Example similarity map    Similar Patents and Articles Toggle Patent Map

Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a characterization of the design space that these aspect mechanisms inhabit and a model description of their weaving processes. A good design space representation provides a common framework for understanding and evaluating existing mechanisms. A well-understood model of the weaving process can guide the implementor of new aspect mechanisms. It can guide the designer when mechanisms implementing new kinds of weaving are needed. It can also help teach aspect-oriented programming (AOP). In this paper we present and evaluate such a model of the design space for aspect mechanisms and their weaving processes. We model weaving, at an abstract level, as a concern integration process. We derive a weaving process model (WPM) top-down, differentiating a reactive from a nonreactive process. The model provides an in-depth explanation of the key subprocesses used by existing aspect mechanisms.

top of pageAUTHORS



Author image not provided  Sergei Kojarski

No contact information provided yet.

Bibliometrics: publication history
Publication years2003-2008
Publication count8
Citation Count63
Available for download6
Downloads (6 Weeks)4
Downloads (12 Months)11
Downloads (cumulative)3,934
Average downloads per article655.67
Average citations per article7.88
View colleagues of Sergei Kojarski


Author image not provided  David H. Lorenz

No contact information provided yet.

Bibliometrics: publication history
Publication years1994-2017
Publication count55
Citation Count292
Available for download42
Downloads (6 Weeks)13
Downloads (12 Months)156
Downloads (cumulative)13,850
Average downloads per article329.76
Average citations per article5.31
View colleagues of David H. Lorenz

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

1
 
2
L. Cardelli, editor. Proceedings of the 1European Conference on Object-Oriented Programming, number 2743 in Lecture Notes in Computer Science, Darmstadt, Germany, July 21-25 2003. ECOOP 2003, Springer Verlag.
 
3
 
4
R. E. Filman and D. P. Friedman. Aspect-oriented programming is quantification and obliviousness. In P. Tarr, L. Bergmans, M. Griss, and H. Ossher, editors, Workshop on Advanced Separation of Concerns, OOPSLA'00. Department of Computer Science, University of Twente, The Netherlands, 2000.
 
5
R. Jagadeesan, A. Jeffrey, and J. Riely. An untyped calculus for aspect oriented programs. In Cardelli {2}, pages 54--73.
 
6
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-oriented programming. In M. Akşit and S. Matsuoka, editors, Proceedings of the European Conference on Object Oriented Programming, number 1241 in Lecture Notes in Computer Science, pages 220--242, Jyväskylä, Finland, June 9-13 1997. ECOOP'97, Springer Verlag.
7
8
 
9
K. Lieberherr and D. H. Lorenz. Coupling Aspect-Oriented and Adaptive Programming. In Filman et al. {3}, pages 145--164.
 
10
D. H. Lorenz and S. Kojarski. Evolution of AOP mental models. In G. Kiczales and O. de Moor, editors, AOSD 2006 Workshop on Aspects in Teaching (AIT), Bonn, Germany, Mar. 20 2006.
 
11
D. H. Lorenz and S. Kojarski. Parallel composition of aspect mechanisms: Design and evaluation. In J. Brichau, S. Chiba, K. D. Volder, M. Haupt, R. Hirschfeld, D. H. Lorenz, H. Masuhara, and E. Tanter, editors, AOSD 2006 Workshop on Open and Dynamic Aspect Languages (ODAL), Bonn, Germany, Mar. 20 2006.
 
12
 
13
 
14
H. Masuhara and G. Kiczales. Modeling crosscutting in aspect-oriented mechanisms. In Cardelli {2}, pages 2--28.
 
15
H. Masuharaa, G. Kiczales, and C. Dutchyn. Compilation semantics of aspect-oriented programs, 2002. In AOSD 2002 FOAL Workshop.
16
17
 
18
D. T. Ross. Structured analysis (SA): A language for communicating ideas. IEEE Trans. Software Eng., 3(1):16--34, Jan. 1977.
19
20
21
22
 
23
 
24

top of pageCITED BY

13 Citations

 
 
 
 
 

top of pageINDEX TERMS

The ACM Computing Classification System (CCS rev.2012)

Note: Larger/Darker text within each node indicates a higher relevance of the materials to the taxonomic classification.

top of pagePUBLICATION

Title ICSE '06 Proceedings of the 28th international conference on Software engineering table of contents
General Chairs Leon J. Osterweil University of Massachusetts, USA
Program Chairs Dieter Rombach TU Kaiserslautern, Germany
Mary Lou Soffa University of Virginia, USA
Pages 212-221
Publication Date2006-05-28 (yyyy-mm-dd)
Sponsors SIGSOFT ACM Special Interest Group on Software Engineering
ACM Association for Computing Machinery
PublisherACM New York, NY, USA ©2006
ISBN: 1-59593-375-1 Order Number: 592060 doi>10.1145/1134285.1134316
Conference ICSEInternational Conference on Software Engineering ICSE logo
Overall Acceptance Rate 388 of 2,520 submissions, 15%
Year Submitted Accepted Rate
ICSE '95 155 28 18%
ICSE '99 294 56 19%
ICSE '01 268 47 18%
ICSE '02 303 45 15%
ICSE '03 324 42 13%
ICSE '04 436 58 13%
ICSE '08 370 56 15%
ICSE '08 370 56 15%
Overall 2,520 388 15%

APPEARS IN
Software

top of pageREVIEWS


Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

Proceedings of the 28th international conference on Software engineering
Table of Contents
SESSION: Keynote talks
Session details: Keynote talks
doi>10.1145/3245446
Full text: PDFPDF
Development of software engineering: co-operative efforts from academia, government and industry
Fuqing Yang, Hong Mei
Pages: 2-11
doi>10.1145/1134285.1134287
Full text: PDFPDF

In the past 40 years, software engineering has emerged as an important sub-field of computer science. The quality and productivity of software have been improved and the cost and risk of software development been decreased due to the contributions made ...
expand
A view of 20th and 21st century software engineering
Barry Boehm
Pages: 12-29
doi>10.1145/1134285.1134288
Full text: PDFPDF

George Santayana's statement, "Those who cannot remember the past are condemned to repeat it," is only half true. The past also includes successful histories. If you haven't been made aware of them, you're often condemned not to repeat their successes.In ...
expand
Optimization of software development
Reinhold Achatz
Pages: 30-30
doi>10.1145/1134285.1134289
Full text: PDFPDF

For many companies, including leaders in software development, software is becoming an increasingly critical competitive factor. For example, at Siemens, sixty percent of our business is strongly influenced by software and approximately fifty percent ...
expand
SESSION: Invited talks
Session details: Invited talks
doi>10.1145/3245447
Full text: PDFPDF
Empirically driven SE research: state of the art and required maturity
Victor Basili, Sebastian Elbaum
Pages: 32-32
doi>10.1145/1134285.1134291
Full text: PDFPDF

Software engineering researchers are increasingly relying on the empirical approach to advance the state of the art. The level of empirical rigor and evidence required to guide software engineering research, however, can vary drastically depending on ...
expand
Challenges in automotive software engineering
Manfred Broy
Pages: 33-42
doi>10.1145/1134285.1134292
Full text: PDFPDF

The amount of software in cars grows exponentially. Driving forces of this development are cheaper and more powerful hardware and the demand for innovations by new functions. The rapid increase of software and software based functionality brings various ...
expand
Living assistance systems: an ambient intelligence approach
Jürgen Nehmer, Martin Becker, Arthur Karshmer, Rosemarie Lamm
Pages: 43-50
doi>10.1145/1134285.1134293
Full text: PDFPDF

In this paper, we present an integrated system concept for the living assistance domain based on ambient intelligence technology and discuss the resulting challenges for the software engineering discipline. Automated living assistance systems represent ...
expand
SESSION: Research papers: architecture & design I
Session details: Research papers: architecture & design I
doi>10.1145/3245448
Full text: PDFPDF
Architectural support for trust models in decentralized applications
Girish Suryanarayana, Mamadou H. Diallo, Justin R. Erenkrantz, Richard N. Taylor
Pages: 52-61
doi>10.1145/1134285.1134295
Full text: PDFPDF

Decentralized applications are composed of distributed entities that directly interact with each other and make local autonomous decisions in the absence of a centralized coordinating authority. Such decentralized applications, where entities can join ...
expand
Efficient exploration of service-oriented architectures using aspects
Ingolf H. Krüger, Reena Mathew, Michael Meisinger
Pages: 62-71
doi>10.1145/1134285.1134296
Full text: PDFPDF

An important step in the development of large-scale distributed, reactive systems is the design of architectures that effectively support the systems' purposes. Early prototypes help to decide upon the most effective architecture for a ...
expand
Symbolic invariant verification for systems with dynamic structural adaptation
Basil Becker, Dirk Beyer, Holger Giese, Florian Klein, Daniela Schilling
Pages: 72-81
doi>10.1145/1134285.1134297
Full text: PDFPDF

The next generation of networked mechatronic systems will be characterized by complex coordination and structural adaptation at run-time. Crucial safety properties have to be guaranteed for all potential structural configurations. Testing cannot provide ...
expand
SESSION: Research papers: test & analysis I
Improving test suites for efficient fault localization
Benoit Baudry, Franck Fleurey, Yves Le Traon
Pages: 82-91
doi>10.1145/1134285.1134299
Full text: PDFPDF

The need for testing-for-diagnosis strategies has been identified for a long time, but the explicit link from testing to diagnosis (fault localization) is rare. Analyzing the type of information needed for efficient fault localization, we identify the ...
expand
Automated, contract-based user testing of commercial-off-the-shelf components
Lionel C. Briand, Yvan Labiche, Michal M. Sówka
Pages: 92-101
doi>10.1145/1134285.1134300
Full text: PDFPDF

Commercial-off-the-Shelf (COTS) components provide a means to construct software (component-based) systems in reduced time and cost. In a COTS component software market there exist component vendors (original developers of the component) and component ...
expand
An intensional approach to the specification of test cases for database applications
David Willmor, Suzanne M. Embury
Pages: 102-111
doi>10.1145/1134285.1134301
Full text: PDFPDF

