%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.04", %%% date = "26 December 2021", %%% time = "08:48:17 MST", %%% filename = "sigsoft2010.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "01283 25058 128040 1211237", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "ACM SIGSOFT Software Engineering Notes; %%% bibliography; BibTeX", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a COMPLETE bibliography of ACM %%% SIGSOFT Software Engineering Notes (CODEN %%% SFENDP, ISSN 0163-5948 (print), 1943-5843 %%% (electronic)) for the years 2010--2019. %%% Other decades are covered in companion %%% bibliographies named sigsoftYYY0.bib. %%% %%% Publication began with volume 1, number 1, in %%% May 1976, and there are up to 8 issues per %%% annual volume. %%% %%% The journal has Web sites at: %%% %%% http://www.sigsoft.org/ %%% https://dl.acm.org/citation.cfm?id=J728 %%% https://dl.acm.org/loi/sigsoft %%% %%% At version 1.04, the COMPLETE year coverage %%% looked like this: %%% %%% 2010 ( 112) 2014 ( 12) 2018 ( 68) %%% 2011 ( 101) 2015 ( 0) 2019 ( 53) %%% 2012 ( 163) 2016 ( 50) %%% 2013 ( 157) 2017 ( 36) %%% %%% Article: 752 %%% %%% Total entries: 752 %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-SIGSOFT = "ACM SIGSOFT Software Engineering Notes"} %%% ==================================================================== %%% Bibliography entries, sorted by publication order with ``bibsort %%% --byvolume'': @Article{deSousa:2010:AAR, author = "Thiago C. de Sousa and Jorge R. {Almeida, Jr.} and Sidney Viana and Judith Pav{\'o}n", title = "Automatic analysis of requirements consistency with the {B} method", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--4", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734114", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "A consistent requirements specification is a fundamental success factor for quality software development projects. On the one hand, writing requirements in a natural language is not good for an automated conflict detection process. On the other hand, formal methods provide the basis for consistency checking of requirements specification automatically. In this paper, the potential of the B method for improving the requirements quality under the consistency dimension is discussed. We present an approach to use B specifications derived from a controlled natural language to identify requirements inconsistencies", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kalaimagal:2010:QIQ, author = "Sivamuni Kalaimagal and Rengaramanujam Srinivasan", title = "{Q'Facto 12}: an improved quality model for {COTS} components", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--4", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734116", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Component Based Software Engineering (CBSE) offers developers the twin benefits of reduced software life cycles and shorter development times. However the success of the component based paradigm depends on the quality of the COTS components purchased and integrated into the existing software systems. The need of the hour therefore is a quality model that can be used by software developers to evaluate the quality of software components before integrating them into existing systems. This paper discusses a quality model called Q'Facto12 based on the ISO25000 quality standard that can be used to evaluate the quality of COTS components. The model is an upgrade of an earlier model called the Q'Facto 10 model that was proposed by us. This paper provides an outline of the Q'Facto 12 model compares the model with the Q'Facto 10 model and highlights why the Q'Facto 12 model is better than the Q'Facto 10 model. An experimental study to demonstrate the use of the model has also been presented", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nami:2010:SNN, author = "Mohammad Reza Nami and Jila Saneipour", title = "Self-* e-nursing: a new idea in nursing", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--4", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734117", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The rapid advances in Information and Communication Technology (ICT), management, and network technologies have had key role in emerging heterogeneous large-scale distributed systems. The term of E-nursing has been used to refer to the incorporation of ICT into nursing. An Autonomous system has as its vision the creation of self managing systems to address today's concerns of complexity and total cost of ownership while meeting tomorrow's needs for pervasive and ubiquitous computation and communication. Purpose of this paper is to present an autonomous virtual organization for e-nursing describing their characteristics, effects on quality factors, their building blocks architecture, and challenges", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bhatia:2010:ACB, author = "Rajesh K. Bhatia and Mayank Dave and R. C. Joshi", title = "Ant colony based rule generation for reusable software component retrieval", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--5", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734110", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Storage and representation of reusable software components in software repositories to facilitate convenient identification and retrieval has been always a concern for software reuse researchers. This paper discusses and demonstrated an ant colony algorithm based technique that generates rules to store and then identify the component from software repository for possible reuse. Proposed technique help user in organization and storage of components in repository and later can help in identifying most appropriate component for given context. In first stage while searching it makes use of keywords, their synonyms and their inter-relationships. Then it makes use of ant colony optimization; initial pheromone of one is assigned to all domain representative terms of components. By updating pheromone for participating terms and non-participating terms iteratively and by calculating the quality of each rule generated, it leads to quality rules to represent and retrieve the reusable components", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chodkowski:2010:RIA, author = "Steven Chodkowski", title = "Recommendations for the information architect's book shelf", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--5", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734112", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dahiya:2010:TSE, author = "Deepak Dahiya", title = "Teaching software engineering: a practical approach", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--5", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734113", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In teaching software engineering, it is a major challenge to integrate applied methodology and theory into the practice of software development. Today teaching a course in software engineering involves a theoretical approach with white board and doing a project at the end of the course. Teaching Software engineering as a course involves many disciplines and requires delivering lectures accompanied by lecture demos and hands on lab sessions to accompany individual constituent topics or areas that form the bricks and mortar of this course. Only when the bricks and mortar of software engineering have delivered a solid foundation, is it then that software engineering as a course will be delivered in a true and meaningful sense. This paper presents a method to teach Software Engineering using the applied approach that the author designed and successfully used", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gill:2010:MDP, author = "Nasib Singh Gill and Pradeep Tomar", title = "Modified development process of component-based software engineering", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--6", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734120", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Component-based software engineering (CBSE) is a branch of software engineering, the priority of which is the separation of concerns in respect of the wide-ranging functionality available throughout a given software system. CBSE emphasizes on building system by reusing high quality configurable software components. This reduces its development cost as well as time-to-market and ensures higher reliability, better maintainability and quality by exploiting reusability. In the traditional approach, when a software system is going to be developed, the implementation has to be done from scratch. With the advent of Object-Oriented Technology (OOT), reusable software components have become an indispensable part of programming knowledge. In addition to those classes and methods included in standard libraries of programming languages, such as the Java API library, many reusable software components are developed by software development organizations specifically for reuse or repackaged from previously developed systems. We propose here a modified development process of CBSE and present our modified development process of CBSE for increasing reusability in different abstraction levels: architecture level, modular design level and framework level. This modified development process of CBSE change the reusability approach into two different approaches composition-based approach and generation-based. Lastly on the basis of these two approaches we divide component reuse into two different processes. First one is process of development of reusable components which is composition-based approach and second one is process of development with reusable components which is based on the generation-based according X model with the benefits of reusable components in programming", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bandyopadhyay:2010:MST, author = "Anup Kumar Bandyopadhyay", title = "Modeling of state transition rules and its application", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--7", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734109", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "A state transition rule is viewed as a cause and effect relationship. An example is selected from the common sense world. Six different instances of this relationship are enumerated. A temporal logic based on observation is proposed. This logic is used to model the enumerated instances. Assuming some necessary properties of a transition rule only two relevant models are selected. One of them ensures that the precondition is necessary where the other guarantees its sufficiency. Noting these two characteristics the first one is opted for proving the safety property where the second is used to prove progress. We have considered Peterson's two process mutual exclusion algorithm as an illustrative example", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gupta:2010:TFR, author = "Amit Gupta and Rajesh Bhatia", title = "Testing functional requirements using B model specifications", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--7", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734115", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Testing is very important part of software development. Almost 80\% software fails because of the improper or inefficient testing. Testing is performed by different types of strategies. Generally testing is performed on code, but if the software can be tested in the earlier phases then most of the errors can be eliminated and can be stopped from propagating to next phase. Thus there is a need to explore testing possibilities in earlier phases. This paper present a novel requirement based testing approach that can fix errors in initial phase. Formal Specification languages play a vital role in software testing. Formal models provide a precise specification of the system, and can be used as a vehicle for driving the development process. To perform requirement based testing, we need a formal language that can deal with the requirement specification efficiently. Many researchers have proposed various approaches to generate test cases from formal specifications. These approaches include test case generation from various state based languages like Z, VDM and B specifications. In this paper we proposed a technique that can provide better coverage of requirements as compared to other approaches. For maximizing the coverage of requirements in our model, we annotate our specifications with requirement identifiers, which help in later stages to detect which requirements are covered and which are yet to be tested. Test cases are generated by extracting invariants and post conditions from our specification, and are transformed in a generalized form. Using test selection criteria, we can cover all parts of our model and generates test cases for each of our test objective", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ripon:2010:PAS, author = "Shamim H. Ripon", title = "Process algebraic support for web service composition", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--7", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734118", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Web services technology provides a platform on which we can develop distributed services. The interoperability among these services is achieved by various standard protocols. In recent years, several researches suggested that process algebras provide a satisfactory assistance to the whole process of web services development. Business transactions, on the other hand, involve the coordination and interaction between multiple partners. With the emergence of web services, business transactions are conducted using these services. The coordination among the business processes is crucial, so is the handling of faults that can arise at any stage of a transaction. Compensation is an error recovery mechanism to handle faults in business transactions. Compensating CSP (cCSP) is a language defined to model business transactions within the framework of standard CSP process algebra. The language defines a transaction as a process and has the constructs for orchestration of compensations. In this short note, we report a case study showing how cCSP can be used to model business transactions. We also show a mechanical verification technique to verify theoretical properties of the language", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neogi:2010:EEV, author = "Madhumita S. Neogi and Vandana Bhattacherjee", title = "Evaluating the effectiveness of {VOSDM}: a vision oriented approach", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--8", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734119", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Process models form the heart of software engineering since software development process spans the life cycle of any given project. Even though waterfall model forms the basis of all software development models, the demand for new models with design and implementation occurring in parallel is on the increase. This research aims at the evaluation of a vision oriented software development model. In this study, the subjects are final year post graduate students working for their final term projects for small organizations in and around our city. The group of students applied two techniques for software development and it was found that VOSDM was more effective and improved reliability. The productivity did not show any significant improvement", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wright:2010:ISD, author = "M. Keith Wright and Charles J. {Capps III}", title = "Information systems development project performance in the 21st century", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--10", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734121", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper presents the results of a 2009 survey of professional IT auditors that explored their perceptions about root psychological and sociological causes of Information Systems (IS) project failure based on the punctuated equilibrium theoretical framework. As predicted by punctuated equilibrium theory, the results of the survey indicate that radical as opposed to incremental organizational changes are more effective in turning around ``runaway'' projects. The results indicate that IS development project performance is worse in government than in the private sector, and provide support for the continued use of punctuated equilibrium models for research in information systems development project performance", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Capretz:2010:WDW, author = "Luiz Fernando Capretz and Faheem Ahmed", title = "Why do we need personality diversity in software engineering?", journal = j-SIGSOFT, volume = "35", number = "2", pages = "1--11", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734111", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Diversity of skills is good for society, it is also good in problem solving because different people see a problem from several perspectives, so diversity should be good for software engineering too. This study tackles a difficult to study aspect of software engineering, that is, how to best associate personnel with the various tasks in a software project. The approach uses psychological types to determine who is best suited to particular development roles. The article has four main objectives: (1) to arouse awareness of human factors among software engineers; (2) to investigate how psychological factors can contribute to their effectiveness at work; (3) to catalyze effort among software engineers leading towards a deeper understanding and broader applications of human factors in the light of the activities involving the engineering of software; and (4) to emphasize the important of skill diversity in the software engineering field. This article provides conceptual knowledge, reports findings, and presents both real and hypothesized beliefs from the software engineering community. Likewise, it is hoped that the article will motivate software engineers and psychologists to conduct more research in the area of software psychology, so as to understand more profoundly the possibilities for increased effectiveness and fulfillment among software engineers", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2010:PSEa, author = "Larry Bernstein", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "35", number = "2", pages = "3--4", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734104", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2010:SEEa, author = "Mark A. Ardis", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "35", number = "2", pages = "4--4", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734105", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2010:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "35", number = "2", pages = "5--14", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734106", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2010:RPa, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "35", number = "2", pages = "15--24", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734107", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gorschek:2010:TIW, author = "Tony Gorschek and Samuel Fricker and Sjaak Brinkkemper and Christof Ebert", title = "{Third International Workshop on Software Product Management --- IWSPM'09}", journal = j-SIGSOFT, volume = "35", number = "2", pages = "25--29", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734108", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software product management steers the success of a product in all its lifecycle stages by thoughtful application of planning, coordination, and control. The third international workshop on software product management (IWSPM{\^A}'09) was held in conjunction with the International Conference on Requirements Engineering (RE'09) in Atlanta USA. The aim was to bring researchers and industry practitioners together to discuss the area and unique challenges of software and technology product management. Selected challenges put forward by accepted papers from both industry and academia were analyzed. The session discussions focused on identifying future needs for research, the relevance of which was assured by good industry presence at the workshop. The workshop homepage can be found http://2009.iwspm.org", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saur:2010:BRS, author = "Joe Saur", title = "Book Review: {{\booktitle{Simulation-Based Engineering of Complex Systems}}, Second Edition, by John R. Clymer, and published by John Wiley and Sons, 2009, hardcover, ISBN 978-0-470-40129-3, 503 pp.}", journal = j-SIGSOFT, volume = "35", number = "2", pages = "33--34", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734122", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tribbey:2010:BRF, author = "Will Tribbey", title = "Book Review: {{\booktitle{F\# for Scientists}}, by Jon Harrop, and published by Wiley-Interscience, 2008, hardback, ISBN 0-470-24211-6, 368pp.}", journal = j-SIGSOFT, volume = "35", number = "2", pages = "34--35", month = mar, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1734103.1734123", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Krizevnik:2010:ISP, author = "Marcel Krizevnik and Matjaz B. Juric", title = "Improved {SOA} persistence architectural model", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764821", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Companies often face difficulties when building the data services layer. The most common problems are poor data quality, performance issues and heterogeneity of data sources. In this article, we propose solutions to the problems described and merge them into a comprehensive architectural model for the storage and management of permanent data in SOA (Service Oriented Architecture). In order to overcome problems related to poor data quality, our architectural model requires the use of adjusted MDM (Master Data Management). Furthermore, we propose that all data transfer between data services and business level goes in form of SDO (Service Data Objects), which allow us a uniform data access and manipulation, regardless of the data type. As the best approach to improve performances, scalability, availability and reliability of the data services layer, our architecture introduces caching in the intermediate layer with the use of in-memory data grids. As an example of how the proposed solution can also be used to improve parts of the SOA infrastructure, we will present possible approach to improve BPEL (Business Process Execution Language) dehydration store.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nair:2010:PMB, author = "T. R. Gopalakrishnan Nair and V. Suma", title = "A paradigm for metric based inspection process for enhancing defect management", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764827", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Inspection process in software development plays a vital role in effective defect management. In order to have an appropriate measurement of the inspection process, we depend on a process metric called the Depth of Inspection (DI). DI enables the manager within the software community to identify and compare the level of inspection performed in various projects. An empirical study of several projects facilitated the evaluation of a set of process coefficients which are capable of predicting the DI values using multiple regression models. The industry observed DI value based on defect count and the DI value produced by the model are strongly matching. This supports the predictive capability of DI through process coefficients without depending on the prior estimation of the defect count.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Li:2010:TER, author = "Zude Li and Mechelle Gittens and Syed Shariyar Murtaza and Nazim H. Madhavji", title = "A towards an extended relational algebra for software architecture", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--4", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764823", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software architecture is often structured as box-and-arrow graphs and has important implications for system development and maintenance. We propose an extended relational algebra to support presentation and manipulation of both architectural structures and implications. The core structure of this algebra is the extended architectural relation (EAR). An EAR is a mapping from an architectural relation (AR) to a multi-set of attributes (M), where the AR is an ordinary relation representing an architectural structure, and the M represents a multi-set representing a type of architectural implication. A set of EAR operations is then defined to support EAR manipulations. The main advantage of this extended algebra over ordinary relational algebras is that the architectural implications (the M part) are presented and manipulated together with the architectural structures (the AR part). This paper first discusses why we propose the algebra, then briefly introduces what the algebra is, and finally describes how to use the algebra in a real scenario.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Georgieva:2010:CFS, author = "Konstantina Georgieva", title = "Conducting {FMEA} over the software development process", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--5", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764819", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Failure mode and effects analysis (FMEA) is one of the well-known analysis methods with an established position in the traditional reliability analysis. It is widely used but even so, it is not popular in software engineering. To address this gap, in this paper we propose an application of the FMEA method for the software development process after which we visualize our approach with a tool that makes the application of SFMEA very easy. Our tool is available in our virtual Software Measurement Laboratory ([email protected]) at http:// www.smlab.de/webapplcations.html.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2010:SMM, author = "Krishna Kumar and Rajesh Prasad and Suneeta Agarwal", title = "Software maintenance by multi-patterns parameterized string matching with q-gram", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--5", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764822", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In the multi-patterns parameterized string matching problem, a set of patterns $ P_0, P_1, P_2, \ldots {}, P_{r - 1}, r \geq 1 $, are said to match with a sub-string $t$ of the text $T$, if there exists a one-one correspondence between the symbols of patterns and the symbols of $t$. This problem has an important application in software maintenance, where it is often required to find equivalency between two sections of codes. Two sections of codes are said to be equivalent if one can be transformed into the other by renaming only identifiers and variables. In this paper, we extend Forward Non-deterministic Directed Acyclic Word Graph (DAWG) matching (FNDM) algorithm to PQFNDM for parameterized string matching problem by using the q-gram. Experimentally it has been observed that the performance of PQFNDM improves with increasing value of q up to half the length of the pattern. We further modify PQFNDM to MPQFNDM for handling multiple patterns. We compare the performance of PQFNDM (for q=1) with parameterized shift-or (PSO) algorithm and found that PQFNDM is better than PSO. We also show the benefits of using multiple patterns.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Pandey:2010:ADL, author = "R. K. Pandey", title = "Architectural description languages {(ADLs)} vs {UML}: a review", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--5", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764828", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The field of software architecture which is considered as a subfield of software engineering is now about two decades old. During this period a number of software Architecture Description Languages (ADLs) emerged and vanished. But none of the ADLs became much popular amongst the practitioners except a few, that too only in a specific domain. On the other hand Unified Modeling Language (UML) which some times is not even accepted as an ADL or accepted with a some hesitation has become an industry de facto standard notation for documenting software architectures. This paper makes an attempt to find an answer to this question as to what went wrong with the ADLs that they did not become much popular beyond their place of origin. Is UML really an Architecture Description Language.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Prasad:2010:PSM, author = "Rajesh Prasad and Suneeta Agarwal", title = "Parameterized string matching: an application to software maintenance", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--5", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764829", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In the problem of parameterized string matching, a given pattern P is said to match with a sub-string $t$ of the text $T$, if there exists a one-one correspondence between the symbols of P and the symbols of $t$. This problem has an important application in software maintenance, where it is often required to find equivalency between two sections of codes. Two sections of codes are said to be equivalent if one can be transformed into the other by renaming only identifiers and variables. In this paper, we propose two new algorithms for the said problem by using the q-gram approach. The first one is obtained by using this approach on an existing string matching algorithm (simplified backward non-deterministic directed acyclic word graph matching (SBNDM)). The second one is obtained by using the q-gram approach on the parameterized string matching algorithm (parameterized backward non-deterministic directed acyclic word graph matching (PBNDM)). Performance of both the algorithms is tested for various values of q and it has been observed that both show their best performance for q nearly equal to half of the pattern length. We also study the effect on running time of these algorithms with increasing the duplicity in the text.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Malhotra:2010:AML, author = "Ruchika Malhotra and Arvinder Kaur and Yogesh Singh", title = "Application of machine learning methods for software effort prediction", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--6", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764825", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software effort estimation is an important area in the field of software engineering. If the software development effort is over estimated it may lead to tight time schedules and thus quality and testing of software may be compromised. In contrast, if the software development effort is underestimated it may lead to over allocation of man power and resource. There are many models proposed in the literature for estimating software effort. In this paper, we analyze machine learning methods in order to develop models to predict software development effort we used Maxwell data consisting 63 projects. The results show that linear regression, MSP and M5Rules are effective methods for predicting software development effort.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mattmann:2010:UAT, author = "Chris A. Mattmann and Amy J. Braverman and Daniel J. Crichton", title = "Understanding architectural tradeoffs necessary to increase climate model intercomparison efficiency", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--6", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764826", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "NASA's Jet Propulsion Laboratory, in partnership with Lawrence Livermore National Laboratory, has been leading an effort to allow remote sensing data available from NASA satellites to be easily compared with climate model outputs available from the DOE-funded Earth System Grid, a national asset in climate science. This partnership is timely with the looming Intergovernmental Panel on Climate Change (IPCC)'s 5th Assement Report (AR5) in active discussion, and the metrics to better understand Earth's climate under formulation. JPL's project, titled the Climate Data eXchange (CDX) provides an easy-to-use software framework for climate scientists to rapidly integrate and evaluate the efficacy of observational data as applied to climate models.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rajaram:2010:ESV, author = "Kanchana Rajaram and Chitra Babu", title = "Evolution of a simple vehicle registration system to an {SOA} based e-governance application: a case study", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--7", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764830", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Transactions are one of the basic building blocks in all business applications. The notion of a transaction originated in the seventies and has evolved over time to cater to complex business applications that are distributed, heterogeneous, and loosely coupled. The literature on transaction models is extensive and most of them illustrate the ideas with case studies on different applications. Since the applications are different, it is diffcult to understand the limitations of the models for the general case. However, such an understanding is essential in order to develop a new transaction model that caters to the changing business requirements. This motivated us to investigate the evolution of existing transaction models and to analyze their shortcomings using a case study, Vehicle Registration system. A taxonomy of the various transaction models based on conceptual evolution has also been presented. Further, the suitability of SOA to large scale e-governance applications and the need for developing better SOA Governance transaction frameworks have been demonstrated.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gama:2010:SAA, author = "Kiev Gama and Didier Donsez", title = "A survey on approaches for addressing dependability attributes in the {OSGi} service platform", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--8", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764818", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The OSGi service platform is being used in software industry as the de facto middleware for developing and deploying modular Java applications, using SOA principles in centralized solutions. OSGi provides a dynamic platform where components and services can be deployed and undeployed at runtime, attracting the attention of both commercial and research projects. Although the platform is used in fields with different purposes (e.g. experimentally used in healthcare, commercially used in application servers) but where dependability should be a pre-requisite for applications, it is a fact that the OSGi technology does not provide a dependable platform for executing applications with such needs. Different research efforts try to address dependability attributes (availability, integrity, maintainability, reliability, safety, and confidentiality) in the OSGi service platform, but not necessarily all of these attributes are completely covered or explicitly addressed in the textual references. We provide a brief survey on recent research efforts that try to improve dependability in the OSGi service platform. We analyze and identify which attributes are addressed on each approach, and provide a discussion on the employed techniques, similarities and results achieved on such approaches. Al-though this survey remains limited to one technology (OSGi), the problematic as well as all the employed techniques in the analyzed efforts are pertinent to other service and component-based systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hopfner:2010:EAD, author = "Hagen H{\"o}pfner and Christian Bunse", title = "Energy aware data management on {AVR} micro controller based systems", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--8", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764820", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Data management systems comprise various algorithms for efficiently retrieving and managing data. Typically, algorithm efficiency or performance is correlated with execution speed. However, the uptime of battery-powered mobile- and embedded systems strongly depends on the energy consumption of the involved components. This paper reports our results concerning the energy consumption of different implementations of sorting and join algorithms. We demonstrate that high performance algorithms often require more energy than slower ones. Furthermore, we show that dynamically exchanging algorithms at runtime results in a better throughput if energy is limited.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Suri:2010:DMF, author = "P. K. Suri and Gurdev Singh", title = "{DG-metrics} formulization for {DGML-based} software design", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--8", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764832", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "DGML-based software-design representation uses specially designed XML tags to represent the design elements. This representation opens new possibilities for verifying DGML-based software design against existing design metrics and creation of new design metrics. This paper discusses newly created design metrics for the DGML-based design DG-Metrics. This helps in identifying error prone modules in early stages of software development process, tuning design modules for better performance and in managing the later phases of software development cycle with ease.