@Preamble{
"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
"\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-SIGSOFT = "ACM SIGSOFT Software Engineering Notes"}
@Article{deSousa:2010:AAR,
author = "Thiago C. de Sousa and Jorge R. {Almeida, Jr.} and
Sidney Viana and Judith Pav{\'o}n",
title = "Automatic analysis of requirements consistency with
the {B} method",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--4",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734114",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "A consistent requirements specification is a
fundamental success factor for quality software
development projects. On the one hand, writing
requirements in a natural language is not good for an
automated conflict detection process. On the other
hand, formal methods provide the basis for consistency
checking of requirements specification automatically.
In this paper, the potential of the B method for
improving the requirements quality under the
consistency dimension is discussed. We present an
approach to use B specifications derived from a
controlled natural language to identify requirements
inconsistencies",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kalaimagal:2010:QIQ,
author = "Sivamuni Kalaimagal and Rengaramanujam Srinivasan",
title = "{Q'Facto 12}: an improved quality model for {COTS}
components",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--4",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734116",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Component Based Software Engineering (CBSE) offers
developers the twin benefits of reduced software life
cycles and shorter development times. However the
success of the component based paradigm depends on the
quality of the COTS components purchased and integrated
into the existing software systems. The need of the
hour therefore is a quality model that can be used by
software developers to evaluate the quality of software
components before integrating them into existing
systems. This paper discusses a quality model called
Q'Facto12 based on the ISO25000 quality standard that
can be used to evaluate the quality of COTS components.
The model is an upgrade of an earlier model called the
Q'Facto 10 model that was proposed by us. This paper
provides an outline of the Q'Facto 12 model compares
the model with the Q'Facto 10 model and highlights why
the Q'Facto 12 model is better than the Q'Facto 10
model. An experimental study to demonstrate the use of
the model has also been presented",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nami:2010:SNN,
author = "Mohammad Reza Nami and Jila Saneipour",
title = "Self-* e-nursing: a new idea in nursing",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--4",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734117",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The rapid advances in Information and Communication
Technology (ICT), management, and network technologies
have had key role in emerging heterogeneous large-scale
distributed systems. The term of E-nursing has been
used to refer to the incorporation of ICT into nursing.
An Autonomous system has as its vision the creation of
self managing systems to address today's concerns of
complexity and total cost of ownership while meeting
tomorrow's needs for pervasive and ubiquitous
computation and communication. Purpose of this paper is
to present an autonomous virtual organization for
e-nursing describing their characteristics, effects on
quality factors, their building blocks architecture,
and challenges",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bhatia:2010:ACB,
author = "Rajesh K. Bhatia and Mayank Dave and R. C. Joshi",
title = "Ant colony based rule generation for reusable software
component retrieval",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--5",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734110",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Storage and representation of reusable software
components in software repositories to facilitate
convenient identification and retrieval has been always
a concern for software reuse researchers. This paper
discusses and demonstrated an ant colony algorithm
based technique that generates rules to store and then
identify the component from software repository for
possible reuse. Proposed technique help user in
organization and storage of components in repository
and later can help in identifying most appropriate
component for given context. In first stage while
searching it makes use of keywords, their synonyms and
their inter-relationships. Then it makes use of ant
colony optimization; initial pheromone of one is
assigned to all domain representative terms of
components. By updating pheromone for participating
terms and non-participating terms iteratively and by
calculating the quality of each rule generated, it
leads to quality rules to represent and retrieve the
reusable components",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chodkowski:2010:RIA,
author = "Steven Chodkowski",
title = "Recommendations for the information architect's book
shelf",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--5",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734112",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dahiya:2010:TSE,
author = "Deepak Dahiya",
title = "Teaching software engineering: a practical approach",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--5",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734113",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In teaching software engineering, it is a major
challenge to integrate applied methodology and theory
into the practice of software development. Today
teaching a course in software engineering involves a
theoretical approach with white board and doing a
project at the end of the course. Teaching Software
engineering as a course involves many disciplines and
requires delivering lectures accompanied by lecture
demos and hands on lab sessions to accompany individual
constituent topics or areas that form the bricks and
mortar of this course. Only when the bricks and mortar
of software engineering have delivered a solid
foundation, is it then that software engineering as a
course will be delivered in a true and meaningful
sense. This paper presents a method to teach Software
Engineering using the applied approach that the author
designed and successfully used",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gill:2010:MDP,
author = "Nasib Singh Gill and Pradeep Tomar",
title = "Modified development process of component-based
software engineering",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--6",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734120",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Component-based software engineering (CBSE) is a
branch of software engineering, the priority of which
is the separation of concerns in respect of the
wide-ranging functionality available throughout a given
software system. CBSE emphasizes on building system by
reusing high quality configurable software components.
This reduces its development cost as well as
time-to-market and ensures higher reliability, better
maintainability and quality by exploiting reusability.
In the traditional approach, when a software system is
going to be developed, the implementation has to be
done from scratch. With the advent of Object-Oriented
Technology (OOT), reusable software components have
become an indispensable part of programming knowledge.
In addition to those classes and methods included in
standard libraries of programming languages, such as
the Java API library, many reusable software components
are developed by software development organizations
specifically for reuse or repackaged from previously
developed systems. We propose here a modified
development process of CBSE and present our modified
development process of CBSE for increasing reusability
in different abstraction levels: architecture level,
modular design level and framework level. This modified
development process of CBSE change the reusability
approach into two different approaches
composition-based approach and generation-based. Lastly
on the basis of these two approaches we divide
component reuse into two different processes. First one
is process of development of reusable components which
is composition-based approach and second one is process
of development with reusable components which is based
on the generation-based according X model with the
benefits of reusable components in programming",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bandyopadhyay:2010:MST,
author = "Anup Kumar Bandyopadhyay",
title = "Modeling of state transition rules and its
application",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--7",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734109",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "A state transition rule is viewed as a cause and
effect relationship. An example is selected from the
common sense world. Six different instances of this
relationship are enumerated. A temporal logic based on
observation is proposed. This logic is used to model
the enumerated instances. Assuming some necessary
properties of a transition rule only two relevant
models are selected. One of them ensures that the
precondition is necessary where the other guarantees
its sufficiency. Noting these two characteristics the
first one is opted for proving the safety property
where the second is used to prove progress. We have
considered Peterson's two process mutual exclusion
algorithm as an illustrative example",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gupta:2010:TFR,
author = "Amit Gupta and Rajesh Bhatia",
title = "Testing functional requirements using B model
specifications",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--7",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734115",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Testing is very important part of software
development. Almost 80\% software fails because of the
improper or inefficient testing. Testing is performed
by different types of strategies. Generally testing is
performed on code, but if the software can be tested in
the earlier phases then most of the errors can be
eliminated and can be stopped from propagating to next
phase. Thus there is a need to explore testing
possibilities in earlier phases. This paper present a
novel requirement based testing approach that can fix
errors in initial phase. Formal Specification languages
play a vital role in software testing. Formal models
provide a precise specification of the system, and can
be used as a vehicle for driving the development
process. To perform requirement based testing, we need
a formal language that can deal with the requirement
specification efficiently. Many researchers have
proposed various approaches to generate test cases from
formal specifications. These approaches include test
case generation from various state based languages like
Z, VDM and B specifications. In this paper we proposed
a technique that can provide better coverage of
requirements as compared to other approaches. For
maximizing the coverage of requirements in our model,
we annotate our specifications with requirement
identifiers, which help in later stages to detect which
requirements are covered and which are yet to be
tested. Test cases are generated by extracting
invariants and post conditions from our specification,
and are transformed in a generalized form. Using test
selection criteria, we can cover all parts of our model
and generates test cases for each of our test
objective",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ripon:2010:PAS,
author = "Shamim H. Ripon",
title = "Process algebraic support for web service
composition",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--7",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734118",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Web services technology provides a platform on which
we can develop distributed services. The
interoperability among these services is achieved by
various standard protocols. In recent years, several
researches suggested that process algebras provide a
satisfactory assistance to the whole process of web
services development. Business transactions, on the
other hand, involve the coordination and interaction
between multiple partners. With the emergence of web
services, business transactions are conducted using
these services. The coordination among the business
processes is crucial, so is the handling of faults that
can arise at any stage of a transaction. Compensation
is an error recovery mechanism to handle faults in
business transactions. Compensating CSP (cCSP) is a
language defined to model business transactions within
the framework of standard CSP process algebra. The
language defines a transaction as a process and has the
constructs for orchestration of compensations. In this
short note, we report a case study showing how cCSP can
be used to model business transactions. We also show a
mechanical verification technique to verify theoretical
properties of the language",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neogi:2010:EEV,
author = "Madhumita S. Neogi and Vandana Bhattacherjee",
title = "Evaluating the effectiveness of {VOSDM}: a vision
oriented approach",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--8",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734119",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Process models form the heart of software engineering
since software development process spans the life cycle
of any given project. Even though waterfall model forms
the basis of all software development models, the
demand for new models with design and implementation
occurring in parallel is on the increase. This research
aims at the evaluation of a vision oriented software
development model. In this study, the subjects are
final year post graduate students working for their
final term projects for small organizations in and
around our city. The group of students applied two
techniques for software development and it was found
that VOSDM was more effective and improved reliability.
The productivity did not show any significant
improvement",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wright:2010:ISD,
author = "M. Keith Wright and Charles J. {Capps III}",
title = "Information systems development project performance in
the 21st century",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--10",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734121",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper presents the results of a 2009 survey of
professional IT auditors that explored their
perceptions about root psychological and sociological
causes of Information Systems (IS) project failure
based on the punctuated equilibrium theoretical
framework. As predicted by punctuated equilibrium
theory, the results of the survey indicate that radical
as opposed to incremental organizational changes are
more effective in turning around ``runaway'' projects.
The results indicate that IS development project
performance is worse in government than in the private
sector, and provide support for the continued use of
punctuated equilibrium models for research in
information systems development project performance",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Capretz:2010:WDW,
author = "Luiz Fernando Capretz and Faheem Ahmed",
title = "Why do we need personality diversity in software
engineering?",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "1--11",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734111",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Diversity of skills is good for society, it is also
good in problem solving because different people see a
problem from several perspectives, so diversity should
be good for software engineering too. This study
tackles a difficult to study aspect of software
engineering, that is, how to best associate personnel
with the various tasks in a software project. The
approach uses psychological types to determine who is
best suited to particular development roles. The
article has four main objectives: (1) to arouse
awareness of human factors among software engineers;
(2) to investigate how psychological factors can
contribute to their effectiveness at work; (3) to
catalyze effort among software engineers leading
towards a deeper understanding and broader applications
of human factors in the light of the activities
involving the engineering of software; and (4) to
emphasize the important of skill diversity in the
software engineering field. This article provides
conceptual knowledge, reports findings, and presents
both real and hypothesized beliefs from the software
engineering community. Likewise, it is hoped that the
article will motivate software engineers and
psychologists to conduct more research in the area of
software psychology, so as to understand more
profoundly the possibilities for increased
effectiveness and fulfillment among software
engineers",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2010:PSEa,
author = "Larry Bernstein",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "3--4",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734104",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2010:SEEa,
author = "Mark A. Ardis",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "4--4",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734105",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2010:SNSa,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "5--14",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734106",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2010:RPa,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "15--24",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734107",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gorschek:2010:TIW,
author = "Tony Gorschek and Samuel Fricker and Sjaak Brinkkemper
and Christof Ebert",
title = "{Third International Workshop on Software Product
Management --- IWSPM'09}",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "25--29",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734108",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software product management steers the success of a
product in all its lifecycle stages by thoughtful
application of planning, coordination, and control. The
third international workshop on software product
management (IWSPM{\^A}'09) was held in conjunction with
the International Conference on Requirements
Engineering (RE'09) in Atlanta USA. The aim was to
bring researchers and industry practitioners together
to discuss the area and unique challenges of software
and technology product management. Selected challenges
put forward by accepted papers from both industry and
academia were analyzed. The session discussions focused
on identifying future needs for research, the relevance
of which was assured by good industry presence at the
workshop. The workshop homepage can be found
http://2009.iwspm.org",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saur:2010:BRS,
author = "Joe Saur",
title = "Book Review: {{\booktitle{Simulation-Based Engineering
of Complex Systems}}, Second Edition, by John R.
Clymer, and published by John Wiley and Sons, 2009,
hardcover, ISBN 978-0-470-40129-3, 503 pp.}",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "33--34",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734122",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tribbey:2010:BRF,
author = "Will Tribbey",
title = "Book Review: {{\booktitle{F\# for Scientists}}, by Jon
Harrop, and published by Wiley-Interscience, 2008,
hardback, ISBN 0-470-24211-6, 368pp.}",
journal = j-SIGSOFT,
volume = "35",
number = "2",
pages = "34--35",
month = mar,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1734103.1734123",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:52 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Krizevnik:2010:ISP,
author = "Marcel Krizevnik and Matjaz B. Juric",
title = "Improved {SOA} persistence architectural model",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764821",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Companies often face difficulties when building the
data services layer. The most common problems are poor
data quality, performance issues and heterogeneity of
data sources. In this article, we propose solutions to
the problems described and merge them into a
comprehensive architectural model for the storage and
management of permanent data in SOA (Service Oriented
Architecture). In order to overcome problems related to
poor data quality, our architectural model requires the
use of adjusted MDM (Master Data Management).
Furthermore, we propose that all data transfer between
data services and business level goes in form of SDO
(Service Data Objects), which allow us a uniform data
access and manipulation, regardless of the data type.
As the best approach to improve performances,
scalability, availability and reliability of the data
services layer, our architecture introduces caching in
the intermediate layer with the use of in-memory data
grids. As an example of how the proposed solution can
also be used to improve parts of the SOA
infrastructure, we will present possible approach to
improve BPEL (Business Process Execution Language)
dehydration store.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nair:2010:PMB,
author = "T. R. Gopalakrishnan Nair and V. Suma",
title = "A paradigm for metric based inspection process for
enhancing defect management",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764827",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Inspection process in software development plays a
vital role in effective defect management. In order to
have an appropriate measurement of the inspection
process, we depend on a process metric called the Depth
of Inspection (DI). DI enables the manager within the
software community to identify and compare the level of
inspection performed in various projects. An empirical
study of several projects facilitated the evaluation of
a set of process coefficients which are capable of
predicting the DI values using multiple regression
models. The industry observed DI value based on defect
count and the DI value produced by the model are
strongly matching. This supports the predictive
capability of DI through process coefficients without
depending on the prior estimation of the defect
count.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Li:2010:TER,
author = "Zude Li and Mechelle Gittens and Syed Shariyar Murtaza
and Nazim H. Madhavji",
title = "A towards an extended relational algebra for software
architecture",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--4",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764823",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software architecture is often structured as
box-and-arrow graphs and has important implications for
system development and maintenance. We propose an
extended relational algebra to support presentation and
manipulation of both architectural structures and
implications. The core structure of this algebra is the
extended architectural relation (EAR). An EAR is a
mapping from an architectural relation (AR) to a
multi-set of attributes (M), where the AR is an
ordinary relation representing an architectural
structure, and the M represents a multi-set
representing a type of architectural implication. A set
of EAR operations is then defined to support EAR
manipulations. The main advantage of this extended
algebra over ordinary relational algebras is that the
architectural implications (the M part) are presented
and manipulated together with the architectural
structures (the AR part). This paper first discusses
why we propose the algebra, then briefly introduces
what the algebra is, and finally describes how to use
the algebra in a real scenario.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Georgieva:2010:CFS,
author = "Konstantina Georgieva",
title = "Conducting {FMEA} over the software development
process",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--5",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764819",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Failure mode and effects analysis (FMEA) is one of the
well-known analysis methods with an established
position in the traditional reliability analysis. It is
widely used but even so, it is not popular in software
engineering. To address this gap, in this paper we
propose an application of the FMEA method for the
software development process after which we visualize
our approach with a tool that makes the application of
SFMEA very easy. Our tool is available in our virtual
Software Measurement Laboratory ([email protected]) at
http:// www.smlab.de/webapplcations.html.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2010:SMM,
author = "Krishna Kumar and Rajesh Prasad and Suneeta Agarwal",
title = "Software maintenance by multi-patterns parameterized
string matching with q-gram",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--5",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764822",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In the multi-patterns parameterized string matching
problem, a set of patterns $ P_0, P_1, P_2, \ldots {},
P_{r - 1}, r \geq 1 $, are said to match with a
sub-string $t$ of the text $T$, if there exists a
one-one correspondence between the symbols of patterns
and the symbols of $t$. This problem has an important
application in software maintenance, where it is often
required to find equivalency between two sections of
codes. Two sections of codes are said to be equivalent
if one can be transformed into the other by renaming
only identifiers and variables. In this paper, we
extend Forward Non-deterministic Directed Acyclic Word
Graph (DAWG) matching (FNDM) algorithm to PQFNDM for
parameterized string matching problem by using the
q-gram. Experimentally it has been observed that the
performance of PQFNDM improves with increasing value of
q up to half the length of the pattern. We further
modify PQFNDM to MPQFNDM for handling multiple
patterns. We compare the performance of PQFNDM (for
q=1) with parameterized shift-or (PSO) algorithm and
found that PQFNDM is better than PSO. We also show the
benefits of using multiple patterns.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Pandey:2010:ADL,
author = "R. K. Pandey",
title = "Architectural description languages {(ADLs)} vs {UML}:
a review",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--5",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764828",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The field of software architecture which is considered
as a subfield of software engineering is now about two
decades old. During this period a number of software
Architecture Description Languages (ADLs) emerged and
vanished. But none of the ADLs became much popular
amongst the practitioners except a few, that too only
in a specific domain. On the other hand Unified
Modeling Language (UML) which some times is not even
accepted as an ADL or accepted with a some hesitation
has become an industry de facto standard notation for
documenting software architectures. This paper makes an
attempt to find an answer to this question as to what
went wrong with the ADLs that they did not become much
popular beyond their place of origin. Is UML really an
Architecture Description Language.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Prasad:2010:PSM,
author = "Rajesh Prasad and Suneeta Agarwal",
title = "Parameterized string matching: an application to
software maintenance",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--5",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764829",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In the problem of parameterized string matching, a
given pattern P is said to match with a sub-string $t$
of the text $T$, if there exists a one-one
correspondence between the symbols of P and the symbols
of $t$. This problem has an important application in
software maintenance, where it is often required to
find equivalency between two sections of codes. Two
sections of codes are said to be equivalent if one can
be transformed into the other by renaming only
identifiers and variables. In this paper, we propose
two new algorithms for the said problem by using the
q-gram approach. The first one is obtained by using
this approach on an existing string matching algorithm
(simplified backward non-deterministic directed acyclic
word graph matching (SBNDM)). The second one is
obtained by using the q-gram approach on the
parameterized string matching algorithm (parameterized
backward non-deterministic directed acyclic word graph
matching (PBNDM)). Performance of both the algorithms
is tested for various values of q and it has been
observed that both show their best performance for q
nearly equal to half of the pattern length. We also
study the effect on running time of these algorithms
with increasing the duplicity in the text.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Malhotra:2010:AML,
author = "Ruchika Malhotra and Arvinder Kaur and Yogesh Singh",
title = "Application of machine learning methods for software
effort prediction",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--6",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764825",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software effort estimation is an important area in the
field of software engineering. If the software
development effort is over estimated it may lead to
tight time schedules and thus quality and testing of
software may be compromised. In contrast, if the
software development effort is underestimated it may
lead to over allocation of man power and resource.
There are many models proposed in the literature for
estimating software effort. In this paper, we analyze
machine learning methods in order to develop models to
predict software development effort we used Maxwell
data consisting 63 projects. The results show that
linear regression, MSP and M5Rules are effective
methods for predicting software development effort.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mattmann:2010:UAT,
author = "Chris A. Mattmann and Amy J. Braverman and Daniel J.
Crichton",
title = "Understanding architectural tradeoffs necessary to
increase climate model intercomparison efficiency",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--6",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764826",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "NASA's Jet Propulsion Laboratory, in partnership with
Lawrence Livermore National Laboratory, has been
leading an effort to allow remote sensing data
available from NASA satellites to be easily compared
with climate model outputs available from the
DOE-funded Earth System Grid, a national asset in
climate science. This partnership is timely with the
looming Intergovernmental Panel on Climate Change
(IPCC)'s 5th Assement Report (AR5) in active
discussion, and the metrics to better understand
Earth's climate under formulation. JPL's project,
titled the Climate Data eXchange (CDX) provides an
easy-to-use software framework for climate scientists
to rapidly integrate and evaluate the efficacy of
observational data as applied to climate models.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rajaram:2010:ESV,
author = "Kanchana Rajaram and Chitra Babu",
title = "Evolution of a simple vehicle registration system to
an {SOA} based e-governance application: a case study",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--7",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764830",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Transactions are one of the basic building blocks in
all business applications. The notion of a transaction
originated in the seventies and has evolved over time
to cater to complex business applications that are
distributed, heterogeneous, and loosely coupled. The
literature on transaction models is extensive and most
of them illustrate the ideas with case studies on
different applications. Since the applications are
different, it is diffcult to understand the limitations
of the models for the general case. However, such an
understanding is essential in order to develop a new
transaction model that caters to the changing business
requirements. This motivated us to investigate the
evolution of existing transaction models and to analyze
their shortcomings using a case study, Vehicle
Registration system. A taxonomy of the various
transaction models based on conceptual evolution has
also been presented. Further, the suitability of SOA to
large scale e-governance applications and the need for
developing better SOA Governance transaction frameworks
have been demonstrated.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gama:2010:SAA,
author = "Kiev Gama and Didier Donsez",
title = "A survey on approaches for addressing dependability
attributes in the {OSGi} service platform",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--8",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764818",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The OSGi service platform is being used in software
industry as the de facto middleware for developing and
deploying modular Java applications, using SOA
principles in centralized solutions. OSGi provides a
dynamic platform where components and services can be
deployed and undeployed at runtime, attracting the
attention of both commercial and research projects.
Although the platform is used in fields with different
purposes (e.g. experimentally used in healthcare,
commercially used in application servers) but where
dependability should be a pre-requisite for
applications, it is a fact that the OSGi technology
does not provide a dependable platform for executing
applications with such needs. Different research
efforts try to address dependability attributes
(availability, integrity, maintainability, reliability,
safety, and confidentiality) in the OSGi service
platform, but not necessarily all of these attributes
are completely covered or explicitly addressed in the
textual references. We provide a brief survey on recent
research efforts that try to improve dependability in
the OSGi service platform. We analyze and identify
which attributes are addressed on each approach, and
provide a discussion on the employed techniques,
similarities and results achieved on such approaches.
Al-though this survey remains limited to one technology
(OSGi), the problematic as well as all the employed
techniques in the analyzed efforts are pertinent to
other service and component-based systems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hopfner:2010:EAD,
author = "Hagen H{\"o}pfner and Christian Bunse",
title = "Energy aware data management on {AVR} micro controller
based systems",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--8",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764820",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Data management systems comprise various algorithms
for efficiently retrieving and managing data.
Typically, algorithm efficiency or performance is
correlated with execution speed. However, the uptime of
battery-powered mobile- and embedded systems strongly
depends on the energy consumption of the involved
components. This paper reports our results concerning
the energy consumption of different implementations of
sorting and join algorithms. We demonstrate that high
performance algorithms often require more energy than
slower ones. Furthermore, we show that dynamically
exchanging algorithms at runtime results in a better
throughput if energy is limited.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Suri:2010:DMF,
author = "P. K. Suri and Gurdev Singh",
title = "{DG-metrics} formulization for {DGML-based} software
design",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--8",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764832",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "DGML-based software-design representation uses
specially designed XML tags to represent the design
elements. This representation opens new possibilities
for verifying DGML-based software design against
existing design metrics and creation of new design
metrics. This paper discusses newly created design
metrics for the DGML-based design DG-Metrics. This
helps in identifying error prone modules in early
stages of software development process, tuning design
modules for better performance and in managing the
later phases of software development cycle with ease.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bastani:2010:LLD,
author = "Behzad Bastani",
title = "Low-level dynamic system formation with high-level
automation: extending {UML} in support of {UPnP}",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--10",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764817",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "One way of defining system evolvability is in terms of
the low-level discrete-systems composition and dynamic
bindings. Evidently, direct low-level implementation
has its drawbacks and might be expensive for the
performance of system formation process and system
integrity. Engaging high-level design capabilities
based on a standard method in support of low-level
system formation can find a crucial role in this
setting. Universal Plug and Play (UPnP) is a well-known
standard facilitating dynamic integration of devices
into networks. Operating as a low-level programming
method, UPnP might be composed with high-level design
facilities. This paper presents a conceptual framework
to provide UPnP with native UML support through UML
extensions. An implemented UML to UPnP conversion model
offers the contribution of this research as an
automated solution for the high-level support.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2010:MRG,
author = "V. B. Singh and P. K. Kapur and Abhishek Tandon",
title = "Measuring reliability growth of software by
considering fault dependency, debugging time Lag
functions and irregular fluctuation",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--11",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764831",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The progress of software testing is influenced by
various uncertainty factors like effort expenditure,
skill of test personal, testing tool, defect density,
irregular state of open source project, and irregular
state of software fault-report phenomena on the bug
tracking system. Hence, there is an irregular
fluctuation in fault detection/removal rate during
testing phase. In software, the independence of
failures can hardly be assumed and dependency of faults
can also be considered as one of the factor for getting
irregular fluctuation. In Literature, various software
reliability growth models have been developed by
considering fault dependency with various debugging
time lag functions. But, none of the models have
incorporated irregular fluctuation in their fault
detection rate. Therefore, in this paper fault
dependency based software reliability growth models
have been developed by applying an It{\^o} type
Stochastic Differential Equations in order to
incorporate (i) the irregular fluctuation in the fault
detection process due to various uncertainty factor
during testing phase and (ii) irregular state of
software fault-report phenomena on the bug tracking
system. The proposed stochastic differential equation
based fault dependency models have been validated using
(i) open source software fault count data where
software fault-report phenomena on the bug tracking
system keep an irregular state and (ii) a fault
counting data with minor, major and critical faults.
The proposed models have been compared with the
existing fault dependency models. Various comparison
criteria results for goodness of fit have also been
presented in the paper.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mala:2010:QIO,
author = "D. Jeya Mala and V. Mohan",
title = "Quality improvement and optimization of test cases: a
hybrid genetic algorithm based approach",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "1--14",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764824",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software development organizations spend considerable
portion of their budget and time in testing related
activities. The effectiveness of the verification and
validation process depends upon the number of errors
found and rectified before releasing the software to
the customer side. This in turn depends upon the
quality of test cases generated. The solution is to
choose the most important and effective test cases and
removing the redundant and unnecessary ones; which in
turn leads to test case optimization. To achieve test
case optimization, this paper proposed a heuristics
guided population based search approach namely Hybrid
Genetic Algorithm (HGA) which combines the features of
Genetic Algorithm (GA) and Local Search (LS) techniques
to reduce the number of test cases by improving the
quality of test cases during the solution generation
process. Also, to evaluate the performance of the
proposed approach, a comparative study is conducted
with Genetic Algorithm and Bacteriologic Algorithm (BA)
and concluded that, the proposed HGA based approach
produces better results.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Notkin:2010:ATF,
author = "David Notkin",
title = "{ACM TOSEM}: {FAQs} and Figures",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "5--6",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764811",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2010:PSEb,
author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "6--7",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764812",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wing:2010:PC,
author = "Mike Wing",
title = "Poetry in code",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "7--8",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764813",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ruparelia:2010:SDL,
author = "Nayan B. Ruparelia",
title = "Software development lifecycle models",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "8--13",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764814",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This history column article provides a tour of the
main software development life cycle (SDLC) models. (A
lifecycle covers all the stages of software from its
inception with requirements definition through to
fielding and maintenance.) System development lifecycle
models have drawn heavily on software and so the two
terms can be used interchangeably in terms of SDLC,
especially since software development in this respect
encompasses software systems development. Because the
merits of selecting and using an SDLC vary according to
the environment in which software is developed as well
as its application, I discuss three broad categories
for consideration when analyzing the relative merits of
SDLC models. I consider the waterfall model before the
other models because it has had a profound effect on
software development, and has additionally influenced
many SDLC models prevalent today. Thereafter, I
consider some of the mainstream models and finish with
a discussion of what the future could hold for SDLC
models.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2010:SNSb,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "14--23",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764815",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2010:RPb,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "24--32",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764816",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2010:RIS,
author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
Mishra",
title = "A report on the {``Information Systems in Distributed
Environments'' (ISDE) Workshop} at the {OTM 2009}
conferences",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "33--34",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764833",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a report from a one-day workshop on
``Information Systems in Distributed Environments''
(ISDE), which was organized in conjunction with the OTM
Conferences 2009 in Vilamoura, Portugal, on November 3,
2009. The main focus of this workshop was to provide a
venue for the discussion of challenges related to the
development, operation, and maintenance of distributed
information systems, and their creation in the context
of global development projects.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ben-Menachem:2010:PCV,
author = "Mordechai Ben-Menachem",
title = "Book Review: {{\booktitle{Parallel Coordinates: Visual
Multidimensional Geometry and its Applications}}, by
Alfred Inselberg, and published by Springer; 2009; ISBN
978-0-387-21507-5; pp. 580}",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "39--39",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764834",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Safonov:2010:BRM,
author = "Vladimir O. Safonov",
title = "Book Review: {{\booktitle{Microsoft Windows
communication foundation: hands-on!}}, by Craig
McMurtry, Marc Mercuri and Nigel Watling, and published
by Sams Publishing, 2006 (paperback), ISBN
0-672-32877-1, 539 pp., \$39.99}",
journal = j-SIGSOFT,
volume = "35",
number = "3",
pages = "40--40",
month = may,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1764810.1764835",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:53 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tee:2010:MEM,
author = "Sim-Hui Tee",
title = "Method efficiency model based on value relevancy",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--3",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811239",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Class methods are modules in a class that perform a
specific behavior. The best software practice in
defining a method is to assign a single task for each
method. It is always expected that each method should
carry out a unique task in its defining class. A series
of similar tasks are usually defined by overloaded
methods. Such a single-task practice of method
definition is seldom imposed on individual software
developers who extensively develop user-defined
methods. In this research, a method efficiency model is
developed with the objective of guiding the software
developers in developing an individual cohesive method.
Increased cohesion of methods is desirable because it
contributes to the enhancement of software
maintenance.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sagar:2010:SCBa,
author = "Shrddha Sagar and N. W. Nerurkar and Arun Sharma",
title = "A soft computing based approach to estimate
reusability of software components",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--4",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811235",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Component-based development (CBD) is the process of
assembling existing software components in an
application such that they satisfy a predefined
functionality. Reduced development time, effort and
cost are few merits of CBD. As components are
black-box, therefore the use of conventional metrics in
CBD is difficult, because these metrics needs analysis
of source codes. To assess the reuse of component, it
is important to estimate reusability of these
components. Present paper discusses reusability in
relation to CBD and proposes a reusability metrics for
black box components. It identifies the factors
affecting reusability of the components and establishes
relationship in between these factors and reusability.
Fuzzy logic based approach is used to estimate
reusability and results found on real time applications
are quite satisfactory. The proposed approach can be
used by the application developers to select highly
reusable components in the systems which will
eventually help in maintaining the system in a better
way.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Macedo:2010:MDD,
author = "Hendrik Macedo",
title = "Model driven development approach to natural language
generation systems",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--7",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811233",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Natural Language Generation systems have traditionally
been built using ad-hoc software engineering practices
with no explicit development process and no standard
software architecture. This situation has drastically
limited professional use of NLG technology. New
approaches to NLG application development that
considers domain-independence, languages and standards
of modern software engineering, could enhance its
practical use. This work proposes an NLG reference
architecture that leverages the most advanced open
standards in software architecture, modeling languages
and processing tools. In particular, it is shown how
dialogue-based voice-driven NLG applications can be
built from the up-to-date Model-driven Architecture
(MDA) approach. The implementation of a voice-driven
movie recommendation system demonstrates the
feasibility of the proposal.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2010:TCP,
author = "Yogesh Singh and Arvinder Kaur and Bharti Suri",
title = "Test case prioritization using ant colony
optimization",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--7",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811238",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Regression testing is primarily a maintenance activity
that is performed frequently to ensure the validity of
the modified software. In such cases, due to time and
cost constraints, the entire test suite cannot be run.
Thus, it becomes essential to prioritize the tests in
order to cover maximum faults in minimum time. In this
paper, ant colony optimization is used, which is a new
way to solve time constraint prioritization problem.
This paper presents the regression test prioritization
technique to reorder test suites in time constraint
environment along with an algorithm that implements the
technique.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Majumdar:2010:MRM,
author = "Dipankar Majumdar and Sabnam Sengupta and Ananya
Kanjilal and Swagata Kundu and Swapan Bhattacharya",
title = "A mathematical reusability model for quantifying the
reduction in development effort",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--8",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811234",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software Effort and Cost Estimation is a very
important activity that includes very uncertain
elements. In the context of object-oriented software,
traditional methods and metrics were extended to help
managing this activity. Use Case Points (UCP) is a very
well known metrics used for estimation of
object-oriented systems. Use case models are used in
Object-Oriented Analysis for capturing and describing
the Functional-Requirements of a system. Several
methods for estimating software development effort are
based on attributes of a use case model. In this paper,
we propose a mathematical model based on vectors to
measure reusability of software design in terms of
reusability of the use cases. Increasing reusability of
the use case model would lead to decrease in
development effort. Using the vector model, we propose
an approach to measure Complexity Reduction Factor
(CRF) which measures percentage decrease in effort and
hence in cost with increasing reusability. This
quantitative analysis of effort reduction with
increased reusability would enable us in designing
reusable and cost effective software much earlier in
software development life cycle, right at the
requirement engineering phase. We have used
requirements of an Insurance system as a case study to
illustrate our approach.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Radhakishan:2010:CDI,
author = "V. Radhakishan and Yaser Farook and S. Selvakumar",
title = "{CRAYSE}: design and implementation of efficient text
search algorithm in a web crawler",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--8",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811236",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "CRAYSE1 is a SEarch WHIle CRAwl application, intended
to perform fast searching of text in web pages. A Web
crawler is a computer program that browses the World
Wide Web in a methodical, automated manner. This
process is also called spidering. Search engines, use
spidering as a means of providing up-to-date data. Most
of the existing web-crawlers archive the contents of
the web starting from the input URL. Search engines
index the results of web-crawlers and then perform
searching when queried. As such, the searching is not
performed while crawling. Hence such software can not
be used for general use by web browsers. Also, the
existing search mechanism in web browsers, search only
on the current page and not recursively through all the
links present in that page. In order to overcome such
disadvantages, we propose in this paper to implement a
web crawler that searches for a pattern efficiently and
recursively through all the links including pdf links
while crawling. CRAYSE can be used as a general purpose
open source software by web browsers. It can also be
used for offine searching. Further, the applications
that require selective archival of web pages (based on
the presence of a key word), can deploy CRAYSE for
efficient search operations. This paper focusses on the
design and implementation of CRAYSE and its
demonstration through web applications.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Campos:2010:IAC,
author = "Juliana Pinheiro Campos and Jos{\'e} Luis Braga and
Ant{\^a}nio Maria Pereira de Resende and Carlos
Henrique Os{\'o}rio Silva",
title = "Identification of aspect candidates by inspecting use
cases descriptions",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--9",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811231",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The identification of aspect candidates in the early
phases of software development process allows improving
the modularization of the requirements, to detect
conflicts early and maintain the separation of concerns
in the later phases of the process. However, the
identification of aspects in initial phases is a
non-trivial task, which can be costly and too
time-consuming. This paper presents a technique to
assist in the identification of aspect candidates in
the requirements, through inspection. Two case studies
were carried out to evaluate the proposed technique.
The results obtained from the case studies let us
conclude that the proposed technique facilitates the
identification of aspect candidates.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ratneshwer:2010:DAS,
author = "Ratneshwer and A. K. Tripathi",
title = "Dependence analysis of software component",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--9",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811237",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Dependence analysis among software components is still
a challenging issue for practitioners and researchers.
We propose the representation of dependence among
software components as a Component Interaction Graph
(CIG). We make use of a well known data structure
consisting of ``two linear arrays'' to represent the
CIG. Based on this representation, we derived some
dependency relationships. We evaluate the relationships
by Weyukers' properties. We also have demonstrated with
a possible CIG for a CBS to show the quantitative
characteristics of the derived relationships. This work
starts a discussion and calls for more extensive
research oriented studies by professionals and
academicians for perfection of the approach.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lee:2010:OIP,
author = "Tony Tony Lee",
title = "Optimizing {IT} process management",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "1--10",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811232",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper, the author discusses some key concepts
in IT process management. The paper also includes the
recommendations in these following aspects: team
organization, physical environment, project selection,
politics, organizational communication, development
environment, staff development, and organizational
culture.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2010:PSEc,
author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "3--4",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811227",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wing:2010:BDM,
author = "Mike Wing",
title = "{Burt} doesn't manage",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "4--6",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811228",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2010:SEEb,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "6--7",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811229",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2010:SNSc,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "8--16",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811244",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2010:RPc,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "17--23",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811245",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mandrioli:2010:SFS,
author = "Dino Mandrioli and Stephen Fickas and Carlo A. Furia
and Mehdi Jazayeri and Matteo Rossi and Michal Young",
title = "{SCORE}: the first student contest on software
engineering",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "24--30",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811240",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Student Contest on Software Engineering (SCORE),
organized for the first time in conjunction with the
International Conference on Software Engineering (ICSE)
2009, attracted 50 student teams from around the world,
produced an impressive and varied set of projects, and
earned appreciative comments from participants and even
from teams who chose not to submit their results to the
competition. It was a remarkable success, but not
without problems and setbacks. In this article we
explain the objectives, constraints, and design
philosophy of SCORE, particularly as they distinguish
it from the tradition of computer science contests
focused more narrowly on programming. We also recount
key approaches taken to design and management of this
novel kind of contest, the difficulties we met (some
still outstanding), and the lessons learned.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2010:BRC,
author = "Larry Bernstein",
title = "Book Review: {{\booktitle{Characterizing people as
non-linear, first-order components in software
development}}, by Alistair A. R. Cockburn and published
in Humans and Technology, HaT Technical Report 1999.03,
Oct 21, 1999}",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "33--34",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811241",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ben-Menachem:2010:BRM,
author = "Mordechai Ben-Menachem",
title = "Book Review: {{\booktitle{Managing and Leading
Software Projects}} by Richard Fairley and published by
John Wiley \& Sons, Inc. with IEEE Computer Society
2009, (hardback), ISBN 978-0470-29455-0, pp. 510}",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "34--34",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811242",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ben-Menachem:2010:BRR,
author = "Mordechai Ben-Menachem",
title = "Book Review: {{\booktitle{Reactive Systems: Modelling,
Specification and Verification}} by L. Aceto, et al.;
and published by Cambridge University Press;
distributed by Cambridge University Press; 2007,
(hardback), ISBN 978-0-521-87546-2, pp. 300}",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "34--35",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811243",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rogers:2010:BRG,
author = "David S. Rogers",
title = "Book Review: {{\booktitle{Geometric Spanner Networks}}
by Giri Narasimhan and Michael Smid, and published by
Cambridge University Press, 2007, Hardback ISBN
978-0-521-81513-0, 500 pp., \$105}",
journal = j-SIGSOFT,
volume = "35",
number = "4",
pages = "35--35",
month = jul,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1811226.1811246",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:55 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fazal-e-Amin:2010:PES,
author = "Fazal-e-Amin and Ahmad Kamil Mahmood and Alan Oxley",
title = "Proposal for evaluation of software reusability
assessment approach employing a mixed method",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--4",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838703",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software engineering, as an engineering discipline, is
still quite young as compared to other engineering
disciplines. The software engineering research
community has made enormous contributions in past
decades to lay down its foundations. However, the
research methodologies in software engineering are
still not mature. One of the reasons in this regard is
the inherent complexity of this field. In this paper,
we focus on one aspect of this field --- the evaluation
of reusability assessment approaches. We begin by
reviewing existing ways of comparing reusability
assessment approaches. Following this we propose a
different approach. This includes a mixture of both
subjective and objective evaluation of a reusability
assessment approach. This is novel in that we feel that
subjective evaluation has been neglected by other
approaches.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Banerjee:2010:RSS,
author = "C. Banerjee and S. K. Pandey",
title = "Research on software security awareness: problems and
prospects",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--5",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838701",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "People attack software deliberately to steal highly
sensitive as well as personal information with the sole
intention of carrying out well-funded, destructive and
unethical goals that could harm individuals, nations or
the whole world. Available technological controls could
be implemented to tighten access and minimize
persistent threats but the complete solution of secure
software could only be provided by changing the
behavior of the people involved. This can be achieved
through effective security awareness techniques
implemented by individuals because they are, in most
cases, the first target for gaining access into the
system. This paper highlights the utility of security
awareness with the help of recent published work for
building more secure software. In addition, areas that
need further investigations are identified in the
paper.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nerurkar:2010:ARA,
author = "N. W. Nerurkar and Avadhesh Kumar and Pallavi
Shrivastava",
title = "Assessment of reusability in aspect-oriented systems
using fuzzy logic",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--5",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838706",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Reusability of the software systems is becoming a very
important factor due to rapid software development and
increasing complexity. Software reusability improves
the quality of software product by reducing development
time, effort and cost. Researchers have explored many
methodologies in order to assess the reusability of
Object-Oriented (OO) software systems but the
assessment of the reusability of Aspect-Oriented (AO)
software systems is underexplored. Aspect-Oriented
Software Development (AOSD) is an emerging paradigm
that aims to modularize the crosscutting concerns in an
application, which cannot be modularized using
traditional procedure-oriented and object-oriented
approaches. By applying an aspect-oriented approach,
such concerns can be isolated resulting in the increase
maintainability and reusability of the system. In this
paper, we propose a reusability model for
aspect-oriented systems and assess it using fuzzy logic
technique.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sagar:2010:SCBb,
author = "Shrddha Sagar and N. W. Nerurkar and Arun Sharma",
title = "A soft computing based approach to estimate
reusability of software components",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--5",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838707",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Component-based development (CBD) is the process of
assembling existing software components in an
application such that they satisfy a predefined
functionality. Reduced development time, effort and
cost are few merits of CBD. As components are
black-box, therefore the use of conventional metrics in
CBD is difficult, because these metrics needs analysis
of source codes. To assess the reuse of component, it
is important to estimate reusability of these
components. Present paper discusses reusability in
relation to CBD and proposes a reusability metrics for
black box components. It identifies the factors
affecting reusability of the components and establishes
relationship in between these factors and reusability.
Fuzzy logic based approach is used to estimate
reusability and results found on real time applications
are quite satisfactory. The proposed approach can be
used by the application developers to select highly
reusable components in the systems which will
eventually help in maintaining the system in a better
way.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2010:AFF,
author = "Yogesh Singh and Pradeep Kumar",
title = "Application of feed-forward neural networks for
software reliability prediction",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--6",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838709",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Many analytical models have been proposed for modeling
software reliability growth trends with different
predictive capabilities at different phases of testing
yet there still is a need to develop a model that can
be applied for accurate predictions in a realistic
environment. In this paper we describe a software
reliability prediction model using feed-forward neural
network for better reliability prediction through
back-propagation algorithm and discuss the issues of
network architecture and data representation methods.
We demonstrate a comparative analysis between the
proposed approach and three well known software
reliability growth prediction models using seven
different failure datasets collected from standard
software projects to test the validity of the presented
method. A numerical example also has been cited to
illustrate the results that revealed significant
improvement by using Artificial Neural Network (ANN)
over conventional statistical models based on NHPP.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gill:2010:NCM,
author = "Nasib S. Gill and Sunil Sikka",
title = "New complexity model for classes in object oriented
system",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--7",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838704",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Minimizing software complexity is the foremost
objective of each software development paradigm because
it affects all other attributes of software such as
maintainability, reliability, testability, reusability
etc. Measuring software complexity is always essential
for predicting fault proneness, computing development
efforts and evaluating maintainability of software.
This paper proposes a complexity model for classes in
object oriented systems. The model computes Class
Complexity (CC) as a sum of Method Complexity (MC) and
MC is further computed as a sum of Control Flow
Complexity (CFC), Total Method Call Complexity (TMCC)
and Total Data Call Complexity (TDCC). CFC is computed
using McCabe's cyclomatic complexity. TMCC and TDCC are
computed with adherence to the principle that ``The
higher the number of classes involved in method/data
calls and polymorphic method calls, makes the object
oriented software difficult to understand and
maintain''. The proposed model is also compared with
four Chidamber's and Kemerer's metrics-Weighted Methods
per Class (WMC), Response For a Class (RFC), Depth of
Inheritance Tree (DIT) and Coupling Between Objects
(CBO).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Long:2010:TDSa,
author = "Brad Long",
title = "Towards the design of a set-based {Java} collections
framework",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--7",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838705",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Java Collections Framework (JCF) was introduced as
standard in JDK 1.2. Since then several significant
enhancements have been made including the introduction
of generics and typed collections. One striking design
choice of the Java language designers was the exclusion
of map from the collections hierarchy. This paper looks
at how maps could be incorporated into the Java
collections hierarchy by describing early work on YACL
(Yet Another Collections Library). The intention of
YACL is to provide a suite of set-based collections
classes and operations whilst continuing to be
compatible with the JCF.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2010:EES,
author = "Ashish Sharma and Dharmender Singh Kushwaha",
title = "Early estimation of software complexity using
requirement engineering document",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--7",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838708",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "There has been a continuous effort to estimate
software complexity but very little established methods
exist that can estimate the complexity of the software
before it is written. Since a high quality Software
Requirement Specification (SRS) is a pre requisite for
high quality software, this work attempts to
empirically demonstrate that the complexity of the code
can be determined based on its IEEE software
requirement specification document (IEEE 830-1998).
Existing complexity measures established are based on
the code and the cognitive metrics value of the
software. This may require recoding leading to loss of
time and cost. Considering the shortcoming of
code-based approaches, our proposed approach is able to
compute the complexity of yet-to-be-written software
immediately after freezing the requirement in the
Software development Lifecycle (SDLC) process. The
proposed complexity measure compares well with
established complexity measures like Halstead, Mc Cabe,
KLCID, CFS and CICM. Results obtained show that the
complexity values are comparable with other established
measures. The robustness of our complexity measure is
established by evaluating our measure against Weyuker
properties.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Yazbek:2010:CQA,
author = "Hashem Yazbek",
title = "A concept of quality assurance for metrics in
{CASE-tools}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--8",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838711",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The quality of software has become more important to
software companies in the past years. Software
measurement is one of many approaches that is used to
check the quality of software [18]. This may involve
measuring some attributes of a software product or a
software process and comparing these measurements to
each other or to some desirable level. A software
metric is ``any type of measurement that relates to a
software system, process or related documentation''
[7]. Software metrics can help to improve the quality
of the produced software. However, metrics and metrics
tools are still not used in most software companies ---
for example in the 3 companies where we cooperated in
last 5 years. One reason is that there is lack of
knowledge about metrics and hence software metrics are
still unknown or difficult to use for some developers,
and software measurement is still time-consuming for
managers. Another reason is that, good metrics tools
are still expensive for small and middle companies. In
our opinion the effectiveness of metrics can be
improved by simple organizational expedients. In this
paper we present new/adapted requirements on metrics in
CASE tools to define flexible product quality models.
For this quality model we tried to use some standard
techniques, e.g. metrics suite, metrics visualization
or metrics filtering to show how metrics in CASE tools
can be defined and how it can benefit different people
who are involved in a software deployment.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chatterjee:2010:PAA,
author = "Ram Chatterjee and Kalpana Johari",
title = "A prolific approach for automated generation of test
cases from informal requirements",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--11",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838702",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Specification-based testing begins with the
documentation of customers' requirements. This informal
depiction of requirements needs to undergo
formalization for effective test case generation to
corroborate specification-based testing so as to
catapult validation testing. In this paper, we discuss
a credible approach for test suite generation by
formalizing the informal requirements that further
proves prolific in pioneering effective test case
generation. The endeavor is directed towards testing
software in the absence of source code.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Upadhyay:2010:DMI,
author = "Nitin Upadhyay and Bharat M. Deshapande and Vishnu P.
Agrawal",
title = "Developing maintainability index of a software
component: a digraph and matrix approach",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "1--11",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838710",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper describes a methodology based on a digraph
and matrix approach for developing the maintainability
(characteristic) index of a software component.
Sub-characteristics and associated attributes of a
component that characterize maintainability are
identified and modelled in terms of maintainability
digraph. The nodes in the digraph represent
maintainability sub-characteristics and edges represent
interactive complexity among the subcharacteristics. A
detailed procedure for the maintainability analysis of
component is suggested through a maintainability
function. The maintainability index (Im) is obtained
from VPF --- m (i.e. permanent of the matrix) by
substituting the numerical values of the
sub-characteristics and their interactions. The concept
of hypothetical best index and hypothetical worst index
is also proposed, which will help system developers to
identify relative comparison of candidates from
hypothetical best and hypothetical worst indices and
designers and developers to improve the component
maintainability characteristic (looking upon critical
attributed factors) by performing sensitivity analysis.
A higher value of the VPF --- m implies better
maintainability of a component. An example is also
presented to demonstrate and validate the effectiveness
of the methodology.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2010:PSEd,
author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "4--5",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838688",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Berliner:2010:EDC,
author = "Brian Berliner and Nayan B. Ruparelia",
title = "Early days of {CVS}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "5--6",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838689",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The topic of this article is to discuss the early days
of CVS, from the late 1980s to the mid 1990s. First, a
timeline depicting key milestones for those early days
is discussed and this is followed by an interview with
Brian Berliner, the creator of CVS in C. This article
concludes with a reading list on CVS for further
study.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2010:SNSd,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "8--17",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838690",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2010:RPd,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "18--24",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838691",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chan:2010:STR,
author = "Wing Kwong Chan and Christof J. Budnik and Gregory M.
Kapfhammer",
title = "Software testing research in practice: report on the
{5th International Workshop on the Automation of
Software Test}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "25--26",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838692",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 5th Workshop on the Automation of Software Test
co-located with ICSE 2010 provides a publication forum
that bridges the gap between the theory and practice of
automated testing. The workshop featured a twoday high
quality programs with a multi-session charette on
integration testing. Researchers shared with us their
insights on software testing through 15 regular papers
and 6 case-study papers were presented in six sessions
at the workshop. This report summarizes the
organization of the workshop as well as the sessions
and papers presented, the results of the charette
session, attendee feedback, and lessons learned.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dittrich:2010:CHA,
author = "Yvonne Dittrich and Helen Sharp and Heike Winshiers
Theophilus and Cleidson {De Souza} and Mikko Korpela
and Janice Singer",
title = "Cooperative and human aspects of software engineering:
{CHASE} 2010",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "27--29",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838693",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software is created by people --- software engineers
in cooperation with domain experts, users and other
stakeholders--in varied environments, under various
conditions. Thus understanding cooperative and human
aspects of software development is crucial to
comprehend how and which methods and tools are
required, to improve the creation and maintenance of
software. The 3rd workshop on Cooperative and Human
Aspects of Software Engineering held at the
International Conference on Software Engineering
continued the tradition from earlier workshops and
provided a lively forum to discuss current developments
and high quality research in the field. Further
dissemination of research results will lead to an
improvement of software development and deployment
across the globe.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lewis:2010:RIW,
author = "Grace Lewis and Dennis Smith and Andreas Metzger and
Andrea Zisman and Marco Pistore",
title = "Report of the {2nd International Workshop on
Principles of Engineering Service-Oriented Systems
(PESOS 2010)}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "30--33",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838694",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Second International Workshop on Principles of
Engineering Service-Oriented Systems (PESOS 2010) was
held at the International Conference on Software
Engineering, ICSE 2010 on May 1 and 2, 2010. PESOS 2010
provided a forum for presenting and discussing current
work and research topics related to service-oriented
systems. The workshop had keynotes on SOA testing
challenges and adaptive service-oriented systems. There
were four paper sessions on the topics of service
development, testing and evolution of service-oriented
systems, service adaptation, and quality of service
(QoS) and Service-Level Agreements (SLAs) in
service-oriented environments. General discussions
focused on these overall themes. These discussions
resulted in the identification of research challenges
for the future.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Geihs:2010:RAI,
author = "Kurt Geihs and Stefan Gruner and Kay R{\"o}mer",
title = "Report about {1st ICSE Workshop on Software
Engineering for Sensor Network Applications (SESENA
2010)}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "34--37",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838695",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "SESENA 2010, the First International Workshop on
Software Engineering for Sensor Network Applications,
took place under the umbrella of ICSE 2010, the 32nd
ACM/IEEE International Conference on Software
Engineering, in Cape Town, South Africa, in May 2010.
This post-workshop report summarizes the aims and
motivation as well as the technical contributions. See
also our workshop website at http://www.sesena.info/.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lago:2010:OSA,
author = "Patricia Lago and Paris Avgeriou and Philippe
Kruchten",
title = "Organizing a software architecture body of knowledge:
summary of the {5th SHARK} workshop, at {ICSE 2010}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "37--40",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838696",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Architectural Knowledge (AK) is defined as the
integrated representation of the software architecture
of a software-intensive system or family of systems
along with architectural decisions and their rationale,
external influence and the development environment. A
fifth workshop on Sharing and Reusing Architectural
Knowledge (SHARK) was held jointly with ICSE 2010 in
Cape Town, South Africa. The theme of this workshop was
the organization of a body of knowledge for software
architecture knowledge management. It featured thirteen
research position statements and three working groups
that discussed on focused topics. This report
summarizes the results of the discussions we held, and
suggests some topics for future research.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hall:2010:IIW,
author = "Jon G. Hall and Lucia Rapanotti and Liping Zhao and
James Naish",
title = "{2010 ICSE International Workshop on Advances and
Applications of Problem Orientation (WAAPO-2010)}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "40--41",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838697",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software problems originate in real world problems. A
software solution must address its real world problem
in a satisfactory way. A software engineer must
therefore understand the real world problem that their
software intends to address. To be able to do this, the
software engineer must understand the problem context
and how it is to be affected by the proposed software,
expressed as the requirements. Without this knowledge
the engineer can only hope to chance upon the right
solution for the problem. Application of
problem-oriented approaches may well be a way of
meeting this challenge. This article reports on
IWAAPO-2010, an ICSE workshop concerned with recent
developments in problem-oriented approaches.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Knutson:2010:RIW,
author = "Charles D. Knutson and Jonathan L. Krein and Lutz
Prechelt and Natalia Juristo",
title = "Report from the {1st International Workshop on
Replication in Empirical Software Engineering Research
(RESER 2010)}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "42--44",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838698",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The RESER 2010 Workshop, held on May 4, 2010 in Cape
Town, South Africa was co-located with the 32nd
International Conference on Software Engineering (ICSE
2010). The workshop provided a venue in which empirical
Software Engineering researchers could present and
discuss the theoretical foundations and methods of
replication, as well as the results of specific
replicated studies.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Treude:2010:WRW,
author = "Christoph Treude and Margaret-Anne Storey and Kate
Ehrlich and Arie van Deursen",
title = "Workshop report from {Web2SE}: {First Workshop on Web
2.0 for Software Engineering}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "45--50",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838699",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Web 2.0 technologies such as wikis, blogs, tags and
feeds have been adopted and adapted by software
engineers. With Web2SE, we provide a venue for
pertinent work by highlighting current state-of-the-art
research, by identifying research areas, and by
discussing implications of Web 2.0 on software
engineering. This paper reports on the paper
presentations and the discussions among participants at
Web2SE 2010 as well as on future directions of the
Web2SE community.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Canfora:2010:IWE,
author = "Gerardo Canfora and Giulio Concas and Michele Marchesi
and Ewan Tempero and Hongyu Zhang",
title = "{2010 ICSE Workshop on Emerging Trends in Software
Metrics}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "51--53",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1838700",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper reports on the 2010 ICSE Workshop on
Emerging Trends in Software Metrics (WETSoM 2010) held
on Tuesday 4 May 2010 in Cape Town, South Africa, as
part of the ICSE workshop series. The goal of this
workshop was to bring together researchers and
practitioners to discuss the progress of software
metrics.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dekhane:2010:IAT,
author = "Sonal Dekhane",
title = "Install anywhere tutorial and reference guide by Zero
G Team",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "57--57",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1862451",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Werden:2010:BRT,
author = "David A. Werden",
title = "Book Review: {{\booktitle{TCP\slash IP architecture,
design, and implementation in Linux}} by Sameer Seth
and M. Ajaykumar Venkatesulu}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "57--57",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1862452",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tracz:2010:BRD,
author = "Will Tracz",
title = "Book Review: {{\booktitle{The design of design: essays
of a computer scientist}} by Frederick R. Brooks,
Jr.}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "58--58",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1862455",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tracz:2010:BRM,
author = "Will Tracz",
title = "Book Review: {{\booktitle{Making it big in software:
get the job, work the org, become great}} by Sam
Lightstone}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "58--58",
month = sep,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1862453",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:57 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tracz:2010:BRR,
author = "Will Tracz",
title = "Book Review: {{\booktitle{Remarkable Engineers: From
Riquet to Shannon}} by Ioan James}",
journal = j-SIGSOFT,
volume = "35",
number = "5",
pages = "58--58",
month = oct,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1838687.1862454",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Fri Jul 21 10:34:15 2017",
bibsource = "http://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "http://dl.acm.org/citation.cfm?doid=1838687.1862454",
acknowledgement = ack-nhfb,
acmid = "1862454",
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
pagecount = "1",
subject-dates = "Claude Elwood Shannon (1916--2001)",
}
@Article{Dubey:2010:AUM,
author = "Sanjay Kumar Dubey and Ajay Rana",
title = "Assessment of usability metrics for object-oriented
software system",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--4",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874400",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The demand for efficient software is increasing day by
day. For this reason software developers need
appropriate metrics for the development of software
applications. Usability is one of the most important
fields in software engineering and a highly focused
quality factor. It is a key factor in the development
of successful software applications. Object-oriented
design techniques have become one of the most powerful
mechanisms to develop efficient software system.
Object-oriented software can play important role in
usability for software applications. It can not only
help in reducing the cost but also in developing highly
usable software systems. This paper focuses some
important issues and analyzes the relationship between
usability and object-oriented metrics",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2010:PMS,
author = "Amit Mishra and Sanjay Misra",
title = "People management in software industry: the key to
success",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--4",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874402",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Performance differences have been proved among
software professionals even in the conditions of
identical task. Companies and organizations are aware
of the fact that talent has great effect on their
success; still most of the software development
organizations are focusing so much on tools and
technology and little on people. In this paper, we are
trying to uncover the relation between the people
management-human resource management and software
engineering.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tee:2010:MCC,
author = "Sim-Hui Tee",
title = "Measuring class cohesion using mutant methods",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--4",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874409",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Class cohesion is a measure of software quality and
maintainability. A highly cohesive class implies that
its modules are functionally coherent and integrated.
To date, there are varying cohesion metrics that
measure class cohesion from different perspectives.