When testing database applications, in addition to creating in-memory fixtures it is also necessary to create an initial database state that is appropriate for each test case. Current approaches either require exact database states to be specified in ...
expand
SESSION: Research papers: software components & reuse
Feature oriented refactoring of legacy applications
Jia Liu, Don Batory, Christian Lengauer
Pages: 112-121
doi>10.1145/1134285.1134303
Full text: PDFPDF

Feature oriented refactoring (FOR) is the process of decomposinga program into features, where a feature is an increment in programfunctionality. We develop a theory of FOR that relates code refac-toring to algebraic factoring. Our theory explains relationshipsbetween ...
expand
Aspectual mixin layers: aspects and features in concert
Sven Apel, Thomas Leich, Gunter Saake
Pages: 122-131
doi>10.1145/1134285.1134304
Full text: PDFPDF

Feature-Oriented Programming (FOP) decomposes complex software into features. Features are main abstractions in design and implementation. They reflect user requirements and incrementally refine one another. Although, features crosscut object-oriented ...
expand
Evaluating pattern catalogs: the computer games experience
M. Cutumisu, C. Onuczko, D. Szafron, J. Schaeffer, M. McNaughton, T. Roy, J. Siegel, M. Carbonaro
Pages: 132-141
doi>10.1145/1134285.1134305
Full text: PDFPDF

Patterns and pattern catalogs (pattern languages) have been proposed as a mechanism for re-use. Traditionally, patterns have been used to foster design re-use, and generative design patterns have been used to achieve both design and code re-use. In theory, ...
expand
SESSION: Research papers: test & analysis II
HDD: hierarchical delta debugging
Ghassan Misherghi, Zhendong Su
Pages: 142-151
doi>10.1145/1134285.1134307
Full text: PDFPDF

Inputs causing a program to fail are usually large and often contain information irrelevant to the failure. It thus helps debugging to simplify program inputs. The Delta Debugging algorithm is a general technique applicable to minimizing all failure-inducing ...
expand
Managing space for finite-state verification
Jianbin Tan, George S. Avrunin, Lori A. Clarke
Pages: 152-161
doi>10.1145/1134285.1134308
Full text: PDFPDF

Finite-state verification (FSV) techniques attempt to prove properties about a model of a system by examining all possible behaviors of that model. This approach suffers from the state-explosion problem, where the size of the model or the analysis costs ...
expand
Backwards-compatible array bounds checking for C with very low overhead
Dinakar Dhurjati, Vikram Adve
Pages: 162-171
doi>10.1145/1134285.1134309
Full text: PDFPDF

The problem of enforcing correct usage of array and pointer references in C and C++ programs remains unsolved. The approach proposed by Jones and Kelly (extended by Ruwase and Lam) is the only one we know of that does not require significant manual changes ...
expand
SESSION: Research papers: reverse engineering & refactoring
JunGL: a scripting language for refactoring
Mathieu Verbaere, Ran Ettinger, Oege de Moor
Pages: 172-181
doi>10.1145/1134285.1134311
Full text: PDFPDF

Refactorings are behaviour-preserving program transformations, typically for improving the structure of existing code. A few of these transformations have been mechanised in interactive development environments. Many more refactorings have been proposed, ...
expand
Inferring templates from spreadsheets
Robin Abraham, Martin Erwig
Pages: 182-191
doi>10.1145/1134285.1134312
Full text: PDFPDF

We present a study investigating the performance of a system for automatically inferring spreadsheet templates. These templates allow users to safely edit spreadsheets, that is, certain kinds of errors such as range, reference, and type errors can be ...
expand
Semantics-based reverse engineering of object-oriented data models
G. Ramalingam, Raghavan Komondoor, John Field, Saurabh Sinha
Pages: 192-201
doi>10.1145/1134285.1134313
Full text: PDFPDF

We present an algorithm for reverse engineering object-oriented (OO) data models from programs written in weakly-typed languages like Cobol. These models, similar to UML class diagrams, can facilitate a variety of program maintenance and migration activities. ...
expand
SESSION: Research papers: architecture & design II
Modeling behavioral design patterns of concurrent objects
Robert G. Pettit, IV, Hassan Gomaa
Pages: 202-211
doi>10.1145/1134285.1134315
Full text: PDFPDF

Object-oriented software development practices are being rapidly adopted within increasingly complex systems, including reactive, real-time and concurrent system applications. While data modeling is performed very well under current object-oriented development ...
expand
Modeling aspect mechanisms: a top-down approach
Sergei Kojarski, David H. Lorenz
Pages: 212-221
doi>10.1145/1134285.1134316
Full text: PDFPDF

A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a characterization of the design space that these aspect mechanisms inhabit and ...
expand
A Bayesian approach to diagram matching with application to architectural models
David Mandelin, Doug Kimelman, Daniel Yellin
Pages: 222-231
doi>10.1145/1134285.1134317
Full text: PDFPDF

IT system architectures, as well as other systems, are often described by formal models or informal diagrams. In practice, there are often a number of versions of a model, e.g. for different views of a system, divergent variants, or a series of revisions. ...
expand
SESSION: Research papers: test & analysis III
Modular checking for buffer overflows in the large
Brian Hackett, Manuvir Das, Daniel Wang, Zhe Yang
Pages: 232-241
doi>10.1145/1134285.1134319
Full text: PDFPDF

We describe an ongoing project, the deployment of a modular checker to statically find and prevent every buffer overflow in future versions of a Microsoft product. Lightweight annotations specify requirements for safely using each buffer, and functions ...
expand
Discovering faults in idiom-based exception handling
Magiel Bruntink, Arie van Deursen, Tom Tourwé
Pages: 242-251
doi>10.1145/1134285.1134320
Full text: PDFPDF

In this paper, we analyse the exception handling mechanism of a state-of-the-art industrial embedded software system. Like many systems implemented in classic programming languages, our subject system uses the popular return-code idiom for dealing with ...
expand
Static detection of leaks in polymorphic containers
David L. Heine, Monica S. Lam
Pages: 252-261
doi>10.1145/1134285.1134321
Full text: PDFPDF

This paper presents the first practical static analysis tool that can find memory leaks and double deletions of objects held in polymorphic containers. This is especially important since most dynamically allocated objects are stored in containers.The ...
expand
SESSION: Research papers: test & analysis IV
Osprey: a practical type system for validating dimensional unit correctness of C programs
Lingxiao Jiang, Zhendong Su
Pages: 262-271
doi>10.1145/1134285.1134323
Full text: PDFPDF

Misuse of measurement units is a common source of errors in scientific applications, but standard type systems do not prevent such errors. Dimensional analysis in physics can be used to manually detect such errors in physical equations. It is, however, ...
expand
Locating faults through automated predicate switching
Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
Pages: 272-281
doi>10.1145/1134285.1134324
Full text: PDFPDF

Typically debugging begins when during a program execution a point is reached at which an obviously incorrect value is observed. A general and powerful approach to automated debugging can be based upon identifying modifications to the program state that ...
expand
Perracotta: mining temporal API rules from imperfect traces
Jinlin Yang, David Evans, Deepali Bhardwaj, Thirumalesh Bhat, Manuvir Das
Pages: 282-291
doi>10.1145/1134285.1134325
Full text: PDFPDF

Dynamic inference techniques have been demonstrated to provide useful support for various software engineering tasks including bug finding, test suite evaluation and improvement, and specification generation. To date, however, dynamic inference has only ...
expand
SESSION: Research papers: theory & formal methods
Incremental consistency checking for pervasive context
Chang Xu, S. C. Cheung, W. K. Chan
Pages: 292-301
doi>10.1145/1134285.1134327
Full text: PDFPDF

Applications in pervasive computing are typically required to interact seamlessly with their changing environments. To provide users with smart computational services, these applications must be aware of incessant context changes in their environments ...
expand
Interacting process classes
Ankit Goel, Sun Meng, Abhik Roychoudhury, P. S. Thiagarajan
Pages: 302-311
doi>10.1145/1134285.1134328
Full text: PDFPDF

Many reactive control systems consist of classes of interacting objects where the objects belonging to a class exhibit similar behaviors. Such interacting process classes appear in telecommunication, transportation and avionics domains. In this paper, ...
expand
Symbolic model checking of declarative relational models
Felix Sheng-Ho Chang, Daniel Jackson
Pages: 312-320
doi>10.1145/1134285.1134329
Full text: PDFPDF

This paper explores the idea of augmenting traditional model checkers with the expressiveness of a declarative, relational language. The goal is to enable programmers to write very intuitive and compact specifications, in order to allow the automatic ...
expand
SESSION: Research papers: empirical methods & measurement
Estimating LOC for information systems from their conceptual data models
Hee Beng Kuan Tan, Yuan Zhao, Hongyu Zhang
Pages: 321-330
doi>10.1145/1134285.1134331
Full text: PDFPDF

Effort and cost estimation is crucial in software management. Estimation of software size plays a key role in the estimation. Line of Code (LOC) is still a commonly used software size measure. Despite the fact that software sizing is well recognized ...
expand
Development of a hybrid cost estimation model in an iterative manner
Adam Trendowicz, Jens Heidrich, Jürgen Münch, Yasushi Ishigai, Kenji Yokoyama, Nahomi Kikuchi
Pages: 331-340
doi>10.1145/1134285.1134332
Full text: PDFPDF

Cost estimation is a very crucial field for software developing companies. The acceptance of an estimation technique is highly dependent on estimation accuracy. Often, this accuracy is only determined after an initial application. Possible further steps ...
expand
On the success of empirical studies in the international conference on software engineering
Carmen Zannier, Grigori Melnik, Frank Maurer
Pages: 341-350
doi>10.1145/1134285.1134333
Full text: PDFPDF

Critiques of the quantity and quality of empirical evaluations in software engineering have existed for quite some time. However such critiques are typically not empirically evaluated. This paper fills this gap by empirically analyzing papers published ...
expand
SESSION: Research papers: software process & workflow
Publishing and composition of atomicity-equivalent services for B2B collaboration
Chunyang Ye, S. C. Cheung, W. K. Chan
Pages: 351-360
doi>10.1145/1134285.1134335
Full text: PDFPDF