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bastani:2010:LLD, author = "Behzad Bastani", title = "Low-level dynamic system formation with high-level automation: extending {UML} in support of {UPnP}", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--10", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764817", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "One way of defining system evolvability is in terms of the low-level discrete-systems composition and dynamic bindings. Evidently, direct low-level implementation has its drawbacks and might be expensive for the performance of system formation process and system integrity. Engaging high-level design capabilities based on a standard method in support of low-level system formation can find a crucial role in this setting. Universal Plug and Play (UPnP) is a well-known standard facilitating dynamic integration of devices into networks. Operating as a low-level programming method, UPnP might be composed with high-level design facilities. This paper presents a conceptual framework to provide UPnP with native UML support through UML extensions. An implemented UML to UPnP conversion model offers the contribution of this research as an automated solution for the high-level support.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2010:MRG, author = "V. B. Singh and P. K. Kapur and Abhishek Tandon", title = "Measuring reliability growth of software by considering fault dependency, debugging time Lag functions and irregular fluctuation", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--11", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764831", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The progress of software testing is influenced by various uncertainty factors like effort expenditure, skill of test personal, testing tool, defect density, irregular state of open source project, and irregular state of software fault-report phenomena on the bug tracking system. Hence, there is an irregular fluctuation in fault detection/removal rate during testing phase. In software, the independence of failures can hardly be assumed and dependency of faults can also be considered as one of the factor for getting irregular fluctuation. In Literature, various software reliability growth models have been developed by considering fault dependency with various debugging time lag functions. But, none of the models have incorporated irregular fluctuation in their fault detection rate. Therefore, in this paper fault dependency based software reliability growth models have been developed by applying an It{\^o} type Stochastic Differential Equations in order to incorporate (i) the irregular fluctuation in the fault detection process due to various uncertainty factor during testing phase and (ii) irregular state of software fault-report phenomena on the bug tracking system. The proposed stochastic differential equation based fault dependency models have been validated using (i) open source software fault count data where software fault-report phenomena on the bug tracking system keep an irregular state and (ii) a fault counting data with minor, major and critical faults. The proposed models have been compared with the existing fault dependency models. Various comparison criteria results for goodness of fit have also been presented in the paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mala:2010:QIO, author = "D. Jeya Mala and V. Mohan", title = "Quality improvement and optimization of test cases: a hybrid genetic algorithm based approach", journal = j-SIGSOFT, volume = "35", number = "3", pages = "1--14", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764824", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software development organizations spend considerable portion of their budget and time in testing related activities. The effectiveness of the verification and validation process depends upon the number of errors found and rectified before releasing the software to the customer side. This in turn depends upon the quality of test cases generated. The solution is to choose the most important and effective test cases and removing the redundant and unnecessary ones; which in turn leads to test case optimization. To achieve test case optimization, this paper proposed a heuristics guided population based search approach namely Hybrid Genetic Algorithm (HGA) which combines the features of Genetic Algorithm (GA) and Local Search (LS) techniques to reduce the number of test cases by improving the quality of test cases during the solution generation process. Also, to evaluate the performance of the proposed approach, a comparative study is conducted with Genetic Algorithm and Bacteriologic Algorithm (BA) and concluded that, the proposed HGA based approach produces better results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Notkin:2010:ATF, author = "David Notkin", title = "{ACM TOSEM}: {FAQs} and Figures", journal = j-SIGSOFT, volume = "35", number = "3", pages = "5--6", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764811", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2010:PSEb, author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "35", number = "3", pages = "6--7", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764812", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wing:2010:PC, author = "Mike Wing", title = "Poetry in code", journal = j-SIGSOFT, volume = "35", number = "3", pages = "7--8", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764813", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ruparelia:2010:SDL, author = "Nayan B. Ruparelia", title = "Software development lifecycle models", journal = j-SIGSOFT, volume = "35", number = "3", pages = "8--13", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764814", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This history column article provides a tour of the main software development life cycle (SDLC) models. (A lifecycle covers all the stages of software from its inception with requirements definition through to fielding and maintenance.) System development lifecycle models have drawn heavily on software and so the two terms can be used interchangeably in terms of SDLC, especially since software development in this respect encompasses software systems development. Because the merits of selecting and using an SDLC vary according to the environment in which software is developed as well as its application, I discuss three broad categories for consideration when analyzing the relative merits of SDLC models. I consider the waterfall model before the other models because it has had a profound effect on software development, and has additionally influenced many SDLC models prevalent today. Thereafter, I consider some of the mainstream models and finish with a discussion of what the future could hold for SDLC models.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2010:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "35", number = "3", pages = "14--23", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764815", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2010:RPb, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "35", number = "3", pages = "24--32", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764816", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2010:RIS, author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti Mishra", title = "A report on the {``Information Systems in Distributed Environments'' (ISDE) Workshop} at the {OTM 2009} conferences", journal = j-SIGSOFT, volume = "35", number = "3", pages = "33--34", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764833", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a report from a one-day workshop on ``Information Systems in Distributed Environments'' (ISDE), which was organized in conjunction with the OTM Conferences 2009 in Vilamoura, Portugal, on November 3, 2009. The main focus of this workshop was to provide a venue for the discussion of challenges related to the development, operation, and maintenance of distributed information systems, and their creation in the context of global development projects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ben-Menachem:2010:PCV, author = "Mordechai Ben-Menachem", title = "Book Review: {{\booktitle{Parallel Coordinates: Visual Multidimensional Geometry and its Applications}}, by Alfred Inselberg, and published by Springer; 2009; ISBN 978-0-387-21507-5; pp. 580}", journal = j-SIGSOFT, volume = "35", number = "3", pages = "39--39", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764834", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Safonov:2010:BRM, author = "Vladimir O. Safonov", title = "Book Review: {{\booktitle{Microsoft Windows communication foundation: hands-on!}}, by Craig McMurtry, Marc Mercuri and Nigel Watling, and published by Sams Publishing, 2006 (paperback), ISBN 0-672-32877-1, 539 pp., \$39.99}", journal = j-SIGSOFT, volume = "35", number = "3", pages = "40--40", month = may, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1764810.1764835", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tee:2010:MEM, author = "Sim-Hui Tee", title = "Method efficiency model based on value relevancy", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--3", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811239", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Class methods are modules in a class that perform a specific behavior. The best software practice in defining a method is to assign a single task for each method. It is always expected that each method should carry out a unique task in its defining class. A series of similar tasks are usually defined by overloaded methods. Such a single-task practice of method definition is seldom imposed on individual software developers who extensively develop user-defined methods. In this research, a method efficiency model is developed with the objective of guiding the software developers in developing an individual cohesive method. Increased cohesion of methods is desirable because it contributes to the enhancement of software maintenance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sagar:2010:SCBa, author = "Shrddha Sagar and N. W. Nerurkar and Arun Sharma", title = "A soft computing based approach to estimate reusability of software components", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--4", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811235", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Component-based development (CBD) is the process of assembling existing software components in an application such that they satisfy a predefined functionality. Reduced development time, effort and cost are few merits of CBD. As components are black-box, therefore the use of conventional metrics in CBD is difficult, because these metrics needs analysis of source codes. To assess the reuse of component, it is important to estimate reusability of these components. Present paper discusses reusability in relation to CBD and proposes a reusability metrics for black box components. It identifies the factors affecting reusability of the components and establishes relationship in between these factors and reusability. Fuzzy logic based approach is used to estimate reusability and results found on real time applications are quite satisfactory. The proposed approach can be used by the application developers to select highly reusable components in the systems which will eventually help in maintaining the system in a better way.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Macedo:2010:MDD, author = "Hendrik Macedo", title = "Model driven development approach to natural language generation systems", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--7", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811233", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Natural Language Generation systems have traditionally been built using ad-hoc software engineering practices with no explicit development process and no standard software architecture. This situation has drastically limited professional use of NLG technology. New approaches to NLG application development that considers domain-independence, languages and standards of modern software engineering, could enhance its practical use. This work proposes an NLG reference architecture that leverages the most advanced open standards in software architecture, modeling languages and processing tools. In particular, it is shown how dialogue-based voice-driven NLG applications can be built from the up-to-date Model-driven Architecture (MDA) approach. The implementation of a voice-driven movie recommendation system demonstrates the feasibility of the proposal.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2010:TCP, author = "Yogesh Singh and Arvinder Kaur and Bharti Suri", title = "Test case prioritization using ant colony optimization", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--7", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811238", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Regression testing is primarily a maintenance activity that is performed frequently to ensure the validity of the modified software. In such cases, due to time and cost constraints, the entire test suite cannot be run. Thus, it becomes essential to prioritize the tests in order to cover maximum faults in minimum time. In this paper, ant colony optimization is used, which is a new way to solve time constraint prioritization problem. This paper presents the regression test prioritization technique to reorder test suites in time constraint environment along with an algorithm that implements the technique.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Majumdar:2010:MRM, author = "Dipankar Majumdar and Sabnam Sengupta and Ananya Kanjilal and Swagata Kundu and Swapan Bhattacharya", title = "A mathematical reusability model for quantifying the reduction in development effort", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--8", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811234", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software Effort and Cost Estimation is a very important activity that includes very uncertain elements. In the context of object-oriented software, traditional methods and metrics were extended to help managing this activity. Use Case Points (UCP) is a very well known metrics used for estimation of object-oriented systems. Use case models are used in Object-Oriented Analysis for capturing and describing the Functional-Requirements of a system. Several methods for estimating software development effort are based on attributes of a use case model. In this paper, we propose a mathematical model based on vectors to measure reusability of software design in terms of reusability of the use cases. Increasing reusability of the use case model would lead to decrease in development effort. Using the vector model, we propose an approach to measure Complexity Reduction Factor (CRF) which measures percentage decrease in effort and hence in cost with increasing reusability. This quantitative analysis of effort reduction with increased reusability would enable us in designing reusable and cost effective software much earlier in software development life cycle, right at the requirement engineering phase. We have used requirements of an Insurance system as a case study to illustrate our approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Radhakishan:2010:CDI, author = "V. Radhakishan and Yaser Farook and S. Selvakumar", title = "{CRAYSE}: design and implementation of efficient text search algorithm in a web crawler", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--8", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811236", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "CRAYSE1 is a SEarch WHIle CRAwl application, intended to perform fast searching of text in web pages. A Web crawler is a computer program that browses the World Wide Web in a methodical, automated manner. This process is also called spidering. Search engines, use spidering as a means of providing up-to-date data. Most of the existing web-crawlers archive the contents of the web starting from the input URL. Search engines index the results of web-crawlers and then perform searching when queried. As such, the searching is not performed while crawling. Hence such software can not be used for general use by web browsers. Also, the existing search mechanism in web browsers, search only on the current page and not recursively through all the links present in that page. In order to overcome such disadvantages, we propose in this paper to implement a web crawler that searches for a pattern efficiently and recursively through all the links including pdf links while crawling. CRAYSE can be used as a general purpose open source software by web browsers. It can also be used for offine searching. Further, the applications that require selective archival of web pages (based on the presence of a key word), can deploy CRAYSE for efficient search operations. This paper focusses on the design and implementation of CRAYSE and its demonstration through web applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Campos:2010:IAC, author = "Juliana Pinheiro Campos and Jos{\'e} Luis Braga and Ant{\^a}nio Maria Pereira de Resende and Carlos Henrique Os{\'o}rio Silva", title = "Identification of aspect candidates by inspecting use cases descriptions", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--9", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811231", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The identification of aspect candidates in the early phases of software development process allows improving the modularization of the requirements, to detect conflicts early and maintain the separation of concerns in the later phases of the process. However, the identification of aspects in initial phases is a non-trivial task, which can be costly and too time-consuming. This paper presents a technique to assist in the identification of aspect candidates in the requirements, through inspection. Two case studies were carried out to evaluate the proposed technique. The results obtained from the case studies let us conclude that the proposed technique facilitates the identification of aspect candidates.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ratneshwer:2010:DAS, author = "Ratneshwer and A. K. Tripathi", title = "Dependence analysis of software component", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--9", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811237", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Dependence analysis among software components is still a challenging issue for practitioners and researchers. We propose the representation of dependence among software components as a Component Interaction Graph (CIG). We make use of a well known data structure consisting of ``two linear arrays'' to represent the CIG. Based on this representation, we derived some dependency relationships. We evaluate the relationships by Weyukers' properties. We also have demonstrated with a possible CIG for a CBS to show the quantitative characteristics of the derived relationships. This work starts a discussion and calls for more extensive research oriented studies by professionals and academicians for perfection of the approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lee:2010:OIP, author = "Tony Tony Lee", title = "Optimizing {IT} process management", journal = j-SIGSOFT, volume = "35", number = "4", pages = "1--10", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811232", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper, the author discusses some key concepts in IT process management. The paper also includes the recommendations in these following aspects: team organization, physical environment, project selection, politics, organizational communication, development environment, staff development, and organizational culture.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2010:PSEc, author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "35", number = "4", pages = "3--4", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811227", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wing:2010:BDM, author = "Mike Wing", title = "{Burt} doesn't manage", journal = j-SIGSOFT, volume = "35", number = "4", pages = "4--6", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811228", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2010:SEEb, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "35", number = "4", pages = "6--7", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811229", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2010:SNSc, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "35", number = "4", pages = "8--16", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811244", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2010:RPc, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "35", number = "4", pages = "17--23", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811245", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mandrioli:2010:SFS, author = "Dino Mandrioli and Stephen Fickas and Carlo A. Furia and Mehdi Jazayeri and Matteo Rossi and Michal Young", title = "{SCORE}: the first student contest on software engineering", journal = j-SIGSOFT, volume = "35", number = "4", pages = "24--30", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811240", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Student Contest on Software Engineering (SCORE), organized for the first time in conjunction with the International Conference on Software Engineering (ICSE) 2009, attracted 50 student teams from around the world, produced an impressive and varied set of projects, and earned appreciative comments from participants and even from teams who chose not to submit their results to the competition. It was a remarkable success, but not without problems and setbacks. In this article we explain the objectives, constraints, and design philosophy of SCORE, particularly as they distinguish it from the tradition of computer science contests focused more narrowly on programming. We also recount key approaches taken to design and management of this novel kind of contest, the difficulties we met (some still outstanding), and the lessons learned.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2010:BRC, author = "Larry Bernstein", title = "Book Review: {{\booktitle{Characterizing people as non-linear, first-order components in software development}}, by Alistair A. R. Cockburn and published in Humans and Technology, HaT Technical Report 1999.03, Oct 21, 1999}", journal = j-SIGSOFT, volume = "35", number = "4", pages = "33--34", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811241", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ben-Menachem:2010:BRM, author = "Mordechai Ben-Menachem", title = "Book Review: {{\booktitle{Managing and Leading Software Projects}} by Richard Fairley and published by John Wiley \& Sons, Inc. with IEEE Computer Society 2009, (hardback), ISBN 978-0470-29455-0, pp. 510}", journal = j-SIGSOFT, volume = "35", number = "4", pages = "34--34", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811242", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ben-Menachem:2010:BRR, author = "Mordechai Ben-Menachem", title = "Book Review: {{\booktitle{Reactive Systems: Modelling, Specification and Verification}} by L. Aceto, et al.; and published by Cambridge University Press; distributed by Cambridge University Press; 2007, (hardback), ISBN 978-0-521-87546-2, pp. 300}", journal = j-SIGSOFT, volume = "35", number = "4", pages = "34--35", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811243", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rogers:2010:BRG, author = "David S. Rogers", title = "Book Review: {{\booktitle{Geometric Spanner Networks}} by Giri Narasimhan and Michael Smid, and published by Cambridge University Press, 2007, Hardback ISBN 978-0-521-81513-0, 500 pp., \$105}", journal = j-SIGSOFT, volume = "35", number = "4", pages = "35--35", month = jul, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1811226.1811246", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fazal-e-Amin:2010:PES, author = "Fazal-e-Amin and Ahmad Kamil Mahmood and Alan Oxley", title = "Proposal for evaluation of software reusability assessment approach employing a mixed method", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--4", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838703", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software engineering, as an engineering discipline, is still quite young as compared to other engineering disciplines. The software engineering research community has made enormous contributions in past decades to lay down its foundations. However, the research methodologies in software engineering are still not mature. One of the reasons in this regard is the inherent complexity of this field. In this paper, we focus on one aspect of this field --- the evaluation of reusability assessment approaches. We begin by reviewing existing ways of comparing reusability assessment approaches. Following this we propose a different approach. This includes a mixture of both subjective and objective evaluation of a reusability assessment approach. This is novel in that we feel that subjective evaluation has been neglected by other approaches.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Banerjee:2010:RSS, author = "C. Banerjee and S. K. Pandey", title = "Research on software security awareness: problems and prospects", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--5", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838701", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "People attack software deliberately to steal highly sensitive as well as personal information with the sole intention of carrying out well-funded, destructive and unethical goals that could harm individuals, nations or the whole world. Available technological controls could be implemented to tighten access and minimize persistent threats but the complete solution of secure software could only be provided by changing the behavior of the people involved. This can be achieved through effective security awareness techniques implemented by individuals because they are, in most cases, the first target for gaining access into the system. This paper highlights the utility of security awareness with the help of recent published work for building more secure software. In addition, areas that need further investigations are identified in the paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nerurkar:2010:ARA, author = "N. W. Nerurkar and Avadhesh Kumar and Pallavi Shrivastava", title = "Assessment of reusability in aspect-oriented systems using fuzzy logic", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--5", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838706", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Reusability of the software systems is becoming a very important factor due to rapid software development and increasing complexity. Software reusability improves the quality of software product by reducing development time, effort and cost. Researchers have explored many methodologies in order to assess the reusability of Object-Oriented (OO) software systems but the assessment of the reusability of Aspect-Oriented (AO) software systems is underexplored. Aspect-Oriented Software Development (AOSD) is an emerging paradigm that aims to modularize the crosscutting concerns in an application, which cannot be modularized using traditional procedure-oriented and object-oriented approaches. By applying an aspect-oriented approach, such concerns can be isolated resulting in the increase maintainability and reusability of the system. In this paper, we propose a reusability model for aspect-oriented systems and assess it using fuzzy logic technique.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sagar:2010:SCBb, author = "Shrddha Sagar and N. W. Nerurkar and Arun Sharma", title = "A soft computing based approach to estimate reusability of software components", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--5", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838707", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Component-based development (CBD) is the process of assembling existing software components in an application such that they satisfy a predefined functionality. Reduced development time, effort and cost are few merits of CBD. As components are black-box, therefore the use of conventional metrics in CBD is difficult, because these metrics needs analysis of source codes. To assess the reuse of component, it is important to estimate reusability of these components. Present paper discusses reusability in relation to CBD and proposes a reusability metrics for black box components. It identifies the factors affecting reusability of the components and establishes relationship in between these factors and reusability. Fuzzy logic based approach is used to estimate reusability and results found on real time applications are quite satisfactory. The proposed approach can be used by the application developers to select highly reusable components in the systems which will eventually help in maintaining the system in a better way.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2010:AFF, author = "Yogesh Singh and Pradeep Kumar", title = "Application of feed-forward neural networks for software reliability prediction", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--6", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838709", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Many analytical models have been proposed for modeling software reliability growth trends with different predictive capabilities at different phases of testing yet there still is a need to develop a model that can be applied for accurate predictions in a realistic environment. In this paper we describe a software reliability prediction model using feed-forward neural network for better reliability prediction through back-propagation algorithm and discuss the issues of network architecture and data representation methods. We demonstrate a comparative analysis between the proposed approach and three well known software reliability growth prediction models using seven different failure datasets collected from standard software projects to test the validity of the presented method. A numerical example also has been cited to illustrate the results that revealed significant improvement by using Artificial Neural Network (ANN) over conventional statistical models based on NHPP.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gill:2010:NCM, author = "Nasib S. Gill and Sunil Sikka", title = "New complexity model for classes in object oriented system", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--7", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838704", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Minimizing software complexity is the foremost objective of each software development paradigm because it affects all other attributes of software such as maintainability, reliability, testability, reusability etc. Measuring software complexity is always essential for predicting fault proneness, computing development efforts and evaluating maintainability of software. This paper proposes a complexity model for classes in object oriented systems. The model computes Class Complexity (CC) as a sum of Method Complexity (MC) and MC is further computed as a sum of Control Flow Complexity (CFC), Total Method Call Complexity (TMCC) and Total Data Call Complexity (TDCC). CFC is computed using McCabe's cyclomatic complexity. TMCC and TDCC are computed with adherence to the principle that ``The higher the number of classes involved in method/data calls and polymorphic method calls, makes the object oriented software difficult to understand and maintain''. The proposed model is also compared with four Chidamber's and Kemerer's metrics-Weighted Methods per Class (WMC), Response For a Class (RFC), Depth of Inheritance Tree (DIT) and Coupling Between Objects (CBO).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Long:2010:TDSa, author = "Brad Long", title = "Towards the design of a set-based {Java} collections framework", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--7", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838705", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Java Collections Framework (JCF) was introduced as standard in JDK 1.2. Since then several significant enhancements have been made including the introduction of generics and typed collections. One striking design choice of the Java language designers was the exclusion of map from the collections hierarchy. This paper looks at how maps could be incorporated into the Java collections hierarchy by describing early work on YACL (Yet Another Collections Library). The intention of YACL is to provide a suite of set-based collections classes and operations whilst continuing to be compatible with the JCF.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2010:EES, author = "Ashish Sharma and Dharmender Singh Kushwaha", title = "Early estimation of software complexity using requirement engineering document", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--7", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838708", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "There has been a continuous effort to estimate software complexity but very little established methods exist that can estimate the complexity of the software before it is written. Since a high quality Software Requirement Specification (SRS) is a pre requisite for high quality software, this work attempts to empirically demonstrate that the complexity of the code can be determined based on its IEEE software requirement specification document (IEEE 830-1998). Existing complexity measures established are based on the code and the cognitive metrics value of the software. This may require recoding leading to loss of time and cost. Considering the shortcoming of code-based approaches, our proposed approach is able to compute the complexity of yet-to-be-written software immediately after freezing the requirement in the Software development Lifecycle (SDLC) process. The proposed complexity measure compares well with established complexity measures like Halstead, Mc Cabe, KLCID, CFS and CICM. Results obtained show that the complexity values are comparable with other established measures. The robustness of our complexity measure is established by evaluating our measure against Weyuker properties.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Yazbek:2010:CQA, author = "Hashem Yazbek", title = "A concept of quality assurance for metrics in {CASE-tools}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--8", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838711", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The quality of software has become more important to software companies in the past years. Software measurement is one of many approaches that is used to check the quality of software [18]. This may involve measuring some attributes of a software product or a software process and comparing these measurements to each other or to some desirable level. A software metric is ``any type of measurement that relates to a software system, process or related documentation'' [7]. Software metrics can help to improve the quality of the produced software. However, metrics and metrics tools are still not used in most software companies --- for example in the 3 companies where we cooperated in last 5 years. One reason is that there is lack of knowledge about metrics and hence software metrics are still unknown or difficult to use for some developers, and software measurement is still time-consuming for managers. Another reason is that, good metrics tools are still expensive for small and middle companies. In our opinion the effectiveness of metrics can be improved by simple organizational expedients. In this paper we present new/adapted requirements on metrics in CASE tools to define flexible product quality models. For this quality model we tried to use some standard techniques, e.g. metrics suite, metrics visualization or metrics filtering to show how metrics in CASE tools can be defined and how it can benefit different people who are involved in a software deployment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chatterjee:2010:PAA, author = "Ram Chatterjee and Kalpana Johari", title = "A prolific approach for automated generation of test cases from informal requirements", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--11", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838702", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Specification-based testing begins with the documentation of customers' requirements. This informal depiction of requirements needs to undergo formalization for effective test case generation to corroborate specification-based testing so as to catapult validation testing. In this paper, we discuss a credible approach for test suite generation by formalizing the informal requirements that further proves prolific in pioneering effective test case generation. The endeavor is directed towards testing software in the absence of source code.