These metrics use different computation in the
evaluation of class cohesion. Novice software
developers have no access to the class cohesion of a
particular class if they are not familiar with these
metrics. In this paper, we provide a quick technique to
measure class cohesion without using complicated
calculation. We delimit our technique to measure class
cohesion in term of attribute sharing and method
invocation. We contend that the observation of the
impact of mutant methods provides a quick judgement on
the cohesion status. The proposed approach enables
novice software developers to quickly evaluate the
cohesion status of a class",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bandyopadhyay:2010:ATD,
author = "Anup Kumar Bandyopadhyay and Nibedita Lenka",
title = "Application of {TLRO} to dining philosophers problem",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--6",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874397",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Recently modeling of a state transition rule has been
proposed using a temporal logic based on observation
(TLRO). The advantage of such representation lies in
the fact that the model is derived from the related
cause and effect relation and is expressed as an
implication. This structure makes manipulation easy.
Unlike weakest precondition calculus that can only
reason backward in time, present model can include both
backward and forward temporal reasoning. This is
therefore more expressive. In this paper TLRO based
modeling is used to derive three different deadlock
free solutions for Dining Philosophers problem. All
this solutions are proved using this model",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bandyopadhyay:2010:SOM,
author = "Anup Kumar Bandyopadhyay",
title = "Spatial ordering of messages in a cyclic
architecture",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--6",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874398",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Spatial ordering of messages can be used fruitfully
for the design of distributed systems. For modeling
such systems we require a logical framework that
includes both spatial and temporal ordering predicates.
In order to illustrate its applicability a distributed
K mutual exclusion algorithm is proposed that requires
a unidirectional cyclic topology for its
implementation. The algorithm uses only point to point
communication rather than broadcast. It is shown that
the topological ordering of messages is important for
its correct operation",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bhat:2010:CVB,
author = "Shubha Bhat and Vindhya Malagi and Krishnan Rangarajan
and Ramesh Babu",
title = "Computer vision based guidance in {UAVs}: software
engineering challenges",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--6",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874399",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper we discuss the key functional and
quality attribute requirements and the associated
design challenges in engineering a computer vision
guided UAV (Unmanned Aerial Vehicle) system. The
non-functional requirements of the UAV system as a
whole are identified and mapped to the computer vision
subsystem which aids in the navigation process.
Expectations on availability, reliability, performance,
security and evolution of the vision subsystemware
discussed and the related software design challenges
elaborated",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nair:2010:DPM,
author = "T. R. Gopalakrishnan Nair and Sri Aravindh and R.
Selvarani",
title = "Design property metrics to maintainability estimation:
a virtual method using functional relationship
mapping",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--6",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874404",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software maintenance is a vital component that every
company has to face when their product is delivered to
the stakeholders. This task may span for more than ten
years at the customer site. The cost of maintenance or
keeping software operational consumes 60-70\% of its
entire life cycle cost. Defining maintainability at the
design stage of the software development life cycle
(SDLC) will result in a cost effective product. In this
paper, we proposed a design time relationship model
between design properties and the maintainability of
the software. This analysis is performed based on the
influence of object oriented design metrics on software
maintainability",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Long:2010:TDSb,
author = "Brad Long",
title = "Towards the design of a set-based {Java} collections
framework",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--7",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874401",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Java Collections Framework (JCF) was introduced as
standard in JDK 1.2. Since then several significant
enhancements have been made including the introduction
of generics and typed collections. One striking design
choice of the Java language designers was the exclusion
of map from the collections hierarchy. This paper looks
at how maps could be incorporated into the Java
collections hierarchy by describing early work on YACL
(Yet Another Collections Library). The intention of
YACL is to provide a suite of set-based collections
classes and operations whilst continuing to be
compatible with the JCF",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Panigrahi:2010:MBR,
author = "Chhabi Rani Panigrahi and Rajib Mall",
title = "Model-based regression test case prioritization",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--7",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874405",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We propose a model-based regression test case
prioritization technique for object-oriented programs.
Our technique involves constructing a graph model of
the source code to represent control and data
dependences as well as static object relations such as
inheritance, aggregation and association. We construct
a forward slice of the model to identify all the model
elements that may be affected by a change.
Subsequently, the model elements are marked with the
specific test case(s) testing it. We construct backward
slice with respect to each model element executed by a
test case to determine all elements indirectly tested
by the test case. Then all the affected model elements
and the elements being tested are used to prioritize
test cases. Empirical studies carried out by us show
that our technique increases the detection of number of
faults on an average of 30 percent as compared to
traditional approaches in detecting regression errors",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Suri:2010:AGD,
author = "P. K. Suri and Gurdev Singh",
title = "Automatic generation of design search keywords from
software specifications to improve design search
results",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--8",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874408",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software Design Notation Storage and Inference
Mechanism (DNSIM) is capable of storing software
designs by using Design Markup Language (DGML) tags and
reusing existing design elements to produce new
software designs. This mechanism performs search
operations on stored designs. The accuracy of the
search results depends upon the correctness of the
keywords provided to the search process. The challenge
is to input the Software Requirement Specification
(SRS) document as a search input to DNSIM and to
produce the best possible design from existing design
elements. This paper proposes a method to produce
requirement specification keywords from the formal
representation of the SRS. The DNSIM system uses the
keywords produced by our method and shows significant
improvements and accuracy in the design search
results",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mohanta:2010:AEP,
author = "Sirsendu Mohanta and Gopika Vinod and A. K. Ghosh and
Rajib Mall",
title = "An approach for early prediction of software
reliability",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--9",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874403",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In the early stages of development, failure
information is not available to quantitatively measure
reliability of a software product. In this context, we
propose an approach to predict software reliability
early in the product development stages from design
metrics. First we predict reliabilities of the
components of a system. For this, we categorize the
different kinds of faults that can occur in a component
during its development and identify the design metrics
that correlate to these faults. We construct a Bayesian
Belief Network (BBN) model to predict reliabilities of
the components using the identified design metrics.
Based on predicted reliabilities and usage frequencies
of the components of a system, we determine the
reliability of the system. The applicability of our
proposed model is illustrated through a case study.
Results obtained from our case study indicate the
effectiveness of our approach",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sengupta:2010:EME,
author = "Abhik Sengupta and Vivek Nandey and Sabnam Sengupta",
title = "{ETDSOA}: a model for event and time driven service
oriented architecture",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--9",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874407",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Service Oriented Architecture (SOA) is the paradigm
for IT architecture definition that has been recognized
by the industry and analyst groups as a new enterprise
architectural technique with the potential to transform
businesses into agile enterprises. This paper discusses
the emergent variant of Event and Time driven SOA
(ETDSOA) and discusses application areas. It proposes a
technique for conversion of a traditional and classical
SOA viewpoint into one of ETDSOA. The paper provides a
model for depicting a representative process flow
following the ETDSOA paradigm, using traditional
modeling constructs. This can be used gainfully to
design solutions following the ETDSOA paradigm with any
commonly available standard SOA framework. The inputs
can be used as well, for initially implementing the
framework with the benefit of improving ETDSOA solution
development",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2010:LSM,
author = "Robert Schaefer",
title = "The limits of systems-making organizations",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "1--20",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874406",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper provides an ontology of organizational
structures intended for software-intensive
systems-making. An archetype is presented and scaled in
stages to support larger, more complex projects.
Artifacts at each stage are identified and analyzed.
The first artifact analyzed is the engine of scaling,
specialization. Organizations that have been scaled for
the purpose of developing large complex systems will be
shown to themselves become large and complex, in part
for matching the problem to be solved but also for
self-management. Specialization first occurs with the
separation of the role of designer into designers and
managers whereby the designer's role and activities can
be abstracted into a limited set of objects to be
manipulated by managers. Design is transformed into a
model of design. The problem (or challenge) for
managers is of normalization of dysfunction, whereby
the model becomes both mistaken for and more valued
than the object modeled. The result of having
transformed essential roles and activities into objects
in a hierarchical organization will be shown to (one)
increase the positive effects on managing large-scale
organizations, (two) increase the negative effects on
design outcomes and (three) prevent the logical
association of item one with item two. Disassociations
incurred through specialization and normalization of
dysfunction will be shown to be counter-productive in
that they create and sustain high process but low sense
organizations. Conclusions will be presented on the
nature of large organizations, on the nature of their
risk evaluations, and on the inevitability of
dysfunctions and pathologies to lead not only to
project failure but also to immediately forget the
same",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2010:PSEe,
author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "5--5",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874392",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wing:2010:M,
author = "Mike Wing",
title = "The making of",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "5--7",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874393",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2010:SEEc,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software Engineering Education {(SEEd)}",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "7--8",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874394",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2010:SNSe,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "9--18",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874395",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2010:RPe,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "19--26",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.1874396",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tribbey:2010:BRN,
author = "Will Tribbey",
title = "Book Review: {{\booktitle{Numerical Recipes: The Art
of Scientific Computing}} (3rd Edition) by William H.
Press, Saul A. Teukolsky, William T. Vetterling, and
Brian P. Flannery, and published by Cambridge
University Press, 2007, hardback, ISBN
978-0-521-88068-8, 1235 pp.}",
journal = j-SIGSOFT,
volume = "35",
number = "6",
pages = "30--31",
month = nov,
year = "2010",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1874391.187410",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:15:58 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Miyachi:2011:ASA,
author = "Christine Miyachi",
title = "Agile software architecture",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--3",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943388",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "When the Agile software development became popular in
software development communities, some engineers
thought that software architecture would die out. But
no matter what, a software project will have an
architecture, whether documented intentionally or
created on the fly. Software Architecture should enable
Agile development methods by itself being Agile. But
how? In this paper, I will discuss my experience of
doing architecture in an Agile way and in a non-Agile
way. Have an architecture that follows the Agile
principles is key to obtaining success in an Agile
development environment.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rech:2011:AEE,
author = "J{\"o}rg Rech and Eric Ras",
title = "Aggregation of experiences in experience factories
into software patterns",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--4",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943390",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In software engineering Experience Factories have been
in use for a long time to store and manage experiences
from software projects, typically in large
organizations. Beside the preservation of quantitative
or numerical experiences, e.g., in form of project
effort data or data from empirical studies, many
experience factories also preserve subjective or
qualitative experiences, e.g., in form of observations
or lessons learned from the projects. A key issue of
experience management is to aggregate these documented
experiences into more valuable software patterns. In
this article we report about the aggregation (i.e.,
formalization and generalization) of documented
experiences in an experience factory to software
patterns. Observations from real-world projects are
formalized (i.e., structurally contextualized) into
semi-formal experiences and, over time, several similar
of these experiences are generalized (i.e.,
systematically decontextualized) into software
patterns.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kayes:2011:ATI,
author = "Imrul Kayes",
title = "Agile Testing: Introducing {PRAT} as a Metric of
Testing Quality in {Scrum}",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--5",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943384",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Scrum methodology has originated from agile software
develop-ment as an elixir to software projects which
are behind the sche-dule or which are highly likely to
have a problematic development phase. Also unlike any
other agile methodology, scrum is adaptive in nature.
This paper presents a metric that focuses on measuring
test quality in scrum. As product quality and process
quality is closely correlated, improved test quality
can ensure high quality deliverable product. Proposed
metric measures test quality of each sprint/ iteration
of scrum based upon some factor ratings which can be
used to get a comprehensive test quality overview of
testing process over longer periods.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Krishna:2011:APV,
author = "Raj P. M. Krishna and K. G. Srinivasa",
title = "Analysis of Projects and Volunteer Participation in
Large Scale Free and Open Source Software Ecosystem",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--5",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943389",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The ecology of Free and Open Source Software (FOSS) is
dotted by projects of every kind ranging from small
desktop applications to large mission critical systems.
To enable maximum visibility among the developer
community, these projects are often hosted in community
project management portals. The current work studies
one such portal, sourceforge. net by analysing the data
of 200,000 projects and 2 million developers for the
period Feb 2005 to Aug 2009. The scope of the present
study includes the analysis of developer contribution.
The slow growth rate of developer community and high
number of single developer projects are the major
findings of the present work.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sorkin:2011:LPG,
author = "Arthur Sorkin and Peter Donovan",
title = "{LR(1)} parser generation system: {LR(1)} error
recovery, oracles, and generic tokens",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--5",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943391",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The LR(1) Parser Generation System generates full
LR(1) parsers that are comparable in speed and size to
those generated by LALR(1) parser generators, such as
yacc [5]. In addition to the inherent advantages of
full LR(1) parsing, it contains a number of novel
features. This paper discusses three of them in detail:
an LR(1) grammar specified automatic error recovery
algorithm, oracles, and generic tokens. The error
recovery algorithm depends on the fact that full LR(1)
parse tables preserve context. Oracles are pieces of
code that are defined in a grammar and that are
executed between the scanner and parser. They are used
to resolve token ambiguities, including semantic ones.
Generic tokens are used to replace syntactically
identical tokens with a single token, which is, in
effect, a variable representing a set of tokens.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bishnu:2011:AKM,
author = "P. S. Bishnu and V. Bhattacherjee",
title = "Application of {K-Medoids} with {Kd}-Tree for Software
Fault Prediction",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--6",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943381",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software fault prediction area is subject to problems
like non availability of fault data which makes the
application of supervised techniques difficult. In such
cases unsupervised approaches like clustering are
helpful. In this paper, K-Medoids clustering approach
has been applied for software fault prediction. To
overcome the inherent computational complexity of
KMedoids algorithm a data structure called Kd-Tree has
been used to identify data agents in the datasets.
Partitioning Around Medoids is applied on these data
agents and this results in a set of medoids. All the
remaining data points are assigned to the nearest
medoids thus obtained to get the final clusters.
Software fault prediction error analysis results show
that our approach outperforms all unsupervised
approaches in the case of one given real dataset and
gives best values for the evaluation parameters. For
other real datasets, our results are comparable to
other techniques. Performance evaluation of our
technique with other techniques has been done. Results
show that our technique reduces the total number of
distance calculations drastically since the number of
data agents is much less than the number of data
points.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dubey:2011:UES,
author = "Sanjay Kumar Dubey and Ajay Rana",
title = "Usability Estimation of Software System by using
Object-Oriented Metrics",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--6",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943382",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Usability is one of the most important quality factors
in the fields of software engineering and an important
issue in the development of successful software
applications. To develop efficient software systems,
software developers need appropriate metrics.
Object-oriented metrics can play important role in the
development of successful and usable software
applications because object-oriented design techniques
have become one of the most powerful mechanisms to
fulfill the demand of efficient software systems.
Currently there are no comprehensive criteria for
estimating usability by using object-oriented metrics.
This paper focuses on usability and presents a
comparative analysis of various usability models and
metrics. It then analyzes the relationship between
usability and object-oriented metrics.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kaur:2011:DMI,
author = "Kulwant Kaur and Hardeep Singh",
title = "Determination of Maintainability Index for Object
Oriented Systems",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--6",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943383",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In Object Oriented System, the quality of software
depends significantly on the decision taken at early
phases of the development. As per available artefact,
quality of the class description is very crucial for
system development. Maintenance is to repair defects in
software, to adapt the software to different
operational environments and to add or modify the
functionality of the system. In Object Oriented
Systems, maintainability factor needs more aspects to
explore. We have proposed Maintainability Index using
Package Metrics. We performed empirical evaluation
using three case studies.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2011:RBC,
author = "Pankaj Kumar and Kamlesh Dutta",
title = "Relationship between Crosscutting Concerns and
Defects",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--7",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943385",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "NOTE FROM ACM: It has been determined that this paper
plagiarized earlier works. Therefore ACM has shut off
access to this paper. The paper by Pankaj Kumar and
Kamlesh Dutta plagiarizes the following work: Marc
Eaddy, Vibhav Garg, Alfred Aho, Nachiappan Nagappan,
Kaitlin Duck Sherwood, ``On the Relationship between
Crosscutting Concerns and Defects: An Empirical
Investigation'' found here, as well as the article:
Eaddy, M.; Zimmermann, T.; Sherwood, K. D.; Garg, V.;
Murphy, G. C.; Nagappan, N.; Aho, A. V.;, ``Do
Crosscutting Concerns Cause Defects?,'' Software
Engineering, IEEE Transactions on, vol. 34, no. 4, pp.
497--515, July--Aug. 2008.
https://doi.org/10.1109/TSE.2008.36. For further
information, contact the ACM Director of
Publications.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumari:2011:AOO,
author = "Usha Kumari and Sucheta Bhasin",
title = "Application of Object-Oriented Metrics To {C++} and
{Java}: a Comparative Study",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--10",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943386",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The increasing importance of software measurement has
led to design and development of new software measures.
As the development of object-oriented software is
rising, more and more metrics are being defined for
object-oriented programming languages. But there is a
little understanding of comparative application of many
of these measures to different programming languages.
As a consequence, it is very difficult for software
managers and developers to select suitable measures and
programming languages for object-oriented systems. In
this paper, we investigate 23 object-oriented metrics
proposed by various researchers. The metrics are
applied to same set of 15 programs coded in C++ and
Java in an attempt to make comparative study of these
two prominent object-oriented programming languages.
The work done here reveals that these object-oriented
metrics can be applied successfully to both Java and
C++. But, Java proves to be more object-oriented than
C++ as per intuition. However, counting rules defined
for computation of these metrics should be framed more
carefully.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Vembuselvi:2011:LLL,
author = "C. Vembuselvi and S. Selvakumar",
title = "{LISISAP}: link level signature based secure anonymous
protocol for prevention of traffic analysis attacks",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--10",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943392",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "For any communication (wired or wireless) such as
control and data, the identity of source and
destination is revealed in the header portion of the
packet. Adversaries obtain sensitive information such
as the identity, location of a critical node, route,
data, etc., during communication by using traffic
analysis attacks, viz., similarity attack, data
integrity attack, packet counting attack, latency
attack, and clogging attack. Anonymous communication
prevents adversaries from doing traffic analysis
against the routing information embedded in the routing
messages and data packets. In order to thwart such
traffic analysis, anonymous communication protocols
were developed. In this paper, the existing anonymous
communication protocols were analyzed in terms of
techniques used, challenges, and applications.
Anonymous Routing protocol with Multiple Routes (ARMR)
is one of the existing protocols that achieves better
route anonymity using fake routes and multiple paths.
However, in ARMR, adversaries can modify the data with
genuine user pseudonyms and send the modified data to
the destination. In order to prevent data modification
by adversary at link level, in this paper a Link level
SIgnature based Secure Anonymous Protocol (LISISAP)
protocol is proposed. In LISISAP, source node generates
a signature for the data and sends the signature along
with the encrypted data to the next node. Further, the
next node verifies the signature. If signature matches,
it generates its own signature and sends the encrypted
data to its next node. Otherwise, it discards the
packet. Verified data and signature are sent by each
intermediate node until it reaches the destination. In
LISISAP, even if adversaries modify the data, every
node in the route including the destination node
verifies the data and discards the data if there is no
match in the signature. Similarity attacks can be
prevented by making the data look different on each hop
which could be achieved by encrypting the data with
link key. Proposed protocol, LISISAP is implemented and
tested in Smart and Secure Network. From the
experimental results, it is evident that the data
generated by source node is sent anonymously to the
destination. Thus, in LISISAP protocol, communication
is secure between nodes without revealing the node
identities. Anonymous properties such as identity
privacy, location privacy, route anonymity, and
robustness against several attacks were achieved.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Majumdar:2011:SSC,
author = "Dipankar Majumdar and Ananya Kanjilal and Swapan
Bhattacharya",
title = "Separation of scattered concerns: a graph based
approach for aspect mining",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "1--11",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943387",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Aspect Mining is a dynamic area of research in the
field of Software Engineering. Aspects are concerns
that are intermingled with other concerns thereby
reducing the understandability, maintainability and
scalability of the code. The concept of Separation of
Concerns (SoC) is often achieved until the Design
Phase, but gets difficult in the later phases of the
software development life cycle (SDLC). During program
maintenance the maintenance team is left with an
aggregation of procedures and variables, both of which
may be generically called user-defined tokens. This
paper proposes a graph-based approach to address the
problem of SoC during program maintenance. This is done
by the removal of some source code elements (e.g.,
user-defined-tokens), which can be responsible for
tangled concerns and complex code. These user-defined
tokens can be treated separately under the Aspect
Oriented Programming paradigm. The paper proposes a
graphical-model, which represents a procedural program
and defines a mathematical-model to identify and remove
the tangled and interleaving code-fragments. Thereafter
these code fragments are traced back to the
requirements engineering level through a formal
traceability model. This process yields the
corresponding user requirements that are associated
with these scattered code fragments. These identified
user requirements are put forward as Aspects, to be
handled or re-engineered under the Aspect Oriented
Programming paradigm.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2011:PSEa,
author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "6--7",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943372",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2011:LVP,
author = "Robert Schaefer",
title = "On the limits of visual programming languages",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "7--8",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943373",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2011:SEEa,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "8--9",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943374",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2011:SNSa,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "10--18",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943375",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2011:RPa,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "19--27",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943376",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lutteri:2011:RIS,
author = "Emiliano Lutteri and Barbara Russo and Giancarlo
Succi",
title = "Report of the 4th international symposium on empirical
software engineering and measurement {ESEM} 2010",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "28--34",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943393",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This report summarizes the research works, in
particular the full and short papers, presented at the
4th International Symposium on Empirical Software
Engineering and Measurement (ESEM 2010), held the 16th
and 17th of September in Bolzano-Bozen, Italy. The
program provided thirty full papers, twenty six short
papers and three invited talks held by Bertrand Meyer,
Steve Fraser and Carlo Ghezzi.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bateman:2011:HNT,
author = "Anita Bateman",
title = "Hands-on networking: from theory to practice by
{Maria} Luisa Merani, Maurizio Casoni, and {Walter}
Cerroni",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "38--38",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943377",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Russo:2011:BRM,
author = "Aryldo G. {Russo, Jr.}",
title = "Book Review: {{\booktitle{Modeling in Event-B ---
system and software engineering}} by Jean-Raymond
Abrial}",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "38--39",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943378",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Berry:2011:BRS,
author = "Daniel M. Berry",
title = "Book Review: {{\booktitle{Software requirements and
design: the work of Michael Jackson}} by Bashar
Nuseibeh and Pamela Zave}",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "39--40",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943379",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tracz:2011:BRG,
author = "Will Tracz",
title = "Book Review: {{\booktitle{Glitch: the hidden impact of
faulty software}} by Jeff Papows}",
journal = j-SIGSOFT,
volume = "36",
number = "2",
pages = "41--41",
month = mar,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1943371.1943380",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:00 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2011:CAS,
author = "Alok Mishra and Deepti Mishra",
title = "A curriculum for agile software development
methodologies",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--2",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968608",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Agile software development methodologies are
proliferating in software development organizations.
Agile techniques can handle changing business
requirements, schedule, cost, personnel turnover in an
effective way in organizations. Here, major components
of agile software development curriculum are discussed
along with suggestions towards making it a successful
course of software engineering curriculum.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chandra:2011:AST,
author = "Shalini Chandra and Raees Ahmad Khan",
title = "Availability state transition model",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--3",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968603",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Several security mechanisms such as digital signature,
timestamp audits and trails, encryption, throttling,
filtering, protect secrets etc. are available. These
security mechanisms are not completely able to stop
malicious attacks. For malicious hackers and attackers
it is comparatively easy to exploit security loopholes
at the user's end side. Behind such type of problem the
main reason is bad software design and its
implementation without proper risk analysis and
mitigation. So, an idea to model availability states an
Availability State Transition Model (ASTM) has been
proposed in this article. In ASTM methodology, only
design level details is required which can be easily
retrieved from the software's design.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Baride:2011:CBS,
author = "Srikanth Baride and Kamlesh Dutta",
title = "A cloud based software testing paradigm for mobile
applications",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--4",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968601",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "The testing of applications for mobile computing
devices is cumbersome due to the bounded computational
resources that these devices have and diversity in
mobile environments. There are many different types of
emulators that have been proposed and used nowadays for
this purpose. But these emulators typically cannot
emulate: actual network speed and availability, actual
device specific content-rendering speed, memory
limitation, cache size, CPU speed, and stack size.
These emulators are designed for specific platforms,
which lack testing of applications on heterogeneous
mobile platforms. Cloud Computing has a potential to
overcome these challenges by taking up contemporary
progress in parallel and distributed systems,
virtualization, and software services. Cloud computing
empowers us to have adaptable and on-demand network
access to a common group of configurable computing
resources. In this article, we introduce a cloudbased
model that provides solutions to aforesaid challenges.
Our model sets up a mobile environment, actual device
and platform on the cloud resources for a given system
configuration. It also provides software testing
services to execute numerous tests automatically
according to a given application.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gandhi:2011:EGR,
author = "Parul Gandhi and Pradeep Kumar Bhatia",
title = "Estimation of generic reusability for object-oriented
software an empirical approach",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--4",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968606",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Inheritance and templates are key concepts in
object-oriented programming (OOP), and are essential
for achieving reusability and extendibility. The aim of
this paper is to explore traditional Halstead's metrics
and use them to propose more software metrics related
to generic method and attributes in an object-oriented
software. These metrics measure quantitative generic
construct with inheritance in an object-oriented code.
Two metrics GRr (Generic Reusability Ratio) and ERr
(Effort Ratio) are proposed in this paper. First metric
GRr (Generic Reusability Ratio) measures impact of
template in program volume and second metric ERr
(Effort Ratio) measures impact of template in
development effort. These metrics will be a tool for
estimating and evaluating costs of program design and
program tests as well as program complexity.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Choudhary:2011:TSF,
author = "R. K. Choudhary and R. A. Khan",
title = "Testing software fault tolerance techniques: future
direction",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--5",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968604",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software fault tolerance can itself be dangerous
error-prone because of the additional effort that must
be included in the programming process. The paper is
based upon research in the area of testing software
fault tolerance techniques. A Framework to Test Fault
Tolerance has been proposed and validated with industry
data. During the validation process we identified some
of the interesting findings that can be explored to
carry out further research in this area.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Franky:2011:AMD,
author = "Mar{\'\i}a Consuelo Franky",
title = "Agile management and development of software projects
based on collaborative environments",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--6",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968605",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We've heard of Agile methodologies for several years,
but software projects have still delays and failures in
planning and management. How then automate the
processes of the development of software projects
following agile methodologies? In this paper we try to
answer this question by proposing an appropriate use of
collaborative environments for software development
that effectively translated into action the principles
and practices of Agile methodologies. The appropriate
use of these collaborative environments leads to a
truly agile management, where the project manager
achieves the vision and the continuous monitoring of
the project, and the participants become adapted to an
agile and productive discipline imposed by the
environment, regardless if they are geographically
dispersed. To ensure that appropriate use, this paper
proposes a methodological guide to achieve an agile
management of software projects by relying on a
particular collaborative environment.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nuthakki:2011:UUG,
author = "Murali K. Nuthakki and Mutlu Mete and Cihan Varol and
Sang C. Suh",
title = "{UXSOM}: {UML} generated {XML} to software metrics",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--6",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968609",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software developers are increasingly using Unified
Modeling Language (UML) tools to automate source code
generation. Therefore, nowadays calculating software
metrics from UML diagrams to evaluate software quality
is an important trend in the software industry.
However, acquisition of software metrics from
Extensible Markup Language (XML) export of UML tools
has been predominantly tool dependent. Moreover, each
new tool may have different specifications in XML.
Despite the overall need for a process to automate XML
unification, no current solution has yet been proposed.
Creating a framework to automate this assessment would
streamline development and increase efficiency in
software industry. With the aim to overcome this
deficiency, we developed a parser-based framework,
named UXSOM, to calculate software metrics
independently from the UML tool. Particularly UXSOM is
able to generate software metrics from the XML-based
outputs of the tools, ArgoUML, UMLET, MagicDraw, Sparx
Systems, and ESS Model. We showed a very general case
of UML class diagram, in which we extracted and
compared software metrics from these five different
tool.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bennett:2011:BDI,
author = "Travis A. Bennett and Coskun Bayrak",
title = "Bridging the data integration gap: from theory to
implementation",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--8",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968602",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The integration of multiple autonomous and
heterogeneous data sources (both across the web and via
a company intranet) has received much attention
throughout the years, particularly due to its many
applications in the fields of Artificial Intelligence
and medical research data sharing. Data integration
systems embody this work and have come very far in the
past twenty years. The problem of designing such
systems is characterized by a number of issues that are
interesting from a theoretical point of view: answering
queries using logical views, query containment and
completeness, automatic integration of existing data
sources via schema mapping tools, etc. In this work we
discuss these issues, compare and contrast various
proposed solutions (federated database systems and data
warehouses), and finally propose a novel extension of
the MVC (model, view, controller) web-based framework
that allows for the rapid development and
implementation of data integration systems solutions
suitable for use on the web.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Geetha:2011:FHP,
author = "D. Evangelin Geetha and T. V. Suresh Kumar and K.
Rajani Kanth",
title = "Framework for hybrid performance prediction process
model: use case performance engineering approach",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "1--15",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968607",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The dynamic behavior of distributed systems requires
that their performance characteristics be determined
rigorously, preferably in the early stages of software
engineering process. Evaluation of the performance at
the end of software development leads to increase in
the cost of design change. To compare design
alternatives or to identify system bottlenecks,
quantitative system analysis must be carried out from
the early stages of the software development life
cycle. In this paper we describe a process model,
Hybrid Performance Prediction Process Model that allows
modeling and evaluating distributed systems with the
explicit goal of assessing performance of the software
system during feasibility study. The use case
performance engineering approach proposed in this paper
exploits use case model and provides flexibility to
integrate the software performance prediction process
with software engineering process. We use an e-parking
application to demonstrate various elements in our
framework. The performance metrics are obtained and
analyzed by considering two software architectures.
Sensitivity analysis on the behavior of resources is
carried out. This analysis helps to determine the
capacity of the execution environment to obtain the
defined performance objectives.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2011:PSEb,
author = "Larry Bernstein",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "4--4",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968588",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wing:2011:HWT,
author = "Michael Wing",
title = "How we talk about basics",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "4--6",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968589",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2011:SEEb,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software Engineering Education {(SEEd)}",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "7--8",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968590",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2011:SNSb,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "9--18",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968591",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2011:RPb,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "19--25",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968592",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fricker:2011:IRE,
author = "Samuel Fricker and Norbert Seyff",
title = "{1st International Requirements Engineering Efficiency
Workshop: REEW 2011}",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "26--28",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968597",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Requirements engineering research has for a long time
focused on specification quality, leading to
recommendations of how to engineer ``perfect''
requirements specifications. Practitioners, however, do
not have the time, resources, and interests for
overdoing requirements engineering. Rather, many
situations call for shortcuts that allow investing
effort in those concerns that are critical for success,
while reducing effort in other areas where risk is
comparably smaller. The social context, smart
collaboration processes, and novel ways of looking at
the interface between stakeholders and the supplier can
be a basis to increase the yield of requirements
engineering, while reducing required effort. The
International Requirements Engineering Efficiency
Workshop (REEW 2011) aimed at initiating, facilitating,
and nurturing the discussion on efficient approaches to
engineer just good enough requirements. Requirements
engineering was seen as a means that can be simplified,
automated, or combined with other practices to achieve
successful systems in an economically efficient manner.
REEW 2011 provided a platform for the community of
practitioners and research experts that are interested
in productivity-enhancing approaches to requirements
engineering. This report describes the workshop results
including tactics, practice, and trade-offs for
achieving requirements engineering efficiency.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2011:ISD,
author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
Mishra",
title = "Information systems in distributed environments:
{ISDE} 2010",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "28--30",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968598",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a report from a one-day second international
workshop on ``Information Systems in Distributed
Environments'' (ISDE), which was organized in
conjunction with the OnTheMove Federated Conferences \&
Workshops (OTM 2010) at Hersonissos-Crete, Greece, on
October 26, 2010. The main focus of this workshop was
to provide a venue for the discussion of challenges
related to the development, operation, and maintenance
of distributed information systems, and their creation
in the context of global development projects. Further
dissemination of research results will lead to an
improvement of distributed information system
development and deployment across the glob.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Belani:2011:BRB,
author = "Hrvoje Belani",
title = "Book Review: {{\booktitle{Barcodes for mobile
devices}} by Hiroko Kato, Keng T. Tan and Douglas
Chai}",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "32--33",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968593",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hagar:2011:BRT,
author = "Jon D. Hagar",
title = "Book Review: {{\booktitle{Testing IT: an off-the-shelf
software testing process}} by John Watkins and Simon
Mills}",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "33--33",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968594",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Epps:2011:BRE,
author = "Bob Epps",
title = "Book Review: {{\booktitle{The elements of MATLAB
style}} by Richard K. Johnson}",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "33--34",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968596",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/matlab.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Farrell-Vinary:2011:J,
author = "P. Farrell-Vinary",
title = "{JustInMind}",
journal = j-SIGSOFT,
volume = "36",
number = "3",
pages = "34--35",
month = may,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/1968587.1968595",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:02 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gupta:2011:VDC,
author = "Varun Gupta",
title = "Validation of dynamic coupling metrics for
object-oriented software",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--3",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020985",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Dynamic coupling metrics for object-oriented software
provide scope of coupling measurement up to the object
level and take into account important and widely used
object-oriented features such as inheritance,
polymorphism and dynamic binding during measurement.
The dynamic measures are computed at run-time, which
take into consideration the actual interactions taking
place among members of a class. In this paper, an
attempt has been made to evaluate dynamic coupling
metrics for object-oriented software using formal
evaluation framework proposed by Briand et al. A
practical and useful coupling measure must satisfy most
of the properties given in this framework. The results
of this study show that dynamic coupling metrics
satisfy all properties and parameters required by the
evaluation framework and thus dynamic coupling measures
are robust and useful.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Khajaria:2011:MSR,
author = "Krishna Khajaria and Manoj Kumar",
title = "Modeling of security requirements for decision
information systems",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--4",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020989",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Data Warehouse (DW) is a decision information system
that facilitates decision makers for the fulfillment of
strategic decisions (decision making needs) by
extracting and integrating data from heterogeneous
sources. Due to sensitivity of the information to be
maintained in the DW, it becomes important to capture
information security goal as a quality goal of the
stakeholders for their organization from early stages
of DW life cycle. Various requirements engineering
techniques have been proposed in the DW literature
without paying much attention on security aspect.
Recently, AGDI (agent-goal-decision-information) model
was proposed to capture decision making needs of the
stakeholders for their organization to build a DW, but
security issue was not addressed. In this paper, we
propose an extension to the AGDI model to capture
security aspect (i.e. security goals of the
stakeholders) right from the beginning of requirements
modeling in order to prevent illegitimate attempts of
accessing DW. The application of the proposed extension
in the AGDI model has been demonstrated through a CASE
study of a University.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2011:QOR,
author = "Manoj Kumar and Anjana Gosain and Yogesh Singh",
title = "Quality-oriented requirements engineering for a data
warehouse",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--4",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020990",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Due to the increasing complexity of Data Warehouses
(DW), continuous attention must be paid for evaluation
of their quality throughout their design and
development. DW quality depends on the quality of all
requirements, conceptual, logical and physical models
used for DW design. Various authors have proposed
metrics to assure the quality of conceptual, logical
and physical models for DW. However, there is no
significant work in the DW literature to assure the
quality of a requirements model. A good quality
requirements model may lead to a good quality DW. In
this paper, we propose a quality-oriented requirements
model for a DW. In the proposed model, the notion of
perspective is introduced to capture the intention of
the agents (stakeholders) associated with their goals.
The agent may view a soft goal from two perspectives:
decisional and quality perspective. In the former, the
agent may refine a soft goal into the goal having well
defined criteria for its achievement and termed as
decisional goal, whereas in the later the agent may
define the various constraint (timing constraint,
budgetary constraint etc.) associated with the
decisional goals. The agents suggest the decisions for
achieving their decisional goals considering these
constraints. Thus, the decisional goals and the
constraints specified in the decisional and quality
perspective respectively should be maintained as
meta-data of the DW. In this way, the quality of DW
requirements model will be enhanced, which may lead to
enhance the quality of conceptual, logical and physical
model of DW.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dave:2011:CRM,
author = "Vachik S. Dave and Kamlesh Dutta",
title = "Comparison of regression model, feed-forward neural
network and radial basis neural network for software
development effort estimation",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--5",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020982",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Accurate estimation of software development parameters
such as effort, cost, and schedule is very important
for effectively managing software development projects.
Several software development effort estimation models
have been developed in the last few decades.
Determining, which is the best estimation model is
difficult to decide for a software management team. In
this paper we have compared Neural Network models and
regression model for software development effort
estimation. The comparison reveals that the Neural
Network (NN) is better for effort prediction compared
to regression analysis model. Further, we have compared
two Neural Network models --- Feed-Forward Neural
Network (FFNN) and Radial Basis Neural Network (RBNN).
The evaluation of the models is based on Mean Magnitude
Relative Error (MMRE), Relative Standard Deviation
(RSD) and Root Mean Squared Error (RMSE). The
experimental results show that the RBNN model exhibits
better prediction ability than FFNN.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sangwan:2011:RBF,
author = "Om Prakash Sangwan and Pradeep Kumar Bhatia and Yogesh
Singh",
title = "Radial basis function neural network based approach to
test oracle",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--5",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020992",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software testing is an important discipline, and
consumes significant amount of effort. A proper
strategy is required to design and generate test cases
systematically and effectively. In this paper automated
software test case generation with Radial Basis
Function Neural Network (RBFNN) has been proposed and
empirically validated with the help of a case study and
compared with other techniques of soft computing.
Experimental results show that RBFNN is one of the best
technique for automated test case generation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Yilmaz:2011:SPE,
author = "Murat Yilmaz and Rory V. O'Connor",
title = "A software process engineering approach to improving
software team productivity using socioeconomic
mechanism design",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--5",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020998",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software development is a knowledge and human
intensive activity. At the social level, the
interactions of these participants and their ability to
cooperate are important for improving the productivity
of teams and organizations. It is therefore not
surprising to discover that recent contributions in
software development have repeatedly asserted the
critical role of people in software development
efforts. However, existing approaches to software
development fail to fully exploit the importance of
social and intellectual capital that has been
highlighted in the fields of economics and sociology.
We propose that leveraging the existing approaches from
economics and sociology and applying to software
development can assist software organizations in
maximizing their return on investment. For example, by
applying one such approach, mechanism design, we can
improve and model the organization's total productivity
based on social aspects affecting productivity (i.e.
social productivity). This paper will discuss the
vision and progress for applying the concept of
mechanism design for optimizing software development
teams.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chanda:2011:SGA,
author = "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
and Swapan Bhattacharya",
title = "{SCAG}: a graphical approach to measure the complexity
of the {SOA} application",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--6",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020981",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Service Oriented Architecture (SOA) provides a
foundation to achieve software reuse that enables
business professionals, who are not necessarily
programmers, to exploit the intrinsic properties of
software. A component-based programming model is the
key factor in the rapid adoption of SOA. SOA exploits
the properties of Component Based Software Engineering
(CBSE) in the form of services. SOA components help to
provide the business users with some flexibility to
play around with the components and rewire them to
create new business solutions. The complexity of SOA
application plays an important role in project planning
and determination of timeline and cost estimation and
allocation of resources. This paper proposes a
metric-based approach for the determination of relative
complexity and coupling of Component based SOA
application. We have proposed a Service Component
Architecture Graph (SCAG) which can be used for
graphical representation of the different service
module, the service components in the service module
and interaction among them. This metrics may be used by
developers to assess the complexity of SOA application
and if required redesign to create highly cohesive
components with minimal coupling. It will also promote
a culture of asset (reusable components) based
development by considering the factor like usability,
complexity, coupling etc. A case study is presented and
graph based analysis is done for deriving the
complexity, along with the other aspects of the
architecture.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Malhotra:2011:SFP,
author = "Ruchika Malhotra and Ankita Jain",
title = "Software fault prediction for object oriented systems:
a literature review",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--6",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020991",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "There always has been a demand to produce efficient
and high quality software. There are various object
oriented metrics that measure various properties of the
software like coupling, cohesion, inheritance etc.
which affect the software to a large extent. These
metrics can be used in predicting important quality
attributes such as fault proneness, maintainability,
effort, productivity and reliability. Early prediction
of fault proneness will help us to focus on testing
resources and use them only on the classes which are
predicted to be fault-prone. Thus, this will help in
early phases of software development to give a
measurement of quality assessment. This paper provides
the review of the previous studies which are related to
software metrics and the fault proneness. In other
words, it reviews several journals and conference
papers on software fault prediction. There is large
number of software metrics proposed in the literature.
Each study uses a different subset of these metrics and
performs the analysis using different datasets. Also,
the researchers have used different approaches such as
Support vector machines, naive Bayes network, random
forest, artificial neural network, decision tree,
logistic regression etc. Thus, this study focuses on
the metrics used, dataset used and the evaluation or
analysis method used by various authors. This review
will be beneficial for the future studies as various
researchers and practitioners can use it for
comparative analysis.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dubey:2011:AMM,
author = "Sanjay Kumar Dubey and Ajay Rana",
title = "Assessment of maintainability metrics for
object-oriented software system",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--7",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020983",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Many organizations assess the maintainability of
software systems before they are deployed.
Object-oriented design has been shown to be a useful
technique to develop and deliver quality software.
Objectoriented metrics can be used to assess the
maintainability of a software system. Various software
metrics and models have been developed and described.
This paper provides a review of this literature and the
related state-of-the-art. It also proposes a
maintainability model that is based on the analysis of
the relationship between object-oriented metrics and
maintainability.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Seth:2011:DSB,
author = "Ashish Seth and Himanshu Agarwal and Ashim Raj
Singla",
title = "Designing a {SOA} based model",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--7",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020993",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Service Oriented Architecture (SOA) is an
architectural approach that can be shared and reused.
Shortage of studies, research thrust and limited
expertise in the area of SOA keeps the application of
SOA in Small and Medium Enterprises (SMEs) limited.
Also in a country like India, whose major economy is
dependent on the small and medium enterprises, the
Indian Government is promoting the growth in this
sector. Successful examples of individual automated
enterprise services and traditional ERP implementation
systems exist but there is a lack of holistic,
integrated technical solutions that can be applied in
small and medium size enterprises. In this paper we
propose a five layered SOA based architecture that can
integrate all activities comprising Supply Chain
Management (SCM), Customer Relationship Management
(CRM), Technical and Enterprise Applications Tools
according to SMEs requirement. We also compared our
model with traditional ERP systems and other similar
approaches and found the proposed model is efficient,
cost effective and competent with similar existing
solutions.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{V:2011:BBI,
author = "Sharath Chandra V. and S. Selvakumar",
title = "{BIXSAN}: browser independent {XSS} sanitizer for
prevention of {XSS} attacks",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--7",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020996",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Proliferation of social networking sites, and web
applications which deliver dynamic content to the
clients have increased the user created HTML content in
the World Wide Web. This user-created HTML content can
be a notorious vector for Cross-Site Scripting,(XSS)
attacks. XSS attacks have the ability to target
websites, steal confidential information of the users,
and hijack their accounts, etc. XSS attacks are
launched to exploit the vulnerabilities of the poorly
developed application code and data processing systems.
In particular, improper validation of user created
content and un-sanitized custom error messages
introduce vulnerability for XSS attacks. It is a
challenging task for any security mechanism to filter
out only the harmful HTML content and retain safe
content with high fidelity and robustness. This has
motivated us to develop a mechanism that filters out
the harmful HTML content, and allows safe HTML. The
existing solutions to XSS attack include use of regular
expressions to detect the presence of dynamic content
and client side filtering mechanisms such as Noscript
and Noxes tool. The drawbacks of these solutions are
low fidelity and disallowing of benign HTML. In order
to overcome these drawbacks BIXSAN, a Browser
Independent XSS SANitizer for prevention of XSS attacks
is proposed in this paper. BIXSAN includes the
proposition of three pronged strategy. These strategies
are as follows: Firstly the use of complete HTML parser
is proposed rather than approximating the behavior of
parser. The advantage of using complete HTML parser is
that it offers high fidelity. Secondly the use of
modified browser, viz., JavaScript Tester is proposed
to detect the presence of JavaScript for filtering it
out. Thirdly, identification of static tags is proposed
for allowing the benign HTML. Further, BIXSAN includes
the proposition of a parse tree generator at client
side browser to reduce the anomalous behavior of
browsers. BIXSAN was experimented in various browsers
such as Opera, Netscape, Internet Explorer (IE), and
Firefox and found to work for all the browsers. From
the experiments conducted it has been found that the
proposed BIXSAN prevents the injection of XSS attack
code successfully. Further, it has been verified that
BIXSAN reduces the anomalous behavior of browse.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Yadav:2011:FSM,
author = "Seema Yadav and Khaleel Ahamd and Jayant Shekhar",
title = "Finite state machine based approach to prevent format
string attacks",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--7",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020997",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In the computer field there are many types of input
validation attacks that occur, in which ``Format String
Overflow Attacks'' is one of the most important. Format
String Overflow Attacks remain the leading reason of
software vulnerability or exploits. Format string bugs
result in error such as wrong result type, memory
access error and crash and security breach. In this
paper, we proposed a Finite state machine which
prevents Format String Overflow Attacks in a secure way
with the help of several states of FSM. Proper checking
against format string overflow bugs can avoid
consequences due to exploits of format string overflow
bugs. The result of our proposed finite state machine
is improving the security problem and provides
protection to memory access from any unauthorized
user.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2011:ARM,
author = "Ajay Jain",
title = "Approach for reducing menu access time by enabling
bidirectional cursor movement within nested menu(s)",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--8",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020986",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "There is a time value associated with the action an
application user must perform to traverse menu items to
reach a specific option. The time value increases when
menu options are arranged within multiple nested menus.
This work proposes a new menu layout that helps reduce
the time required to traverse menus, especially those
with multiple levels of nesting. This work also
includes the results of a statistical experiment that
measures the time taken to traverse using the suggested
approach. The results are compared with the time taken
to traverse using the traditional menu layout.
Experimental data (under pre-defined assumptions) seems
to significantly favor the proposed approach. The work
presents data samples, assumptions, and limitations of
the proposed approach.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Johari:2011:ESE,
author = "Kalpana Johari and Arvinder Kaur",
title = "Effect of software evolution on software metrics: an
open source case study",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--8",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020987",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software needs to evolve in order to be used for a
longer period. The changes corresponding to corrective,
preventive, adaptive and perfective maintenance leads
to software evolution. In this paper we are presenting
the results of study conducted on 13 versions of JHot
Draw and 16 versions of Rhino released over the period
of 10 years. We measured Object Oriented Metrics and
studied the changes in the measured values over
different releases of two medium sized software
developed using Java. We also investigated the
applicability of Lehman's Law of Software Evolution on
Object Oriented Software Systems using different
measures. We found that Lehman's laws related with
increasing complexity and continuous growth are
supported by the data and computed metrics measure.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kaur:2011:MVC,
author = "Parminder Kaur and Hardeep Singh",
title = "A model for versioning control mechanism in
component-based systems",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--8",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020988",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Component-based systems provide a better reuse of
software components, greater flexibility, scalability
and higher quality of services. Component development
generally takes place due to the process of creating
and propagating changes in requirement definitions,
system designs, program source code, documentation and
test data. As a result, multiple versions of
constituent components come into existence. Thus, there
is a need to keep the track of multiple versions of
same component. To handle multiple versions of
constituent components, a version-control tool named as
Visual Version Control Tool (VVCT), for the management
of life-cycle evolution of component, is developed. The
developed tool satisfies all the conditions required
for version control in component-based systems. The
parameters required for uniform version management as
well as component frameworks are also satisfied by the
developed tool. To monitor and control the versioning
system, an example model is tested along with the set
of proposed metrics. This paper also incorporates
issues like component configuration, component
evolution, component framework, component version tree
and version-control metrics.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2011:EEO,
author = "Satwinder Singh and K. S. Kahlon",
title = "Effectiveness of encapsulation and object-oriented
metrics to refactor code and identify error prone
classes using bad smells",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--10",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020994",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "To assist maintenance and evolution teams, work needs
to be done at the onset of software development. One
such facilitation is refactoring the code, making it
easier to read, understand and maintain. Refactoring is
done by identifying bad smell areas in the code. In
this paper, based on empirical analysis, we develop a
metrics model to identify smelly classes. The role of
two new metrics (encapsulation and information hiding)
is also investigated for identifying smelly and faulty
classes in software code. This paper first presents a
binary statistical analysis of thev relationship
between metrics and bad smells, the results of which
show a significant relationship. Then, the metrics
model (with significant metrics shortlisted from the
binary analysis) for bad smell categorization (divided
into five categories) is developed. To verify our
model, we examine the open source Firefox system, which
has a strong industrial usage. The results show that
proposed metrics model for bad smell can predict faulty
classes with high accuracy, but in the case of the
categorized model not all categories of bad smells can
adequately identified the faulty and smelly classes.
Due to certain limitations of our study more
experiments are required to generalize the results of
bad smell and faulty class identification in software
code.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gandotra:2011:LSA,
author = "Vandana Gandotra and Archana Archana Singhal and Punam
Bedi",
title = "Layered security architecture for threat management
using multi-agent system",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "1--11",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020984",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The increasing complexity of software systems along
with expanding connectivity has necessitated the
evolution of an integrated security framework adopting
innovative techniques for secure software systems. This
paper proposes a layered security architecture for
threat management using a multi-agent system to meet
the above objective. Layer- 1 of this framework is
designed for elicitation of realistic and flawless
security requirements. Layer-2 uses a Multi-Agent
system planning for avoidance of threats optimally. In
this mechanism autonomous agents interact and
coordinate with each other to achieve the common goal
of software security. An adaptive defense mechanism
using Meta-Agents in multi-agent system in conjunction
with fuzzy logic to counter the adaptive and compound
threats is the responsibility of Layer-3. Guidelines
proposed in this paper have augmented this security
architecture as a two-fold defensive strategy to ensure
that a hacker is not able to tamper data even if they
penetrate the periphery defenses. These proactive steps
can be implemented during the design and development
phases of the software life cycle in an incremental way
as per the budget and security requirements of a
software project. A case study on internet banking is
included in the paper to describe the proposed security
framework.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2011:ESEa,
author = "Larry Bernstein",
title = "Eternal software engineering questions",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "7--7",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021008",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wing:2011:ESL,
author = "Michael Wing",
title = "Everything in {SE} is a lie",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "8--9",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021009",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2011:SNSc,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "10--19",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021010",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2011:RPc,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "20--23",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021011",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Treude:2011:WRW,
author = "Christoph Treude and Margaret-Anne Storey and Arie van
Deursen and Andrew Begel and Sue Black",
title = "Workshop report from {Web2SE 2011: 2nd International
Workshop on Web 2.0 for Software Engineering}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "24--29",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020977",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Web 2.0 technologies, such as wikis, blogs, tags and
feeds, have been adopted and adapted by software
engineers. With the annual Web2SE workshop, we provide
a venue for research on Web 2.0 for software
engineering by highlighting state-of-the-art work,
identifying current research areas, discussing
implications of Web 2.0 on software engineering, and
outlining the risks and challenges for researchers.
This report highlights the paper and tool
presentations, and the discussions among participants
at Web2SE 2011 in Honolulu, as well as future
directions of the Web2SE workshop community.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Galster:2011:VSA,
author = "Matthias Galster and Paris Avgeriou and Danny Weyns
and Tomi M{\"a}nnist{\"o}",
title = "Variability in software architecture: current practice
and challenges",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "30--32",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020978",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Variability in software-intensive systems is usually
understood as the ability of a software artifact to be
changed in order to fit different contexts,
environments, or purposes. Software architecture on the
other hand determines the structure of a software
system, and is described in an architecture
description. This description includes the major
stakeholders of a software system and their concerns.
Variability is reflected in and facilitated through the
software architecture. The First International Workshop
on Variability in Software Architecture (VARSA) was
held jointly with WICSA 2011 in Boulder, Colorado. The
goal of the workshop was to explore and advance the
state-of-the art in variability in software
architecture. It featured four research paper
presentations, two invited talks, and three working
groups that discussed specific topics. This report
summarizes the themes of the workshop, presents the
results of the working group discussions, and suggests
topics for further research.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ozkaya:2011:MTD,
author = "Ipek Ozkaya and Philippe Kruchten and Robert L. Nord
and Nanette Brown",
title = "Managing technical debt in software development:
report on the {2nd International Workshop on Managing
Technical Debt}, held at {ICSE 2011}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "33--35",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2020979",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The technical debt metaphor is gaining significant
traction in the software development community as a way
to understand and communicate about issues of intrinsic
quality, value, and cost. This is a report on a second
workshop on managing technical debt, which took place
as part of the 33rd International Conference on
Software Engineering (ICSE 2011). The goal of this
second workshop was to discuss the management of
technical debt: to assess current practice in industry
and to further refine a research agenda for software
engineering in this area.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lilja:2011:PAI,
author = "David J. Lilja and Raffaela Mirandola and Kai Sachs",
title = "Paper Abstracts of the {2nd International Conferernce
on Performance Engineering (ICPE 2011)}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "36--53",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2069288",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Foreword This issue of SEN contains the abstracts of
the papers, which were presented on the Second Joint
WOSP/SIPEW International Conference (ICPE 2011), held
in Karlsruhe, Germany, March 14-16, 2011, now
established as a regular event known as ACM/SPEC
International Conference on Performance Engineering
(ICPE). The primary goal of this conference series is
to bridge the gap between theory and practice in the
field of computer systems performance engineering by
providing a forum for sharing ideas and experiences
between industry and academia. This years conference
brought together researchers and industry practitioners
to share and present their experiences, discuss
challenges, and report on both state-of-the-art
research and work-in-progress on performance
engineering of software and systems, including
performance measurement, modeling, benchmark design,
and run-time performance management. The ICPE gives
researchers and practitioners a unique opportunity to
share their perspectives with others interested in the
various aspects of computer systems performance
engineering. The call for papers attracted 63 research
and 24 industrial paper submissions from Europe, Asia,
Africa, and North America. The program committees
accepted 19 full research papers and 7 short papers
together with 13 industrial papers. These papers cover
a variety of topics, including performance modeling and
techniques and measurement and benchmarking strategies
for adaptive systems, power management, virtualized
environments, and large-scale and distributed systems.
We are confident that you will find the abstracts
stimulating and that they will provide you with many
new ideas and insights. The full paper are available at
the ACM Digital Library. David J. Lilja: Program
Co-Chair, Research Track Raffaela Mirandola: Program
Co-Chair, Research Track Kai Sachs: Program Co-Chair,
Industrial Track",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2011:BRU,
author = "William {Del Ra}",
title = "Book Review: {{\booktitle{Usability testing
essentials: ready, set\ldots{}test!}} by Carol M.
Barnum}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "49--50",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021001",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Glaves:2011:BRA,
author = "Leslie Glaves",
title = "Book Review: {{\booktitle{API design for C++}} by
Martin Reddy}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "50--50",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021002",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mitrache:2011:BRI,
author = "Cristina Mitrache",
title = "Book Review: {{\booktitle{IT manager's handbook, the
business edition}} by Bill Holtsnider and Brian D.
Jaffe}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "51--51",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021003",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ngo:2011:BRD,
author = "Terry Ngo",
title = "Book Review: {{\booktitle{Data mining: practical
machine learning tools and technique}}, third edition
by Ian H. Witten, Eibe Frank, Mark A. Hell}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "51--52",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021004",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{OSullivan:2011:DMM,
author = "Michael O'Sullivan",
title = "Designing with the mind in mind: simple guide to
understanding user interface design rules by Jeff
{Johnson}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "52--52",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021005",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Vu:2011:BRA,
author = "Jodat Vu",
title = "Book Review: {{\booktitle{The art of multiprocessor
programming}} by Maurice Herlihy and Nir Shavit}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "52--53",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021006",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{White:2011:BRR,
author = "Randall L. White",
title = "Book Review: {{\booktitle{Reconfigurable embedded
control systems: applications for flexibility and
agility}} by Mohamed Khalgui and Han-Michale Hanisch}",
journal = j-SIGSOFT,
volume = "36",
number = "5",
pages = "53--53",
month = sep,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2020976.2021007",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:04 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Misra:2011:SAM,
author = "Sanjay Misra and Martha Omorodion",
title = "Survey on agile metrics and their inter-relationship
with other traditional development metrics",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--3",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047430",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In our civilized world today, measurement is very
important in every aspect of our lives as a means of
quantifying our success or progress in whatever
activity we involve ourselves in. Consequently, this
paper outlines the various metrics that are utilized in
the Agile development process and compares them with
the ones used in time past to measure success and
progress.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tee:2011:ISS,
author = "Sim-Hui Tee",
title = "Identifying structural similarity of methods using
isomorphic graphs",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--3",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047432",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "It is a recommended practice to use overloaded methods
in a class for a group of similar operations and
functions. However, it is possible that software
developers may violate the rule of overloaded methods.
In addition, non-overloaded method is used incorrectly
sometimes in composing similar functions. This paper
presents a technique, using isomorphic graphs, to
identify structural similarity between class methods.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2011:ILG,
author = "Alok Mishra and Deepti Mishra",
title = "Industry linked graduate software engineering
curriculum",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--4",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047429",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In recent years, Software Engineering (SE) has emerged
as an independent and mature discipline. In this
context, various studies are being done to provide
guidelines for undergraduate about graduate software
engineering curriculum design. This article presents
need of software industry related courses and discusses
significance of industry linked software engineering
education to meet educational objectives of all
stakeholders. Software industry oriented curriculum for
graduate level are discussed. Software industry aligned
courses will facilitate to increase their employment
prospects in industrial and other sectors.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bandyopadhyay:2011:TBM,
author = "Anup Kumar Bandyopadhyay",
title = "{TLRO} based modeling of alternative commands and its
application to generalized distributed resource
allocation problem",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--5",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047421",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "There are systems where alternative constructs need to
be used for its description. In weakest precondition
calculus disjunction of the post conditions of
constituent guarded commands is used as the post
condition of an alternative construct. Such
representation is not suitable because it does not
express a one to one correspondence between a guard and
the relevant component of the characterized post
condition. In this paper Temporal Logic Related to
Observation (TLRO) is used to solve this problem. Each
guarded command is expressed as a TLRO rule by using
its strongest post condition and the corresponding
precondition. List of these representations for all the
constituent guarded commands is the required model.
Technique is illustrated by considering a common sense
scenario. The scheme is then applied to a generalized
resource allocation algorithm which is a weaker version
of Drinking Philosophers problem.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumari:2011:CCM,
author = "Usha Kumari and Sucheta Bhasin",
title = "A composite complexity measure for component-based
systems",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--5",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047426",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The increasing importance of software measurement has
led to design and development of new software measures.
Controlling and minimizing software complexity is the
most important objective of each software development
paradigm because it affects all other software quality
attributes like reusability, reliability, testability,
maintainability etc. For this purpose, a number of
software complexity measures have been reported to
quantify different aspects of complexity.
Component-based software development (CBSD) is an
evolving paradigm where emphasis is laid on reuse of
existing components and effective designing of new
components. As the development of component-based
software is rising, more and more complexity metrics
are being developed for the same. In this paper, we
have attempted to design a composite complexity measure
to quantify important aspects of complexity of a
component-based system. The proposed measure takes into
account two major complexities of a component-based
system: one due to individual component and the other
due to its interaction with other components.
Individual component complexity may arise due to size
of a component, type and nesting level of control
structures present in code component. Component's
interaction complexity may be due to its interface with
other components. Graph theoretic notions and concept
of weights have been used to illustrate interaction
among software components and to compute complexity.