Exception handling resolves inconsistency by backward or forward error recovery methods or both in Business-to-Business (B2B) process collaboration. To avoid committing irrevocable tasks followed by exceptions, B2B processes, which guarantee the atomicity ...
expand
Who should fix this bug?
John Anvik, Lyndon Hiew, Gail C. Murphy
Pages: 361-370
doi>10.1145/1134285.1134336
Full text: PDFPDF

Open source development projects typically support an open bug repository to which both developers and users can report bugs. The reports that appear in this repository must be triaged to determine if the report is one which requires attention and if ...
expand
Model-based development of dynamically adaptive software
Ji Zhang, Betty H. C. Cheng
Pages: 371-380
doi>10.1145/1134285.1134337
Full text: PDFPDF

Increasingly, software should dynamically adapt its behavior at run-time in response to changing conditions in the supporting computing and communication infrastructure, and in the surrounding physical environment. In order for an adaptive program to ...
expand
SESSION: Research papers: development with UML
Instant consistency checking for the UML
Alexander Egyed
Pages: 381-390
doi>10.1145/1134285.1134339
Full text: PDFPDF

Inconsistencies in design models should be detected immediately to save the engineer from unnecessary rework. Yet, tools are not capable of keeping up with the engineers' rate of model changes. This paper presents an approach for quickly, correctly, ...
expand
Traffic-aware stress testing of distributed systems based on UML models
Vahid Garousi, Lionel C. Briand, Yvan Labiche
Pages: 391-400
doi>10.1145/1134285.1134340
Full text: PDFPDF

A stress test methodology aimed at increasing chances of discovering faults related to network traffic in distributed systems is presented. The technique uses the UML 2.0 model of the distributed system under test, augmented with timing information, ...
expand
Effects of defects in UML models: an experimental investigation
Christian F. J. Lange, Michel R. V. Chaudron
Pages: 401-411
doi>10.1145/1134285.1134341
Full text: PDFPDF

The Unified Modeling Language (UML) is the de facto standard for designing and architecting software systems. UML offers a large number of diagram types that can be used with varying degree of rigour. As a result UML models may contain consistency defects. ...
expand
SESSION: Experience papers: risk analysis
Session details: Experience papers: risk analysis
Forrest Shull
doi>10.1145/3245449
Full text: PDFPDF
Experiences and results from initiating field defect prediction and product test prioritization efforts at ABB Inc.
Paul Luo Li, James Herbsleb, Mary Shaw, Brian Robinson
Pages: 413-422
doi>10.1145/1134285.1134343
Full text: PDFPDF

Quantitatively-based risk management can reduce the risks associated with field defects for both software producers and software consumers. In this paper, we report experiences and results from initiating risk-management activities at a large systems ...
expand
A risk-driven method for eXtreme programming release planning
Mingshu Li, Meng Huang, Fengdi Shu, Juan Li
Pages: 423-430
doi>10.1145/1134285.1134344
Full text: PDFPDF

XP (eXtreme Programming) has become popular for IID (Iteration and Increment Development). It is suitable for small teams, lightweight projects and vague/volatile requirements. However, some challenges are left to developers when they desire to practise ...
expand
Assessing COTS integration risk using cost estimation inputs
Ye Yang, Barry Boehm, Betsy Clark
Pages: 431-438
doi>10.1145/1134285.1134345
Full text: PDFPDF

Most risk analysis tools and techniques require the user to enter a good deal of information before they can provide useful diagnoses. In this paper, we describe an approach to enable the user to obtain a COTS glue code integration risk analysis with ...
expand
SESSION: Experience papers: using metrics
Lessons learnt from the analysis of large-scale corporate databases
Barbara Kitchenham, Cat Kutay, Ross Jeffery, Colin Connaughton
Pages: 439-444
doi>10.1145/1134285.1134347
Full text: PDFPDF

This paper presents the lessons learnt during the analysis of the corporate databases developed by IBM Global Services (Australia). IBM is rated as CMM level 5. Following CMM level 4 and above practices, IBM designed several software metrics databases ...
expand
Metrics for model driven requirements development
Brian Berenbach, Gail Borotto
Pages: 445-451
doi>10.1145/1134285.1134348
Full text: PDFPDF

The CMMI defines two process areas associated with requirements elicitation: Requirements Development (RD) and Requirements Management (REQM). The Measurements and Analysis process area (MA) requires measurements and quantitative objectives for RD and ...
expand
Mining metrics to predict component failures
Nachiappan Nagappan, Thomas Ball, Andreas Zeller
Pages: 452-461
doi>10.1145/1134285.1134349
Full text: PDFPDF

What is it that makes software fail? In an empirical study of the post-release defect history of five Microsoft software systems, we found that failure-prone software entities are statistically correlated with code complexity measures. However, there ...
expand
SESSION: Experience papers: experiences with open source and legacy systems
Experiences with place lab: an open source toolkit for location-aware computing
Timothy Sohn, William G. Griswold, James Scott, Anthony LaMarca, Yatin Chawathe, Ian Smith, Mike Chen
Pages: 462-471
doi>10.1145/1134285.1134351
Full text: PDFPDF

Location-based computing (LBC) is becoming increasing important in both industry and academia. A key challenge is the pervasive deployment of LBC technologies; to be effective they must run on a wide variety of client platforms, including laptops, PDAs, ...
expand
A case study of a corporate open source development model
Vijay K. Gurbani, Anita Garvert, James D. Herbsleb
Pages: 472-481
doi>10.1145/1134285.1134352
Full text: PDFPDF

Open source practices and tools have proven to be highly effective for overcoming the many problems of geographically distributed software development. We know relatively little, however, about the range of settings in which they work. In particular, ...
expand
Redesigning legacy applications for the web with UWAT+: a case study
Damiano Distante, Gerardo Canfora, Scott Tilley, Shihong Huang
Pages: 482-491
doi>10.1145/1134285.1134353
Full text: PDFPDF

This paper reports on a case study of redesigning a legacy application for the Web using the Ubiquitous Web Applications Design Framework with an extended version of its Transaction Design Model (UWAT+). Web application design methodologies hold the ...
expand
SESSION: Experience papers: software development practices
Maintaining mental models: a study of developer work habits
Thomas D. LaToza, Gina Venolia, Robert DeLine
Pages: 492-501
doi>10.1145/1134285.1134355
Full text: PDFPDF

To understand developers' typical tools, activities, and practices and their satisfaction with each, we conducted two surveys and eleven interviews. We found that many problems arose because developers were forced to invest great effort recovering implicit ...
expand
Applying the Value/Petri process to ERP software development in China
LiGuo Huang, Barry Boehm, Hao Hu, Jidong Ge, Jian Lü, Cheng Qian
Pages: 502-511
doi>10.1145/1134285.1134356
Full text: PDFPDF

Commercial organizations increasingly need software processes sensitive to business value, quick to apply, and capable of early analysis for subprocess consistency and compatibility. This paper presents experience in applying a lightweight synthesis ...
expand
Applying regression test selection for COTS-based applications
Jiang Zheng, Brian Robinson, Laurie Williams, Karen Smiley
Pages: 512-522
doi>10.1145/1134285.1134357
Full text: PDFPDF

ABB incorporates a variety of commercial-off-the-shelf (COTS) components in its products. When new releases of these components are made available for integration and testing, source code is often not provided. Various regression test selection processes ...
expand
SESSION: Far east experience papers: development technique
Session details: Far east experience papers: development technique
K. Kishida
doi>10.1145/3245450
Full text: PDFPDF
Reengineering standalone C++ legacy systems into the J2EE partition distributed environment
Xinyu Wang, Jianling Sun, Xiaohu Yang, Chao Huang, Zhijun He, Srinivasa R. Maddineni
Pages: 525-533
doi>10.1145/1134285.1134359
Full text: PDFPDF

Many enterprise systems are developed in C++ language and most of them are standalone. Because the standalone software can not follow the new market environment, reengineering the standalone legacy systems into distributed environment becomes a critical ...
expand
UML-based service robot software development: a case study
Minseong Kim, Suntae Kim, Sooyong Park, Mun-Taek Choi, Munsang Kim, Hassan Gomaa
Pages: 534-543
doi>10.1145/1134285.1134360
Full text: PDFPDF

The research field of Intelligent Service Robots, which has become more and more popular over the last years, covers a wide range of applications from climbing machines for cleaning large storefronts to robotic assistance for disabled or elderly people. ...
expand
Analysis of the interaction between practices for introducing XP effectively
Osamu Kobayashi, Mitsuyoshi Kawabata, Makoto Sakai, Eddy Parkinson
Pages: 544-550
doi>10.1145/1134285.1134361
Full text: PDFPDF

In this paper, we discuss interactions between XP (eXtreme Programming) practices. We discuss 2 case studies of introducing XP practices selectively from the 13 practices which are defined in XP, and we analyze how to select practices. Our analysis is ...
expand
SESSION: Far east experience papers: evaluation
Experiments on quality evaluation of embedded software in Japan robot software design contest
Hironori Washizaki, Yasuhide Kobayashi, Hiroyuki Watanabe, Eiji Nakajima, Yuji Hagiwara, Kenji Hiranabe, Kazuya Fukuda
Pages: 551-560
doi>10.1145/1134285.1134363
Full text: PDFPDF

As a practical opportunity for educating Japanese young developers in the field of embedded software development, a software design contest involving the design of software to automatically control a line-trace robot, and conduct running performance ...
expand
Procurement of enterprise resource planning systems: experiences with some Hong Kong companies
Pak-Lok Poon, Yuen Tak Yu
Pages: 561-568
doi>10.1145/1134285.1134364
Full text: PDFPDF

Many cases of adoption of Enterprise Resource Planning (ERP) systems have been reported in the literature. Some of the adopted ERP systems fail to satisfy the customer's requirements, despite the high spending and substantial efforts that have been put ...
expand
Detecting low usability web pages using quantitative data of users' behavior
Noboru Nakamichi, Kazuyuki Shima, Makoto Sakai, Ken-ichi Matsumoto
Pages: 569-576
doi>10.1145/1134285.1134365
Full text: PDFPDF