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Upadhyay:2010:DMI, author = "Nitin Upadhyay and Bharat M. Deshapande and Vishnu P. Agrawal", title = "Developing maintainability index of a software component: a digraph and matrix approach", journal = j-SIGSOFT, volume = "35", number = "5", pages = "1--11", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838710", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper describes a methodology based on a digraph and matrix approach for developing the maintainability (characteristic) index of a software component. Sub-characteristics and associated attributes of a component that characterize maintainability are identified and modelled in terms of maintainability digraph. The nodes in the digraph represent maintainability sub-characteristics and edges represent interactive complexity among the subcharacteristics. A detailed procedure for the maintainability analysis of component is suggested through a maintainability function. The maintainability index (Im) is obtained from VPF --- m (i.e. permanent of the matrix) by substituting the numerical values of the sub-characteristics and their interactions. The concept of hypothetical best index and hypothetical worst index is also proposed, which will help system developers to identify relative comparison of candidates from hypothetical best and hypothetical worst indices and designers and developers to improve the component maintainability characteristic (looking upon critical attributed factors) by performing sensitivity analysis. A higher value of the VPF --- m implies better maintainability of a component. An example is also presented to demonstrate and validate the effectiveness of the methodology.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2010:PSEd, author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "35", number = "5", pages = "4--5", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838688", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Berliner:2010:EDC, author = "Brian Berliner and Nayan B. Ruparelia", title = "Early days of {CVS}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "5--6", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838689", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The topic of this article is to discuss the early days of CVS, from the late 1980s to the mid 1990s. First, a timeline depicting key milestones for those early days is discussed and this is followed by an interview with Brian Berliner, the creator of CVS in C. This article concludes with a reading list on CVS for further study.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2010:SNSd, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "8--17", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838690", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2010:RPd, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "35", number = "5", pages = "18--24", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838691", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chan:2010:STR, author = "Wing Kwong Chan and Christof J. Budnik and Gregory M. Kapfhammer", title = "Software testing research in practice: report on the {5th International Workshop on the Automation of Software Test}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "25--26", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838692", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 5th Workshop on the Automation of Software Test co-located with ICSE 2010 provides a publication forum that bridges the gap between the theory and practice of automated testing. The workshop featured a twoday high quality programs with a multi-session charette on integration testing. Researchers shared with us their insights on software testing through 15 regular papers and 6 case-study papers were presented in six sessions at the workshop. This report summarizes the organization of the workshop as well as the sessions and papers presented, the results of the charette session, attendee feedback, and lessons learned.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dittrich:2010:CHA, author = "Yvonne Dittrich and Helen Sharp and Heike Winshiers Theophilus and Cleidson {De Souza} and Mikko Korpela and Janice Singer", title = "Cooperative and human aspects of software engineering: {CHASE} 2010", journal = j-SIGSOFT, volume = "35", number = "5", pages = "27--29", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838693", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software is created by people --- software engineers in cooperation with domain experts, users and other stakeholders--in varied environments, under various conditions. Thus understanding cooperative and human aspects of software development is crucial to comprehend how and which methods and tools are required, to improve the creation and maintenance of software. The 3rd workshop on Cooperative and Human Aspects of Software Engineering held at the International Conference on Software Engineering continued the tradition from earlier workshops and provided a lively forum to discuss current developments and high quality research in the field. Further dissemination of research results will lead to an improvement of software development and deployment across the globe.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lewis:2010:RIW, author = "Grace Lewis and Dennis Smith and Andreas Metzger and Andrea Zisman and Marco Pistore", title = "Report of the {2nd International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2010)}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "30--33", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838694", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Second International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2010) was held at the International Conference on Software Engineering, ICSE 2010 on May 1 and 2, 2010. PESOS 2010 provided a forum for presenting and discussing current work and research topics related to service-oriented systems. The workshop had keynotes on SOA testing challenges and adaptive service-oriented systems. There were four paper sessions on the topics of service development, testing and evolution of service-oriented systems, service adaptation, and quality of service (QoS) and Service-Level Agreements (SLAs) in service-oriented environments. General discussions focused on these overall themes. These discussions resulted in the identification of research challenges for the future.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Geihs:2010:RAI, author = "Kurt Geihs and Stefan Gruner and Kay R{\"o}mer", title = "Report about {1st ICSE Workshop on Software Engineering for Sensor Network Applications (SESENA 2010)}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "34--37", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838695", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "SESENA 2010, the First International Workshop on Software Engineering for Sensor Network Applications, took place under the umbrella of ICSE 2010, the 32nd ACM/IEEE International Conference on Software Engineering, in Cape Town, South Africa, in May 2010. This post-workshop report summarizes the aims and motivation as well as the technical contributions. See also our workshop website at http://www.sesena.info/.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lago:2010:OSA, author = "Patricia Lago and Paris Avgeriou and Philippe Kruchten", title = "Organizing a software architecture body of knowledge: summary of the {5th SHARK} workshop, at {ICSE 2010}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "37--40", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838696", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Architectural Knowledge (AK) is defined as the integrated representation of the software architecture of a software-intensive system or family of systems along with architectural decisions and their rationale, external influence and the development environment. A fifth workshop on Sharing and Reusing Architectural Knowledge (SHARK) was held jointly with ICSE 2010 in Cape Town, South Africa. The theme of this workshop was the organization of a body of knowledge for software architecture knowledge management. It featured thirteen research position statements and three working groups that discussed on focused topics. This report summarizes the results of the discussions we held, and suggests some topics for future research.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hall:2010:IIW, author = "Jon G. Hall and Lucia Rapanotti and Liping Zhao and James Naish", title = "{2010 ICSE International Workshop on Advances and Applications of Problem Orientation (WAAPO-2010)}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "40--41", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838697", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software problems originate in real world problems. A software solution must address its real world problem in a satisfactory way. A software engineer must therefore understand the real world problem that their software intends to address. To be able to do this, the software engineer must understand the problem context and how it is to be affected by the proposed software, expressed as the requirements. Without this knowledge the engineer can only hope to chance upon the right solution for the problem. Application of problem-oriented approaches may well be a way of meeting this challenge. This article reports on IWAAPO-2010, an ICSE workshop concerned with recent developments in problem-oriented approaches.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Knutson:2010:RIW, author = "Charles D. Knutson and Jonathan L. Krein and Lutz Prechelt and Natalia Juristo", title = "Report from the {1st International Workshop on Replication in Empirical Software Engineering Research (RESER 2010)}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "42--44", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838698", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The RESER 2010 Workshop, held on May 4, 2010 in Cape Town, South Africa was co-located with the 32nd International Conference on Software Engineering (ICSE 2010). The workshop provided a venue in which empirical Software Engineering researchers could present and discuss the theoretical foundations and methods of replication, as well as the results of specific replicated studies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Treude:2010:WRW, author = "Christoph Treude and Margaret-Anne Storey and Kate Ehrlich and Arie van Deursen", title = "Workshop report from {Web2SE}: {First Workshop on Web 2.0 for Software Engineering}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "45--50", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838699", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Web 2.0 technologies such as wikis, blogs, tags and feeds have been adopted and adapted by software engineers. With Web2SE, we provide a venue for pertinent work by highlighting current state-of-the-art research, by identifying research areas, and by discussing implications of Web 2.0 on software engineering. This paper reports on the paper presentations and the discussions among participants at Web2SE 2010 as well as on future directions of the Web2SE community.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Canfora:2010:IWE, author = "Gerardo Canfora and Giulio Concas and Michele Marchesi and Ewan Tempero and Hongyu Zhang", title = "{2010 ICSE Workshop on Emerging Trends in Software Metrics}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "51--53", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1838700", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper reports on the 2010 ICSE Workshop on Emerging Trends in Software Metrics (WETSoM 2010) held on Tuesday 4 May 2010 in Cape Town, South Africa, as part of the ICSE workshop series. The goal of this workshop was to bring together researchers and practitioners to discuss the progress of software metrics.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dekhane:2010:IAT, author = "Sonal Dekhane", title = "Install anywhere tutorial and reference guide by Zero G Team", journal = j-SIGSOFT, volume = "35", number = "5", pages = "57--57", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1862451", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Werden:2010:BRT, author = "David A. Werden", title = "Book Review: {{\booktitle{TCP\slash IP architecture, design, and implementation in Linux}} by Sameer Seth and M. Ajaykumar Venkatesulu}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "57--57", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1862452", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tracz:2010:BRD, author = "Will Tracz", title = "Book Review: {{\booktitle{The design of design: essays of a computer scientist}} by Frederick R. Brooks, Jr.}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "58--58", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1862455", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tracz:2010:BRM, author = "Will Tracz", title = "Book Review: {{\booktitle{Making it big in software: get the job, work the org, become great}} by Sam Lightstone}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "58--58", month = sep, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1862453", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tracz:2010:BRR, author = "Will Tracz", title = "Book Review: {{\booktitle{Remarkable Engineers: From Riquet to Shannon}} by Ioan James}", journal = j-SIGSOFT, volume = "35", number = "5", pages = "58--58", month = oct, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1838687.1862454", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Fri Jul 21 10:34:15 2017", bibsource = "http://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "http://dl.acm.org/citation.cfm?doid=1838687.1862454", acknowledgement = ack-nhfb, acmid = "1862454", fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", pagecount = "1", subject-dates = "Claude Elwood Shannon (1916--2001)", } @Article{Dubey:2010:AUM, author = "Sanjay Kumar Dubey and Ajay Rana", title = "Assessment of usability metrics for object-oriented software system", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--4", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874400", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The demand for efficient software is increasing day by day. For this reason software developers need appropriate metrics for the development of software applications. Usability is one of the most important fields in software engineering and a highly focused quality factor. It is a key factor in the development of successful software applications. Object-oriented design techniques have become one of the most powerful mechanisms to develop efficient software system. Object-oriented software can play important role in usability for software applications. It can not only help in reducing the cost but also in developing highly usable software systems. This paper focuses some important issues and analyzes the relationship between usability and object-oriented metrics", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2010:PMS, author = "Amit Mishra and Sanjay Misra", title = "People management in software industry: the key to success", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--4", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874402", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Performance differences have been proved among software professionals even in the conditions of identical task. Companies and organizations are aware of the fact that talent has great effect on their success; still most of the software development organizations are focusing so much on tools and technology and little on people. In this paper, we are trying to uncover the relation between the people management-human resource management and software engineering.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tee:2010:MCC, author = "Sim-Hui Tee", title = "Measuring class cohesion using mutant methods", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--4", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874409", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Class cohesion is a measure of software quality and maintainability. A highly cohesive class implies that its modules are functionally coherent and integrated. To date, there are varying cohesion metrics that measure class cohesion from different perspectives. These metrics use different computation in the evaluation of class cohesion. Novice software developers have no access to the class cohesion of a particular class if they are not familiar with these metrics. In this paper, we provide a quick technique to measure class cohesion without using complicated calculation. We delimit our technique to measure class cohesion in term of attribute sharing and method invocation. We contend that the observation of the impact of mutant methods provides a quick judgement on the cohesion status. The proposed approach enables novice software developers to quickly evaluate the cohesion status of a class", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bandyopadhyay:2010:ATD, author = "Anup Kumar Bandyopadhyay and Nibedita Lenka", title = "Application of {TLRO} to dining philosophers problem", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--6", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874397", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Recently modeling of a state transition rule has been proposed using a temporal logic based on observation (TLRO). The advantage of such representation lies in the fact that the model is derived from the related cause and effect relation and is expressed as an implication. This structure makes manipulation easy. Unlike weakest precondition calculus that can only reason backward in time, present model can include both backward and forward temporal reasoning. This is therefore more expressive. In this paper TLRO based modeling is used to derive three different deadlock free solutions for Dining Philosophers problem. All this solutions are proved using this model", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bandyopadhyay:2010:SOM, author = "Anup Kumar Bandyopadhyay", title = "Spatial ordering of messages in a cyclic architecture", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--6", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874398", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Spatial ordering of messages can be used fruitfully for the design of distributed systems. For modeling such systems we require a logical framework that includes both spatial and temporal ordering predicates. In order to illustrate its applicability a distributed K mutual exclusion algorithm is proposed that requires a unidirectional cyclic topology for its implementation. The algorithm uses only point to point communication rather than broadcast. It is shown that the topological ordering of messages is important for its correct operation", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bhat:2010:CVB, author = "Shubha Bhat and Vindhya Malagi and Krishnan Rangarajan and Ramesh Babu", title = "Computer vision based guidance in {UAVs}: software engineering challenges", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--6", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874399", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper we discuss the key functional and quality attribute requirements and the associated design challenges in engineering a computer vision guided UAV (Unmanned Aerial Vehicle) system. The non-functional requirements of the UAV system as a whole are identified and mapped to the computer vision subsystem which aids in the navigation process. Expectations on availability, reliability, performance, security and evolution of the vision subsystemware discussed and the related software design challenges elaborated", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nair:2010:DPM, author = "T. R. Gopalakrishnan Nair and Sri Aravindh and R. Selvarani", title = "Design property metrics to maintainability estimation: a virtual method using functional relationship mapping", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--6", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874404", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software maintenance is a vital component that every company has to face when their product is delivered to the stakeholders. This task may span for more than ten years at the customer site. The cost of maintenance or keeping software operational consumes 60-70\% of its entire life cycle cost. Defining maintainability at the design stage of the software development life cycle (SDLC) will result in a cost effective product. In this paper, we proposed a design time relationship model between design properties and the maintainability of the software. This analysis is performed based on the influence of object oriented design metrics on software maintainability", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Long:2010:TDSb, author = "Brad Long", title = "Towards the design of a set-based {Java} collections framework", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--7", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874401", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Java Collections Framework (JCF) was introduced as standard in JDK 1.2. Since then several significant enhancements have been made including the introduction of generics and typed collections. One striking design choice of the Java language designers was the exclusion of map from the collections hierarchy. This paper looks at how maps could be incorporated into the Java collections hierarchy by describing early work on YACL (Yet Another Collections Library). The intention of YACL is to provide a suite of set-based collections classes and operations whilst continuing to be compatible with the JCF", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Panigrahi:2010:MBR, author = "Chhabi Rani Panigrahi and Rajib Mall", title = "Model-based regression test case prioritization", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--7", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874405", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We propose a model-based regression test case prioritization technique for object-oriented programs. Our technique involves constructing a graph model of the source code to represent control and data dependences as well as static object relations such as inheritance, aggregation and association. We construct a forward slice of the model to identify all the model elements that may be affected by a change. Subsequently, the model elements are marked with the specific test case(s) testing it. We construct backward slice with respect to each model element executed by a test case to determine all elements indirectly tested by the test case. Then all the affected model elements and the elements being tested are used to prioritize test cases. Empirical studies carried out by us show that our technique increases the detection of number of faults on an average of 30 percent as compared to traditional approaches in detecting regression errors", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Suri:2010:AGD, author = "P. K. Suri and Gurdev Singh", title = "Automatic generation of design search keywords from software specifications to improve design search results", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--8", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874408", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software Design Notation Storage and Inference Mechanism (DNSIM) is capable of storing software designs by using Design Markup Language (DGML) tags and reusing existing design elements to produce new software designs. This mechanism performs search operations on stored designs. The accuracy of the search results depends upon the correctness of the keywords provided to the search process. The challenge is to input the Software Requirement Specification (SRS) document as a search input to DNSIM and to produce the best possible design from existing design elements. This paper proposes a method to produce requirement specification keywords from the formal representation of the SRS. The DNSIM system uses the keywords produced by our method and shows significant improvements and accuracy in the design search results", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mohanta:2010:AEP, author = "Sirsendu Mohanta and Gopika Vinod and A. K. Ghosh and Rajib Mall", title = "An approach for early prediction of software reliability", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--9", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874403", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In the early stages of development, failure information is not available to quantitatively measure reliability of a software product. In this context, we propose an approach to predict software reliability early in the product development stages from design metrics. First we predict reliabilities of the components of a system. For this, we categorize the different kinds of faults that can occur in a component during its development and identify the design metrics that correlate to these faults. We construct a Bayesian Belief Network (BBN) model to predict reliabilities of the components using the identified design metrics. Based on predicted reliabilities and usage frequencies of the components of a system, we determine the reliability of the system. The applicability of our proposed model is illustrated through a case study. Results obtained from our case study indicate the effectiveness of our approach", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sengupta:2010:EME, author = "Abhik Sengupta and Vivek Nandey and Sabnam Sengupta", title = "{ETDSOA}: a model for event and time driven service oriented architecture", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--9", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874407", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Service Oriented Architecture (SOA) is the paradigm for IT architecture definition that has been recognized by the industry and analyst groups as a new enterprise architectural technique with the potential to transform businesses into agile enterprises. This paper discusses the emergent variant of Event and Time driven SOA (ETDSOA) and discusses application areas. It proposes a technique for conversion of a traditional and classical SOA viewpoint into one of ETDSOA. The paper provides a model for depicting a representative process flow following the ETDSOA paradigm, using traditional modeling constructs. This can be used gainfully to design solutions following the ETDSOA paradigm with any commonly available standard SOA framework. The inputs can be used as well, for initially implementing the framework with the benefit of improving ETDSOA solution development", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2010:LSM, author = "Robert Schaefer", title = "The limits of systems-making organizations", journal = j-SIGSOFT, volume = "35", number = "6", pages = "1--20", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874406", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper provides an ontology of organizational structures intended for software-intensive systems-making. An archetype is presented and scaled in stages to support larger, more complex projects. Artifacts at each stage are identified and analyzed. The first artifact analyzed is the engine of scaling, specialization. Organizations that have been scaled for the purpose of developing large complex systems will be shown to themselves become large and complex, in part for matching the problem to be solved but also for self-management. Specialization first occurs with the separation of the role of designer into designers and managers whereby the designer's role and activities can be abstracted into a limited set of objects to be manipulated by managers. Design is transformed into a model of design. The problem (or challenge) for managers is of normalization of dysfunction, whereby the model becomes both mistaken for and more valued than the object modeled. The result of having transformed essential roles and activities into objects in a hierarchical organization will be shown to (one) increase the positive effects on managing large-scale organizations, (two) increase the negative effects on design outcomes and (three) prevent the logical association of item one with item two. Disassociations incurred through specialization and normalization of dysfunction will be shown to be counter-productive in that they create and sustain high process but low sense organizations. Conclusions will be presented on the nature of large organizations, on the nature of their risk evaluations, and on the inevitability of dysfunctions and pathologies to lead not only to project failure but also to immediately forget the same", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2010:PSEe, author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "35", number = "6", pages = "5--5", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874392", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wing:2010:M, author = "Mike Wing", title = "The making of", journal = j-SIGSOFT, volume = "35", number = "6", pages = "5--7", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874393", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2010:SEEc, author = "Mark A. Ardis and Peter B. Henderson", title = "Software Engineering Education {(SEEd)}", journal = j-SIGSOFT, volume = "35", number = "6", pages = "7--8", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874394", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2010:SNSe, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "35", number = "6", pages = "9--18", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874395", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2010:RPe, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "35", number = "6", pages = "19--26", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.1874396", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tribbey:2010:BRN, author = "Will Tribbey", title = "Book Review: {{\booktitle{Numerical Recipes: The Art of Scientific Computing}} (3rd Edition) by William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery, and published by Cambridge University Press, 2007, hardback, ISBN 978-0-521-88068-8, 1235 pp.}", journal = j-SIGSOFT, volume = "35", number = "6", pages = "30--31", month = nov, year = "2010", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1874391.187410", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:15:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Miyachi:2011:ASA, author = "Christine Miyachi", title = "Agile software architecture", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--3", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943388", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "When the Agile software development became popular in software development communities, some engineers thought that software architecture would die out. But no matter what, a software project will have an architecture, whether documented intentionally or created on the fly. Software Architecture should enable Agile development methods by itself being Agile. But how? In this paper, I will discuss my experience of doing architecture in an Agile way and in a non-Agile way. Have an architecture that follows the Agile principles is key to obtaining success in an Agile development environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rech:2011:AEE, author = "J{\"o}rg Rech and Eric Ras", title = "Aggregation of experiences in experience factories into software patterns", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--4", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943390", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In software engineering Experience Factories have been in use for a long time to store and manage experiences from software projects, typically in large organizations. Beside the preservation of quantitative or numerical experiences, e.g., in form of project effort data or data from empirical studies, many experience factories also preserve subjective or qualitative experiences, e.g., in form of observations or lessons learned from the projects. A key issue of experience management is to aggregate these documented experiences into more valuable software patterns. In this article we report about the aggregation (i.e., formalization and generalization) of documented experiences in an experience factory to software patterns. Observations from real-world projects are formalized (i.e., structurally contextualized) into semi-formal experiences and, over time, several similar of these experiences are generalized (i.e., systematically decontextualized) into software patterns.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kayes:2011:ATI, author = "Imrul Kayes", title = "Agile Testing: Introducing {PRAT} as a Metric of Testing Quality in {Scrum}", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--5", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943384", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Scrum methodology has originated from agile software develop-ment as an elixir to software projects which are behind the sche-dule or which are highly likely to have a problematic development phase. Also unlike any other agile methodology, scrum is adaptive in nature. This paper presents a metric that focuses on measuring test quality in scrum. As product quality and process quality is closely correlated, improved test quality can ensure high quality deliverable product. Proposed metric measures test quality of each sprint/ iteration of scrum based upon some factor ratings which can be used to get a comprehensive test quality overview of testing process over longer periods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Krishna:2011:APV, author = "Raj P. M. Krishna and K. G. Srinivasa", title = "Analysis of Projects and Volunteer Participation in Large Scale Free and Open Source Software Ecosystem", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--5", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943389", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The ecology of Free and Open Source Software (FOSS) is dotted by projects of every kind ranging from small desktop applications to large mission critical systems. To enable maximum visibility among the developer community, these projects are often hosted in community project management portals. The current work studies one such portal, sourceforge. net by analysing the data of 200,000 projects and 2 million developers for the period Feb 2005 to Aug 2009. The scope of the present study includes the analysis of developer contribution. The slow growth rate of developer community and high number of single developer projects are the major findings of the present work.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sorkin:2011:LPG, author = "Arthur Sorkin and Peter Donovan", title = "{LR(1)} parser generation system: {LR(1)} error recovery, oracles, and generic tokens", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--5", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943391", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The LR(1) Parser Generation System generates full LR(1) parsers that are comparable in speed and size to those generated by LALR(1) parser generators, such as yacc [5]. In addition to the inherent advantages of full LR(1) parsing, it contains a number of novel features. This paper discusses three of them in detail: an LR(1) grammar specified automatic error recovery algorithm, oracles, and generic tokens. The error recovery algorithm depends on the fact that full LR(1) parse tables preserve context. Oracles are pieces of code that are defined in a grammar and that are executed between the scanner and parser. They are used to resolve token ambiguities, including semantic ones. Generic tokens are used to replace syntactically identical tokens with a single token, which is, in effect, a variable representing a set of tokens.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bishnu:2011:AKM, author = "P. S. Bishnu and V. Bhattacherjee", title = "Application of {K-Medoids} with {Kd}-Tree for Software Fault Prediction", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--6", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943381", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software fault prediction area is subject to problems like non availability of fault data which makes the application of supervised techniques difficult. In such cases unsupervised approaches like clustering are helpful. In this paper, K-Medoids clustering approach has been applied for software fault prediction. To overcome the inherent computational complexity of KMedoids algorithm a data structure called Kd-Tree has been used to identify data agents in the datasets. Partitioning Around Medoids is applied on these data agents and this results in a set of medoids. All the remaining data points are assigned to the nearest medoids thus obtained to get the final clusters. Software fault prediction error analysis results show that our approach outperforms all unsupervised approaches in the case of one given real dataset and gives best values for the evaluation parameters. For other real datasets, our results are comparable to other techniques. Performance evaluation of our technique with other techniques has been done. Results show that our technique reduces the total number of distance calculations drastically since the number of data agents is much less than the number of data points.