The proposed measure has been applied to four cases
chosen for present study and yields quiet encouraging
results which may further help in controlling the
complexity of component-based systems so as to minimize
both integration and maintenance efforts.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Miranda:2011:TBP,
author = "Eduardo Miranda",
title = "Time boxing planning: buffered {Moscow} rules",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--5",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047428",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Time boxing is a management technique which
prioritizes schedule over deliverables but time boxes
which are merely a self, or an outside, imposed target
without agreed partial outcomes and justified certainty
are at best, an expression of good will on the part of
the team. This essay proposes the use of a modified set
of Moscow rules which accomplish the objectives of
prioritizing deliverables and providing a degree of
assurance as a function of the uncertainty of the
underlying estimates.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Suri:2011:ATC,
author = "Bharti Suri and Shweta Singhal",
title = "Analyzing test case selection and prioritization using
{ACO}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--5",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047431",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Regression testing is primarily a maintenance activity
that is performed frequently to ensure the validity of
the modified software. In such cases, due to time and
cost constraints, the entire test suite cannot be run.
Thus, it becomes essential to select or prioritize the
tests in order to cover maximum faults in minimum time.
Recently, Ant Colony Optimization (ACO), which is a new
way to solve time constraint prioritization problem,
has been utilized. This paper presents the analysis of
the regression test prioritization technique to reorder
test suites in time constraint environment along with
the sample runs on various programs. Our analysis
concluded that the ACO finds better orderings at higher
values of the time constraint (TC). The correctness of
the technique has also been recorded to be near optimal
at an average.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Yu:2011:CIE,
author = "Liguo Yu",
title = "Coevolution of information ecosystems: a study of the
statistical relations among the growth rates of
hardware, system software, and application software",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--5",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047435",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "With the increasing use of information technology,
information ecosystems have emerged. Information
ecosystems not only include software products, but also
include hardware products. For example, application
software depends on system software, and both
application software and system software depend on
hardware devices. Together, they play important roles
in an information ecosystem. This paper analyzes the
coevolution of information ecosystem, where three
representatives of computer hardware, system software,
and application software products are studied.
Specifically, we analyze (1) the growth rate of Intel
processors, Linux operating systems, and Apache web
servers; and (2) the statistical relations among the
evolution of Intel processors, Linux operating systems,
and Apache web servers. Our study finds that a system
software product grows slower than its supporting
hardware products and a application software product
grows slower than its supporting system software and
hardware products.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2011:MSR,
author = "Ravinder Kumar and Kiran Khatter and Arvind Kalia",
title = "Measuring software reliability: a fuzzy model",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--6",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047425",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software reliability is an essential part of software
engineering to ensure the quality of a system. There
are various techniques, which can be used in building
models for predicting quality attributes. This paper
presents a Fuzzy model for software reliability
prediction. We have proposed three parameters
Availability, Failure Probability and Recoverability as
an integrated measure of software reliability. Fuzzy
Model provides a way to arrive at a discrete
Reliability Non-functional requirement (NFR) in
contrast to imprecise, vague and ambiguous. This model
will help us to evolve intermediate stages between
reliable state and unreliable state of a system.
Results obtained by proposed model show that this is
suitable for predicting software reliability of the
software.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tyagi:2011:RCB,
author = "Kirti Tyagi and Arun Sharma",
title = "Reliability of component based systems: a critical
survey",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--6",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047434",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software reliability is defined as the probability of
the failure free operation of a software system for a
specified period of time in a specified environment.
Day by day software applications are growing more
complex and with more emphasis on reuse. Component
Based Software (CBS) applications have emerged. The
focus of this paper is to provide an overview for the
state of the art of Component Based Systems reliability
estimation. In this paper, we discussed various
approaches in terms of their scope, model, methods,
technique and validation scheme. This comparison
provides insight into determining the direction of
future CBS reliability research.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Langsworth:2011:USA,
author = "Anthony Langsworth",
title = "Using static analysis tools to detect and correct
non-compliant cryptography",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--7",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047427",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Security is an increasing concern for application
developers, whether they are targeting internal
customers, organizations or the general public.
Particularly for the US public sector with requirements
like FIPS 140, developers need to identify and remove
superseded cryptography in both legacy applications and
new development. This paper outlines a mechanism using
static analysis tools to find outdated or improper
cryptography and suggest corrections or correct code.
This prevents the need for manual inspection and
correction by developers familiar with cryptography and
is more accurate than text searches.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Khatri:2011:MBC,
author = "Sujata Khatri and R. S. Chhillar and V. B. Singh",
title = "Measuring bug complexity in object oriented software
system",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--8",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047424",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/python.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Bugs are inevitable in any software development life
cycle. Most bugs are detected and removed in the
testing phase. In software, we can classify bugs into
two categories: (1) bugs of different severity, from a
user's perspective,(how much damage the bug does) and
(2) bugs of different complexity(how much is the
debugging time lag between detection and correction).
Prior knowledge of bug distribution of different
complexity can help project managers in allocating
testing resources and tools. Various researchers have
proposed models for determining the proportion of bugs
present in software of different complexity but none of
these models have been applied to object oriented
software. In this paper, we have proposed a model that
will determine the proportion of different bug
complexity. The paper also suggests the suitability of
the proposed model for a particular data set. We have
taken two data sets based on object oriented
methodology namely SQL for Python and SQuirreL SQL
Client software developed under open source
environment.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Thakur:2011:DRB,
author = "Garima Thakur and Anjana Gosain",
title = "{DWEVOLVE}: a requirement based framework for data
warehouse evolution",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--8",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047433",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Data warehouse integrate information from numerous
data sources under a unified schema and format to
provide effective results from multidimensional data
analysis in order to facilitate reporting and trend
analysis. These information sources are dynamic in
nature and keep on changing owing to the autonomous
nature of transactions being carried out in the
organization along with the complexity involved in
gathering requirements from the users. Requirements
elicitation and collection is difficult to perform
because user needs keep on changing. As a consequence,
the data warehouse must evolve so that it improves the
data quality by easily incorporating the changes in
requirements as well as source schema. In this paper we
present a theoretical framework called DWEVOLVE to
support data warehouse evolution. The proposed
framework enhances the functionality of previously
designed framework by taking into account the
requirements specified by the users. Provisions have
also been made to define and generate customized
reports according to the user needs.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bhatia:2011:FCM,
author = "Nitin Bhatia and Namarta Kapoor",
title = "Fuzzy cognitive map based approach for software
quality risk analysis",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--9",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047422",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper presents a software risk prediction tool
for risk analysis during the development of a software
product. The term ``Risk'' refers to a problem that can
threaten the success of the software project but has
not happened yet. Risks are uncertain. The main
objective of each organization is to provide very high
quality software to their customers. The term
``Quality'' is a value to the person. But there is a
long list of software risks that can have adverse
impact on the quality of the software. It is necessary
to address all the risks; otherwise, they may lead to
undesireable results. Fuzzy Cognitive Maps (FCMs)
describe different concepts with different aspects of
the behaviour of complex systems. A software tool based
upon FCM has been developed for assessing software
risks. This paper describes the reasoning behind the
focus on risk management during the software
development process and its importance in delivering
high quality software by assessing software risks
during the development process using fuzzy cognitive
maps.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chhillar:2011:EAO,
author = "Rajender Singh Chhillar and Nisha",
title = "Empirical analysis of object-oriented design metrics
for predicting high, medium and low severity faults
using {Mallows Cp}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "1--9",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047423",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "An object-oriented approach has become a commonly-used
method in software-related activities. Many design
metrics for object-oriented systems have been proposed
and also employed for predicting and managing the
quality of processes and products. To enhance the
practical utility of object-oriented metrics in
software industry, various researchers have tried to
find relations between these metrics and fault
proneness, but very few focus on relating them with the
number-of-faults in different levels as per their
severity rating. In this study, empirical validation is
carried out on object-oriented design metrics (i.e.
Chidamber and Kemerer CK-metrics suite and source lines
of codes) for predicting number-of-faults in different
severity levels. Different statistical methods are used
to analyze the data, including correlation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2011:ESEb,
author = "Larry Bernstein",
title = "Eternal software engineering cross feature\slash
architecture design simplifications",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "6--6",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047415",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2011:SPH,
author = "Robert Schaefer",
title = "Software perspectives on history, culture and
efficiency",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "6--7",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047416",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2011:SEEc,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software Engineering Education {(SEEd)}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "7--8",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047417",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2011:SNSd,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "9--18",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047418",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2011:RPd,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "19--23",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047419",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Acton:2011:BRL,
author = "Dorothy Acton",
title = "Book Review: {{\booktitle{Leadership, teamwork and
trust: building a competitive software capability}} by
Watts S. Humphrey and James W. Over}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "28--28",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047436",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ausden:2011:BRB,
author = "Howard Ausden",
title = "Book Review: {{\booktitle{Building parallel, embedded,
and real-time applications with Ada}} by John W.
McCormick, Frank Singhoff and Jerome Hugues}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "28--29",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047437",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2011:MBD,
author = "William {Del Ra III}",
title = "Book Review: {{\booktitle{Model-based development:
applications}}, by H. S. Lahman}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "29--29",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047438",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2011:BRB,
author = "William {Del Ra III}",
title = "Book Review: {{\booktitle{Brave NUI world: designing
natural user interfaces for touch and gesture}} by
Daniel Wigdor and Dennis Wixon}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "29--30",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047439",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saur:2011:NSM,
author = "Joe Saur",
title = "Network science for military coalition operations:
information exchange and interaction by Dinesh
{Verma}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "30--30",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047440",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2011:BRI,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Integrating and extending
BIRT}} 3rd edition by J. Weathersby, T. Bondurand, and
I. Chatalbasheva}",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "31--31",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047441",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tracz:2011:LFE,
author = "Will Tracz",
title = "{Lord} of the files: essays on the social aspects of
software engineering by Russel Ovans",
journal = j-SIGSOFT,
volume = "36",
number = "6",
pages = "31--31",
month = nov,
year = "2011",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2047414.2047442",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:07 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Johari:2012:VOO,
author = "Kalpana Johari and Arvinder Kaur",
title = "Validation of object oriented metrics using open
source software system: an empirical study",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--4",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088893",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In today's environment the relevance of Free Open
Source Software Systems is understood and appreciated
both in academia and research. The debate about the
pros and cons of the open source vis-{\`a}-vis
proprietary software has been raging from ages ever
since Richard Stallman founded the Free Software
Foundation in 1985. With the changing trends in the
domain of Object Oriented Systems there is a need to
measure the fault predictability of software metrics on
open source software systems. In this paper we present
the results of empirical study which was conducted
using open source software, JHotDraw 7.5.1. We computed
the object oriented metrics, proposed by Chidamber and
Kemmerer, and performed bug-class mapping for the
software under study. We also studied the relationship
between the revisions made to open source software and
its software metrics measure.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Santos:2012:ICC,
author = "Bruno F. L. Santos and Hendrik T. Macedo",
title = "Improving {CUDA{\TM} C\slash C++} encoding readability
to foster parallel application development",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--5",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088897",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/pvm.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Graphical Processing Units (GPUs) have recently been
used to enable parallel application development. The
most prominent initiative has been provided by
NVIDIA{\TM} with the so-called CUDA{\TM} architecture,
designed to GeForce{\TM} graphic cards. However, even
with CUDA C-like programming language, parallel
codification remains somewhat awkward if compared to
sequential codification. The programmer still has to
deal with low-level hardware details such as generation
and synchronization of threads and GPU tracks and
sectors. In this paper, we propose a
programmer-friendly interface for CUDA-C programming,
in such a way that most hardware details are hidden
from the programmer. We show how code readability is
improved without undermining parallel execution
performance.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Varona:2012:ESE,
author = "Daniel Varona and Luiz Fernando Capretz and Yadenis
Pi{\~n}ero and Arif Raza",
title = "Evolution of software engineers' personality profile",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--5",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088901",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Myers-Briggs Type Indicator (MBTI) has been
applied to several studies that explore various
dimensions of human factors in software engineering.
Accordingly, this work reviews the results of these
studies to explore existing trends. In order to attain
a greater understanding of human resources in the
software industry, we have reviewed sixteen studies
that had been performed between 1985 and 2011. This
review concludes that the changes in the complexity of
software processes and products have created new roles
and demanded new skills for software engineers.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Krishnamurthy:2012:PBA,
author = "Vallidevi Krishnamurthy and Chitra Babu",
title = "Pattern based adaptation for service oriented
applications",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--6",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088894",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Service Oriented Architecture(SOA) facilitates
developing applications that are inherently dynamic in
nature since the service binding happens at runtime by
matching the functional as well as Quality of
Service(QoS) requirements of the user. Further, the
running application can be dynamically reconfigured by
monitoring the application for possible violations in
the agreed QoS requirements. This paper advocates the
use of various patterns to facilitate such dynamic
reconfiguration in the various layers of the SOA
Reference Architecture. Towards this objective, Family
of Adapters pattern has been used in the service
component layer to achieve dynamic switching between
different versions of the same service without human
intervention. In addition, an SOA design pattern has
been employed in the business process layer to enhance
the efficiency of the application. This pattern based
approach has been tested by applying it to a sample SOA
based e-Shopping application case study.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2012:AST,
author = "Pradeep Kumar and Yogesh Singh",
title = "Assessment of software testing time using soft
computing techniques",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--6",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088895",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Application of a soft computing approach in place of
traditional statistical techniques has shown a
remarkable improvement in reliability prediction. This
paper examines and compares Linear Regression (LR) and
five machine learning methods: (Artificial Neural
Network, Support Vector Machine, Decision Tree, Fuzzy
Inference System and Adaptive Neuro-Fuzzy Inference
System). These methods are explored empirically to find
the effect of severity of errors for the assessment of
software testing time. We use two publicly available
failure datasets to analyse and compare the regression
and machine learning methods for assessing the software
testing time. The performance of the proposed model is
compared by computing mean absolute error (MAE) and
root mean square error (RMSE). Based on the results
from rigours experiments, it is observed that model
accuracy using FIS and ANFIS method is better and
outperformed the model predicted using linear
regression and other machine learning methods. Finally,
we conclude that Adaptive Neuro-fuzzy Inference System
is useful in constructing software quality models
having better capability of generalization and less
dependent on sample size.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mohana:2012:AIP,
author = "Rajni Mohana and Deepak Dahiya",
title = "Approach and impact of a protocol for selection of
service in web service platform",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--6",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088896",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Business agility is an important challenge while
designing an enterprise application. Service oriented
architecture is used to combine many outsourced web
services to provide value added services to the users
with agility. A service registry is maintained to keep
track of various web service published by the service
providers. The key challenge for the service requester
is to pick the best web service among the various
functionally equivalent web services in the service
registry. This paper describes and analyses various
service selection protocols given by the researchers.
The approaches are classified into semantic and
non-semantic approach. It also proposes a novel
technique to look for the best web service based on QoS
like reliability, throughput etc. The solution to the
problem of selecting the best web service according to
the requirements is designed as a fuzzy expert system.
This rule based approach of Service registration and
lookup is adaptive and responds dynamically to quality
of service changes in the web services.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2012:ADC,
author = "Vinay Singh and Vandana Bhattacherjee and Sandeep
Bhattacharjee",
title = "An analysis of dependency of coupling on software
defects",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--6",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088899",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Functional independence is a key to good software
design and a good design results in high quality
software. Functional independence is the refined form
of the design concept of modularity, abstraction and
information hiding. Coupling is a measure of relative
interconnection among modules. Coupling in software has
been linked with maintainability and existing metrics
are used as predictors of external software quality
(e.g., fault -proneness, impact analysis, ripple effect
of changes, changeability). In this paper we
demonstrate the defects of software due to coupling by
studying five different attributes of coupling and
measured its impact on software defects.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tekinerdogan:2012:AGS,
author = "Bedir Tekinerdogan and Semih Cetin and Muhammad Ali
Babar and Patricia Lago and Juho M{\"a}ki{\"o}",
title = "Architecting in global software engineering",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--7",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088900",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper summarizes the results of the First
Workshop on Architecting in Global Software Engineering
(GSE), which was organized in conjunction with the 6th
International Conference on Global Software Engineering
(ICGSE 2011). The workshop aimed to bring together
researchers and practitioners for defining and
advancing the state-of-the-art and state-of-the
practice in architecture design of global software
development systems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jiau:2012:FIC,
author = "Hewijin Christine Jiau and Feng-Pu Yang",
title = "Facing up to the inequality of crowdsourced {API}
documentation",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--9",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088892",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "API usability is a crucial issue in software
development. One bottleneck of API usability is
insufficient documentation. This study empirically
confirmed the inequality of crowdsourced API
documentation, which is one of the main sources of API
documentation. To manage the inequality, a method for
documentation reuse is proposed based on the nature of
object-oriented programming language, inheritance. A
case study was conducted in Stackoverflow, which is a
widely used Q \& A site, to study the feasibility of
the documentation reuse. Results of the case study
indicate that documentation reuse is feasible in
improving both the coverage and quality of crowdsourced
API documentations.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2012:ARB,
author = "Ashish Sharma and D. S. Kushwaha",
title = "Applying requirement based complexity for the
estimation of software development and testing effort",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--11",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088898",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The need of computing the software complexity in
requirement analysis phase of software development life
cycle (SDLC) would be an enormous benefit for
estimating the required development and testing effort
for yet to be developed software. Various research
proposals are directed towards minimizing the cost of
software. Also, a relationship between source code and
difficulty in developing a source code are also
attempted in order to estimate the complexity of the
proposed software for cost estimation, man power build
up, code and developer's evaluation. Therefore, this
paper presents a systematic and integrated approach for
the estimation of software development and testing
effort on the basis of improved requirement based
complexity (IRBC) of the proposed software. The IRBC
measure serves as the basis for estimation of these
software development activities to enable the
developers and practitioners to predict the critical
information about the software development intricacies.
Efficient software development requires accurate
estimates, since inappropriate estimates causes'
trouble during implementation of software process.
Hence, this paper presents a comprehensive approach,
for the prediction of software development and testing
effort using IRBC. For validation purpose, the proposed
measures are categorically compared with various
established and prevalent practices proposed in the
past like code based, use case based, algorithmic model
and function point based estimation measures. Finally,
the results obtained, validates the claim, for the
approaches discussed in this paper, for estimation of
software development and testing effort, in the early
phases of software development appears to be robust,
comprehensive, early alarming and compares well with
other measures proposed in the past. Hence, it is even
more useful because the complexity, development and
testing effort estimates are obtained at very early
stage.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Banerjee:2012:DAB,
author = "A. Banerjee and S. Ray and P. Dasgupta and P. P.
Chakrabarti and S. Ramesh and P. Vignesh and V.
Ganesan",
title = "A dynamic assertion-based verification platform for
validation of {UML} designs",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "1--14",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088891",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Capacity limitations continue to impede widespread
adoption of formal property verification in the design
validation flow of software and hardware systems. The
more popular choice (at least in the hardware domain)
has been dynamic property verification (DPV), which is
a semi-formal approach where the formal properties are
checked over simulation runs. DPV is highly scalable
and can support a rich specification language. The main
contribution of this paper is to build an integrated
DPV platform for validation of UML-based designs.
Specifically, we present (a) a language, named
Action-LTL (a simple extension of Linear Temporal
Logic) for writing assertions over data attributes and
events of UML models, and (b) an integrated dynamic
assertion-verification platform for verification of UML
designs. In view of the capacity limitations of
existing formal property verification tools, we believe
that the methods presented in this paper are of
immediate practical value to the UML design
community.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2012:CAS,
author = "Larry Bernstein",
title = "Cross avoid shelf-ware by making your systems
easy-to-use",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "8--9",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088884",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wing:2012:FT,
author = "Michael Wing",
title = "Food for thought",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "9--10",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088885",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2012:SEEa,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "10--11",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088886",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2012:SNSa,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "12--20",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088887",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2012:RPa,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "21--26",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088888",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Krein:2012:RIW,
author = "Jonathan L. Krein and Charles D. Knutson and Lutz
Prechelt and Natalia Juristo",
title = "Report from the {2nd International Workshop on
Replication in Empirical Software Engineering Research
(RESER 2011)}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "27--30",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088889",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The RESER workshop provides a venue in which empirical
software engineering researchers can discuss the
theoretical foundations and methods of replication, as
well as present the results of specific replicated
studies. In 2011, the workshop co-located with the
International Symposium on Empirical Software
Engineering and Measurement (ESEM) in Banff, Alberta,
Canada. In addition to several outstanding paper
sessions, highlights of the 2011 workshop included a
keynote address by Dr. Victor R. Basili, in which he
addressed the question, ``What's so hard about
replication of software engineering experiments?'' The
workshop also featured a joint replication panel
session discussing the first cooperative joint
replication ever conducted in empirical software
engineering research and a planning session for next
year's joint replication project addressing Conway's
Law.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Cooper:2012:BRD,
author = "Greg Cooper",
title = "Book Review: {{\booktitle{DTrace: dynamic tracing in
Oracle Solaris, Mac OS X, and FreeBSD}} by Brendan
Gregg and Jim Mauro}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "34--34",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088902",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Glass:2012:BRM,
author = "Robert L. Glass",
title = "Book Review: {{\booktitle{Managing projects in
trouble: achieving turnaround and success}} by Ralph L.
Kliem}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "34--34",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088903",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gousios:2012:BRS,
author = "Georgios Gousios",
title = "Book Review: {{\booktitle{Scalability rules 50
principles for scaling web sites}} by Martin L. Abbott
and Michael T. Fisher}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "35--35",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2139179",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2012:BRE,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{The Eclipse graphical
editing framework (GEF)}} by D. Rubel, J. Wren, and E.
Clayberg}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "35--35",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088905",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mendell:2012:BRP,
author = "Matt Mendell",
title = "Book Review: {{\booktitle{A practical guide to Fedora
and Red Hat enterprise Linux}} by Mark G. Sobell}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "36--36",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088907",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2012:BRC,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Continuous testing with
Ruby, Rails and JavaScript}} by Ben Rady and Rod
Coffin}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "36--36",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088906",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hathhorn:2012:BRE,
author = "Chris Hathhorn",
title = "Book Review: {{\booktitle{Engineering a compiler}},
second edition by Keith D. Cooper and Linda Torczon}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "36--37",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088908",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2012:BRB,
author = "William {Del Ra III}",
title = "Book Review: {{\booktitle{The book of Ruby}} by Huw
Collingbourne}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "37--37",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088909",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tracz:2012:BHD,
author = "Will Tracz",
title = "A bug hunter's diary: a guided tour through the wilds
of software security by Tobias {Klein}",
journal = j-SIGSOFT,
volume = "37",
number = "1",
pages = "37--38",
month = jan,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2088883.2088910",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:09 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Khan:2012:IQM,
author = "Suhel Ahmad Khan and Raees Ahmad Khan",
title = "Integrity quantification model for object oriented
design",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "1--3",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108154",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Various surveys indicate that over the past several
years software security has risen in priority for many
software organizations. Security quantification in
early stage of software development life cycle assists
security experts to address security related problems
well in advance. Security assessment using model is
proved to be one of the established methods. Keeping in
view of the same, an Integrity Quantification Model
(IQM) is proposed in this paper. An effort is made by
authors to correlate design integrity with complexity
factors. Object oriented design metrics are used to
quantify complexity factors. The developed model has
been validated with realistic (small set of) data to
prove the significance.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Eisenberg:2012:TBA,
author = "Robert J. Eisenberg",
title = "A threshold based approach to technical debt",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "1--6",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108151",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Nearly two decades ago, Ward Cunningham introduced us
to the term ``technical debt'' as a means of describing
the long term costs associated with a suboptimal
software design and implementation. For most programs,
especially those with a large legacy code baseline,
achieving zero absolute debt is an unnecessary and
unrealistic goal. It is important to recall that a
primary reason for managing and eliminating debt is to
drive down maintenance costs and to reduce defects. A
sufficiently low, manageable level of debt can minimize
the long-term impact, i.e., ``low debt interest
payments''. In this article, we define an approach for
establishing program specific thresholds to define
manageable levels of technical debt.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Harikrishnan:2012:SEN,
author = "S. Harikrishnan and Rajeev Kumar",
title = "Space efficient non-constant time multi-method
dispatch in object oriented systems",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "1--6",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108153",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Multi-method dispatch in object oriented programs
provides additional expressibility, readability and
elegance over single dispatch languages. Optimizing
multi-method dispatch is a central issue in compilers
that support multi-methods. Existing constant time
dispatch techniques for multi-methods keep either a
lookup table or a lookup tree after compressing the
same, the size of which can still be large if
compression is not effective. In this paper, we propose
a space efficient non-constant time technique (each
method address should be computed --- rather than being
looked up) for multi-method dispatch with single
inheritance type hierarchies. The method table
containing all the multi-method signatures is the only
data structure kept at run time. The table is arranged
by sorting on argument position to expedite method
search during dispatch. Heuristics is used during
method search such that those methods which are not
potential candidates are not included in the search.
The proposed technique saves space significantly while
the dispatch time grew higher compared to existing
techniques. When multi-method counts were within
practical bounds, the proposed technique was found to
offer dispatch time similar to existing techniques.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Majumdar:2012:ICF,
author = "Dipankar Majumdar and Swapan Bhattacharya",
title = "Interoperability of constrained finite state
automata",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "1--8",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108155",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Finite State Automata have been extended in a number
of ways with varied additional constraints with an
objective of modeling varied real life problems. The
current paper commonly refers to such extensions as
constrained automata. It aims at defining a generic
mathematical model for the constrained automata
targeted towards interoperability and possible
integration amongst them. The paper proposes and
demonstrates usage of hyper complex symbols that
realizes the objective.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gaur:2012:AIM,
author = "Vibha Gaur and Anuja Soni",
title = "Analytical inference model for prediction and
customization of inter-agent dependency requirements",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "1--11",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108152",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Inter-agent communication is one of the main concerns
of Agent Oriented Requirements Engineering (AORE). The
concern is delineated as managing inter-dependencies
and interaction among various agents performing
collaborative activities. To carry out cooperative
activities, the application areas viz. electronic
commerce and enterprise resource planning in the
distributed environment require an agent to predict and
customize dependency needs termed as Degree of
Dependency (DoD) so that the goal may be obtained
within resource constraints and with optimal number of
agents. To quantify and predict exertion load of an
agent within resource constraints, this paper proposes
an Analytical Inference Model (AIM) that would
facilitate the developer to evaluate and envisage DoD
and hence analyze the optimum number of agents to
obtain predicted DoD. In this work, Adaptive Neuro
Fuzzy Inference System (ANFIS) combining the potential
benefits of Artificial Neural Network (ANN) and Fuzzy
Logic (FL) is employed to discover the linear
relationship in input domain attributes and DoD. The
resultant optimization of exertion loads would
immensely improve the quality of the Multi-Agent
System. The hybrid, as well as back propagation
learning algorithm, is employed to adapt from training
data. The bestfitness of proposed model against test
data is examined by the performance
indicators-Coefficient of Correlation (CORR) and the
Normalized Root Mean Square Error (NRMSE). It is
observed that hybrid learning algorithm outperforms the
back propagation algorithm.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{M:2012:ESG,
author = "Krishna Raj P. M. and Srinivasa K. G.",
title = "Empirical studies of global volunteer collaboration in
the development of free and open source software:
analysis of six top ranked projects in {\tt
sourceforge.net}",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "1--11",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108156",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Sourceforge.net is the largest portal hosting Free and
Open Source Software (FOSS). Among the projects
available in sourceforge.net, six top ranked projects
are selected for studying global volunteer
collaboration patterns over a period of 6 years
(2005--2011). It is found that a small set of
volunteers do most of the work in these projects. The
growth rate of volunteers, identification of core
developers, join and drop rate of volunteers, task
allocation and rate of task completion, movement of
existing volunteers among different projects and the
rate of new volunteer inclusion are also studied.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2012:ERM,
author = "Satwinder Singh and K. S. Kahlon",
title = "Effectiveness of refactoring metrics model to identify
smelly and error prone classes in open source
software",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "1--11",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108157",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In order to improve software maintainability, possible
improvement efforts must be made measurable. One such
effort is refactoring the code which makes the code
easier to read, understand and maintain. It is done by
identifying the bad smell area in the code. This paper
presents the results of an empirical study to develop a
metrics model to identify the smelly classes. In
addition, this metrics model is validated by
identifying the smelly and error prone classes. The
role of two new metrics (encapsulation and information
hiding) is also investigated for identifying smelly and
faulty classes in software code. This paper first
presents a binary statistical analysis of the
relationship between metrics and bad smells, the
results of which show a significant relationship. Then,
the metrics model (with significant metrics shortlisted
from the binary analysis) for bad smell categorization
(divided into five categories) is developed. To develop
the model, three releases of the open source Mozila
Firefox system are examined and the model is validated
on one version of Mozila Sea Monkey, which has a strong
industrial usage. The results show that metrics can
predict smelly and faulty classes with high accuracy,
but in the case of the categorized model, not all
categories of bad smells can adequately be identified.
Further, few categorised models can predict the faulty
classes. Based on these results, we recommend more
training for our model.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2012:PSE,
author = "Larry Bernstein",
title = "Pithy software engineering quotes",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "6--7",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108160",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2012:SLA,
author = "Robert Schaefer",
title = "The secret life of academic papers",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "7--8",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108161",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2012:SEEb,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software Engineering Education {(SEEd)}",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "8--10",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108162",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2012:SNSb,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "11--20",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108163",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2012:RPb,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "21--29",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108164",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tekinerdogan:2012:RTA,
author = "Bedir Tekinerdogan",
title = "Reflection on {Turkish} aspect-oriented software
development workshop series",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "30--33",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108165",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In the last decade aspect-oriented software
development (AOSD) has gained a broad interest in both
academic institutions and industry. Likewise, several
international conferences and workshops have been
organized around the topic of AOSD. This paper
summarizes the results of the national Turkish
Aspect-Oriented Software Development Workshop series
that have been organized in the last decade with the
goal to stimulate the research and education on AOSD in
Turkey. The fifth workshop was organized in December
2011. Aspects identified and demonstrated during the
workshops have been collected in the so-called Aspect
Browser. We report both on the experiences from the
workshop series and the resulting aspect browser.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2012:BRSa,
author = "William {Del Ra III}",
title = "Book Review: {{\booktitle{Software systems
architecture}}, second edition, by Nick Rozanski and
Eoin Woods}",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "36--36",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108171",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Eisenberg:2012:MSD,
author = "Robert Eisenberg",
title = "Managing software debt building for inevitable change
by Chris Sterling",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "36--37",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108172",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ngo:2012:BRE,
author = "Terry Ngo",
title = "Book Review: {{\booktitle{Essential app engine:
building high-performance Java apps with Google app
engine}} by Adriaan de Jonge}",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "37--37",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108173",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2012:BRW,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Work item management with
IBM rational ClearQuest and Jazz: a customization
guide}} by Shmuel Bashan and David E. Bellagio}",
journal = j-SIGSOFT,
volume = "37",
number = "2",
pages = "37--38",
month = mar,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2108144.2108174",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:11 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rosenblum:2012:LCa,
author = "David S. Rosenblum",
title = "Letter from the Chair",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2180921.2370934",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Reddy:2012:DWU,
author = "K. Sudheer Reddy and G. Partha Saradhi Varma and M.
Kantha Reddy",
title = "Discovering web usage patterns by using an innovative
practical approach",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--4",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180939",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Pattern mining is one of the most pivotal steps in the
data mining is pattern mining and it immediately comes
after the preprocessing phase of WUM. Pattern discovery
deals with the sorted set of data items are presented
as part of the sequence. Using this pattern mining,
users can recognize the web paths that users commonly
follow on a web site easily. This research discovers
the most relevant and interesting behavioral patterns
by using a Web usage mining process. The server web
logs aids as an input to this process. We aim to
identify behavioral patterns of the users who typically
visit the web sites occasionally. We have employed a
method for clustering, based on pattern summaries. We
have conducted intense experiments and the results are
shown in this paper",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tiwari:2012:MCA,
author = "Manisha Tiwari and Padmaja Joshi",
title = "Method cohesion analysis through concept lattices",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--4",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180924",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Cohesion in object oriented technology is usually
associated with a class and hence majority of the
available cohesion metrics capture cohesion of classes.
Methods which are the main contributors to class
cohesion are not analyzed for their internal
cohesiveness. This concept paper proposes method
cohesion analysis through concept lattices. The
approach facilitates rapid identification of elements
(statements or variables) in methods that are less
cohesive with respect to the remaining part of the
method. The paper discusses the analysis and
interpretation of cohesion lattices. The approach is
demonstrated through dummy examples",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Arora:2012:SUM,
author = "Deepak Arora and Bramah Hazela and Vipin Saxena",
title = "Semantics for {UML} model transformation and
generation of regular grammar",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--5",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180931",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Graphs are one of the most popular non linear data
structures used to represent various data objects.
These graphical structures can further be classified
into directed and undirected graph representations. For
modeling purpose, UML has adopted the phenomenon of
directed graphical structures as statechart diagrams,
to exhibit dynamic specification of any software or non
software system. These diagrams are important as they
are used to represent all possible values that an
object can retain throughout its life cycle. Three key
components are required to change the state of any
object namely transition function, action and possible
inputs. Statechart diagrams are also useful to
determine all possible paths that an object will
undergo during its entire life span, while changing its
state. Further these paths can be represented with the
help of various established graphical modeling
techniques like Finite State Automata. The mapping and
further analysis of these path structures can be very
helpful in determining the correctness of the diagram
as well as to highlight the possible deficiencies in
the diagram. In the present work, authors have proposed
semantics for automatic transformation of UML
statechart diagram into its equivalent finite state
automata, by taking the advantage of both of the
models. Authors have also presented an approach to
generate regular grammar for the generated finite state
automata. This equivalent grammar can further be useful
to generate various test cases, to test UML statechart
diagram, against various test conditions. To better
illustrate, authors have also presented a case study of
an ATM machine and demonstrated that how this approach
is helpful to verify the correctness of design",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Counsell:2012:IAR,
author = "Steve Counsell and Stephen Swift",
title = "Issues arising from refactoring studies: an experience
report",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--5",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180922",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In theory, refactoring should reverse the trend in
code decay and many studies have explored the different
facets of refactoring (both its trends and
characteristics). While much progress has been made in
this area, a number of observations about refactoring
studies have become evident to us over the past seven
years in the time during which we have been undertaking
empirical studies in this area. This paper outlines our
experiences of the issues that arise with refactoring
studies. We outline six of those issues, together
forming the set of challenges that are still prevalent
in this area. The purpose of the paper is thus to put
under the spotlight the real potential benefits of
refactoring, but more importantly the challenges that
our experiences have raised",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gulia:2012:NAG,
author = "Preeti Gulia and R. S. Chillar",
title = "A new approach to generate and optimize test cases for
{UML} state diagram using genetic algorithm",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--5",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180933",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software testing is an important part of the software
development process. The testing effort is divided into
three parts: test case generation, test execution and
test evaluation. Test case generation is the center of
testing process and automating. It saves time and
efforts and reduces the number of errors and faults. To
decrease the elevated cost of software testing and to
increase the reliability of the testing processes, a
new method has been created to automate the testing
process. This paper proposes a new approach to generate
and optimize test cases from UML State Chart diagram
using Genetic Algorithm. To generate the new test
sequence the method of crossover has been applied from
the Genetic Algorithm and the efficiency of the test
sequences is evaluated by Mutation Analysis",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nierstrasz:2012:ASA,
author = "Oscar Nierstrasz",
title = "Agile software assessment with Moose",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--5",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2180921.2180925",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "During software maintenance, much time is spent
reading and assessing existing code. Unfortunately most
of the tools available for exploring and assessing
code, such as browsers, debuggers and profilers, focus
on development tasks, and offer little to support
program understanding. We present a platform for
software and data analysis, called Moose, which enables
the rapid development of custom tools for software
assessment. We demonstrate how Moose supports agile
software assessment through a series of demos, we
illustrate some of the custom tools that have been
developed, and we draw various lessons learned for
future work in this domain",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Reddy:2012:PWS,
author = "K. Sudheer Reddy and G. Partha Saradhi Varma and I.
Ramesh Babu",
title = "Preprocessing the web server logs: an illustrative
approach for effective usage mining",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--5",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180940",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Data preprocessing is an important activity for
discovering behavioral patterns. The analysis of web
logs is an essential task for System Administrators to
safeguard adequate bandwidth and to maintain server
capacity on their business websites. A web Log file
represents user activities occurring over a period of
time. Web log files offer valuable insight into the
effective usage of the web site. It helps maintain an
account of the actual usage in a regular working system
as compared to the virtual setting of a usability lab.
This research paper focuses on the preprocessing
techniques implemented on a specially designed Web Sift
(WebIS) tool on an IIS web server and also proposes
some efficient heuristics and techniques",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2012:PSA,
author = "Surender Kumar and Rajeev Kumar",
title = "Precise static analysis for generic programs in object
oriented languages",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--6",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180937",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Genericity enriched with multiple data types and
classes is becoming a common feature of object oriented
languages. Therefore, static analysis of such generic
programs is gaining importance. Unfortunately such work
does not exist. In this work, we statically analyse
such generic programs for approximating the possible
dynamic (run-time) types of objects. We propose a
single pass technique for analyzing the generic
programs inter-procedurally statement-wise following
the control flow of the execution. The technique is
able to resolve the covariance, contravariance and
invariance relationship existing amongst different
instances with type parameters as arguments to a class.
We assess the performance of the proposed technique by
carrying out experiments on a set of standard benchmark
programs",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Benala:2012:CIS,
author = "Tirimula Rao Benala and Satchidananda Dehuri and Rajib
Mall",
title = "Computational intelligence in software cost
estimation: an emerging paradigm",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--7",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180932",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "One of the key features for the failure of project
estimation techniques is the selection of inappropriate
estimation models. Further, noisy data poses a
challenge to build accurate estimation models.
Therefore, the software cost estimation (SCE) is a
challenging problem that has attracted many researchers
over the past few decades. In the recent times,the use
of computational intelligence methodologies for
software cost estimation have gained prominence. This
paper reviews some of the commonly used computational
intelligence (CI) techniques and analyzes their
application in software cost estimation and outlines
the emerging trends in this area",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jiang:2012:TDG,
author = "Shujuan Jiang and Yanmei Zhang and Dandan Yi",
title = "Test data generation approach for basis path
coverage",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--7",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180936",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "On the basis of determining the feasibility of paths,
this paper proposes an evolutionary approach to
generating test data for feasible basis path coverage.
First, the structure of the program under test is
expressed by a control flow graph, and the target paths
are encoded into the form of hybrid-coding that
efficiently combines the statement label with the
outcome of a conditional statement (i.e. T or F). Then,
the genetic algorithm is employed to generate test data
for multiple paths coverage, and the fitness function
of an input data (an individual) takes into account the
degree of the execution track matching the target
paths. Finally, the proposed approach is applied in
several benchmark programs. The experimental results
show that the proposed approach cannot only avoid
redundant test but also improve the efficiency of test
data generation effectively",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ripon:2012:UTM,
author = "Shamim H. Ripon",
title = "A unified tabular method for modeling variants of
software product line",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--7",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180941",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Reuse of software is a promising approach to improving
the efficiency of software development regarding time,
cost and quality. Reuse requires a systematic approach.
The best results are achieved if we focus on systems in
a specific domain, so-called product line. The key
difference between the conventional software
engineering and software product line engineering is
variant management. The main idea of software product
line is to identify the common core functionality which
can be implemented once and reused afterwards for all
members of the product line. To facilitate this reuse
opportunity the domain engineering phase makes the
domain model comprising the common as well as variant
requirements. In principle, common requirements among
systems in a family are easy to handle. However,
problem arises during handling variants. Different
variants have dependencies on each other; a single
variant can affect several variants of the domain
model. These problems become complex when the volume of
information grows in a domain and there are a lot of
variants with several interdependencies. Hence, a
separate model is required for handling the variants.
This paper presents a mechanism, which we call, Unified
Tabular Method to facilitate the management of variant
dependencies in product lines. The tabular method
consists of a variant part to model the variants and
their dependencies, and a decision table to depict the
customization decision regarding each variant while
deriving customized products. Tabular method alleviates
the problem of possible explosion of variant
combinations and facilitates the tracing of variant
information in the domain model",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Anwikar:2012:DDT,
author = "Vallabh Anwikar and Ravindra Naik and Adnan Contractor
and Hemanth Makkapati",
title = "Domain-driven technique for functionality
identification in source code",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--8",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180923",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "While migrating existing software systems to Software
Product Lines, finding out the functionalities in the
software is critical. For maintenance activities like
deleting or changing existing features, or adding new
similar features, identifying and extracting
functionalities from the software is significant. This
paper describes a technique for creating mapping
between the source code and functionalities implemented
by it while exploiting the domain knowledge. The
technique is based on the notion of function variables
that are used by developers for expressing
functionality in the source code. By tracking the known
values of the function variables and evaluating the
conditions that use them, the mapping is identified.
Our technique makes use of static data flow analysis
and partial evaluation, and is designed with automation
perspective. After applying to few samples representing
real-life code structure and programming practices, the
technique identified precise mapping of the detailed
program elements to functions",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jeet:2012:CSB,
author = "Kawal Jeet and Renu Dhir and Harsh Verma",
title = "A comparative study of {Bayesian} and fuzzy approach
to assess and predict maintainability of the software
using activity-based quality model",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--9",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180935",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Quality is considered as one of the most important
aspects responsible for the success of the software.
The developers as well as the end users of the software
have accepted maintainability as a significant
characteristic due to its economic implications.
Several subjective techniques have been developed in
research to assess and predict maintainability but all
have been unsuccessful to do it practically and most of
them even fail to define it appropriately. The
activity-based quality model is one of the techniques
that have been found to be successful in defining
maintainability. This model assesses maintainability in
terms of average efforts required to maintain software
but lacks quantitative aspect that has been further
added by using Bayesian Network. In this paper, a
comparison of the Bayesian approach and Fuzzy approach
to deal with this model quantitatively has been done
wherein; Fuzzy approach has been found to be better
than Bayesian",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Priyanka:2012:EEC,
author = "Priyanka and Inderveer Chana and Ajay Rana",
title = "Empirical evaluation of cloud-based testing
techniques: a systematic review",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--9",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180938",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software Testing is a challenging activity for many
software engineering projects, especially for large
scale systems. The amount of tests cases can range from
a few hundred to several thousands, requiring
significant computing resources and lengthy execution
times. Cloud computing offers the potential to address
both of these issues: it offers resources such as
virtualized hardware, effectively unlimited storage,
and software services that can aid in reducing the
execution time of large test suites in a cost-effective
manner. In this paper we report on a systematic review
of cloud based testing techniques published in major
software engineering journals and conferences conducted
by other researchers. Research papers were gathered
from various scholarly databases using provided search
engines within a given period of time. A total of 82
research papers are analyzed in this systematic review
and we classified it into four categories according to
issues addressed by them. We identified majority of the
research papers focused on Cloud based Testing and
Issues (38 papers) and 23 papers focused on Cloud based
Testing Frameworks. By looking at the areas focused by
existing researchers, gaps and untouched areas of cloud
based testing can be discovered",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gupta:2012:MCS,
author = "Daya Gupta and Rinky Dwivedi",
title = "Method configuration from situational method
engineering",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "1--11",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180934",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper presents a brief on evolution and
subsequent developments in the field of Situation
Method Engineering (SME) through exhaustive literature
review. The efforts of the various method engineers are
gathered, summarized and presented to show the overall
growth of this vital discipline. This research paper
starts with the assembly-based approaches and moves
towards method generation. The paper further analyzes
the proposals presented on the architecture of SME
processes followed by the OPEN Process Framework (OPF).
OPF depend on the four major components-Object-oriented
Process, Environment and Notation (OPEN). We evaluate
these proposals for various issues leading to method
configuration. The survey concludes with the proposals
on configurability of methods and current unresolved
issues that need to be addressed in one single approach
to configure a situation-specific coherent method",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wing:2012:TY,
author = "Mike Wing",
title = "Thank You",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "7--8",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2180921.2180926",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2012:SEEc,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "8--9",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2180921.2180927",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2012:SNSc,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "10--17",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2180921.2180928",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2012:RPc,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "18--25",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2180921.2180929",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Shukla:2012:RSE,
author = "Rakesh Shukla and Ashish Sureka and Rushikesh Joshi
and Rajib Mall",
title = "A report on {Software Engineering Education
Workshop}",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "26--31",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180930",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this report, we present a summary and a few
reflections of a one day workshop on Software
Engineering Education held on February 22, 2012 at
Indian Institute of Technology, Kanpur, India
collocated with the 5th India Software Engineering
Conference. We identify a gap and believe there is a
need for creating an annual discussion forum that
serves the need of having a regular workshop for
software engineering education in India and also
benefit the global software engineering education
community by sharing the workshop insights and results
by a publication process. The workshop consists of two
keynotes, one from academia and one from industry, two
subgroups discussions and presentations by the
subgroups on their discussions. Three systematic
techniques, invitation of position statements, set up
of a Google group and an online survey, were employed
before the workshop to estimate number of participants,
subgroups and size of each subgroup for effective
discussions. Twenty participants attended the workshop.
The keynotes were on Using Collaborative Learning and
Divergent Thinking to Teach Software Engineering and on
Software Engineering Competency Development Model.
Three topics were selected for subgroups discussions by
the participants: use of various methods, such as
learning while playing and project-based software
engineering, over Power Point lecture, requirements and
needs of undergraduate software engineering degree
program from the perspective of Indian software
industry and curriculum content, coverage, and impact
of software engineering courses. The workshop was a
successful endeavor and the response in terms of the
contributions by participants is a clear indicator and
confirmation of the need of having a focused discussion
forum for brainstorming on software engineering
education in India",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Froberg:2012:BRS,
author = "Scott Froberg",
title = "Book Review: {{\booktitle{Software Testing}} by Yogesh
Singh}",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "36--36",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180942",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2012:BRF,
author = "Robert Schaefer",
title = "Book Review: {{\booktitle{Fundamentals of multicore
software development}} by Victor Pankratius, Ali-Reza
Adi-Tabatabai, Walter Tichy}",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "37--37",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180943",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Swamy:2012:BRSa,
author = "Harisankar Krishna Swamy",
title = "Book Review: {{\booktitle{Space based technologies and
commercialized development: economic implications and
benefits}} by Stella Tkatchova}",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "37--38",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180944",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2012:BRA,
author = "William {Del Ra III}",
title = "Book Review: {{\booktitle{ACM Ruby learning path}} by
David A. Black}",
journal = j-SIGSOFT,
volume = "37",
number = "3",
pages = "38--38",
month = may,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/180921.2180945",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:12 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rosenblum:2012:LCb,
author = "David S. Rosenblum",
title = "Letter from Chair",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2370933",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Cheluvaraju:2012:QMP,
author = "Bharath Cheluvaraju and Anjaneyulu Pasala and Srinivas
Padmanabhuni and Sadhana Chevireddy",
title = "A quantitative measure for preventive maintenance in
software",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--5",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237801",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Several techniques have been developed to identify and
fix defects in software before its deployment. However,
the challenge is to quantify how well these techniques
prevent defects from occurring in the field from a
holistic perspective. Therefore, we propose a novel
software quality metric called ``The Preventability
Metric'' that measures the preventability of defects in
software. The metric is derived from a composite
quantitative evaluation of the efficiency and
effectiveness of the individual preventive techniques
employed on software before its deployment. It provides
a confidence on how well prevention of defects is
handled before deployment.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jeet:2012:BNB,
author = "Kawal Jeet and Yadvirender Rana and Ruichi Xin",
title = "A {Bayesian} network based approach for software
reusability prediction",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--5",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237804",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Various factors having impact on reusability have been
found in research and practice. However, their true
interdependencies were never taken into consideration.
Using the approach discussed in this paper, various
factors and their dependencies can be depicted and the
true probability of success of reusability could be
easily found. Factors which are not found to have any
influence on reusability are also identified. Non
consideration of these factors decreases the burden of
evaluation and confines the study and evaluation to
only important factors for the study under
consideration.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2012:AYL,
author = "Ajay Jain and Chandan Singh",
title = "``{Ad} you like it'': advertisement sourcing and
selection technique across multiple heterogeneous
applications",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--6",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237802",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Sourcing and selection of online advertisement is done
with the objective of streaming advertisements that
match user's interests and internet surfing habits.
Choosing relevant advertisements that bring user's
focus and attention have higher click rate. Innovative
concepts, such as crawling recently surfed web pages
(or websites), user's (or web portal server)
geographical location, user's profile, age, gender, and
surfing habits., have been used to identify most
relevant advertisements. However, selecting and
streaming an advertisement that exactly matches user's
interest continues to be a challe. This paper proposes
and shares an innovative technique that significantly
helps in mapping user's interest quotient to streamed
advertisements. This technique respects the
individuality of a user and is able to differentiate
between users. The proposed solution is implemented by
enabling communication channels across multiple
heterogeneous user-initiated applications. Applications
that do not directly communicate with advertisement
data sources, leverage other application running on the
same user's account and submit their own metadata to
the applications attached to advertisement data
sources. The proposed paper helps in substituting
publisher's assumptions of a user's interest with
real-time user's objects of interest.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Andre:2012:FNC,
author = "{\'E}tienne Andr{\'e} and Christine Choppy and Kais
Klai",
title = "Formalizing non-concurrent {UML} state machines using
colored {Petri} nets",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237819",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "UML state machines are an interesting graphical
language to express dynamic systems behavior. However,
using the different features available (hierarchy,
internal/external transitions, entry/exit/do
activities, history pseudostates, etc.) may yield quite
complex behaviors that are difficult to inspect and
check visually. We introduce an algorithm to
automatically generate a colored Petri net model
associated with a state machine description, so as to
provide a formal specification. In this proposal,
although we do not consider concurrent aspects (such as
fork and join), we take into account all the above
mentioned features in a thorough and integrated way.
This is illustrated on some examples.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Baresi:2012:LBS,
author = "Luciano Baresi and Angelo Morzenti and Alfredo Motta
and Matteo Rossi",
title = "A logic-based semantics for the verification of
multi-diagram {UML} models",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237811",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "UML is a well-known and widely used design notation:
it offers a rich set of modeling elements, but their
behavior is often not properly defined. Many proposals
have tried to provide UML with a formal semantics, but
they often focus on a limited number of diagram types,
and thus do not provide a viable solution for the
actual verification of complex UML models. This paper
addresses a significant and consistent set of UML
diagrams, called MADES UML, and uses a metric temporal
logic to ascribe a formal semantics to them. It also
introduces a prototype verification tool based on a
bounded model / satisfiability checker. The
verification of a car collision avoidance system gave
encouraging results.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Blech:2012:TFF,
author = "Jan Olaf Blech and Bernhard Sch{\"a}tz",
title = "Towards a formal foundation of behavioral types for
{UML} state-machines",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237814",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Behavioral types for model-based development comprise
abstract behavioral aspects of the models they are
associated with. Behavioral types allow checking that a
model fulfills these behavioral aspects. Furthermore,
as types can be related with each other, they support
more complex checks and guarantees like compatibility
in composition and refinement of models in a model
based development process. We propose a behavioral type
system and explain its properties, specifically
targeting a subset of UML state-machines. We present an
early implementation that generates behavioral type
definitions out of an Eclipse-based modeling
environment. These type definitions are generated for
the higher-order proof assistant Coq as files. We
present checking and comparison techniques based on
these files for behavioral aspects that can be derived
from the model definition.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bowles:2012:SCT,
author = "Juliana Bowles and Dulani Meedeniya",
title = "Strongly consistent transformation of partial
scenarios",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237809",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We present a formal approach for partial
transformation of scenario-based specifications.
Scenarios are captured as sequence diagrams (SDs) and
(partially) transformed into coloured Petri nets
(CPNs). Partial transformation is of interest for local
analysis, or within an incremental development approach
where interaction specifications are built
incrementally and combined with previous iteration
models. In previous work we defined a strongly
consistent transformation from SDs to CPNs. In this
paper, we extend the approach for partial
transformation whilst preserving the strongly
consistent nature of the transformation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Brosch:2012:FEM,
author = "Petra Brosch and Sebastian Gabmeyer and Gerti Kappel
and Martina Seidl",
title = "On formalizing {EMF} modeling operations with graph
transformations",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237810",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The development of software in accordance with the
model-driven engineering paradigm places model
transformations at a central position. Desirable yet
contradicting properties of model transformations are
user-friendliness as offered by-demonstration
approaches and formal conciseness as provided by
algebraic graph transformations which is indispensable
for verification tasks. In this paper, we show how to
unite the properties of the two different approaches.
We employ the state-of-the-art by-demonstration
environment Emo to prototype graph transformations by
embedding the operations obtained from Emo in the
formal framework of graph transformation theory.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Carrillo:2012:FVC,
author = "Oscar Carrillo and Samir Chouali and Hassan
Mountassir",
title = "Formalizing and verifying compatibility and
consistency of {SysML} blocks",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237813",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The objective of this paper is to define an approach
to formalize and verify the SysML blocks in a
refinement process. We propose to specify system
architecture with SysML Block Definition Diagram, this
diagram is then analyzed and decomposed into several
sub-blocks in order to verify their compatibility. The
structural architecture of an abstract block is given
by the Internal Block Diagram (IBD) which defines the
communication links between sub-blocks. The
compatibility verification between sub-blocks is only
made on linked sub-blocks. The behaviour of each
sub-block is described by an interface automaton which
species the invocations exchanged with its environment.
The verification between blocks is translated into
consistency verification between the blocks and
compatibility verification between their interface
automata. Incompatibilities can be inconsistent at
architecture level and at communication level if there
are deadlocks during the interaction between
sub-blocks. Once the verification is established
between the sub-blocks, the abstract block can be then
substituted by the sub-blocks which compose it.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ge:2012:TPD,
author = "Ning Ge and Marc Pantel and Xavier Cr{\'e}gut",
title = "Time properties dedicated transformation from
{UML}-{MARTE} activity to time transition system",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237807",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Critical Real-Time Systems (RTS) have strong
requirements concerning system's reliability. UML and
its profile MARTE are standardized modeling languages
widely accepted by industrial designers to cope with
the development of complex RTS. Relying on Model-Driven
Engineering (MDE), time properties verification of
UML-MARTE specifications at early phases of the system
lifecycle becomes possible. A key issue is to eliminate
the gap between UML semi-formal semantics and fully
formal executable semantics using model transformation.
The model transformation must guarantee the consistency
between high-level user models and lower-level
verification models. Meanwhile, it should guarantee
that the subsequent verification is not too expensive
and can be applied to real size industrial models. This
paper presents an approach to translate UML-MARTE
Activity Diagrams into Time Transition System (TTS)
with the aim of efficiently verifying time properties
in RTS. TTS is a generalization of Time Petri Nets
(TPN) with the priority and data handling at the
transition level, supported by TINA model checker. This
contribution focuses on how to define the TTS formal
semantics to avoid the core problem of state space
explosion in model checking. This work has been
integrated in a time properties verification framework
for UML-MARTE RTS specifications. The proposed method
is evaluated using a representative case study.
Experimental results are given to demonstrate the
method's performance.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Janus:2012:TCA,
author = "Andr{\'e} Janus",
title = "Towards a common agile software development model
{(ASDM)}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237803",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper we use a formal approach to describe
Agile Software Development Methodologies. We extract
common attributes and properties out of Agile
Methodologies to establish a common Agile Software
Development Model (ASDM). To build our model we take a
look at the Agile Manifesto as well as eXtreme
Programing (XP) and Scrum, and also a project-specific
Agile Methodology called I2. We describe the Agile
Software Development Methodologies in terms of Sets,
Relations and Equations to make similarities and
differences visible. With this formal characterization
we can compare the Methodologies to each other and
extract the common attributes and properties as parts
of the common Agile Software Development Model (ASDM).
After establishing our model we assess the explanatory
power and aspects of completeness of the model to
identify weakness and improvement potential. The
explanatory power means the ability to characterize a
Methodology and compare different Methodologies to each
other. Completeness issues are related to the model
itself, to the model's instantiations (e. g. describing
XP with the ASDM) and the completeness of (relevant)
Practices. Using this approach we try to achieve better
theoretical understanding and comparability for Agile
Methodologies.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Li:2012:MQG,
author = "Dan Li and Xiaoshan Li and Volker Stolz",
title = "Model querying with graphical notation of {QVT}
relations",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237808",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As a standard high-level model transformation
language, QVT Relations defines a graphical notation,
which provides a concise, intuitive way to specify
transformations. However, QVT Relations relies only on
the textual language OCL for model querying, leading to
verbose and complicated OCL expressions. Here, we
present a graphical model query facility based on the
checking semantics and pattern matching of QVT
Relations. The query facility also borrows from QVT
Relations the graphical notation. In addition we
propose an approach to map the queries into XSLT to
facilitate their execution. We have developed a tool
for designing the queries and automatically generating
the XSLT programs.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Milhau:2012:RPA,
author = "J{\'e}r{\'e}my Milhau and Fr{\'e}d{\'e}ric Gervais and
R{\'e}gine Laleau and Marc Frappier",
title = "Refinement patterns for {ASTD}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237818",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "astd is a formal and graphical language specifically
defined for information system specification. Up to
now, a specifier had to build an astd specification
from scratch and there were no refinement techniques
for stepwise construction. This paper aims at
introducing refinement patterns for astd, which are
inspired from real case studies. For each pattern,
proof obligations have been identified to define the
refinement semantics we want to provide. The three
refinement patterns presented in the paper are
illustrated by an example of a basic complaint
management system.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Yamagata:2012:FSE,
author = "Yoriyuki Yamagata and Weiqiang Kong and Akira Fukuda
and Van Tang Nguyen and Hitoshi Ohsaki and Kenji
Taguchi",
title = "Formal semantics of extended hierarchical state
transition matrix by {CSP}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237815",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Extended Hierarchical State Transition Matrix
(EHSTM) is a table-based modeling language frequently
used in industry for specifying behaviors of a system.
However, assuring correctness, i.e., having a design
satisfy certain desired properties, is a non-trivial
task. To address this problem, a model checker
dedicated to EHSTMs called Garakabu2 is developed.
However, there is no formal justification of Garakabu2,
since its semantics has never been fully formalized. In
this paper, we give a formal semantics to EHSTM by
translating it into CSP, Communicating Sequential
Processes. Our semantics covers most of the features
supported by Garakabu2. We manually translate the small
examples of EHSTM to CSP, and verify them by PAT, a CSP
based model checker. We also verify the examples
directly using Garakabu2 and show the result are same.