The purpose of this research is to detect low usability web pages from the behavior of users, such as browsing time, mouse movement and eye movement. We experimented to investigate the relation between the quantitative data viewing behavior of users ...
expand
SESSION: Far east experience papers: software process
Experiences of applying SPC techniques to software development processes
Mutsumi Komuro
Pages: 577-584
doi>10.1145/1134285.1134367
Full text: PDFPDF

Experiences of applying SPC techniques to software development processes are described. Several real examples to apply SPC in Hitachi Software are given. Measures, control charts, and analysis judgment are given. Characteristics of software development ...
expand
BSR: a statistic-based approach for establishing and refining software process performance baseline
Qing Wang, Nan Jiang, Lang Gou, Xia Liu, Mingshu Li, Yongji Wang
Pages: 585-594
doi>10.1145/1134285.1134368
Full text: PDFPDF

High-level process management is quantitative management. The Process Performance Baseline (PPB) of process or subprocess under statistical management is the most important concept. It is the basis of process control and improvement. The existing methods ...
expand
Practical approach to development of SPI activities in a large organization: Toshiba's SPI history since 2000
Hideto Ogasawara, Takashi Ishikawa, Tetsuro Moriya
Pages: 595-599
doi>10.1145/1134285.1134369
Full text: PDFPDF

For the effective promotion of software process improvement (SPI) activities in a large-scale organization, it is necessary to establish an organizational structure and a deployment method for promotion and to develop training courses, support tools, ...
expand
POSTER SESSION: Far east experience papers: posters
Estimation of project success using Bayesian classifier
Seiya Abe, Osamu Mizuno, Tohru Kikuno, Nahomi Kikuchi, Masayuki Hirayama
Pages: 600-603
doi>10.1145/1134285.1134371
Full text: PDFPDF

The software projects are considered to be successful if the cost and the duration are within the estimated ones and the quality is satisfactory. To attain project success, the project management, in which the final status of project is estimated, must ...
expand
Efficiency analysis of model-based review in actual software design
Hitoshi Furusawa, Eun-Hye Choi, Hiroshi Watanabe
Pages: 604-607
doi>10.1145/1134285.1134372
Full text: PDFPDF

In this paper, we quantitatively analyze the efficiency of the Model-Based Review (MBR) method in an actual software design from the two points of view; cost and reviewability. The MBR method is a modeling procedure for the purpose of reviewing preliminary ...
expand
Research journey towards industrial application of reuse technique
Stan Jarzabek, Ulf Pettersson
Pages: 608-611
doi>10.1145/1134285.1134373
Full text: PDFPDF

Component-based reuse in mission critical Command and Control system domain was a starting point for a long lasting research collaboration between National University of Singapore (NUS) and ST Electronics Pte. Ltd. (STEE). STEE industrial projects as ...
expand
A series of development methodologies for a variety of systems in Korea
Jihyun Lee, Jin-Sam Kim, Jin-Hee Cho
Pages: 612-615
doi>10.1145/1134285.1134374
Full text: PDFPDF

To meet the development condition of inside of the country, domestic development methodologies are made with the abbreviation of MaRMI (Magic and Robust Methodology Integrated) in a series of methodologies in South Korea. The MaRMI have the four different ...
expand
Effects of software industry structure on a research framework for empirical software engineering
Yoshiki Mitani, Nahomi Kikuchi, Tomoko Matsumura, Satoshi Iwamura, Yoshiki Higo, Katsuro Inoue, Mike Barker, Ken-ichi Matsumoto
Pages: 616-619
doi>10.1145/1134285.1134375
Full text: PDFPDF

The authors describe a new research framework for applying empirical software engineering methods in industrial practice and accomplishments in using it. The selected target for applying the framework is a governmentally funded software development project ...
expand
Experience from applying RIM to educational ERP development
Autcha Mutchalintungkul, Juthamas Oonhawat, Kittiphong Pholpipatanaphong, Daricha Sutivong, Nakornthip Prompoon
Pages: 620-623
doi>10.1145/1134285.1134376
Full text: PDFPDF

Developing a complex system requires partitioning the target system into several subsystems. It is generally difficult to define each subsystem's scope and functional requirements as well as data dependencies among subsystems. Requirements Integration ...
expand
Critical factors in establishing and maintaining trust in software outsourcing relationships
Phong Thanh Nguyen, Muhammad Ali Babar, June M. Verner
Pages: 624-627
doi>10.1145/1134285.1134377
Full text: PDFPDF

Trust is considered one of the most important factors for successfully managing software outsourcing relationships. However, there is lack of research into understanding the factors that are considered important in establishing and maintaining trust ...
expand
Software practices in five ASEAN countries: an exploratory study
Raymund Sison, Stanislaw Jarzabek, Ow Siew Hock, Wanchai Rivepiboon, Nguyen Nam Hai
Pages: 628-631
doi>10.1145/1134285.1134378
Full text: PDFPDF

There is a lack of published studies on software development in Southeast Asia, which is fast becoming an IT outsourcing haven. This paper presents exploratory survey and case study results on software practices of some software firms in five ASEAN countries ...
expand
Overseas development for a major U.S. eCommerce website
Jiang Wu, Sheldon Wang, Christine Chau, Lei Zeng, Jinsong Lin
Pages: 632-635
doi>10.1145/1134285.1134379
Full text: PDFPDF

In this paper, we describe our experience in establishing a software development center in China with the purpose of supporting a major U.S. eCommerce website. We have established a set of development processes that fit our business needs to develop ...
expand
An experimental comparison of four test suite reduction techniques
Hao Zhong, Lu Zhang, Hong Mei
Pages: 636-640
doi>10.1145/1134285.1134380
Full text: PDFPDF

As a test suite usually contains redundancy, a subset of the test suite (representative set) may still satisfy all the test objectives. As the redundancy increases the cost of executing the test suite, many test suite reduction techniques have been brought ...
expand
SESSION: Education papers: advanced topics in software engineering education
Session details: Education papers: advanced topics in software engineering education
L. Williams
doi>10.1145/3245451
Full text: PDFPDF
Engineering the software requirements of nonprofits: a service-learning approach
Shankar Venkatagiri
Pages: 643-648
doi>10.1145/1134285.1134382
Full text: PDFPDF

This paper is a cross-study of service-learning projects executed by student groups in a 10-week course on software engineering. The principal benefits of service-learning are demonstrated by the groups in this setting. The course is structured to support ...
expand
Using return on investment to compare agile and plan-driven practices in undergraduate group projects
P. J. Rundle, R. G. Dewar
Pages: 649-654
doi>10.1145/1134285.1134383
Full text: PDFPDF

In this paper we describe our experiences of introducing agile practices into undergraduate group work by comparing the results to more traditional plan-driven groups. When considering whether to adopt an agile or plan-driven project management strategy ...
expand
So you want brooks in your classroom?
Daniel Port, David Klappholz
Pages: 655-660
doi>10.1145/1134285.1134384
Full text: PDFPDF

Fred Brooks' seminal book, "The Mythical Man-Month" (MMM) is a firmly established classic in software engineering. Many of us feel compelled to use this work to help our students appreciate and put into practice the fundamental software engineering concepts ...
expand
SESSION: Education papers: software engineering education fundamentals
Software engineering for undergraduates
Nenad Stankovic
Pages: 661-666
doi>10.1145/1134285.1134386
Full text: PDFPDF

Software engineering has evolved, over a short period of time, into a dominant and omnipresent industry. In education we have recognized the importance of both managerial and technical aspects, but often failed to organize them in a coherent course with ...
expand
Dimensions of software engineering course design
Mario Bernhart, Thomas Grechenig, Jennifer Hetzl, Wolfgang Zuser
Pages: 667-672
doi>10.1145/1134285.1134387
Full text: PDFPDF

A vast variety of topics relate to the field of Software Engineering. Some universities implement curricula covering all aspects of Software Engineering. A number of other courses cover detailed aspects, e.g. programming, usability and security issues, ...
expand
Inculcating invariants in introductory courses
David Evans, Michael Peck
Pages: 673-678
doi>10.1145/1134285.1134388
Full text: PDFPDF

One goal of introductory software engineering courses is to motivate and instill good software engineering habits. Unfortunately, practical constraints on typical courses often lead to student experiences that are antithetical to that goal: instead of ...
expand
SESSION: Education papers: distributed development
Distributed development: an education perspective on the global studio project
Ita Richardson, Allen E. Milewski, Neel Mullick, Patrick Keil
Pages: 679-684
doi>10.1145/1134285.1134390
Full text: PDFPDF

The Global Studio Project integrated the work of Software Engineering students spread across four countries into a single project and represented, for most of the students, their first major "real-world" development experience. Interviews indicated that ...
expand
Instructional design and assessment strategies for teaching global software development: a framework
Daniela Damian, Allyson Hadwin, Ban Al-Ani
Pages: 685-690
doi>10.1145/1134285.1134391
Full text: PDFPDF

In the context of increasing pressure to adopt global approaches to software development, the importance of teaching skills for geographically distributed software development (GSD) becomes essential. This paper reports the experience of teaching a course ...
expand
POSTER SESSION: Education papers: posters
Assessing undergraduate experience of continuous integration and test-driven development
Jon Bowyer, Janet Hughes
Pages: 691-694
doi>10.1145/1134285.1134393
Full text: PDFPDF

A number of agile practices are included in software engineering curricula, including test-driven development. Continuous integration often is not included, despite it becoming increasingly common in industry to code, test, and integrate at the same ...
expand
A comparison of communication technologies to support novice team programming
Davor ČubraniĆ, Margaret-Anne D. Storey, Jody Ryall
Pages: 695-698
doi>10.1145/1134285.1134394
Full text: PDFPDF

This paper describes an initial investigation of how different conditions for conducting a team programming exercise impact learning. We conducted a series of in-depth case studies on the use of various communication technologies and compared them with ...
expand
Experience in teaching a software reengineering course
Mohammad El-Ramly
Pages: 699-702
doi>10.1145/1134285.1134395
Full text: PDFPDF