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dubey:2011:UES, author = "Sanjay Kumar Dubey and Ajay Rana", title = "Usability Estimation of Software System by using Object-Oriented Metrics", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--6", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943382", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Usability is one of the most important quality factors in the fields of software engineering and an important issue in the development of successful software applications. To develop efficient software systems, software developers need appropriate metrics. Object-oriented metrics can play important role in the development of successful and usable software applications because object-oriented design techniques have become one of the most powerful mechanisms to fulfill the demand of efficient software systems. Currently there are no comprehensive criteria for estimating usability by using object-oriented metrics. This paper focuses on usability and presents a comparative analysis of various usability models and metrics. It then analyzes the relationship between usability and object-oriented metrics.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kaur:2011:DMI, author = "Kulwant Kaur and Hardeep Singh", title = "Determination of Maintainability Index for Object Oriented Systems", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--6", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943383", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In Object Oriented System, the quality of software depends significantly on the decision taken at early phases of the development. As per available artefact, quality of the class description is very crucial for system development. Maintenance is to repair defects in software, to adapt the software to different operational environments and to add or modify the functionality of the system. In Object Oriented Systems, maintainability factor needs more aspects to explore. We have proposed Maintainability Index using Package Metrics. We performed empirical evaluation using three case studies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2011:RBC, author = "Pankaj Kumar and Kamlesh Dutta", title = "Relationship between Crosscutting Concerns and Defects", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--7", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943385", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "NOTE FROM ACM: It has been determined that this paper plagiarized earlier works. Therefore ACM has shut off access to this paper. The paper by Pankaj Kumar and Kamlesh Dutta plagiarizes the following work: Marc Eaddy, Vibhav Garg, Alfred Aho, Nachiappan Nagappan, Kaitlin Duck Sherwood, ``On the Relationship between Crosscutting Concerns and Defects: An Empirical Investigation'' found here, as well as the article: Eaddy, M.; Zimmermann, T.; Sherwood, K. D.; Garg, V.; Murphy, G. C.; Nagappan, N.; Aho, A. V.;, ``Do Crosscutting Concerns Cause Defects?,'' Software Engineering, IEEE Transactions on, vol. 34, no. 4, pp. 497--515, July--Aug. 2008. https://doi.org/10.1109/TSE.2008.36. For further information, contact the ACM Director of Publications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumari:2011:AOO, author = "Usha Kumari and Sucheta Bhasin", title = "Application of Object-Oriented Metrics To {C++} and {Java}: a Comparative Study", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--10", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943386", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The increasing importance of software measurement has led to design and development of new software measures. As the development of object-oriented software is rising, more and more metrics are being defined for object-oriented programming languages. But there is a little understanding of comparative application of many of these measures to different programming languages. As a consequence, it is very difficult for software managers and developers to select suitable measures and programming languages for object-oriented systems. In this paper, we investigate 23 object-oriented metrics proposed by various researchers. The metrics are applied to same set of 15 programs coded in C++ and Java in an attempt to make comparative study of these two prominent object-oriented programming languages. The work done here reveals that these object-oriented metrics can be applied successfully to both Java and C++. But, Java proves to be more object-oriented than C++ as per intuition. However, counting rules defined for computation of these metrics should be framed more carefully.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Vembuselvi:2011:LLL, author = "C. Vembuselvi and S. Selvakumar", title = "{LISISAP}: link level signature based secure anonymous protocol for prevention of traffic analysis attacks", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--10", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943392", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "For any communication (wired or wireless) such as control and data, the identity of source and destination is revealed in the header portion of the packet. Adversaries obtain sensitive information such as the identity, location of a critical node, route, data, etc., during communication by using traffic analysis attacks, viz., similarity attack, data integrity attack, packet counting attack, latency attack, and clogging attack. Anonymous communication prevents adversaries from doing traffic analysis against the routing information embedded in the routing messages and data packets. In order to thwart such traffic analysis, anonymous communication protocols were developed. In this paper, the existing anonymous communication protocols were analyzed in terms of techniques used, challenges, and applications. Anonymous Routing protocol with Multiple Routes (ARMR) is one of the existing protocols that achieves better route anonymity using fake routes and multiple paths. However, in ARMR, adversaries can modify the data with genuine user pseudonyms and send the modified data to the destination. In order to prevent data modification by adversary at link level, in this paper a Link level SIgnature based Secure Anonymous Protocol (LISISAP) protocol is proposed. In LISISAP, source node generates a signature for the data and sends the signature along with the encrypted data to the next node. Further, the next node verifies the signature. If signature matches, it generates its own signature and sends the encrypted data to its next node. Otherwise, it discards the packet. Verified data and signature are sent by each intermediate node until it reaches the destination. In LISISAP, even if adversaries modify the data, every node in the route including the destination node verifies the data and discards the data if there is no match in the signature. Similarity attacks can be prevented by making the data look different on each hop which could be achieved by encrypting the data with link key. Proposed protocol, LISISAP is implemented and tested in Smart and Secure Network. From the experimental results, it is evident that the data generated by source node is sent anonymously to the destination. Thus, in LISISAP protocol, communication is secure between nodes without revealing the node identities. Anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks were achieved.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Majumdar:2011:SSC, author = "Dipankar Majumdar and Ananya Kanjilal and Swapan Bhattacharya", title = "Separation of scattered concerns: a graph based approach for aspect mining", journal = j-SIGSOFT, volume = "36", number = "2", pages = "1--11", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943387", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Aspect Mining is a dynamic area of research in the field of Software Engineering. Aspects are concerns that are intermingled with other concerns thereby reducing the understandability, maintainability and scalability of the code. The concept of Separation of Concerns (SoC) is often achieved until the Design Phase, but gets difficult in the later phases of the software development life cycle (SDLC). During program maintenance the maintenance team is left with an aggregation of procedures and variables, both of which may be generically called user-defined tokens. This paper proposes a graph-based approach to address the problem of SoC during program maintenance. This is done by the removal of some source code elements (e.g., user-defined-tokens), which can be responsible for tangled concerns and complex code. These user-defined tokens can be treated separately under the Aspect Oriented Programming paradigm. The paper proposes a graphical-model, which represents a procedural program and defines a mathematical-model to identify and remove the tangled and interleaving code-fragments. Thereafter these code fragments are traced back to the requirements engineering level through a formal traceability model. This process yields the corresponding user requirements that are associated with these scattered code fragments. These identified user requirements are put forward as Aspects, to be handled or re-engineered under the Aspect Oriented Programming paradigm.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2011:PSEa, author = "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "36", number = "2", pages = "6--7", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943372", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2011:LVP, author = "Robert Schaefer", title = "On the limits of visual programming languages", journal = j-SIGSOFT, volume = "36", number = "2", pages = "7--8", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943373", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2011:SEEa, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "36", number = "2", pages = "8--9", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943374", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2011:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "36", number = "2", pages = "10--18", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943375", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2011:RPa, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "36", number = "2", pages = "19--27", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943376", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lutteri:2011:RIS, author = "Emiliano Lutteri and Barbara Russo and Giancarlo Succi", title = "Report of the 4th international symposium on empirical software engineering and measurement {ESEM} 2010", journal = j-SIGSOFT, volume = "36", number = "2", pages = "28--34", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943393", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This report summarizes the research works, in particular the full and short papers, presented at the 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010), held the 16th and 17th of September in Bolzano-Bozen, Italy. The program provided thirty full papers, twenty six short papers and three invited talks held by Bertrand Meyer, Steve Fraser and Carlo Ghezzi.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bateman:2011:HNT, author = "Anita Bateman", title = "Hands-on networking: from theory to practice by {Maria} Luisa Merani, Maurizio Casoni, and {Walter} Cerroni", journal = j-SIGSOFT, volume = "36", number = "2", pages = "38--38", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943377", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Russo:2011:BRM, author = "Aryldo G. {Russo, Jr.}", title = "Book Review: {{\booktitle{Modeling in Event-B --- system and software engineering}} by Jean-Raymond Abrial}", journal = j-SIGSOFT, volume = "36", number = "2", pages = "38--39", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943378", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Berry:2011:BRS, author = "Daniel M. Berry", title = "Book Review: {{\booktitle{Software requirements and design: the work of Michael Jackson}} by Bashar Nuseibeh and Pamela Zave}", journal = j-SIGSOFT, volume = "36", number = "2", pages = "39--40", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943379", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tracz:2011:BRG, author = "Will Tracz", title = "Book Review: {{\booktitle{Glitch: the hidden impact of faulty software}} by Jeff Papows}", journal = j-SIGSOFT, volume = "36", number = "2", pages = "41--41", month = mar, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1943371.1943380", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2011:CAS, author = "Alok Mishra and Deepti Mishra", title = "A curriculum for agile software development methodologies", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--2", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968608", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Agile software development methodologies are proliferating in software development organizations. Agile techniques can handle changing business requirements, schedule, cost, personnel turnover in an effective way in organizations. Here, major components of agile software development curriculum are discussed along with suggestions towards making it a successful course of software engineering curriculum.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chandra:2011:AST, author = "Shalini Chandra and Raees Ahmad Khan", title = "Availability state transition model", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--3", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968603", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Several security mechanisms such as digital signature, timestamp audits and trails, encryption, throttling, filtering, protect secrets etc. are available. These security mechanisms are not completely able to stop malicious attacks. For malicious hackers and attackers it is comparatively easy to exploit security loopholes at the user's end side. Behind such type of problem the main reason is bad software design and its implementation without proper risk analysis and mitigation. So, an idea to model availability states an Availability State Transition Model (ASTM) has been proposed in this article. In ASTM methodology, only design level details is required which can be easily retrieved from the software's design.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Baride:2011:CBS, author = "Srikanth Baride and Kamlesh Dutta", title = "A cloud based software testing paradigm for mobile applications", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--4", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968601", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "The testing of applications for mobile computing devices is cumbersome due to the bounded computational resources that these devices have and diversity in mobile environments. There are many different types of emulators that have been proposed and used nowadays for this purpose. But these emulators typically cannot emulate: actual network speed and availability, actual device specific content-rendering speed, memory limitation, cache size, CPU speed, and stack size. These emulators are designed for specific platforms, which lack testing of applications on heterogeneous mobile platforms. Cloud Computing has a potential to overcome these challenges by taking up contemporary progress in parallel and distributed systems, virtualization, and software services. Cloud computing empowers us to have adaptable and on-demand network access to a common group of configurable computing resources. In this article, we introduce a cloudbased model that provides solutions to aforesaid challenges. Our model sets up a mobile environment, actual device and platform on the cloud resources for a given system configuration. It also provides software testing services to execute numerous tests automatically according to a given application.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gandhi:2011:EGR, author = "Parul Gandhi and Pradeep Kumar Bhatia", title = "Estimation of generic reusability for object-oriented software an empirical approach", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--4", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968606", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Inheritance and templates are key concepts in object-oriented programming (OOP), and are essential for achieving reusability and extendibility. The aim of this paper is to explore traditional Halstead's metrics and use them to propose more software metrics related to generic method and attributes in an object-oriented software. These metrics measure quantitative generic construct with inheritance in an object-oriented code. Two metrics GRr (Generic Reusability Ratio) and ERr (Effort Ratio) are proposed in this paper. First metric GRr (Generic Reusability Ratio) measures impact of template in program volume and second metric ERr (Effort Ratio) measures impact of template in development effort. These metrics will be a tool for estimating and evaluating costs of program design and program tests as well as program complexity.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Choudhary:2011:TSF, author = "R. K. Choudhary and R. A. Khan", title = "Testing software fault tolerance techniques: future direction", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--5", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968604", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software fault tolerance can itself be dangerous error-prone because of the additional effort that must be included in the programming process. The paper is based upon research in the area of testing software fault tolerance techniques. A Framework to Test Fault Tolerance has been proposed and validated with industry data. During the validation process we identified some of the interesting findings that can be explored to carry out further research in this area.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Franky:2011:AMD, author = "Mar{\'\i}a Consuelo Franky", title = "Agile management and development of software projects based on collaborative environments", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--6", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968605", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We've heard of Agile methodologies for several years, but software projects have still delays and failures in planning and management. How then automate the processes of the development of software projects following agile methodologies? In this paper we try to answer this question by proposing an appropriate use of collaborative environments for software development that effectively translated into action the principles and practices of Agile methodologies. The appropriate use of these collaborative environments leads to a truly agile management, where the project manager achieves the vision and the continuous monitoring of the project, and the participants become adapted to an agile and productive discipline imposed by the environment, regardless if they are geographically dispersed. To ensure that appropriate use, this paper proposes a methodological guide to achieve an agile management of software projects by relying on a particular collaborative environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nuthakki:2011:UUG, author = "Murali K. Nuthakki and Mutlu Mete and Cihan Varol and Sang C. Suh", title = "{UXSOM}: {UML} generated {XML} to software metrics", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--6", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968609", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software developers are increasingly using Unified Modeling Language (UML) tools to automate source code generation. Therefore, nowadays calculating software metrics from UML diagrams to evaluate software quality is an important trend in the software industry. However, acquisition of software metrics from Extensible Markup Language (XML) export of UML tools has been predominantly tool dependent. Moreover, each new tool may have different specifications in XML. Despite the overall need for a process to automate XML unification, no current solution has yet been proposed. Creating a framework to automate this assessment would streamline development and increase efficiency in software industry. With the aim to overcome this deficiency, we developed a parser-based framework, named UXSOM, to calculate software metrics independently from the UML tool. Particularly UXSOM is able to generate software metrics from the XML-based outputs of the tools, ArgoUML, UMLET, MagicDraw, Sparx Systems, and ESS Model. We showed a very general case of UML class diagram, in which we extracted and compared software metrics from these five different tool.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bennett:2011:BDI, author = "Travis A. Bennett and Coskun Bayrak", title = "Bridging the data integration gap: from theory to implementation", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--8", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968602", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The integration of multiple autonomous and heterogeneous data sources (both across the web and via a company intranet) has received much attention throughout the years, particularly due to its many applications in the fields of Artificial Intelligence and medical research data sharing. Data integration systems embody this work and have come very far in the past twenty years. The problem of designing such systems is characterized by a number of issues that are interesting from a theoretical point of view: answering queries using logical views, query containment and completeness, automatic integration of existing data sources via schema mapping tools, etc. In this work we discuss these issues, compare and contrast various proposed solutions (federated database systems and data warehouses), and finally propose a novel extension of the MVC (model, view, controller) web-based framework that allows for the rapid development and implementation of data integration systems solutions suitable for use on the web.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Geetha:2011:FHP, author = "D. Evangelin Geetha and T. V. Suresh Kumar and K. Rajani Kanth", title = "Framework for hybrid performance prediction process model: use case performance engineering approach", journal = j-SIGSOFT, volume = "36", number = "3", pages = "1--15", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968607", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The dynamic behavior of distributed systems requires that their performance characteristics be determined rigorously, preferably in the early stages of software engineering process. Evaluation of the performance at the end of software development leads to increase in the cost of design change. To compare design alternatives or to identify system bottlenecks, quantitative system analysis must be carried out from the early stages of the software development life cycle. In this paper we describe a process model, Hybrid Performance Prediction Process Model that allows modeling and evaluating distributed systems with the explicit goal of assessing performance of the software system during feasibility study. The use case performance engineering approach proposed in this paper exploits use case model and provides flexibility to integrate the software performance prediction process with software engineering process. We use an e-parking application to demonstrate various elements in our framework. The performance metrics are obtained and analyzed by considering two software architectures. Sensitivity analysis on the behavior of resources is carried out. This analysis helps to determine the capacity of the execution environment to obtain the defined performance objectives.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2011:PSEb, author = "Larry Bernstein", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "36", number = "3", pages = "4--4", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968588", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wing:2011:HWT, author = "Michael Wing", title = "How we talk about basics", journal = j-SIGSOFT, volume = "36", number = "3", pages = "4--6", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968589", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2011:SEEb, author = "Mark A. Ardis and Peter B. Henderson", title = "Software Engineering Education {(SEEd)}", journal = j-SIGSOFT, volume = "36", number = "3", pages = "7--8", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968590", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2011:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "36", number = "3", pages = "9--18", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968591", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2011:RPb, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "36", number = "3", pages = "19--25", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968592", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fricker:2011:IRE, author = "Samuel Fricker and Norbert Seyff", title = "{1st International Requirements Engineering Efficiency Workshop: REEW 2011}", journal = j-SIGSOFT, volume = "36", number = "3", pages = "26--28", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968597", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Requirements engineering research has for a long time focused on specification quality, leading to recommendations of how to engineer ``perfect'' requirements specifications. Practitioners, however, do not have the time, resources, and interests for overdoing requirements engineering. Rather, many situations call for shortcuts that allow investing effort in those concerns that are critical for success, while reducing effort in other areas where risk is comparably smaller. The social context, smart collaboration processes, and novel ways of looking at the interface between stakeholders and the supplier can be a basis to increase the yield of requirements engineering, while reducing required effort. The International Requirements Engineering Efficiency Workshop (REEW 2011) aimed at initiating, facilitating, and nurturing the discussion on efficient approaches to engineer just good enough requirements. Requirements engineering was seen as a means that can be simplified, automated, or combined with other practices to achieve successful systems in an economically efficient manner. REEW 2011 provided a platform for the community of practitioners and research experts that are interested in productivity-enhancing approaches to requirements engineering. This report describes the workshop results including tactics, practice, and trade-offs for achieving requirements engineering efficiency.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2011:ISD, author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti Mishra", title = "Information systems in distributed environments: {ISDE} 2010", journal = j-SIGSOFT, volume = "36", number = "3", pages = "28--30", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968598", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a report from a one-day second international workshop on ``Information Systems in Distributed Environments'' (ISDE), which was organized in conjunction with the OnTheMove Federated Conferences \& Workshops (OTM 2010) at Hersonissos-Crete, Greece, on October 26, 2010. The main focus of this workshop was to provide a venue for the discussion of challenges related to the development, operation, and maintenance of distributed information systems, and their creation in the context of global development projects. Further dissemination of research results will lead to an improvement of distributed information system development and deployment across the glob.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Belani:2011:BRB, author = "Hrvoje Belani", title = "Book Review: {{\booktitle{Barcodes for mobile devices}} by Hiroko Kato, Keng T. Tan and Douglas Chai}", journal = j-SIGSOFT, volume = "36", number = "3", pages = "32--33", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968593", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hagar:2011:BRT, author = "Jon D. Hagar", title = "Book Review: {{\booktitle{Testing IT: an off-the-shelf software testing process}} by John Watkins and Simon Mills}", journal = j-SIGSOFT, volume = "36", number = "3", pages = "33--33", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968594", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Epps:2011:BRE, author = "Bob Epps", title = "Book Review: {{\booktitle{The elements of MATLAB style}} by Richard K. Johnson}", journal = j-SIGSOFT, volume = "36", number = "3", pages = "33--34", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968596", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/matlab.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Farrell-Vinary:2011:J, author = "P. Farrell-Vinary", title = "{JustInMind}", journal = j-SIGSOFT, volume = "36", number = "3", pages = "34--35", month = may, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1968587.1968595", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gupta:2011:VDC, author = "Varun Gupta", title = "Validation of dynamic coupling metrics for object-oriented software", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--3", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020985", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Dynamic coupling metrics for object-oriented software provide scope of coupling measurement up to the object level and take into account important and widely used object-oriented features such as inheritance, polymorphism and dynamic binding during measurement. The dynamic measures are computed at run-time, which take into consideration the actual interactions taking place among members of a class. In this paper, an attempt has been made to evaluate dynamic coupling metrics for object-oriented software using formal evaluation framework proposed by Briand et al. A practical and useful coupling measure must satisfy most of the properties given in this framework. The results of this study show that dynamic coupling metrics satisfy all properties and parameters required by the evaluation framework and thus dynamic coupling measures are robust and useful.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Khajaria:2011:MSR, author = "Krishna Khajaria and Manoj Kumar", title = "Modeling of security requirements for decision information systems", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--4", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020989", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Data Warehouse (DW) is a decision information system that facilitates decision makers for the fulfillment of strategic decisions (decision making needs) by extracting and integrating data from heterogeneous sources. Due to sensitivity of the information to be maintained in the DW, it becomes important to capture information security goal as a quality goal of the stakeholders for their organization from early stages of DW life cycle. Various requirements engineering techniques have been proposed in the DW literature without paying much attention on security aspect. Recently, AGDI (agent-goal-decision-information) model was proposed to capture decision making needs of the stakeholders for their organization to build a DW, but security issue was not addressed. In this paper, we propose an extension to the AGDI model to capture security aspect (i.e. security goals of the stakeholders) right from the beginning of requirements modeling in order to prevent illegitimate attempts of accessing DW. The application of the proposed extension in the AGDI model has been demonstrated through a CASE study of a University.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2011:QOR, author = "Manoj Kumar and Anjana Gosain and Yogesh Singh", title = "Quality-oriented requirements engineering for a data warehouse", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--4", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020990", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Due to the increasing complexity of Data Warehouses (DW), continuous attention must be paid for evaluation of their quality throughout their design and development. DW quality depends on the quality of all requirements, conceptual, logical and physical models used for DW design. Various authors have proposed metrics to assure the quality of conceptual, logical and physical models for DW. However, there is no significant work in the DW literature to assure the quality of a requirements model. A good quality requirements model may lead to a good quality DW. In this paper, we propose a quality-oriented requirements model for a DW. In the proposed model, the notion of perspective is introduced to capture the intention of the agents (stakeholders) associated with their goals. The agent may view a soft goal from two perspectives: decisional and quality perspective. In the former, the agent may refine a soft goal into the goal having well defined criteria for its achievement and termed as decisional goal, whereas in the later the agent may define the various constraint (timing constraint, budgetary constraint etc.) associated with the decisional goals. The agents suggest the decisions for achieving their decisional goals considering these constraints. Thus, the decisional goals and the constraints specified in the decisional and quality perspective respectively should be maintained as meta-data of the DW. In this way, the quality of DW requirements model will be enhanced, which may lead to enhance the quality of conceptual, logical and physical model of DW.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dave:2011:CRM, author = "Vachik S. Dave and Kamlesh Dutta", title = "Comparison of regression model, feed-forward neural network and radial basis neural network for software development effort estimation", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--5", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020982", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Accurate estimation of software development parameters such as effort, cost, and schedule is very important for effectively managing software development projects. Several software development effort estimation models have been developed in the last few decades. Determining, which is the best estimation model is difficult to decide for a software management team. In this paper we have compared Neural Network models and regression model for software development effort estimation. The comparison reveals that the Neural Network (NN) is better for effort prediction compared to regression analysis model. Further, we have compared two Neural Network models --- Feed-Forward Neural Network (FFNN) and Radial Basis Neural Network (RBNN). The evaluation of the models is based on Mean Magnitude Relative Error (MMRE), Relative Standard Deviation (RSD) and Root Mean Squared Error (RMSE). The experimental results show that the RBNN model exhibits better prediction ability than FFNN.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sangwan:2011:RBF, author = "Om Prakash Sangwan and Pradeep Kumar Bhatia and Yogesh Singh", title = "Radial basis function neural network based approach to test oracle", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--5", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020992", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software testing is an important discipline, and consumes significant amount of effort. A proper strategy is required to design and generate test cases systematically and effectively. In this paper automated software test case generation with Radial Basis Function Neural Network (RBFNN) has been proposed and empirically validated with the help of a case study and compared with other techniques of soft computing. Experimental results show that RBFNN is one of the best technique for automated test case generation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Yilmaz:2011:SPE, author = "Murat Yilmaz and Rory V. O'Connor", title = "A software process engineering approach to improving software team productivity using socioeconomic mechanism design", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--5", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020998", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software development is a knowledge and human intensive activity. At the social level, the interactions of these participants and their ability to cooperate are important for improving the productivity of teams and organizations. It is therefore not surprising to discover that recent contributions in software development have repeatedly asserted the critical role of people in software development efforts. However, existing approaches to software development fail to fully exploit the importance of social and intellectual capital that has been highlighted in the fields of economics and sociology. We propose that leveraging the existing approaches from economics and sociology and applying to software development can assist software organizations in maximizing their return on investment. For example, by applying one such approach, mechanism design, we can improve and model the organization's total productivity based on social aspects affecting productivity (i.e. social productivity). This paper will discuss the vision and progress for applying the concept of mechanism design for optimizing software development teams.