The experiments also show that verification using our
translation and PAT is much faster than that of
Garakabu2 for checking message type EHSTM.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Yatake:2012:SBE,
author = "Kenro Yatake and Toshiaki Aoki",
title = "{SMT-based} enumeration of object graphs from {UML}
class diagrams",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237812",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper presents an encoding of the UML class
diagram with OCL invariants in an SMT solver for
enumerating all the object graphs from the class
diagram. Enumeration of all the object graphs was
necessary for our verification of operating systems by
model checking, i.e., exhaustively enumerate all the
structural variations of the environments to be checked
against an operating system. We present our encoding in
the SMT solver Yices with the technique of optimization
and isomorphism elimination.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kukreja:2012:AMT,
author = "Deepika Kukreja and Umang Singh and B. V. R. Reddy",
title = "Analytical models for trust based routing protocols in
wireless ad hoc networks",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--16",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237805",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In Wireless Ad Hoc Network environment, there are
three ways to understand a routing protocol: (i)
monitoring, (ii) simulation and (iii) modeling. In this
paper, the different trust based secure routing
protocols used in wireless ad hoc networks are
analyzed, modeled and described by incorporating
process flow diagrams. These process flow diagrams
represent stepwise work flow activities and actions. It
shows the overall flow of control of a process, program
or a protocol. This paper focuses on the security
aspects of routing by incorporating trust parameter
into account and also highlights methodology used in
secure routing protocols. Such protocols have been
categorized based on the model used for enforcing
security, methodology and information for making
effective routing decisions. In this paper, we model,
discuss and analyze trust based secure ad hoc routing
schemes which do not require each network node to work
in promiscuous mode. We propose and design a new
protocol --- Trust based Routing using Dominating Set
Approach (TRDSA) which overcomes the shortcomings of
existing protocols.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2012:DRS,
author = "Neeraj Kumar Sharma and Vibha Gaur and S. K. Muttoo",
title = "A dynamic reputation system with built-in attack
resilience to safeguard buyers in e-market",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "1--19",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237806",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Reputation systems aim to reduce the risk of loss due
to untrustworthy participants by providing a mechanism
for establishing trustworthiness between mutually
unknown online entities in an information asymmetric
e-market. These systems encourage honest behavior and
discourage malicious behavior of buyer and seller
agents by laying a foundation for security and
stability in the e-market. However, the success of a
reputation system depends on its built-in resilience
capabilities to foil various attacks. This paper
focuses on how to safeguard buyers from dishonest
sellers and advisors by incorporating an attack
resilient reputation computation methodology. The
objectives of the proposed dynamic reputation system in
the distributed environment are to reduce the incentive
for behaving dishonestly, and to minimize harm in case
of attacks by dishonest participants with the inherent
purpose of improving the quality of services in the
e-market.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Notkin:2012:TN,
author = "David Notkin",
title = "{TOSEM} news",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "7--8",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237826",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2012:SED,
author = "Larry Bernstein",
title = "Software engineering design principles for
ultra-large-scale systems",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "8--9",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237797",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2012:HSJ,
author = "Robert Schaefer",
title = "On having a second job as an adjunct",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "9--10",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237798",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2012:SNSd,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "11--19",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237799",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2012:RPd,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "20--29",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237800",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Herrmann:2012:IWC,
author = "Andrea Herrmann and Maya Daneva and Joerg Doerr and
Kurt Schneider",
title = "{2nd International Workshop on Creativity in
Requirements Engineering: CreaRE 2012}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "30--31",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237816",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Requirements Engineering (RE) is a socially
constructed activity and as such it includes the
creation, development, assessment and communication of
innovative ideas. An idea can take the form of a
thought related either to the analysis of a problem, or
to the search of a solution to this problem, and it can
be concrete or abstract. Creative thinking is what RE
professionals tacitly or explicitly use in their RE
processes to conceptualize smart solutions to problems.
RE demands the stakeholders to create visions of a
future software system and to imagine all its
implications. Creativity techniques that have been
practiced in other fields can support this creative
part of RE. The CreaE series of workshops brings
together RE practitioners and researches who are
interested in discussing the role of creativity in RE
and the ways in which creativity techniques from other
disciplines can be leveraged in RE. CreaRE 2010 aimed
at creating awareness of the importance of research on
creativity in RE and initiated the conversation on
experiences of applying creativity techniques in
support of RE activities. CreaRE 2012 builds upon this
foundation and extends the discussion on creativity in
RE by actively fostering the exchange of ideas among
members of diverse communities that are engaged in RE
research and practice. CreaRE 2012 united an audience
reaching out to areas such as design, theatre
improvisation, stakeholder interactions, studies on
cultural heritage and multimedia systems. This report
describes the results of the workshop.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gibson:2012:IUF,
author = "J. Paul Gibson and Isabelle Perseil",
title = "Introduction to {UML} and Formal Methods",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "32--33",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237825",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "It is with great pleasure that we introduce the 5th
IEEE International Workshop on UML and Formal Methods.
Already, in its short 5 year history, the workshop has
been located across the globe: Japan, Brazil, China,
Ireland, and --- this year --- in Paris, France. For
its first 3 years it was co-located with the
International Conference on Formal Engineering Methods,
whilst in the last 2 years it has been part of the
International Symposium on Formal Methods. The workshop
has a strong tradition of publishing the highest
quality accepted papers in either: the NASA journal of
``Innovations in Systems and Software Engineering'', or
the ACM journal ``Software Engineering Notes'' (to whom
we have returned this year). The main objective of the
workshop has not changed during its lifetime, namely:
the building of bridges between informal, semi-formal
and formal notations. This objective can be seen in
each of the 4 main themes that make up the four
sessions of this year{\^A}'s workshop: I. UML diagram
formalization, II. Dynamic and real-time modeling, III.
Transformations, and IV. Patterns and blocks. Across
all sessions a wide range of formalisms and tools are
presented --- Extended Hierarchical State Transition
Matrices and CSP, the SMT solver Yice, MADES UML and
metric temporal logic, UML-MARTE and Time Transition
Systems, Colored Petri Nets, Behavioural types and Coq,
QVT-R and XSLT, EMF Model-ing Operations, ASTD and
SysML --- illustrating the breadth and depth of the
research being done by our community. We hope that you
enjoy reading these papers as much as we have: the
bridges are being built and we invite you to cross
them.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Herzwurm:2012:RIW,
author = "Georg Herzwurm and Benedikt Krams and Wolfram Pietsch
and Sixten Schockert",
title = "Report from the {3rd International Workshop on
Requirements Prioritization for Customer Oriented
Software Development: (RePriCo'12)}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "32--33",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237817",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Prioritization is an essential task within
requirements engineering to cope with complexity and to
establish focus properly. The 3rd Workshop on
Requirements Prioritization for customer oriented
Software Development (RePriCo'12) focused on
requirements prioritization and adjacent themes in the
context of customer oriented development of bespoke and
standard software. Five submissions have been accepted
for the proceedings and for presentation. The report
summarizes and points out key findings.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Froberg:2012:BRP,
author = "Scott Froberg",
title = "Book Review: {{\booktitle{Programming perl}}, fourth
edition by Tom Christiansen, Brian D. Foy and Larry
Wall with Jon Orwant}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "40--40",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237822",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2012:BRSb,
author = "William {Del Ra III}",
title = "Book Review: {{\booktitle{Service design patterns:
fundamental design solutions for SOAP\slash WSDL and
RESTful web services}} by Robert Daigneau}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "40--40",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237821",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2012:BRT,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Theory of conditional
games}} by Wynn C. Stirling}",
journal = j-SIGSOFT,
volume = "37",
number = "4",
pages = "41--41",
month = jul,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2237796.2237823",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:14 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Solomon:2012:NML,
author = "A. D. Solomon",
title = "On a new masters level program in software
engineering",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--3",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347713",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In a 1998 note [1] I described a new study program
leading to the Bachelor's Degree in Software
Engineering. I now report on a new Master's level
program in Software Engineering evolving from the
Bachelor's Degree program, and beginning in the fall
semester of this year. I discuss some of the events of
our 14 year old Bachelor's program, and the structuring
of our Master's program.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dubey:2012:MPO,
author = "Sanjay Kumar Dubey and Ajay Rana and Yajnaseni Dash",
title = "Maintainability prediction of object-oriented software
system by multilayer perceptron model",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--4",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347703",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "To accomplish software quality, correct estimation of
maintainability is essential. However there is a
complex and non-linear relationship between
object-oriented metrics and maintainability. Thus
maintainability of object-oriented software can be
predicted by applying sophisticated modeling techniques
like artificial neural network. Multilayer Perceptron
neural network is chosen for the present study because
of its robustness and adaptability. This paper presents
the prediction of maintainability by using a Multilayer
Perceptron (MLP) model and compares the results of this
investigation with other models described earlier. It
is found that efficacy of MLP model is much better than
both Ward and GRNN network models.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Louridas:2012:NRR,
author = "Panos Louridas and Georgios Gousios",
title = "A note on rigour and replicability",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--4",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347706",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As any empirical science, Software Engineering
research should strive towards better research
practices. Replication is regrettably not a priority
for Software Engineering researchers and, moreover, not
afforded by many published studies. Here we report our
experience from our encounter with a recent paper in a
flagship Software Engineering conference. Our
experience shows that current publication requirements
do not guarantee replicability.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Patwa:2012:RME,
author = "Sanjeev Patwa and Anil Kumar Malviya",
title = "Reusability metrics and effect of reusability on
testing of object oriented systems",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--4",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347708",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software reuse has become very popular in software
development. There are several beneficial aspects of
object oriented systems including code reuse,
reusability and reusability of testing efforts.
Reusable software components are the building blocks
that can make a system able to respond quickly to
change. This paper presents the hypothesis that the
testing effort in object-oriented software can be
inherited and reused similar to that of the coding
effort. Therefore the testability and maintainability
of the object-oriented software can be improved by
adapting a reusability approach. In this paper some new
metrics namely Reusability of a Class in a System
(RCS), Average Degree of Reusability (AR), Specialize
class to Base class Reusable Metric (SBRM) have been
proposed.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Romanovsky:2012:DFM,
author = "Alexander Romanovsky",
title = "Deployment of formal methods in industry: the legacy
of the {FP7 ICT DEPLOY} integrated project",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--4",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347710",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The work of the major EU-funded ICT DEPLOY Integrated
Project (February 2008 --- April 2012) on Industrial
Deployment of Advanced\ System Engineering Methods for
High Productivity and Dependability [1] was driven by
the tasks of achieving and evaluating industrial
takeup, initially by DEPLOY industrial partners, of
DEPLOY methods and tools, together with the necessary
further research on methods and tools. Our previous SEN
paper [2] introduced the project. The project has been
one of the most significant efforts ever focusing on
understanding the issues researchers and engineers face
during the deployment of formal methods. This paper
briefly reports on the project legacy and provides
pointers to the various sources of information produced
by the project.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bandyopadhyay:2012:ATR,
author = "Anup Kumar Bandyopadhyay",
title = "Application of {TLRO} to refute an incorrect mutual
exclusion algorithm",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--5",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347702",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Modeling of iterative commands in a concurrent process
is difficult because the termination depends on the
states of different processes. In this paper a Temporal
Logic Related to Observation (TLRO)-based modeling of
the same is considered. For simplicity we restrict
ourselves to 'while do' construct only. Using a
commonsense scenario it is shown that the construct may
be described by a set of three state transition rules.
In a concurrent system the termination condition is
determined by the states of different processes. To
ensure termination, therefore, temporal ordering of the
executions of different state transition rules at
different processes needs to be investigated. For this
purpose we prove two theorems. The entire derivation is
then used to refute a well known incorrect mutual
exclusion algorithm. A counter example for the
algorithm could be derived during this exercise. This
is an improvement over our earlier effort that used the
weakest precondition calculus as a modeling tool.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mahajan:2012:AGA,
author = "Manish Mahajan and Sumit Kumar and Rabins Porwal",
title = "Applying genetic algorithm to increase the efficiency
of a data flow-based test data generation approach",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--5",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347707",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The success or failure of the entire software
development process relies on the software testing
component which is responsible for ensuring that the
software that is released is free from bugs. One of the
major labor intensive activities of software testing is
the generation of the test data for the purpose of
applying the testing methodologies. Many approaches
have been tried and tested for automating the process
of generating the test data. Meta-heuristics have been
applied extensively for improving the efficiency of the
process. This paper analyses the effectiveness of
applying genetic algorithms for generating test data
automatically using data flow testing approach. An
incremental coverage measurement method is used to
improve the convergence.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rashid:2012:SAM,
author = "Ekbal Rashid and Srikanta Patnayak and Vandana
Bhattacherjee",
title = "A survey in the area of machine learning and its
application for software quality prediction",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--7",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347709",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper explores software quality improvement
through early prediction of error patterns. It
summarizes a variety of techniques for software quality
prediction in the domain of software engineering. The
objective of this research is to apply the various
machine learning approaches, such as Case-Based
Reasoning and Fuzzy logic, to predict software quality.
The system predicts the error after accepting the
values of certain parameters of the software. This
paper advocates the use of case-based reasoning (i.e.,
CBR) to build a software quality prediction system with
the help of human experts. The prediction is based on
analogy. We have used different similarity measures to
find the best method that increases reliability. This
software is compiled using Turbo C++ 3.0 and hence it
is very compact and standalone. It can be readily
deployed on any configuration without affecting its
performance.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2012:CSV,
author = "Hemant Jain and Anjana Gosain",
title = "A comprehensive study of view maintenance approaches
in data warehousing evolution",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--8",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347705",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "A data warehouse mainly stores integrated information
over data from many different remote data sources for
query and analysis. The integrated information at the
data warehouse is stored in the form of materialized
views. Using these materialized views, user queries may
be answered quickly and efficiently as the information
may be directly available. These materialized views
must be maintained in answer to actual relation updates
in the different remote sources. One of the issues
related to materialized views is that whether they
should be recomputed or they should be adapted
incrementally after every change in the base relations.
View maintenance is the process of updating a
materialized view in response to changes to the
underlying data is called view maintenance. There are
several algorithms developed by different authors to
ease the problem of view maintenance for data warehouse
systems. In this paper, we have provided a
comprehensive study on research works of different
authors related to DW view maintenance considering
various parameters and presented the same in tabular
way.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Shirole:2012:TCU,
author = "Mahesh Shirole and Rajeev Kumar",
title = "Testing for concurrency in {UML} diagrams",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--8",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347712",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Concurrent programming is increasingly being used in
many applications with the advent of multi-cores. The
necessary support for execution of multi-threading is
getting richer. Notwithstanding, a concurrent program
may behave nondeterministically, it may result in
different outputs with the same input in different
runs. The aim of this study is to generate test
sequences for concurrency from unified modelling
language (UML) behavioral models such as sequence and
activity diagrams. Generating exhaustive test cases for
all concurrent interleaving sequences is exponential in
size. Therefore, it is necessary to find adequate test
cases in presence of concurrency to uncover errors due
to, e.g., data race, synchronization and deadlocks. In
order to generate adequate test cases a novel search
algorithm, which we call concurrent queue search (CQS)
is proposed. The CQS handles random nature of
concurrent tasks. To generate test scenarios, a
sequence diagram is converted into an activity diagram.
An activity diagram encapsulates sequential,
conditional, iterative and concurrent ows of the
control. By the experimental results, it was observed
that test sequences generated by CQS algorithm are
superior as compared to DFS and BFS search
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sekar:2012:ASB,
author = "Lakshmi Priya Sekar and Vinitha Reddy Gankidi and
Selvakumar Subramanian",
title = "Avoidance of security breach through selective
permissions in {Android} operating system",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--9",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347711",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The current Android application framework has an ``all
or none'' permission policy, viz., an application can
be installed if and only if all the permissions are
granted. Also, no provision exists to deny granted
permissions after installation. Therefore, any
application can misuse the granted permission.
CyanogenMod addresses this issue by denying the
unwanted permissions which might cause the application
to crash. WhisperCore, has worked on this problem but
the working model is unavailable at the moment. APEX,
also is currently doing some research on this issue but
there is no publicly available document. In this paper,
the problem of misusing the granted permission n in
Android is addressed and a novel idea of 'shadow
manifest' is proposed. The proposed shadow manifest is
implemented by creating a novel Content Provider, viz.,
SelPermProvider, which hosts the user permissions. In
general, during the resource request phase, the system
manifest is checked and the resources are allocated.
But, in our implementation, the control is altered to
flow through the shadow manifest after the system
manifest is checked. If the query to shadow manifest is
TRUE, then the resource is granted else a dummy or null
value is returned. This facilitates the user to
identify the malware and block the malware from
achieving the intended task. Thus, the application is
unaware of the indirect permission denial and continues
to run normally. The user can decide which permission
to restrict by checking a log of all recent permission
requests, a facility provided in our app. The proposed
shadow manifest has been implemented and tested using
an application called 'Contacts\_Retrieve'. It was
found to successfully complete the application if the
shadow manifest returned TRUE, and unsuccessfully
complete otherwise.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Babu:2012:IAD,
author = "P. Arun Babu and C. Senthil Kumar and N. Murali and T.
Jayakumar",
title = "An intuitive approach to determine test adequacy in
safety-critical software",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--10",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347701",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Safety-critical software must adhere to stringent
quality standards and is expected to be thoroughly
tested. However, exhaustive testing of software is
usually impractical. The two main challenges faced by a
software testing team are generation of effective test
cases and demonstration of testing adequacy. This paper
proposes an intuitive and conservative approach to
determine the test adequacy in safety-critical
software. The approach is demonstrated through a case
study: the core temperature monitoring system of a
nuclear reactor. We combine conservative test coverage
of unique execution path test cases, and the results
from mutation testing to determine the test adequacy.
Although mutation testing is a powerful technique, the
difficulty in identifying equivalent mutants has
limited its practical utility. To gain confidence on
the computed test adequacy: (i) faults during mutation
testing must be induced at all possible execution paths
of the code, (ii) properties of unkilled mutants must
be studied, and (iii) all equivalent mutants must be
detected. In this regard; results of static, dynamic
and coverage analysis of the mutants is presented, and
a technique to identify the likely equivalent mutants
is proposed.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wu:2012:MMS,
author = "Ye-Chi Wu and Hewijin Christine Jiau",
title = "A monitoring mechanism to support agility in
service-based application evolution",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--10",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347714",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Service orientation promotes an agile development
paradigm for rapid application development and presents
evolutionary challenges to adapt to frequent
environmental changes. To maintain effective
service-based application operations, this research
introduces a Serv-Gears framework to maintain a
mechanism for evolution-need monitoring. Inheriting
major characteristics of a service-oriented paradigm,
this mechanism is designed in a service-based style to
facilitate development agility in evolution planning
and implementation. Serv-Gears allows developers to
continuously specify service-based monitors even during
application operations. The specified monitors are
included dynamically in the running application to
collect monitoring results. Evolution plans are then
effectively developed and assessed. Such an integrated
development environment provided by Serv-Gears
facilitates agile service-based application
evolution.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2012:OFA,
author = "Ajay Jain",
title = "Optimizing feature-access time through dynamic updates
to application menu layout",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "1--14",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347704",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As soon as a product or application is installed,
users want to start using it with zero usability
roadblocks. However, there is always a time quantity
associated with a user's series of actions that must be
performed while traversing application menu items to
reach a specific (desired) menu option. This time
factor plays a critical role in influencing user
experience and engagement; the more the number of
clicks, the greater the time taken in reaching the
desired menu item. This time lag may leave the user
frustrated. The time and distance traversed increases
further if the menu structure comprises multiple nested
menus within the parent menu. This paper proposes an
improvised dynamic menu layout based on usage
statistics. This work also demonstrates results of a
statistical experiment that compares the time taken in
reaching specific menu items with the proposed new
layout vs. the traditional menu layout. Experimental
data (under defined assumptions) is found to be
significantly in favor of the proposed approach. The
work also presents data samples, assumptions,
limitations, and benefits of the proposed approach.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2012:MCS,
author = "Larry Bernstein",
title = "Managing computer suppliers",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "12--13",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347718",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Grechanik:2012:CDD,
author = "Mark Grechanik",
title = "The curse of database deadlocks: the problem with no
good solution",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "13--14",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347719",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2012:SEEd,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}: is software
engineering ready for {MOOCs}?",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "14--14",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347720",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2012:SNSe,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "17--26",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347699",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2012:RPe,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "27--33",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347700",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Harrison:2012:RFI,
author = "Rachel Harrison and Daniela da Cruz and Pedro
Henriques and Maria Jo{\~a}o Varanda Pereira and
Shih-Hsi Liu and Tim Menzies and Marjan Mernik and
Daniel Rodriguez",
title = "Report from the {First International Workshop on
Realizing Artificial Intelligence Synergies in Software
Engineering (RAISE 2012)}",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "34--35",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347697",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The aim of the Realizing Artificial Intelligence
Synergies in Software Engineering (RAISE) series of
workshops is to provide a forum for researchers and
industry practitioners to exchange and discuss the
latest innovative synergistic AI and SE techniques and
practices. Namely, we are interested in AI solutions to
SE problems and SE practices to answer AI obstacles,
and techniques that could benefit these realms
bidirectionally. This report summarizes the First
International RAISE Workshop and indicates some future
activities.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kruchten:2012:TDS,
author = "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya
and Joost Visser",
title = "Technical debt in software development: from metaphor
to theory report on the {Third International Workshop
on Managing Technical Debt}",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "36--38",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347698",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The technical debt metaphor is gaining significant
traction in the software development community as a way
to understand and communicate issues of intrinsic
quality, value, and cost. This is a report on a third
workshop on managing technical debt, which took place
as part of the 34rd International Conference on
Software Engineering (ICSE 2012). The goal of this
third workshop was to discuss managing technical debt
as a part of the research agenda for the software
engineering field, in particular focusing on eliciting
and visualizing debt, and creating payback
strategies.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jahns:2012:PDI,
author = "Veit Jahns",
title = "Principles of data integration by Anhai Doan, {Alon}
Halevy, Zachary {Ives}",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "43--43",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347721",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{StPierre:2012:BRU,
author = "Richard {St. Pierre}",
title = "Book Review: {{\booktitle{The UX book, process and
guidelines for ensuring a quality user experience}} by
Rex Hartson and Pardha S. Pyla}",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "43--44",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347722",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tan:2012:BRH,
author = "Kwee Heong Tan",
title = "Book Review: {{\booktitle{How Google tests software}}
by James A. Whittaker, Jason Arbon and Jeff Carollo}",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "44--45",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347723",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kienle:2012:PDP,
author = "Holger M. Kienle",
title = "Personal data privacy and protection in a surveillance
era: technologies and practices by Christina
Akrivopoulou and Athanasios Psygkas",
journal = j-SIGSOFT,
volume = "37",
number = "5",
pages = "45--46",
month = sep,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2347696.2347724",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:16 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{El-Deeb:2012:VSS,
author = "Ahmed El-Deeb",
title = "A view on the state of software engineering practice:
experience from {Egypt}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--4",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382762",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "An excerpt from Thomas Friedman's famous book The
World Is Flat, ``When developing countries start
thinking about the challenge of flatism\ldots{}. It has
to ask itself,'' ``To what extent is my country
advancing or being left behind by the flattening of the
world, and to what extent is it adapting to and taking
advantage of all the new platforms for collaborations
and competition?'' is vividly describing the appeal of
many developing countries in entering the software
industry. With the globalization of crafting software
and its services, the software industry is seen as a
lucrative economic growth opportunity. Unlike other
industrial investments, the software industry is
convenient to developing countries for its low-cost of
establishment. All is needed is an affordable real
estate rental, a bunch of PCs, and a few skilled
workers to get the business running. The globalization
of the software industry with attention given to
accessing the right skills no matter where and reducing
costs through cheap labor is even a realization to
those countries ambitions to remedy part of their
economic challenges. India preceded with utilizing such
potential and made good use of such globalization, or
flatism, of the software industry; positioning itself
as a successful model to those nations aspiring to
compete globally and establish economic growth. Egypt
is no exception from this ambition. Geographically
positioned in proximity to Europe at the crossroads of
Europe, Africa, and Asia and with access to abundant
low wage talent pool of multilingual technical
graduates annually are all factors that made it
conceivable that Egypt can compete in the global
industry of software. However, such entrance into
competition, notably with India as well as other Middle
Eastern countries, have shaped trends in the practices
of software engineering in Egypt as well as it did
emerge several challenges that Egypt should learn to
remedy if it wants to stay competitive in the global
software industry. This paper attempts to shed light on
salient current software engineering practices and
related challenges that would be affecting Egypt's
progress and competitive edge. In laying a foundation
to such brief survey of practices, this paper also
overviews major cornerstones that gave rise to the
establishment and support of such industry in Egypt.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2012:SLT,
author = "Vineet Sharma and S. A. M. Rizvi and Arun Sharma",
title = "Software Licenses --- A tool to control distribution
of software",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--4",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382769",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The International Workshop on Developing Tools as
Plug-Ins (TOPI) is a venue for researchers and
practitioners interested in plug-in development. The
main interest is understanding the opportunities and
challenges of developing tools as plug-ins, and thus,
we seek for discussions regarding the characteristics
of good plug-ins, interoperability requirements to
making tools available across platforms, recent
successful tools as plug-ins as well as foreseen medium
and long term challenges of tools as plug-ins. The
second edition of this workshop, TOPI 2012 was
co-located with the International Conference on
Software Engineering (ICSE 2012). TOPI 2012 received a
total of 32 submissions. Among them, 14 were accepted
as full papers and 4 as short papers. The audience
during the whole workshop ranged from 25 to 30
participants. The final program comprised position
papers including new proposals for plug-in
architectures as well as their interaction with
development environments and run-times, and papers
discussing the implementation of different kind of
tools as plug-ins. This report describes the main
results of TOPI 2012.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ceccarello:2012:TGC,
author = "Matteo Ceccarello and Nastaran Shafiei",
title = "Tools to generate and check consistency of model
classes for {Java PathFinder}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382796",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Java PathFinder (JPF) is a model checker for Java
applications. Like any other model checker, JPF has to
combat the notorious state space explosion problem.
Since JPF is a JVM, it can only model check Java
bytecode and needs to handle native calls differently.
JPF tackles the state space explosion problem and
handles native calls by means of so-called model
classes and native peers. In this paper we focus on
model classes. For a class that either causes a state
space explosion or that contains native calls, one can
introduce a model class that either abstracts away
particular details or implements the native call in
Java. Rather than model checking the original class,
JPF model checks the model class instead. Writing such
model classes is time consuming and error prone. In
this paper we propose two tools to assist with the
development of model classes. The one tool generates a
skeleton of a model class. The other tool checks
whether a model class is consistent with the original
class.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chanda:2012:TBS,
author = "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
and Swapan Bhattacharya",
title = "Traceability between service component and class: a
model based approach",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382761",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Service components are the key to the development of a
service-oriented solution as they provide the
implementation of the services. The implementation of
Service components provides the actual function of the
component and can be defined with one or more Java
classes. We propose a model named Service Component to
Class (SC2C) that maps the service components of an
application with that of the classes that implement the
service components. We also propose a visual model as a
part of SC2C that represents the classes and
relationship among classes. This model helps to
establish traceability among service components and
classes. We also introduce some traceability metrics to
measure traceability between the artifacts of Service
Oriented Architecture (SOA) and Object Oriented (OO)
paradigms. This work, along with our earlier work, help
in Software Configuration Management of a SOA
application. We provide an insurance system case study
to illustrate our approach.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Funes:2012:RMC,
author = "Diego Funes and Junaid Haroon Siddiqui and Sarfraz
Khurshid",
title = "Ranged Model Checking",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382799",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We introduce ranged model checking, a novel technique
for more effective checking of Java programs using the
Java PathFinder (JPF) model checker. Our key insight is
that the order in which JPF makes non-deterministic
choices denes a total ordering of execution paths it
explores in the program it checks. Thus, two in-order
paths define a range for restricting the model checking
run by defining a start point and an end point for
JPF's exploration. Moreover, a given set of paths can
be linearly ordered to define consecutive,
(essentially) non-overlapping ranges that partition the
exploration space and can be explored separately. While
restricting the run of a model checker is a well-known
technique in model checking, the key novelty of our
work is conceptually to restrict the run using vertical
boundaries rather than the traditional approach of
using a horizontal boundary, i.e., the search depth
bound. Initial results using our prototype
implementation using the JPF libraries demonstrate the
promise ranged model checking holds.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Khyzha:2012:AP,
author = "Artem Khyzha and Pavel Par{\'\i}zek and Corina S.
P{\u{a}}s{\u{a}}reanu",
title = "Abstract pathfinder",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382794",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We present Abstract Pathfinder, an extension to the
Java Pathfinder (JPF) verification tool-set that
supports data abstraction to reduce the large data
domains of a Java program to small, finite abstract
domains, making the program more amenable to
verification. We use data abstraction to compute an
over-approximation of the original program in such a
way that if a (safety) property is true in the
abstracted program the property is also true in the
original program. Our approach enhances JPF with an
abstract interpreter and abstract state-matching
mechanisms, together with a library of abstractions
from which the user can pick which abstractions to use
for a particular application. We discuss the details of
our implementation together with some preliminary
experiments with analyzing multi-threaded Java
programs, where Abstract Pathfinder achieves
significant time and memory savings as compared with
plain JPF.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mercer:2012:CVI,
author = "Eric Mercer and Suzette Person and Neha Rungta",
title = "Computing and visualizing the impact of change with
{Java PathFinder} extensions",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382801",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Change impact analysis techniques estimate the
potential effects of changes made to software. Directed
Incremental Symbolic Execution (DiSE) is a Java
PathFinder extension that computes the impact of
changes on program execution behaviors. The results of
DiSE are a set of impacted path conditions that can be
efficiently processed by a subsequent client analysis.
Path conditions, however, may not be intuitive for
software developers without the context of the source
code. In this paper we present a framework for
visualizing the results of DiSE. The visualization
includes annotated source code and control flow graphs
indicating program statements that are changed and
statements that may be impacted by the changes. A
simulation mode enables users to also observe the
impact of changes on symbolic execution of the program,
by showing the changes to the path conditions as the
user steps through the sequences of statements
executed.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mirzaei:2012:TAA,
author = "Nariman Mirzaei and Sam Malek and Corina S.
P{\u{a}}s{\u{a}}reanu and Naeem Esfahani and Riyadh
Mahmood",
title = "Testing {Android} apps through symbolic execution",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382798",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "There is a growing need for automated testing
techniques aimed at Android apps. A critical challenge
is the systematic generation of test cases. One method
of systematically generating test cases for Java
programs is symbolic execution. But applying symbolic
execution tools, such as Symbolic Pathfinder (SPF), to
generate test cases for Android apps is challenged by
the fact that Android apps run on the Dalvik Virtual
Machine (DVM) instead of JVM. In addition, Android apps
are event driven and susceptible to path-divergence due
to their reliance on an application development
framework. This paper provides an overview of a
two-pronged approach to alleviate these issues. First,
we have developed a model of Android libraries in Java
Pathfinder (JPF) to enable execution of Android apps in
a way that addresses the issues of incompatibility with
JVM and path-divergence. Second, we have leveraged
program analysis techniques to correlate events with
their handlers for automatically generating
Android-specific drivers that simulate all valid
events.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Panizo:2012:EJP,
author = "Laura Panizo and Mar{\'\i}a del Mar Gallardo",
title = "An extension of {Java PathFinder} for hybrid systems",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382793",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Hybrid systems are characterized by combining discrete
and continuous behaviors. Verification of hybrid
systems is, in general, a difficult task due to the
potential complexity of the continuous dynamics.
Currently, there are different formalisms and tools
which are able to analyze specific types of hybrid
systems, model checking being one of the most used
approaches. In this paper, we describe an extension of
Java PathFinder in order to analyze hybrid systems. We
apply a general methodology which has been successfully
used to extend Spin. This methodology is non-intrusive,
and uses external libraries, such as the Parma
Polyhedra Library, to abstract the continuous behavior
of the hybrid system.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Phan:2012:SQI,
author = "Quoc-Sang Phan and Pasquale Malacaria and Oksana
Tkachuk and Corina S. P{\u{a}}s{\u{a}}reanu",
title = "Symbolic quantitative information flow",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382791",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Quantitative Information Flow (QIF) is a powerful
approach to quantify leaks of confidential information
in a software system. Here we present a novel method
that precisely quantifies information leaks. In order
to mitigate the state-space explosion problem, we
propose a symbolic representation of data, and a
general SMT-based framework to explore systematically
the state space. Symbolic Execution fits well with our
framework, so we implement a method of QIF analysis
employing Symbolic Execution. We develop our method as
a prototype tool that can perform QIF analysis for a
software system developed in Java. The tool is built on
top of Java Pathfinder, an open source model checking
platform, and it is the first tool in the field to
support information-theoretic QIF analysis.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rimlinger:2012:TGS,
author = "Frank Rimlinger",
title = "Test generation via symbolic simulation",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382795",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Mango extension project of JPF is an Eclipse
Workbench plugin which creates a functional
specification of Java source code. The specification is
presented as a series of navigable pages within Eclipse
views. Representative code examples containing faults
are processed by Mango. The output specification views
are then navigated for the purpose of discovering
robust fault recognition rules for automated testing.
This paper describes how the analyst and tool work
together to generate a test for a selected
vulnerability described in an Oracle publication, the
exposition of confidential data by the exception
handler mechanism.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Shafiei:2012:MCL,
author = "Nastaran Shafiei and Peter Mehlitz",
title = "Modeling class loaders in {Java PathFinder} version
7",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382800",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The class loading mechanism is one of the essential
components of the Java runtime environment. Java class
loading is performed on-demand, allows multiple, user
extensible class loaders, and can associate a separate
type namespace with each class loader. Previous
versions of the Java Pathfinder (JPF) model checker
only provided a single, hardcoded class loading
mechanism. As one of the cornerstones of the upcoming
JPF version 7 (JPF v7), we have implemented a standard
Java conforming class loader infrastructure. Our
implementation does not only support different class
loaders and type namespaces, but also allows explicit
instantiation of multiple bootstrap class loaders which
is essential for model checking of distributed
applications --- the primary motivation for our work.
With the new class loading mechanism, such applications
can be mapped to threads using different bootstrap
class loaders, thus effectively separating all static
fields between application threads. In addition, the
JPF v7 class loading is considered to be the basis for
future verification of Java security properties.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2012:SOO,
author = "Meenakshi Sharma and Nasib S. Gill and Sunil Sikka",
title = "Survey of object-oriented metrics: focusing on
validation and formal specification",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382770",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "To quantify various attributes of object-oriented
software systems, numerous object-oriented metrics have
been proposed by various researchers. This paper
surveys existing object-oriented metrics by focusing on
the two major issues-Validation and Formal
Specification. This paper provides researchers with an
understanding of existing object-oriented metrics in
terms of validation and formal specification. Because
few metrics are validated and formally specified, there
is a need of both validation and formal specification
of object-oriented metrics.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{vanderMerwe:2012:VAA,
author = "Heila van der Merwe and Brink van der Merwe and Willem
Visser",
title = "Verifying {Android} applications using {Java
PathFinder}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382797",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Mobile application testing is a specialised and
complex field. Due to mobile applications' event driven
design and mobile runtime environment, there currently
exist only a small number of tools to verify these
applications. This paper describes the development of
JPF-ANDROID, an Android application verification tool.
JPF-ANDROID is built on Java Pathfinder, a Java model
checking engine. JPF-ANDROID provides a simplified
model of the Android framework on which an Android
application can run. It then allows the user to script
input events to drive the application flow. JPF-ANDROID
provides a way to detect common property violations
such as deadlocks and runtime exceptions in Android
applications.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Zhang:2012:SSS,
author = "Yufeng Zhang and Zhenbang Chen and Ji Wang",
title = "{S2PF}: speculative symbolic {PathFinder}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--5",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382792",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Recently, symbolic execution has gained a significant
progress in its techniques and applications. However,
in practice, scalability is still a key challenge for
symbolic execution. In this paper, we present S2PF,
which improves the scalability of Symbolic PathFinder
by integrating speculative symbolic execution with the
general heuristic search framework. In addition, two
optimizations are proposed to improve the speculative
symbolic execution in S2PF. Experimental results on six
programs show that, S2PF can reduce the solver
invocations by 36.4\% to 48.7\% (with an average of
40.3\%), and save the search time by 30.6\% to 43.5\%
(with an average of 35\%).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bell:2012:RSIa,
author = "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
and Swapneel Sheth",
title = "Report from the {Second International Workshop on
Games and Software Engineering (GAS 2012)}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--6",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382763",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Meneely:2012:ICM,
author = "Andrew Meneely and Oluyinka Williams",
title = "Interactive churn metrics: socio-technical variants of
code churn",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--6",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382785",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "A central part of software quality is finding bugs.
One method of finding bugs is by measuring important
aspects of the software product and the development
process. In recent history, researchers have discovered
evidence of a ``code churn'' effect whereby the degree
to which a given source code file has changed over time
is correlated with faults and vulnerabilities.
Computing the code churn metric comes from counting
source code differences in version control
repositories. However, code churn does not take into
account a critical factor of any software development
team: the human factor, specifically who is making the
changes. In this paper, we introduce a new class of
human-centered metrics, ``interactive churn metrics''
as variants of code churn. Using the git blame tool, we
identify the most recent developer who changed a given
line of code in a file prior to a given revision. Then,
for each line changed in a given revision, determined
if the revision author was changing his or her own code
(``self churn''), or the author was changing code last
modified by somebody else (``interactive churn''). We
derive and present several metrics from this concept.
Finally, we conducted an empirical analysis of these
metrics on the PHP programming language and its
post-release vulnerabilities. We found that our
interactive churn metrics are statistically correlated
with post-release vulnerabilities and only weakly
correlated with code churn metrics and source lines of
code. The results indicate that interactive churn
metrics are associated with software quality and are
different from the code churn and source lines of
code.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wang:2012:BPS,
author = "Wenyuan Wang and Zheng Zhang",
title = "Balanced partition scheme for distributed caching
systems to solve load imbalance problems",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--6",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382772",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Distributed caching system is usually used to
alleviate database load in constructing an enterprise
web application system. It helps to speed up dynamic
web applications. In order to improve the utilization
of caching cluster, an appropriate data partitioning
and placement scheme is usually applied. This paper
proposes a Balanced Partition Scheme (BPS) to solve
load imbalance problems and highly skewed data requests
in web application. In the BPS, which is based on
consistent hash algorithm, the partition and placement
schemes are designed respectively to guarantee a
system's load balance even when the requests of this
system are highly skewed. The range of hash function is
divided into several groups equally and those groups
will be relocated when caching nodes are overloaded.
The implementation and evaluation of the BPS is also
presented in this paper. The effectiveness of the BPS
has been verified in the simulation experiment and the
BPS can successfully solve load imbalance problems when
faced with a large number of get/set requests.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Caglayan:2012:IOA,
author = "Bora Caglayan and Ayse Bener",
title = "Issue ownership activity in two large software
projects",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--7",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382786",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Issue management is one of the major challenges of
software development teams. Balanced workload
allocation of developers who are responsible for the
maintenance of the software product would impact the
long-term reliability of the product. In this paper, we
analyse the issue report, issue ownership, and issue
resolve patterns of two large software products over a
period of time. We use GINI index to estimate the
inequalities in issue ownership over time. Our results
indicate that a small group of developers tends to take
the ownership of a large portion of new issues
especially when the active issue count is relatively
high in the software development life cycle. We discuss
the implications of this trend and propose long-term
issue management strategies to deal with them.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Colombo:2012:PSS,
author = "Regina Thienne Colombo and Marcelo Schneck Pess{\^o}a
and Ana Cervigni Guerra and Amandio Balc{\~a}o Filho
and C{\'e}lio Caruso Gomes",
title = "Prioritization of software security intangible
attributes",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--7",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382781",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Intangible elements, such as value ranges of software
security properties (e.g., confidentiality, integrity
and availability), can be seen as resources to enforce
software security. There are no standard units
regarding these properties, turning their measurement
into a difficult process. On the other hand, we can
measure or estimate priorities for intangible elements
from tangible ones, since their priorities are
proportional. The priorities of tangible resources can
be used to assign values to the priorities of
intangible resources through the experience of the
involved analysts. In this paper, we present a
theoretical process based on mathematical constructs to
score the priority and to estimate measures of software
security attributes. This process causes the complex
systems decomposition into simpler and smaller systems,
thus allowing the estimation of properties that will
help the understanding and measurement of software
security properties. Our results provide a model for
access security; the priority score of security
attributes is calculated using the AHP methodology. We
illustrate the application of our approach in a Web
management system for governmental research
institutions, presenting results that may support
managers in the prioritization, evaluation and
management of security requirements related to Web
applications.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lago:2012:RIW,
author = "Patricia Lago and Grace A. Lewis and Andreas Metzger
and Vladimir Tosic and Domenico Bianculli and Antinisca
{Di Marco} and Andrea Polini and Pierluigi Plebani",
title = "Report of the {4th International Workshop on
Principles of Engineering Service-Oriented Systems
(PESOS 2012)}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--7",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382764",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 4th International Workshop on Principles of
Engineering Service-Oriented Systems (PESOS 2012) was
held at the International Conference on Software
Engineering, ICSE 2012, on June 4, 2012. The special
theme of this 4th edition of PESOS was ``The Internet
of Services.'' PESOS 2012 brought together software
engineering researchers from academia and industry, as
well as practitioners working in the areas of
service-oriented systems, to discuss research
challenges, recent developments, novel application
scenarios, as well as methods, techniques, experiences,
and tools to support engineering, evolution and
adaptation of large-scale, highly-dynamic
service-oriented systems. For the first time, PESOS
featured a special session on ``The Quest for Case
Studies.'' This effort created an initial reference set
of case studies, hosted on a publicly-available
repository, for the research community in
service-oriented systems. The multiple discussions
throughout the day resulted in the identification
service requirements for the Internet of Services.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2012:PMD,
author = "Indu Singh and Manoj Kumar",
title = "A proposed model for data warehouse user behaviour
using intrusion detection system",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--7",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382771",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Data Warehouse (DW) systems maintain sensitive and
crucial information, which is integrated from various
heterogeneous sources of organization. With the ever
increasing deployment and usage of networks, these
systems are becoming more vulnerable to malicious
attacks. With the increased number of attacks,
intrusion detection has become vital part of
Information Security. In this paper, we have proposed a
model for analyzing and detecting anomalous events
based on user behavior analysis through usage patterns,
user profiles and session management. After monitoring
the events in the system, if any intrusion activity
occurs, then alerts are issued to system
administrators. Since a user profile is not necessarily
fixed but rather it evolves with changing time, so a
dynamic user behavior modeling is represented as a
sequence of events and combination of fact and
dimension tables accessed by the users. In this way, DW
systems may be protected by the malicious attacks.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hofer:2012:AWI,
author = "Birgit Hofer and Franz Wotawa and Rui Abreu",
title = "{AI} for the win: improving spectrum-based fault
localization",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--8",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382784",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "A considerable amount of time in software engineering
is spent in debugging. In practice, mainly debugging
tools which allow for executing a program step-by-step
and setting break points are used. This debugging
method is however very time consuming and cumbersome.
There is a need for tools which undertake the task of
narrowing down the most likely fault locations. These
tools must complete this task with as little user
interaction as possible and the results computed must
be beneficial so that such tools appeal to programmers.
In order to come up with such tools, we present three
variants of the well-known spectrum-based fault
localization technique that are enhanced by using
methods from Artificial Intelligence. Each of the three
combined approaches outperforms the underlying basic
method concerning diagnostic accuracy. Hence, the
presented approaches support the hypothesis that
combining techniques from different areas is
beneficial. In addition to the introduction of these
techniques, we perform an empirical evaluation, discuss
open challenges of debugging and outline possible
solutions.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lochmann:2012:BIA,
author = "Klaus Lochmann",
title = "A benchmarking-inspired approach to determine
threshold values for metrics",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--8",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382782",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In order to assess software quality by software
metrics, usually, thresholds for metric values are
needed. A common problem is to define reasonable
threshold values. One possible solution is to use a
benchmarking approach: the threshold value for a metric
is calculated based on the metric values of a set of
systems, which are called benchmarking base. A relevant
question is, how the used benchmarking base influences
the result of the software quality assessment. Based on
the quality assessment approach of Quamoco, we conduct
a series of experiments, using different benchmarking
bases. For each benchmarking base a quality assessment
of a series of test systems is conducted. We analyze
the whether the quality assessment results of the test
systems are concordant for different benchmarking
bases. The main findings are: (1) The bigger the
benchmarking base, the less divergent are the rankings,
and the less is the variance of the results. (2) The
size of the systems contained within a benchmarking
base does not influence the results, i.e. a
benchmarking base containing small systems works
equally well for small and large systems, and vice
versa. These results show that benchmarking is a
feasible approach for determining threshold values.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Machado:2012:STP,
author = "Ivan do Carmo Machado and John D. McGregor and Eduardo
Santana de Almeida",
title = "Strategies for testing products in software product
lines",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--8",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382783",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The software product line engineering strategy enables
the achievement of significant improvements in quality
through reuse of carefully crafted software assets
across multiple products. However, high levels of
quality in the software product line assets, which are
used to create products, must be accompanied by
effective and efficient test strategies for the
products in the software product line. The goal of this
study is to understand which strategies for testing
products in software product lines have been reported
in the literature, enabling discussions on the
significant issues, and also pointing out further
research directions. A systematic literature review was
carried out that identified two hundred seventy-three
papers, published from the years 1998 and early in
2012. From such a set of papers, a systematic selection
resulted in forty-one relevant papers. The analysis of
the reported strategies comprised two important
aspects: the selection of products for testing, and the
actual test of products. The findings showed a range of
strategies, dealing with both aspects, but few
empirical evaluations of their effectiveness have been
performed, which limits the inferences that can be
drawn.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Misra:2012:JSC,
author = "Janardan Misra and Annervaz KM and Vikrant Kaulgud and
Shubhashis Sengupta and Gary Titus",
title = "{Java} source-code clustering: Unifying syntactic and
semantic features",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--8",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382766",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a report from an international workshop on
``Social and Algorithmic Issues in Business Support''
(SAIBS), which was organized in conjunction with the
16th ADBIS Conference in Poznan, Poland, on September
17, 2012. The main focus of this workshop was to
provide a venue for the discussion whether social
stands in opposition to algorithmic or systematic. We
analyzed social contribution to business processes
taking into account possible benefits and risk factors.
Questions raised in collected research and discussion
related to how far business could relay on social input
and what were the limits or what were the areas where
introducing crowdsourced components might increase
overall risk value to unacceptable level? Algorithmic
approach to observe and collect social behaviour was
discussed in the context of internet auctions
participants and car drivers equipped in mobile
application for instant route planning and collecting
feedback cartracking data. Having in mind Andrew Keen's
critique of social contribution in Web 2.0-related
phenomena we looked for the Wisdom of Crowds [1].
Collected conclusions and further dissemination of
research results should lead to an improvement in
utilizing social impact on software development and
business processes.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Brahmasani:2012:PXA,
author = "Siva Brahmasani and Subramanian Selvakumar and E.
Sivasankar",
title = "Prevention of {XSS} attacks using {STCD}: Server side
tagging and client side differentiation",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--9",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382768",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Variability (the ability of a software system or
software artifact to be adapted for use in a specific
context) is reflected in and facilitated through the
software architecture. The Second International
Workshop on Variability in Software Architecture
(VARSA) was held in conjunction with the Joint 10th
Working IEEE/IFIP Conference on Software Architecture
and 6th European Conference on Software Architecture
2012 in Helsinki, Finland. The workshop aimed at
exploring current and emerging methods, languages,
notations technologies and tools to model, implement,
and manage variability in the software architecture. It
featured one industrial talk, five research paper
presentations, and three working group discussions.
Working groups discussed topics that emerged during the
workshop. This report summarizes the themes of the
workshop and presents the results of the working group
discussions.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mrunalini:2012:DPM,
author = "M. Mrunalini and T. V. Suresh Kumar and K. Rajani
Kanth",
title = "Dynamic process model for identifying modified data
using mobile agents in real time {ETL} processes",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--9",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382767",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Usability and accessibility issues are common causes
why software fails to meet user requirements. However,
requirements engineers still focus on functional
requirements and might ignore to also elicit system
usability and accessibility requirements. This is a
high risk which can lead to project and software
failure. Improving the usability and accessibility of a
system in a later development stage is costly and time
consuming. Targeting these concerns, the workshop
envisioned that research must address the proper
integration of system usability and accessibility
requirements into the requirements engineering process
and also must focus on how to manage and control the
evaluation of these requirements in a systematic way.
UsARE 2012 provided a platform for discussing issues
which are relevant for both fields, the Requirements
Engineering (RE) and the Human Computer Interaction
(HCI). The workshop aim was to bring\ together people
from these two communities (RE and HCI) to explore this
integration. Researchers and practitioners were invited
to submit contributions including problem statements,
technical solutions, experience reports, planned work
and vision papers. Envisioned results may help aligning
RE and HCI processes in order to overcome open issues
in these fields.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kaur:2012:MVC,
author = "Parminder Kaur and Hardeep Singh",
title = "A Modified Version Control Tool for Component-Based
Systems",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "1--10",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382765",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 8th International Conference on the Quality of
Information and Communications Technology (QUATIC 2012)
took place in Lisbon, Portugal, from 3 to 6 September
2012. QUATIC serves as a forum for disseminating
advanced methods, techniques and tools for supporting
quality approaches to ICT engineering and management.
The Conference Program of the 2012 edition was
organized on a series of Thematic Tracks on the first
day, each corresponding to a specific topic of
interest, and a Main Track on the second and third days
of the conference, with keynote speakers and extended
paper presentations selected among the best papers of
the thematic tracks. This short report summarizes the
paper and keynote presentations at QUATIC 2012.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bernstein:2012:TLT,
author = "Larry Bernstein",
title = "Things i learned from taming software development",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "5--6",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382757",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Grechanik:2012:RBA,
author = "Mark Grechanik",
title = "Random benchmark application generation for evaluating
program analysis and testing tools",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "6--7",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382758",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2012:LWD,
author = "Robert Schaefer",
title = "Limitations of web design",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "7--8",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382759",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2012:SEEe,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "8--9",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382760",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2012:SNSf,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "10--18",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382780",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2012:RPf,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "19--23",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382779",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Garbervetsky:2012:RIW,
author = "Diego Garbervetsky and Sunghun Kim",
title = "Report from {2nd International Workshop on Developing
Tools as Plug-Ins (TOPI 2012)}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "24--27",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382775",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The International Workshop on Developing Tools as
Plug-Ins (TOPI) is a venue for researchers and
practitioners interested in plug-in development. The
main interest is understanding the opportunities and
challenges of developing tools as plug-ins, and thus,
we seek for discussions regarding the characteristics
of good plug-ins, interoperability requirements to
making tools available across platforms, recent
successful tools as plug-ins as well as foreseen medium
and long term challenges of tools as plug-ins. The
second edition of this workshop, TOPI 2012 was
co-located with the International Conference on
Software Engineering (ICSE 2012). TOPI 2012 received a
total of 32 submissions. Among them, 14 were accepted
as full papers and 4 as short papers. The audience
during the whole workshop ranged from 25 to 30
participants. The final program comprised position
papers including new proposals for plug-in
architectures as well as their interaction with
development environments and run-times, and papers
discussing the implementation of different kind of
tools as plug-ins. This report describes the main
results of TOPI 2012.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bell:2012:RSIb,
author = "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
and Swapneel Sheth",
title = "Report from the {Second International Workshop on
Games and Software Engineering (GAS 2012)}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "26--27",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382776",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Second International Workshop on Games and
Software Engineering (GAS 2012) was held in June 2012,
collocated with ICSE 2012 in Zurich, Switzerland. GAS
2012 explores issues that crosscut the software
engineering and the game engineering communities.
Advances in game engineering techniques can be adopted
by the software engineering community to develop more
engaging applications across diverse domains:
education; healthcare; fitness; sustainable activities
(e.g., recycling awareness); and so on. Successful
computer games feature a property that is not always
found in traditional software: they are highly
engaging. Engaging games enthrall players and result in
users willing to spend increasing amounts of time and
money playing them. Nine submissions were accepted for
the workshop, which also featured a panel session and
an informal poster session.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gruner:2012:FWF,
author = "Stefan Gruner and Bernhard Rumpe",
title = "{FormSERA Workshop on Formal Methods in Software
Engineering Rigorous and Agile Approaches}: 2nd of
{June 2012} at {ICSE'2012} in {Z{\"u}rich (CH)}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "28--30",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382777",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This report summarizes the activities and results of
the FormSERA workshop on Formal Methods in Software
Engineering --- Rigorous and Agile Approaches. The
workshop took place on the 2nd of June 2012 in
Z{\"u}rich (CH) under the umbrella of the 34th
International Conference on Software Engineering, ICSE
2012, see http://www.formsera.org/.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tekinerdogan:2012:FTS,
author = "Bedir Tekinerdogan",
title = "{First Turkish Software Product Line Engineering
Workshop} summary",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "30--34",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382778",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software reuse has been a goal of the software
community since the early days of software engineering.
In this context software product line engineering
(SPLE) has gained a broad interest in both academic
institutions and industry. This trend can also be
observed in Turkey. In the recent years an increasing
number of software companies in Turkey have adopted a
SPLE approach while others are planning to make the
transition. This paper summarizes the results of the
First Turkish Software Product Line Engineering
Workshop that has been organized in Ankara in June
2012. The primary goal of the workshop was to reflect
on the state of practice in SPLE in Turkey. For this
five leading SPLE companies in Turkey have shared their
experiences in adopting SPLE, and using interactive
discussions a research agenda for SPLE in Turkey has
been defined. We report both on the experiences from
the workshop and the resulting research topics.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Swamy:2012:BRSb,
author = "Harisankar Krishna Swamy",
title = "Book Review: {{\booktitle{Structured parallel
programming patterns for efficient computation}} by
Michael McCool, Arch D. Robison and James Reinders}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "43--43",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382773",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bangalore:2012:BRA,
author = "Srinivasan M. Bangalore",
title = "Book Review: {{\booktitle{Agile Analytics}} by Ken
Collier}",
journal = j-SIGSOFT,
volume = "37",
number = "6",
pages = "43--44",
month = nov,
year = "2012",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2382756.2382774",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:18 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2013:CLS,
author = "Alok Mishra and Deepti Mishra",
title = "A curriculum for large scale software development",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "1--2",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413042",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Large scale software developments are becoming common
in software development organizations. Getting exposure
to work on similar projects is very significant for
this course. Here, major components of large scale
software development curriculum are discussed along
with suggestions towards making it a successful course
of software engineering curriculum.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Couto:2013:CDE,
author = "Cesar Couto and Cristiano Maffort and Rogel Garcia and
Marco Tulio Valente",
title = "{COMETS}: a dataset for empirical research on software
evolution using source code metrics and time series
analysis",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "1--3",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413047",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper documents a time series dataset on the
evolution of seventeen object-oriented metrics
extracted from ten open-source systems. By making this
dataset public our goal is to assist researchers with
interest in software evolution analysis and modeling.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Pande:2013:OCS,
author = "Jeetendra Pande and Christopher J. Garcia and Durgesh
Pant",
title = "Optimal component selection for component based
software development using pliability metric",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "1--6",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413044",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Component Based Software Development (CBSD) has gained
widespread acceptance as it often results in higher
quality software with a significant reduction in
development time and costs. A key idea behind CBSD is
the extensive reuse and composition of preexisting
modules into new software. In this paper we introduce
the pliability metric, which is well suited to a
component-based orientation and extends previous
metrics. Pliability is a flexible measure that assesses
software quality across different quality attributes in
terms of the quality of its components. In addition, we
have developed an optimal component selection model
based on integer programming, for maximizing
pliability. Through computational experimentation we
demonstrate that this model is capable of finding
optimal solutions to problems with a very large number
of components and requirements in a short time.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bedi:2013:MMT,
author = "Punam Bedi and Vandana Gandotra and Archana Singhal
and Himanshi Narang and Sumit Sharma",
title = "Mitigating multi-threats optimally in proactive threat
management",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "1--7",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413041",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In turbulent economic times, the cost effectiveness of
security measures is of the utmost importance when
designing safeguards or countermeasures. This paper
presents an optimal approach: MMT-O, Mitigating
Multi-Threats Optimally, to meet the above challenges.
The proposed approach is based on an optimum mitigation
path set generation algorithm that provides optimal
plans for threat/vulnerability management which can be
adopted at the design level of the software life cycle.
In MMT-O, a multi-threat attack graph is generated by
combining all of the individual threats responsible for
security compromise of the system. It identifies a
unique set of attacks needing mitigation by removing
redundant nodes, as an attack can be a part of multiple
threats. The proposed algorithm, implemented in Java,
provides the minimum mitigation paths required to be
blocked to avert the threat. Countermeasures using a
multi-agent system are inducted in these identified
mitigation paths to avert the threat optimally. The
proposed approach has been applied on different test
cases and the results validate its economic
justification over traditional security solutions as a
part of proactive threat management.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saxena:2013:UML,
author = "Vipin Saxena and Deepak Arora and Nimesh Mishra",
title = "{UML} modeling of load optimization for distributed
computer systems based on genetic algorithm",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "1--7",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413043",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Distributed computing has now become one of the most
efficient network system configurations to exhibit
parallelism in loosely coupled systems. These systems
are known for better reliability, availability,
scalability and robustness, intended to provide high
performance computing in a very efficient manner. The
composition of distributed systems consists of multiple
autonomous computers that can be geographically
dispersed and interconnected with each other to provide
optimum resource utilization. The degree of resource
utilization is one of the key criteria for evaluating
the performance of such systems. We propose a
genetic-algorithm-based approach to load optimization
in a distributed computing environment. Genetics
algorithm has been adapted from the biological gene
theory. Since it shows the existence of the fittest
chromosome from the sample chromosomes population, it
may be used to find the most optimum solution for any
problem. This research work demonstrates the
implication of genetic algorithms to optimize the
overall waiting time for a set of processes to be
executed on a set of servers. In order to understand
the design complexity, we modeled the proposed approach
using UML class and sequence diagrams. The results of
the proposed model have been found beneficial when
implemented and tested under various test scenarios
using C++.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2013:ESE,
author = "Gagandeep Singh and Hardeep Singh",
title = "Effect of software evolution on metrics and
applicability of {Lehman}'s laws of software
evolution",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "1--7",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413046",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nagpal:2013:ASE,
author = "Geeta Nagpal and Moin Uddin and Arvinder Kaur",
title = "Analyzing software effort estimation using k means
clustered regression approach",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "1--9",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413045",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software estimation is an area where more assurances
have been broken than in any other area of software
development. Numerous studies attempting new and
reliable software effort estimation techniques have
been proposed but no consensus as to which techniques
are the most appropriate has been reached so far. Due
to the intangible nature of ``software'', effort
estimation with a high level of accuracy remains a
dream for developers. It is unlikely to expect very
accurate estimates of development effort because of the
inherent uncertainty in software projects and the
complex and dynamic interaction of factors that impact
software development. Heterogeneity exists in software
engineering datasets because data is obtained from
diverse sources. This can be reduced by defining
certain relationships between the data values by
classifying them into different clusters. This study
focuses on how the combination of clustering and
regression techniques can reduce the potential problem
in effectiveness of predictive efficiency due to
heterogeneity of the data. Using a clustered approach
creates subsets of data having a degree of homogeneity
that enhances prediction accuracy. It was also observed
in this study that ridge regression performs better
than other regression techniques. Another key finding
is that by selecting a subset of highly predictive
attributes using Grey relational analysis a significant
improvement in prediction can be achieved.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Huang:2013:TOQ,
author = "Shihong Huang and Dragutin Petkovic and Kazunori Okada
and Marc Sosnick and Shenhaochen Zhu and Rainer
Todtenhoefer",
title = "Toward objective and quantitative assessment and
prediction of teamwork effectiveness in software
engineering courses",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "7--9",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413071",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2013:SNSa,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "10--19",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413072",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2013:RPa,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "20--26",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413073",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bencomo:2013:RIW,
author = "Nelly Bencomo and Gordon Blair and Sebastian G{\"o}tz
and Brice Morin and Bernhard Rumpe",
title = "Report on the {7th International Workshop on
Models@Runtime}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "27--30",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413061",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 7th edition of the workshop Models@Runtime was
held at the 15th International Conference on Model
Driven Engineering Languages and Systems (MODELS). The
workshop took place in the city of Innsbruck, Austria,
on the 2nd of October 2012. The workshop was organised
by Nelly Bencomo, Gordon Blair, Sebastian G{\~A}\P tz,
Brice Morin and Bernhard Rumpe. It was attended by at
least 48 people. In this report we present a synopsis
of the presentations and breakout discussions that took
place during the workshop.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lago:2013:EIC,
author = "Patricia Lago and Rick Kazman and Niklaus Meyer and
Maurizio Morisio and Hausi A. M{\"u}ller and Frances
Paulisch",
title = "Exploring initial challenges for green software
engineering: summary of the first {GREENS} workshop, at
{ICSE 2012}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "31--33",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413062",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The GREENS workshop provides a forum for practitioners
and academics to share knowledge, ideas, practices and
current results related to green and sustainable
software engineering. This first workshop was held at
ICSE 2012 in Zurich, Switzerland. It featured a keynote
talk, twelve research position statements and two
breakout sessions that discussed topics that ranged
from bringing sustainability and energy efficiency into
all software lifecycle stages, to green measures and
estimations, practices, notations, and tools to both
greening the software engineering process, and greening
the resulting Information and Communication Technology
systems. This report presents the themes of the
workshop, summarizes the results of the discussions
held in the breakout sessions, as well as the
identified research challenges.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bell:2013:RSI,
author = "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
and Swapneel Sheth",
title = "Report from the {Second International Workshop on
Games and Software Engineering (GAS 2012)}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "34--35",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413063",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lago:2013:RIW,
author = "Patricia Lago and Grace A. Lewis and Andreas Metzger
and Vladimir Tosic and Domenico Bianculli and Antinisca
{Di Marco} and Andrea Polini and Pierluigi Plebani",
title = "Report of the {4th International Workshop on
Principles of Engineering Service-Oriented Systems
(PESOS 2012)}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "35--38",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413064",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 4th International Workshop on Principles of
Engineering Service-Oriented Systems (PESOS 2012) was
held at the International Conference on Software
Engineering, ICSE 2012, on June 4, 2012. The special
theme of this 4th edition of PESOS was ``The Internet
of Services.'' PESOS 2012 brought together software
engineering researchers from academia and industry, as
well as practitioners working in the areas of
service-oriented systems, to discuss research
challenges, recent developments, novel application
scenarios, as well as methods, techniques, experiences,
and tools to support engineering, evolution and
adaptation of large-scale, highly-dynamic
service-oriented systems. For the first time, PESOS
featured a special session on ``The Quest for Case
Studies.'' This effort created an initial reference set
of case studies, hosted on a publicly-available
repository, for the research community in
service-oriented systems. The multiple discussions
throughout the day resulted in the identification
service requirements for the Internet of Services.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kaur:2013:MVC,
author = "Parminder Kaur and Hardeep Singh",
title = "A Modified Version Control Tool for Component-Based
Systems",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "39--41",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2382765",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 8th International Conference on the Quality of
Information and Communications Technology (QUATIC 2012)
took place in Lisbon, Portugal, from 3 to 6 September
2012. QUATIC serves as a forum for disseminating
advanced methods, techniques and tools for supporting
quality approaches to ICT engineering and management.