Software engineering curricula emphasize developing new software systems. Little attention is given to how to change and modernize existing systems, i.e., the theory and practice of software maintenance and reengineering. This paper presents the author's ...
expand
Teaching framework for software development methods
Orit Hazzan, Yael Dubinsky
Pages: 703-706
doi>10.1145/1134285.1134396
Full text: PDFPDF

In this paper we suggest a framework for teaching software development methods (SDMs). Specifically, based on our accumulative research and in-practice experience of teaching SDMs, a set of principles, that guides our teaching of SDMs in different settings ...
expand
A software process for time-constrained course projects
Wilson P. Paula Filho
Pages: 707-710
doi>10.1145/1134285.1134397
Full text: PDFPDF

Defined software engineering processes help to perform and guide software engineering course projects. However, several difficult issues are involved in designing a software process for this purpose. This design is even harder when it must suit time-constrained ...
expand
SESSION: Software engineering: achievements & challenges: ubiquitous and distributed systems
Session details: Software engineering: achievements & challenges: ubiquitous and distributed systems
J. Kramer
doi>10.1145/3245452
Full text: PDFPDF
Challenges in the age of ubiquitous computing: a case study of T-Engine, an open development platform for embedded systems
Ken Sakamura
Pages: 713-720
doi>10.1145/1134285.1134399
Full text: PDFPDF

Ubiquitous Computing poses new challenges for the software engineering community. The T-Engine platform consisting of standard real-time kernel, T-Kernel, running on the standard hardware with networking facility creates broad application opportunities ...
expand
A software architecture-based framework for highly distributed and data intensive scientific applications
Chris A. Mattmann, Daniel J. Crichton, Nenad Medvidovic, Steve Hughes
Pages: 721-730
doi>10.1145/1134285.1134400
Full text: PDFPDF

Modern scientific research is increasingly conducted by virtual communities of scientists distributed around the world. The data volumes created by these communities are extremely large, and growing rapidly. The management of the resulting highly distributed, ...
expand
SESSION: Software engineering: achievements & challenges: domain-specific challenges
A research agenda for distributed software development
Bikram Sengupta, Satish Chandra, Vibha Sinha
Pages: 731-740
doi>10.1145/1134285.1134402
Full text: PDFPDF

In recent years, a number of business reasons have caused software development to become increasingly distributed. Remote development of software offers several advantages, but it is also fraught with challenges. In this paper, we report on our study ...
expand
Managing exceptions in the medical workflow systems
Minmin Han, Thomas Thiery, Xiping Song
Pages: 741-750
doi>10.1145/1134285.1134403
Full text: PDFPDF

Over the years, medical informatics researchers have studied how to use software technologies to provide decision support for using evidence-based medical procedures. Software professionals have investigated how to support hospital administration, therapy ...
expand
Multi-platform user interface construction: a challenge for software engineering-in-the-small
Judith Bishop
Pages: 751-760
doi>10.1145/1134285.1134404
Full text: PDFPDF

The popular view of software engineering focuses on managing teams of people to produce large systems. This paper addresses a different angle of software engineering, that of development for re-use and portability. We consider how an essential part of ...
expand
SESSION: Software engineering: achievements & challenges: formal methods
Formal methods in industry: achievements, problems, future
Jean-Raymond Abrial
Pages: 761-768
doi>10.1145/1134285.1134406
Full text: PDFPDF

Two real projects using the B formal method are quickly presented. They show how some important parts of complex systems can be developed in such a way that the outcome is "correct by construction". A number of factors are then analyzed relating the ...
expand
DEMONSTRATION SESSION: Research demonstrations: verification and testing
Session details: Research demonstrations: verification and testing
M. Dwyer, K. Futatsugi
doi>10.1145/3245453
Full text: PDFPDF
LTSA-WS: a tool for model-based verification of web service compositions and choreography
Howard Foster, Sebastian Uchitel, Jeff Magee, Jeff Kramer
Pages: 771-774
doi>10.1145/1134285.1134408
Full text: PDFPDF

In this paper we describe a tool for a model-based approach to verifying compositions of web service implementations. The tool supports verification of properties created from design specifications and implementation models to confirm expected results ...
expand
HighSpec: a tool for building and checking OZTA models
J. S. Dong, P. Hao, X. Zhang, S. C. Qin
Pages: 775-778
doi>10.1145/1134285.1134409
Full text: PDFPDF

HighSpec is an interactive system for composing and checking OZTA specifications. The integrated high level specification language, OZTA, is a combination of Object-Z (OZ) and Timed Automata (TA). Building on the strength of Object-Z's in specifying ...
expand
GridUnit: software testing on the grid
Alexandre Duarte, Walfredo Cirne, Francisco Brasileiro, Patricia Machado
Pages: 779-782
doi>10.1145/1134285.1134410
Full text: PDFPDF

Software testing is a fundamental part of system development. As software grows, its test suite becomes larger and its execution time may become a problem to software developers. This is especially the case for agile methodologies, which preach a short ...
expand
DEMONSTRATION SESSION: Research demonstrations: development and transformation
ASADAL: a tool system for co-development of software and test environment based on product line engineering
Kyungseok Kim, Hyejung Kim, Miyoung Ahn, Minseok Seo, Yeop Chang, Kyo C. Kang
Pages: 783-786
doi>10.1145/1134285.1134412
Full text: PDFPDF

Recently, product line software engineering (PLSE) is gaining popularity. To employ PLSE methods, many organizations are looking for a tool system that supports PLSE methods so that core assets and target software can be developed and tested in an effective ...
expand
Developing and executing java AWT applications on limited devices with TCPTE
Gerardo Canfora, Giuseppe Di Santo, Eugenio Zimeo
Pages: 787-790
doi>10.1145/1134285.1134413
Full text: PDFPDF

The paper describes TCPTE, a framework that supports the development of thin-client applications for mobile devices. By using this framework, Java AWT applications can be executed on a server and their graphical interfaces can be displayed on a remote ...
expand
Interactive transformation of java programs in eclipse
Marat Boshernitsan, Susan L. Graham
Pages: 791-794
doi>10.1145/1134285.1134414
Full text: PDFPDF

Implementing large and sweeping changes to software source code can be tedious and error-prone. A conceptually simple change may require a significant code editing effort. Integrating scriptable source-to-source program transformations into development ...
expand
DEMONSTRATION SESSION: Research demonstrations: data base and business process
Preventing SQL injection attacks using AMNESIA
William G. J. Halfond, Alessandro Orso
Pages: 795-798
doi>10.1145/1134285.1134416
Full text: PDFPDF

AMNESIA is a tool that detects and prevents SQL injection attacks by combining static analysis and runtime monitoring. Empirical evaluation has shown that AMNESIA is both effective and efficient against SQL injection.
expand
A framework for automatic generation of evolvable e-commerce workplaces using business processes
Ying Zou, Qi Zhang
Pages: 799-802
doi>10.1145/1134285.1134417
Full text: PDFPDF

Business processes encapsulate the knowledge of operations and services provided by organizations. Due to the changing nature of business processes, the design and implementation of e-commerce applications, such as workplace applications, could not be ...
expand
LISFS: a logical information system as a file system
Yoann Padioleau, Benjamin Sigonneau, Olivier Ridoux
Pages: 803-806
doi>10.1145/1134285.1134418
Full text: PDFPDF

We present Logical Information Systems (LIS). A LIS can be viewed as a schema-less database whose objects are described by logical formulas. Objects are automatically organized according to their logical description, and logical formulas can be used ...
expand
DEMONSTRATION SESSION: Informal tool demonstrations
Relational programming with CrocoPat
Dirk Beyer
Pages: 807-810
doi>10.1145/1134285.1134420
Full text: PDFPDF

Many structural analyses of software systems are naturally formalized as relational queries, for example, the detection of design patterns, patterns of problematic design, code clones, dead code, and differences between the as-built and the as-designed ...
expand
Addressing crosscutting deployment and configuration concerns of distributed real-time and embedded systems via aspect-oriented & model-driven software development
Gan Deng, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 811-814
doi>10.1145/1134285.1134421
Full text: PDFPDF

Model-driven development (MDD) is gaining importance as an approach to resolving lifecycle challenges of large-scale distributed real-time and embedded (DRE) systems (e.g., avionics mission computing). DRE systems are characterized by their stringent ...
expand
FormulaBuilder: a tool for graph-based modelling and generation of formulae
Sven Jörges, Tiziana Margaria, Bernhard Steffen
Pages: 815-818
doi>10.1145/1134285.1134422
Full text: PDFPDF

In this paper we present the FormulaBuilder, a flexible tool for graph-based modelling and generation of formulae. The FormulaBuilder allows easy and intuitive creation of formulae by using basic components called Formula Building Blocks (FBBs) and arranging ...
expand
Tools for model-based security engineering
Jan Jürjens, Jorge Fox
Pages: 819-822
doi>10.1145/1134285.1134423
Full text: PDFPDF

We present tool-support for checking UML models and C code against security requirements. A framework supports implementing verification routines, based on XMI output of the diagrams from UML CASE tools, and on control flow generated from the C code. ...
expand
LtRules: an automated software library usage rule extraction tool
Chang Liu, En Ye, Debra J. Richardson
Pages: 823-826
doi>10.1145/1134285.1134424
Full text: PDFPDF

The need to manually specify temporal properties of software systems is a major barrier to wider adoption of software model checking, because the specification of software temporal properties is a difficult, time-consuming, and error-prone process. To ...
expand
MuJava: a mutation system for java
Yu-Seung Ma, Jeff Offutt, Yong-Rae Kwon
Pages: 827-830
doi>10.1145/1134285.1134425
Full text: PDFPDF

Mutation testing is a valuable experimental research technique that has been used in many studies. It has been experimentally compared with other test criteria, and also used to support experimental comparisons of other test criteria, by using mutants ...
expand
A tool for analyzing and detecting malicious mobile code
Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue
Pages: 831-834
doi>10.1145/1134285.1134426
Full text: PDFPDF