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chanda:2011:SGA, author = "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal and Swapan Bhattacharya", title = "{SCAG}: a graphical approach to measure the complexity of the {SOA} application", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--6", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020981", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Service Oriented Architecture (SOA) provides a foundation to achieve software reuse that enables business professionals, who are not necessarily programmers, to exploit the intrinsic properties of software. A component-based programming model is the key factor in the rapid adoption of SOA. SOA exploits the properties of Component Based Software Engineering (CBSE) in the form of services. SOA components help to provide the business users with some flexibility to play around with the components and rewire them to create new business solutions. The complexity of SOA application plays an important role in project planning and determination of timeline and cost estimation and allocation of resources. This paper proposes a metric-based approach for the determination of relative complexity and coupling of Component based SOA application. We have proposed a Service Component Architecture Graph (SCAG) which can be used for graphical representation of the different service module, the service components in the service module and interaction among them. This metrics may be used by developers to assess the complexity of SOA application and if required redesign to create highly cohesive components with minimal coupling. It will also promote a culture of asset (reusable components) based development by considering the factor like usability, complexity, coupling etc. A case study is presented and graph based analysis is done for deriving the complexity, along with the other aspects of the architecture.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Malhotra:2011:SFP, author = "Ruchika Malhotra and Ankita Jain", title = "Software fault prediction for object oriented systems: a literature review", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--6", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020991", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "There always has been a demand to produce efficient and high quality software. There are various object oriented metrics that measure various properties of the software like coupling, cohesion, inheritance etc. which affect the software to a large extent. These metrics can be used in predicting important quality attributes such as fault proneness, maintainability, effort, productivity and reliability. Early prediction of fault proneness will help us to focus on testing resources and use them only on the classes which are predicted to be fault-prone. Thus, this will help in early phases of software development to give a measurement of quality assessment. This paper provides the review of the previous studies which are related to software metrics and the fault proneness. In other words, it reviews several journals and conference papers on software fault prediction. There is large number of software metrics proposed in the literature. Each study uses a different subset of these metrics and performs the analysis using different datasets. Also, the researchers have used different approaches such as Support vector machines, naive Bayes network, random forest, artificial neural network, decision tree, logistic regression etc. Thus, this study focuses on the metrics used, dataset used and the evaluation or analysis method used by various authors. This review will be beneficial for the future studies as various researchers and practitioners can use it for comparative analysis.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dubey:2011:AMM, author = "Sanjay Kumar Dubey and Ajay Rana", title = "Assessment of maintainability metrics for object-oriented software system", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--7", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020983", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Many organizations assess the maintainability of software systems before they are deployed. Object-oriented design has been shown to be a useful technique to develop and deliver quality software. Objectoriented metrics can be used to assess the maintainability of a software system. Various software metrics and models have been developed and described. This paper provides a review of this literature and the related state-of-the-art. It also proposes a maintainability model that is based on the analysis of the relationship between object-oriented metrics and maintainability.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Seth:2011:DSB, author = "Ashish Seth and Himanshu Agarwal and Ashim Raj Singla", title = "Designing a {SOA} based model", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--7", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020993", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Service Oriented Architecture (SOA) is an architectural approach that can be shared and reused. Shortage of studies, research thrust and limited expertise in the area of SOA keeps the application of SOA in Small and Medium Enterprises (SMEs) limited. Also in a country like India, whose major economy is dependent on the small and medium enterprises, the Indian Government is promoting the growth in this sector. Successful examples of individual automated enterprise services and traditional ERP implementation systems exist but there is a lack of holistic, integrated technical solutions that can be applied in small and medium size enterprises. In this paper we propose a five layered SOA based architecture that can integrate all activities comprising Supply Chain Management (SCM), Customer Relationship Management (CRM), Technical and Enterprise Applications Tools according to SMEs requirement. We also compared our model with traditional ERP systems and other similar approaches and found the proposed model is efficient, cost effective and competent with similar existing solutions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{V:2011:BBI, author = "Sharath Chandra V. and S. Selvakumar", title = "{BIXSAN}: browser independent {XSS} sanitizer for prevention of {XSS} attacks", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--7", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020996", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Proliferation of social networking sites, and web applications which deliver dynamic content to the clients have increased the user created HTML content in the World Wide Web. This user-created HTML content can be a notorious vector for Cross-Site Scripting,(XSS) attacks. XSS attacks have the ability to target websites, steal confidential information of the users, and hijack their accounts, etc. XSS attacks are launched to exploit the vulnerabilities of the poorly developed application code and data processing systems. In particular, improper validation of user created content and un-sanitized custom error messages introduce vulnerability for XSS attacks. It is a challenging task for any security mechanism to filter out only the harmful HTML content and retain safe content with high fidelity and robustness. This has motivated us to develop a mechanism that filters out the harmful HTML content, and allows safe HTML. The existing solutions to XSS attack include use of regular expressions to detect the presence of dynamic content and client side filtering mechanisms such as Noscript and Noxes tool. The drawbacks of these solutions are low fidelity and disallowing of benign HTML. In order to overcome these drawbacks BIXSAN, a Browser Independent XSS SANitizer for prevention of XSS attacks is proposed in this paper. BIXSAN includes the proposition of three pronged strategy. These strategies are as follows: Firstly the use of complete HTML parser is proposed rather than approximating the behavior of parser. The advantage of using complete HTML parser is that it offers high fidelity. Secondly the use of modified browser, viz., JavaScript Tester is proposed to detect the presence of JavaScript for filtering it out. Thirdly, identification of static tags is proposed for allowing the benign HTML. Further, BIXSAN includes the proposition of a parse tree generator at client side browser to reduce the anomalous behavior of browsers. BIXSAN was experimented in various browsers such as Opera, Netscape, Internet Explorer (IE), and Firefox and found to work for all the browsers. From the experiments conducted it has been found that the proposed BIXSAN prevents the injection of XSS attack code successfully. Further, it has been verified that BIXSAN reduces the anomalous behavior of browse.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Yadav:2011:FSM, author = "Seema Yadav and Khaleel Ahamd and Jayant Shekhar", title = "Finite state machine based approach to prevent format string attacks", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--7", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020997", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In the computer field there are many types of input validation attacks that occur, in which ``Format String Overflow Attacks'' is one of the most important. Format String Overflow Attacks remain the leading reason of software vulnerability or exploits. Format string bugs result in error such as wrong result type, memory access error and crash and security breach. In this paper, we proposed a Finite state machine which prevents Format String Overflow Attacks in a secure way with the help of several states of FSM. Proper checking against format string overflow bugs can avoid consequences due to exploits of format string overflow bugs. The result of our proposed finite state machine is improving the security problem and provides protection to memory access from any unauthorized user.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2011:ARM, author = "Ajay Jain", title = "Approach for reducing menu access time by enabling bidirectional cursor movement within nested menu(s)", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--8", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020986", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "There is a time value associated with the action an application user must perform to traverse menu items to reach a specific option. The time value increases when menu options are arranged within multiple nested menus. This work proposes a new menu layout that helps reduce the time required to traverse menus, especially those with multiple levels of nesting. This work also includes the results of a statistical experiment that measures the time taken to traverse using the suggested approach. The results are compared with the time taken to traverse using the traditional menu layout. Experimental data (under pre-defined assumptions) seems to significantly favor the proposed approach. The work presents data samples, assumptions, and limitations of the proposed approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Johari:2011:ESE, author = "Kalpana Johari and Arvinder Kaur", title = "Effect of software evolution on software metrics: an open source case study", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--8", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020987", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software needs to evolve in order to be used for a longer period. The changes corresponding to corrective, preventive, adaptive and perfective maintenance leads to software evolution. In this paper we are presenting the results of study conducted on 13 versions of JHot Draw and 16 versions of Rhino released over the period of 10 years. We measured Object Oriented Metrics and studied the changes in the measured values over different releases of two medium sized software developed using Java. We also investigated the applicability of Lehman's Law of Software Evolution on Object Oriented Software Systems using different measures. We found that Lehman's laws related with increasing complexity and continuous growth are supported by the data and computed metrics measure.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kaur:2011:MVC, author = "Parminder Kaur and Hardeep Singh", title = "A model for versioning control mechanism in component-based systems", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--8", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020988", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Component-based systems provide a better reuse of software components, greater flexibility, scalability and higher quality of services. Component development generally takes place due to the process of creating and propagating changes in requirement definitions, system designs, program source code, documentation and test data. As a result, multiple versions of constituent components come into existence. Thus, there is a need to keep the track of multiple versions of same component. To handle multiple versions of constituent components, a version-control tool named as Visual Version Control Tool (VVCT), for the management of life-cycle evolution of component, is developed. The developed tool satisfies all the conditions required for version control in component-based systems. The parameters required for uniform version management as well as component frameworks are also satisfied by the developed tool. To monitor and control the versioning system, an example model is tested along with the set of proposed metrics. This paper also incorporates issues like component configuration, component evolution, component framework, component version tree and version-control metrics.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2011:EEO, author = "Satwinder Singh and K. S. Kahlon", title = "Effectiveness of encapsulation and object-oriented metrics to refactor code and identify error prone classes using bad smells", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--10", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020994", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "To assist maintenance and evolution teams, work needs to be done at the onset of software development. One such facilitation is refactoring the code, making it easier to read, understand and maintain. Refactoring is done by identifying bad smell areas in the code. In this paper, based on empirical analysis, we develop a metrics model to identify smelly classes. The role of two new metrics (encapsulation and information hiding) is also investigated for identifying smelly and faulty classes in software code. This paper first presents a binary statistical analysis of thev relationship between metrics and bad smells, the results of which show a significant relationship. Then, the metrics model (with significant metrics shortlisted from the binary analysis) for bad smell categorization (divided into five categories) is developed. To verify our model, we examine the open source Firefox system, which has a strong industrial usage. The results show that proposed metrics model for bad smell can predict faulty classes with high accuracy, but in the case of the categorized model not all categories of bad smells can adequately identified the faulty and smelly classes. Due to certain limitations of our study more experiments are required to generalize the results of bad smell and faulty class identification in software code.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gandotra:2011:LSA, author = "Vandana Gandotra and Archana Archana Singhal and Punam Bedi", title = "Layered security architecture for threat management using multi-agent system", journal = j-SIGSOFT, volume = "36", number = "5", pages = "1--11", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020984", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The increasing complexity of software systems along with expanding connectivity has necessitated the evolution of an integrated security framework adopting innovative techniques for secure software systems. This paper proposes a layered security architecture for threat management using a multi-agent system to meet the above objective. Layer- 1 of this framework is designed for elicitation of realistic and flawless security requirements. Layer-2 uses a Multi-Agent system planning for avoidance of threats optimally. In this mechanism autonomous agents interact and coordinate with each other to achieve the common goal of software security. An adaptive defense mechanism using Meta-Agents in multi-agent system in conjunction with fuzzy logic to counter the adaptive and compound threats is the responsibility of Layer-3. Guidelines proposed in this paper have augmented this security architecture as a two-fold defensive strategy to ensure that a hacker is not able to tamper data even if they penetrate the periphery defenses. These proactive steps can be implemented during the design and development phases of the software life cycle in an incremental way as per the budget and security requirements of a software project. A case study on internet banking is included in the paper to describe the proposed security framework.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2011:ESEa, author = "Larry Bernstein", title = "Eternal software engineering questions", journal = j-SIGSOFT, volume = "36", number = "5", pages = "7--7", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021008", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wing:2011:ESL, author = "Michael Wing", title = "Everything in {SE} is a lie", journal = j-SIGSOFT, volume = "36", number = "5", pages = "8--9", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021009", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2011:SNSc, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "10--19", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021010", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2011:RPc, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "36", number = "5", pages = "20--23", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021011", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Treude:2011:WRW, author = "Christoph Treude and Margaret-Anne Storey and Arie van Deursen and Andrew Begel and Sue Black", title = "Workshop report from {Web2SE 2011: 2nd International Workshop on Web 2.0 for Software Engineering}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "24--29", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020977", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Web 2.0 technologies, such as wikis, blogs, tags and feeds, have been adopted and adapted by software engineers. With the annual Web2SE workshop, we provide a venue for research on Web 2.0 for software engineering by highlighting state-of-the-art work, identifying current research areas, discussing implications of Web 2.0 on software engineering, and outlining the risks and challenges for researchers. This report highlights the paper and tool presentations, and the discussions among participants at Web2SE 2011 in Honolulu, as well as future directions of the Web2SE workshop community.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Galster:2011:VSA, author = "Matthias Galster and Paris Avgeriou and Danny Weyns and Tomi M{\"a}nnist{\"o}", title = "Variability in software architecture: current practice and challenges", journal = j-SIGSOFT, volume = "36", number = "5", pages = "30--32", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020978", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Variability in software-intensive systems is usually understood as the ability of a software artifact to be changed in order to fit different contexts, environments, or purposes. Software architecture on the other hand determines the structure of a software system, and is described in an architecture description. This description includes the major stakeholders of a software system and their concerns. Variability is reflected in and facilitated through the software architecture. The First International Workshop on Variability in Software Architecture (VARSA) was held jointly with WICSA 2011 in Boulder, Colorado. The goal of the workshop was to explore and advance the state-of-the art in variability in software architecture. It featured four research paper presentations, two invited talks, and three working groups that discussed specific topics. This report summarizes the themes of the workshop, presents the results of the working group discussions, and suggests topics for further research.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ozkaya:2011:MTD, author = "Ipek Ozkaya and Philippe Kruchten and Robert L. Nord and Nanette Brown", title = "Managing technical debt in software development: report on the {2nd International Workshop on Managing Technical Debt}, held at {ICSE 2011}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "33--35", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2020979", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The technical debt metaphor is gaining significant traction in the software development community as a way to understand and communicate about issues of intrinsic quality, value, and cost. This is a report on a second workshop on managing technical debt, which took place as part of the 33rd International Conference on Software Engineering (ICSE 2011). The goal of this second workshop was to discuss the management of technical debt: to assess current practice in industry and to further refine a research agenda for software engineering in this area.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lilja:2011:PAI, author = "David J. Lilja and Raffaela Mirandola and Kai Sachs", title = "Paper Abstracts of the {2nd International Conferernce on Performance Engineering (ICPE 2011)}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "36--53", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2069288", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Foreword This issue of SEN contains the abstracts of the papers, which were presented on the Second Joint WOSP/SIPEW International Conference (ICPE 2011), held in Karlsruhe, Germany, March 14-16, 2011, now established as a regular event known as ACM/SPEC International Conference on Performance Engineering (ICPE). The primary goal of this conference series is to bridge the gap between theory and practice in the field of computer systems performance engineering by providing a forum for sharing ideas and experiences between industry and academia. This years conference brought together researchers and industry practitioners to share and present their experiences, discuss challenges, and report on both state-of-the-art research and work-in-progress on performance engineering of software and systems, including performance measurement, modeling, benchmark design, and run-time performance management. The ICPE gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of computer systems performance engineering. The call for papers attracted 63 research and 24 industrial paper submissions from Europe, Asia, Africa, and North America. The program committees accepted 19 full research papers and 7 short papers together with 13 industrial papers. These papers cover a variety of topics, including performance modeling and techniques and measurement and benchmarking strategies for adaptive systems, power management, virtualized environments, and large-scale and distributed systems. We are confident that you will find the abstracts stimulating and that they will provide you with many new ideas and insights. The full paper are available at the ACM Digital Library. David J. Lilja: Program Co-Chair, Research Track Raffaela Mirandola: Program Co-Chair, Research Track Kai Sachs: Program Co-Chair, Industrial Track", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2011:BRU, author = "William {Del Ra}", title = "Book Review: {{\booktitle{Usability testing essentials: ready, set\ldots{}test!}} by Carol M. Barnum}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "49--50", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021001", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Glaves:2011:BRA, author = "Leslie Glaves", title = "Book Review: {{\booktitle{API design for C++}} by Martin Reddy}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "50--50", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021002", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mitrache:2011:BRI, author = "Cristina Mitrache", title = "Book Review: {{\booktitle{IT manager's handbook, the business edition}} by Bill Holtsnider and Brian D. Jaffe}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "51--51", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021003", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ngo:2011:BRD, author = "Terry Ngo", title = "Book Review: {{\booktitle{Data mining: practical machine learning tools and technique}}, third edition by Ian H. Witten, Eibe Frank, Mark A. Hell}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "51--52", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021004", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{OSullivan:2011:DMM, author = "Michael O'Sullivan", title = "Designing with the mind in mind: simple guide to understanding user interface design rules by Jeff {Johnson}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "52--52", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021005", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Vu:2011:BRA, author = "Jodat Vu", title = "Book Review: {{\booktitle{The art of multiprocessor programming}} by Maurice Herlihy and Nir Shavit}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "52--53", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021006", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{White:2011:BRR, author = "Randall L. White", title = "Book Review: {{\booktitle{Reconfigurable embedded control systems: applications for flexibility and agility}} by Mohamed Khalgui and Han-Michale Hanisch}", journal = j-SIGSOFT, volume = "36", number = "5", pages = "53--53", month = sep, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2020976.2021007", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Misra:2011:SAM, author = "Sanjay Misra and Martha Omorodion", title = "Survey on agile metrics and their inter-relationship with other traditional development metrics", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--3", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047430", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In our civilized world today, measurement is very important in every aspect of our lives as a means of quantifying our success or progress in whatever activity we involve ourselves in. Consequently, this paper outlines the various metrics that are utilized in the Agile development process and compares them with the ones used in time past to measure success and progress.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tee:2011:ISS, author = "Sim-Hui Tee", title = "Identifying structural similarity of methods using isomorphic graphs", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--3", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047432", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "It is a recommended practice to use overloaded methods in a class for a group of similar operations and functions. However, it is possible that software developers may violate the rule of overloaded methods. In addition, non-overloaded method is used incorrectly sometimes in composing similar functions. This paper presents a technique, using isomorphic graphs, to identify structural similarity between class methods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2011:ILG, author = "Alok Mishra and Deepti Mishra", title = "Industry linked graduate software engineering curriculum", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--4", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047429", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In recent years, Software Engineering (SE) has emerged as an independent and mature discipline. In this context, various studies are being done to provide guidelines for undergraduate about graduate software engineering curriculum design. This article presents need of software industry related courses and discusses significance of industry linked software engineering education to meet educational objectives of all stakeholders. Software industry oriented curriculum for graduate level are discussed. Software industry aligned courses will facilitate to increase their employment prospects in industrial and other sectors.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bandyopadhyay:2011:TBM, author = "Anup Kumar Bandyopadhyay", title = "{TLRO} based modeling of alternative commands and its application to generalized distributed resource allocation problem", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--5", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047421", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "There are systems where alternative constructs need to be used for its description. In weakest precondition calculus disjunction of the post conditions of constituent guarded commands is used as the post condition of an alternative construct. Such representation is not suitable because it does not express a one to one correspondence between a guard and the relevant component of the characterized post condition. In this paper Temporal Logic Related to Observation (TLRO) is used to solve this problem. Each guarded command is expressed as a TLRO rule by using its strongest post condition and the corresponding precondition. List of these representations for all the constituent guarded commands is the required model. Technique is illustrated by considering a common sense scenario. The scheme is then applied to a generalized resource allocation algorithm which is a weaker version of Drinking Philosophers problem.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumari:2011:CCM, author = "Usha Kumari and Sucheta Bhasin", title = "A composite complexity measure for component-based systems", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--5", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047426", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The increasing importance of software measurement has led to design and development of new software measures. Controlling and minimizing software complexity is the most important objective of each software development paradigm because it affects all other software quality attributes like reusability, reliability, testability, maintainability etc. For this purpose, a number of software complexity measures have been reported to quantify different aspects of complexity. Component-based software development (CBSD) is an evolving paradigm where emphasis is laid on reuse of existing components and effective designing of new components. As the development of component-based software is rising, more and more complexity metrics are being developed for the same. In this paper, we have attempted to design a composite complexity measure to quantify important aspects of complexity of a component-based system. The proposed measure takes into account two major complexities of a component-based system: one due to individual component and the other due to its interaction with other components. Individual component complexity may arise due to size of a component, type and nesting level of control structures present in code component. Component's interaction complexity may be due to its interface with other components. Graph theoretic notions and concept of weights have been used to illustrate interaction among software components and to compute complexity. The proposed measure has been applied to four cases chosen for present study and yields quiet encouraging results which may further help in controlling the complexity of component-based systems so as to minimize both integration and maintenance efforts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Miranda:2011:TBP, author = "Eduardo Miranda", title = "Time boxing planning: buffered {Moscow} rules", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--5", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047428", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Time boxing is a management technique which prioritizes schedule over deliverables but time boxes which are merely a self, or an outside, imposed target without agreed partial outcomes and justified certainty are at best, an expression of good will on the part of the team. This essay proposes the use of a modified set of Moscow rules which accomplish the objectives of prioritizing deliverables and providing a degree of assurance as a function of the uncertainty of the underlying estimates.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Suri:2011:ATC, author = "Bharti Suri and Shweta Singhal", title = "Analyzing test case selection and prioritization using {ACO}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--5", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047431", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Regression testing is primarily a maintenance activity that is performed frequently to ensure the validity of the modified software. In such cases, due to time and cost constraints, the entire test suite cannot be run. Thus, it becomes essential to select or prioritize the tests in order to cover maximum faults in minimum time. Recently, Ant Colony Optimization (ACO), which is a new way to solve time constraint prioritization problem, has been utilized. This paper presents the analysis of the regression test prioritization technique to reorder test suites in time constraint environment along with the sample runs on various programs. Our analysis concluded that the ACO finds better orderings at higher values of the time constraint (TC). The correctness of the technique has also been recorded to be near optimal at an average.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Yu:2011:CIE, author = "Liguo Yu", title = "Coevolution of information ecosystems: a study of the statistical relations among the growth rates of hardware, system software, and application software", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--5", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047435", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "With the increasing use of information technology, information ecosystems have emerged. Information ecosystems not only include software products, but also include hardware products. For example, application software depends on system software, and both application software and system software depend on hardware devices. Together, they play important roles in an information ecosystem. This paper analyzes the coevolution of information ecosystem, where three representatives of computer hardware, system software, and application software products are studied. Specifically, we analyze (1) the growth rate of Intel processors, Linux operating systems, and Apache web servers; and (2) the statistical relations among the evolution of Intel processors, Linux operating systems, and Apache web servers. Our study finds that a system software product grows slower than its supporting hardware products and a application software product grows slower than its supporting system software and hardware products.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2011:MSR, author = "Ravinder Kumar and Kiran Khatter and Arvind Kalia", title = "Measuring software reliability: a fuzzy model", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--6", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047425", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software reliability is an essential part of software engineering to ensure the quality of a system. There are various techniques, which can be used in building models for predicting quality attributes. This paper presents a Fuzzy model for software reliability prediction. We have proposed three parameters Availability, Failure Probability and Recoverability as an integrated measure of software reliability. Fuzzy Model provides a way to arrive at a discrete Reliability Non-functional requirement (NFR) in contrast to imprecise, vague and ambiguous. This model will help us to evolve intermediate stages between reliable state and unreliable state of a system. Results obtained by proposed model show that this is suitable for predicting software reliability of the software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tyagi:2011:RCB, author = "Kirti Tyagi and Arun Sharma", title = "Reliability of component based systems: a critical survey", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--6", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047434", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software reliability is defined as the probability of the failure free operation of a software system for a specified period of time in a specified environment. Day by day software applications are growing more complex and with more emphasis on reuse. Component Based Software (CBS) applications have emerged. The focus of this paper is to provide an overview for the state of the art of Component Based Systems reliability estimation. In this paper, we discussed various approaches in terms of their scope, model, methods, technique and validation scheme. This comparison provides insight into determining the direction of future CBS reliability research.