The Conference Program of the 2012 edition was
organized on a series of Thematic Tracks on the first
day, each corresponding to a specific topic of
interest, and a Main Track on the second and third days
of the conference, with keynote speakers and extended
paper presentations selected among the best papers of
the thematic tracks. This short report summarizes the
paper and keynote presentations at QUATIC 2012.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Misra:2013:JSC,
author = "Janardan Misra and Annervaz KM and Vikrant Kaulgud and
Shubhashis Sengupta and Gary Titus",
title = "{Java} source-code clustering: Unifying syntactic and
semantic features",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "41--43",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2382766",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a report from an international workshop on
``Social and Algorithmic Issues in Business Support''
(SAIBS), which was organized in conjunction with the
16th ADBIS Conference in Poznan, Poland, on September
17, 2012. The main focus of this workshop was to
provide a venue for the discussion whether social
stands in opposition to algorithmic or systematic. We
analyzed social contribution to business processes
taking into account possible benefits and risk factors.
Questions raised in collected research and discussion
related to how far business could relay on social input
and what were the limits or what were the areas where
introducing crowdsourced components might increase
overall risk value to unacceptable level? Algorithmic
approach to observe and collect social behaviour was
discussed in the context of internet auctions
participants and car drivers equipped in mobile
application for instant route planning and collecting
feedback car-tracking data. Having in mind Andrew
Keen's critique of social contribution in Web
2.0-related phenomena we looked for the Wisdom of
Crowds [1]. Collected conclusions and further
dissemination of research results should lead to an
improvement in utilizing social impact on software
development and business processes.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mrunalini:2013:DPM,
author = "M. Mrunalini and T. V. Suresh Kumar and K. Rajani
Kanth",
title = "Dynamic process model for identifying modified data
using mobile agents in real time {ETL} processes",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "43--46",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2382767",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Usability and accessibility issues are common causes
why software fails to meet user requirements. However,
requirements engineers still focus on functional
requirements and might ignore to also elicit system
usability and accessibility requirements. This is a
high risk which can lead to project and software
failure. Improving the usability and accessibility of a
system in a later development stage is costly and time
consuming. Targeting these concerns, the workshop
envisioned that research must address the proper
integration of system usability and accessibility
requirements into the requirements engineering process
and also must focus on how to manage and control the
evaluation of these requirements in a systematic way.
UsARE 2012 provided a platform for discussing issues
which are relevant for both fields, the Requirements
Engineering (RE) and the Human Computer Interaction
(HCI). The workshop aim was to bring\ together people
from these two communities (RE and HCI) to explore this
integration. Researchers and practitioners were invited
to submit contributions including problem statements,
technical solutions, experience reports, planned work
and vision papers. Envisioned results may help aligning
RE and HCI processes in order to overcome open issues
in these fields.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Brahmasani:2013:PXA,
author = "Siva Brahmasani and Subramanian Selvakumar and E.
Sivasankar",
title = "Prevention of {XSS} attacks using {STCD}: Server side
tagging and client side differentiation",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "46--49",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2382768",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Variability (the ability of a software system or
software artifact to be adapted for use in a specific
context) is reflected in and facilitated through the
software architecture. The Second International
Workshop on Variability in Software Architecture
(VARSA) was held in conjunction with the Joint 10th
Working IEEE/IFIP Conference on Software Architecture
and 6th European Conference on Software Architecture
2012 in Helsinki, Finland. The workshop aimed at
exploring current and emerging methods, languages,
notations technologies and tools to model, implement,
and manage variability in the software architecture. It
featured one industrial talk, five research paper
presentations, and three working group discussions.
Working groups discussed topics that emerged during the
workshop. This report summarizes the themes of the
workshop and presents the results of the working group
discussions.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2013:SLT,
author = "Vineet Sharma and S. A. M. Rizvi and Arun Sharma",
title = "Software Licenses --- A tool to control distribution
of software",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "49--51",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2382769",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The International Workshop on Developing Tools as
Plug-Ins (TOPI) is a venue for researchers and
practitioners interested in plug-in development. The
main interest is understanding the opportunities and
challenges of developing tools as plug-ins, and thus,
we seek for discussions regarding the characteristics
of good plug-ins, interoperability requirements to
making tools available across platforms, recent
successful tools as plug-ins as well as foreseen medium
and long term challenges of tools as plug-ins. The
second edition of this workshop, TOPI 2012 was
co-located with the International Conference on
Software Engineering (ICSE 2012). TOPI 2012 received a
total of 32 submissions. Among them, 14 were accepted
as full papers and 4 as short papers. The audience
during the whole workshop ranged from 25 to 30
participants. The final program comprised position
papers including new proposals for plug-in
architectures as well as their interaction with
development environments and run-times, and papers
discussing the implementation of different kind of
tools as plug-ins. This report describes the main
results of TOPI 2012.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Beshilas:2013:BRC,
author = "Bill Beshilas",
title = "Book Review: {{\booktitle{Collaborative enterprise
architecture}} by Stefan Bente, Uwe Bombosch, and
Shailendra Langade}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "54--54",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413051",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chapelle:2013:BRO,
author = "Gregory Chapelle",
title = "Book Review: {{\booktitle{The official Ubuntu book}},
seventh edition by Matthew Helmke and Amber Graner}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "54--55",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413052",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DelRa:2013:BRJ,
author = "William {Del Ra III}",
title = "Book Review: {{\booktitle{Java application
architecture: modularity patterns with examples using
OSGi}} by Kirk Knoernschild}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "55--55",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413053",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kienle:2013:BRG,
author = "Holger M. Kienle",
title = "Book Review: {{\booktitle{Grounded innovation:
strategies for creating digital products}} by Lars Erik
Holmquist}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "55--56",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413054",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Paige:2013:BRS,
author = "Michael Paige",
title = "Book Review: {{\booktitle{Sams teach yourself jQuery
mobile in 24 hours}} by Phil Dutson}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "56--57",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413055",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sampaio:2013:BRQ,
author = "Alberto Sampaio",
title = "Book Review: {{\booktitle{Quantifying the user
experience: practical statistics for user research}} by
Jeff Sauro and James R. Lewis}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "57--58",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413056",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saur:2013:TLP,
author = "Joe Saur",
title = "Think like a programmer: an introduction to creative
problem solving by V. {Anton} Spraul",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "58--58",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413057",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Stobie:2013:BRX,
author = "Keith Stobie",
title = "Book Review: {{\booktitle{OS X Mountain Lion Pocket
Guide}} by Chris Seibold}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "59--59",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413058",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRM,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Modern embedded computing:
designing connected, pervasive, media-rich systems}} by
Peter Barry and Patrick Crowley}",
journal = j-SIGSOFT,
volume = "38",
number = "1",
pages = "59--60",
month = jan,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2413038.2413059",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:22 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Catal:2013:TEB,
author = "Cagatay Catal",
title = "Teaching evidence-based software engineering to master
students: a single lecture within a course or an entire
semester-long course?",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "1--2",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439981",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper, we summarize our perspective on
teaching evidence-based software engineering (EBSE) to
master students. In this semester, we aimed to
investigate this subject as a single lecture within a
master course called Software Architecture instead of
an entire semester-long course called EBSE. Each of the
students delivered a systematic mapping study report
related to the software architecture at the end of the
semester and these project reports showed that this
teaching approach is quite useful for master students
even though this teaching activity is too short.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rabelo:2013:ACG,
author = "Ricardo A. C. Rabelo and Hendrik T. Macedo and Eduardo
O. Freire and Rodrigo M. Oliveira",
title = "Automatic code generation of {SIMUROSOT} game
strategies: an approach based on finite state
machines",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "1--8",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439983",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Robot soccer is a multidisciplinary research field of
growing academic interest. Scientific competitions
worldwide have driven major technological advances in
the field, since research institutes and universities
often enroll their robotic teams and present the
developments achieved during the previous year. The
FIRA is a leading international organization that
promotes such type of competition. One of its various
competition categories is that of virtual robots
competing in a simulation platform called SIMUROSOT.
This 3D simulation platform is available so that
researchers and students can develop robot teams and
test their performance appropriately and repeatedly.
The major problem with the mainstream encoding
mechanism used in the preparation of robot teams for
SimuroSot is the lack of a formal process to
standardize the programming and model the game
strategies. Such lack of standardization causes several
limitations on the competition as a science promoter,
namely: (1) the difficulty of understanding other's
code, (2) absence of abstraction for the conceiving of
game strategies, (3) need for high programming skills
in order to produce effective game strategies and (4)
lack of clear separation between robots movimentation
primitives and specific application domain concerns ---
in this case, the soccer domain. This paper proposes a
semi-formal specification for the modeling of team game
strategies to the FIRA SIMUROSOT category. This
specification defines two levels of mapping: (1)
mapping of the application domain information --- in
this case, the soccer competition --- to Finite State
Machines and (2) mapping of Finite State Machines that
represent game strategies of a team to their respective
coding in a target programming language, making use of
coding standards that ensure the readability and
maintainability of the final code. Encodings of game
strategies in the programming language Lingo has been
provided following the proposal. The error-free
execution of such encodings on the simulation platform
shows the proposal feasibility.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tiwari:2013:RRT,
author = "Rajeev Tiwari and Noopur Goel",
title = "Reuse: reducing test effort",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "1--11",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439982",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Testing effort consumes more than half of all
development effort and is one of the important factors,
which obstruct quality assurance. Software reuse
enhances quality and productivity and at the same time
reduces the time-to-market of the software products. As
reuse applies to the development process, so too, it
applies to the testing process. In this paper, we
discuss reuse-oriented test approaches, which are used
to reduce the testing effort. Further, we present the
state-of-the-art in reuse-oriented test approaches
employed in reuse-oriented development processes. At
the end of the current paper, we argue that the current
trend is towards built-in test and model based testing
in the applications developed through reusable
software.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Zage:2013:SSE,
author = "Wayne Zage",
title = "The security and software engineering research center
{(S2ERC)}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "6--7",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439977",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2013:RLL,
author = "Robert Schaefer",
title = "Relay ladder logic considered harmful",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "8--9",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439978",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2013:SEEa,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "9--10",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439979",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2013:SNSb,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "11--19",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439980",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2013:RPb,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "20--25",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2440001",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ralph:2013:RFS,
author = "Paul Ralph and Pontus Johnson and Howell Jordan",
title = "Report on the {First SEMAT Workshop on General Theory
of Software Engineering (GTSE 2012)}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "26--28",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439999",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Many academic disciplines have general theories, which
apply across the discipline and underlie much of its
research. Examples include the Big Bang theory
(cosmology), Maxwell's equations (electrodynamics), the
theories of the cell and evolution (biology), the
theory of supply and demand (economics), and the
general theory of crime (criminology). Software
engineering, in contrast, has no widely-accepted
general theory. Consequently, the SEMAT Initiative
organized a workshop to encourage development of
general theory in software engineering. Workshop
participants reached broad consensus that software
engineering would benefit from better theoretical
foundations, which require diverse theoretical
approaches, consensus on a primary dependent variable
and better instrumentation and descriptive research.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lewis:2013:RIIa,
author = "Grace A. Lewis and Anca Ionita and Marin Litoiu",
title = "Report of the {2012 IEEE 6th International Workshop on
the Maintenance and Evolution of Service-Oriented and
Cloud-Based Systems (MESOCA 2012)}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "29--32",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439998",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 2012 IEEE 6th International Workshop on the
Maintenance and Evolution of Service-Oriented and
Cloud-Based Systems (MESOCA 2012) was held as a
co-located event of the International Conference on
Software Maintenance, ICSM 2012, on September 24, 2012.
MESOCA 2012 brought together software engineering
researchers from academia and industry, as well as
practitioners, to share results and open issues in the
area of maintenance and evolution of service-oriented
and cloudbased systems. The many discussions throughout
the day resulted in the identification of promising
areas of research to address existing gaps and
problems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Froberg:2013:BRD,
author = "Scott Froberg",
title = "Book Review: {{\booktitle{Distributed and cloud
computing from parallel processing to the Internet of
Things}} by Kai Hwang, Geoffry C. Fox, and Jack J.
Dongarra}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "34--34",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439991",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/bibnet/authors/d/dongarra-jack-j.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{M:2013:BRL,
author = "Srinivasan M.",
title = "Book Review: {{\booktitle{Learning Rails 3}} by Simon
St. Laurent, Edd Dumbill and Eric J. Gruber}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "34--34",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439992",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Froberg:2013:BRP,
author = "Scott Froberg",
title = "Book Review: {{\booktitle{Private cloud computing:
consolidation, virtualization, and service-oriented
infrastructure}} by Stephen R. Smoot, Nam K. Tan}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "35--35",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439994",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gvero:2013:BRO,
author = "Igor Gvero",
title = "Book Review: {{\booktitle{Observing the user
experience}}, 2nd edition: a practitioner's guide to
user research by Elizabeth Goodman, Mike Kuniavsky, and
Andrea Moed}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "35--35",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439993",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Berzal:2013:BRS,
author = "Fernando Berzal",
title = "Book Review: {{\booktitle{Structured parallel
programming}} by Michael McCool, James Reinders \& Arch
Robison}",
journal = j-SIGSOFT,
volume = "38",
number = "2",
pages = "35--39",
month = mar,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2439976.2439995",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:24 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Baliyan:2013:FMH,
author = "Niyati Baliyan and Vidushi Sharma and Shivani",
title = "A fuzzy model for high-level clones in software",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--4",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464531",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "High-level similarities in software, referred to as
High-Level Clones (HLCs) may manifest themselves as
behavior clones, concept clones, collocated simple
clones or domain model clones [3]. The presence of such
similarities may deter the maintainability of software,
while identifying them may improve the reuse,
reengineering, evolution and understandability of
software [2]. This study proposes an integrated measure
of high-level cloning, using a four input fuzzy model.
It also proves that the calculated extent of high-level
cloning is practically equal to the simulation result
in the MATLAB's fuzzy toolbox.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Meng:2013:PBL,
author = "Zhang Meng",
title = "{PPCA-based} license plate detection algorithm",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--4",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464541",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Detection of license plates is a critical part of
License Plate Recognition (LPR) systems. In this paper
we employ methods based on Probabilistic Principal
Component Analysis (PPCA) to extract license plate
areas out of vehicle images, and apply an improved
normalization step to data preprocessing. The analysis
of our experiment shows that this algorithm achieves
good accuracy dealing with still vehicle images.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2013:SPM,
author = "Alok Mishra and Deepti Mishra",
title = "Software project management tools: a brief comparative
view",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--4",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464537",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The task of managing a software project can be an
extremely complex one, drawing on many personal, team,
and organizational resources. The quality of a software
product is dependent on the process in which the
project is completed. Time delays in software
development project and low productivity tend to fall
right to the bottom line. Recently, the evolution of
project management tools for both software and
non-software applications has been accelerating at a
rapid pace, and the number of available products have
grown significantly. There are many project management
tools and software being developed everyday to help
managers to automate the administration of individual
projects or groups of projects during their life-cycle.
This article presents a short comparison of popular
software project management tools.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chaudhary:2013:ERA,
author = "Ritika Chaudhary and Ram Chatterjee",
title = "Essence of reusability in aspect-oriented systems",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--5",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464532",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Programmers practicing software development have long
realized that reusability is an important area of
concern --- it is an attribute of quality, which
depicts the extent to which a module can be used again
in different applications with slight modification.
Software professionals often adopt the Module-oriented
Approach (MOA) and / or the Object-Oriented Approach
(OOA) to develop reusable software. However, these
approaches do not address crosscutting concerns (such
as logging, security etc.), which are scattered
throughout the code and which if poorly done adversely
affect reusability and maintainability. Readers may
note that ``reusability'' is a quality attribute whose
assessment remains quite underexplored. This paper
discusses the importance of reusability as a quality
attribute and its essence in Aspect-Oriented Systems.
This paper has been split into Introduction, Quality
Parameters, Conclusion and Future Scope. In the
Introduction, the focus is on how Aspect-Oriented
Software development addresses the problem of
crosscutting concerns. Quality parameters emphasize the
concept of reusability within the domains of
Object-Oriented Programming and Aspect-Oriented
Programming and signify the importance of assessing
reusability in Aspect-Oriented Systems. In the future,
maintainability will be one of the factors to be
considered for assessment of Aspect-Oriented Systems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rao:2013:OST,
author = "K. Koteswara Rao and GSVP Raju and Srinivasan
Nagaraj",
title = "Optimizing the software testing efficiency by using a
genetic algorithm: a design methodology",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--5",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464539",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper presents a design method for optimizing
software-testing efficiency by identifying the most
critical path clusters in a program. This is done by
the application of soft computing techniques,
specifically genetic algorithms. We develop a genetic
algorithm that selects the software path clusters to
test, which are weighted in accordance with the
criticality of the path. Exhaustive software testing is
rarely possible because it becomes intractable for even
medium-sized software applications. Typically only
parts of a program can be tested, but these parts are
not necessarily the most error prone ones. Therefore,
we are designing a more selective approach for testing
the paths that are more critical, which results in
improving the testing efficiency.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hasteer:2013:PAR,
author = "Nitasha Hasteer and Abhay Bansal and B. K. Murthy",
title = "Pragmatic assessment of research intensive areas in
cloud: a systematic review",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--6",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464533",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Cloud computing is a name given to a set of systems
for enabling ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing
resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly
provisioned and released with minimal management effort
or service provider interaction. Cloud computing is
aimed at making an organization more agile and cost
effective. Due to the rapid evolution of Cloud
Computing in the recent past, it is relevant to
investigate the key areas of research of this
technology. In this paper, we present a systematic
review of research intensive areas in the field of
cloud computing. Research papers in the period from
2009 to 2012 were gathered. A total of 36 research
papers were reviewed systematically and categorized
into four broad categories based on the issues
addressed by them. We identified that the majority of
the research papers focused on Cloud Security. By
systematically analyzing the work accomplished so far,
the gaps and yet to be explored areas in this field are
brought to light.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Malhotra:2013:DFT,
author = "Ruchika Malhotra and Divya Tiwari",
title = "Development of a framework for test case
prioritization using genetic algorithm",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--6",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464536",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software Testing is a time and effort consuming part
of the software development life cycle. Retesting a
software application during the maintenance phase, with
the entire test suite and additional test cases for the
modifications in the software, within budget and time,
is a challenge for software testers. Test Case
Prioritization is used to overcome this problem by
prioritizing the test cases in order to maximize
certain testing objectives like fault detection rate,
statement coverage, etc. In this paper, we propose a
framework for test case prioritization that emphasizes
a new metric, APBC$_m$ (modified Average Percentage of
Block Coverage). This metric evaluates the rate of code
coverage by incorporating knowledge about the
significance of blocks of code in the form of weights.
We have used this metric as fitness evaluation function
in a Genetic Algorithm in order to evaluate the
effectiveness of a test case sequence. We have also
developed a tool that implements the Genetic Algorithm
in the Java language in order to compute and validate
the results. Thereafter, we use the tool for test case
prioritization, and compare and assess the results with
those produced by the tool when APBC (Average
Percentage of Block Coverage) is used as fitness
function.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{N:2013:MER,
author = "Parimala N. and Ranjeet Kumar",
title = "Mapping extended rationale diagrams to {OLAP}
queries",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--6",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464538",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We propose a method that enables decision makers to
formulate OLAP queries. Firstly, the decision maker's
analysis requirements are expressed as an extended
rationale diagram. Subsequently, using the extended
rationale diagram, we verify whether it is possible to
get the information from the data warehouse. If it is,
we generate the outline of the corresponding OLAP
query. If it is not, we inform the user about the
missing information.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Zaidi:2013:MVE,
author = "Taskeen Zaidi and Vipin Saxena",
title = "Modeling and validation of execution of tasks on high
speed network under distributed environment",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--6",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464540",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "During the past years, distributed computing approach
has become an integral part of many of the software
companies. This is because of low cost infrastructure
involvement and faster execution of the tasks, sharing
of resources, etc. In the year 2009, the Indian
Government has established distributed network called
as National Knowledge Network (NKN). The main objective
of NKN is to connect all of the Indian universities,
research institutions, computing labs, digital
libraries, countrywide classrooms, etc. In the present
paper, a well-known object-oriented Unified Modeling
Language (UML) is used to construct a model for the
execution of the tasks across a distributed network.
Authors have designed a static step topology for the
faster execution of tasks. Static and dynamic behaviors
of the execution of the tasks are represented through
UML class and state diagrams, respectively. For
validation of the UML model, the state diagram is
converted into a Finite State Machine (FSM) and
different test cases are generated to validate the
proposed model across distributed network
environment.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rao:2013:CPS,
author = "V. Bhujanga Rao and P. Seetha Ramaiah and K. Raja
Kumar",
title = "Clinical programming software to manage patient's data
with a cochlear implant",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--7",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464535",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Auditory prostheses (AP) using Cochlear Implant
System, a.k.a. bionic ears, are widely used electronic
devices that electrically stimulate the auditory nerve
using an electrode array, surgically placed in the
inner ear for patients suffering from severe to
profound senosorineural deafness. The AP mainly
contains an external Body Worn Speech Processor (BWSP)
and an internal Implantable Receiver Stimulator (IRS).
The BWSP receives an external sound or speech and
generates encoded speech data bits for transmission to
the IRS via a Radio Frequency transcutaneous link to
excite the electrode array. After surgical placement of
the electrode array in the inner ear, the BWSP should
be fine-tuned to achieve the 80 to 100\% speech
reception abilities of the patient by an audiologist
using Clinical Programming Software (CPS). The tuning
process involves several tasks such as identifying the
active electrode contacts, determining the detection
and pain threshold of each active electrode, and
loading these values into BWSP by reprogramming the
BWSP. The main objective of this paper is to describe a
simple personal-computer based, user-friendly CPS,
which fine tunes the BWSP to achieve the best possible
speech reception abilities of each patient and to
perform post-operative fitting procedures by an
audiologist. The CPS was developed to perform the
post-operative fine tuning procedures such as (i)
measurement of electrode tissue impedance, (ii) fitting
to determine the hearing threshold and comfort levels
for each active electrode, and (iii) reprogramming the
speech processor using the identified threshold and
comfort values. Finally, experimental results are
presented.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2013:TTO,
author = "Ajay Jain",
title = "Touch target optimization technique using virtual
finger-tip library",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "1--9",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464534",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Touch functionality is the latest mantra for consumers
buying new smartphones or mobile devices. With devices
screens becoming more compact, providing a user
interface with easy navigation and effective usage is
becoming increasingly difficult. Typically, the screens
are designed using relevant design guidelines and work
well for the general majority of people. However, every
user is different. The way they handle the touch
screen, the size of their finger-tips, everything is
different. A single common UI design then fails to
satisfy all the different users. Hence, there is a need
to bridge the existing gap between the device UI screen
design and the variances attached with users' touch
inputs. Our latest work1, discussed in this paper,
solves this challenge to a significant extent by
providing a library of virtual finger-tip entries. Each
finger-tip entry in the library is pre-attached with a
specific surface area attached to it. These
finger-tips, although virtual, are provided with the
functionality that they act as wearable objects for a
device user. Once worn, the device owner need not worry
about their actual finger-tip size (that is, the
surface area of user's finger on the device screen).
Irrespective of a user's actual finger-tip size, when
you place your finger on any icon on the screen, it
uses exactly the same surface area that the virtual
finger-tip uses. Virtual finger-tip sizes are
calculated dynamically based on the relative size
interpretations from the actual finger-tip size and the
touch inputs to the device. Multiple virtual finger
tips options are listed in the library enabling a
device user to select the most appropriate one
depending on the touch target they plan to work on.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2013:SEEb,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "5--6",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464527",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Krishnamurthi:2013:AES,
author = "Shriram Krishnamurthi",
title = "Artifact evaluation for software conferences",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "7--10",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464530",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software and other digital artifacts are amongst the
most valuable contributions of computer science. Yet
our conferences treat these mostly as second-class
artifacts--especially conferences in the software
sciences, which ought to know better. This article
argues for elevating these other artifacts by making
them part of the evaluation process for papers, and
reports on experience from an iteration of an Artifact
Evaluation Committee for ESEC/FSE 2011.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2013:SNSc,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "11--20",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464528",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2013:RPc,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "21--28",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464529",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ebert:2013:BRS,
author = "John Ebert",
title = "Book Review: {{\booktitle{SOA with REST: principles,
patterns \& constraints for building enterprise
solutions with REST}} by Thomas Erl, Benjamin Carlyle,
Cesare Pautasso, Raj Balasubramanian}",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "32--33",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464551",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gvero:2013:BRC,
author = "Igor Gvero",
title = "Book Review: {{\booktitle{Core Java volume I:
fundamentals}}, 9th edition by Cay S. Horstmann and
Gary Cornell}",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "33--33",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464552",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2013:BRM,
author = "Robert Schaefer",
title = "Book Review: {{\booktitle{Managing the unmanageable:
rules, tools, and insights for managing software people
and teams}} by Micky W. Mantle and Ron Lichty}",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "34--35",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464553",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRL,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Learning JavaScript: a
hands-on guide to the fundamentals of modern
JavaScript}} by Tim Wright}",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "35--36",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464554",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:TTD,
author = "Vasile G. Teodorovici",
title = "{Tcl\slash Tk}: a developer's guide, third edition by
Clif Flynt",
journal = j-SIGSOFT,
volume = "38",
number = "3",
pages = "36--36",
month = may,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2464526.2464555",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:25 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2013:NAS,
author = "Paritosh Jain and Nitish Garg",
title = "A novel approach for slicing of object oriented
programs",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--4",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492266",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper extends the graph-less technique proposed
by Beszedes for slicing Object Oriented Programs. The
proposed approach computes the dynamic slices of the
OOPs, especially, in case of polymorphism. The approach
generates the defined-used (d-u) chains of the objects
and variables used in the program and computes the
slice using the generated d-u chains; it then debugs
the program by detecting the various possible bugs and
generates messages suggesting that a bug may be
present. A GUI tool has been developed to compute and
display the computed slices. The tool allows the user
to browse the program and see the generated advice.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Raina:2013:ATR,
author = "Shikha Raina and Arun Prakash Agarwal",
title = "An automated tool for regression testing in web
applications",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--4",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492272",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Regression testing of web applications is a costly
activity as it tends to generate more test cases than
the previous stages of software testing. This cost can
be reduced significantly by identifying and testing
only the modified parts of a web application. This will
require locating the changes that have been introduced
in the web application from the previous version that
was tested. In this paper we have introduced an
automated tool for locating the changes in the web
application which will thereby aid in effective
regression testing of the application. This tool
compromise of 3 parts, (a) a web crawler that crawls
the web application, (b) an HTML DOM tree generator
that generates the DOM tree for a specified web page,
(c) an comparator that compares the new DOM tree with a
previous version of the DOM tree stored in our
system.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{S:2013:NSO,
author = "Indu S. and Srinivas N. K. and Harish P. J. and
GangaPrasad R. and Nobby Varghese and N. S. Sreekanth
and Supriya N. Pal",
title = "[{NLP@Desktop}]: a service oriented architecture for
integrating {NLP} services in desktop clients",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--4",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492265",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Research and development in Natural Language
Processing (NLP) has made significant progress over the
last decade. Many robust NLP systems have been
developed for handling machine translation,
question-answering, summarization, topic detection,
cluster analysis, information extraction, named entity
recognition (NER), etc. Despite this advancement in NLP
research, the results are still not accessible for
common desktop users. In the current scenario, it is
difficult to integrate a new NLP tool with the existing
text processing applications. To overcome this, we have
implemented a service deployer framework based on
DBus[1] for the seamless integration of NLP
applications with desktop clients like email clients,
word processors, browsers etc. This framework enables
NLP researchers to make their products equipped for the
desktop clients with minimal efforts.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Badri:2013:RBU,
author = "Mourad Badri and Linda Badri and William Flageol",
title = "On the relationship between use cases and test suites
size: an exploratory study",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--5",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492261",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software testing, which plays a crucial role in
software quality assurance, is a time and resource
consuming process. It is, therefore, necessary to
estimate as soon as possible the effort required to
test software, so that activities can be planned and
resources can be optimally allocated. Unfortunately,
little is known about the prediction of the testing
effort. In this paper, we address the testing effort
from the perspective of test suites size. The study
presented aims at exploring empirically the
relationships between use cases and the size of test
suites in object-oriented systems. We introduce four
metrics to characterize the size and complexity of use
cases. The size of test suites is measured in terms of
lines of test code. We performed an experimental study
using data collected from five cases studies. Results
provide evidence that there is a significant
relationship between use case metrics and the size of
test suites.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Goel:2013:ARO,
author = "Brij Mohan Goel and Pradeep Kumar Bhatia",
title = "Analysis of reusability of object-oriented systems
using object-oriented metrics",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--5",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492264",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In object-oriented systems, assessing reusability
plays a key role in reducing a cost and improving the
quality of the software. Object-oriented programming
helps in achieving the concept of reusability through
different types of inheritance programs, which further
help in developing reusable software modules. And
object-oriented metrics identify the effectiveness of
each reuse strategy. Software reusability has
considerable effect on software quality. Software
quality increases as reuse of software components
increases. But software quality improvement cannot be
understood unless it is measured. This paper focuses on
an empirical evaluation of object-oriented metrics in
C++ using three different object-oriented features.
Three programs have been considered as input for the
study --- the first program uses multilevel
inheritance, the second program uses multiple
inheritance and the third program uses hierarchical
inheritance. We have found that multilevel inheritance
has more impact on reusability among these three
features.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Pandey:2013:SEA,
author = "Adesh Kr. Pandey and C. P. Agrawal and Arun Sharma and
P. Sasikala",
title = "Study of empirical approaches to analyze the software
metrics",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--5",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492270",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software affects nearly every aspect of human lives.
Software functional quality is a key to achieve
industrial and business relevance, in particular to
industrial development and growth. Software metrics are
important indicators to improve the processes and
products in all organizations. They define baselines of
quality and productivity and enable comparisons against
industry averages that help in identifying
opportunities for improvement. In addition, Software
metrics design and analysis are major activities in the
software development life cycle. Software metrics play
a vital role in software cost, quality, scheduling,
reliability and maintenance. There are various methods
to decide which metrics should be used for which
purposes. Attributes of a metric may be independent; or
attributes may depend on one another. Analytical
Hierarchy Process (AHP) is used to assign weights to
various parameters of a decision model when they are
related to each other in a particular hierarchy.
Analytical Network Process (ANP) and Fuzzy ANP are used
to solve the decision problem, where attributes of
decision parameters form dependency networks. The
objective of this paper is to explore the possibilities
of using empirical approaches like AHP, ANP and Fuzzy
ANP to analyze the software metrics by measuring the
weights of different attributes.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Taibi:2013:ROS,
author = "Fathi Taibi",
title = "Reusability of open-source program code: a conceptual
model and empirical investigation",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--5",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492276",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Reusing program modules is one of the most direct and
useful ways to develop cost effective software,
especially with the availability of huge amounts of
open-source projects. Reuse saves cost, increases the
speed of development and improves software reliability.
The quality of popular open-source packages is good as
shown by various empirical studies. However, the
quality of less known packages and the large number of
projects developed by programming enthusiasts is
unknown. Reusing them may be the source of more
problems rather than being a solution to a problem. In
this paper, a conceptual model is proposed to measure
the reusability of program modules. A balanced set of
well-established metrics is used to compute the most
significant factors of reusability and an empirical
investigation is conducted to measure the reusability
of the modules of randomly selected open-source Java
projects. The results obtained are thoroughly analyzed
to discover the real reusability potential of
open-source program code together with suggestions on
how to improve this potential.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2013:RBR,
author = "Kuldeep Kumar and Sandeep Kumar",
title = "A rule-based recommendation system for selection of
software development life cycle models",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--6",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492269",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The selection of a software development life cycle
(SDLC) model for a software project is highly dependent
upon the characteristics of the software product to be
developed. We classified software products according to
characteristics that matter for SDLC selection. We
surveyed literature to elicit recommendations for SDLC
selection. We formalized our findings to present a rule
based recommendation system that can be helpful to
software developers in selecting the most appropriate
SDLC model to be used for the development of a software
product. We conducted an initial evaluation of our
system. We believe our SDLC recommendation system
provides useful hints for selecting an SDLC, and
provides a base for validating and refining SDLC
recommendation rules.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Varshney:2013:SBS,
author = "Sapna Varshney and Monica Mehrotra",
title = "Search based software test data generation for
structural testing: a perspective",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--6",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492277",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software testing is an important and expensive phase
of the software development life cycle. Over the past
few decades, there has been an ongoing research to
automate the process of software testing but the
attempts have been constrained by the size and the
complexity of software especially due to the use of
dynamic memory allocation which makes the software
behavior highly unpredictable. The use of metaheuristic
global search techniques for software test data
generation has been the focus of researchers in recent
years. Many new techniques and hybrid methods have been
proposed to tackle the problem more effectively. This
study provides an overview of the various techniques
that have been applied for structural test data
generation. It also presents the open areas, challenges
and future directions in the field of search based
software testing with an emphasis on test data
generation for structural testing.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bhasin:2013:CAB,
author = "Harsh Bhasin and Neha Singla and Shruti Sharma",
title = "Cellular automata based test data generation",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--7",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492262",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Manual Test Data Generation is an expensive, error
prone and tedious task. Therefore, there is an
immediate need to make the automation of this process
as efficient and effective as possible. The work
presented intends to automate the process of Test Data
Generation with a goal of attaining maximum coverage. A
Cellular Automata system is discrete in space and time.
Cellular Automata have been applied to things like
designing water distribution systems and studying the
patterns of migration. This fascinating technique has
been amalgamated with standard test data generation
techniques to give rise to a technique which generates
better test cases than the existing techniques. The
approach has been verified on programs selected in
accordance with their Lines of Code and utility. The
results obtained have been verified. The proposed work
is a part of a larger system being developed, which
takes into account both black box and white box
testing.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dalal:2013:ESR,
author = "Sandeep Dalal and Rajender Singh Chhillar",
title = "Empirical study of root cause analysis of software
failure",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--7",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492263",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Root Cause Analysis (RCA) is the process of
identifying project issues, correcting them and taking
preventive actions to avoid occurrences of such issues
in the future. Issues could be variance in schedule,
effort, cost, productivity, expected results of
software, performance parameters and customer
satisfaction. RCA also involves collecting valid data,
analyzing it, deriving metrics and finding root causes
using RCA methods. In this paper we will do Root cause
analysis of some severe software failures that happened
in the past and of some failures in ongoing projects in
the software Industry. We will also describe various
RCA methods and processes used in the software Industry
to reduce the chances of software failure.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rai:2013:BIO,
author = "Deepak Rai and Kirti Tyagi",
title = "Bio-inspired optimization techniques: a critical
comparative study",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--7",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492271",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Despite insistent and breathtaking advances in
computing, we continue to be humbled by the variety and
adaptability of the natural world around us.
Bio-inspired optimization is a term that covers a wide
variety of computational approaches that are based on
the principles of biological systems. This motivates
the application of biology to optimization problems.
Biologically inspired computing and optimization is a
major subset of natural computation. This paper
presents a critical survey of bio-inspired optimization
techniques. There are many legacy optimization
techniques available. This survey explains almost all
important bio-inspired optimization techniques based on
their development, intention, performance and
application. It provides insight into determining the
direction of future optimization techniques research.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singhal:2013:CRV,
author = "Abhishek Singhal and Abhay Bansal and Avadhesh Kumar",
title = "A critical review of various testing techniques in
aspect-oriented software systems",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--9",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492275",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software testing is a very crucial phase of the
software development life cycle. In order to develop
quality software using any approach such as
module-oriented, object-oriented, aspect-oriented and
componentbased, testing plays a crucial role.
Aspect-Oriented Programming (AOP) is a relatively new
software development approach and testing of software
developed using this approach has not matured enough.
Researchers have proposed various testing techniques
for AOP. It is important to analyze existing
Aspect-Oriented testing techniques in order to develop
new, better, more efficient techniques. This paper
presents a critical review of various existing testing
techniques for AOP.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jiang:2013:CBP,
author = "JianMin Jiang and Shi Zhang and Ping Gong and Zhong
Hong",
title = "Configuring business process models",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--10",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492267",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "A configurable business process model (sometimes
referred to as a reference business process model) may
be configured to meet the specific requirements of an
organization. The configuration activity is required to
automatically determine the variability of a
configurable process model and ensure the correctness
of a specific process model. However, few approaches
solve the problem. In this paper, we propose an
innovative approach for automatically separating a
configurable process model into atomic and correct
sub-process models (sub-process models without abnormal
behavioral problems). The atomic sub-process models
that fulfill specific requirements are merged into
specific process models that are provided for
organizations. Compared with existing approaches, since
the configuration activity is incorporated into the
verification process of a process model at design time
and can obtain all feasible configurations, our
approach avoids independently handling the
configuration activity and does not suffer from
computational complexity. Moreover, our approach is
language-independent. We have developed a prototype
tool for configuring these process models.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Voola:2013:CRP,
author = "Persis Voola and A. Vinaya Babu",
title = "Comparison of requirements prioritization techniques
employing different scales of measurement",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--10",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492278",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The objective of this paper is to conduct a controlled
experiment with the three requirements prioritization
techniques: Numerical Assignment (NA), Analytic
Hierarchy Process (AHP) and Extensive Numerical
Assignment (ENA), each based on ordinal, ratio and
interval scales respectively. NA and AHP are widely
used traditional requirements prioritization
techniques. ENA is a novel technique introduced by the
authors, which acknowledges the uncertain and
incomplete nature of human judgment about requirements
priorities, which are in turn uncertain guesses about
the upcoming product. The aim of the experiment is to
examine the three techniques using various objective
and subjective measures like number of decisions, time
consumption, ease of use, attractiveness, scalability
and reprioritizability. The experiment was executed by
prioritizing the requirements of a university website
system with students as participants in the experiment.
The results of the experiment proved that ENA
transcends NA and AHP.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Shareef:2013:CCA,
author = "Jawwad Wasat Shareef and R. K. Pandey",
title = "{CAME}: {Component Assembly Metrics Extraction} using
{UML}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--12",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492273",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In Object-Oriented software development, complexity
metrics help software engineers to identify the
deficiencies in the design of the software system that
are likely to become problem points in the subsequent
phases of the SDLC, like testing and maintenance.
Metrics for Component Based Software Development (CBSD)
have also been proposed by the researchers. Lately the
emphasis has been on metrics that are applicable during
early phases of the SDLC. The XML Meta Data Interchange
(XMI) standard has been implemented in most of the
commercial and open source UML tools. It is now
possible to automate the metrics extraction procedure
right from the UML design documents. Detection of
design deficiencies early in the design phase saves a
lot of time and effort and results in a more
maintainable design. In the present paper, we discuss
the design and implementation of a metrics tool for
CBSD. We have implemented component based metrics in a
parser-based tool, which hereafter we refer to as CAME
(Component Assembly Metrics Extraction), to calculate
metrics from UML design documents. CAME is capable of
generating software metrics proposed by researchers for
Component Based Software Systems. We demonstrate our
tool using UML component assembly diagrams for a
University Case Registration System (UCRS) and its
representation in UML and metrics extraction
procedure.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Shirole:2013:UBM,
author = "Mahesh Shirole and Rajeev Kumar",
title = "{UML} behavioral model based test case generation: a
survey",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--13",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492274",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In software engineering, system modeling is the
process of formulating a representation of a real
system in an abstract way to understand its behavior.
Software testing encourages reusing these models for
testing purpose. This expedites the process of test
case generation. UML structural and behavioral
specification diagrams have been used by testing
researchers for generation of test scenarios and test
data. The aim of this survey is to improve the
understanding of UML based testing techniques. We have
focused on test case generation from the behavioral
specification diagrams, namely sequence, state chart
and activity diagrams. We classify the various research
approaches that are based on formal specifications,
graph theoretic, heuristic testing, and direct UML
specification processing. We discuss the issues of test
coverage associated with these approaches.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jones:2013:FPU,
author = "Capers Jones",
title = "Function points as a universal software metric",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "1--27",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492268",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Function point metrics are the most accurate and
effective metrics yet developed for software sizing and
also for studying software productivity, quality,
costs, risks, and economic value. Unlike the older
``lines of code'' metric function points can be used to
study requirements, design, and in fact all software
activities from development through maintenance. In the
future function point metrics can easily become a
universal metric used for all software applications and
for all software contracts in all countries. The
government of Brazil already requires function points
for all software contracts, and South Korea and Italy
may soon follow. However, there are some logistical
problems with function point metrics that need to be
understood and overcome in order for function point
metrics to become the primary metric for software
economic analysis. Manual function point counting is
too slow and costly to be used on large software
projects above 10,000 function points in size. Also,
application size is not constant but grows at about 2\%
per calendar month during development and 8\% or more
per calendar year for as long as software is in active
use. This paper discusses a method of high-speed
function point counting that can size any application
in less than two minutes, and which can predict
application growth during development and for five
years after release. This new method is based on
pattern matching and is covered by U.S. utility patent
application and hence is patent pending.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Anderson:2013:IC,
author = "Glyn Anderson",
title = "Idle cycles",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "6--9",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492284",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2013:BES,
author = "Robert Schaefer",
title = "Business-efficient software development processes",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "7--8",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492283",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2013:SNSd,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "10--18",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492250",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2013:RPd,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "19--24",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492249",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wang:2013:RFA,
author = "Qianxiang Wang and Lin Liu",
title = "Report on the {Fourth Asia-Pacific Symposium on
Internetware (Internetware 2012)}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "25--26",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492281",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Internet provides an open infrastructure for
exchanging and sharing information resources among
people all over the world. The rapid development and
wide application of the Internet makes it a new
mainstream platform for using, developing, deploying
and executing software systems. In order to provide an
interactive forum for researchers and professionals
from related disciplines to meet and exchange ideas
addressing the challenges in the Internetware setting,
the Technical Committees on Software Engineering and
System Software of China Computer Federation (CCF)
sponsored the Asia-Pacific Symposium on Internetware
series, with ACM's Cooperation. In this report, we
report news from the Internetware 2012, specially the 5
keynotes and 4 regular papers that were recommended for
publication in a special issue on ``Internetware'' of
the International Journal of Software and Informatics
after presented at the symposium.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Xie:2013:RIS,
author = "Tao Xie and Lu Zhang and Hong Mei",
title = "Report on the {International Symposium on High
Confidence Software (ISHCS 2011\slash 2012)}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "27--33",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492282",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "To provide a forum for researchers in related research
areas to address the challenges in high confidence
software, exchange ideas, and foster collaborations,
the Institute of Software and Key Laboratory of High
Confidence Software Technologies (Ministry of
Education) at Peking University hosted and sponsored
the International Symposium on High Confidence Software
in 2011 and 2012. The symposium consisted of a series
of invited talks from internationally known researchers
on the symposium topic, discussion/panel sessions, and
poster sessions to enable substantial interactions
among attendees.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chapelle:2013:BRP,
author = "Gregory Chapelle",
title = "Book Review: {{\booktitle{A practical guide to Linux
commands, editors, and shell-programming}}, third
edition by Mark G. Sobell}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "38--38",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492251",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kimm:2013:BRO,
author = "Larry Kimm",
title = "Book Review: {{\booktitle{It's our research: getting
stakeholder buy-in for user experience research
projects}} by Tomer Sharon}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "38--39",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492252",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Paige:2013:BRT,
author = "Michael Paige",
title = "Book Review: {{\booktitle{The tangled web: a guide to
securing modern web applications}} by Michal
Zalewski}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "39--40",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492253",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saur:2013:BRD,
author = "Joe Saur",
title = "Book Review: {{\booktitle{Design for Emotion}} by
Trevor van Gorp and Edie Adams}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "40--40",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492254",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRS,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Security and privacy for
Microsoft Office 2010 users}} by Mitch Tulloch}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "40--41",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492255",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRU,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Ubuntu unleashed}}, 2013
edition by Matthew Helmke with Andrew Hudson and Paul
Hudson}",
journal = j-SIGSOFT,
volume = "38",
number = "4",
pages = "41--41",
month = jul,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2492248.2492256",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:27 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Terra:2013:QCC,
author = "Ricardo Terra and Luis Fernando Miranda and Marco
Tulio Valente and Roberto S. Bigonha",
title = "{Qualitas.class Corpus}: a compiled version of the
{Qualitas Corpus}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--4",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507314",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper documents a compiled version of the
Qualitas Corpus named Qualitas.class Corpus. We provide
compiled Java projects for the 111 systems included in
the corpus. We also gathered a large amount of metrics
data (such as measurements from complexity, coupling,
and CK metrics) about the systems. By making
Qualitas.class Corpus public, our goal is to assist
researchers by removing the compilation effort when
conducting empirical studies.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Raghunath:2013:DRB,
author = "Amritha Raghunath and Sadhana Ramachandran and
Selvakumar Subramanian and Sreevatsan Vaidyanathan",
title = "Data rate based adaptive thread assignment solution
for combating the {SlowPOST} denial of service attack",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--5",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507310",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Denial of Service (DoS) attacks represent a major
threat to network security, especially in today's
networked world. There has been significant research in
this area, primarily focused on mitigating and
preventing DoS attacks affecting transport layer
services. This paper addresses issues arising from a
new variation of a DoS attack, namely the SlowPOST
attack that affects Application Layer services. In
SlowPOST, the malicious clients send data at a slow
rate after the connection is established, and the
server is left waiting for the data to arrive. These
attacks are particularly devastating due to their
ability to resist detection due to their protocol
compliance. In addition, such attacks do not require
the massive resources that DoS attacks normally
require, making them easier to launch. Some solutions
for this issue have already been deployed in some
commercial servers. These solutions are based on either
monitoring traffic or enforcing a time limit on the
transmission of the protocol headers. In order to
achieve reliable detection, the detection parameters
need to adapt to the constantly changing traffic. This
paper proposes a novel algorithm that uses the data
rate of connections to evolve a threshold for
determining potential attackers in SlowPOST. This
proposed method is tested by subjecting a server to an
attack, and it was observed that in the absence of this
method, the servicing of legitimate requests is not
completed.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2013:MMQ,
author = "Gagandeep Singh",
title = "Metrics for measuring the quality of object-oriented
software",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--5",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507311",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper presents metrics for measuring the quality
of object-oriented software. Quality of software
generally depends on five parameters namely efficiency,
understandability, complexity, reusability and
maintainability. All of these parameters are associated
with certain metrics. Quality of software can be
measured by using object-oriented metrics. Software
tends to become more complex over a series of releases
and maintaining them becomes a more difficult task.
Thus quality of software also tends to decrease over
time. In this paper, a study is performed using
object-oriented metrics that are computed over
different releases of the software application
JFreeChart.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bajaj:2013:MPD,
author = "Punam Bajaj and Vineet Arora",
title = "Multi-person decision-making for requirements
prioritization using fuzzy {AHP}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--6",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507302",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The success of a system depends upon how effectively
it accomplishes its intended purpose by meeting all
stakeholders' concerns pertaining to conflicting
requirements such as cost, size, time, performance etc.
Conflicts occur because the requirements are
individually refined, without consideration to how they
may impact the other stakeholders in the system. As the
stakeholders' concerns are uncertain and subjective in
nature, this paper proposes a novel approach to
prioritize the conflicting requirements using Fuzzy
Analytic Hierarchy Process and an alpha cut. A total
compatible ordering is achieved to resolve the
conflicting preferences of the stakeholders. It assists
the project managers to develop a system that meets the
expectations of all the stakeholders. A case study of
the Travel Management Planning Website is presented to
illustrate the application of the methodology.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2013:TGC,
author = "Pavitdeep Singh and Satwinder Singh and Jatinder
Kaur",
title = "Tool for generating code metrics for {C\#} source code
using abstract syntax tree technique",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--6",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507312",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/csharp.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software maintenance is one of the key activities in
any software engineering process in which source code
analysis plays a crucial role. Due to the high cost of
maintenance, it has become quite necessary to produce
high quality software. Over time, numerous analyses
have been performed on source code to determine
complexity and other metrics. Lots of papers have been
published for object oriented languages but mostly
concentrating on C++ and Java, very few has been
published for more modern languages like C\#. This
paper proposes a Software Quality Assurance Tool for
measuring the different code metrics for the object
oriented language C\# at the class and method levels.
The technique consists of generating the abstract
syntax tree of the source code using Nfactory
libraries. The Interface is built using the Win Form
application which provides an impressive GUI for the
tool.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sinhal:2013:NFB,
author = "Amit Sinhal and Bhupendra Verma",
title = "A novel fuzzy based approach for effort estimation in
software development",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--6",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507313",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Accurate and credible software effort estimation is
always a challenge for academic research and software
industry. In the beginning, estimation was carried out
using only human expertise or algorithmic models, but
more recently, interest has turned to a range of Soft
Computing techniques. New paradigms such as Fuzzy Logic
enable a choice for software effort estimation.
Constructive Cost Model (COCOMO) is considered to be
the most widely used model for effort estimation.
Effort drivers have immense influence on COCOMO and
this paper investigates the role of cost drivers
(effort features) in improving the precision of effort
estimation using Fuzzy Logic. Fuzzy logic-based
estimation models are more appropriate when indistinct
and incorrect information is to be used. This paper
aims at estimating effort in an efficient way using a
Fuzzy technique. For this purpose, the COCOMO81 dataset
and the Fuzzy Inference System (FIS) of MATLAB are used
for implementation. At the end, the outcomes are
compared against traditional methods using parameters
like Mean Magnitude of Relative Error (MMRE) and Pred
(25).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ahmad:2013:FAA,
author = "Aakash Ahmad and Pooyan Jamshidi and Claus Pahl",
title = "A framework for acquisition and application of
software architecture evolution knowledge: 14",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--7",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507301",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software systems continuously evolve as a consequence
of frequent changes in their functional requirements
and the environment surrounding them.
Architecture-centric software evolution (ACSE) enables
changes in software structure and behaviour while
abstracting the complex implementation-specific
details. However, due to recurring evolution there is a
need for solutions that enable a systematic reuse of
frequent changes in software architectures. In recent
years, architecture change patterns and evolution
styles proved successful in promoting reuse expertise
to tackle architecture evolution. However, there do not
exist any solutions that enable a continuous
acquisition and application of architecture evolution
knowledge to systematically address frequent changes in
software architectures. In this paper, we propose a
framework PatEvol that aims to unify the concepts of
(i) software repository mining and (ii) software
evolution to enable acquisition and application of
architecture evolution knowledge. In the proposed
PatEvol framework, we present knowledge acquisition
(architecture evolution mining) to enable post-mortem
analysis of evolution histories to empirically discover
evolution-centric knowledge. Furthermore, we support
reuse of discovered knowledge to enable knowledge
application (architecture evolution execution) that
enables evolution-off-the-shelf in software
architectures. Tool support facilitates the knowledge
acquisition and knowledge application processes in the
PatEvol framework.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hazra:2013:CAR,
author = "Rumpa Hazra and Shouvik Dey and Ananya Kanjilal and
Swapan Bhattacharya",
title = "Comparative analysis of real time resource access
control protocols using {UML} 2.0",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--7",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507305",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The behaviors of real time software systems do not
depend only on the values of input and output signals,
but also on the times of their occurrences. Real time
systems (RTS) interact with their environments using
time constrained input/output signals. The complexity
of Real Time Systems is continually increasing which
makes their design very challenging. In RTS, the
scheduling of tasks with hard deadlines has been an
important area of research. Unified Modeling Language
(UML), the standard visual object-oriented modeling
language, is suitable to deal with this complexity. The
main objective of this paper is to compare two
protocols using UML 2.0 models. The shortcomings of the
existing Priority Inheritance protocol are represented
using one UML model. Further, the Stack Based Priority
Ceiling protocol is used to overcome this difficulty
using an improved model.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{DeSousaCoelho:2013:SDM,
author = "Jailton {De Sousa Coelho, Jr.} and Jos{\'e} Luis Braga
and Bernardo Giori Ambr{\'o}sio",
title = "System dynamics model for simulation of the software
inspection process",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--8",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507306",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Repairing a defect in the late phases of software
development can be a hundred times more expensive than
finding and fixing it during the requirements and
design phase. Software inspection is a technique that
may be used to aid in the identification of defects
during early stages of the process and avoid
propagation of such defects to later phases. The
cost-benefit of inspections may be significant if they
are efficiently performed. Since this process is
affected by several quality factors, the analysis of
the overall context of inspection may become complex.
Project managers are reluctant to introduce inspection
due to uncertainty regarding its real benefits. This
paper presents a system dynamics model, which is a
descriptive technique for systems modeling and
simulation and involves several variables that strongly
influence inspection efficiency. The influence levels
of model variables are quantified based on real or
empirical experiments reported in the literature, in
order to approximate model results to values that would
be obtained in the real world. The model allows the
reproduction of scenarios without paying the costs and
facing the risks of a real project implementation.
Therefore, it enables the analysis of inspection
effects on the software development process.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2013:MSD,
author = "Ajay Jain and Kusha Chopra",
title = "Malware signing detection system",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--8",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507307",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software malware not only creates financial damages to
corporate and individual computer users, but also
invades privacy, exploits their devices and induces
other significant losses. While efficient tools and
technologies that control and limit malware spread
across devices in the public domain are being
developed, the problem is far from being resolved. We
worked on a methodology that uses techniques to detect
malware during in-house development and prevents
malware from being released in the field. This work
helps determine and handle situations where a person,
authorized to access an authentic signing certificate
[1] signs malware (or set of file(s)) intended to
perform harmful operations, such as spreading a virus
on a computer using the said certificate, and releases
the malicious code publicly or to a community.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bhasin:2013:CGT,
author = "Harsh Bhasin and Neha Singla",
title = "Cellular-genetic test data generation",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--9",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507303",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Test Data Generation is the soul of automated testing.
The dream of having efficient and robust automated
testing software can be fulfilled only if the task of
designing a robust automated test data generator can be
accomplished. In the work we explore the gaps in the
existing techniques and intend to fill these gaps by
proposing new algorithms. The following work presents
algorithms that handle almost all the constructs of
procedural programming languages. The proposed
technique uses cellular automata as its base. The use
of Cellular Automata brings a blend of artificial life
to the work. The work is a continuation of our earlier
attempt to amalgamate Cellular Automata based
algorithms to generate test data. The technique has
been applied to C programs and is currently being
tested on a financial enterprise resource planning
system. Since, the solution of most of the problems can
be found by observing nature, we must explore
artificial nature to accomplish the above task.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chanda:2013:BSE,
author = "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
and Swapan Bhattacharya",
title = "Behavioral and structural evolution of {SOA} from
{OO}: an integrated approach",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--9",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507304",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Service Oriented Architecture caters to the
``Separation of Concerns'' and incorporates
reusability, granularity, modularity, componentization
and interoperability. There are many software products
that have been developed in the object-oriented
paradigm. To incorporate the positive aspects of the
service-oriented paradigm, they need to be evolved to
the service-oriented domain. In this paper, we define
an integrated approach towards consistent evolution of
Object Oriented (OO) paradigm to the Service Oriented
(SOA) domain. There are some proven Object Oriented
Design Tools that can be used for Service Oriented
Application design incorporating both the behavioral
and structural aspects. The work in this paper involves
a set of activities like formalizing the different UML
diagrams, formal mapping of object components to
service level components and establishing consistency
among them. We also establish a traceability model for
consistent evolution of Service Oriented Applications
from existing Object Oriented Applications by mapping
behavioral and structural artifacts of both domains.