We present a tool for analysis and detection of malicious mobile code such as computer viruses and internet worms based on the combined use of code simulation, static code analysis, and OS execution emulation. Unlike traditional anti-virus methods, the ...
expand
Automatic extraction of abstract-object-state machines from unit-test executions
Tao Xie, Evan Martin, Hai Yuan
Pages: 835-838
doi>10.1145/1134285.1134427
Full text: PDFPDF

An automatic test-generation tool can produce a large number of test inputs to exercise the class under test. However, without specifications, developers cannot inspect the execution of each automatically generated test input practically. To address ...
expand
3D visualization for concept location in source code
Xinrong Xie, Denys Poshyvanyk, Andrian Marcus
Pages: 839-842
doi>10.1145/1134285.1134428
Full text: PDFPDF

The paper presents a set of tools that work in conjunction to support concept location in software. One of the tools, IRiSS (Information Retrieval based Software Search), is a search engine, designed and implemented to allow searching the source code ...
expand
SESSION: Emerging results: architecture
Session details: Emerging results: architecture
B. H. C. Cheng, B. Shen
doi>10.1145/3245454
Full text: PDFPDF
Towards a distributed software architecture evaluation process: a preliminary assessment
Muhammed Ali Babar, Barbara Kitchenham, Ian Gorton
Pages: 845-848
doi>10.1145/1134285.1134430
Full text: PDFPDF

Scenario-based methods for evaluating software architecture require a large number of stakeholders to be collocated for evaluation sessions. Collocating stakeholders is often an expensive exercise. We have proposed a framework for distributed evaluation ...
expand
Identifying "good" architectural design alternatives with multi-objective optimization strategies
Lars Grunske
Pages: 849-852
doi>10.1145/1134285.1134431
Full text: PDFPDF

Architecture trade-off analysis methods are appropriate techniques to evaluate design decisions and design alternatives with respect to conflicting quality requirements. However, the identification of good design alternatives is a time consuming task, ...
expand
Estimating software component reliability by leveraging architectural models
Roshanak Roshandel, Somo Banerjee, Leslie Cheung, Nenad Medvidovic, Leana Golubchik
Pages: 853-856
doi>10.1145/1134285.1134432
Full text: PDFPDF

Software reliability techniques are aimed at reducing or eliminat-ing failures in software systems. Reliability in software systems istypically measured during or after system implementation. How-ever, software engineering methodology lays stress on ...
expand
An architectural style for high-performance asymmetrical parallel computations
David Woollard, Nenad Medvidovic
Pages: 857-860
doi>10.1145/1134285.1134433
Full text: PDFPDF

Researchers with deep knowledge of scientific domains are becoming more interested in developing highly-adaptive and irregular (asymmetrical) parallel computations, leading to development challenges for both delivery of data for computation and ...
expand
SESSION: Emerging results: formal methods and analysis
Dynamically discovering likely interface invariants
Christoph Csallner, Yannis Smaragdakis
Pages: 861-864
doi>10.1145/1134285.1134435
Full text: PDFPDF

Dynamic invariant detection is an approach that has received considerable attention in the recent research literature. A natural question arises in languages that separate the interface of a code module from its implementation: does an inferred invariant ...
expand
Easy language extension with meta-aspectJ
Shan Shan Huang, Yannis Smaragdakis
Pages: 865-868
doi>10.1145/1134285.1134436
Full text: PDFPDF

Domain-specific languages hold the potential of automating the software development process. Nevertheless, the adoption of a domain-specific language is hindered by the difficulty of transitioning to different language syntax and employing a separate ...
expand
Evaluation of mutation testing for object-oriented programs
Yu-Seung Ma, Mary Jean Harrold, Yong-Rae Kwon
Pages: 869-872
doi>10.1145/1134285.1134437
Full text: PDFPDF

The effectiveness of mutation testing depends heavily on the types of faults that the mutation operators are designed to represent. Thus, the quality of the mutation operators is key to mutation testing. Although, mutation operators for object-oriented ...
expand
Integrating static analysis and general-purpose theorem proving for termination analysis
Panagiotis Manolios, Daron Vroon
Pages: 873-876
doi>10.1145/1134285.1134438
Full text: PDFPDF

We present emerging results from our work on termination analysis of software systems. We have designed a static analysis algorithm which attains increased precision and flexibility by issuing queries to a theorem prover. We have implemented our algorithm ...
expand
The problem of knowledge decoupling in software development projects
Yutaka Yamauchi, Jack Whalen, Nozomi Ikeya, Erik Vinkhuyzen
Pages: 877-880
doi>10.1145/1134285.1134439
Full text: PDFPDF

In our ethnographic investigation of software integration projects a recurrent pattern emerges. The detailed understanding leaders have of the design and development decreases over time as they become busier and busier attending meetings, creating documents, ...
expand
SESSION: Emerging results: metrics
Using the balanced scorecard process to compute the value of software applications
Steven B. Dolins
Pages: 881-884
doi>10.1145/1134285.1134441
Full text: PDFPDF

This paper describes a method that will provide practical help for IT managers and other enterprise executives who want to determine the value of their software projects. A set of measures is described that can help the IT manager determine the value ...
expand
Designing an economic-driven evaluation framework for process-oriented software technologies
Bela Mutschler, Johannes Bumiller, Manfred Reichert
Pages: 885-888
doi>10.1145/1134285.1134442
Full text: PDFPDF

During the last decade there has been a dramatic increase in the number of paradigms, standards and tools that can be used to realize process-oriented information systems. A major problem neglected in software engineering research so far has been the ...
expand
Portfolio management of software development projects using COCOMO II
Wiboon Jiamthubthugsin, Daricha Sutivong
Pages: 889-892
doi>10.1145/1134285.1134443
Full text: PDFPDF

Software development projects are subject to external and internal risks that cause delays, budget overrun and poor quality. Portfolio management can be used to alleviate this problem, as it pools resources together and allows for resource sharing among ...
expand
SESSION: Emerging results: program analysis
Effective identification of source code authors using byte-level information
Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis Katsikas
Pages: 893-896
doi>10.1145/1134285.1134445
Full text: PDFPDF

Source code author identification deals with the task of identifying the most likely author of a computer program, given a set of predefined author candidates. This is usually .based on the analysis of other program samples of undisputed authorship by ...
expand
An empirical study on decision making in off-the-shelf component-based development
Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Marco Torchiano, Maurizio Morisio
Pages: 897-900
doi>10.1145/1134285.1134446
Full text: PDFPDF

Component-based software development (CBSD) is becoming more and more important since it promotes reuse to higher levels of abstraction. As a consequence, many components are available being either open-source software (OSS) or commercial-off-the-shelf ...
expand
Understanding software application interfaces via string analysis
Evan Martin, Tao Xie
Pages: 901-904
doi>10.1145/1134285.1134447
Full text: PDFPDF

In software systems, different software applications often interact with each other through specific interfaces by exchanging data in string format. For example, web services interact with each other through XML strings. Database applications interact ...
expand
Using an information retrieval system to retrieve source code samples
Renuka Sindhgatta
Pages: 905-908
doi>10.1145/1134285.1134448
Full text: PDFPDF

Software developers often face steep learning curves in using a new framework, library, or new versions of frameworks for developing their piece of software. In large organizations, developers learn and explore use of frameworks, rarely realizing, several ...
expand
Ensemble of missing data techniques to improve software prediction accuracy
Bhekisipho Twala, Michelle Cartwright, Martin Shepperd
Pages: 909-912
doi>10.1145/1134285.1134449
Full text: PDFPDF

Software engineers are commonly faced with the problem of incomplete data. Incomplete data can reduce system performance in terms of predictive accuracy. Unfortunately, rare research has been conducted to systematically explore the impact of missing ...
expand
A methodology and tool for performance analysis of distributed server systems
Rukma Prabhu Verlekar, Varsha Apte
Pages: 913-916
doi>10.1145/1134285.1134450
Full text: PDFPDF

We present a methodology and tool for performance analysis of distributed server systems, which allows high-level specification of the system, and generates and solves the underlying queueing network model. Our approach is different from the existing ...
expand
SESSION: Emerging results: requirements engineering
The role of asynchronous discussions in increasing the effectiveness of remote synchronous requirements negotiations
Daniela Damian, Filippo Lanubile, Teresa Mallardo
Pages: 917-920
doi>10.1145/1134285.1134452
Full text: PDFPDF

Important and yet very difficult process in software development, requirements engineering is plagued with additional challenges in the emergent dynamics of geographically distributed software teams. Our hypothesis is that a mix of lean and rich communication ...
expand
"How do I know what I have to do?": the role of the inquiry culture in requirements communication for distributed software development projects
Vesna Mikulovic, Michael Heiss
Pages: 921-925
doi>10.1145/1134285.1134453
Full text: PDFPDF

As software specifications for complex systems are practically never 100% complete and consistent, the recipient of the specification needs domain knowledge in order to decide which parts of the system are specified clearly and which parts are specified ...
expand
Analysis of multi-agent systems based on KAOS modeling
Hiroyuki Nakagawa, Takuya Karube, Shinichi Honiden
Pages: 926-929
doi>10.1145/1134285.1134454
Full text: PDFPDF

The purpose of this study is to reduce the gap between the requirement analysis and analysis phases of developing multi-agent systems. We utilize KAOS, one of the goal-oriented analysis methodologies, as a requirement analysis method, and propose a model ...
expand
Understanding requirements for computer-aided healthcare workflows: experiences and challenges
Xiping Song, Beatrice Hwong, Gilberto Matos, Arnold Rudorfer, Christopher Nelson, Minmin Han, Andrei Girenkov
Pages: 930-934
doi>10.1145/1134285.1134455
Full text: PDFPDF

Medical informatics and software engineering researchers have studied how to use software technologies to define, analyze, automate, and provide decision support for healthcare workflows. We, as the requirement engineering and prototyping group of the ...
expand
SESSION: Doctoral symposium: presentations
Session details: Doctoral symposium: presentations
A. Finkelstein, B. Nuseibeh
doi>10.1145/3245455
Full text: PDFPDF
Automating bug report assignment
John Anvik
Pages: 937-940
doi>10.1145/1134285.1134457
Full text: PDFPDF

