development environment, a large number of feature requests with mixed quality are often posted by stakeholders and usually managed in issue tracking systems. Thoroughly understanding and analyzing the real intents that feature requests imply is a labor-intensive and challenging task. In this paper, we introduce an approach to understand feature requests automatically. We generate...
Behavior-Driven Development (BDD) is a set of software engineering practices which uses a ubiquitous language, one that business and technical people can understand, to describe and model a system by a series of textual scenarios. However, we believe that the value of those textual scenarios is connected with how well they convey and document the details discussed by the team about the behaviors needed...
Starting in 2010, one of the most important policies for the introduction of Digital Technologies in schools, in modalities 1 to 1, has been implemented in Argentina: The “Programa Conectar Igualdad” (PCI, for its acronym in Spanish). This program proposed two complementary goals: one related to digital inclusion, which far exceeds school's ambit, and another one related to the improvement of education...
Software artifacts, such as requirements, design, source code, documentation, and safety-related artifacts are typically expressed using domain-specific terminology. Automated tools which attempt to analyze software artifacts in order to perform tasks such as trace retrieval and maintenance, domain analysis, program comprehension, or to service natural language queries, need to understand the vocabulary...
A code clone is a code fragment identical or similar to another code fragment in source code. Some of code clones are considered as a factor of bug replications and make it more difficult to maintain software. Various code clone detection tools have been proposed so far. However, in most algorithms adopted by existing clone detection tools, if program statements are reordered, they are not detected...
GitHub (https://sithub.com/) is a web-based repository for software projects and is reportedly the world's largest open source community, hosting over 31 million repositories that include both code and the documentation for that code. GitHub includes development tools such as issue tracking (bug reports and feature requests), notifications, diffs, and status dashboards; as well as social features...
Relatively little research has addressed the role of LI in the perception of English speech contrasts by Chinese learners of English as L3. The present study investigates the role of LI in the perception of the English alveolar-velar nasal coda contrast (/n/ vs. /η/) after the vowels /i Λ æ/ by bilingual Changsha Chinese speakers, whose LI is Changsha Chinese and L2 is Standard Mandarin. Changsha...
The implementations of signal processing systems on the emerging many-core or multi-core processing platforms require to solve a very difficult problem: how to partition and schedule the processing tasks according to given optimization functions such as data throughput, memory usage, energy consumption. Implementations based on dataflow programming approaches are recognized to be particularly interesting...
Many programming errors that we observe in novice programmers coincide with those that are described in literature. Due to their vast number, it is practically impossible to list all errors explicitly and describe interventions for each specific error. Therefore, to reduce the number of single instances that have to be considered, we developed an error classification scheme that enables us to classify...
In this paper, we develop a new approach to deal with neutrosphic shortest path problem in a network in which each edge weight (or length) is represented as triangular fuzzy neutrosophic number. The proposed algorithm also gives the shortest path length from source node to destination node using ranking function. Finally, an illustrative example is also included to demonstrate our proposed approach.
The CNC machine has been widely used in many manufacturers, many old CNC machines have an excellent mechanics, but the control system is not working. On other hand, selecting the control system design for retrofitting mini-CNC milling machine have many alternatives, in this study we proposed the Fuzzy-QFD integrated Analytic Hierarchy Process (AHP) to analyze the decision-making problem. To determine...
At the age of software modularization, Aspect-Oriented Software Development (AOSD) has become a central focus among researchers. In fact, recent developments in the aspect-orientation has increased the need for refactoring on the existing applications. Although, source code level refactoring has high levels of preferences, it still remains ambiguous since the crosscutting concern is hard to be located...
Dependability modeling and analysis relies on the usage of an unambiguous terminology model, in order to avoid misunderstandings and wrong interpretations. In both academia and industry, the most widely accepted approach is the fault-error-failure model, originally created by Avižienis and Laprie. Using this model for describing software faults and errors can help to establish a common vocabulary,...
According to the special feature of Trados, in this paper, the significant and function of the real-time voice system in English linguistics teaching was analyzed and the application of client in English linguistics teaching from three aspects discussed. At last, the Trados in English linguistics teaching was prospected.
One major problem in using static analyzers to manage, monitor, control, and reason about technical debt is that industrial projects have a huge amount of technical debt which reflects hundreds of quality rule violations (e.g., high complex module or low comment density). Moreover the negative impact of violating quality rules (i.e., technical debt interest) may vary across rules or even across contexts...
Help-seekers on community-based software help forums often face difficulty in composing queries or troubleshooting requests that bring immediate resolution, forcing help givers to request clarification that delays diagnosis. We investigate the characteristics of a forum post that trigger these requests for clarification from help givers (e.g., missing information, unclear goals, non-standard terminology)...
Data visualizations play a prominent role in enterprise information systems in various flavors. Traditional bar, line, or pie charts, or timelines, heat maps, geographical maps, dashboard gauges, and complex relationship mappings are examples of visualizations that are frequently used in business application scenarios. Despite their extensive use, however, there is only few theoretic reflection on...
Naming conventions can help the readability and comprehension of code, and thus the onboarding of new developers. Conventions also provide cues that help developers and tools extract information from identifier names to support software maintenance. Tools exist to automatically check naming conventions but they are often limited to simple checks, e.g. regarding typography. The adherence to more elaborate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.