This will establish traceability from implementation
phases back to the requirements phases of an SOA
application.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jalila:2013:EEO,
author = "A. Jalila and D. Jeya Mala",
title = "Empirical evidence on {OCL} formal specification-based
metrics as a predictor of fault-proneness",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--10",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507308",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "OCL formal specification has been widely used for
precise software modeling. In general, it is used to
express constraints on design documents. As a novel
approach, its usage can be extended to support
effective testing, such as testing fault-prone
components to improve software quality. In this paper,
CK (Chidamber and Kemerer) metrics that can be
extracted from OCL expressions are validated against
module complexity. Moreover, our study proposes a new
metric suite that can be directly extracted from OCL
expressions to quantify module complexity. A weight has
been assigned to each metric to reflect its importance
in fault-prone component identification. Our study
shows that metrics collected from OCL specifications
are good predictors of the fault-prone components of a
system during design time. An early knowledge of
fault-prone components of the system can be useful to
distribute efforts required for software development
and testing activities.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mala:2013:CCT,
author = "D. Jeya Mala and K. Sabari Nathan and S. Balamurugan",
title = "Critical components testing using hybrid genetic
algorithm",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "1--13",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507309",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As quality of software plays a vital role in real time
systems, it is essential to identify the crucial parts
in the system and to test them effectively. In the
proposed approach, the critical components are
identified by means of mutation based impact analysis.
The next task is to test the critical components using
the Hybrid Genetic Algorithm (HGA) based test case
generation and optimization approach. The mutants are
automatically generated by seeding faults into each
method of all the components in the Software Under Test
(SUT). The initial set of test cases is generated using
randomized test data. The generated test cases are
executed over the original and the mutant to identify
whether the test case detects the error or not. Based
on the results, the Mutation Score (MS) is calculated,
which always lies between 0 and 1. The best test cases
are chosen based on having higher mutation scores and
are executed on mutants to analyze how each component
affects the other components in the SUT. Based on the
analysis, the critical components are identified and
they need rigorous testing using the test cases
generated by the HGA. The algorithm uses the RemoveTop
and LocalBest improvement heuristics to achieve near
optimal solutions. In unit testing, the test cases are
executed against the original and the mutant. The test
case optimization is done by evaluating the
effectiveness of test suites using the Mutation Score
and the Branch Coverage Value (BCV). In pair-wise
testing, the effective test cases are selected based on
the higher mutation scores and branch coverage values.
The components are executed against these test cases
and the execution traces are recorded. The traced
results are compared against the expected outputs which
were previously stored in the repository and the
statuses are updated. Based on the statuses, the faulty
methods are revealed. The efficiency of the proposed
approach is compared with Genetic Algorithm (GA) and we
concluded that the final test suite size and the total
execution time are reduced in the proposed approach.
Finally various graphs and PDF reports are generated
for visualization purposes.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Raccoon:2013:U,
author = "Raccoon and Dog",
title = "Unknownness",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "8--17",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507318",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2013:Pa,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "17--18",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507319",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2013:SEEc,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "18--18",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2517896",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2013:SNSe,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "19--27",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507290",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2013:RPe,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "28--33",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507289",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Prikladnicki:2013:CHA,
author = "Rafael Prikladnicki and Yvonne Dittrich and Helen
Sharp and Cleidson {De Souza} and Marcelo Cataldo and
Rashina Hoda",
title = "Cooperative and human aspects of software engineering:
{CHASE} 2013",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "34--37",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507321",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software is created by people for people working in a
range of environments and under various conditions.
Understanding the cooperative and human aspects of
software development is crucial in order to comprehend
how methods and tools are used, and thereby improve the
creation and maintenance of software. Both researchers
and practitioners have recognized the need to
investigate these aspects, but the results of such
investigations are dispersed in different conferences
and communities. The 6th workshop on Cooperative and
Human Aspects of Software Engineering held at the
International Conference on Software Engineering
continued the tradition from earlier workshops and
provide a lively forum to discuss current developments
and high quality research in the field, providing both
a meeting place for the community and the possibility
for researchers interested in joining the field to
present and discuss their work in progress and to get
an overview of the field. Further dissemination of
research results will lead to improvement of software
development and deployment across the globe.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dingsoyr:2013:RCL,
author = "Torgeir Dings{\o}yr and Nils Brede Moe",
title = "Research challenges in large-scale agile software
development",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "38--39",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507322",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Agile software development methods are increasingly
used in large-scale software development. This article
summarizes some of the discussion on research
challenges in large-scale agile development at a
workshop at the International Conference on Agile
Software Development (XP2013), in the form of a
research agenda.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Galster:2013:VSE,
author = "Matthias Galster and Mehdi Mirakhorli and Jane
Cleland-Huang and Janet E. Burge and Xavier Franch and
Roshanak Roshandel and Paris Avgeriou",
title = "Views on software engineering from the twin peaks of
requirements and architecture",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "40--42",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507323",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The disciplines of requirements engineering (RE) and
software architecture (SA) are fundamental to the
success of software projects. Even though RE and SA are
often considered in isolation, drawing a line between
RE and SA is neither feasible nor reasonable as
requirements and architectural design impact each
other. This observation motivated the Twin Peaks model
that was the subject of the Second International
Workshop on the Twin Peaks of Requirements and
Architecture ([email protected] 2013). [email
protected] 2013 was held in conjunction with the 35th
International Conference on Software Engineering 2013
in San Francisco, CA. The workshop aimed at providing a
forum for researchers, practitioners and educators from
the areas of RE and SA to discuss their experiences,
forge new collaborations, and explore innovative
solutions that address the challenges that occur when
relating RE and SA. The workshop provided participants
with an opportunity to become familiar with the
relationship between RE and SA in the broader context
of software engineering, rather than in an isolated
context of either RE or SA. The workshop featured one
industrial keynote, five research paper presentations,
two invited talks and four working group discussions.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hunt:2013:RDA,
author = "Johanna Hunt and Xiaofeng Wang",
title = "{Research Dojo}: applying agile principles to agile
research --- workshop summary from {XP2013}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "43--46",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507324",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This report summarizes key findings from a workshop
held at the 14th International Conference on Agile
Software Development (XP2013) called ``Research Dojo:
Collaborative Approaches for our Agile Community''.
Both software development and research are
knowledge-intensive endeavors. While agile approaches
have been increasingly adopted in software development
projects, whether such approaches can beneficially be
applied to conducting research is a phenomenon yet to
be fully explored. The objective of the workshop was to
gain a deeper understanding of the similarities and
differences between academic research and agile
software development, in order to explore whether agile
practices can also be used for collaboratively
conducted research. The opinions of the workshop
participants are summarized and observations of the
research dojo session carried out by the participants
are reported. We conclude by identifying further areas
for investigation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Johnson:2013:RSS,
author = "Pontus Johnson and Paul Ralph and Michael Goedicke and
Pan-Wei Ng and Klaas-Jan Stol and Kari Smolander and
Iaakov Exman and Dewayne E. Perry",
title = "Report on the {Second SEMAT Workshop on General Theory
of Software Engineering (GTSE 2013)}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "47--50",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2529923",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kruchten:2013:TDT,
author = "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya
and Davide Falessi",
title = "Technical debt: towards a crisper definition report on
the {4th International Workshop on Managing Technical
Debt}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "51--54",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507326",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As the pace of software delivery increases and
technology rapidly changes, organizations seek guidance
on how to insure the sustainability of their software
development effort. Over the past four years running
the workshops on Managing Technical Debt, we have seen
increased interest from the software industry to
understanding and managing technical debt. A better
understanding of the concept of technical debt, and how
to approach it, both from a theoretical and a practical
perspective is necessary to advance its state of the
art and practice. In this paper, we highlight the
current confusion in industry on the definition of
technical debt, their contributions that have led to a
deeper understanding of this concept and the limits of
the metaphor, the criteria to discriminate what is
technical debt and not, and areas of further
investigation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lewis:2013:RIIb,
author = "Grace A. Lewis and Nachiappan Nagappan and Jeff Gray
and David Rosenblum and Henry Muccini and Emad Shihab",
title = "Report of the {2013 ICSE 1st International Workshop on
Engineering Mobile-Enabled Systems (MOBS 2013)}: 12",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "55--58",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507327",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 2013 1st International Workshop on Engineering
Mobile-Enabled Systems (MOBS 2013) was held in
conjunction with the 35th International Conference on
Software Engineering, ICSE 2013, on May 25, 2013 in San
Francisco, CA USA. MOBS 2013 brought together software
engineering researchers from academia and industry, as
well as practitioners, to share results and open issues
in diverse areas of engineering mobile-enabled systems.
The many discussions throughout the day resulted in the
identification of three promising areas of research to
address existing gaps and problems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hunt:2013:RPS,
author = "Johanna Hunt and Olumide Akerele and Tomi Juhola and
Michael Waterman",
title = "Report from the {PhD} symposium at {XP2013}: an
adaptive experiment in feedback",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "59--62",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507328",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper, we describe the PhD Symposium organized
as a part of the 14th International Conference on Agile
Software Development (XP2013). The Symposium was run
with an experimental adaptive structure and was divided
into two workshops distributed across the conference as
well as individual sessions during the conference. The
activities of the second workshop were adapted based on
the learning needs of the attendees. In this report we
describe the structure of the two scheduled workshops,
the activities conducted both during and between them,
and evaluate the outcome of this Symposium format.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Beschastnikh:2013:BRP,
author = "Ivan Beschastnikh",
title = "Book Review: {{\booktitle{Presentation patterns:
techniques for crafting better presentations}} by Neal
Ford, Matthew McCullough and Nathaniel Schutta}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "67--67",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507291",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gvero:2013:CCE,
author = "Igor Gvero",
title = "Computers as components, 3rd edition: principles of
embedded computing system design by Marilyn {Wolf}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "67--68",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507292",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRD,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Drupal For Designers}} by
Dani Nordin}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "68--68",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.250729",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRJ,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{jQuery, jQuery UI and jQuery
Mobile: recipes and examples}} by Adriaan de Jonge and
Phil Dutson}",
journal = j-SIGSOFT,
volume = "38",
number = "5",
pages = "68--69",
month = sep,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2507288.2507294",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:29 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chauhan:2013:DSM,
author = "Sandeep Chauhan and Arun Sharma and P. S. Grover",
title = "Developing self managing software systems using agile
modeling",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--3",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532805",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Design, development and operation of self managing
systems are extremely challenging. Having an
appropriate development model is of paramount
significance for self managing systems. Various
approaches have been studied and used in the past. It
has been observed that self managing systems may be
very good candidates for agile modelling and
development. In this paper, we propose a generic
architecture along with a life cycle and an Agile
Modelling Approach (AMA) for developing self-managing
systems. AMA may be applied to software development
projects in an effective, flexible and lightweight
manner. Moreover, AMA may be used for requirements,
analysis, architecture and design, along with the
use-case, object, aspect, data or user-interface
models.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2013:QAE,
author = "Rakesh Kumar and Hardeep Singh",
title = "A qualitative analysis of effects of security risks on
architecture of an information system",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--3",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532809",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Information systems are the backbone of almost every
business. The rise in the usage and the development of
information networks over the years has added to the
magnitude and frequent occurrences of threats to these
very systems. Therefore, researchers and developers
need to fill the gaps between early knowledge about
risks and current level of risks and threats posed to
information systems. The paper, done qualitatively,
explores the various effects on the architecture of the
information systems when the systems are exposed to
attacks. The conceptual results, presented in the paper
explore the relation of security risks to the
architectural components of information systems. The
findings can help the developer community to design
architecturally sound and secure information systems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{B:2013:SHE,
author = "Sugavanesh B. and Hari Prasath R. and Selvakumar S.",
title = "{SHS}-{HTTPS} enforcer: enforcing {HTTPS} and
preventing {MITM} attacks",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--4",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532802",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Web servers provide immunity against Man In The Middle
(MITM) attacks and eavesdropping by using HTTP Strict
Transport Security (HSTS) to force user agents to
communicate only over HTTPS connections. However, the
initial connection request from a user is made over an
insecure HTTP connection. This issue was addressed by
user agents; Google Chrome and Firefox, implicitly, by
including a static list of URLs to be accessed only
over secure HTTPS connections. Since, these user agents
maintain their lists independently, the URLs used by
one user agent are invisible to another. A user is
prone to MITM attacks, especially in public hotspot
environments, when accessing a URL present in the list
of secure URLs of one browser but not in another, since
the initial handshake from that user agent is insecure.
Attacks can be initiated by modifying the outgoing HTTP
packets and also the HTTPS response packets from the
webserver. This motivated us to propose a solution
independent of user agents, by merging the static URL
lists of different user agents and enforcing HTTPS for
all those URLs. In this paper, we propose a solution,
SHSHTTPS Enforcer that introduces a local daemon to
enforce URL redirection before the request flows out of
the client for the URLs in a list compiled from
multiple sources. The proposed solution has been
demonstrated through a prototype implementation of the
Squid Proxy server as our local daemon. The experiment
was conducted by providing a URL, which was not present
in one browser's list but was present in another
browser's list. It was evident that SHS-HTTPS Enforcer
enforced HTTPS successfully and MITM attacks were
prevented.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Castelluccia:2013:TEB,
author = "Daniela Castelluccia and Giuseppe Visaggio",
title = "Teaching evidence-based software engineering: learning
by a collaborative mapping study of open source
software",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--4",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532803",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper, we share our experiences about teaching
evidence-based software engineering to students of a
Master degree program in Computer Science. We provided
a semester-long course, composed of lessons about
empirical and experimental methods. It also included a
collaborative project concerning a systematic mapping
study of the challenges in the adoption of open source
software in a business context. All students
collaborated on the project by analyzing emerging
results in the scientific literature. They evaluated
the proposals in terms of level of novelty and evidence
and delivered a complete report, which summarized the
risk factors in the adoption of open source software
and offers technical knowledge about evolutionary
patterns and development community support, with
practical implications. As a side effect, this
problem-based learning approach provides a positive
impact in terms of students' participation, teamwork
attitude, professional interest in open source
software, and exam passing.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jeet:2013:SRE,
author = "Kawal Jeet and Renu Dhir",
title = "Software re-engineering using imperialist competitive
algorithm",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--5",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532808",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Maintenance is one of the important phases of the
software development life cycle which contributes to
the effective and long term use of any software system.
It can become cumbersome and costly for software
maintainers when subsystem boundaries are not clearly
defined. Further, the problem gets worse due to the
system evolution, lack of current documentation and
lack of original design documentation. The application
of clustering techniques and tools helps software
maintenance programmers to recover high-level views of
system designs and hence leads to better understanding
and maintenance of software systems. In this paper, we
have used a sociopolitical Imperialist Competitive
Algorithm for software module clustering and compared
it with existing evolutionary approaches. We conclude
that the novel socio-political approach produces better
quality clusters as compared to the earlier
evolutionary genetic approaches.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Garg:2013:NBG,
author = "Deepak Garg and Amitava Datta and Tim French",
title = "A novel bipartite graph approach for selection and
prioritisation of test cases",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--6",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532806",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Every regression testing cycle of a software
application results in new test cases being introduced
in a test suite. Many test cases from previous
regression testing cycles become unstable or unusable
due to the removal/addition of the new functionalities.
The execution of a large number of unusable test cases
results in less test coverage and higher test execution
time. The lower test coverage is due to the coverage of
the non-existent code statements. The higher test
execution time is due to the execution of unused and
broken test cases. In this paper, we propose a new
bipartite graph approach to eliminate the subset of
test cases that are not relevant for the testing of the
current version of a software application. The
suggested approach helps in executing a minimal set of
test cases that are required to cover more code
statements.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Goel:2013:IHL,
author = "Brij Mohan Goel and Pradeep Kumar Bhatia",
title = "Investigating of high and low impact faults in
object-oriented projects",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--6",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532807",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "For optimum utilization of resources and reducing the
cost of software, the fault detection and elimination
process must be properly planned and for this type of
planning prediction of fault-prone module is gaining
importance among researchers. It would be valuable to
know how object-oriented design metrics and class
fault-proneness are related when fault impact is taken
into account. In this paper, we use the logistic
regression method to empirically investigate the
usefulness of object-oriented design metrics in
predicting fault-proneness when taking fault impact
into account. Our results, based on a public domain
NASA Promise data set, indicate that most of these
design metrics are statistically related to
fault-proneness of classes across fault impact, and the
prediction capabilities of the investigated metrics
greatly depend on the impact of faults. More
specifically, these design metrics are able to predict
high/low impact faults in fault-prone classes.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mary:2013:PSA,
author = "S. Roselin Mary and Paul Rodrigues and E. R..
Naganathan",
title = "Patterns of software architecture in {Vastu}: a new
revelation",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--6",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532815",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Patterns play an important role in architecture.
Plenty of patterns exist but remain undiscovered. Many
of the patterns used in different fields are knowingly
or unknowingly used in the field of software
architecture. This technical paper briefly explains
various patterns in the Indian architectural science
Vastu and also presents a brief discussion of various
available software architectural patterns. An attempt
is made here to find correlations between patterns
existing in vastu and software architecture. Further,
based on the facts established in vastu, it may be
possible to build any kind of complex systems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Levine:2013:CSS,
author = "Gertrude N. Levine",
title = "Computer security with service degradations",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--7",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532810",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Computer systems invest substantial resources in
securing their service. Costs of failure prevention are
balanced against those of detection and recovery, even
though recovery mechanisms can cause greater
degradations of services. Most computer users consider
degradations of service to be insidious and injurious.
Yet, service degradations commonly assist in both the
prevention and the curtailment of failures. Their
toleration enables service continuation following fault
activation, during which degradations are monitored for
symptoms of security breaches.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Haller:2013:MT,
author = "Klaus Haller",
title = "Mobile Testing",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--8",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532813",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Mobile apps are everywhere. Some apps entertain and
others enable business transactions. Apps increasingly
interact with complex IT landscapes. For example, a
banking app on a mobile device acts as a front end that
invokes services on a back-end server of the bank,
which might contact even more servers. Mobile testing
becomes crucial and challenging. This paper follows a
user-centric testing approach. The app's architecture
matters for testing, as does its user base and usage
context. Addressing these factors ensures that test
cases cover all relevant areas. Most apps need test
automation for two reasons: agility and compatibly.
Agile projects test frequently, such as every night, to
detect bugs early. Compatibility tests ensure that an
app runs on all relevant devices and operating system
versions on the market. Thus, testers execute test
scripts on many devices. This demands for a private
device cloud and a mobile test automation framework.
Swisscom IT Services followed this path, enabling us to
address the major quality issues we identified for
mobile apps: pre-usage failures (installation fails,
app crashes during startup) and lack of basic
regression testing (upgrades buggier than
predecessor).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2013:RPT,
author = "Lalit Kumar Singh and Gopika Vinod and A. K.
Tripathi",
title = "Reliability prediction through system modeling",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--10",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.25328012",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Quantifying software reliability, such as performance
and dependability, through stochastic behavior models
(or labeled transition systems) is already a common
practice in the software analysis community. However,
those models are usually too fine grained to represent
an accurate view of the software system by its
stakeholders. Scenarios, on the other hand, are capable
not only to describe the system traces as behavior
models do but also depict very clearly the system
components designed to provide the intended system
behavior as well as to outline a high level
architecture view of the system being described. In
this paper, we introduce a case study of a safety
critical computer based system that is running in an
Indian Nuclear Power Plant. We define clear component
interfaces, from which we analyze its software
reliability.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dutta:2013:ERD,
author = "Animesh Dutta and Shrutilipi Bhattacharjee and Ananya
Kanjilal and Ranjan Dasgupta and Swapan Bhattacharya",
title = "Engineering of requirements for a distributed
teleteaching system: a conceptual graph-based
approach",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--12",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532814",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This work proposes a graph based requirement analysis
approach and its verification methodology to address
the challenges of requirements engineering in the
context of a distributed teleteaching system.
Requirements are generally expressed in natural
language and in the absence or limited use of the
requirements elicitation phase, verification of
requirements and traceability of requirements to
different artifacts of the subsequent phases becomes
difficult. In this work we use i* diagrams, the well
known standard for agent based requirements analysis.
Then we propose Extended Means Ends Analysis (EMEA)
with the addition of some new constructs. Next we
define a transformation algorithm to derive a
conceptual graph (CG) and propose a method for
conceptual graph based requirements specification and
its verification. A metrics based evaluation for
performance measurement of the proposed method in terms
of requirements traceability is presented.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mala:2013:CAT,
author = "D. Jeya Mala and S. Balamurugan and K. Sabari Nathan",
title = "Criticality analyzer and tester: an effective approach
for critical component identification \& verification
using {ABC}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--12",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532811",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Now a days, software industries satisfy users' needs
through developing software. To satisfy their
customers, the software developers need to identify the
critical components that make serious impacts on users'
requirements. Tracking critical components is an
important and timeconsuming process. In this paper, we
propose a novel approach, Criticality Analysis, which
identifies the critical components of an application.
The identified critical components are verified to
ensure that they are failure-free using the intelligent
search based optimization algorithm, Artificial Bee
Colony.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ahmad:2013:WSE,
author = "Faisal Ahmad and Suvamoy Changder and Anirban Sarkar",
title = "{Web} service execution model for cloud environment",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--13",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532801",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Web services describe a standardized way of
integrating Web-based applications. In recent days,
with the advancement of cloud computing, web services
play pivoting roles towards meeting complex business
objectives on a large scale. However, engineering
dynamic web services is a complex task as they can be
added, modified and deleted on the fly and even without
any prior notification. Executing a large scale
business process using dynamic web services is very
challenging. This paper proposes an execution machine,
called Web Service Dynamic Execution Machine (WSDE
machine), which works in the execution layer of the
three layered architecture for web service dynamics
[23]. The proposed machine is capable of executing
business processes having both deterministic and
non-deterministic flows, where the related web services
are represented using a graph-based semantic based
formal model. The generic nature of the WSDE machine is
useful in improving performance, scalability and
maintainability of large scale web service based
information systems. In this paper, the proposed WSDE
machine is also illustrated with a suitable case
study.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{deCastro:2013:SGP,
author = "Ronney Moreira de Castro and Jos{\'e} Luis Braga and
Liziane Santos Soares",
title = "Selection of good practices for small software
development teams: a knowledge-based approach",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "1--15",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532804",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The world is increasingly dependent on technology and
computing systems. Software organizations are facing a
highly competitive market, and thus seeking good
practices and processes that help keep them
competitive. The quality of their products becomes a
differentiating factor and is directly associated with
these processes. The software products they deliver
play a major role in this competitive scenario, to
which small organizations do not have easy access. Our
study is directed to those small and
micro-organizations that lack the necessary financial
assets to hire people, adopt and implement expensive
processes, or even implement good development
practices. In this paper we present our approach to
help those organizations find good practices to enhance
their software development processes. The method
consisted of obtaining a possible company profile based
on technical attributes, given as input to a
knowledge-based system that derived a list of possible
practices to be adopted according to that profile. Then
project managers can select those more suitable to the
company's present demands, and implement them in
smaller steps according to the organization maturity
levels. The approach was currently tested in two
organizations that are by now implementing the
suggested practices. The proposed system is freely
available through the internet.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Katic:2013:WAC,
author = "Marija Katic",
title = "Why attending conferences is important for your
research: {ESEC\slash FSE 2013} experience summary",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "5--6",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532787",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper, a personal perspective on how important
for a scientist is to attend conferences is given. The
report is influenced by the author's attendance of the
9th joint meeting of the European Software Engineering
Conference and the ACM SIGSOFT Symposium on the
Foundations of Software Engineering (ESEC/FSE 2013).
ESEC/FSE 2013 took place in Saint Petersburg, Russia
and gathered researchers, practitioners, and educators
from all over the world that presented and discussed
the most recent work, trends, and challenges in the
field of software engineering. ESEC/FSE joined the main
conference, and several co-located events: two
conferences, four workshops, doctoral symposium and
seven tutorials. While the main conference covered
broad topics in software engineering, the two
co-located conferences were targeted to the specific
software engineering community: multicore software
engineering, performance, and tools, and to the
search-based software engineering community.
Additionally, there were four interesting workshops: on
social software engineering, on software evolution, on
software ecosystem architectures, and on software
development lifecycle for mobile. Keywords Software
engineering, discuss, attending conferences.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2013:Pb,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "6--7",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532783",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2013:WLM,
author = "Robert Schaefer",
title = "Why {Lehman} matters: mediocracy",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "8--9",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532786",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ardis:2013:SEEd,
author = "Mark A. Ardis and Peter B. Henderson",
title = "Software engineering education {(SEEd)}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "9--10",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532785",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2013:SNSf,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "11--20",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532782",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2013:RPf,
author = "Peter G. Neumann",
title = "Risks to the public",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "21--28",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532781",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Graziotin:2013:RDP,
author = "Daniel Graziotin and Andreas Jedlitschka",
title = "Recent developments in product-focused software
process improvement: {PROFES} 2013 conference report",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "29--34",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532789",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This report summarizes the presentations and
discussions that happened at PROFES 2013, the 14th
International Conference on Product-Focused Software
Process Improvement, which was held June 12--14, 2013
in Paphos, Cyprus. The main theme of PROFES is software
process improvement (SPI) motivated by product,
process, and service quality needs. PROFES 2013
addressed both quality engineering and management
topics, divided into the areas of Decision Support in
Software Engineering, Empirical Software Engineering,
Managing Software Processes, Safety-Critical Software
Engineering, Software Measurement, Software Process
Improvement, and Software Maintenance.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2013:ISD,
author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
Mishra",
title = "Information systems in distributed environments:
{ISDE} 2013",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "34--35",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532790",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a report from a one-day fourth international
workshop on ``Information Systems in Distributed
Environments'' (ISDE), which was organized in
conjunction with the OnTheMove Federated Conferences \&
Workshops (OTM 2013) at Technical University of Graz,
Austria, on September 13, 2013. The main focus of this
workshop was to provide a venue for the discussion of
challenges related to the development, operation, and
maintenance of distributed information systems, and
their creation in the context of global development
projects. Further dissemination of research results
will lead to an improvement of distributed information
system development and deployment across the globe.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kienle:2013:BRE,
author = "Holger M. Kienle",
title = "Book Review: {{\booktitle{Effective JavaScript: 68
specific ways to harness the power of JavaScript}} by
David Herman}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "40--41",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532791",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Moreland:2013:BRP,
author = "Doug Moreland",
title = "Book Review: {{\booktitle{A practical approach to
large-scale agile development: how HP transformed
LaserJet FutureSmart firmware}} by Gary Gruver, Mike
Young and Pat Fulghm}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "41--42",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532792",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Payton:2013:BRD,
author = "Ryan Payton",
title = "Book Review: {{\booktitle{DevOps Troubleshooting}} by
Kyle Rankin}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "42--42",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532793",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2013:BRD,
author = "Robert Schaefer",
title = "Book Review: {{\booktitle{Dynamic reconfigurable
network-on-chip design: innovations for computational
processing and communication}} by Jih-Sheng Shen and
Pao-Ann Hsuing}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "42--43",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532794",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bangalore:2013:HFD,
author = "Bangalore",
title = "{Hadoop} Fundamentals by Doug Eadline",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "43--44",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532795",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:XML,
author = "Vasile G. Teodorovici",
title = "{OS} X mountain lion: the missing manual by {David}
Pogue",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "44--44",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532796",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRO,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{The object-oriented thought
process}}, fourth edition by Matt Weisfeld}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "44--45",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532797",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teodorovici:2013:BRA,
author = "Vasile G. Teodorovici",
title = "Book Review: {{\booktitle{Advanced programming in the
UNIX environment}}, third edition by W. Richard Stevens
and Stephen A. Rago}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "45--45",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2532798",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jahns:2013:BRD,
author = "Veit Jahns",
title = "Book Review: {{\booktitle{Data insights: new ways to
visualize and make sense of data}} by Hunter Whitney}",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "45--46",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2544424",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tracz:2013:SEC,
author = "Will Tracz",
title = "Software engineering: the current practice by Vaclav
Rajlich",
journal = j-SIGSOFT,
volume = "38",
number = "6",
pages = "46--46",
month = nov,
year = "2013",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2532780.2544425",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:31 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nautiyal:2014:NAC,
author = "Lata Nautiyal and Neena Gupta and Sushil Chandra
Dimri",
title = "A Novel Approach to Component-Based Software Testing",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "1--4",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674640",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In the present era when component-based software
development plays an important role in the software
development community, testing is an important
activity, which should not be neglected.
Component-based software testing is an essential
activity, which supports productivity in
component-based software development. Past studies
indicate that more than fifty percent of the cost of
software development is dedicated to the testing
activity, which results in an increased cost of the
software. This paper describes the issues and
challenges of component-based systems. This paper also
suggests the requirement of a novel approach to testing
of component-based software. It also proposes a novel
approach to testing of component-based software while
considering some important factors like component
study, component test case design, component test
execution, and component test analysis and component
test documentation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sabharwal:2014:IIC,
author = "Sangeeta Sabharwal and Manuj Aggarwal",
title = "Identifying Interactions for Combinatorial Testing
using Data Flow Techniques",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "1--4",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674643",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Combinatorial (t-way) testing has been proved to be an
effective technique that identifies faults caused by
interactions among a small number of input parameters.
However, the degree of interaction to be considered for
testing is still an open issue. Although higher
strength t-way testing improves fault detection, it
leads to a considerable increase in number of
interactions to be tested and hence the test set size.
In this paper, an approach is proposed that attempts to
reduce the number of interactions to be tested. The
source code is transformed into a flow graph and data
flow analysis is applied to it to identify the
interactions that exist in the system. The initial
results suggest that the approach is able to achieve a
considerable reduction in the number of interactions to
be tested.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Zaidi:2014:PES,
author = "Taskeen Zaidi and Vipin Saxena",
title = "Performance Estimation of Static Step Topology Across
Distributed Networks through Simulation Tool",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "1--4",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674644",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "During the past years, distributed computing has
become more popular because of several advantages over
centralized computing. Such types of platforms offer
high performance computing environment at a too low
cost. Many of organizations have shifted their old
centralized based computing labs into distributed
computing labs that are based upon a static topological
structure. The present work is related to the
performance estimation of newly proposed step topology
across the distributed computing network. The
well-known Unified Modeling Language is used to design
a model for computation of performance of the topology.
The performance is measured in terms of transferring
the video and audio files that are having a large size
in terms for bytes. A simulation tool provides
transferring of packets across distributed networks
designed through step topology.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nautiyal:2014:MRC,
author = "Lata Nautiyal and Neena Gupta and Sushil Chandra
Dimri",
title = "Measurement of the Reliability of a Component-Based
Development using a Path-Based Approach",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "1--5",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674641",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Component-based systems are based on the idea of
assembling lots of independent and pre-defined
components based on discriminating designs.
Component-based systems provide a better reuse of
software components along with flexibility, scalability
and better quality of services to fulfill the
requirements of the end user. We can consider
component-based software engineering successful only if
it has the ability to select and integrate reliable
components. In this paper we propose an innovative
reliability model in terms of multiple execution paths
and the usage percentage of each and every component.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Parashar:2014:MCR,
author = "Anshu Parashar and Jitender Kumar Chhabra",
title = "Measuring Change-Readiness of Classes by Mining
Change-History",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "1--5",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674642",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The change-history of a software system records how
the system evolved over time. The change-history can
tell which components (classes) are changed together,
i.e. are change-coupled. In this paper, we propose two
metrics for quantifying change-coupling among classes
on the basis of their change-history and then propose
another measure to compute a change-readiness index of
the classes. The change-readiness of a class is
measured as how much the class is ready to change. In
this paper, we define change-history-based metrics,
demonstrate computation of these measures by example
and validate them theoretically. The SVNSearch
subversion web-based utility has been used to mine the
change logs of the EGit project of Eclipse. Further,
change-readiness is computed for the classes of EGit
and our findings are discussed. It has been found that
the metrics based on change-history can be helpful to
predict the future change behavior of the classes.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kaur:2014:MSI,
author = "Navdeep Kaur and Parminder Kaur",
title = "Mitigation of {SQL} Injection Attacks using Threat
Modeling",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "1--6",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674638",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Day after day, SQL Injection (SQLI) attack is
consistently proliferating across the globe. According
to Open Web Application Security Project (OWASP) Top
Ten Cheat Sheet-2014, SQLI is at top in the list of
online attacks. The cause of spread of SQLI is thought
to be Unsecure Software Engineering. The Software
Development process itself appears to look at security
as an add-on to be checked and deployed towards the end
of the software development lifecycle which leads to
vulnerabilities in web applications. This paper is an
attempt to integrate security in early stages of SDLC
i.e. in design phase to mitigate SQLI vulnerability.
How SQLI attack happens is illustrated. Threat Modeling
is performed to mitigate the SQLI vulnerability.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2014:DLB,
author = "Narander Kumar and Shalini Agarwal and Taskeen Zaidi
and Vipin Saxena",
title = "A Distributed Load-balancing Scheme Based on a Complex
Network Model of Cloud Servers",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "1--6",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674639",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "Efficient management of resources in a federation of
interacting computing servers and devices, for example,
in a cloud computing environment, requires a
load-balancing system that is self-regulatory and
oblivious in nature. Due to the increasing size of data
centers and their distribution across the globe,
centralized load-balancing approaches suffer
significant deficiencies in terms of communication
overhead caused by the need to collect state dependent
information. The technology of the cloud in its current
state runs as many as 200 virtual machines on a single
server, which clearly shows the importance of studying
distributed load-balancing systems in the cloud. In the
present paper, the federation of cloud servers is
modeled as a complex network. In a complex network the
structure and dynamics of the underlying system are
encoded in the network topology itself. A method using
random walks on complex networks for discovering free
resources in a Cloud Server Network is given. The given
method is used to balance the overall load on the
network by equalising loads on overloaded and
underloaded nodes without the need of a global load
balancer. Simulation results are obtained through
Network Simulator Version 2, which show that the
proposed load-balancing scheme performs well for a
large network by uniformly distributing the workload
among the servers in polynomial time.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2014:P,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "6--7",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674636",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2014:SNS,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "8--16",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674634",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2014:RP,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "17--22",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674635",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ralph:2014:HDG,
author = "Paul Ralph and Iaakov Exman and Pan-Wei Ng and Pontus
Johnson and Michael Goedicke and Alper Tolga Kocata and
Kate Liu Yan",
title = "How to Develop a General Theory of Software
Engineering: Report on the {GTSE 2014} Workshop",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "23--25",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674647",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Many academic disciplines have general theories, which
apply across the discipline and explain diverse
phenomena. General theories facilitate developing a
cumulative body of knowledge, increase a field's
resistance to fads and pseudoscience, and help us
respond to novel situations where old heuristics break
down. The goal of the SEMAT General Theory of Software
Engineering (GTSE) workshop is therefore to promote
developing and testing general theories for software
engineering. The Third GTSE workshop was co-located
with the International Conference on Software
Engineering (ICSE) in 2014. Participants explored
different types of theories and how to assemble them
into a framework. Participants debated how to make
theories practical to practitioners and agreed that
different types of practitioners (e.g. developers) have
different needs for theories.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Robles:2014:FRT,
author = "Gregorio Robles and Jes{\'u}s M. Gonz{\'a}lez-Barahona
and Dirk Riehle",
title = "{FLOSS Research Track at the 10th International
Symposium on Open Collaboration (OpenSym 2014)}",
journal = j-SIGSOFT,
volume = "39",
number = "6",
pages = "26--27",
month = nov,
year = "2014",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2674632.2674648",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:36 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a report from the Free/Libre/Open Source
(FLOSS) research track at the 10th International
Symposium on Open Collaboration (OpenSym 2014), which
took place in Berlin, Germany, August 27-29. As part of
a broader community interested in ``everything open'',
including open access, open data, open educational
resources, Wikipedia, wikis and open collaboration,
this research track was a place to discuss software
engineering related issues from various points of view,
based on a selection of research papers that was
considered by the programme committee. As such, we had
contributions on technical (such as the usefulness of
automatic bug reporting tools, the implementation of
standards, or linking various data sources),
community-related (integration, congruence), economic
(business models, or the impact of FLOSS in the growth
of businesses), and fundamental (such as software
forks) matters. We look forward to next year's OpenSym,
which will take place 19-21 August 2015 in San
Francisco, California, see http://opensym.org.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hughes:2016:BRA,
author = "Jeffrey Hughes and Cassandra Sparks and Alley
Stoughton and Rinku Parikh and Albert Reuther and
Suresh Jagannathan",
title = "{Building Resource Adaptive Software Systems (BRASS)}:
Objectives and System Evaluation",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--2",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853081",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As modern software systems continue inexorably to
increase in complexity and capability, users have
become accustomed to periodic cycles of updating and
upgrading to avoid obsolescence --- if at some cost in
terms of frustration. In the case of the U.S. military,
having access to well-functioning software systems and
underlying content is critical to national security,
but updates are no less problematic than among civilian
users and often demand considerable time and expense.
To address these challenges, DARPA has announced a new
four-year research project to investigate the
fundamental computational and algorithmic requirements
necessary for software systems and data to remain
robust and functional in excess of 100 years. The
Building Resource Adaptive Software Systems, or BRASS,
program seeks to realize foundational advances in the
design and implementation of long-lived software
systems that can dynamically adapt to changes in the
resources they depend upon and environments in which
they operate. [1] MIT Lincoln Laboratory will provide
the test framework and evaluation of proposed software
tools in support of this revolutionary vision",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bhardwaj:2016:KSM,
author = "Mridul Bhardwaj and Ajay Rana",
title = "Key Software Metrics and its Impact on each other for
Software Development Projects",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--4",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853087",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Every software development project is unique and
different from repeatable manufacturing process. Each
software project share different challenges related to
technology, people and timelines. If every project is
unique, how project manager can estimate project in a
consistent way by applying his past experience. One of
the major challenges faced by the project manager is to
identify the key software metrics to control and
monitor the project execution. Each software
development project may be unique but share some common
metric that can be used to control and monitor the
project execution. These metrics are software size,
effort, project duration and productivity. These
metrics tells project manager about what to deliver
(size), how it was delivered in past (productivity) and
how long will it take to deliver with current team
capability (time and effort). In this paper, we explain
the relationship among these key metrics and how they
statistically impact each other. These relationships
have been derived based on the data published in book
``Practical Software Estimation'' by International
Software Benchmarking Group. This paper also explains
how these metrics can be used in predicting the total
number of defects. Study suggests that out of the four
key software metrics software size significantly impact
the other three metrics (project effort, duration and
productivity). Productivity does not significantly
depend on the software size but it represents the
nonlinear relationship with software size and maximum
team size, hence, it is recommended not to have a very
big team size as it might impact the overall
productivity. Total project duration only depends on
the software size and it does not depend on the maximum
team size. It implies that we cannot reduce project
duration by increasing the team size. This fact is
contrary to the perception that we can reduce the
project duration by increasing the project team size.
We can conclude that software size is the important
metrics and a significant effort must be put during
project initiation phases to estimate the project size.
As software size will help in estimating the project
duration and project efforts so error in estimating the
software size will have significant impact on the
accuracy of project duration and effort. All these key
metrics must be re-calibrated during the project
development life cycle",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Drori:2016:TSD,
author = "Offer Drori",
title = "Template for a System Design File Using {OODPM}
Version 2015",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--4",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853090",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Object Oriented Design by Prototype Methodology
(OODPM) integrates two known technologies: the object
approach and the prototype concept. Object oriented
methodology is used for internal system design, and
prototype methodology is used for external system
design. This document is a template for a system design
file using OODPM version 2015 (titles of paragraphs
only). For full explanations for each paragraph look at
[1]. This version developed after tens of projects that
developed and plan using version 6 in a very vast
projects for national information systems. This version
companion by ``OODPM --- Methodology for Management
Information Systems life Cycle'' (meanwhile only in
Hebrew)",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gulati:2016:SRB,
author = "Jayati Gulati and Priya Bhardwaj and Bharti Suri and
Anu Singh Lather",
title = "A Study of Relationship between Performance,
Temperament and Personality of a Software Programmer",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--5",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853089",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper focuses on finding the relationship between
the performance, temperament and personality of a
software programmer. The rationale behind conducting
this study is to find out if personality influences the
performance of software engineering students. We
conducted a survey of 66 students pursuing engineering
to find out their personality traits and its
relationship with their programming abilities. The
personality test used was Goldberg's IPIP
(International Personality Item Pool) and Keirsey
Temperament Sorter. The results showed that IPIP test
personality traits of extroversion, agreeableness,
conscientiousness, emotional stability and intellect
are not significantly correlated with performance of
the respondents. However, on temperament dimension it
was found that there was a significant correlation
between ``Guardian'' temperament and high performance
which indicates that these respondents had sensing and
judging type of temperament",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Nautiyal:2016:NAE,
author = "Lata Nautiyal and Preeti",
title = "A Novel Approach of Equivalence Class Partitioning for
Numerical Input",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--5",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853084",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software testing is an indispensible phase of software
development that supports not only productivity but
also quality assurance from small to large scale
software products. Software Systems essentially need an
effective way to develop a strategy for testing various
aspects of the system. When we are testing software the
first and potentially most critical step is to design
test cases. There are many methods which assist test
case design. This paper will document the approach
known as Equivalence class partitioning. We have
partitioned the input into two classes Even and Odd.
The proposed approach works for integer inputs only.
Partitioning is done on basis of assessment of input
conditions that serves as a set of valid as well as
invalid set of input values for a test case",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rathore:2016:DTR,
author = "Santosh Singh Rathore and Sandeep Kumar",
title = "A Decision Tree Regression based Approach for the
Number of Software Faults Prediction",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--6",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853083",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software fault prediction is an important activity to
make software quality assurance (SQA) process more
efficient, economic and targeted. Most of earlier works
related to software fault prediction have focused on
classifying software modules as faulty or non-faulty.
However, prediction of the number of faults in a given
software module is not adequately investigated. In this
paper, we explore the capability of decision tree
regression (DTR) for the number of faults prediction in
two different scenarios, intra-release prediction and
inter-releases prediction for the given software
system. The experimental study is performed over five
open-source software projects with their nineteen
releases collected from the PROMISE data repository.
The predictive accuracy of DTR is evaluated using
absolute error and relative error, prediction at level
l and goodness-of-t measure. The results show that
decision tree regression produced significant
prediction accuracy for the number of faults prediction
in both the considered scenarios. The relative
comparison of intra-release and inter-releases fault
prediction shows that intra-project prediction produced
better accuracy compared to inter-releases prediction
across all the datasets",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Shah:2016:ESD,
author = "Unnati S. Shah",
title = "An Excursion to Software Development Life Cycle
Models: an Old to Ever-growing Models",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--6",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853080",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software Engineering provides a standard way to
develop and maintain a complex software. Industry uses
software development Life Cycles (SDLC) to develop a
software. SDLC plays an important role as it helps to
define the software requirements, model the software
component, reduce development and maintenance cost and
finally provides manageable software. There exist
numerous SDLC models viz. Waterfall, Incremental,
Rapid, Agile, Hybrid etc. After a comprehensive study
and analysis of existing SDLC models, I observe all
models are complementary, not competitive. I divide all
models into three broad categories viz. Traditional
models, Agile models and Hybrid models. The main
objective of the paper is to give a quick review of
SDLC models and an effective answer to the most
confusing question arise in software engineering
practice ``how to select an efficient SDLC model for
practice?'' Many factors viz. nature of requirements,
the size of software development team, project size,
customer interaction etc. have an effect on selection
criteria. This paper presents a brief insight into each
model and its comparative analysis. The analysis helps
to understand the basic characteristics of each model
and its applicability. Furthermore, the analysis helps
software manager to select the appropriate model for
practice",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Baliyan:2016:HFS,
author = "Niyati Baliyan and Sandeep Kumar",
title = "A Hierarchical Fuzzy System for Quality Assessment of
Semantic {Web} Application as a Service",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--7",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853085",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Semantic Web enabled applications are becoming popular
due to the presence of their machine comprehensible
description, which makes them easily sharable across
machines. If such applications are deployed as services
to the user through the Cloud, they can facilitate
transparency and reusability. There exist no
attributes, metrics, or models for monitoring the
quality of such applications. In the current work, a
hierarchical fuzzy system for quality assessment of
Semantic Web based applications delivered as services
on the Cloud, is proposed. The quality attributes
proposed herein have been validated through the
standard IEEE-1061 validation framework. Experimental
results reveal that the proposed hierarchical fuzzy
system handles the multiplicity of quality attributes,
and can be used for the relative ranking of Semantic
Web applications available as services",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{kotti:2016:QSA,
author = "Jayasri kotti and Seetharamaiah Panchumarthy",
title = "The Quantitative Safety Assessment and Evaluation for
Safety-Critical Computer Systems",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--8",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853091",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The rapid increase in computer-related technologies
puts greater demands on the software-controlled
systems. These demands place the software in total
control over safety-critical systems. A fault in such a
Safety-Critical Computer Systems (SCCS) can result in
catastrophic concerns such as loss of life, harm, or
equipment damage. In order to detect and prevent such
faults, some safety standards, safety analysis and
fault-tolerant techniques have been developed. Still,
it requires adequate methodologies and frameworks to
complete verification of these SCCS. In this work, the
software safety is considered into 3 parts: Safety
Modeling, Safety Measurement and Safety Management,
with assurance lying down to develop high quality
software for SCCS. The proposed methodology is SM-Cube
(Safety Modeling, Safety Measurement and Safety
Management) which is the Safety-Critical Computer
Systems concerned. SM-Cube provides a clarified
differentiation for assessing and evaluating the safety
embedded into the software. SM-Cube consists of
required processes and operations for developing SCCS
free of faults. This proposed SM-cube has been applied
to safety-critical software based Railroad Crossing
Control System (RCCS) which is a laboratory prototype.
The outcomes of the prototype confirmed that all
critical operations have been safe and risk free. The
development of the software based on the proposed
SM-cube for RCCS have shown a simplified and improved
safety-critical operations of the overall system
performance",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ozturk:2016:IGTa,
author = "Muhammed Maruf {\"O}zt{\"u}rk and Ahmet Zengin",
title = "Improved {GUI} Testing using Task Parallel Library",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--8",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853086",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "While performing a software engineering project,
testing is one of the effort intensive activity
accounting for up to 50\% of total software development
cost. To reduce this cost, parallel execution of test
cases is a preferred way for developers. Task Parallel
Library (TPL) is a powerful and scalable library
providing a wide range of methods while facilitating
test harnesses. Here, we propose a novel algorithm
P-GUI, thereby using TPL. Results of experiment
designed on 10 web pages show that proposed algorithm
achieved a speedup of 1.4 on average",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Park:2016:SPE,
author = "June Sung Park and Paul E. McMahon and Barry Myburgh",
title = "{Scrum} Powered by Essence",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--8",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853088",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This paper shows how Scrum project management practice
can be described using Essence kernel and language
which has recently been adopted as an official Object
Management Group standard for creating and enacting
software engineering methods. Practical benefits of
using Essence as a common foundation for defining
software engineering practices are demonstrated. These
practical benefits include the ability to compare
practices, assess potential gaps, make needed practice
improvements, and assemble select practices into a
coherent method to benefit the project team. In
addition, by providing practical checklists, as opposed
to conceptual discussions, the Essence-powered practice
becomes something the team uses on a daily basis. This
is a fundamental difference from traditional
approaches, which tend to overemphasize method
description as opposed to method use",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Soujanya:2016:GFC,
author = "K. L. S. Soujanya and A. AnandaRao",
title = "A Generic Framework for Configuration Management of
{SPL} and Controlling Evolution of Complex Software
Products",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "1--10",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853082",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Efficient configuration management system is crucial
for the success of any software product line (SPL). Due
to ever changing needs of customers, SPL undergoes
constant changes that are to be tracked in real time.
In the context of customer-driven development,
anticipation and change management are to be given
paramount importance. It demands implementation of
software variability that drives home changed, extended
and customized configurations besides economy at scale.
Moreover, the emergence of distributed technologies,
the unprecedented growth of component based,
service-oriented systems throw ever increasing
challenges to software product line configuration
management. Derivation of a new product is a dynamic
process in software product line that should consider
functionality and quality attributes. Very few
approaches are found on configuration management (CM)
of SPL though CM is enough matured for traditional
products. They are tailor made and inadequate to
provide a general solution. Stated differently, a
comprehensive approach for SPL configuration management
and product derivation is still to be desired. In this
paper, we proposed a framework that guides in doing so
besides helping in SPL definitions in generic way. Our
framework facilitates SPL configuration management and
product derivation based on critical path analysis,
weight computation and feedback. We proposed two
algorithms namely Quality Driven Product Derivation
(QDPD) and Composition Analysis algorithm for
generating satisfied compositions and to find best
possible composition respectively. The usage of weights
and critical path analysis improves quality of product
derivation. The framework is extensible and flexible
thus it can be leveraged with variability-aware design
patterns and ontology. We built a prototype that
demonstrates the proof of concept. We tested our
approach with Dr. School product line. The results
reveal that the framework supports configuration
management of SPL and derivation of high quality
product in the product line. We evaluated results with
ground truth to establish significance of our
implementation",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2016:Pa,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "5--5",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853074",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2016:WWE,
author = "Robert Schaefer",
title = "The World Will Not End With a Bang But With {Http
Error 404}",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "5--7",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853075",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Xie:2016:PPI,
author = "Tao Xie",
title = "The Pursuit of Practice-Impactful Research",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "7--8",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853077",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2016:SNSa,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "9--17",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853078",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2016:RPa,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "18--24",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853076",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Exman:2016:SPG,
author = "Iaakov Exman and Dewayne E. Perry and Balbir Barn and
Paul Ralph",
title = "Separability Principles for a General Theory of
Software Engineering: Report on the {GTSE 2015}
Workshop",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "25--27",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853093",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The four GTSE (General Theory of Software Engineering)
Workshops have brought awareness to, more or less
mature, differing approaches, candidate theories for SE
(Software Engineering). But one asks how to appraise
the generality of these theories? And in case they are
specialized sub-theories, are they amenable to
combination into more general theories? The papers of
the fourth GTSE Workshop addressed these questions by
means of what can be collectively refer to as
Separability Principles. In a sense, participants used
well known techniques applied to design software
systems to design SE theories. Separability is a
powerful tool for understanding relations among SE
candidate theories and guide how to assemble
sub-theories into a general framework. Participants
enthusiastically debated a series of related issues.
The specialized vs. general theories questions were
raised in diverse forms, such as, SE meaning multiple
things, good predictive theories for narrow problems,
ability of General theories to generate specific
theories, and last but not least, whether ``General''
capture the contents of the workshop itself. The 4th
GTSE edition was collocated with ICSE 2015
(International Conference of Software Engineering) in
Firenze, Italy",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fraser:2016:SER,
author = "Steven Fraser",
title = "{Software Engineering Research and Industrial Practice
IEEE ICSE 2015 Workshop Report: May 17, 2015}",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "28--31",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853094",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This report provides an overview of the presentations
and discussions of the 2nd IEEE ICSE Workshop on
``Software Engineering Research and Industrial
Practice'' held May 17, 2015 in Florence Italy. The
program consisted of keynotes, paper presentations, a
panel, and a group dinner.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Alebrahim:2016:VQS,
author = "Azadeh Alebrahim and Stephan Fa{\ss}bender and Martin
Filipczyk and Michael Goedicke and Maritta Heisel and
Uwe Zdun",
title = "Variability for Qualities in Software Architecture",
journal = j-SIGSOFT,
volume = "41",
number = "1",
pages = "32--35",
month = jan,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2853073.2853095",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:41 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Variability is a key factor of most systems. While
there are many works covering variability in
functionality, there is a research gap regarding
variability in software qualities. There is an obvious
imbalance between the importance of variability in the
context of quality attributes, and the intensity of
research in this area. To improve this situation, the
First International Workshop on VAriability for
QUalIties in SofTware Architecture (VAQUITA) was held
jointly with ECSA 2015 in Cavtat/Dubrovnik, Croatia as
a one-day workshop. The goal of VAQUITA was to
investigate and stimulate the discourse about the
matter of variability, qualities, and software
architectures. The workshop featured three research
paper presentations, one keynote talk, and two working
group discussions. In this workshop report, we
summarize the keynote talk and the presented papers.
Additionally, we present the results of the working
group discussions",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jie:2016:ICS,
author = "Jason Lee Hua Jie",
title = "Industrial Case Study of Transition from {V-Model}
into {Agile SCRUM} in Embedded Software Testing
Industries",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "1--3",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894793",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As the software features and technology advances,
delivering quality embedded software for consumer
products become more important and challenging than
ever within organizations. This is particularly vital
when these products are delivered as part of chips.
These chips or better known as system-on-chip (SoC) are
embedded as part of today's gadgets. They are used by
consumers for their everyday use, namely mobile phones
and tablets. In this case study, I will share several
significant changes which have taken place in the
testing embedded software industries when the
transition takes place from V-model methodology to
Agile Scrum in the organization. These changes are
particularly related to software testing perspectives.
Apart from that, I will share the challenges that have
been faced and how we have managed them since the
organization fully adopted Agile Scrum within the first
18 months. Finally, I will describe the way Agile Scrum
has evolved and keys for QA successes in ensuring
business wins with our major players of embedded
software original equipment manufacturers (OEMs).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2016:IME,
author = "Richa Sharma and Peeyush Aggarwal and Ashish Sureka",
title = "Insights from Mining Eleven Years of Scholarly Paper
Publications in Requirements Engineering {(RE)} Series
of Conferences",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "1--6",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894794",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We present insights from a bibliometric analysis and
scientific paper publication mining of 551 papers in
Requirements Engineering (RE) series of conference (11
years from 2005 to 2015). We study cross-disciplinary
and interdisciplinary nature of RE research by
analyzing the cited disciplines in the reference
section of each paper. We apply topic modeling on a
corpus consisting of 551 abstracts and extract topics
as frequently co-occurring and connected terms. We use
topic modeling to study the structure and composition
of RE research and analyze popular topics in industry
as well as research track. Co-authorship in papers is
an indicator of collaboration and interaction between
scientists as well as institutions and we analyze
co-authorship data to investigate university-industry
collaboration, internal and external collaborations. We
present results on the distribution of the number of
co-authors in each paper as well as distribution of
authors across world regions. We present our analysis
on the public or proprietary dataset as well as the
domain of the dataset used in studies published in
Requirements Engineering (RE) series of conferences.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ozturk:2016:IGTb,
author = "Muhammed Maruf {\"O}zt{\"u}rk and Ahmet Zengin",
title = "Improved {GUI} Testing using Task Parallel Library",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "1--8",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2936305",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "While performing a software engineering project,
testing is one of the effort intensive activity
accounting for up to 50\% of total software development
cost. To reduce this cost, parallel execution of test
cases is a preferred way for developers. Task Parallel
Library (TPL) is a powerful and scalable library
providing a wide range of methods while facilitating
test harnesses. Here, we propose a novel algorithm
P-GUI, thereby using TPL. Results of experiment
designed on 10 web pages show that proposed algorithm
achieved a speedup of 1.4 on average.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2016:GBD,
author = "Jagannath Singh and Subhrakanta Panda and P. M. Khilar
and D. P. Mohapatra",
title = "A Graph-Based Dynamic Slicing of Distributed
Aspect-Oriented Software",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "1--8",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894791",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Distributed computing has become very popular these
days due to its speed, accuracy and fault tolerance
capability. In this pa-per, we have considered the
distributed Aspect-Oriented Programs (AOPs) where
message passing and synchronization are handled by
Aspects. In this paper, we present a parallel dynamic
slicing algorithm for distributed AOPs. We introduce
parallelism into our slicing algorithm to make the
slice computation process much faster. Our algorithm is
implemented on our developed tool, called DDG
generator, to generate the required intermediate graphs
for distributed AOPs. The proposed slicing technique is
compared with one related existing technique using
three case studies. The experimental results show that
our proposed slicing algorithm generates precise slices
in less time as compared to the existing algorithm.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hu:2016:UUC,
author = "Wei-Chung Hu and Hewijin Christine Jiau",
title = "{UCFrame}: a Use Case Framework for Crowd-Centric
Requirement Acquisition",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "1--13",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894795",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "To build needed mobile applications in specific
domains, requirements should be collected and analyzed
in holistic approach. However, resource is limited for
small vendor groups to perform holistic requirement
acquisition and elicitation. The rise of crowdsourcing
and crowdfunding gives small vendor groups new
opportunities to build needed mobile applications for
the crowd. By finding prior stakeholders and gathering
requirements effectively from the crowd, mobile
application projects can establish sound foundation in
early phase of software process. Therefore, integration
of crowd-based requirement engineering into software
process is important for small vendor groups.
Conventional requirement acquisition and elicitation
methods are analyst-centric. Very little discussion is
in adapting requirement acquisition tools for
crowdcentric context. In this study, several tool
features of use case documentation are revised in
crowd-centric context. These features constitute a use
case-based framework, called UCFrame, for crowd-centric
requirement acquisition. An instantiation of UCFrame is
also presented to demonstrate the effectiveness of
UCFrame in collecting crowd requirements for building
two mobile applications.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2016:Pb,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "5--5",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894788",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2016:SNSb,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "6--15",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894790",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2016:RPb,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "16--22",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894789",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Axelsson:2016:NAS,
author = "Jakob Axelsson and Efi Papatheocharous and Jaana
Nyfjord and Martin T{\"o}rngren",
title = "Notes On Agile and Safety-Critical Development",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "23--26",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894796",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Agile approaches have been highly influential to the
software engineering practices in many organizations,
and are increasingly being applied in larger companies,
and for developing systems outside the pure software
domain. To understand more about the current state of
agile, its applications to safety-critical systems, and
the consequences on innovation and large organizations,
a seminar was organized in Stockholm in 2014. This
paper gives an overview of the topics discussed at that
seminar, a summary of the main results and suggestions
for future work as input to a research agenda for agile
development of safety-critical software.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Staalhane:2016:ASA,
author = "Tor St{\aa}lhane and Thor Myklebust",
title = "Agile Safety Analysis",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "27--29",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894797",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper, we describe a method for performing
safety analysis based on user stories in an agile
setting. The chosen analysis method is a generic
hazards list, combined with FMEA --- both because it is
simple and intuitive to use and because it is
efficient. In order to handle failure propagation in an
efficient and easy-to-understand way, we have chosen to
use the input-Focused FMEA from the HiP-HOPS project.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doss:2016:COA,
author = "O. Doss and T. P. Kelly",
title = "Challenges and Opportunities in Agile Development in
Safety Critical Systems: a Survey",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "30--31",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894798",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this paper we describe the results of a recent
practitioner survey designed to elicit the opinions as
to the challenges and opportunities posed by the
application of agile development methods in the field
of safety critical systems development. In particular,
the survey explored the relationship between three key
activities in safety engineering and an agile approach
--- namely, safety requirements development, hazard
analysis, and safety case development. The results of
this survey are presented together with brief
discussion of the implications for integration.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hanssen:2016:PWA,
author = "Geir K. Hanssen and Thor Myklebust and Tor
St{\aa}lhane",
title = "Proceedings on the {1st Workshop on Agile Methods
Applied to Development and Certification of
Safety-critical Software}",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "32--33",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894799",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The first international workshop on agile methods
applied to development and certification of
safety-critical software (ASCS) was organized as part
of the XP 2015 conference on May 25th 2015. The
workshop gathered 17 experts from industry and academia
to share recent industrial experience and research on
applications of agile methods in the safety critical
software domain. The workshop was organized as a series
of talks and discussions to share experience and ideas.
The workshop audience also provided guidelines for
future research needed to advance the field.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Torre:2016:IWU,
author = "Damiano Torre and Yvan Labiche and Marcela Genero and
Maged Elaasar and Tuhin Kanti Das and Bernhard Hoisl
and Matthias Kowal",
title = "{1st International Workshop on UML Consistency Rules
(WUCOR 2015)}: Post workshop report",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "34--37",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894801",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Unified Modeling Language (UML), with its 14
different diagram types, is the de-facto standard
modeling language for object-oriented software modeling
and documentation. Since the various UML diagrams
describe different views of one, and only one, software
system under development, they strongly depend on each
other in many ways. In other words, the UML diagrams
describing a software system must be consistent.