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Langsworth:2011:USA, author = "Anthony Langsworth", title = "Using static analysis tools to detect and correct non-compliant cryptography", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--7", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047427", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Security is an increasing concern for application developers, whether they are targeting internal customers, organizations or the general public. Particularly for the US public sector with requirements like FIPS 140, developers need to identify and remove superseded cryptography in both legacy applications and new development. This paper outlines a mechanism using static analysis tools to find outdated or improper cryptography and suggest corrections or correct code. This prevents the need for manual inspection and correction by developers familiar with cryptography and is more accurate than text searches.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Khatri:2011:MBC, author = "Sujata Khatri and R. S. Chhillar and V. B. Singh", title = "Measuring bug complexity in object oriented software system", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--8", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047424", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/python.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Bugs are inevitable in any software development life cycle. Most bugs are detected and removed in the testing phase. In software, we can classify bugs into two categories: (1) bugs of different severity, from a user's perspective,(how much damage the bug does) and (2) bugs of different complexity(how much is the debugging time lag between detection and correction). Prior knowledge of bug distribution of different complexity can help project managers in allocating testing resources and tools. Various researchers have proposed models for determining the proportion of bugs present in software of different complexity but none of these models have been applied to object oriented software. In this paper, we have proposed a model that will determine the proportion of different bug complexity. The paper also suggests the suitability of the proposed model for a particular data set. We have taken two data sets based on object oriented methodology namely SQL for Python and SQuirreL SQL Client software developed under open source environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Thakur:2011:DRB, author = "Garima Thakur and Anjana Gosain", title = "{DWEVOLVE}: a requirement based framework for data warehouse evolution", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--8", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047433", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Data warehouse integrate information from numerous data sources under a unified schema and format to provide effective results from multidimensional data analysis in order to facilitate reporting and trend analysis. These information sources are dynamic in nature and keep on changing owing to the autonomous nature of transactions being carried out in the organization along with the complexity involved in gathering requirements from the users. Requirements elicitation and collection is difficult to perform because user needs keep on changing. As a consequence, the data warehouse must evolve so that it improves the data quality by easily incorporating the changes in requirements as well as source schema. In this paper we present a theoretical framework called DWEVOLVE to support data warehouse evolution. The proposed framework enhances the functionality of previously designed framework by taking into account the requirements specified by the users. Provisions have also been made to define and generate customized reports according to the user needs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bhatia:2011:FCM, author = "Nitin Bhatia and Namarta Kapoor", title = "Fuzzy cognitive map based approach for software quality risk analysis", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--9", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047422", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper presents a software risk prediction tool for risk analysis during the development of a software product. The term ``Risk'' refers to a problem that can threaten the success of the software project but has not happened yet. Risks are uncertain. The main objective of each organization is to provide very high quality software to their customers. The term ``Quality'' is a value to the person. But there is a long list of software risks that can have adverse impact on the quality of the software. It is necessary to address all the risks; otherwise, they may lead to undesireable results. Fuzzy Cognitive Maps (FCMs) describe different concepts with different aspects of the behaviour of complex systems. A software tool based upon FCM has been developed for assessing software risks. This paper describes the reasoning behind the focus on risk management during the software development process and its importance in delivering high quality software by assessing software risks during the development process using fuzzy cognitive maps.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chhillar:2011:EAO, author = "Rajender Singh Chhillar and Nisha", title = "Empirical analysis of object-oriented design metrics for predicting high, medium and low severity faults using {Mallows Cp}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "1--9", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047423", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "An object-oriented approach has become a commonly-used method in software-related activities. Many design metrics for object-oriented systems have been proposed and also employed for predicting and managing the quality of processes and products. To enhance the practical utility of object-oriented metrics in software industry, various researchers have tried to find relations between these metrics and fault proneness, but very few focus on relating them with the number-of-faults in different levels as per their severity rating. In this study, empirical validation is carried out on object-oriented design metrics (i.e. Chidamber and Kemerer CK-metrics suite and source lines of codes) for predicting number-of-faults in different severity levels. Different statistical methods are used to analyze the data, including correlation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2011:ESEb, author = "Larry Bernstein", title = "Eternal software engineering cross feature\slash architecture design simplifications", journal = j-SIGSOFT, volume = "36", number = "6", pages = "6--6", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047415", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2011:SPH, author = "Robert Schaefer", title = "Software perspectives on history, culture and efficiency", journal = j-SIGSOFT, volume = "36", number = "6", pages = "6--7", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047416", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2011:SEEc, author = "Mark A. Ardis and Peter B. Henderson", title = "Software Engineering Education {(SEEd)}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "7--8", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047417", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2011:SNSd, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "9--18", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047418", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2011:RPd, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "36", number = "6", pages = "19--23", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047419", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Acton:2011:BRL, author = "Dorothy Acton", title = "Book Review: {{\booktitle{Leadership, teamwork and trust: building a competitive software capability}} by Watts S. Humphrey and James W. Over}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "28--28", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047436", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ausden:2011:BRB, author = "Howard Ausden", title = "Book Review: {{\booktitle{Building parallel, embedded, and real-time applications with Ada}} by John W. McCormick, Frank Singhoff and Jerome Hugues}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "28--29", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047437", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2011:MBD, author = "William {Del Ra III}", title = "Book Review: {{\booktitle{Model-based development: applications}}, by H. S. Lahman}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "29--29", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047438", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2011:BRB, author = "William {Del Ra III}", title = "Book Review: {{\booktitle{Brave NUI world: designing natural user interfaces for touch and gesture}} by Daniel Wigdor and Dennis Wixon}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "29--30", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047439", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saur:2011:NSM, author = "Joe Saur", title = "Network science for military coalition operations: information exchange and interaction by Dinesh {Verma}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "30--30", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047440", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2011:BRI, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Integrating and extending BIRT}} 3rd edition by J. Weathersby, T. Bondurand, and I. Chatalbasheva}", journal = j-SIGSOFT, volume = "36", number = "6", pages = "31--31", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047441", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tracz:2011:LFE, author = "Will Tracz", title = "{Lord} of the files: essays on the social aspects of software engineering by Russel Ovans", journal = j-SIGSOFT, volume = "36", number = "6", pages = "31--31", month = nov, year = "2011", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2047414.2047442", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:07 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Johari:2012:VOO, author = "Kalpana Johari and Arvinder Kaur", title = "Validation of object oriented metrics using open source software system: an empirical study", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--4", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088893", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In today's environment the relevance of Free Open Source Software Systems is understood and appreciated both in academia and research. The debate about the pros and cons of the open source vis-{\`a}-vis proprietary software has been raging from ages ever since Richard Stallman founded the Free Software Foundation in 1985. With the changing trends in the domain of Object Oriented Systems there is a need to measure the fault predictability of software metrics on open source software systems. In this paper we present the results of empirical study which was conducted using open source software, JHotDraw 7.5.1. We computed the object oriented metrics, proposed by Chidamber and Kemmerer, and performed bug-class mapping for the software under study. We also studied the relationship between the revisions made to open source software and its software metrics measure.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Santos:2012:ICC, author = "Bruno F. L. Santos and Hendrik T. Macedo", title = "Improving {CUDA{\TM} C\slash C++} encoding readability to foster parallel application development", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--5", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088897", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/pvm.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Graphical Processing Units (GPUs) have recently been used to enable parallel application development. The most prominent initiative has been provided by NVIDIA{\TM} with the so-called CUDA{\TM} architecture, designed to GeForce{\TM} graphic cards. However, even with CUDA C-like programming language, parallel codification remains somewhat awkward if compared to sequential codification. The programmer still has to deal with low-level hardware details such as generation and synchronization of threads and GPU tracks and sectors. In this paper, we propose a programmer-friendly interface for CUDA-C programming, in such a way that most hardware details are hidden from the programmer. We show how code readability is improved without undermining parallel execution performance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Varona:2012:ESE, author = "Daniel Varona and Luiz Fernando Capretz and Yadenis Pi{\~n}ero and Arif Raza", title = "Evolution of software engineers' personality profile", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--5", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088901", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Myers-Briggs Type Indicator (MBTI) has been applied to several studies that explore various dimensions of human factors in software engineering. Accordingly, this work reviews the results of these studies to explore existing trends. In order to attain a greater understanding of human resources in the software industry, we have reviewed sixteen studies that had been performed between 1985 and 2011. This review concludes that the changes in the complexity of software processes and products have created new roles and demanded new skills for software engineers.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Krishnamurthy:2012:PBA, author = "Vallidevi Krishnamurthy and Chitra Babu", title = "Pattern based adaptation for service oriented applications", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--6", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088894", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Service Oriented Architecture(SOA) facilitates developing applications that are inherently dynamic in nature since the service binding happens at runtime by matching the functional as well as Quality of Service(QoS) requirements of the user. Further, the running application can be dynamically reconfigured by monitoring the application for possible violations in the agreed QoS requirements. This paper advocates the use of various patterns to facilitate such dynamic reconfiguration in the various layers of the SOA Reference Architecture. Towards this objective, Family of Adapters pattern has been used in the service component layer to achieve dynamic switching between different versions of the same service without human intervention. In addition, an SOA design pattern has been employed in the business process layer to enhance the efficiency of the application. This pattern based approach has been tested by applying it to a sample SOA based e-Shopping application case study.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2012:AST, author = "Pradeep Kumar and Yogesh Singh", title = "Assessment of software testing time using soft computing techniques", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--6", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088895", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Application of a soft computing approach in place of traditional statistical techniques has shown a remarkable improvement in reliability prediction. This paper examines and compares Linear Regression (LR) and five machine learning methods: (Artificial Neural Network, Support Vector Machine, Decision Tree, Fuzzy Inference System and Adaptive Neuro-Fuzzy Inference System). These methods are explored empirically to find the effect of severity of errors for the assessment of software testing time. We use two publicly available failure datasets to analyse and compare the regression and machine learning methods for assessing the software testing time. The performance of the proposed model is compared by computing mean absolute error (MAE) and root mean square error (RMSE). Based on the results from rigours experiments, it is observed that model accuracy using FIS and ANFIS method is better and outperformed the model predicted using linear regression and other machine learning methods. Finally, we conclude that Adaptive Neuro-fuzzy Inference System is useful in constructing software quality models having better capability of generalization and less dependent on sample size.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mohana:2012:AIP, author = "Rajni Mohana and Deepak Dahiya", title = "Approach and impact of a protocol for selection of service in web service platform", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--6", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088896", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Business agility is an important challenge while designing an enterprise application. Service oriented architecture is used to combine many outsourced web services to provide value added services to the users with agility. A service registry is maintained to keep track of various web service published by the service providers. The key challenge for the service requester is to pick the best web service among the various functionally equivalent web services in the service registry. This paper describes and analyses various service selection protocols given by the researchers. The approaches are classified into semantic and non-semantic approach. It also proposes a novel technique to look for the best web service based on QoS like reliability, throughput etc. The solution to the problem of selecting the best web service according to the requirements is designed as a fuzzy expert system. This rule based approach of Service registration and lookup is adaptive and responds dynamically to quality of service changes in the web services.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2012:ADC, author = "Vinay Singh and Vandana Bhattacherjee and Sandeep Bhattacharjee", title = "An analysis of dependency of coupling on software defects", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--6", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088899", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Functional independence is a key to good software design and a good design results in high quality software. Functional independence is the refined form of the design concept of modularity, abstraction and information hiding. Coupling is a measure of relative interconnection among modules. Coupling in software has been linked with maintainability and existing metrics are used as predictors of external software quality (e.g., fault -proneness, impact analysis, ripple effect of changes, changeability). In this paper we demonstrate the defects of software due to coupling by studying five different attributes of coupling and measured its impact on software defects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tekinerdogan:2012:AGS, author = "Bedir Tekinerdogan and Semih Cetin and Muhammad Ali Babar and Patricia Lago and Juho M{\"a}ki{\"o}", title = "Architecting in global software engineering", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--7", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088900", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper summarizes the results of the First Workshop on Architecting in Global Software Engineering (GSE), which was organized in conjunction with the 6th International Conference on Global Software Engineering (ICGSE 2011). The workshop aimed to bring together researchers and practitioners for defining and advancing the state-of-the-art and state-of-the practice in architecture design of global software development systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jiau:2012:FIC, author = "Hewijin Christine Jiau and Feng-Pu Yang", title = "Facing up to the inequality of crowdsourced {API} documentation", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--9", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088892", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "API usability is a crucial issue in software development. One bottleneck of API usability is insufficient documentation. This study empirically confirmed the inequality of crowdsourced API documentation, which is one of the main sources of API documentation. To manage the inequality, a method for documentation reuse is proposed based on the nature of object-oriented programming language, inheritance. A case study was conducted in Stackoverflow, which is a widely used Q \& A site, to study the feasibility of the documentation reuse. Results of the case study indicate that documentation reuse is feasible in improving both the coverage and quality of crowdsourced API documentations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2012:ARB, author = "Ashish Sharma and D. S. Kushwaha", title = "Applying requirement based complexity for the estimation of software development and testing effort", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--11", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088898", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The need of computing the software complexity in requirement analysis phase of software development life cycle (SDLC) would be an enormous benefit for estimating the required development and testing effort for yet to be developed software. Various research proposals are directed towards minimizing the cost of software. Also, a relationship between source code and difficulty in developing a source code are also attempted in order to estimate the complexity of the proposed software for cost estimation, man power build up, code and developer's evaluation. Therefore, this paper presents a systematic and integrated approach for the estimation of software development and testing effort on the basis of improved requirement based complexity (IRBC) of the proposed software. The IRBC measure serves as the basis for estimation of these software development activities to enable the developers and practitioners to predict the critical information about the software development intricacies. Efficient software development requires accurate estimates, since inappropriate estimates causes' trouble during implementation of software process. Hence, this paper presents a comprehensive approach, for the prediction of software development and testing effort using IRBC. For validation purpose, the proposed measures are categorically compared with various established and prevalent practices proposed in the past like code based, use case based, algorithmic model and function point based estimation measures. Finally, the results obtained, validates the claim, for the approaches discussed in this paper, for estimation of software development and testing effort, in the early phases of software development appears to be robust, comprehensive, early alarming and compares well with other measures proposed in the past. Hence, it is even more useful because the complexity, development and testing effort estimates are obtained at very early stage.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Banerjee:2012:DAB, author = "A. Banerjee and S. Ray and P. Dasgupta and P. P. Chakrabarti and S. Ramesh and P. Vignesh and V. Ganesan", title = "A dynamic assertion-based verification platform for validation of {UML} designs", journal = j-SIGSOFT, volume = "37", number = "1", pages = "1--14", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088891", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Capacity limitations continue to impede widespread adoption of formal property verification in the design validation flow of software and hardware systems. The more popular choice (at least in the hardware domain) has been dynamic property verification (DPV), which is a semi-formal approach where the formal properties are checked over simulation runs. DPV is highly scalable and can support a rich specification language. The main contribution of this paper is to build an integrated DPV platform for validation of UML-based designs. Specifically, we present (a) a language, named Action-LTL (a simple extension of Linear Temporal Logic) for writing assertions over data attributes and events of UML models, and (b) an integrated dynamic assertion-verification platform for verification of UML designs. In view of the capacity limitations of existing formal property verification tools, we believe that the methods presented in this paper are of immediate practical value to the UML design community.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2012:CAS, author = "Larry Bernstein", title = "Cross avoid shelf-ware by making your systems easy-to-use", journal = j-SIGSOFT, volume = "37", number = "1", pages = "8--9", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088884", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wing:2012:FT, author = "Michael Wing", title = "Food for thought", journal = j-SIGSOFT, volume = "37", number = "1", pages = "9--10", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088885", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2012:SEEa, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "10--11", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088886", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2012:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "12--20", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088887", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2012:RPa, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "37", number = "1", pages = "21--26", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088888", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Krein:2012:RIW, author = "Jonathan L. Krein and Charles D. Knutson and Lutz Prechelt and Natalia Juristo", title = "Report from the {2nd International Workshop on Replication in Empirical Software Engineering Research (RESER 2011)}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "27--30", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088889", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The RESER workshop provides a venue in which empirical software engineering researchers can discuss the theoretical foundations and methods of replication, as well as present the results of specific replicated studies. In 2011, the workshop co-located with the International Symposium on Empirical Software Engineering and Measurement (ESEM) in Banff, Alberta, Canada. In addition to several outstanding paper sessions, highlights of the 2011 workshop included a keynote address by Dr. Victor R. Basili, in which he addressed the question, ``What's so hard about replication of software engineering experiments?'' The workshop also featured a joint replication panel session discussing the first cooperative joint replication ever conducted in empirical software engineering research and a planning session for next year's joint replication project addressing Conway's Law.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Cooper:2012:BRD, author = "Greg Cooper", title = "Book Review: {{\booktitle{DTrace: dynamic tracing in Oracle Solaris, Mac OS X, and FreeBSD}} by Brendan Gregg and Jim Mauro}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "34--34", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088902", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Glass:2012:BRM, author = "Robert L. Glass", title = "Book Review: {{\booktitle{Managing projects in trouble: achieving turnaround and success}} by Ralph L. Kliem}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "34--34", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088903", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gousios:2012:BRS, author = "Georgios Gousios", title = "Book Review: {{\booktitle{Scalability rules 50 principles for scaling web sites}} by Martin L. Abbott and Michael T. Fisher}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "35--35", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2139179", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2012:BRE, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{The Eclipse graphical editing framework (GEF)}} by D. Rubel, J. Wren, and E. Clayberg}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "35--35", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088905", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mendell:2012:BRP, author = "Matt Mendell", title = "Book Review: {{\booktitle{A practical guide to Fedora and Red Hat enterprise Linux}} by Mark G. Sobell}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "36--36", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088907", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2012:BRC, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Continuous testing with Ruby, Rails and JavaScript}} by Ben Rady and Rod Coffin}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "36--36", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088906", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hathhorn:2012:BRE, author = "Chris Hathhorn", title = "Book Review: {{\booktitle{Engineering a compiler}}, second edition by Keith D. Cooper and Linda Torczon}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "36--37", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088908", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2012:BRB, author = "William {Del Ra III}", title = "Book Review: {{\booktitle{The book of Ruby}} by Huw Collingbourne}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "37--37", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088909", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tracz:2012:BHD, author = "Will Tracz", title = "A bug hunter's diary: a guided tour through the wilds of software security by Tobias {Klein}", journal = j-SIGSOFT, volume = "37", number = "1", pages = "37--38", month = jan, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2088883.2088910", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:09 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Khan:2012:IQM, author = "Suhel Ahmad Khan and Raees Ahmad Khan", title = "Integrity quantification model for object oriented design", journal = j-SIGSOFT, volume = "37", number = "2", pages = "1--3", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108154", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Various surveys indicate that over the past several years software security has risen in priority for many software organizations. Security quantification in early stage of software development life cycle assists security experts to address security related problems well in advance. Security assessment using model is proved to be one of the established methods. Keeping in view of the same, an Integrity Quantification Model (IQM) is proposed in this paper. An effort is made by authors to correlate design integrity with complexity factors. Object oriented design metrics are used to quantify complexity factors. The developed model has been validated with realistic (small set of) data to prove the significance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Eisenberg:2012:TBA, author = "Robert J. Eisenberg", title = "A threshold based approach to technical debt", journal = j-SIGSOFT, volume = "37", number = "2", pages = "1--6", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108151", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Nearly two decades ago, Ward Cunningham introduced us to the term ``technical debt'' as a means of describing the long term costs associated with a suboptimal software design and implementation. For most programs, especially those with a large legacy code baseline, achieving zero absolute debt is an unnecessary and unrealistic goal. It is important to recall that a primary reason for managing and eliminating debt is to drive down maintenance costs and to reduce defects. A sufficiently low, manageable level of debt can minimize the long-term impact, i.e., ``low debt interest payments''. In this article, we define an approach for establishing program specific thresholds to define manageable levels of technical debt.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Harikrishnan:2012:SEN, author = "S. Harikrishnan and Rajeev Kumar", title = "Space efficient non-constant time multi-method dispatch in object oriented systems", journal = j-SIGSOFT, volume = "37", number = "2", pages = "1--6", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108153", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Multi-method dispatch in object oriented programs provides additional expressibility, readability and elegance over single dispatch languages. Optimizing multi-method dispatch is a central issue in compilers that support multi-methods. Existing constant time dispatch techniques for multi-methods keep either a lookup table or a lookup tree after compressing the same, the size of which can still be large if compression is not effective. In this paper, we propose a space efficient non-constant time technique (each method address should be computed --- rather than being looked up) for multi-method dispatch with single inheritance type hierarchies. The method table containing all the multi-method signatures is the only data structure kept at run time. The table is arranged by sorting on argument position to expedite method search during dispatch. Heuristics is used during method search such that those methods which are not potential candidates are not included in the search. The proposed technique saves space significantly while the dispatch time grew higher compared to existing techniques. When multi-method counts were within practical bounds, the proposed technique was found to offer dispatch time similar to existing techniques.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Majumdar:2012:ICF, author = "Dipankar Majumdar and Swapan Bhattacharya", title = "Interoperability of constrained finite state automata", journal = j-SIGSOFT, volume = "37", number = "2", pages = "1--8", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108155", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Finite State Automata have been extended in a number of ways with varied additional constraints with an objective of modeling varied real life problems. The current paper commonly refers to such extensions as constrained automata. It aims at defining a generic mathematical model for the constrained automata targeted towards interoperability and possible integration amongst them. The paper proposes and demonstrates usage of hyper complex symbols that realizes the objective.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gaur:2012:AIM, author = "Vibha Gaur and Anuja Soni", title = "Analytical inference model for prediction and customization of inter-agent dependency requirements", journal = j-SIGSOFT, volume = "37", number = "2", pages = "1--11", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108152", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Inter-agent communication is one of the main concerns of Agent Oriented Requirements Engineering (AORE). The concern is delineated as managing inter-dependencies and interaction among various agents performing collaborative activities. To carry out cooperative activities, the application areas viz. electronic commerce and enterprise resource planning in the distributed environment require an agent to predict and customize dependency needs termed as Degree of Dependency (DoD) so that the goal may be obtained within resource constraints and with optimal number of agents. To quantify and predict exertion load of an agent within resource constraints, this paper proposes an Analytical Inference Model (AIM) that would facilitate the developer to evaluate and envisage DoD and hence analyze the optimum number of agents to obtain predicted DoD. In this work, Adaptive Neuro Fuzzy Inference System (ANFIS) combining the potential benefits of Artificial Neural Network (ANN) and Fuzzy Logic (FL) is employed to discover the linear relationship in input domain attributes and DoD. The resultant optimization of exertion loads would immensely improve the quality of the Multi-Agent System. The hybrid, as well as back propagation learning algorithm, is employed to adapt from training data. The bestfitness of proposed model against test data is examined by the performance indicators-Coefficient of Correlation (CORR) and the Normalized Root Mean Square Error (NRMSE). It is observed that hybrid learning algorithm outperforms the back propagation algorithm.