Open-source development projects typically support an open bug repository to which both developers and users can report bugs. A report that appears in this repository must be triaged to determine if the report is one which requires attention and if it ...
expand
P2P file sharing analysis for a better performance
Martha-Rocio Ceballos, Juan-Luis Gorricho
Pages: 941-944
doi>10.1145/1134285.1134458
Full text: PDFPDF

The so-called second generation P2P file-sharing applications have with no doubt a better performance than the first implementations. The most remarkable difference is due to the file division into smaller pieces, where a receiving peer of any piece ...
expand
Resolving component deployment & configuration challenges for enterprise DRE systems via frameworks & generative techniques
Gan Deng
Pages: 945-948
doi>10.1145/1134285.1134459
Full text: PDFPDF

Component-based software engineering (CBSE) is increasingly being adopted for large-scale software systems, particularly for enterprise distributed real-time and embedded (DRE) systems. One of the most challenging-and often most neglected-problems ...
expand
A framework for modelling and analysis of software systems scalability
Leticia Duboc, David S. Rosenblum, Tony Wicks
Pages: 949-952
doi>10.1145/1134285.1134460
Full text: PDFPDF

Scalability is a widely-used term in scientific papers, technical magazines and software descriptions. Its use in the most varied contexts contribute to a general confusion about what the term really means. This lack of consensus is a potential source ...
expand
Refactoring-aware version control
Tammo Freese
Pages: 953-956
doi>10.1145/1134285.1134461
Full text: PDFPDF

Today, refactorings are supported in some integrated development environments (IDEs). The refactoring operations can only work correctly if all source code that needs to be changed is available to the IDE. However, this precondition neither holds for ...
expand
Testing-based interactive fault localization
Dan Hao
Pages: 957-960
doi>10.1145/1134285.1134462
Full text: PDFPDF
Unanticipated reuse of large-scale software features
Reid Holmes
Pages: 961-964
doi>10.1145/1134285.1134463
Full text: PDFPDF

Software reuse has been endorsed as a way to reduce development times and costs while increasing software quality and reliability. Techniques designed to encourage software reuse have concentrated on creating reusable software in the form of frameworks, ...
expand
Improving the customer configuration update process by explicitly managing software knowledge
Slinger Jansen
Pages: 965-968
doi>10.1145/1134285.1134464
Full text: PDFPDF

The implementation and continuous support of a software product at a customer with evolving requirements is a complex task for a product software vendor. There are many customers for the vendor to serve, all of whom might require their own version or ...
expand
Visual languages for event integration specification
Na Liu
Pages: 969-972
doi>10.1145/1134285.1134465
Full text: PDFPDF

We are exploring existing approaches and developing new techniques for visual event-based system integration. We are using domain-specific visual languages with different high-level visual metaphors (including Tool Abstraction, Event-Query-Filter-Action ...
expand
XML conceptual modeling with XUML
HongXing Liu, YanSheng Lu, Qing Yang
Pages: 973-976
doi>10.1145/1134285.1134466
Full text: PDFPDF

As XML has become the standard format for representing structured and semi-structured data on the Web, the methods for designing XML schemas is becoming more and more important. XML schemas represent the logical models of the documents. In order to design ...
expand
Experimental program analysis: a new paradigm for program analysis
Joseph R. Ruthruff
Pages: 977-980
doi>10.1145/1134285.1134467
Full text: PDFPDF

Program analysis techniques are used by software engineers to deduce and infer targeted characteristics of software systems for tasks such as testing, debugging, maintenance, and program comprehension. Recently, some program analysis techniques have ...
expand
The echo approach to formal verification
Xiang Yin
Pages: 981-984
doi>10.1145/1134285.1134468
Full text: PDFPDF

In this research abstract, we propose Echo: a general formal verification approach that combines theorem proving, model checking, and code-level tools to show an implementation's compliance with its formal specification. We believe that this approach ...
expand
A new approach for software testability analysis
Liang Zhao
Pages: 985-988
doi>10.1145/1134285.1134469
Full text: PDFPDF

Software testability analysis has been an important research direction since 1990s and becomes more pervasive when entering 21st century. In this paper, we summarize problems in existing research work. We propose to use beta distribution to indicate ...
expand
POSTER SESSION: Doctoral symposium: posters
Debugging by asking questions about program output
Andrew Ko
Pages: 989-992
doi>10.1145/1134285.1134471
Full text: PDFPDF

One reason debugging is the most time-consuming part of software development is because developers struggle to map their questions about a program's behavior onto debugging tools' limited support for analyzing code. Interrogative debugging is a new debugging ...
expand
Improving the quality of UML models in practice
Christian F. J. Lange
Pages: 993-996
doi>10.1145/1134285.1134472
Full text: PDFPDF

The importance of UML models in software engineering is increasing. Inherent to the UML is its lack of a formal semantics, its risk for inconsistency and completeness defects and the absence of modeling norms. These properties are sources for poor model ...
expand
Developing cost-effective model-based techniques for GUI testing
Qing Xie
Pages: 997-1000
doi>10.1145/1134285.1134473
Full text: PDFPDF

Most of today's software users interact with the software through a graphical user interface (GUI). While GUIs have become ubiquitous, testing of GUIs has remained until recently, a neglected research area. Existing GUI testing techniques are extremely ...
expand
Taking lessons from history
Thomas Zimmermann
Pages: 1001-1005
doi>10.1145/1134285.1134474
Full text: PDFPDF

Mining of software repositories has become an active research area. However, most past research considered any change to software as beneficial. This thesis will show how we can benefit from a classification into good and bad changes. The knowledge of ...
expand
WORKSHOP SESSION: Workshops
Session details: Workshops
F. Paulisch
doi>10.1145/3245456
Full text: PDFPDF
Software engineering for secure systems
Danilo Bruschi, Bart De Win, Mattia Monga
Pages: 1007-1008
doi>10.1145/1134285.1134476
Full text: PDFPDF
Second international workshop on interdisciplinary software engineering research (WISER)
Nikolay Mehandjiev, Pearl Brereton, John Hosking
Pages: 1009-1010
doi>10.1145/1134285.1134477
Full text: PDFPDF

WISER is a series of international workshops that focus on identifying and transferring techniques from other disciplines that might usefully be applied to software engineering research and practice.The workshops address this topic through presentations ...
expand
Third international summit on software engineering education (SSEE III): bridging the university/industry gap
J. Barrie Thompson, Helen M. Edwards
Pages: 1011-1012
doi>10.1145/1134285.1134478
Full text: PDFPDF

Innovative University/Industry interactions are examined in this open event with the aim of providing inputs to an international project that is being funded through the United Kingdom's Teaching Fellowship Scheme. These inputs will support the first ...
expand
Early aspects at ICSE: workshop in aspect-oriented requirements engineering and architecture design
Paul C. Clements
Pages: 1013-1014
doi>10.1145/1134285.1134479
Full text: PDFPDF

This paper summarizes the Workshop in Aspect-Oriented Requirements Engineering and Architecture Design.
expand
Software engineering for adaptive and self-managing systems
Betty H. C. Cheng, David Garlan, Rogério de Lemos, Jeff Magee, Richard Taylor, Stephen Fickas, Hausi Müller
Pages: 1015-1016
doi>10.1145/1134285.1134480
Full text: PDFPDF

The objective of this workshop is to consolidate the interest in the software engineering community on autonomic, self-managing, self-healing, self-optimizing, self-configuring, and self-adaptive systems. The workshop will provide a forum for researchers ...
expand
The role of abstraction in software engineering
Jeff Kramer, Orit Hazzan
Pages: 1017-1018
doi>10.1145/1134285.1134481
Full text: PDFPDF

This workshop explores the concept of abstraction in software engineering at the individual, team and organization level. The aim is to explore the role of abstraction in dealing with complexity in the software engineering process, to discuss how the ...
expand
Workshop description of 4th workshop on software quality (WOSQ)
Sunita Chulani, Barry Boehm, June Verner, Bernard Wong
Pages: 1019-1020
doi>10.1145/1134285.1134482
Full text: PDFPDF

Cost, schedule and quality are highly correlated factors in software development. They basically form three sides of the same triangle. Beyond a certain point (the "Quality is Free" point), it is difficult to increase the quality without increasing either ...
expand
MSR 2006: the 3rd international workshop on mining software repositories
Stephan Diehl, Harald Gall, Martin Pinzger, Ahmed E. Hassan
Pages: 1021-1021
doi>10.1145/1134285.1134483
Full text: PDFPDF
Fifth workshop on software engineering for large-scale multi-agent systems (SELMAS)
Ricardo Choren, Ho-fung Leung, Alessandro Garcia, Carlos Lucena, Holger Giese, Alexander Romanovsky
Pages: 1022-1023
doi>10.1145/1134285.1134484
Full text: PDFPDF

Software is becoming present in every aspect of our lives, pushing us inevitably towards a world of ambient computing systems. Multi-agent systems (MAS) are a prominent technology which facilitates modeling and development of large-scale distributed ...
expand
Workshop on technology transfer in software engineering
Warren Harrison, R. J. Wieringa
Pages: 1024-1025
doi>10.1145/1134285.1134485
Full text: PDFPDF

In many industries, the adoption of technology developed at universities and independent research labs is the prevalent paradigm. However, in the software space, this is a relatively rare occurrence. In many cases, academic software engineering tends ...
expand
First international workshop on global integrated model management
Jean Bézivin, Jean-Marie Favre, Bernhard Rumpe
Pages: 1026-1027
doi>10.1145/1134285.1134486
Full text: PDFPDF
The first international workshop on automation of software test
Hong Zhu, Joseph R. Horgan, S. C. Cheung, J. Jenny Li
Pages: 1028-1029
doi>10.1145/1134285.1134487
Full text: PDFPDF
2nd international workshop on advances and applications of problem frames
Jon G. Hall, Lucia Rapanotti, Karl Cox, Zhi Jin
Pages: 1030-1031
doi>10.1145/1134285.1134488
Full text: PDFPDF