Inconsistencies among these diagrams may be a source of
faults during software development and analysis. It is
therefore paramount that these inconsistencies be
detected, analyzed and --- hopefully --- fixed. The
goal of this workshop was to gather input and feedbacks
on UML consistency rules from the community. This
workshop provided an opportunity for researchers who
have been working in the area of UML consistency to
interact with each other at a highly interactive venue,
improve the body of knowledge on UML consistency rules
and discuss ideas for further research in this area.
This report summarizes details of the workshop and the
results obtained that day.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Avgeriou:2016:TDB,
author = "Paris Avgeriou and Neil A. Ernst and Robert L. Nord
and Philippe Kruchten",
title = "Technical Debt: Broadening Perspectives Report on the
{Seventh Workshop on Managing Technical Debt (MTD
2015)}",
journal = j-SIGSOFT,
volume = "41",
number = "2",
pages = "38--41",
month = mar,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2894784.2894800",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:43 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Increasingly software engineers use the metaphor of
technical debt to communicate issues related to the
growing cost of change. In this article, we report on
the Seventh Workshop on Managing Technical Debt (MTD
2015), held in Bremen, Germany, on October 2, 2015,
collocated with the International Conference on
Software Maintenance and Evolution (ICSME). The 30
workshop participants from industry and academia
engaged in lively discussions, which helped clarify
issues, refine questions, and promote common
understanding about technical debt in software.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Brooks:2016:CST,
author = "Andrew Brooks and Laura Krebs and Brandon Paulsen",
title = "A Comparison of Sorting Times between {Java 8} and
{Parallel Colt}: an Exploratory Experiment",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "1--5",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967316",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "An exploratory experiment found that sorting arrays of
random integers using Java 8's parallel sort required
only 50\%-70\% of the time taken using the parallel
sort of the Parallel Colt library. Factors considered
responsible for the performance advantage include the
use of a dual-pivot quicksort on locally held data at
certain phases of execution and work-stealing by
threads, a feature of the fork--join framework. The
default performance of Parallel Colt's parallel sort
was found to degrade dramatically for small array sizes
due to unnecessary thread creation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Honig:2016:LAS,
author = "William L. Honig and Natsuko Noda and Shingo Takada",
title = "Lack of Attention to Singular (or Atomic) Requirements
Despite Benefits for Quality, Metrics and Management",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "1--5",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967315",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "There are seemingly many advantages to being able to
identify, document, test, and trace single or
``atomic'' requirements. Why then has there been little
attention to the topic and no widely used definition or
process on how to define atomic requirements?
Definitions of requirements and standards focus on user
needs, system capabilities or functions; some
definitions include making individual requirements
singular or without the use of conjunctions. In a few
cases there has been a description of atomic system
events or requirements. This work is surveyed here
although there is no well accepted and used best
practice for generating atomic requirements. Due to
their importance in software engineering, quality and
metrics for requirements have received considerable
attention. In the seminal paper on software
requirements quality, Davis et al. proposed specific
metrics including the ``unambiguous quality factor''
and the ``verifiable quality factor''; these and other
metrics work best with a clearly enumerable list of
single requirements. Atomic requirements are defined
here as a natural language statement that completely
describes a single system function, feature, need, or
capability, including all information, details, limits,
and characteristics. A typical user login screen is
used as an example of an atomic requirement which can
include both functional and nonfunctional requirements.
Individual atomic requirements are supported by a
system glossary, references to applicable industry
standards, mock ups of the user interface, etc. One way
to identify such atomic requirements is from use case
or system event analysis. This definition of atomic
requirements is still a work in progress and offered to
prompt discussion. Atomic requirements allow clear
naming or numbering of requirements for traceability,
change management, and importance ranking. Further,
atomic requirements defined in this manner are suitable
for rapid implementation approaches (implementing one
requirement at a time), enable good test planning
(testing can clearly indicate pass or fail of the whole
requirement), and offer other management advantages in
project control.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Osterweil:2016:PEM,
author = "Leon J. Osterweil",
title = "Preview: Ethical and Moral Issues for Software
Engineers",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "5--5",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967311",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2016:Pc,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "6--7",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967312",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Xie:2016:OTO,
author = "Tao Xie",
title = "Outward Thinking for Our Research Community",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "7--8",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967313",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2016:SNSc,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "9--17",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967314",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2016:RPc,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "18--24",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967310",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mishra:2016:ISD,
author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
Mishra",
title = "Information Systems in Distributed Environments 2015",
journal = j-SIGSOFT,
volume = "41",
number = "4",
pages = "25--26",
month = jul,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2967307.2967317",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:45 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a report from a one-day sixth international
workshop on ``Information Systems in Distributed
Environments'' (ISDE), which was organized in
conjunction with the OnTheMove Federated Conferences \&
Workshops (OTM 2015) October 26-30, 2015, Rhodes,
Greece. The main focus of this event was to provide a
venue for the discussion of challenges related to the
development, operation, and maintenance of distributed
information systems, and their creation in the context
of global development projects. Further dissemination
of research results will lead to an improvement of
distributed information system development and
deployment across the globe.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Osterweil:2016:P,
author = "Leon J. Osterweil",
title = "Be Prepared",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "4--5",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994210",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2016:Pd,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "6--5",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994211",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2016:SSS,
author = "Robert Schaefer",
title = "Science, Society, and Software Engineering. {Part 2}:
If science is outlawed, will only outlaws do science?",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "7--8",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994212",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Elbaum:2016:SI,
author = "Sebastian Elbaum",
title = "The State of {ICSE}",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "9--10",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994213",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2016:SNSd,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "11--18",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994209",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2016:RPd,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "19--26",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994208",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kuhrmann:2016:SIC,
author = "Marco Kuhrmann and Rory V. O'Connor and Dewayne E.
Perry and David Raffo",
title = "Summary of the {International Conference on Software
and System Processes (ICSSP 2016)}: [Co-located with
{ICSE 2016}]",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "27--30",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994215",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The International Conference on Software and Systems
Process (ICSSP), continuing the success of Software
Process Workshop (SPW), the Software Process Modeling
and Simulation Workshop (ProSim) and the International
Conference on Software Process (ICSP) conference
series, has become the established premier event in the
field of software and systems engineering processes. It
provides a leading forum for the exchange of research
outcomes and industrial best-practices in process
development from software and systems disciplines.
ICSSP 2016 was held in Austin, Texas, from 14-15 May
2016, co-located with the 38th International Conference
on Software Engineering (ICSE). The theme of mICSSP
2016 was studying ``Process(es) in Action'' by
recognizing that the AS-Planned and AS-Practiced
processes can be quite different in many ways including
their ows, their complexity and the evolving needs of
stakeholders. Papers presented at ICSSP discussed this
issue addressing different domains, providing concepts,
evidence, and experiences.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2016:NYS,
author = "Richa Sharma and Ashish Sureka",
title = "A Nine Year Story of the {India} Software Engineering
Conference from 2008 to 2016",
journal = j-SIGSOFT,
volume = "41",
number = "5",
pages = "31--44",
month = sep,
year = "2016",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/2994205.2994214",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:46 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The India Software Engineering Conference (ISEC) is an
annual conference in the field of Software Engineering
(SE) in India. ISEC started in the year 2008 and
completed 9 years in 2016. The ISEC conference has
evolved into a high-quality academic event for SE
researchers from universities and industry in India
with considerable international participation.
Assessment and evaluation of ISEC conference quality,
status and evolution is important for the national SE
scientific community, ISEC steering committee, sponsors
and science and technology-related government bodies.
In this paper, we conduct scientific paper publication
mining and scientometric and bibliometric analysis of 9
years of ISEC publications and programs. We conduct an
in-depth multi-dimensional analysis of the conference
across various aspects such as a summary of 9 years of
ISEC programs (paper submission data, tutorials,
workshops, keynotes, invited talks, geographical
location, program and general chairs),
author-affiliation-based geographical contribution
(analysis at the international and national levels),
topic analysis, university and industry collaborations,
contributions across university types in India,
prolific and new authors, gender equality and
imbalance, program committee characteristics,
open-source or closed-source datasets and
citation-based impact. We also present our
recommendations for future editions of the ISEC based
on our comprehensive analysis study presented in this
paper.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sahu:2017:CDS,
author = "Madhusmita Sahu and Durga Prasad Mohapatra",
title = "Computing Dynamic Slices of Feature--Oriented Programs
Using Execution Trace File",
journal = j-SIGSOFT,
volume = "42",
number = "2",
pages = "1--16",
month = apr,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3089649.3089657",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Feature-Oriented Programming (FOP) is a general
paradigm for synthesizing programs in software product
lines. A family of software systems constitutes a
software product line (SPL). The unique characteristics
of feature-oriented programs such as mixin layers,
refinements of classes, refinements of constructors,
constants, refinements, etc. pose special difficulties
in the slicing of these programs. This paper proposes a
dynamic slicing algorithm for feature-oriented
programs. The algorithm is named Execution Trace File
Based Feature-Oriented Dynamic Slicing (ETBFODS)
algorithm. The ETBFODS algorithm uses a dependence
based representation called Dynamic Feature Composition
Dependence Graph (DFCDG) and an execution trace file to
store execution history of the program for a given
input. The dynamic slice is computed by traversing the
DFCDG in breadth--first or depth-first wise and then
mapping the resultant traversed vertices to the program
statements.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Elbaum:2017:SI,
author = "Sebastian Elbaum",
title = "The State of {ICSE}",
journal = j-SIGSOFT,
volume = "42",
number = "2",
pages = "4--5",
month = apr,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3089649.3089651",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2017:Pa,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "42",
number = "2",
pages = "5--6",
month = apr,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3089649.3089652",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2017:RPa,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "42",
number = "2",
pages = "7--14",
month = apr,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3089649.3089653",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Duarte:2017:IWC,
author = "Carlos Henrique C. Duarte and Andreas Jedlitschka and
Ayse Bener",
title = "{4th International Workshop on Conducting Empirical
Studies in Industry (CESI 2016)}: Post-workshop
Report",
journal = j-SIGSOFT,
volume = "42",
number = "2",
pages = "15--18",
month = apr,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3089649.3089655",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Few would deny today the importance of empirical
studies in the field of Software Engineering. An
increasing number of studies are being conducted
involving the software industry, but, while literature
abounds on idealistic empirical procedures, relatively
little is known about the dynamics and complexity of
conducting empirical studies in the software industry.
How research results are put into action in industrial
settings and how much cross company learning takes
place through replication of empirical studies in
different contexts? What are the impediments when
attempting to follow prescriptive procedures in the
organizational setting and how to best handle them?
These drivers underlie the organization of the fourth
in a series of workshops, CESI 2016, held on 17th May,
2016 at ICSE 2016. This report summarizes the workshop
details and the proceedings of the day.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bures:2017:SES,
author = "Tomas Bures and Danny Weyns and Bradley Schmer and
Eduardo Tovar and Eric Boden and Thomas Gabor and Ilias
Gerostathopoulos and Pragya Gupta and Eunsuk Kang and
Alessia Knauss and Pankesh Patel and Awais Rashid and
Ivan Ruchkin and Roykrong Sukkerd and Christos
Tsigkanos",
title = "Software Engineering for Smart Cyber-Physical Systems:
Challenges and Promising Solutions",
journal = j-SIGSOFT,
volume = "42",
number = "2",
pages = "19--24",
month = apr,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3089649.3089656",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Smart Cyber--Physical Systems (sCPS) are modern CPS
systems that are engineered to seamlessly integrate a
large number of computation and physical components;
they need to control entities in their environment in a
smart and collective way to achieve a high degree of
effectiveness and efficiency. At the same time, these
systems are supposed to be safe and secure, deal with
environment dynamicity and uncertainty, cope with
external threats, and optimize their behavior to
achieve the best possible outcome. This ``smartness''
typically stems from highly cooperative behavior,
self-awareness, self-adaptation, and self-optimization.
Most of the ``smartness'' is implemented in software,
which makes the software one of the most complex and
most critical constituents of sCPS. As the specifics of
sCPS render traditional software engineering approaches
not directly applicable, new and innovative approaches
to software engineering of sCPS need to be sought. This
paper reports on the results of the Second
International Workshop on Software Engineering for
Smart Cyber--Physical Systems (SEsCPS 2016), which
specifically focuses on challenges and promising
solutions in the area of software engineering for
sCPS.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Liu:2017:PMB,
author = "Pan Liu and Jun Ai and Zhenning (Jimmy) Xu",
title = "Probability Model-Based Test Suite Reduction",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "1--6",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127371",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The paper presents a test suite reduction approach
based on probability models in regression testing.
First, we model the process of software testing by
using the joint probability of both test cases and
program faults, and propose two probability models for
the software's old and new versions, respectively.
Then, a theorem combining set operations and
probability models is given to implement our approach.
Different from the traditional coverage-based test
suite reduction methods, the reduced test suite
constructed by our approach does not need to cover all
test requirements, but also remains the same fault
detection capability of the original test suite. The
paper presents a test suite reduction approach based on
probability models in regression testing. First, we
model the process of software testing by using the
joint probability of both test cases and program
faults, and propose two probability models for the
software's old and new versions, respectively. Then, a
theorem combining set operations and probability models
is given to implement our approach. Different from the
traditional coverage-based test suite reduction
methods, the reduced test suite constructed by our
approach does not need to cover all test requirements,
but also remains the same fault detection capability of
the original test suite.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2017:BSA,
author = "Lov Kumar and Ranjan Kumar Behera and Santanu Rath and
Ashish Sureka",
title = "A Bibliometric Study of {ACM SIGSOFT} Software
Engineering Notes from 2007 to 2016",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "1--7",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127369",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Bibliometric analysis is a commonly used technique to
analyze scholarly publications to extract useful
insights about research and scientific papers which can
then be used for decision making by policy makers and
administrators. Bibliometric analysis helps in
understanding various aspects of scientific knowledge
creation and dissemination such as author and institute
productivity, impact of articles in terms of citations,
university and industry collaboration, geographical
contributions and ethnic and gender minority in
authorship. ACM SIGSOFT Software Engineering Notes
(SEN) is a non-refereed but a reputed and edited
publication for informal writings and reports about
Software Engineering (SE). ACM SIGSOFT SEN publishes
various types of submissions such as paper, report,
column, announcement and book review. These submissions
are published in the ACM Digital Library (DL). We
conduct a bibliometric analysis of articles published
in ACM SIGSOFT SEN during a ten year period from 2007
to 2016. Our objective is to provide a historical
overview (one decade) of ACM SIGSOFT SEN and reflect on
the past so that the ACM SIGSOFT community and
contributors can assess the strengths and shortcomings
of the SEN. We believe that the bibliometric analysis
presented in this paper can provide insights on the
extent to which the SEN is meeting its desired
objectives.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Rathee:2017:ROO,
author = "Amit Rathee and Jitender Kumar Chhabra",
title = "Restructuring of Object-Oriented Software Through
Cohesion Improvement Using Frequent Usage Patterns",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "1--8",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127370",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Due to wide adoption of object-oriented programming in
software development, there is always a requirement to
produce well-designed software systems, so that the
overall software maintenance cost is reduced and
reusability of the component is increased. But, due to
prolonged maintenance activities, the internal
structure of software system deteriorates. In this
situation, restructuring is a widely used solution to
improve the overall internal structure of the system
without changing its external behavior. As, it is known
that, one technique to perform restructuring is to use
refactoring on the existing source code to alter its
internal structure without modifying its external
functionality. However, the refactoring solely depends
on our ability to identify various code smells present
in the system. Refactoring aims at improving cohesion
and reducing coupling in the software system. So, in
this paper, a restructuring approach based on
refactoring is proposed through improvement in
cohesion. This paper focuses on improving the cohesion
of different classes of object-oriented software using
a newly proposed similarity metric based on Frequent
Usage Patterns (FUP). The proposed similarity metric
measure the relatedness among member functions of the
classes. The metric makes use of FUPs used by member
functions. The FUP consists of unordered sequences of
member variables accessed by member function in
performing its task. The usage pattern includes both
direct and indirect usages based on sub-function calls
within a member function. Based on the values of the
similarity metric, we performed hierarchical
agglomerative clustering using complete linkage
strategy to cluster member functions. Finally, based on
the clusters obtained, the source code of the software
is refactored using proposed refactoring algorithm. The
applicability of our proposed approach is tested using
two java projects related to different domains of real
life. The result obtained encourages the applicability
of proposed approach in the restructuring of a software
system.patterns, refactoring, hierarchical clustering,
maintainability. usage patterns, refactoring,
hierarchical clustering, maintainability.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Monteiro:2017:BTM,
author = "Felipe R. Monteiro and Francisco A. P. Janu{\'a}rio
and Lucas C. Cordeiro and Eddie B. de Lima Filho",
title = "{BMCLua}: a Translator for Model Checking {Lua}
Programs",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "1--10",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127367",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Lua is a programming language designed as scripting
language, which is fast, lightweight, and suitable for
embedded applications. Due to its features, Lua is
widely used in the development of games and interactive
applications for digital TV. However, during the
development phase of such applications, some errors may
be introduced, such as deadlock, arithmetic overflow,
and division by zero. This paper describes a novel
verification approach for software written in Lua,
using as backend the Efficient SMTBased Context-Bounded
Model Checker (ESBMC). Such an approach, called bounded
model checking --- Lua (BMCLua), consists in
translating Lua programs into ANSI-C source code, which
is then verified with ESBMC. Experimental results show
that the proposed verification methodology is effective
and efficient, when verifying safety properties in Lua
programs. The performed experiments have shown that
BMCLua produces an ANSI-C code that is more efficient
for verification, when compared with other existing
approaches. To the best of our knowledge, this work is
the first that applies bounded model checking to the
verification of Lua programs.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumar:2017:TLC,
author = "Lov Kumar and Ranjan Kumar Behera and Santanu Rath and
Ashish Sureka",
title = "Transfer Learning for Cross-Project Change-Proneness
Prediction in Object-Oriented Software Systems: a
Feasibility Analysis",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "1--11",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127368",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Change-prone classes or modules are defined as regions
of the source code which are more likely to change as a
result of a software development of maintenance
activity. Automatic identification of change-prone
classes are useful for the software development team as
they can focus their testing efforts on areas within
the source code which are more likely to change.
Several machine learning techniques have been proposed
for predicting change-prone classes based on the
application of source code metrics as indicators.
However, most of the work has focused on within-project
training and model building. There are several real
word scenario in which sufficient training dataset is
not available for model building such as in the case of
a new project. Cross-project prediction is an approach
which consists of training a model from dataset
belonging to one project and testing it on dataset
belonging to a different project. Cross-project
change-proneness prediction is relatively unexplored.
We propose a machine learning based approach for
cross-project change-proneness prediction. We conduct
experiments on 10 open-source Eclipse plug-ins and
demonstrate the effectiveness of our approach. We frame
several research questions comparing the performance of
within project and cross project prediction and also
propose a Genetic Algorithm (GA) based approach for
identifying the best set of source code metrics. We
conclude that for within project experimental setting,
Random Forest (RF) technique results in the best
precision. In case of cross-project change-proneness
prediction, our analysis reveals that the NDTF ensemble
method performs higher than other individual
classifiers (such as decision tree and logistic
regression) and ensemble methods in the experimental
dataset. We conduct a comparison of within-project,
cross-project without GA and cross-project with GA and
our analysis reveals that cross-project with GA
performs best followed by within-project and then
cross-project without GA.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Banerjee:2017:RAF,
author = "Shreya Banerjee and Anirban Sarkar",
title = "A Requirements Analysis Framework for Development of
Service Oriented Systems",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "1--12",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127366",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In Service Oriented Systems (SOS), implementation of
business processes is accomplished through services in
distributed, loosely coupled manner based on business
process requirements of the users. Consequently,
importance of business process requirements analysis
for development of SOS is strongly highlighted in both
academia and industry. Usually, traditional
requirements engineering is competent enough to specify
and analysis business requirements for development of
software systems efficiently. However, Service Oriented
Requirement Engineering (SORE) emerging for SOS
development is differed from traditional requirement
engineering due to complex nature of services. Yet, a
serious gap is still exist between early and detailed
specification of business process requirements in SORE
and further mapping towards design of SOS from set of
business processes. To address this issue, in this
paper, a requirements analysis framework is proposed
for development of SOS systems. The contribution of the
proposed work is formal representation of business
process requirements for SOS based on business scenario
and Cause-Effect-Dependency (CED) graph in dimensions
of six aspects of services --- What, Why, How, Who,
When and Where (5W1H). Both early and detailed level
requirements analysis in the context of SORE is
facilitated by the proposed approach. Beside,
traceability of proposed approach towards design of
business processes for development of SOS is also
exhibited in this paper. Moreover, the practical
utility of the proposed approach is demonstrated using
a suitable case study.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Osterweil:2017:R,
author = "Leon J. Osterweil",
title = "Be Responsible",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "5--8",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127361",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2017:Pb,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "9--9",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127362",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2017:RPb,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "10--17",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127363",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fontana:2017:TDA,
author = "Francesca Arcelli Fontana and Alexander Chatzigeorgiou
and Wolfgang Trumler and Clemente Izurieta and Paris
Avgeriou and Robert L. Nord",
title = "Technical Debt in Agile Development: Report on the
{Ninth Workshop on Managing Technical Debt (MTD
2017)}",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "18--21",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127372",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We report on the Ninth International Workshop on
Managing Technical Debt, collocated with the 18th
International Conference on Agile Software Development
(XP 2017) in Cologne. The technical debt research
community continues to expand through collaborations of
industry, tool vendors, and academia. The theme of this
year's workshop was on technical debt in agile
development. Presentations and discussion centered on
the topics: technical debt at the code level,
architectural technical debt assessment, agile
approaches and their impact on technical debt
management, and selling the business case of technical
debt management.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gleirscher:2017:SCA,
author = "Mario Gleirscher and Stefan Kugele and Jonathan
Sprinkle",
title = "Safe Control of Autonomous \& Connected Vehicles
{(SCAV'17)}: Report from the {1st International
Workshop at CPSWeek 2017}",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "22--23",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127373",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this report, we summarize topics, challenges, and
research questions discussed in the workshop
contributions and during the sessions of our workshop.
This summary has the purpose of leveraging the transfer
of our findings into future activities of the automatic
vehicle control (AVC) community.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Galster:2017:TUS,
author = "Matthias Galster and Damian A. Tamburri and Rick
Kazman",
title = "Towards Understanding the Social and Organizational
Dimensions of Software Architecting",
journal = j-SIGSOFT,
volume = "42",
number = "3",
pages = "24--25",
month = jul,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3127360.3127374",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:47 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software architecting is about making decisions that
have system-wide impact and that shape software product
and process alike. While researchers and practitioners
have tried to define and scope the role of the
architecture, social and organizational impacts on the
architect and the architecting process are often
neglected. These impacts were the topics of the First
International Workshop on the Social and Organizational
Dimensions of Software Architecting. This report
summarizes the workshop.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dabaghchian:2017:CAS,
author = "Maryam Dabaghchian and Zvonimir Rakamaric and Burcu K.
Ozkan and Erdal Mutlu and Serdar Tasiran",
title = "Consistency-Aware Scheduling for Weakly Consistent
Programs",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--5",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149493",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Modern geo-replicated data stores provide high
availability by relaxing the underlying consistency
requirements. Programs layered over such data stores
are called weakly consistent programs. Due to the
reduced consistency requirements, they exhibit highly
nondeterministic behaviors, some of which might violate
program invariants. Therefore, implementing correct
weakly consistent programs and reasoning about them is
challenging. In this paper, we present a systematic
scheduling approach that is aware of the underlying
consistency model. Our approach dynamically explores
all possible program behaviors allowed by the used data
store consistency model, and it evaluates program
invariants during the exploration. We implement the
approach in a prototype model checker for Antidote,
which is a causally consistent key-value data store
with convergent conflict handling. We evaluate our tool
on several benchmarks. The results show that our
approach is e effective in detecting buggy behaviors in
weakly consistent programs.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Milewicz:2017:SPM,
author = "Reed M. Milewicz and Simon Poulding",
title = "Scalable Parallel Model Checking via {Monte-Carlo}
Tree Search",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--5",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149495",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The future of model checking lies in parallel and
distributed computing, but parallel graph search
algorithms tailored to directed model checking remains
an underdeveloped area of research. In this work, we
examine the application of parallel Monte Carlo Tree
Search algorithms. We demonstrate how exploratory,
randomly sampled rollouts of the search space,
coordinated through a minimally communicating
work-sharing protocol, can enable us to push the
boundaries on the scope and scale of problems amenable
to serial search.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Noller:2017:SSE,
author = "Yannic Noller and Hoang Lam Nguyen and Minxing Tang
and Timo Kehrer",
title = "Shadow Symbolic Execution with {Java PathFinder}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--5",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149492",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Regression testing ensures that a software system when
it evolves still performs correctly and that the
changes introduce no unintended side-effects. However,
the creation of regression test cases that show
divergent behavior needs a lot of effort. A solution is
the idea of shadow symbolic execution, originally
implemented based on KLEE for programs written in C,
which takes a unified version of the old and the new
program and performs symbolic execution guided by
concrete values to explore the changed behavior. In
this work, we apply the idea of shadow symbolic
execution to Java programs and, hence, provide an
extension of the Java PathFinder (JPF) project to
perform shadow symbolic execution on Java bytecode. The
extension has been applied on several subjects from the
JPF test classes where it successfully generated test
inputs that expose divergences relevant for regression
testing.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sharma:2017:VCS,
author = "Vaibhav Sharma and Michael W. Whalen and Stephen
McCamant and Willem Visser",
title = "{Veritesting} Challenges in Symbolic Execution of
{Java}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--5",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149491",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Scaling symbolic execution to industrial-sized
programs is an important open research problem.
Veritesting is a promising technique that improves
scalability by combining the advantages of static
symbolic execution with those of dynamic symbolic
execution. The goal of veritesting is to reduce the
number of paths to explore in symbolic execution by
creating formulas describing regions of code using
disjunctive formulas. In previous work, veritesting was
applied to binary-level symbolic execution. Integrating
veritesting with Java bytecode presents unique
challenges: notably, incorporating non-local control
jumps caused by runtime polymorphism, exceptions,
native calls, and dynamic class loading. If these
language features are not accounted for, we hypothesize
that the static code regions described by veritesting
are often small and may not lead to substantial
reduction in paths. We examine this hypothesis by
running a Soot-based static analysis on six large
open-source projects used in the Defects4J collection.
We find that while veritesting can be applied in
thousands of regions, allowing static symbolic
execution involving non-local control jumps amplifies
the performance improvement obtained from veritesting.
We hope to use these insights to support efficient
veritesting in Symbolic PathFinder in the near future.
Toward this end, we brie y address some engineering
challenges to add veritesting into SPF.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wang:2017:JRJ,
author = "Kaiyuan Wang and Sarfraz Khurshid and Milos Gligoric",
title = "{JPR}: Replaying {JPF} Traces Using Standard {JVM}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--5",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149494",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "Java PathFinder (JPF) is a backtrackable Java Virtual
Machine (JVM), which is implemented in Java and runs on
a standard JVM (e.g., Oracle HotSpot). Thus, a JPF
developer can use off-the-shelf Java debuggers (e.g.,
jdb) when debugging code that makes up JPF. JPF
explores all non-deterministic executions of a given
target program and monitors for property violations. To
facilitate debugging of the target program, JPF can
capture and replay the execution trace that leads to a
property violation. While the deterministic replay is
invaluable, the replay with JPF does not allow the
developer to attach an off-the-shelf Java debugger to
the target program (e.g., step through the application
code, set breakpoints, etc.). We present a technique,
dubbed JPR, to improve the debugging experience of the
JPF captured traces by migrating the JPF traces to a
new format that can be executed using the standard JVM.
JPR annotates each JPF trace, during the capture phase,
with extra data (e.g., instruction index, instruction
count, etc.); the annotated trace is then used to
instrument Java bytecode to enforce the same execution
trace on a standard JVM. JPR is compatible with various
optimizations, e.g., state matching and partial-order
reduction. We evaluated JPR on all multithreaded Java
programs in the official JPF distribution. Our results
show that JPR successfully replayed all JPF traces on
the standard JVM with reasonable overhead during both
recording and replaying.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sarkar:2017:HEI,
author = "Santonu Sarkar and Gargi Alavani",
title = "How Easy it is to Write Software for Heterogeneous
Systems?",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--7",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149511",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Every other personal computer today is provided with a
coprocessor making it a heterogeneous computing
environment. As the heterogeneous and high-performance
computing (HPC) infrastructure becomes a commodity, the
need to improve software development productivity to
build efficient parallel programs for this
infrastructure becomes all the more crucial. While the
mainstream software development methodology focuses on
modular design, reusability, ease of understanding and
so on, parallel program development emphasizes on
performance, optimal use of a hardware resource,
scalability, execution correctness, and portability
across multiple hardware platforms. In this paper, we
identify a few unique software development productivity
requirements for heterogeneous systems. These
requirements are concerned with design abstraction,
reusability, and design verification. While these
requirements are applicable for a conventional software
as well, their implications are far reaching in the
context of parallel programs. Here we discuss
significant efforts in building tools and frameworks to
(i) provide powerful abstraction over the hardware,
(ii) build software libraries for parallel hardware
access and (iii) implement verification mechanisms to
check the correctness of a program behavior in a
heterogeneous runtime environment. We also identify
several important gaps in the existing work that needs
to be addressed in order to make the current body of
work useful in practice.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Theisen:2017:SER,
author = "Christopher Theisen and Marcel Dunaiski and Laurie
Williams and Willem Visser",
title = "Software Engineering Research at the {International
Conference on Software Engineering} in 2016",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--7",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149496",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "With the goal of helping software engineering
researchers understand how to improve their papers,
Mary Shaw presented ``Writing Good Software Engineering
Research Papers'' in 2003. Shaw analyzed the abstracts
of the papers submitted to the 2002 International
Conference of Software Engineering (ICSE) to determine
trends in research question type, contribution type,
and validation approach. We revisit Shaw's work to see
how the software engineering research community has
evolved since 2002. The goal of this paper is to aid
software engineering researchers in understanding
trends in research question design, research question
type, and validation approach by analyzing the
abstracts of the papers submitted to ICSE 2016. We
implemented Shaw's recommendation for replicating her
study through the use of multiple coders and the
calculation of inter-rater reliability and demonstrate
that her approach can be repeated. Our results indicate
that reviewers have increased expectations that papers
have solid evaluations of the research contribution.
Additionally, the 2016 results include at least 17\%
mining software repository (MSR) papers, a category of
papers not seen in 2002. The advent of MSR papers has
increased the use of generalization/characterization
research questions, the production of empirical report
contribution, and validation by evaluation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Satish:2017:TPA,
author = "Preeti Satish and Peri Nikhil and Krishnan
Rangarajan",
title = "A Test Prioritization Algorithm That Cares for
{``Don't Care''} Values and Higher Order Combinatorial
Coverage",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--9",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149510",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The efficiency of prioritization algorithms depends on
how early the faults are detected. In this paper, we
present a novel prioritization algorithm for
combinatorial testing. Our approach takes ACTS tool
generated test cases with ``don't care'' values as the
starting point and refines them for increased
effectiveness without increasing the number of test
cases. Our algorithm maximizes the number of higher
order combinations tested, by filling the ``don't
care'' values in the test suite effectively. It also
orders the test cases using a cost function that
includes higher order coverage, thereby achieving early
fault detection. The effectiveness of our algorithms is
demonstrated by performing a comparative evaluation
using the metric t way Rate of Fault Detection, on 2
real life case studies and numerous synthetic covering
arrays of different sizes. The results show that our
algorithms perform better in terms of covering higher
order pairs and also faster.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Vieira:2017:CPO,
author = "Ianegitz Vieira and Alexandre Alvaro",
title = "A Centralized Platform of Open Government Data as
Support to Applications in the Smart Cities Context",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "1--13",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149512",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Purpose --- This article aims to present the design,
implementation and validation of an Open Government
Data Platform. Design/methodology/approach --- The
development of the work took place in 4 steps: survey
of the state of the art of literature; design of the
open government data platform; implementation and
testing of the platform; and, finally, experimental
validation with a group of students of a Brazilian
university. Findings --- Through the validations of the
platform can be noted advantages with respect to the
productivity gain for the development of solutions, in
the context of Smart Cities, using the proposed
platform. Research limitations/implications --- The
experiment was developed in a controlled manner in the
context of a Brazilian university. In addition, there
is a need to capture more data from other town hall to
store on the platform. Originality/value --- The
centralized storage of open government data is a tool
that enables the decision-making of public managers as
well as the beginning of the transformation of the
present cities to a smart city.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2017:Pc,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "5--6",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149489",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mei:2017:RSE,
author = "Hong Mei",
title = "A Review of Software Engineering Research in {China}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "6--9",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149488",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2017:RPc,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "10--17",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149490",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kuhrmann:2017:SIW,
author = "Marco Kuhrmann and J{\"u}rgen M{\"u}nch and Paolo Tell
and Philipp Diebold",
title = "Summary of the {1st International Workshop on Hybrid
Development Approaches in Software Systems
Development}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "18--20",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149519",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The first international HELENA workshop was held
co-located with the 2017 International Conference on
Software and Systems Process (ICSSP). The goals of this
workshop were to bring the HELENA team together, foster
general networking, discuss the current state of the
project, and develop a roadmap towards future
activities. From the 84 researchers and practitioners
from 25 active countries, 25 participated in this
workshop. The overall status report shows that the
HELENA survey is increasingly gaining attention, and
more then 300 data points have been collected so far.
The team agreed on a number of topics for future
activities, e.g., organizational transformation,
adaptation and evolution, and development approaches
for safety-critical systems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chechik:2017:RWM,
author = "Marsha Chechik and Davide {Di Ruscio}",
title = "Report from the {9th Workshop on Modelling in Software
Engineering (MiSE 2017)}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "21--24",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149520",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "MiSE 2017 was the 9th edition of the workshop on
Modelling in Software Engineering, held on 21-22 May
2017 as a satellite event of the 39th International
Conference on Software Engineering (ICSE 2917), Buenos
Aires, Argentina. The goal of this 2-day workshop was
to bring together researchers and practitioners in
order to exchange innovative technical ideas and
experiences related to modeling. The 9th edition of the
MiSE workshop provided a forum to discuss successful
applications of software-modeling techniques and to
gain insights into challenging modeling problems,
including uncertainty management, model heterogeneity,
model reuse and evolution, testing, and the adoption of
models in critical application domains like
self-adaptive and real-time systems.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mohalik:2017:WDA,
author = "Swarup Kumar Mohalik and Badrinath Ramamurthy and
Mahesh Babu Jayaraman and Meenakshi D'Souza",
title = "{Workshop on Developmental aspects of Intelligent
Adaptive Systems (DIAS)}: Co-located with {10th
Innovations in Software Engineering Conference (ISEC),
Jaipur, India}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "25--27",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149521",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "With the proliferation of the Internet of Things and
the associated trend of integration of software with
``things'', it is predicted that the complexity of the
systems-of-future will be characterized not only by
scale and variety of devices and software but also by
the constant change of the system context due to the
mobility of devices and M2M interactions. Consequently,
the current paradigm of automation will be inadequate
for the management and operation of these systems. The
dominant approach to address this issue is to design
and develop autonomous systems that can adapt to the
changes in various levels and keep delivering the
expected functionality. Such systems need fundamentally
different architectures, components and methodologies
incorporating new paradigms such as machine learning
and intelligent decision making. In this workshop, we
attempt to discuss the in uence of these paradigms on
the development life cycle of adaptive software,
starting from requirements, design and architecture and
also their verification and validation.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Borg:2017:SIW,
author = "Markus Borg and Elizabeth Bjarnason and Michael
Unterkalmsteiner and Tingting Yu and Gregory Gay and
Michael Felderer",
title = "Summary of the {4th International Workshop on
Requirements Engineering and Testing (RET 2017)}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "28--31",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149522",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The RET (Requirements Engineering and Testing)
workshop series provides a meeting point for
researchers and practitioners from the two separate
fields of Requirements Engineering (RE) and Testing.
The long term aim is to build a community and a body of
knowledge within the intersection of RE and Testing,
i.e., RET. The 4th workshop was co-located with the
25th International Requirements Engineering Conference
(RE'17) in Lisbon, Portugal and attracted about 20
participants. In line with the previous workshop
instances, RET 2017 offered an interactive setting with
a keynote, an invited talk, paper presentations, and a
concluding hands-on exercise.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gotz:2017:RIW,
author = "Sebastian G{\"o}tz and Christian Piechnick and Andreas
Wortmann",
title = "Report on the {4th International Workshop on
Model-driven Robot Software Engineering (MORSE)}",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "32--34",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149523",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 4th edition of the international workshop on
model-driven robot software engineering (MORSE) was
held at the International Conference on Software
Technologies: Applications and Foundations (STAF). The
workshop took place in the city of Marburg, Germany, on
the 21st of July 2017. The focus of this year's edition
of the workshop was on scenario-based development and
interaction modeling. In this report, we first present
a synopsis of the workshop sessions before we highlight
concerns raised in workshop's interactive discussion.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Galster:2017:VCS,
author = "Matthias Galster and Danny Weyns and Michael Goedicke
and Uwe Zdun and J{\'a}come Cunha and Jaime
Chavarriaga",
title = "Variability and Complexity in Software Design: Towards
Quality through Modeling and Testing",
journal = j-SIGSOFT,
volume = "42",
number = "4",
pages = "35--37",
month = oct,
year = "2017",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3149485.3149524",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:48 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Today's software systems must accommodate a wide range
of usage and deployment scenarios. The increasing size
and heterogeneity of software-intensive systems,
dynamic and critical operating conditions, fast moving
and highly competitive markets, and increasingly
powerful and versatile hardware makes it more and more
difficult to handle the additional complexity in design
caused by variability. This paper reports results of
the Second International Workshop on Variability and
Complexity in Software Design. It also outlines
directions the field might move in the future.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Adriano:2019:MSF,
author = "Christian Adriano",
title = "Microtasking Software Failure Resolution: Early
Results",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "36--36",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310016",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Open source software development enabled distributed
teams of programmers to contribute to large software
systems that became standards in the operation of
government and business. Crowdsourcing went further by
enabling contributions in the form of small and
independent tasks. This allowed teams to scale from
dozens to hundreds of people. While crowdsourcing
established as industry practice in the areas of
software testing, it is challenging for source code
related tasks, e.g., software debugging. One of the
reasons is that the complex dependencies in the source
code can make many tasks difficult to partition and
sequence, and later aggregate their outcomes. I am
investigating these problems in the context of failure
resolution tasks. A failure resolution task consists of
inspecting the source code with the objective to
identify and explain the root-cause of a software
failure. My approach partitions code inspection into
questions that are automatically instantiated from
templates. I present here my research plan and the
early results of experiments on the efficacy,
efficiency, and scalability of my approach.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2018:Pa,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--2",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178336",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mukherjee:2018:PSI,
author = "Debashis Mukherjee and Dibyanshu Shekhar and Rajib
Mall",
title = "Proposal for A Structural Integration Test Coverage
Metric for Object-Oriented Programs",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--4",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178330",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Though a large number of test coverage metrics have
been proposed in the context of unit and system testing
of object oriented programs, structural coverage
metrics for integration testing have scarcely been
reported. In this context, we propose an integration
test coverage metric based on the coverage of the data
and control dependency edges of the JSysDG (Java System
Dependency Graph).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Yaman:2018:UIC,
author = "Sezin Gizem Yaman",
title = "User Involvement in Continuous Experimentation",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--4",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178322",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software product and service companies need
capabilities to evaluate their development decisions
and customer and user value. Continuous
experimentation, as an experiment-driven development
approach, may reduce such development risks by
iteratively testing product and service assumptions
that are critical to the success of the software.
Experiment-driven development is gaining increasing
attention by the practitioners, yet it is a novel
research area to be investigated. Involving users and
customers in the software development process and
understanding their needs and behaviors are essential
aspects when building successful software products and
services. Continuous experimentation approach in
software development comprises user involvement by its
nature, however, due to novelty of the concept, there
is no clear understanding of the user involvement
practices. My doctoral project aims to investigate how
software development organizations can involve the
users in continuous experimentation. The contributions
of the research are to (a) find out how involve users
in software companies that begin to adopt continuous
experimentation approach, (b) identify the barriers
hindering involving the users in the approach, and (c)
investigate what kinds of strategies have been used for
experimentation with different software product and
services.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Akbarinasaji:2018:PLB,
author = "Shirin Akbarinasaji",
title = "Prioritizing lingering bugs",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178326",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As the software projects become more complex, the
release decision is made without resolving all the bugs
in the issue tracking system. Accumulation of the bugs
in the bug repository is similar to financial
obligation as we borrow time and resources to engage in
another activity rather than resolving the bugs.
Deferring the bug in the next release may have some
consequences. Therefore, the decision whether to
resolve the bug in the current release or postponing it
to the next release is a crucial decision. In this
proposal, we study the deferred bugs (lingering bugs)
against the nondeferred bugs (regular bugs). Our aim is
to develop the predictive model which can predict
whether the bug would linger or not. Additionally, we
are interested in measuring of the lingering bug in
terms of principal (standard time it takes to x them)
and risk of liability (impact). We propose to use
reinforcement learning for prioritization of lingering
bugs with respect to their impact.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Arruda:2018:REC,
author = "Darlan Arruda",
title = "Requirements Engineering in the Context of Big Data
Applications",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178323",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Requirements Engineering (RE) plays an essential role
in the software engineering process, being considered
as one of the most critical phases of the software
development life-cycle. As we might expect, then, the
Requirements Engineering would play a similar role in
the context of Big Data applications. However,
practicing Requirements Engineering is a challenging
and complex task. It involves (i) stakeholders with
diverse backgrounds and levels of knowledge, (ii)
different application domains, (iii) it is expensive
and error-prone, (iii) it is important to be aligned
with business goals, to name a few. Because it involves
such complex activities, a lot has to be understood in
order to properly address Requirements Engineering.
Especially, when the technology domain (e.g., Big Data)
is not yet well explored. In this context, this paper
describes a research plan on Requirements Engineering
involving the development of Big Data applications. The
high-level goal is to investigate: (i) On the technical
front, the Requirements Engineering activities with
respect to the analysis and specification of Big Data
requirements and, (ii) on the management side, the
relationship between RE and Business Goals in the
development of Big Data Software applications.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Cartaxo:2018:SKT,
author = "Bruno Cartaxo",
title = "Supporting Knowledge Transfer From Secondary Studies
to Software Engineering Practice",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178325",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Researchers have been arguing that there is a lack of
connection between Secondary Studies (SSs) and Software
Engineering (SE) practice. The medical field has faced
the same problem, and recently introduced the concept
of briefings / summaries, and Rapid Reviews as
alternatives to transfer knowledge to practice. Goal:
The overarching goal of this research is to
investigate, propose, and evaluate strategies to
support researchers to transfer knowledge from SSs to
SE practice. Method: First, we investigated how SSs in
SE cover practitioners' issues reported in
StackExchange, a leading Question \& Answer platform.
Second, we generated Evidence Briefings based on those
SSs in order to propose a medium to transfer knowledge
to practice. Third, we are planning to conduct an
action research, with close collaboration with
practitioners, in order explore and evaluate the
applicability of Rapid Reviews in SE practice.
Preliminary Results: Among 424 practitioners' issues on
Stack Exchange, that were considered as related to a
set o selected SSs, the SSs could successfully cover
14.1\% (60) of them. Based on a qualitative techniques,
we identified 45 recurrent issues spread in many SE
topics. Additionally, both practitioners and
researchers positively evaluated the content and format
of 12 Evidence Briefings that we created based on SSs.
Conclusions: Our results until now corroborate with
claims that SSs lack connection with practice. On the
other side, the good reception of the Evidence
Briefings shows a possible route toward an effective
knowledge transfer from SSs to practice.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Dwivedi:2018:TAN,
author = "Ashish Kumar Dwivedi and Santanu Kumar Rath",
title = "Transformation of Alloy Notation into a Semantic
Notation",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178331",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Transformation of a model based on first-order logic
to a model that provides semantic notations is helpful
necessary during the analysis phase of any proposed
software. The semantic notations often guide the
designer to develop pseudocode correctly. This study
focuses on facilitation of transformation of one formal
model, i.e., Alloy into another, i.e., OWL. The
proposed approach extends the concept of existing
techniques i.e., UML2Alloy and TwoUse to transform
Alloy model into OWL. UML2Alloy transforms UML model
into Alloy model, whereas TwoUse approach bridges the
gap between UML model and OWL model. Alloy2OWL is based
on metamodel-based transformation techniques, which
help to map source model, i.e., Alloy into target
model, i.e., OWL. For the proper explanation of this
study, a model transformation framework is presented,
which can be applied to other transformation languages.
The proposed approach utilizes the Model-Driven
Development techniques to deal with the analysis of
Alloy model and determines design problems within a
specification. In this paper, various challenges are
also presented which occur during the transformation of
Alloy to OWL.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Lee:2018:OTC,
author = "Amanda Lee",
title = "One-Time Contributors to {FLOSS}: Surveys and Data
Analysis",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178327",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Free/Libre Open Source Software (FLOSS) projects rely
on a steady influx of newcomer volunteer developers to
survive. As these projects, unlike traditional software
projects, often do not pay their contributors to work
on them, volunteers must be obtained instead. Once
obtained, a volunteer goes through a lengthy process in
order to join the project, including obtaining
sufficient knowledge of the codebase and learning the
rules of the community. However, some developers drop
out after they make a single commit to the code
database. These developers are knowledgeable enough to
commit code and make it through the onboarding process,
but leave the project rather than join, therefore
depriving the project of potential talent. We propose
to understand these One-Time code Contributors (OTCs)
through surveys and through data-mining the projects?
software repositories: if they are a unique
demographic, why they only commit once, if anything can
be done to assist them. Once they are determined as a
separate demographic, the study pivots to examine other
factors that might affect OTCs, including such factors
as project governance and project architecture.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2018:RPa,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178337",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Noorwali:2018:SCD,
author = "Ibtehal Noorwali",
title = "Stakeholder Concern-Driven Requirements Analytics",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178324",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The requirements engineering (RE) process and
resultant requirements usually inform and interact with
downstream (e.g., design and testing) and side-stream
(e.g., project management, quality management)
processes in various ways. Each of these processes
involves numerous internal stakeholders (e.g.,
managers, developers, architects, etc.) who, in turn,
have different concerns with regard to the impact of
requirements on their respective processes. In other
words, the various stakeholders need different types of
requirements information and measurements in order for
them to manage, control, and track their respective
process activities (e.g., design traceability
information for architects, requirements progress for
project managers, etc.). The burden of providing this
information usually falls within the realm of the
requirements management process. However, due to the
lack of identified metrics and analytical methods, the
process of providing the various stakeholders with the
information that addresses their various concerns
becomes cumbersome. This is further complicated by
large project sizes, numerous stakeholders, time
pressure, large numbers of requirements, other software
artifacts, and others. This proposal aims to address
this problem by proposing to provide stakeholders with
concern-driven requirements analytics that will address
their various concerns. We intend to achieve this
through identifying metrics and analytical methods that
can be readily used in the requirements management
process. We further propose to provide the stakeholder
with a dashboard that allows them to choose from the
various requirements analytics options along with
visualization techniques that would best visualize the
data and address their concerns.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Teixeira:2018:IQC,
author = "Eudis Teixeira",
title = "Improving the Quality of Controlled Experiments in
Software Engineering",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178321",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "All experimental studies are prone to risk with regard
to the validity of their results. After applying a
determined action to control a threat, during planning
or executing an experiment, new risks to the study
validity can arise. Aim. To improve the quality of
controlled experiments in Software Engineering (SE),
setting out strategies that permit researchers giving
priority to specific threats in causes virtue and
consequences (trade-offs), which exist between threats
to validity and possible measures for control. Method.
We will employ a knowledge base acquired through a
survey and a Systematic Literature Review to model an
approach for prioritizing and controlling threats to
validity. The proposed approach will also be evaluated
through experiments. Contribution. To improve the
control processes for threats to validity considered to
be critical, reducing efforts required by researchers,
thereby improving the quality of future controlled
experiments in the Software Engineering area by
increasing its results? validity.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wang:2018:HCW,
author = "Huaimin Wang",
title = "Harnessing the crowd wisdom for software
trustworthiness",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--6",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178328",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2018:PMF,
author = "Ritu Jain and Ugrasen Suman",
title = "A Project Management Framework for Global Software
Development",
journal = j-SIGSOFT,
volume = "43",
number = "1",
pages = "1--10",
month = jan,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3178315.3178329",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:50 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Global software development (GSD) is a prevalent trend
which has fascinated most software companies. However,
the failure rate of GSD projects reveals the fact that
these types of projects are not an easy endeavor.
Management of GSD project is a domain where standards
are still lacking and companies are still struggling to
acquire a win-win situation. Project management body of
knowledge (PMBOK) provides a standard framework for
managing projects. However, the framework does not
consider the aspects of GSD. Thus, it can't be applied
directly for GSD projects. In this paper, we have
proposed a project management framework for GSD
projects. This framework assimilates the knowledge
areas of PMBOK with knowledge areas needed for
effective management of GSD. It would guide GSD project
manager about the aspects to be considered while
executing distributed projects. This framework would
also act as a baseline to researchers for further
investigation in GSD project management domain.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Osterweil:2018:G,
author = "Leon J. Osterweil",
title = "Be Gracious",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "4--6",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3203094.3203100",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2018:SSS,
author = "Robert Schaefer",
title = "Science, Society, and Software Engineering: {Part 3}
--- The Catch",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "4--6",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3041765.3041770",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2018:Pb,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "6--7",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3203094.3203101",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Osterweil:2018:YSD,
author = "Leon J. Osterweil",
title = "Your Software Dwells in the House of Tomorrow, Too",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "7--8",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3041765.3041769",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2018:RPb,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "8--11",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3203094.3203102",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2018:RPc,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "9--16",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3041765.3041771",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2018:ERW,
author = "Paramvir Singh and Sheikh Umar Farooq and Saurabh
Tiwari and Ashish Sureka",
title = "An Experience Report on {Workshop on Emerging Software
Engineering Education}",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "12--23",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3203094.3203112",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Doernhoefer:2018:SNS,
author = "Mark Doernhoefer",
title = "Surfing the net for {{\booktitle{Software Engineering
Notes}}}",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "17--25",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3041765.3041772",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gerard:2018:RIW,
author = "S{\'e}bastien G{\'e}rard and Dimitrios S. Kolovos and
Ivano Malavolta and Henry Muccini",
title = "Report from the {1st International Workshop on
Collaborative Modelling in MDE (COMMitMDE 2016)}",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "26--27",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3041765.3041773",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "COMMitMDE was the 1st international workshop on
Collaborative Modelling in MDE, held on the 4th of
October 2016 as a satellite event of the 19th
International Conference on Model Driven Engineering
Languages and Systems (MoDELS 2016), St. Malo, France.
The goal of the workshop was to bring together
researchers and practitioners in order to investigate
(i) the potential impact of collaborative software
engineering methods and principles into Model-Driven
Engineering (MDE) practices and (ii) how MDE methods
and techniques can support collaborative software
engineering activities. The 1st COMMitMDE workshop
provided a forum to discuss the state of research and
practice on collaborative MDE, to create new synergies
between tool vendors, researchers, and practitioners,
to inform the community about the new means for
collaborative MDE, and to reect on the needs and
research gaps in the collaborative MDE area.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Izurieta:2018:TDR,
author = "Clemente Izurieta and Ipek Ozkaya and Carolyn Seaman
and Will Snipes",
title = "Technical Debt: a Research Roadmap Report on the
{Eighth Workshop on Managing Technical Debt (MTD
2016)}",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "28--31",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3041765.3041774",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We report here on the Eighth International Workshop on
Managing Technical Debt, collocated with the
International Conference on Software Maintenance and
Evolution (ICSME 2016). The technical debt research
community continues to expand through collaborations of
industry, tool vendors, and academia. The major themes
of discussion this year indicate convergence on a
common definition on technical debt and its elements
which drive the maturation of a research roadmap,
demonstrating that managing technical debt is a
mainstream topic in software engineering research
bringing empirical analysis, data science, software
design and architecture analysis and automation among
other challenges together.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Leite:2018:RIW,
author = "Julio C. S. P. Leite and Liping Zhao and Sylwia
Kopcz{\'n}ska and Sam Supakkul and Lawrence Chung",
title = "Report from the {6th International Workshop on
Requirements Patterns (RePa'16)}",
journal = j-SIGSOFT,
volume = "43",
number = "2",
pages = "32--33",
month = apr,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3041765.3041775",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:16:51 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "RePa 2016 was part of the 24th IEEE International
Requirements Engineering Conference (RE'16) held in
Beijing. The all day program consisted in an
Introduction, a Keynote, Paper Presentations and
Discussion Sessions. All papers were presented and the
attendance was around 15 people.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2018:Pc,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "5--5",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229792",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Confucius'2 Analects is the oldest guide to applied
software engineering research and practice in
existence. You don't believe me? Fine. We'll use random
sampling to demonstrate. I have Ezra Pound's peculiar,
but engaging, translation to hand, and can write a
small program to generate five random samples easily,
since the Analects has twenty books, and each book has
approximately twenty ``items.'' I've sorted the
resulting samples for our convenience.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bu:2018:MBC,
author = "Lei Bu and Tian Zhang and Xin Chen and Linzhang Wang
and Jianhua Zhao and Xuandong Li",
title = "Model-based Construction and Verification of
Cyber-Physical Systems",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "6--10",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229793",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "By combining communication, computation, and control
(3C), Cyber-Physical Systems (CPS)0tightly couple the
physical world with the cyber-world, to enable more
applications, enhance performance, increase
dependability and etc. Among these goals, as CPS are
widely used in the safety-critical area, guaranteeing
the basic dependability/safety is after all the
prerequisite and often the top concern. However, the
behavior of CPS is extremely complex. First of all, due
to the existence of both discrete control modes
transition and continuous real-time behavior in CPS,
the behavior of CPS is a complex hybrid state space,
which is difficult to understand and handle. Secondly,
most CPS applications are working in the open
environment and acquiring real-time data from the
environment intensively to adjust their own behavior.
The dynamic environment makes the behavior space more
complex to reason. When a system is too complex to
analyze directly, building an abstract model of the
system and then conducting analysis on the model to
answer questions about the original system is an
important and widely-used method. Meanwhile, a
reasonable model also plays important roles in the
phase of specification, design, development, testing,
monitoring and so on. Therefore, it is an important
topic of investigating how model-based methods can be
applied in the context of CPS to increase the quality
and dependability of the system. During the past
decade, our research group at Nanjing University has
devoted a lot of efforts into this mission. We
conducted comprehensive research in a wide spectrum of
CPS including model-driven design, verification,
control, monitoring, and testing. In this paper, we
will make a general review of the progress we made on
these directions recently.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2018:RPd,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "11--16",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229791",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Benala:2018:SSD,
author = "Tirimula Rao Benala and Rajib Mall",
title = "{SEET}: Software Development Effort Estimation Using
Ensemble Techniques",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "17--17",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229805",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software development effort estimation (SDEE) is a
significant activity in project management and serves
as the basis for project bidding, planning, staffing,
resource allocation, scheduling, and cost estimation.
The accuracy of SDEE techniques varies from project to
project, which makes them rather unreliable. In this
backdrop, we propose a foundation centered
ensemble-based SDEE approach. The primary goal of this
approach is to design an ensemble consisting of
different machine learning methods for improving the
prediction accuracy of SDEE. In recent times, several
research results have been reported on machine learning
based ensemble design, but extreme learning machine
(ELM) and least square support vector regression
(LSSVR) have not been used to develop an ensemble. We
chose three machine learning techniques, namely ELM,
LSSVR, and multilayer perceptron (MLP) as the base
techniques to build an ensemble. We investigated the
performance of a homogeneous ensemble design using a
linear combination rule with standardized accuracy as a
weight factor. The performance of the ensemble model is
validated and compared with root mean square error
(RMSE) based weighted average ensemble model with
equivalent configuration. The experimental study was
conducted using publicly available PROMISE repository
test suite. We achieved promising results for SEET
model compared to base learners and RMSE ensemble
model.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sitaraman:2018:STF,
author = "Murali Sitaraman and Bruce W. Weide",
title = "A Synopsis of Twenty Five Years of {RESOLVE PhD}
Research Efforts",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "17--17",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229794",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In 1994, ACM SIGSOFT Software Engineering Notes (SEN),
courtesy of Will Tracz, SEN Editor at the time,
published a 48-page special feature on RESOLVE: a
combined specification and programming language with a
design discipline to facilitate construction of
formally verified component-based software. In the
quarter-century since, several PhD dissertations from
members of the RESOLVE/Reusable Software Research Group
(RSRG) have explored a variety of topics in this area.
They range across fundamental software engineering and
formal methods research, practical adaptations,
software engineering education, and tool development.
This article summarizes key contributions of these
dissertations in a way that is accessible to
researchers and practitioners in software engineering.
The dissertations are summarized in chronological
order. Some of the paragraphs below are paraphrased or
taken nearly verbatim from abstracts of the works
themselves, with a few terminological updates and added
connections to current research.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Welch:2018:FID,
author = "Daniel Welch",
title = "Formalization Integrated Development Environments: The
Current Landscape",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "17--17",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229795",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Development Environments (F-IDEs) for specification
and programming languages. Specifically we summarize
the toolchains for some well-known languages in this
category, and conclude with a summary of RESOLVESTUDIO,
an F-IDE for the RESOLVE language.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fowler:2018:BUP,
author = "Megan Fowler and Tim Schwab",
title = "{BeginToReason}: Understanding the Purpose of Code",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "18--18",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229798",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Computer science (CS) students often evaluate the
behavior of the code they write by running it on
specific inputs, studying the outputs, and then
inductively reasoning to a more general understanding
of the code. This is a good starting point in the
student's career, but successful graduates must be able
to reason deductively about the code they create and
encounter. They must be able to reason about the code
on all inputs, without running the code. This paper
describes an online system named ``BeginToReason'' that
is designed to introduce symbolic reasoning, and the
results of its use. Eighty students across six lab
sections completed a written assessment while working
with the BeginToReason System. The objective was to
observe student understanding of the purpose of
presented code both before and after completing a
lesson using the BeginToReason System. Keywords:
Symbolic reasoning, reasoning tool, online system,
verification engine",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kraemer:2018:RAC,
author = "Eileen Kraemer and Aubrey Lawson",
title = "Reasoning About Concurrency: Scenarios for
Activities",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "18--18",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229797",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In computing, concurrency refers to the notion that
different parts or units of a program or algorithm may
be executed out-of-order or in partial order, without
affecting the final outcome. Concurrency is
historically a difficult topic for students. When
confronted with non-deterministic systems, students are
challenged to refine their reasoning about sequence,
state, and what makes a program ``correct''. A number
of problems in concurrency have been posed in the form
of relatable examples, e.g. dining philosophers, an
ornamental garden, a single lane bridge. These
classical problems provide a ``real-world'' analogy
that can be used to motivate student engagement and
exploration. We explore the questions of whether the
RESOLVE framework could support the concepts and
operations needed to implement these classical
problems, what additional features in RESOLVE would be
required for specification and implementation and what
related student activities might be developed.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kraemer:2018:TDC,
author = "Eileen Kraemer",
title = "Teaching the Design-by-Contract Concept in a Software
Engineering Course Using {RESOLVE}",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "18--18",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229796",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Design by contract (DBC) is a key concept in software
engineering. The RESOLVE language and environment
support the teaching and learning of DBC concepts.