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{M:2012:ESG, author = "Krishna Raj P. M. and Srinivasa K. G.", title = "Empirical studies of global volunteer collaboration in the development of free and open source software: analysis of six top ranked projects in {\tt sourceforge.net}", journal = j-SIGSOFT, volume = "37", number = "2", pages = "1--11", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108156", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Sourceforge.net is the largest portal hosting Free and Open Source Software (FOSS). Among the projects available in sourceforge.net, six top ranked projects are selected for studying global volunteer collaboration patterns over a period of 6 years (2005--2011). It is found that a small set of volunteers do most of the work in these projects. The growth rate of volunteers, identification of core developers, join and drop rate of volunteers, task allocation and rate of task completion, movement of existing volunteers among different projects and the rate of new volunteer inclusion are also studied.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2012:ERM, author = "Satwinder Singh and K. S. Kahlon", title = "Effectiveness of refactoring metrics model to identify smelly and error prone classes in open source software", journal = j-SIGSOFT, volume = "37", number = "2", pages = "1--11", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108157", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In order to improve software maintainability, possible improvement efforts must be made measurable. One such effort is refactoring the code which makes the code easier to read, understand and maintain. It is done by identifying the bad smell area in the code. This paper presents the results of an empirical study to develop a metrics model to identify the smelly classes. In addition, this metrics model is validated by identifying the smelly and error prone classes. The role of two new metrics (encapsulation and information hiding) is also investigated for identifying smelly and faulty classes in software code. This paper first presents a binary statistical analysis of the relationship between metrics and bad smells, the results of which show a significant relationship. Then, the metrics model (with significant metrics shortlisted from the binary analysis) for bad smell categorization (divided into five categories) is developed. To develop the model, three releases of the open source Mozila Firefox system are examined and the model is validated on one version of Mozila Sea Monkey, which has a strong industrial usage. The results show that metrics can predict smelly and faulty classes with high accuracy, but in the case of the categorized model, not all categories of bad smells can adequately be identified. Further, few categorised models can predict the faulty classes. Based on these results, we recommend more training for our model.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2012:PSE, author = "Larry Bernstein", title = "Pithy software engineering quotes", journal = j-SIGSOFT, volume = "37", number = "2", pages = "6--7", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108160", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2012:SLA, author = "Robert Schaefer", title = "The secret life of academic papers", journal = j-SIGSOFT, volume = "37", number = "2", pages = "7--8", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108161", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2012:SEEb, author = "Mark A. Ardis and Peter B. Henderson", title = "Software Engineering Education {(SEEd)}", journal = j-SIGSOFT, volume = "37", number = "2", pages = "8--10", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108162", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2012:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "37", number = "2", pages = "11--20", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108163", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2012:RPb, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "37", number = "2", pages = "21--29", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108164", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tekinerdogan:2012:RTA, author = "Bedir Tekinerdogan", title = "Reflection on {Turkish} aspect-oriented software development workshop series", journal = j-SIGSOFT, volume = "37", number = "2", pages = "30--33", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108165", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In the last decade aspect-oriented software development (AOSD) has gained a broad interest in both academic institutions and industry. Likewise, several international conferences and workshops have been organized around the topic of AOSD. This paper summarizes the results of the national Turkish Aspect-Oriented Software Development Workshop series that have been organized in the last decade with the goal to stimulate the research and education on AOSD in Turkey. The fifth workshop was organized in December 2011. Aspects identified and demonstrated during the workshops have been collected in the so-called Aspect Browser. We report both on the experiences from the workshop series and the resulting aspect browser.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2012:BRSa, author = "William {Del Ra III}", title = "Book Review: {{\booktitle{Software systems architecture}}, second edition, by Nick Rozanski and Eoin Woods}", journal = j-SIGSOFT, volume = "37", number = "2", pages = "36--36", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108171", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Eisenberg:2012:MSD, author = "Robert Eisenberg", title = "Managing software debt building for inevitable change by Chris Sterling", journal = j-SIGSOFT, volume = "37", number = "2", pages = "36--37", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108172", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ngo:2012:BRE, author = "Terry Ngo", title = "Book Review: {{\booktitle{Essential app engine: building high-performance Java apps with Google app engine}} by Adriaan de Jonge}", journal = j-SIGSOFT, volume = "37", number = "2", pages = "37--37", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108173", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2012:BRW, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Work item management with IBM rational ClearQuest and Jazz: a customization guide}} by Shmuel Bashan and David E. Bellagio}", journal = j-SIGSOFT, volume = "37", number = "2", pages = "37--38", month = mar, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2108144.2108174", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:11 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rosenblum:2012:LCa, author = "David S. Rosenblum", title = "Letter from the Chair", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2180921.2370934", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Reddy:2012:DWU, author = "K. Sudheer Reddy and G. Partha Saradhi Varma and M. Kantha Reddy", title = "Discovering web usage patterns by using an innovative practical approach", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--4", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180939", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Pattern mining is one of the most pivotal steps in the data mining is pattern mining and it immediately comes after the preprocessing phase of WUM. Pattern discovery deals with the sorted set of data items are presented as part of the sequence. Using this pattern mining, users can recognize the web paths that users commonly follow on a web site easily. This research discovers the most relevant and interesting behavioral patterns by using a Web usage mining process. The server web logs aids as an input to this process. We aim to identify behavioral patterns of the users who typically visit the web sites occasionally. We have employed a method for clustering, based on pattern summaries. We have conducted intense experiments and the results are shown in this paper", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tiwari:2012:MCA, author = "Manisha Tiwari and Padmaja Joshi", title = "Method cohesion analysis through concept lattices", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--4", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180924", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Cohesion in object oriented technology is usually associated with a class and hence majority of the available cohesion metrics capture cohesion of classes. Methods which are the main contributors to class cohesion are not analyzed for their internal cohesiveness. This concept paper proposes method cohesion analysis through concept lattices. The approach facilitates rapid identification of elements (statements or variables) in methods that are less cohesive with respect to the remaining part of the method. The paper discusses the analysis and interpretation of cohesion lattices. The approach is demonstrated through dummy examples", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Arora:2012:SUM, author = "Deepak Arora and Bramah Hazela and Vipin Saxena", title = "Semantics for {UML} model transformation and generation of regular grammar", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--5", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180931", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Graphs are one of the most popular non linear data structures used to represent various data objects. These graphical structures can further be classified into directed and undirected graph representations. For modeling purpose, UML has adopted the phenomenon of directed graphical structures as statechart diagrams, to exhibit dynamic specification of any software or non software system. These diagrams are important as they are used to represent all possible values that an object can retain throughout its life cycle. Three key components are required to change the state of any object namely transition function, action and possible inputs. Statechart diagrams are also useful to determine all possible paths that an object will undergo during its entire life span, while changing its state. Further these paths can be represented with the help of various established graphical modeling techniques like Finite State Automata. The mapping and further analysis of these path structures can be very helpful in determining the correctness of the diagram as well as to highlight the possible deficiencies in the diagram. In the present work, authors have proposed semantics for automatic transformation of UML statechart diagram into its equivalent finite state automata, by taking the advantage of both of the models. Authors have also presented an approach to generate regular grammar for the generated finite state automata. This equivalent grammar can further be useful to generate various test cases, to test UML statechart diagram, against various test conditions. To better illustrate, authors have also presented a case study of an ATM machine and demonstrated that how this approach is helpful to verify the correctness of design", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Counsell:2012:IAR, author = "Steve Counsell and Stephen Swift", title = "Issues arising from refactoring studies: an experience report", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--5", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180922", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In theory, refactoring should reverse the trend in code decay and many studies have explored the different facets of refactoring (both its trends and characteristics). While much progress has been made in this area, a number of observations about refactoring studies have become evident to us over the past seven years in the time during which we have been undertaking empirical studies in this area. This paper outlines our experiences of the issues that arise with refactoring studies. We outline six of those issues, together forming the set of challenges that are still prevalent in this area. The purpose of the paper is thus to put under the spotlight the real potential benefits of refactoring, but more importantly the challenges that our experiences have raised", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gulia:2012:NAG, author = "Preeti Gulia and R. S. Chillar", title = "A new approach to generate and optimize test cases for {UML} state diagram using genetic algorithm", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--5", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180933", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software testing is an important part of the software development process. The testing effort is divided into three parts: test case generation, test execution and test evaluation. Test case generation is the center of testing process and automating. It saves time and efforts and reduces the number of errors and faults. To decrease the elevated cost of software testing and to increase the reliability of the testing processes, a new method has been created to automate the testing process. This paper proposes a new approach to generate and optimize test cases from UML State Chart diagram using Genetic Algorithm. To generate the new test sequence the method of crossover has been applied from the Genetic Algorithm and the efficiency of the test sequences is evaluated by Mutation Analysis", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nierstrasz:2012:ASA, author = "Oscar Nierstrasz", title = "Agile software assessment with Moose", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--5", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2180921.2180925", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "During software maintenance, much time is spent reading and assessing existing code. Unfortunately most of the tools available for exploring and assessing code, such as browsers, debuggers and profilers, focus on development tasks, and offer little to support program understanding. We present a platform for software and data analysis, called Moose, which enables the rapid development of custom tools for software assessment. We demonstrate how Moose supports agile software assessment through a series of demos, we illustrate some of the custom tools that have been developed, and we draw various lessons learned for future work in this domain", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Reddy:2012:PWS, author = "K. Sudheer Reddy and G. Partha Saradhi Varma and I. Ramesh Babu", title = "Preprocessing the web server logs: an illustrative approach for effective usage mining", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--5", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180940", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Data preprocessing is an important activity for discovering behavioral patterns. The analysis of web logs is an essential task for System Administrators to safeguard adequate bandwidth and to maintain server capacity on their business websites. A web Log file represents user activities occurring over a period of time. Web log files offer valuable insight into the effective usage of the web site. It helps maintain an account of the actual usage in a regular working system as compared to the virtual setting of a usability lab. This research paper focuses on the preprocessing techniques implemented on a specially designed Web Sift (WebIS) tool on an IIS web server and also proposes some efficient heuristics and techniques", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2012:PSA, author = "Surender Kumar and Rajeev Kumar", title = "Precise static analysis for generic programs in object oriented languages", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--6", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180937", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Genericity enriched with multiple data types and classes is becoming a common feature of object oriented languages. Therefore, static analysis of such generic programs is gaining importance. Unfortunately such work does not exist. In this work, we statically analyse such generic programs for approximating the possible dynamic (run-time) types of objects. We propose a single pass technique for analyzing the generic programs inter-procedurally statement-wise following the control flow of the execution. The technique is able to resolve the covariance, contravariance and invariance relationship existing amongst different instances with type parameters as arguments to a class. We assess the performance of the proposed technique by carrying out experiments on a set of standard benchmark programs", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Benala:2012:CIS, author = "Tirimula Rao Benala and Satchidananda Dehuri and Rajib Mall", title = "Computational intelligence in software cost estimation: an emerging paradigm", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--7", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180932", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "One of the key features for the failure of project estimation techniques is the selection of inappropriate estimation models. Further, noisy data poses a challenge to build accurate estimation models. Therefore, the software cost estimation (SCE) is a challenging problem that has attracted many researchers over the past few decades. In the recent times,the use of computational intelligence methodologies for software cost estimation have gained prominence. This paper reviews some of the commonly used computational intelligence (CI) techniques and analyzes their application in software cost estimation and outlines the emerging trends in this area", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jiang:2012:TDG, author = "Shujuan Jiang and Yanmei Zhang and Dandan Yi", title = "Test data generation approach for basis path coverage", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--7", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180936", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "On the basis of determining the feasibility of paths, this paper proposes an evolutionary approach to generating test data for feasible basis path coverage. First, the structure of the program under test is expressed by a control flow graph, and the target paths are encoded into the form of hybrid-coding that efficiently combines the statement label with the outcome of a conditional statement (i.e. T or F). Then, the genetic algorithm is employed to generate test data for multiple paths coverage, and the fitness function of an input data (an individual) takes into account the degree of the execution track matching the target paths. Finally, the proposed approach is applied in several benchmark programs. The experimental results show that the proposed approach cannot only avoid redundant test but also improve the efficiency of test data generation effectively", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ripon:2012:UTM, author = "Shamim H. Ripon", title = "A unified tabular method for modeling variants of software product line", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--7", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180941", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Reuse of software is a promising approach to improving the efficiency of software development regarding time, cost and quality. Reuse requires a systematic approach. The best results are achieved if we focus on systems in a specific domain, so-called product line. The key difference between the conventional software engineering and software product line engineering is variant management. The main idea of software product line is to identify the common core functionality which can be implemented once and reused afterwards for all members of the product line. To facilitate this reuse opportunity the domain engineering phase makes the domain model comprising the common as well as variant requirements. In principle, common requirements among systems in a family are easy to handle. However, problem arises during handling variants. Different variants have dependencies on each other; a single variant can affect several variants of the domain model. These problems become complex when the volume of information grows in a domain and there are a lot of variants with several interdependencies. Hence, a separate model is required for handling the variants. This paper presents a mechanism, which we call, Unified Tabular Method to facilitate the management of variant dependencies in product lines. The tabular method consists of a variant part to model the variants and their dependencies, and a decision table to depict the customization decision regarding each variant while deriving customized products. Tabular method alleviates the problem of possible explosion of variant combinations and facilitates the tracing of variant information in the domain model", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Anwikar:2012:DDT, author = "Vallabh Anwikar and Ravindra Naik and Adnan Contractor and Hemanth Makkapati", title = "Domain-driven technique for functionality identification in source code", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--8", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180923", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "While migrating existing software systems to Software Product Lines, finding out the functionalities in the software is critical. For maintenance activities like deleting or changing existing features, or adding new similar features, identifying and extracting functionalities from the software is significant. This paper describes a technique for creating mapping between the source code and functionalities implemented by it while exploiting the domain knowledge. The technique is based on the notion of function variables that are used by developers for expressing functionality in the source code. By tracking the known values of the function variables and evaluating the conditions that use them, the mapping is identified. Our technique makes use of static data flow analysis and partial evaluation, and is designed with automation perspective. After applying to few samples representing real-life code structure and programming practices, the technique identified precise mapping of the detailed program elements to functions", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jeet:2012:CSB, author = "Kawal Jeet and Renu Dhir and Harsh Verma", title = "A comparative study of {Bayesian} and fuzzy approach to assess and predict maintainability of the software using activity-based quality model", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--9", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180935", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Quality is considered as one of the most important aspects responsible for the success of the software. The developers as well as the end users of the software have accepted maintainability as a significant characteristic due to its economic implications. Several subjective techniques have been developed in research to assess and predict maintainability but all have been unsuccessful to do it practically and most of them even fail to define it appropriately. The activity-based quality model is one of the techniques that have been found to be successful in defining maintainability. This model assesses maintainability in terms of average efforts required to maintain software but lacks quantitative aspect that has been further added by using Bayesian Network. In this paper, a comparison of the Bayesian approach and Fuzzy approach to deal with this model quantitatively has been done wherein; Fuzzy approach has been found to be better than Bayesian", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Priyanka:2012:EEC, author = "Priyanka and Inderveer Chana and Ajay Rana", title = "Empirical evaluation of cloud-based testing techniques: a systematic review", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--9", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180938", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software Testing is a challenging activity for many software engineering projects, especially for large scale systems. The amount of tests cases can range from a few hundred to several thousands, requiring significant computing resources and lengthy execution times. Cloud computing offers the potential to address both of these issues: it offers resources such as virtualized hardware, effectively unlimited storage, and software services that can aid in reducing the execution time of large test suites in a cost-effective manner. In this paper we report on a systematic review of cloud based testing techniques published in major software engineering journals and conferences conducted by other researchers. Research papers were gathered from various scholarly databases using provided search engines within a given period of time. A total of 82 research papers are analyzed in this systematic review and we classified it into four categories according to issues addressed by them. We identified majority of the research papers focused on Cloud based Testing and Issues (38 papers) and 23 papers focused on Cloud based Testing Frameworks. By looking at the areas focused by existing researchers, gaps and untouched areas of cloud based testing can be discovered", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gupta:2012:MCS, author = "Daya Gupta and Rinky Dwivedi", title = "Method configuration from situational method engineering", journal = j-SIGSOFT, volume = "37", number = "3", pages = "1--11", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180934", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper presents a brief on evolution and subsequent developments in the field of Situation Method Engineering (SME) through exhaustive literature review. The efforts of the various method engineers are gathered, summarized and presented to show the overall growth of this vital discipline. This research paper starts with the assembly-based approaches and moves towards method generation. The paper further analyzes the proposals presented on the architecture of SME processes followed by the OPEN Process Framework (OPF). OPF depend on the four major components-Object-oriented Process, Environment and Notation (OPEN). We evaluate these proposals for various issues leading to method configuration. The survey concludes with the proposals on configurability of methods and current unresolved issues that need to be addressed in one single approach to configure a situation-specific coherent method", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wing:2012:TY, author = "Mike Wing", title = "Thank You", journal = j-SIGSOFT, volume = "37", number = "3", pages = "7--8", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2180921.2180926", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2012:SEEc, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "37", number = "3", pages = "8--9", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2180921.2180927", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2012:SNSc, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "37", number = "3", pages = "10--17", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2180921.2180928", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2012:RPc, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "37", number = "3", pages = "18--25", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2180921.2180929", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Shukla:2012:RSE, author = "Rakesh Shukla and Ashish Sureka and Rushikesh Joshi and Rajib Mall", title = "A report on {Software Engineering Education Workshop}", journal = j-SIGSOFT, volume = "37", number = "3", pages = "26--31", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180930", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this report, we present a summary and a few reflections of a one day workshop on Software Engineering Education held on February 22, 2012 at Indian Institute of Technology, Kanpur, India collocated with the 5th India Software Engineering Conference. We identify a gap and believe there is a need for creating an annual discussion forum that serves the need of having a regular workshop for software engineering education in India and also benefit the global software engineering education community by sharing the workshop insights and results by a publication process. The workshop consists of two keynotes, one from academia and one from industry, two subgroups discussions and presentations by the subgroups on their discussions. Three systematic techniques, invitation of position statements, set up of a Google group and an online survey, were employed before the workshop to estimate number of participants, subgroups and size of each subgroup for effective discussions. Twenty participants attended the workshop. The keynotes were on Using Collaborative Learning and Divergent Thinking to Teach Software Engineering and on Software Engineering Competency Development Model. Three topics were selected for subgroups discussions by the participants: use of various methods, such as learning while playing and project-based software engineering, over Power Point lecture, requirements and needs of undergraduate software engineering degree program from the perspective of Indian software industry and curriculum content, coverage, and impact of software engineering courses. The workshop was a successful endeavor and the response in terms of the contributions by participants is a clear indicator and confirmation of the need of having a focused discussion forum for brainstorming on software engineering education in India", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Froberg:2012:BRS, author = "Scott Froberg", title = "Book Review: {{\booktitle{Software Testing}} by Yogesh Singh}", journal = j-SIGSOFT, volume = "37", number = "3", pages = "36--36", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180942", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2012:BRF, author = "Robert Schaefer", title = "Book Review: {{\booktitle{Fundamentals of multicore software development}} by Victor Pankratius, Ali-Reza Adi-Tabatabai, Walter Tichy}", journal = j-SIGSOFT, volume = "37", number = "3", pages = "37--37", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180943", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Swamy:2012:BRSa, author = "Harisankar Krishna Swamy", title = "Book Review: {{\booktitle{Space based technologies and commercialized development: economic implications and benefits}} by Stella Tkatchova}", journal = j-SIGSOFT, volume = "37", number = "3", pages = "37--38", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180944", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2012:BRA, author = "William {Del Ra III}", title = "Book Review: {{\booktitle{ACM Ruby learning path}} by David A. Black}", journal = j-SIGSOFT, volume = "37", number = "3", pages = "38--38", month = may, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/180921.2180945", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rosenblum:2012:LCb, author = "David S. Rosenblum", title = "Letter from Chair", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2370933", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Cheluvaraju:2012:QMP, author = "Bharath Cheluvaraju and Anjaneyulu Pasala and Srinivas Padmanabhuni and Sadhana Chevireddy", title = "A quantitative measure for preventive maintenance in software", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--5", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Several techniques have been developed to identify and fix defects in software before its deployment. However, the challenge is to quantify how well these techniques prevent defects from occurring in the field from a holistic perspective. Therefore, we propose a novel software quality metric called ``The Preventability Metric'' that measures the preventability of defects in software. The metric is derived from a composite quantitative evaluation of the efficiency and effectiveness of the individual preventive techniques employed on software before its deployment. It provides a confidence on how well prevention of defects is handled before deployment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jeet:2012:BNB, author = "Kawal Jeet and Yadvirender Rana and Ruichi Xin", title = "A {Bayesian} network based approach for software reusability prediction", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--5", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237804", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Various factors having impact on reusability have been found in research and practice. However, their true interdependencies were never taken into consideration. Using the approach discussed in this paper, various factors and their dependencies can be depicted and the true probability of success of reusability could be easily found. Factors which are not found to have any influence on reusability are also identified. Non consideration of these factors decreases the burden of evaluation and confines the study and evaluation to only important factors for the study under consideration.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2012:AYL, author = "Ajay Jain and Chandan Singh", title = "``{Ad} you like it'': advertisement sourcing and selection technique across multiple heterogeneous applications", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--6", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237802", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Sourcing and selection of online advertisement is done with the objective of streaming advertisements that match user's interests and internet surfing habits. Choosing relevant advertisements that bring user's focus and attention have higher click rate. Innovative concepts, such as crawling recently surfed web pages (or websites), user's (or web portal server) geographical location, user's profile, age, gender, and surfing habits., have been used to identify most relevant advertisements. However, selecting and streaming an advertisement that exactly matches user's interest continues to be a challe. This paper proposes and shares an innovative technique that significantly helps in mapping user's interest quotient to streamed advertisements. This technique respects the individuality of a user and is able to differentiate between users. The proposed solution is implemented by enabling communication channels across multiple heterogeneous user-initiated applications. Applications that do not directly communicate with advertisement data sources, leverage other application running on the same user's account and submit their own metadata to the applications attached to advertisement data sources. The proposed paper helps in substituting publisher's assumptions of a user's interest with real-time user's objects of interest.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Andre:2012:FNC, author = "{\'E}tienne Andr{\'e} and Christine Choppy and Kais Klai", title = "Formalizing non-concurrent {UML} state machines using colored {Petri} nets", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237819", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "UML state machines are an interesting graphical language to express dynamic systems behavior. However, using the different features available (hierarchy, internal/external transitions, entry/exit/do activities, history pseudostates, etc.) may yield quite complex behaviors that are difficult to inspect and check visually. We introduce an algorithm to automatically generate a colored Petri net model associated with a state machine description, so as to provide a formal specification. In this proposal, although we do not consider concurrent aspects (such as fork and join), we take into account all the above mentioned features in a thorough and integrated way. This is illustrated on some examples.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Baresi:2012:LBS, author = "Luciano Baresi and Angelo Morzenti and Alfredo Motta and Matteo Rossi", title = "A logic-based semantics for the verification of multi-diagram {UML} models", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237811", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "UML is a well-known and widely used design notation: it offers a rich set of modeling elements, but their behavior is often not properly defined. Many proposals have tried to provide UML with a formal semantics, but they often focus on a limited number of diagram types, and thus do not provide a viable solution for the actual verification of complex UML models. This paper addresses a significant and consistent set of UML diagrams, called MADES UML, and uses a metric temporal logic to ascribe a formal semantics to them. It also introduces a prototype verification tool based on a bounded model / satisfiability checker. The verification of a car collision avoidance system gave encouraging results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Blech:2012:TFF, author = "Jan Olaf Blech and Bernhard Sch{\"a}tz", title = "Towards a formal foundation of behavioral types for {UML} state-machines", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237814", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Behavioral types for model-based development comprise abstract behavioral aspects of the models they are associated with. Behavioral types allow checking that a model fulfills these behavioral aspects. Furthermore, as types can be related with each other, they support more complex checks and guarantees like compatibility in composition and refinement of models in a model based development process. We propose a behavioral type system and explain its properties, specifically targeting a subset of UML state-machines. We present an early implementation that generates behavioral type definitions out of an Eclipse-based modeling environment. These type definitions are generated for the higher-order proof assistant Coq as files. We present checking and comparison techniques based on these files for behavioral aspects that can be derived from the model definition.