Software problems originate from real world problems. A software solution must address its real world problem in a satisfactory way. A software engineer must therefore understand the real world problem that their software intends to address. To be able ...
expand
Global software development for the practitioner
Philippe Kruchten, Yvonne Hsieh, Eve MacGregor, Deependra Moitra, Wolfgang Strigel, Christof Ebert
Pages: 1032-1033
doi>10.1145/1134285.1134489
Full text: PDFPDF

This International Workshop on Global Software Development for the Practitioner (GSD2006) was held in conjunction with the 28th International Conference on Software Engineering (ICSE 2006) on May 23rd, 2006 in Shanghai, China. The ...
expand
3rd international workshop on software engineering for automotive systems - SEAS 2006
Martin Rappl, Alexander Pretschner, Christian Salzmann, Thomas Stauner
Pages: 1034-1034
doi>10.1145/1134285.1134490
Full text: PDFPDF

This workshop summary presents an overview of the one-day International Workshop on Software Engineering for Automotive Systems (SEAS 2006), held in conjunction with the 28th International Conference on Software Engineering (ICSE'06). Details ...
expand
Fourth international workshop on dynamic analysis (WODA 2006)
Neelam Gupta, Andy Podgurski
Pages: 1035-1035
doi>10.1145/1134285.1134491
Full text: PDFPDF

Dynamic analysis techniques reason over program executions and deal with data produced at program execution time. Dynamic analysis and static analysis techniques complement each other. Hence, a key focus of the workshop is dynamic analysis of software ...
expand
International workshop on service oriented software engineering (IW-SOSE'06)
Elisabetta Di Nitto, Robert J. Hall, Jun Han, Yanbo Han, Andrea Polini, Kurt Sandkuhl, Andrea Zisman
Pages: 1036-1037
doi>10.1145/1134285.1134492
Full text: PDFPDF
The 8th international workshop on economics-driven software engineering research
Rick Kazman, Kevin Sullivan
Pages: 1038-1038
doi>10.1145/1134285.1134493
Full text: PDFPDF

This paper presents the 8th International Workshop on Economics-Driven Software Engineering Research (EDSER-8).
expand
Workshop description of 5th intl. workshop on scenarios and state machines: models-algorithms-and tools (SCESM)
Jon Whittle, Leif Geiger, Michael Meisinger
Pages: 1039-1040
doi>10.1145/1134285.1134494
Full text: PDFPDF

SCESM '06 is the 5th International Workshop on Scenarios and State Machines: Models, Algorithms and Tools. It is a one day ICSE '06 workshop. Details about SCESM '06 may be found at http://ise.gmu.edu/scesm06/.
expand
TUTORIAL SESSION: Tutorials: full day tutorials
Session details: Tutorials: full day tutorials
S. C. Cheung, S. Easterbrook
doi>10.1145/3245457
Full text: PDFPDF
Software engineering themes for the future
Gerhard Fischer
Pages: 1043-1044
doi>10.1145/1134285.1134496
Full text: PDFPDF

The objective of this tutorial is to provide the participants with opportunities to think differently about future challenges facing software engineering research and practice. Collaborative design, social creativity, and meta-design are identified ...
expand
Case studies for software engineers
Dewayne E. Perry, Susan Elliott Sim, Steve Easterbrook
Pages: 1045-1046
doi>10.1145/1134285.1134497
Full text: PDFPDF

The topic of this full-day tutorial was the correct use and interpretation of case studies as an empirical research method. Using an equal blend of lecture and discussion, it gave attendees a foundation for conducting, reviewing, and reading case studies. ...
expand
Engineering safety-related requirements for software-intensive systems
Donald Firesmith
Pages: 1047-1048
doi>10.1145/1134285.1134498
Full text: PDFPDF

Many software-intensive systems have significant safety ramifications and need to have their associated safety-related requirements properly engineered. It has been observed by multiple consultants, researchers, and authors that inadequate requirements ...
expand
Variability management in software product line engineering
Klaus Pohl, Andreas Metzger
Pages: 1049-1050
doi>10.1145/1134285.1134499
Full text: PDFPDF

By explicitly modeling and managing variability, software product line engineering provides a systematic approach for creating a diversity of similar products at low cost, in short time, and with high quality. This tutorial focuses on the two principle ...
expand
Performing systematic literature reviews in software engineering
David Budgen, Pearl Brereton
Pages: 1051-1052
doi>10.1145/1134285.1134500
Full text: PDFPDF

Context: Making best use of the growing number of empirical studies in Software Engineering, for making decisions and formulating research questions, requires the ability to construct an objective summary of available research evidence. Adopting ...
expand
Cost-effective engineering of web applications pragmatic reuse: building web application product lines
Stan Jarzabek, Ulf Pettersson
Pages: 1053-1054
doi>10.1145/1134285.1134501
Full text: PDFPDF

Web Applications (WA) are developed and maintained under tight schedules. Much similarity across WAs creates opportunities for cutting development cost and easing evolution via reuse. This tutorial shows a practical way to exploit similarity patterns ...
expand
Software evolution: analysis and visualization
Harald C. Gall, Michele Lanza
Pages: 1055-1056
doi>10.1145/1134285.1134502
Full text: PDFPDF

Gaining higher level evolutionary information about large software systems is a key challenge in dealing with increasing complexity and decreasing software quality. Software repositories such as modifications, changes, or release information are rich ...
expand
Agile methods: moving towards the mainstream of the software industry
Frank Maurer, Grigori Melnik
Pages: 1057-1058
doi>10.1145/1134285.1134503
Full text: PDFPDF

A fleet of emerging agile methods of software development (with eXtreme Programming and Scrum being the most broadly used) is both gaining popularity and generating lots of controversy. This high-level tutorial gives an overview of agile methods and ...
expand
Designing concurrent, distributed, and real-time applications with UML
Hassan Gomaa
Pages: 1059-1060
doi>10.1145/1134285.1134504
Full text: PDFPDF

Object-oriented concepts are crucial in software design because they address fundamental issues of adaptation and evolution. With the proliferation of object-oriented notations and methods, the Unified Modeling Language (UML) has emerged to provide a ...
expand
TUTORIAL SESSION: Tutorials: half-day tutorials
Aspect-oriented software development beyond programming
Awais Rashid, Alessandro Garcia, Ana Moreira
Pages: 1061-1062
doi>10.1145/1134285.1134506
Full text: PDFPDF

This tutorial focuses on applying aspect-oriented software development (AOSD) concepts beyond the programming stage of the software development life cycle. Using concrete methods, tools, techniques and notations we discuss how to use AOSD techniques ...
expand
From semantic web to expressive software specifications: a modeling languages spectrum
Jin Song Dong
Pages: 1063-1064
doi>10.1145/1134285.1134507
Full text: PDFPDF

Many researchers at W3C currently focus on developing the next generation of the Web --- the Semantic Web. The development of the Web ontology languages, RDF, OWL and SWRL, is reminiscent of the early development of system specification languages in ...
expand
Software architectures for dependable systems: a software engineering perspective
Rogério de Lemos
Pages: 1065-1066
doi>10.1145/1134285.1134508
Full text: PDFPDF

Although there is a large body of research in dependability, architectural level reasoning about dependability is only just emerging as an important theme in software development. This is due to the fact that dependability concerns are often left until ...
expand
Tutorial: towards dynamic web services
Luciano Baresi, Sam Guinea
Pages: 1067-1068
doi>10.1145/1134285.1134509
Full text: PDFPDF

This tutorial introduces dynamic web services as a solution to cope with the dynamism and flexibility required by many modern software systems. Current technologies (WSDL, WS-BPEL, etc.) have proven insufficient in addressing these issues; however, ...
expand
Tutorial: an overview of UML 2
Bran Selic
Pages: 1069-1070
doi>10.1145/1134285.1134510
Full text: PDFPDF

This half-day tutorial covers the salient features of the first major revision of the Unified Modeling Language - UML 2. This short note summarizes the major topics covered by the tutorial.
expand
Web service orchestration with BPEL
Liang Chen, Bruno Wassermann, Wolfgang Emmerich, Howard Foster
Pages: 1071-1072
doi>10.1145/1134285.1134511
Full text: PDFPDF
Creative requirements: invention and its role in requirements engineering
Neil Maiden, Suzanne Robertson, James Robertson
Pages: 1073-1074
doi>10.1145/1134285.1134512
Full text: PDFPDF

Requirements is too often seen as a "stenographer's task", one where the requirements engineer passively listens and records while the stakeholders state their needs. However, this approach relies on stakeholders knowing what they need, and what they ...
expand
Testing concurrent java components
Paul Strooper, Luke Wildman
Pages: 1075-1076
doi>10.1145/1134285.1134513
Full text: PDFPDF

Testing concurrent software is notoriously difficult due to problems with non-determinism and synchronisation. While tools and techniques for the testing of sequential components are well-understood and widely used, similar tools and techniques for concurrent ...
expand
Modeling of component based systems
Weizhong Shao, Gang Huang, Haiyan Zhao
Pages: 1077-1078
doi>10.1145/1134285.1134514
Full text: PDFPDF

Component based software development (CBSD) becomes a popular paradigm for Internet based systems. Compared to other popular paradigms, CBSD supports the development from reusable components other than the development from the scratch. Consequently, ...
expand
How to integrate usability into the software development process
Natalia Juristo, Xavier Ferre
Pages: 1079-1080
doi>10.1145/1134285.1134515
Full text: PDFPDF

Usability is increasingly recognized as a quality attribute that one has to explicitly deal with during development. Nevertheless, usability techniques, when applied, are decoupled from the software development process. The host of techniques offered ...
expand
Software component models
Kung-Kiu Lau
Pages: 1081-1082
doi>10.1145/1134285.1134516
Full text: PDFPDF

Component-based Development (CBD) is an important emerging topic in Software Engineering, promising long sought after benefits like increased reuse and reduced time-to-market (and hence software production cost). However, there are at present many obstacles ...
expand

Powered by The ACM Guide to Computing Literature


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us