However, students encounter obstacles in fully
achieving the desired educational outcomes. Some of
these obstacles are related to the complexity of the
content. Additional appropriate exercises can help to
address these obstacles. Other obstacles are related to
features of the environment and documentation. We
propose a variety of interventions to address these
obstacles, including potential revisions to the
environment, updates to the documentation, and the
creation of additional instructional materials.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Weide:2018:RCD,
author = "Alan Weide",
title = "Reasoning Challenges of Data Abstraction and Aliasing
in Concurrent Programs",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "18--18",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229799",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Substantial effort has been directed toward the
specification and verification of concurrent programs.
Separation logic is one such project and is considered
by many to be the state of the art int he field.
However, the shortcomings of separation logic in the
face of data abstraction cannot be overlooked. This
paper enumerates several variants of a concurrent
program for which separation logic cannot capture the
desired level of abstraction without compromising its
readability and usefulness",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sun:2018:RAR,
author = "Yu-Shan Sun",
title = "Reasoning About Reference Behavior with {RESOLVE}",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "18--19",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229800",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "As an alternative to reasoning about references
explicitly and ACM SIGSOFT Software Engineering Notes
Page 18 July 2018 Volume 43 Number 3 routinely as
needed for Java-like programs, this paper summarizes
the RESOLVE approach in reasoning via reference-hiding
data abstractions for the majority of programs and only
reasoning about references when they are unavoidable.
Furthermore, this paper raises discussion topics for
reasoning about various implementation classifications
and to explore when there is a need to be concerned
about establishing the frame property",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Asim:2018:EDB,
author = "Saad F. Asim",
title = "An Exercise in Design: The Binary Decision Diagram",
journal = j-SIGSOFT,
volume = "43",
number = "3",
pages = "19--19",
month = jul,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3229783.3229801",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The Binary Decision Diagram (BDD), a data structure
used to efficiently represent Boolean formulas, enjoys
use in the field of software verification. However,
widely used implementations of the BDD are not
themselves verifiable. This paper summarizes the design
and implementation of a provably correct realization of
the BDD as detailed in the author's master's thesis.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2018:Pd,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "6--7",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282524",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Tom DeMarco and Timothy Lister's Peopleware:
Productive Projects and Teams (Third Edition) is a
fairly famous book. The first edition was published in
1987, and it has been widely read ever since. I
reviewed DeMarco and Lister's Waltzing with Bears in
this column before Peopleware precisely because some
people might not be aware of Waltzing, while I assumed
most people reading SEN would know of, and have read
Peopleware.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Glass:2018:ECH,
author = "Robert L. Glass and Frank Land",
title = "Errors in Computing History",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "7--8",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282521",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The history of computing in practice is barely 70
years old. The field of computing theory/academe is
barely 60 years old, if we start counting with the
advent of computer science and information systems
courses/degrees in the 1960s. Yet computing historians
have gotten a number of things dreadfully wrong in that
short period of time.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jin:2018:OMB,
author = "Zhi Jin",
title = "Open Models: Beyond the Open Source Software
Development",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "9--12",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282522",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Free/libre and open source software (FLOSS) originated
from ``hacker culture'' and struggled against software
privatization. The idea is that anyone is freely
licensed to use, copy, study, and change the software
in any way, and the source code is openly shared so
that people are encouraged to voluntarily improve the
design of the software. This is in contrast to
proprietary software, where the software is under
restrictive copyright licensing and the source code is
usually hidden from the users. To give the users such
freedom and control in their use of software, Richard
Stallman launched the GNU project (Stallman, 1983),
together with a manifesto stating that everyone will be
permitted to modify and redistribute GNU.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2018:RPe,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "13--20",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282523",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Edited by PGN (Risks Forum Moderator), with
contributions by others as indicated. Opinions are
individual rather than organizational, with usual
disclaimers implied. We address problems relating to
software, hardware, people, and other circumstances
relevant to computer systems. References (R i j) to the
online Risks Forum denote RISKS vol i number j. Cited
RISKS items generally identify contributors and
sources, together with URLs. Official RISKS archives
are available at www.risks.org, with nice html
formatting and search engine courtesy of Lindsay
Marshall at Newcastle:;
http://catless.ncl.ac.uk/Risks/i.j.html (also
ftp://www.sri.com/risks). CACM Inside Risks:
http://www.csl.sri.com/neumann/insiderisks.html",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fraser:2018:ACPa,
author = "Steven Fraser and Dennis Mancl",
title = "Agile Culture: a Panels Report from {XP 2017}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "21--23",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302395",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The culture of agile development practices and an
assessment of agile's ``success'' were the topics of
two XP2017 panel sessions. There were three primary
conclusions of these two panels. Agile has high brand
recognition in the software industry, but it isn't
always successfully implemented. In some cases, the
labels used to explain and promote agile practices can
get in the way of agile success. It was also recognized
that despite a negative perception, agile's reputation
as being a cult was more a reflection of a small, but
growing core of practitioners.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Raibulet:2018:RIWa,
author = "Claudia Raibulet and Mariagrazia Fugini and Khalil
Drira and Patrizio Pelliccione and Ilias
Gerostathopoulos and Christian Prehofer and Klaus
Moessner",
title = "Report of the {1st International Workshop on
Context-aware Autonomous and Smart Architectures
(CASA@ECSA 2017)}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "24--27",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302396",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 2017 1st International Workshop on Context-aware,
Autonomous and Smart Architectures (CASA 2017) was held
in conjunction with the 11th European Conference on
Software Architecture (ECSA 2017), on September, 12th,
2017 in Canterbury, United Kingdom. The goal of this
one-day workshop was to bring together researchers and
practitioners from academic environment and from the
industry to share their solutions, ideas, visions, and
doubts in the design of software architectures for
context-aware, autonomous, and smart solutions. The
workshop focused on architectural aspects offering a
complementary vision of such solutions with respect to
the available application- and user-oriented
perspectives on context-awareness, autonomy, and
smartness. Furthermore, the workshop aimed to enable
discussions, partnerships, and collaborations among the
software engineers interested in these solutions.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Northrop:2018:DSSa,
author = "Linda Northrop and Ipek Ozkaya and George Fairbanks
and Michael Keeling",
title = "Designing the Software Systems of the Future",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "28--30",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302397",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We report here on the Future of Software
DesignWorkshop that was held on Jan 12-14, 2018 in
Pittsburgh, PA under the sponsorship of the Carnegie
Mellon University Software Engineering Institute. The
software industry is awash in modern trends that
involve artificial intelligence (AI), autonomy, data
everywhere, etc. These trends affect the structure of
software-intensive systems and their designs. The goal
of the workshop was to bring together participants from
diverse backgrounds to formulate ideas for software
design of future systems and related research
opportunities and challenges. In this report we
summarize the outcomes of the workshop.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{vanderLinden:2018:ESWa,
author = "Dirk van der Linden and Awais Rashid",
title = "The Effect of Software Warranties on Cybersecurity",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "31--35",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302398",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This workshop focused on bringing software developers
and legal professionals together to understand the
shared challenges they face in promoting the
development of secure software on the one hand, and
software at all, on the other hand. This report
summarizes current scientific research on the topics
and challenges discussed in the workshop breakout
sessions. The insights from the workshop highlight a
number of interesting directions for further research
on the interplay between software warranties and
cybersecurity.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Borg:2018:SIWa,
author = "Markus Borg and Adnan Causevic and Serge Demeyer and
Sigrid Eldh",
title = "Summary of the {1st IEEE Workshop on the Next Level of
Test Automation (NEXTA 2018)}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "36--38",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302399",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "NEXTA is a new workshop on test automation that
provides a meeting point for academic researchers and
industry practitioners. While test automation already
is an established practice in industry, the concept
needs to evolve to go beyond its current state to
support the ever faster release cycles of tomorrow's
software engineering. NEXTA implications for research
and practice will include test case generation,
automated test result analysis, test suite assessment
and maintenance, and infrastructure for the future of
test automation. The first instance of NEXTA was
co-located with the 11th IEEE Conference on Software
Testing, Verification and Validation (ICST 2018) in
V{\"a}ster{\aa}s, Sweden on April 9, 2018. NEXTA 2018
offered an interactive setting with a keynote and paper
presentations, stimulated by two novel awards to
incentivize interaction and dissemination: a Best
Questions Award and a Most Viral Tweet Award. The
workshop attracted 15 paper submissions and about 50
participants. Based on the positive feedback, we plan
to organize the workshop again next year.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fraser:2018:NSBa,
author = "Steven Fraser and Dennis Mancl",
title = "No Silver Bullet Reloaded: Report on {XP 2017} Panel
Session",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "39--41",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302400",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "At XP2017 in K{\~A}\P ln, a panel was convened to
discuss the classic 1987 IEEE Software paper by
Frederick P. Brooks, ``No Silver Bullet: Essence and
Accidents in Software Engineering.'' The ideas
presented in his paper have influenced several
generations of software developers. Brooks emphasized
the notions of essential complexity and accidental
complexity, and he offered suggestions for promising
approaches to software development. While his
approaches are linked to what we now recognize as
``agile practices,'' panelists offered an implicit
caveat that they must be done with discipline to avoid
increased accidental complexity. Panelists also
observed that agile development itself is not a
``silver bullet''.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bures:2018:SESa,
author = "Tomas Bures and Danny Weyns and Bradley Schmer and
John Fitzgerald",
title = "Software Engineering for Smart Cyber-Physical Systems:
Models, System-Environment Boundary, and Social
Aspects",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "42--44",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302401",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Smart Cyber-Physical Systems (sCPS) are a novel kind
of Cyber-Physical Systems engineered to take advantage
of large-scale cooperation between devices, users and
environment to achieve added value in face of
uncertainty and various situations in their
environment. Examples of sCPS include modern traffic
systems, Industry 4.0 systems, systems for
smart-buildings, smart energy grids, etc. The uniting
aspect of all these systems is that to achieve their
high-level of intelligence, adaptivity and ability to
optimize and learn, they heavily rely on software. This
makes them software-intensive systems, where software
becomes their most complex part. Engineering sCPS thus
becomes a recognized software engineering discipline,
which however, due to specifics of sCPS, can only
partially rely on the existing body of knowledge in
software engineering. In fact, it turns out that many
of the traditional approaches to architecture modeling
and software development fail to cope with the high
dynamicity and uncertainty of sCPS. This calls for
innovative approaches that jointly reflect and address
the specifics of such systems. This paper maps the
discussions and results of the Third International
Workshop on Software Engineering for Smart
Cyber-Physical Systems (SEsCPS 2017), which
specifically focuses on challenges and promising
solutions in the area of software engineering for
sCPS.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gleirscher:2018:SRIa,
author = "Mario Gleirscher and Stefan Kugele and Sven Linker",
title = "{SCAV'18}: Report of the {2nd International Workshop
on Safe Control of Autonomous Vehicles}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "45--47",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302402",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This report summarizes the discussions, open issues,
take-away messages, and conclusions of the 2nd SCAV
workshop.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kuhrmann:2018:SICa,
author = "Marco Kuhrmann and Rory V. O'Connor and Dan Houston
and Regina Hebig and David Raffo",
title = "Summary of the {International Conference on Software
and System Processes (ICSSP 2018)}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "48--51",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282534",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The International Conference on Software and System
Processes (ICSSP), continuing the success of Software
Process Workshop (SPW), the Software Process Modeling
and Simulation Workshop (ProSim) and the International
Conference on Software Process (ICSP) conference
series, has become the established premier event in the
field of software and systems engineering processes. It
provides a leading forum for the exchange of research
outcomes and industrial best-practices in process
development from software and systems disciplines.
ICSSP 2018 was held in Gothenburg, Sweden, 26-27 May
2018, co-located with the 40th International Conference
on Software Engineering (ICSE). The theme of ICSSP 2018
was studying ``Demands on Processes, Processes on
Demand'' by recognizing the demands on processes that
include the need for both well-developed plans and
incremental deliveries (agile and hybrid processes),
utilization of increased automation (model-based
engineering and DevOps), higher degrees of customer
collaboration, comprehensive analysis of existing
products for reuse (open source and COTS), and
performance requirements of enterprise-level
architectures. Papers presented at ICSSP discussed
these issues across different domains, providing
concepts, evidence, and experiences.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fraser:2018:ACPb,
author = "Steven Fraser and Dennis Manci",
title = "Agile Culture: a Panels Report from {XP 2017}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "52--52",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282536",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The culture of agile development practices and an
assessment of agile's ``success'' were the topics of
two XP2017 panel sessions. There were three primary
conclusions of these two panels. Agile has high brand
recognition in the software industry, but it isn't
always successfully implemented. In some cases, the
labels used to explain and promote agile practices can
get in the way of agile success. It was also recognized
that despite a negative perception, agile's reputation
as being a cult was more a reflection of a small, but
growing core of practitioners.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Haider:2018:AAD,
author = "Umaima Haider and John D. McGregor and Rabih
Bashroush",
title = "The {ALI Architecture Description Language}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "52--52",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282545",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Architecture Description Languages (ADLs) have emerged
over the past two decades as a means to abstract
details of large-scale systems in order to enable
better intellectual control over the complete systems.
Recently, there has been an explosion in the number of
ADLs created in the research community. However,
industrial adoption of these ADLs has been rather
limited. This has been attributed to various reasons,
including the lack of support of some ADLs for:
variability management, requirements traceability,
architectural artefact reusability and multiple
architectural views. To overcome these limitations,
this paper is a report on ALI, an ADL that was designed
to complement existing work by adding mechanisms to
address the aforementioned limitations. The ALI design
principles, concepts, notations and formal semantics
are presented in this paper. The notation is
illustrated using two distinct case studies, one from
the information systems domain an Asset Management
System (AMS); and another from the embedded systems
domain --- a Wheel Brake System (WBS).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jain:2018:MDN,
author = "Ajay Jain and Sachin Soni",
title = "Multi-Directional navigation method for optimized
consumption of user generated content through semantic
mapping of features derived from the user generated
content",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "52--52",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282535",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Gone are the days when a buyer used to depend solely
on the product marketing team to know what's good about
a product or product features. With the advent of
social media, product purchase has become democratic
with product buyers, product users are vocal about
reporting back their experience about the product.
According to Forrester, ``buyers will spend more time
on web pages that have social content than those that
don't'' and ``user-generated content has significant
influence on a buyer's purchase decision.'' The
research doesn't lie --- User Generated Content (termed
as UGC) is more effective at driving purchase intent
and brand loyalty than any other media. To create
engaging, authentic customer experiences, companies
should weave UGC throughout their owned websites,
showcasing the voices that consumers trust the most:
their own.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Raibulet:2018:RIWb,
author = "Claudia Raibulet and Mariagrazia Fugini and Khalil
Drira and Patrizio Pelliccione and Ilias
Gerostathopoulos and Christian Prefoher and Klaus
Moessne",
title = "Report of the {1st International Workshop on
Context-aware Autonomous and Smart Architectures
(CASA@ECSA 2017)}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "52--53",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282537",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The 2017 1st International Workshop on Context-aware,
Autonomous and Smart Architectures (CASA 2017) was held
in conjunction with the 11th European Conference on
Software Architecture (ECSA 2017), on September, 12th,
2017 in Canterbury, United Kingdom. The goal of this
one-day workshop was to bring together researchers and
practitioners from academic environment and from the
industry to share their solutions, ideas, visions, and
doubts in the design of software architectures for
context-aware, autonomous, and smart solutions. The
workshop focused on architectural aspects offering a
complementary vision of such solutions with respect to
the available application- and user-oriented
perspectives on context-awareness, autonomy, and
smartness. Furthermore, the workshop aimed to enable
discussions, partnerships, and collaborations among the
software engineers interested in these solutions",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Borg:2018:SIWb,
author = "Markus Borg and Adnan Causevic and Serge Demeyer and
Sigrid Eldh",
title = "Summary of the {1st IEEE Workshop on the Next Level of
Test Automation (NEXTA 2018)}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "53--53",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282540",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "NEXTA is a new workshop on test automation that
provides a meeting point for academic researchers and
industry practitioners. While test automation already
is an established practice in industry, the concept
needs to evolve to go beyond its current state to
support the ever faster release cycles of tomorrow's
software engineering. NEXTA implications for research
and practice will include test case generation,
automated test result analysis, test suite assessment
and maintenance, and infrastructure for the future of
test automation. The first instance of NEXTA was
co-located with the 11th IEEE Conference on Software
Testing, Verification and Validation (ICST 2018) in
V{\"a}ster{\aa}s, Sweden on April 9, 2018. NEXTA 2018
offered an interactive setting with a keynote and paper
presentations, stimulated by two novel awards to
incentivize interaction and dissemination: a Best
Questions Award and a Most Viral Tweet Award. The
workshop attracted 15 paper submissions and about 50
participants. Based on the positive feedback, we plan
to organize the workshop again next year.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Fraser:2018:NSBb,
author = "Steven Fraser and Dennis Manci",
title = "No Silver Bullet Reloaded: Report on {XP 2017} Panel
Session",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "53--53",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282541",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "At XP2017 in Koln, a panel was convened to discuss the
classic 1987 IEEE Software paper by Frederick P.
Brooks, ``No Silver Bullet: Essence and Accidents in
Software Engineering.'' The ideas presented in his
paper have influenced several generations of software
developers. Brooks emphasized the notions of essential
complexity and accidental complexity, and he offered
suggestions for promising approaches to software
development. While his approaches are linked to what we
now recognize as ``agile practices,'' panelists offered
an implicit caveat that they must be done with
discipline to avoid increased accidental complexity.
Panelists also observed that agile development itself
is not a ``silver bullet''.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Northrop:2018:DSSb,
author = "Lina Northrop and Ipek Ozkaya and George Fairbanks and
Michael Keeling",
title = "Designing the Software Systems of the Future",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "53--53",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282538",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "We report here on the Future of Software Design
Workshop that was held on Jan 12-14, 2018 in
Pittsburgh, PA under the sponsorship of the Carnegie
Mellon University Software Engineering Institute. The
software industry is awash in modern trends that
involve artificial intelligence (AI), autonomy, data
everywhere, etc. These trends affect the structure of
software-intensive systems and their designs. The goal
of the workshop was to bring together participants from
diverse backgrounds to formulate ideas for software
design of future systems and related research
opportunities and challenges. In this report we
summarize the outcomes of the workshop",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{vanderLinden:2018:ESWb,
author = "Dirk van der Linden and Awais Rashid",
title = "The Effect of Software Warranties on Cybersecurity",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "53--53",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282539",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This workshop focused on bringing software developers
and legal professionals together to understand the
shared challenges they face in promoting the
development of secure software on the one hand, and
software at all, on the other hand. This report
summarizes current scientific research on the topics
and challenges discussed in the workshop breakout
sessions. The insights from the workshop highlight a
number of interesting directions for further research
on the interplay between software warranties and
cybersecurity.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bures:2018:SESb,
author = "Tomas Bures and Danny Weyns and Bradley Schmerl and
John Fitzgerald",
title = "Software Engineering for Smart Cyber-Physical Systems:
Models, System-Environment Boundary, and Social
Aspects",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "54--54",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282542",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Smart Cyber-Physical Systems (sCPS) are a novel kind
of Cyber-Physical Systems engineered to take advantage
of large-scale cooperation between devices, users and
environment to achieve added value in face of
uncertainty and various situations in their
environment. Examples of sCPS include modern traffic
systems, Industry 4.0 systems, systems for
smart-buildings, smart energy grids, etc. The uniting
aspect of all these systems is that to achieve their
high-level of intelligence, adaptivity and ability to
optimize and learn, they heavily rely on software. This
makes them software-intensive systems, where software
becomes their most complex part. Engineering sCPS thus
becomes a recognized software engineering discipline,
which however, due to specifics of sCPS, can only
partially rely on the existing body of knowledge in
software engineering. In fact, it turns out that many
of the traditional approaches to architecture modeling
and software development fail to cope with the high
dynamicity and uncertainty of sCPS. This calls for
innovative approaches that jointly reflect and address
the specifics of such systems. This paper maps the
discussions and results of the Third International
Workshop on Software Engineering for Smart
Cyber-Physical Systems (SEsCPS 2017), which
specifically focuses on challenges and promising
solutions in the area of software engineering for
sCPS.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gleirscher:2018:SRIb,
author = "Mario Gleirscher and Stefan Kugele and Sven Linker",
title = "{SCAV'18}: Report of the {2nd International Workshop
on Safe Control of Autonomous Vehicles}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "54--54",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282543",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This report summarizes the discussions, open issues,
take-away messages, and conclusions of the 2nd SCAV
workshop.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kuhrmann:2018:SICb,
author = "Marco Kuhrmann and Rory V. O'Connor and Dan Houston
and Regina Hebig and David Raffo",
title = "Summary of the {International Conference on Software
and System Processes (ICSSP 2018)}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "54--54",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282534",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The International Conference on Software and System
Processes (ICSSP), continuing the success of Software
Process Workshop (SPW), the Software Process Modeling
and Simulation Workshop (ProSim) and the International
Conference on Software Process (ICSP) conference
series, has become the established premier event in the
field of software and systems engineering processes. It
provides a leading forum for the exchange of research
outcomes and industrial best-practices in process
development from software and systems disciplines.
ICSSP 2018 was held in Gothenburg, Sweden, 26-27 May
2018, co-located with the 40th International Conference
on Software Engineering (ICSE). The theme of ICSSP 2018
was studying ``Demands on Processes, Processes on
Demand'' by recognizing the demands on processes that
include the need for both well-developed plans and
incremental deliveries (agile and hybrid processes),
utilization of increased automation (model-based
engineering and DevOps), higher degrees of customer
collaboration, comprehensive analysis of existing
products for reuse (open source and COTS), and
performance requirements of enterprise-level
architectures. Papers presented at ICSSP discussed
these issues across different domains, providing
concepts, evidence, and experiences.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bultan:2018:SCA,
author = "Tevfik Bultan",
title = "Side-Channel Analysis via Symbolic Execution and Model
Counting",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "55--55",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302416",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "An important problem in computer security is the
detection of side-channel vulnerabilities. Information
gained by observing nonfunctional properties of program
executions (i.e., sidechannels such as execution time
or memory usage) can enable attackers to infer secrets
that the program accesses (such as a password). In this
talk, I will discuss how symbolic execution, combined
with a model counting constraint solver, can be used
for quantifying side-channel leakage in Java programs.
I will also discuss automata-based model counting
techniques. We have implemented these techniques by
integrating our model counting constraint solver,
called Automata-Based model Counter (ABC), with the
symbolic execution tool Symbolic Path Finder (SPF).",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Paquin:2018:AAS,
author = "Maria Paquin and Elena Sherman and Amit Jain",
title = "Assessing the Adequacy of Synthetic Programs for
Learning {SPF's} Configurations",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "55--55",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282526",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Static program analysis is a powerful technique that
reasons about a program's behavior without actually
executing the program. To balance between the precision
and the efficiency of an analyzer, developers often
manually tune-up analyzer's parameters for a specific
program. However, this task can be tedious and
time-consuming. To automate the search for the optimal
parameters for a program, researchers employ machine
learning (ML) techniques, that from the existing data
learn the relationship between the program and the
optimal parameters, which it encodes in an ML model.
The existing, or training, data set, plays an important
role in the correctness of an ML model. In this work we
investigate whether automatically generated programs
are adequate for training an ML model, which determines
SPF's configurations for a given Java method. To do
this, we compare the performance of a model trained on
real programs with that of a model trained on synthetic
programs. Our results indicate that while synthetic
programs are inadequate for training a model alone,
adding them to the training set of real programs
improves the classification power of the resulting
model.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Phan:2018:TIG,
author = "Quoc-Sang Phan",
title = "Test input generation using separation logic",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "55--55",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3302418",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Unit testing is the practice of testing individual
units of a program, where a unit can be a method or a
group of methods. Unit testing is important for
software development, and automated test case
generation is important for reducing the cost and
improving the quality of unit testing. When an input of
a un is a dynamically allocated data structure, such as
list and tree, it has unbounded domain, and strict
requirements over the shape or size. This makes test
case generation notoriously hard. In this talk, we
present Java StarFinder (JSF), a JPF extension for
testing units that manipulate data structures. JSF is a
symbolic execution engine that uses separation logic
specification to capture the constraints over the
input, and performs context-sensitive lazy
initialization to construct valid test cases.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Wang:2018:PBJ,
author = "Kaiyuan Wang and Hayes Converse and Milos Gligoric and
Sasa Misailovic and Sarfraz Khurshid",
title = "A Progress Bar for the {JPF} Search Using Program
Executions",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "55--55",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282525",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software model checkers, such as JPF, are routinely
used to explore executions of programs that have very
large state spaces. Sometimes the exploration can take
a significant amount of time before a bug is found or
the checking is complete, in which case the user must
patiently wait, possibly for quite some time, to learn
the result of checking. A progress bar that accurately
shows the status of the search provides the user useful
feedback about the time expected for the search to
complete. This paper introduces JPFBar, a novel
technique to estimate the percentage of work done by
the JPF search by computing weights for the execution
paths it explores and summing up the weights. JPFBar is
embodied into a listener that prints a progress bar
during JPF execution. An experimental evaluation using
a variety of Java subjects shows that JPFBar provides
accurate information about the search's progress and
fares well in comparison with a state-based progress
estimator that is part of the standard JPF
distribution.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Cordeiro:2018:BJV,
author = "Lucas C. Cordeiro and Daniel Kroening and Peter
Schrammel",
title = "Benchmarking of {Java} Verification Tools at the
{Software Verification Competition (SV-COMP)}",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "56--56",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282529",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Empirical evaluation of verification tools by
benchmarking is a common method in software
verification research. The Competition on Software
Verification (SV-COMP) aims at standardization and
reproducibility of benchmarking within the software
verification community in an annual basis, through
comparative evaluation of fully-automatic software
verifiers for C programs. Building upon this success,
we describe here how to re-use the ecosystem developed
around SV-COMP for benchmarking Java verification
tools. We provide a detailed description of the rules
for benchmark verification tasks, the integration of
new tools into SV-COMP's benchmarking framework and
also give experimental results of a benchmarking run on
three state-of-the-art Java verification tools, JPF-SE,
JayHorn and JBMC.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Jones:2018:MSC,
author = "Joseph Jones and James Wasson and Sean Brown and Seth
Poulsen and Peter Aldous and Eric Mercer",
title = "Memory safety in {C} by abstract interpretation",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "56--56",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282530",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Pointer arithmetic is a core feature of the C
programming language and C program analysis is
impossible without an understanding of its effects.
Many program analyses opt to be unsound in the presence
of pointer arithmetic or preserve soundness at the cost
of precision. However, the number of operations that
can be performed on pointers is actually quite small.
As was observed by Might et al., these few operations
can be precisely modeled with a simplified Peano
arithmetic. This paper presents an interpreter that
uses a memory model based on this arithmetic. It
desugars C programs to a simple imperative language
using standard semantics-preserving techniques to
simplify the interpretation. The result is a prototype
analysis that reasons precisely about memory safety in
full C programs without programmer annotations.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saha:2018:ASS,
author = "Seemanta Saha and Ismet Burak Kadron and William Eiers
and Lucas Bang and Tevfik Bultan",
title = "Attack Synthesis for Strings using Meta-Heuristics",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "56--56",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282527",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Information leaks are a significant problem in modern
computer systems and string manipulation is prevalent
in modern software. We present techniques for automated
synthesis of side-channel attacks that recover secret
string values based on timing observations on string
manipulating code. Our attack synthesis techniques
iteratively generate inputs which, when fed to code
that accesses the secret, reveal partial information
about the secret based on the timing observations,
leading to recovery of the secret at the end of the
attack sequence. We use symbolic execution to extract
path constraints, automata-based model counting to
estimate the probability of execution paths, and
meta-heuristic methods to maximize information gain
based on entropy for synthesizing adaptive attack
steps.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Zheng:2018:ADS,
author = "Guolong Zheng and Quang Loc Le and ThanhVu Nguyen and
Quoc-Sang Phan",
title = "Automatic Data Structure Repair using Separation
Logic",
journal = j-SIGSOFT,
volume = "43",
number = "4",
pages = "66--66",
month = oct,
year = "2018",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3282517.3282528",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:10 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software systems are often shipped and deployed with
both known and unknown bugs. On-the-fly program
repairs, which handle runtime errors and allow programs
to continue successfully, can help software
reliability, e.g., by dealing with inconsistent or
corrupted data without interrupting the running
program. We report on our work-in-progress that repairs
data structure using separation logic. Our technique,
inspired by existing works on specification-based
repair, takes as input specification written in a
separation logic formula and a concrete data structure
that fails that specification, and performs on-the-fly
repair to make the data conforms with the
specification. The use of separation logic allows us to
compactly and precisely represent desired properties of
data structures and use existing analyses in separation
logic to detect and repair bugs in complex data
structures. We have developed a prototype, called
STARFIX, to repair invalid Java data structures
violating given specifications in separation logic.
Preliminary results show that tool can efficiently
detect and repair inconsistent data structures
including lists and trees.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2019:Pa,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "7--7",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310015",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In every larger-scale endeavor, or at least in most
larger-scale endeavors, there comes a time to evaluate
progress, solicit opinion, ask your public, survey your
customers --- in short, to find out if what you are
doing is actually worth doing. In some cases, this step
may be omitted, or the results ignored: it is possible
that if Herman Melville had shown people Moby Dick when
he was half-done with it, everyone except Nathaniel
Hawthorne would have said ``Er, we're not sure what
this is all about. Where's the nice adventure of Omoo?
Just what are you up to, Sir?'' He should not have
therefore ditched the manuscript and gone on to
something else; also, Nathaniel Hawthorne gets 50,000
votes. However, in general, you (and I) are not
Melville writing Moby Dick. Scientific projects tend to
publish some papers before they are ``complete'' and if
these are universally derided and rejected, or receive
no citations, it is often the case that they are doing
nothing of much interest. There are exceptions, but
they are rarer, perhaps, than we might think. Most
things that are ignored are ignored for a good
reason.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Schaefer:2019:WDW,
author = "Robert Schaefer",
title = "What Do We Mean When We Talk about Artificial
Intelligence?: (Part 1)",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "7--10",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310014",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This is a good time as any to address the more
philosophical questions of what software is and how we
use it, in particular software used as a replacement
for human intelligence-AI. My intent in this and in the
next few columns is to address some of the
fundamentals, that is, the science of AI or what should
be nailed-down before software engineering begins. You
get more traction when you design on a solid science
base of knowledge. A simple analogy, for example-one
might not choose to labor over a not-quite-working
perpetual-motion machine if one were aware of the
second law of thermodynamics. Then again, there is no
equivalent ``law of human intelligence,'' so people
keep trying.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2019:RPa,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "11--17",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310021",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Edited by PGN (Risks Forum Moderator, with
contributions by others as indicated. Opinions are
individual rather than organizational, with usual
disclaimers implied. We address problems relating to
software, hardware, people, and other circumstances
relevant to computer systems. References (R i j) to the
online Risks Forum denote RISKS vol i number j. Cited
RISKS items generally identify contributors and
sources, together with URLs. Official RISKS archives
are available at www.risks.org, with nice html
formatting and search engine courtesy of Lindsay
Marshall at Newcastle:;
http://catless.ncl.ac.uk/Risks/i.j.html (also
ftp://www.sri.com/risks). CACM Inside Risks:
http://www.csl.sri.com/neumann/insiderisks.html",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mascardi:2019:EMAa,
author = "Viviana Mascardi and Danny Weyns and Alessandro
Ricci",
title = "Engineering Multi-Agent Systems: State of Affairs and
the Road Ahead",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "18--28",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310035",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The continuous integration of software-intensive
systems together with the ever-increasing computing
power offer a breeding ground for intelligent agents
and multi-agent systems (MAS) more than ever before.
Over the past two decades, a wide variety of languages,
models, techniques and methodologies have been proposed
to engineer agents and MAS. Despite this substantial
body of knowledge and expertise, the systematic
engineering of large-scale and open MAS still poses
many challenges. Researchers and engineers still face
fundamental questions regarding theories,
architectures, languages, processes, and platforms for
designing, implementing, running, maintaining, and
evolving MAS. This paper reports on the results of the
6th International Workshop on Engineering Multi-Agent
Systems (EMAS 2018, 14th-15th of July, 2018, Stockholm,
Sweden), where participants discussed the issues above
focusing on the state of affairs and the road ahead for
researchers and engineers in this area.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Eck:2019:PMCa,
author = "Stefan Eck and Hans A. Hansson",
title = "{PROMPT} --- Master Courses for Professional Software
Developers",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "29--30",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310036",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "PROMPT [1] is an educational initiative in cooperation
with several academic parties and leading industrial
companies and organizations. Together, the parties
offer advanced level courses in software engineering in
a web-based format, tailored to fit professional
engineers and software developers who need to be able
to combine full-time work and studies. The long-term
goal of PROMPT is to guarantee the supply of advanced
software competencies and innovativeness in industry.
The courses are free of charge within Europe, cover
typically 7.5 university credits and are run over a
whole semester, at a pace of 25\% of full-time. All
courses are developed in close cooperation with the
Swedish industry and trade organizations.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Unterkalmsteiner:2019:SIW,
author = "Michael Unterkalmsteiner and Tingting Yu and Gregory
Gay and Elizabeth Bjarnason and Markus Borg and Michael
Felderer",
title = "Summary of the {5th International Workshop on
Requirements Engineering and Testing (RET 2018)}",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "31--34",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310037",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The RET (Requirements Engineering and Testing)
workshop series provides a meeting point for
researchers and practitioners from the two separate
fields of Requirements Engineering (RE) and Testing.
The goal is to improve the connection and alignment of
these two areas through an exchange of ideas,
challenges, practices, experiences and results. The
long term aim is to build a community and a body of
knowledge within the intersection of RE and Testing,
i.e. RET. The 5th workshop was held in colocation with
ICSE 2018 in Gothenburg, Sweden. The workshop continued
in the same interactive vein as the predecessors. We
introduced a new format for the presentations in which
the paper authors had the opportunity to interact
extensively with the audience. Each author was
supported by a member of the organization committee to
prepare either an extensive demo, collect more data in
form of a questionnaire or perform a hands-on tutorial.
We named this new format ``X-ray session''. In order to
create an RET knowledge base, this cross-cutting area
elicits contributions from both RE and Testing, and
from both researchers and practitioners. A range of
papers were presented from short positions papers to
full research papers that cover connections between the
two fields. The workshop attracted 27 participants and
the positive feedback on the new format encourages us
to organize the workshop the next year again.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Eck:2019:PMCb,
author = "Stefan Eck and Hans A. Hansson",
title = "{PROMPT} --- Master Courses for Professional Software
Developers",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "35--35",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310036",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "PROMPT [1] is an educational initiative in cooperation
with several academic parties and leading industrial
companies and organizations. Together, the parties
offer advanced level courses in software engineering in
a web-based format, tailored to fit professional
engineers and software developers who need to be able
to combine full-time work and studies. The long-term
goal of PROMPT is to guarantee the supply of advanced
software competencies and innovativeness in industry.
The courses are free of charge within Europe, cover
typically 7.5 university credits and are run over a
whole semester, at a pace of 25\% of full-time. All
courses are developed in close cooperation with the
Swedish industry and trade organizations.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kumari:2019:EGP,
author = "Neha Kumari and Rajeev Kumar",
title = "Evolution of Generic Programming in {OOPLs}",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "35--35",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310033",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Generic Programming enables program constructs to be
reused in a variety of situations. In programming
languages, idea of generic programming is being opted
through a variety of generic mechanisms. Generic
mechanisms are either directly applied to pre-existing
language constructs or it provides its own components
for generic implementation. In this paper, we present
such generic mechanisms in an organized way such that
it appears as ``one mechanism intensify other''. Our
aim is to exhibit generic evolution among mainstream
object oriented programming languages (OOPLs). Hence,
we analyze such approaches for better expressiveness
and type-safety of generic programming as they evolved
in OOPLs. This brief review article will help
developers and researchers to precisely understand the
generic mechanism in mainstream OOPLs.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Mascardi:2019:EMAb,
author = "Viviana Mascardi and Danny Weyns and Alessandro
Ricci",
title = "Engineering Multi-Agent Systems: State of Affairs and
the Road Ahead",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "35--35",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310035",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "The continuous integration of software-intensive
systems together with the ever-increasing computing
power offer a breeding ground for intelligent agents
and multi-agent systems (MAS) more than ever before.
Over the past two decades, a wide variety of languages,
models, techniques and methodologies have been proposed
to engineer agents and MAS. Despite this substantial
body of knowledge and expertise, the systematic
engineering of large-scale and open MAS still poses
many challenges. Researchers and engineers still face
fundamental questions regarding theories,
architectures, languages, processes, and platforms for
designing, implementing, running, maintaining, and
evolving MAS. This paper reports on the results of the
6th International Workshop on Engineering Multi-Agent
Systems (EMAS 2018, 14th-15th of July, 2018, Stockholm,
Sweden), where participants discussed the issues above
focusing on the state of affairs and the road ahead for
researchers and engineers in this area.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Roy:2019:EIC,
author = "Subhajit Roy",
title = "Envisioning an Intelligent Collaborative Integrated
Development Environment",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "35--35",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310034",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Abstract Programming editors have evolved over the
years. However, we still lack an environment that can
allow on-the-fly collaboration between multiple
programmers. We envision Incide, an integrated
development environment that allows a synergistic
collaboration environment by using program synthesis
technology to combine partial solutions from multiple
programmers attempting to solve the (same) problem into
one concrete solution. This solution is then
communicated to the editor of each programmer as
patches along with personalization on syntactic
elements like choice of programming language constructs
and variable names. We believe that such editors will
improve productivity on complex solutions by bringing a
discipline into combining the intuition and intellect
of multiple programmers.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Muna:2019:APL,
author = "Altherwi Muna",
title = "Assessing Programming Language Impact on Software
Development Productivity Based on Mining {OSS}
Repositories",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "36--37",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310017",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "This study is to investigate the impact of high-level,
general-purpose, programming languages on software
development productivity and quality. In particular, a
comparison is to be made between scripting languages
and traditionally compiled, system programming ones to
examine differences, if any. The data obtained for the
research is from open source repositories gathered from
Github. The results are going to be based on the
analysis of possibly the largest open source dataset
through examining a population of 15,000 projects and
by including a sample of 4349 projects, where a main
language can be identified. The investigation, so far,
has revealed considerable differences in productivity
between the two language groups.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Singh:2019:UNL,
author = "Maninder Singh",
title = "Using Natural Language Processing and Graph Mining to
Explore Inter-Related Requirements in Software
Artefacts",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "37--37",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310018",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Software development is prone to software faults due
to the involvement of multiple stakeholders especially
during the fuzzy phases (requirements and design).
Software inspections are commonly used in industry to
detect and fix problems in requirements and design
artifacts thereby mitigating the fault propagation to
later phases. The requirements documented in natural
language (NL) are prone to contain faults because of
different vocabularies among stakeholders. This
research employs various NL processing with semantic
analysis (SA) and mining solutions from graph theory to
NL requirements to develop inter-related requirements
(IRRs) that can help identify requirements that may
need similar fixes. Additionally, our approach aims at
aiding requirements' engineers with fault-prone regions
both pre and post inspection. Pre-inspection, our
approach using IRRs help removing redundant and
extraneous faults within related requirements while
post-inspection, it aids engineers analyse the impact
of a change in one requirement on another related
requirements. So, this research aims at developing a
graph of inter-related requirements using natural
language processing and semantic analysis approaches on
a given requirements document that can be used to aid
various decisions pre and post-inspections.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Turlea:2019:MLT,
author = "Ana Turlea",
title = "Model-in-the-Loop Testing for Cyber Physical Systems",
journal = j-SIGSOFT,
volume = "44",
number = "1",
pages = "37--37",
month = jan,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3310013.3310019",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Sat Oct 19 18:11:11 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Context: Nowadays, there is of high interest to use
automated testing, not only because it optimizes the
manual testing by reducing the needed time and cost,
but also because manual testing is more likely to
produce errors. Increasing the safety of software
controlled complex systems, that use many distributed
electronic controlled units, requires extensive
testing. In model based testing, the test specification
is derived from the system requirements and a model
that describes selected functional and nonfunctional
aspects of the system under test.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2019:Pb,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "44",
number = "2",
pages = "3--4",
month = apr,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3325642.3325644",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Mon Oct 21 05:42:17 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Gerald M. Weinberg's The Psychology of Computer
Programming: Silver Anniversary Edition is this month's
Passages selection. Weinberg died last August, but this
book alone makes him immortal in the world of software
engineering. The Psychology is one of my favorite
software engineering classics, and one of the books
that originally motivated this column. Tim Budd gave me
my first copy, when I was a young and ignorant
professor at Oregon State, when he retired (the
opposite of the usual retirement gifting procedure) and
I read it with great pleasure and attention for the
first time, not long after, and began to form the idea
of Passages not long after that. Why did I not write
about it before this?",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Elbaum:2019:SI,
author = "Sebastian Elbaum",
title = "The State of {ICSE}",
journal = j-SIGSOFT,
volume = "44",
number = "2",
pages = "4--5",
month = apr,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3325642.3325645",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Mon Oct 21 05:42:17 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "In this state of the conference I want to share a
short reflection about my four years as steering
committee chair, some highlights of the upcoming ICSE
operational guidelines, and a quick update on the next
ICSEs.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2019:RPb,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "44",
number = "2",
pages = "6--12",
month = apr,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3325642.3325643",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Mon Oct 21 05:42:17 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
abstract = "Edited by PGN (Risks Forum Moderator, with
contributions by others as indicated. Opinions are
individual rather than organizational, with usual
disclaimers implied. We address problems relating to
software, hardware, people, and other circumstances
relevant to computer systems. References (R i j) to the
online Risks Forum denote RISKS vol i number j. Cited
RISKS items generally identify contributors and
sources, together with URLs. Official RISKS archives
are available at www.risks.org, with nice html
formatting and search engine courtesy of Lindsay
Marshall at Newcastle:;
http://catless.ncl.ac.uk/Risks/i.j.html (also
ftp://www.sri.com/risks). CACM Inside Risks:
http://www.csl.sri.com/neumann/insiderisks.html",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Groce:2019:P,
author = "Alex Groce",
title = "Passages",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "10--11",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356775",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356775",
abstract = "Gerald M. Weinberg's An Introduction to General
Systems Thinking is this month's Passages selection.
Weinberg's Psychology of Computer Programming was last
month's Passages selection. I believe that many more
software engineers have read last month's \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Soldani:2019:GLS,
author = "Jacopo Soldani",
title = "Grey Literature: a Safe Bridge Between Academy and
Industry?",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "11--12",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356776",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356776",
abstract = "With ``grey literature'' we identify materials and
research produced outside of the traditional academic
publishing and distribution channels. Currently
available grey literature spans from industrial
whitepapers and technical reports to blog post and
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Arumugam:2019:SCA,
author = "Lakshmanan Arumugam and Vikram N. Subramanian and
Meiyappan Nagappan",
title = "{SEGarage}: a Curated Archive for Software Engineering
Research Tools",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "13--13",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356777",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356777",
abstract = "SEGarage is a curated archive for software engineering
tools developed through software engineering research.
This service aims to ease the effort of finding and
downloading tools from past research.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2019:RPc,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "16--21",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3372312",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3372312",
abstract = "Discussion of the two 737 Max fatal losses has
persisted (noted in R 31 11 to R 31 27), and is still
ongoing. The desired use of lighter engines altered the
nose-lift behavior, and resulted in an automated system
that attempted to compensate for the \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Pastor:2019:DSP,
author = "Oscar Pastor",
title = "Design Science for {PhD} Research in the Software
Engineering Domain",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "22--22",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3372314",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3372314",
abstract = "The keynote introduced the principles of Design
Science with the perspective developed by Prof. Roel
Wieringa in his book ``Design Science'', clearly
distinguishing between questions of knowledge and
engineering problems, and introducing the research
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Aldaeej:2019:TET,
author = "Abdullah Aldaeej",
title = "Towards Effective Technical Debt Decision Making in
Software Startups",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "22--22",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356793",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356793",
abstract = "Context: Technical Debt (TD) is a metaphor used to
describe outstanding software maintenance tasks or
shortcuts made in the software development to achieve
short-term benefits (i.e. time to market), but
negatively impact the software quality in the long
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Matsubara:2019:DSE,
author = "Patr{\'\i}cia Gomes Fernandes Matsubara",
title = "Dealing with software estimates distortions from the
perspective of negotiation theories",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "22--22",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356794",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356794",
abstract = "Software estimation is a critical task in software
projects, and the accuracy of software estimates has
been a concern for researchers and practitioners.
Researchers have already identified some factors that
impact estimates accuracy, like cognitive \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Motta:2019:EBF,
author = "Rebeca C. Motta",
title = "An Evidence-Based Framework for Supporting the
Engineering of {IoT} Software Systems",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "22--23",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356795",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356795",
abstract = "Internet of Things represents a promising paradigm for
the development of systems that have been largely
explored in the academy and industry. One of the
recognized features of IoT is its large
multidisciplinarity by the integration of different
devices \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neto:2019:SSR,
author = "Amadeu Anderlin Neto",
title = "A Strategy to Support Replications of Controlled
Experiments in Software Engineering",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "23--23",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356796",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356796",
abstract = "Replication is essential to build knowledge in
empirical science. Experiment replications reported in
the software engineering context present variabilities
on their experiment elements, e.g., variables,
materials. Further understanding these \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kamei:2019:UGL,
author = "Fernando Kenji Kamei",
title = "The Use of Grey Literature Review as Evidence for
Practitioners",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "23--23",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356797",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356797",
abstract = "Context: In the last years, diverse research areas
increased their interest in Grey Literature (GL). In
Software Engineering (SE), SE practitioners became
heavy consumers of GL, by way of contrast to
traditional research papers. Problem: This is
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Kreitz:2019:SDS,
author = "Mark Kreitz",
title = "Security by Design in Software Engineering",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "23--23",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356798",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356798",
abstract = "Security is a non-functional requirement
difficult-to-handle during software development.
However, it appears to be common in software
engineering, that security is taken care of during the
design- and test-phase only. If security is neglected
during \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saarimaki:2019:MIO,
author = "Nyyti Saarim{\"a}ki",
title = "Methodological Issues in Observational Studies",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "24--24",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356799",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356799",
abstract = "Background: Starting from the 1960s, practitioners and
researchers have looked for ways to empirically
investigate new technologies such as inspecting the
effectiveness of new methods, tools, or practices. With
this purpose, the empirical software \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Langdon:2019:SFG,
author = "William B. Langdon and Westley Weimer and Christopher
Timperley and Oliver Krauss and Zhen Yu Ding and Yiwei
Lyu and Nicolas Chausseau and Eric Schulte and Shin
Hwei Tan and Kevin Leach and Yu Huang and Gabin An",
title = "The State and Future of Genetic Improvement",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "25--29",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356801",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356801",
abstract = "We report the discussion session at the sixth
international Genetic Improvement workshop, GI-2019 @
ICSE, which was held as part of the 41st ACM/IEEE
International Conference on Software Engineering on
Tuesday 28th May 2019. Topics included GI \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Calefato:2019:SIC,
author = "Fabio Calefato and Paolo Tell and Alpana Dubey",
title = "Summary of the {14th International Conference on
Global Software Engineering (ICGSE)}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "30--33",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356802",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356802",
abstract = "The International Conference on Global Software
Engineering, in its 14th iteration, continues to
provide researchers and practitioners with a leading
forum to share their research findings, experiences,
and new ideas on diverse topics related to global
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Sutton:2019:SIC,
author = "Stanley M. Sutton and Ove Armbrust and Regina Hebig
and Paul Clarke",
title = "Summary of the {2019 International Conference on
Software and System Processes (ICSSP 2019)}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "34--37",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356803",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356803",
abstract = "The 2019 International Conference on Software and
System Processes (ICSSP 2019) was held in conjunction
with the 41st International Conference on Software
Engineering (ICSE 2019) in Montreal, Canada, May 25-26,
2019. ICSSP is a leading international \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Ciccozzi:2019:RIW,
author = "Federico Ciccozzi and Nico Hochgeschwender and Ivano
Malavolta and Andreas Wortmann",
title = "Report on the {2nd International Workshop on Robotics
Software Engineering (RoSE'19)}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "38--40",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356804",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356804",
abstract = "The 2nd edition of the 2nd International Workshop on
Robotics Software Engineering (RoSE) was held at the
International Conference on Software Engineering (ICSE)
in the city of Montreal, Canada, on the 27th of May
2019. The focus of this edition of the \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Karre:2019:RSE,
author = "Sai Anirudh Karre and Lalit Mohan and Y. Raghu Raghu
Reddy and K. V. Raghavan and R. D. Naik and Rahul
Purandare and Amey Karkare",
title = "A report on {1st Software Engineering Research in
India Update Meeting (SERI 2019)}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "41--42",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356805",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356805",
abstract = "Software Engineering Researchers in India from both
academia and industry are widely contributing to
various research problems. In this report, we brie y
summarize the key insights from 1st Software
Engineering Research in India Update Meeting (SERI
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Steghofer:2019:SSS,
author = "Jan-Philipp Stegh{\"o}fer and Nan Niu and Jin L. C.
Guo and Anas Mahmoud",
title = "{SST'19} --- Software and Systems Traceability:
Summary of the {10th International Workshop at the 41st
International Conference on Software Engineering
(ICSE), May 27, 2019}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "43--47",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356806",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356806",
abstract = "Traceability is the ability to relate different
artifacts during the development and operation of a
system to each other. It enables program comprehension,
change impact analysis, and facilitates the cooperation
of engineers from different disciplines. \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Tonelli:2019:WSI,
author = "Roberto Tonelli and Marco Ortu and Stephane Ducasse
and Michele Marchesi",
title = "Workshop Summary: {2019 IEEE \slash {ACM} Second
International Workshop on Emerging Trends in Software
Engineering for Blockchain (WETSEB 2019)}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "48--52",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356807",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356807",
abstract = "The second Workshop on Emerging Trends in Software
Engineering for Blockchain (WETSEB 2019) intends to
pursue the experience of WETSEB 2018 which inherited
from the past eight editions of WETSoM (Workshop on
Emerging Trends on Software Metrics) the \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Choi:2019:SEI,
author = "Byoungju Choi and Mar{\'\i}a-Jos{\'e} Escalona and Kim
Herzig",
title = "Summary of the {14th edition of the {IEEE\slash} ACM
Workshop on Automation of Software Test (AST)}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "53--53",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356808",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356808",
abstract = "Effective and efficient testing with reduced costs and
a high fault detection capability is the desirable goal
in industry which can be achieved only through
automation of all parts of the testing process. In the
past decades, a great amount of research \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Siegmund:2019:SSE,
author = "Janet Siegmund and Andrew Begel and Norman Peitek",
title = "Summary of the {Sixth Edition of the International
Workshop on Eye Movements in Programming}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "54--55",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356809",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356809",
abstract = "The study of eye gaze data has great potential for
research in computer programming, computing education,
and software engineering practice. To highlight its
role for the software engineering community, the Sixth
Edition of the International Workshop on \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Xie:2019:WSI,
author = "Xiaoyuan Xie and Pak-Lok Poon and Laura L. Pullum",
title = "Workshop Summary: {2019 IEEE \slash {ACM} Fourth
International Workshop on Metamorphic Testing (MET
2019)}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "56--59",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356810",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356810",
abstract = "MET is a relatively new workshop on metamorphic
testing for academic researchers and industry
practitioners. The first international workshop on MET
(MET 2016) was co-located with the 38th International
Conference on Software Engineering (ICSE 2016) in
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Gerostathopoulos:2019:CDD,
author = "Ilias Gerostathopoulos and Marco Konersmann and
Stephan Krusche and David I. Mattos and Jan Bosch and
Tomas Bures and Brian Fitzgerald and Michael Goedicke
and Henry Muccini and Helena H. Olsson and Thomas Brand
and Robert Chatley and Nikolaos Diamantopoulos and Arik
Friedman and Miguel Jim{\'e}nez and Jan Ole Johanssen
and Putra Manggala and Masumi Koseki and Jorge Melegati
and Nuthan Munaiah and Gabriel Tamura and Vasileios
Theodorou and Jeffrey Wong and Iris Figalist",
title = "Continuous Data-driven Software Engineering ---
Towards a Research Agenda: Report on the {Joint 5th
International Workshop on Rapid Continuous Software
Engineering (RCoSE 2019) and 1st International Works}",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "60--64",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356811",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356811",
abstract = "The rapid pace with which software needs to be built,
together with the increasing need to evaluate changes
for end users both quantitatively and qualitatively
calls for novel software engineering approaches that
focus on short release cycles, \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Marijan:2019:GPA,
author = "Dusica Marijan and Sagar Sen",
title = "Good Practices in Aligning Software Engineering
Research and Industry Practice",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "65--67",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356812",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356812",
abstract = "There is a long-standing challenge to narrow the gap
between software engineering research and industry
practice, to align their interests and realize true
synergies between the two communities. Some
difficulties to this challenge include mismatched
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Marijan:2019:IRA,
author = "Dusica Marijan and Weiyi Shang and Rakesh Shukla",
title = "Implications of Resurgence in Artificial Intelligence
for Research Collaborations in Software Engineering",
journal = j-SIGSOFT,
volume = "44",
number = "3",
pages = "68--70",
month = nov,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3356773.3356813",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:38 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3356773.3356813",
abstract = "Challenges of implementing successful research
collaborations between industry and academia in
software engineering are varied and many. Differing
timelines, metrics, expectations, and perceptions of
these two communities are some common obstacles,
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Neumann:2019:RPd,
author = "Peter G. Neumann",
title = "Risks to the Public",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "5--10",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.3364453",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.3364453",
abstract = "RISKS items seem to be burgeoning, making it very
difficult to devote detailed accounts in the six pages
that our recent SEN sections are occupying. We try to
emphasize those items here that have the most content
relating to software engineer- ing and \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Bures:2019:SES,
author = "Tomas Bures and Danny Weyns and Bradley Schmerl and
John Fitzgerald and Adina Aniculaesei and Christian
Berger and Jo{\~a}o Cambeiro and Jan Carlson and
Shafiul Azam Chowdhury and Marian Daun and Nianyu Li
and Matthias Markthaler and Claudio Menghi and Birgit
Penzenstadler and Aedan Pettit and Robert Pettit and
Luca Sabatucci and Christos Tranoris and Hans
Vangheluwe and Sebastian Voss and Edith Zavala",
title = "Software Engineering for Smart Cyber-Physical Systems
{(SEsCPS} 2018) --- Workshop Report",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "11--13",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.3364465",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.3364465",
abstract = "Smart Cyber-Physical Systems (sCPS) are a novel kind
of Cyber- Physical System engineered to take advantage
of large-scale cooperation between devices, users and
environment to achieve added value in the face of
uncertainty and changing environments. \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Le:2019:SAG,
author = "Xuan-Bach D. Le and Corina Pasareanu and Rohan Padhye
and David Lo and Willem Visser and Koushik Sen",
title = "Saffron: Adaptive Grammar-based Fuzzing for Worst-Case
Analysis",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "14--14",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.3364455",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.3364455",
abstract = "Fuzz testing has been gaining ground recently with
substantial efforts devoted to the area. Typically,
fuzzers take a set of seed inputs and leverage random
mutations to continually improve the inputs with
respect to a cost, e.g. program code coverage,
\ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Almaawi:2019:QEK,
author = "Alyas Almaawi and Hayes Converse and Milos Gligoric
and Sasa Misailovic and Sarfraz Khurshid",
title = "Quantifying the Exploration of the {Korat} Solver for
Imperative Constraints",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "15--15",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.3364456",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.3364456",
abstract = "Tools that explore very large state spaces to nd bugs,
e.g., when model checking, or to nd solutions, e.g.,
when constraint solving, can take a considerable amount
of time before the search terminates, and the user may
not get useful feedback on the \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Storey:2019:SDP,
author = "Kyle Storey and Eric Mercer and Pavel Parizek",
title = "A Sound Dynamic Partial Order Reduction Engine for
{Java Pathfinder}",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "15--15",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.3364457",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.3364457",
abstract = "When model checking a multi-threaded program, it is
often necessary to enumerate the possible ordering of
concurrent events to evaluate the behavior of the
program. However, enumerating every possible order of
events quickly leads to state-space \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Noller:2019:CSS,
author = "Yannic Noller and Hoang Lam Nguyen and Minxing Tang
and Timo Kehrer and Lars Grunske",
title = "Complete Shadow Symbolic Execution with {Java
PathFinder}",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "15--16",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.33644558",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.33644558",
abstract = "Regression testing ensures the correctness of the
software during its evolution, with special attention
on the absence of unintended side-effects that might be
introduced by changes. However, the manual creation of
regression test cases, which expose \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Saha:2019:IAS,
author = "Seemanta Saha and William Eiers and Ismet Burak Kadron
and Lucas Bang and Tevfik Bultan",
title = "Incremental Attack Synthesis",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "16--16",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.336445759",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.336445759",
abstract = "Information leakage is a significant problem in modern
software systems. Information leaks due to side
channels are especially hard to detect and analyze. In
recent years, techniques have been developed for
automated synthesis of adaptive side-channel \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Berglund:2019:MSJ,
author = "Lasse Berglund and Cyrille Artho",
title = "Method summaries for {JPF}",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "16--16",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.33644560",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.33644560",
abstract = "Java Pathfinder (JPF) is a virtual machine executing
Java byte-code that is able to perform model checking
using backtracking execution. Due to backtracking,
parts of a program may be executed multiple times
during model checking. Hence, we explore \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Chen:2019:SVR,
author = "Zhenbang Chen and Hengbiao Yu and Ji Wang and Wei
Dong",
title = "Symbolic Verification of Regular Properties for {Java}
Programs",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "17--17",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.33644561",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.33644561",
abstract = "Verifying the regular properties of a program is
challenging. In this extended abstract, we report our
recent progress of verifying regular properties based
on dynamic symbolic execution (DSE). We propose two
algorithms for DSE to improve the \ldots{}",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Namakonov:2019:SDR,
author = "Egor Namakonov and Eric Mercer and Pavel Parizek and
Kyle Storey",
title = "Symbolic data race detection for {Habanero} programs",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "18--18",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.33644562",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.33644562",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}
@Article{Hooker:2019:JHT,
author = "Joshua Hooker and Peter Aldous and Eric Mercer and
Benjamin Ogles and Kyle Storey and S. Jacob Powell",
title = "{JPF-HJ}: a Tool for Task Parallel Program Analysis",
journal = j-SIGSOFT,
volume = "44",
number = "4",
pages = "19--19",
month = dec,
year = "2019",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/3364452.33644563",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Mar 24 14:07:40 MDT 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
URL = "https://dl.acm.org/doi/10.1145/3364452.33644563",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/loi/sigsoft",
}