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bowles:2012:SCT, author = "Juliana Bowles and Dulani Meedeniya", title = "Strongly consistent transformation of partial scenarios", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237809", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We present a formal approach for partial transformation of scenario-based specifications. Scenarios are captured as sequence diagrams (SDs) and (partially) transformed into coloured Petri nets (CPNs). Partial transformation is of interest for local analysis, or within an incremental development approach where interaction specifications are built incrementally and combined with previous iteration models. In previous work we defined a strongly consistent transformation from SDs to CPNs. In this paper, we extend the approach for partial transformation whilst preserving the strongly consistent nature of the transformation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Brosch:2012:FEM, author = "Petra Brosch and Sebastian Gabmeyer and Gerti Kappel and Martina Seidl", title = "On formalizing {EMF} modeling operations with graph transformations", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237810", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The development of software in accordance with the model-driven engineering paradigm places model transformations at a central position. Desirable yet contradicting properties of model transformations are user-friendliness as offered by-demonstration approaches and formal conciseness as provided by algebraic graph transformations which is indispensable for verification tasks. In this paper, we show how to unite the properties of the two different approaches. We employ the state-of-the-art by-demonstration environment Emo to prototype graph transformations by embedding the operations obtained from Emo in the formal framework of graph transformation theory.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Carrillo:2012:FVC, author = "Oscar Carrillo and Samir Chouali and Hassan Mountassir", title = "Formalizing and verifying compatibility and consistency of {SysML} blocks", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237813", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The objective of this paper is to define an approach to formalize and verify the SysML blocks in a refinement process. We propose to specify system architecture with SysML Block Definition Diagram, this diagram is then analyzed and decomposed into several sub-blocks in order to verify their compatibility. The structural architecture of an abstract block is given by the Internal Block Diagram (IBD) which defines the communication links between sub-blocks. The compatibility verification between sub-blocks is only made on linked sub-blocks. The behaviour of each sub-block is described by an interface automaton which species the invocations exchanged with its environment. The verification between blocks is translated into consistency verification between the blocks and compatibility verification between their interface automata. Incompatibilities can be inconsistent at architecture level and at communication level if there are deadlocks during the interaction between sub-blocks. Once the verification is established between the sub-blocks, the abstract block can be then substituted by the sub-blocks which compose it.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ge:2012:TPD, author = "Ning Ge and Marc Pantel and Xavier Cr{\'e}gut", title = "Time properties dedicated transformation from {UML}-{MARTE} activity to time transition system", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237807", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Critical Real-Time Systems (RTS) have strong requirements concerning system's reliability. UML and its profile MARTE are standardized modeling languages widely accepted by industrial designers to cope with the development of complex RTS. Relying on Model-Driven Engineering (MDE), time properties verification of UML-MARTE specifications at early phases of the system lifecycle becomes possible. A key issue is to eliminate the gap between UML semi-formal semantics and fully formal executable semantics using model transformation. The model transformation must guarantee the consistency between high-level user models and lower-level verification models. Meanwhile, it should guarantee that the subsequent verification is not too expensive and can be applied to real size industrial models. This paper presents an approach to translate UML-MARTE Activity Diagrams into Time Transition System (TTS) with the aim of efficiently verifying time properties in RTS. TTS is a generalization of Time Petri Nets (TPN) with the priority and data handling at the transition level, supported by TINA model checker. This contribution focuses on how to define the TTS formal semantics to avoid the core problem of state space explosion in model checking. This work has been integrated in a time properties verification framework for UML-MARTE RTS specifications. The proposed method is evaluated using a representative case study. Experimental results are given to demonstrate the method's performance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Janus:2012:TCA, author = "Andr{\'e} Janus", title = "Towards a common agile software development model {(ASDM)}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237803", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper we use a formal approach to describe Agile Software Development Methodologies. We extract common attributes and properties out of Agile Methodologies to establish a common Agile Software Development Model (ASDM). To build our model we take a look at the Agile Manifesto as well as eXtreme Programing (XP) and Scrum, and also a project-specific Agile Methodology called I2. We describe the Agile Software Development Methodologies in terms of Sets, Relations and Equations to make similarities and differences visible. With this formal characterization we can compare the Methodologies to each other and extract the common attributes and properties as parts of the common Agile Software Development Model (ASDM). After establishing our model we assess the explanatory power and aspects of completeness of the model to identify weakness and improvement potential. The explanatory power means the ability to characterize a Methodology and compare different Methodologies to each other. Completeness issues are related to the model itself, to the model's instantiations (e. g. describing XP with the ASDM) and the completeness of (relevant) Practices. Using this approach we try to achieve better theoretical understanding and comparability for Agile Methodologies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Li:2012:MQG, author = "Dan Li and Xiaoshan Li and Volker Stolz", title = "Model querying with graphical notation of {QVT} relations", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237808", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As a standard high-level model transformation language, QVT Relations defines a graphical notation, which provides a concise, intuitive way to specify transformations. However, QVT Relations relies only on the textual language OCL for model querying, leading to verbose and complicated OCL expressions. Here, we present a graphical model query facility based on the checking semantics and pattern matching of QVT Relations. The query facility also borrows from QVT Relations the graphical notation. In addition we propose an approach to map the queries into XSLT to facilitate their execution. We have developed a tool for designing the queries and automatically generating the XSLT programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Milhau:2012:RPA, author = "J{\'e}r{\'e}my Milhau and Fr{\'e}d{\'e}ric Gervais and R{\'e}gine Laleau and Marc Frappier", title = "Refinement patterns for {ASTD}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237818", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "astd is a formal and graphical language specifically defined for information system specification. Up to now, a specifier had to build an astd specification from scratch and there were no refinement techniques for stepwise construction. This paper aims at introducing refinement patterns for astd, which are inspired from real case studies. For each pattern, proof obligations have been identified to define the refinement semantics we want to provide. The three refinement patterns presented in the paper are illustrated by an example of a basic complaint management system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Yamagata:2012:FSE, author = "Yoriyuki Yamagata and Weiqiang Kong and Akira Fukuda and Van Tang Nguyen and Hitoshi Ohsaki and Kenji Taguchi", title = "Formal semantics of extended hierarchical state transition matrix by {CSP}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237815", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Extended Hierarchical State Transition Matrix (EHSTM) is a table-based modeling language frequently used in industry for specifying behaviors of a system. However, assuring correctness, i.e., having a design satisfy certain desired properties, is a non-trivial task. To address this problem, a model checker dedicated to EHSTMs called Garakabu2 is developed. However, there is no formal justification of Garakabu2, since its semantics has never been fully formalized. In this paper, we give a formal semantics to EHSTM by translating it into CSP, Communicating Sequential Processes. Our semantics covers most of the features supported by Garakabu2. We manually translate the small examples of EHSTM to CSP, and verify them by PAT, a CSP based model checker. We also verify the examples directly using Garakabu2 and show the result are same. The experiments also show that verification using our translation and PAT is much faster than that of Garakabu2 for checking message type EHSTM.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Yatake:2012:SBE, author = "Kenro Yatake and Toshiaki Aoki", title = "{SMT-based} enumeration of object graphs from {UML} class diagrams", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237812", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper presents an encoding of the UML class diagram with OCL invariants in an SMT solver for enumerating all the object graphs from the class diagram. Enumeration of all the object graphs was necessary for our verification of operating systems by model checking, i.e., exhaustively enumerate all the structural variations of the environments to be checked against an operating system. We present our encoding in the SMT solver Yices with the technique of optimization and isomorphism elimination.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kukreja:2012:AMT, author = "Deepika Kukreja and Umang Singh and B. V. R. Reddy", title = "Analytical models for trust based routing protocols in wireless ad hoc networks", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--16", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In Wireless Ad Hoc Network environment, there are three ways to understand a routing protocol: (i) monitoring, (ii) simulation and (iii) modeling. In this paper, the different trust based secure routing protocols used in wireless ad hoc networks are analyzed, modeled and described by incorporating process flow diagrams. These process flow diagrams represent stepwise work flow activities and actions. It shows the overall flow of control of a process, program or a protocol. This paper focuses on the security aspects of routing by incorporating trust parameter into account and also highlights methodology used in secure routing protocols. Such protocols have been categorized based on the model used for enforcing security, methodology and information for making effective routing decisions. In this paper, we model, discuss and analyze trust based secure ad hoc routing schemes which do not require each network node to work in promiscuous mode. We propose and design a new protocol --- Trust based Routing using Dominating Set Approach (TRDSA) which overcomes the shortcomings of existing protocols.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2012:DRS, author = "Neeraj Kumar Sharma and Vibha Gaur and S. K. Muttoo", title = "A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market", journal = j-SIGSOFT, volume = "37", number = "4", pages = "1--19", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237806", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Reputation systems aim to reduce the risk of loss due to untrustworthy participants by providing a mechanism for establishing trustworthiness between mutually unknown online entities in an information asymmetric e-market. These systems encourage honest behavior and discourage malicious behavior of buyer and seller agents by laying a foundation for security and stability in the e-market. However, the success of a reputation system depends on its built-in resilience capabilities to foil various attacks. This paper focuses on how to safeguard buyers from dishonest sellers and advisors by incorporating an attack resilient reputation computation methodology. The objectives of the proposed dynamic reputation system in the distributed environment are to reduce the incentive for behaving dishonestly, and to minimize harm in case of attacks by dishonest participants with the inherent purpose of improving the quality of services in the e-market.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Notkin:2012:TN, author = "David Notkin", title = "{TOSEM} news", journal = j-SIGSOFT, volume = "37", number = "4", pages = "7--8", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237826", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2012:SED, author = "Larry Bernstein", title = "Software engineering design principles for ultra-large-scale systems", journal = j-SIGSOFT, volume = "37", number = "4", pages = "8--9", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237797", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2012:HSJ, author = "Robert Schaefer", title = "On having a second job as an adjunct", journal = j-SIGSOFT, volume = "37", number = "4", pages = "9--10", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2012:SNSd, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "11--19", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237799", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2012:RPd, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "37", number = "4", pages = "20--29", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237800", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Herrmann:2012:IWC, author = "Andrea Herrmann and Maya Daneva and Joerg Doerr and Kurt Schneider", title = "{2nd International Workshop on Creativity in Requirements Engineering: CreaRE 2012}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "30--31", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237816", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Requirements Engineering (RE) is a socially constructed activity and as such it includes the creation, development, assessment and communication of innovative ideas. An idea can take the form of a thought related either to the analysis of a problem, or to the search of a solution to this problem, and it can be concrete or abstract. Creative thinking is what RE professionals tacitly or explicitly use in their RE processes to conceptualize smart solutions to problems. RE demands the stakeholders to create visions of a future software system and to imagine all its implications. Creativity techniques that have been practiced in other fields can support this creative part of RE. The CreaE series of workshops brings together RE practitioners and researches who are interested in discussing the role of creativity in RE and the ways in which creativity techniques from other disciplines can be leveraged in RE. CreaRE 2010 aimed at creating awareness of the importance of research on creativity in RE and initiated the conversation on experiences of applying creativity techniques in support of RE activities. CreaRE 2012 builds upon this foundation and extends the discussion on creativity in RE by actively fostering the exchange of ideas among members of diverse communities that are engaged in RE research and practice. CreaRE 2012 united an audience reaching out to areas such as design, theatre improvisation, stakeholder interactions, studies on cultural heritage and multimedia systems. This report describes the results of the workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gibson:2012:IUF, author = "J. Paul Gibson and Isabelle Perseil", title = "Introduction to {UML} and Formal Methods", journal = j-SIGSOFT, volume = "37", number = "4", pages = "32--33", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237825", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "It is with great pleasure that we introduce the 5th IEEE International Workshop on UML and Formal Methods. Already, in its short 5 year history, the workshop has been located across the globe: Japan, Brazil, China, Ireland, and --- this year --- in Paris, France. For its first 3 years it was co-located with the International Conference on Formal Engineering Methods, whilst in the last 2 years it has been part of the International Symposium on Formal Methods. The workshop has a strong tradition of publishing the highest quality accepted papers in either: the NASA journal of ``Innovations in Systems and Software Engineering'', or the ACM journal ``Software Engineering Notes'' (to whom we have returned this year). The main objective of the workshop has not changed during its lifetime, namely: the building of bridges between informal, semi-formal and formal notations. This objective can be seen in each of the 4 main themes that make up the four sessions of this year{\^A}'s workshop: I. UML diagram formalization, II. Dynamic and real-time modeling, III. Transformations, and IV. Patterns and blocks. Across all sessions a wide range of formalisms and tools are presented --- Extended Hierarchical State Transition Matrices and CSP, the SMT solver Yice, MADES UML and metric temporal logic, UML-MARTE and Time Transition Systems, Colored Petri Nets, Behavioural types and Coq, QVT-R and XSLT, EMF Model-ing Operations, ASTD and SysML --- illustrating the breadth and depth of the research being done by our community. We hope that you enjoy reading these papers as much as we have: the bridges are being built and we invite you to cross them.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Herzwurm:2012:RIW, author = "Georg Herzwurm and Benedikt Krams and Wolfram Pietsch and Sixten Schockert", title = "Report from the {3rd International Workshop on Requirements Prioritization for Customer Oriented Software Development: (RePriCo'12)}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "32--33", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237817", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Prioritization is an essential task within requirements engineering to cope with complexity and to establish focus properly. The 3rd Workshop on Requirements Prioritization for customer oriented Software Development (RePriCo'12) focused on requirements prioritization and adjacent themes in the context of customer oriented development of bespoke and standard software. Five submissions have been accepted for the proceedings and for presentation. The report summarizes and points out key findings.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Froberg:2012:BRP, author = "Scott Froberg", title = "Book Review: {{\booktitle{Programming perl}}, fourth edition by Tom Christiansen, Brian D. Foy and Larry Wall with Jon Orwant}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "40--40", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237822", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2012:BRSb, author = "William {Del Ra III}", title = "Book Review: {{\booktitle{Service design patterns: fundamental design solutions for SOAP\slash WSDL and RESTful web services}} by Robert Daigneau}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "40--40", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237821", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2012:BRT, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Theory of conditional games}} by Wynn C. Stirling}", journal = j-SIGSOFT, volume = "37", number = "4", pages = "41--41", month = jul, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2237796.2237823", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:14 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Solomon:2012:NML, author = "A. D. Solomon", title = "On a new masters level program in software engineering", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--3", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347713", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In a 1998 note [1] I described a new study program leading to the Bachelor's Degree in Software Engineering. I now report on a new Master's level program in Software Engineering evolving from the Bachelor's Degree program, and beginning in the fall semester of this year. I discuss some of the events of our 14 year old Bachelor's program, and the structuring of our Master's program.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dubey:2012:MPO, author = "Sanjay Kumar Dubey and Ajay Rana and Yajnaseni Dash", title = "Maintainability prediction of object-oriented software system by multilayer perceptron model", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--4", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347703", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "To accomplish software quality, correct estimation of maintainability is essential. However there is a complex and non-linear relationship between object-oriented metrics and maintainability. Thus maintainability of object-oriented software can be predicted by applying sophisticated modeling techniques like artificial neural network. Multilayer Perceptron neural network is chosen for the present study because of its robustness and adaptability. This paper presents the prediction of maintainability by using a Multilayer Perceptron (MLP) model and compares the results of this investigation with other models described earlier. It is found that efficacy of MLP model is much better than both Ward and GRNN network models.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Louridas:2012:NRR, author = "Panos Louridas and Georgios Gousios", title = "A note on rigour and replicability", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--4", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347706", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As any empirical science, Software Engineering research should strive towards better research practices. Replication is regrettably not a priority for Software Engineering researchers and, moreover, not afforded by many published studies. Here we report our experience from our encounter with a recent paper in a flagship Software Engineering conference. Our experience shows that current publication requirements do not guarantee replicability.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Patwa:2012:RME, author = "Sanjeev Patwa and Anil Kumar Malviya", title = "Reusability metrics and effect of reusability on testing of object oriented systems", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--4", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347708", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software reuse has become very popular in software development. There are several beneficial aspects of object oriented systems including code reuse, reusability and reusability of testing efforts. Reusable software components are the building blocks that can make a system able to respond quickly to change. This paper presents the hypothesis that the testing effort in object-oriented software can be inherited and reused similar to that of the coding effort. Therefore the testability and maintainability of the object-oriented software can be improved by adapting a reusability approach. In this paper some new metrics namely Reusability of a Class in a System (RCS), Average Degree of Reusability (AR), Specialize class to Base class Reusable Metric (SBRM) have been proposed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Romanovsky:2012:DFM, author = "Alexander Romanovsky", title = "Deployment of formal methods in industry: the legacy of the {FP7 ICT DEPLOY} integrated project", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--4", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347710", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The work of the major EU-funded ICT DEPLOY Integrated Project (February 2008 --- April 2012) on Industrial Deployment of Advanced\ System Engineering Methods for High Productivity and Dependability [1] was driven by the tasks of achieving and evaluating industrial takeup, initially by DEPLOY industrial partners, of DEPLOY methods and tools, together with the necessary further research on methods and tools. Our previous SEN paper [2] introduced the project. The project has been one of the most significant efforts ever focusing on understanding the issues researchers and engineers face during the deployment of formal methods. This paper briefly reports on the project legacy and provides pointers to the various sources of information produced by the project.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bandyopadhyay:2012:ATR, author = "Anup Kumar Bandyopadhyay", title = "Application of {TLRO} to refute an incorrect mutual exclusion algorithm", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--5", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347702", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Modeling of iterative commands in a concurrent process is difficult because the termination depends on the states of different processes. In this paper a Temporal Logic Related to Observation (TLRO)-based modeling of the same is considered. For simplicity we restrict ourselves to 'while do' construct only. Using a commonsense scenario it is shown that the construct may be described by a set of three state transition rules. In a concurrent system the termination condition is determined by the states of different processes. To ensure termination, therefore, temporal ordering of the executions of different state transition rules at different processes needs to be investigated. For this purpose we prove two theorems. The entire derivation is then used to refute a well known incorrect mutual exclusion algorithm. A counter example for the algorithm could be derived during this exercise. This is an improvement over our earlier effort that used the weakest precondition calculus as a modeling tool.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mahajan:2012:AGA, author = "Manish Mahajan and Sumit Kumar and Rabins Porwal", title = "Applying genetic algorithm to increase the efficiency of a data flow-based test data generation approach", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--5", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347707", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The success or failure of the entire software development process relies on the software testing component which is responsible for ensuring that the software that is released is free from bugs. One of the major labor intensive activities of software testing is the generation of the test data for the purpose of applying the testing methodologies. Many approaches have been tried and tested for automating the process of generating the test data. Meta-heuristics have been applied extensively for improving the efficiency of the process. This paper analyses the effectiveness of applying genetic algorithms for generating test data automatically using data flow testing approach. An incremental coverage measurement method is used to improve the convergence.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rashid:2012:SAM, author = "Ekbal Rashid and Srikanta Patnayak and Vandana Bhattacherjee", title = "A survey in the area of machine learning and its application for software quality prediction", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--7", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347709", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper explores software quality improvement through early prediction of error patterns. It summarizes a variety of techniques for software quality prediction in the domain of software engineering. The objective of this research is to apply the various machine learning approaches, such as Case-Based Reasoning and Fuzzy logic, to predict software quality. The system predicts the error after accepting the values of certain parameters of the software. This paper advocates the use of case-based reasoning (i.e., CBR) to build a software quality prediction system with the help of human experts. The prediction is based on analogy. We have used different similarity measures to find the best method that increases reliability. This software is compiled using Turbo C++ 3.0 and hence it is very compact and standalone. It can be readily deployed on any configuration without affecting its performance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2012:CSV, author = "Hemant Jain and Anjana Gosain", title = "A comprehensive study of view maintenance approaches in data warehousing evolution", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--8", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347705", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "A data warehouse mainly stores integrated information over data from many different remote data sources for query and analysis. The integrated information at the data warehouse is stored in the form of materialized views. Using these materialized views, user queries may be answered quickly and efficiently as the information may be directly available. These materialized views must be maintained in answer to actual relation updates in the different remote sources. One of the issues related to materialized views is that whether they should be recomputed or they should be adapted incrementally after every change in the base relations. View maintenance is the process of updating a materialized view in response to changes to the underlying data is called view maintenance. There are several algorithms developed by different authors to ease the problem of view maintenance for data warehouse systems. In this paper, we have provided a comprehensive study on research works of different authors related to DW view maintenance considering various parameters and presented the same in tabular way.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Shirole:2012:TCU, author = "Mahesh Shirole and Rajeev Kumar", title = "Testing for concurrency in {UML} diagrams", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--8", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347712", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/multithreading.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Concurrent programming is increasingly being used in many applications with the advent of multi-cores. The necessary support for execution of multi-threading is getting richer. Notwithstanding, a concurrent program may behave nondeterministically, it may result in different outputs with the same input in different runs. The aim of this study is to generate test sequences for concurrency from unified modelling language (UML) behavioral models such as sequence and activity diagrams. Generating exhaustive test cases for all concurrent interleaving sequences is exponential in size. Therefore, it is necessary to find adequate test cases in presence of concurrency to uncover errors due to, e.g., data race, synchronization and deadlocks. In order to generate adequate test cases a novel search algorithm, which we call concurrent queue search (CQS) is proposed. The CQS handles random nature of concurrent tasks. To generate test scenarios, a sequence diagram is converted into an activity diagram. An activity diagram encapsulates sequential, conditional, iterative and concurrent ows of the control. By the experimental results, it was observed that test sequences generated by CQS algorithm are superior as compared to DFS and BFS search algorithms.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sekar:2012:ASB, author = "Lakshmi Priya Sekar and Vinitha Reddy Gankidi and Selvakumar Subramanian", title = "Avoidance of security breach through selective permissions in {Android} operating system", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--9", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347711", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The current Android application framework has an ``all or none'' permission policy, viz., an application can be installed if and only if all the permissions are granted. Also, no provision exists to deny granted permissions after installation. Therefore, any application can misuse the granted permission. CyanogenMod addresses this issue by denying the unwanted permissions which might cause the application to crash. WhisperCore, has worked on this problem but the working model is unavailable at the moment. APEX, also is currently doing some research on this issue but there is no publicly available document. In this paper, the problem of misusing the granted permission n in Android is addressed and a novel idea of 'shadow manifest' is proposed. The proposed shadow manifest is implemented by creating a novel Content Provider, viz., SelPermProvider, which hosts the user permissions. In general, during the resource request phase, the system manifest is checked and the resources are allocated. But, in our implementation, the control is altered to flow through the shadow manifest after the system manifest is checked. If the query to shadow manifest is TRUE, then the resource is granted else a dummy or null value is returned. This facilitates the user to identify the malware and block the malware from achieving the intended task. Thus, the application is unaware of the indirect permission denial and continues to run normally. The user can decide which permission to restrict by checking a log of all recent permission requests, a facility provided in our app. The proposed shadow manifest has been implemented and tested using an application called 'Contacts\_Retrieve'. It was found to successfully complete the application if the shadow manifest returned TRUE, and unsuccessfully complete otherwise.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Babu:2012:IAD, author = "P. Arun Babu and C. Senthil Kumar and N. Murali and T. Jayakumar", title = "An intuitive approach to determine test adequacy in safety-critical software", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--10", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347701", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Safety-critical software must adhere to stringent quality standards and is expected to be thoroughly tested. However, exhaustive testing of software is usually impractical. The two main challenges faced by a software testing team are generation of effective test cases and demonstration of testing adequacy. This paper proposes an intuitive and conservative approach to determine the test adequacy in safety-critical software. The approach is demonstrated through a case study: the core temperature monitoring system of a nuclear reactor. We combine conservative test coverage of unique execution path test cases, and the results from mutation testing to determine the test adequacy. Although mutation testing is a powerful technique, the difficulty in identifying equivalent mutants has limited its practical utility. To gain confidence on the computed test adequacy: (i) faults during mutation testing must be induced at all possible execution paths of the code, (ii) properties of unkilled mutants must be studied, and (iii) all equivalent mutants must be detected. In this regard; results of static, dynamic and coverage analysis of the mutants is presented, and a technique to identify the likely equivalent mutants is proposed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wu:2012:MMS, author = "Ye-Chi Wu and Hewijin Christine Jiau", title = "A monitoring mechanism to support agility in service-based application evolution", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--10", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347714", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Service orientation promotes an agile development paradigm for rapid application development and presents evolutionary challenges to adapt to frequent environmental changes. To maintain effective service-based application operations, this research introduces a Serv-Gears framework to maintain a mechanism for evolution-need monitoring. Inheriting major characteristics of a service-oriented paradigm, this mechanism is designed in a service-based style to facilitate development agility in evolution planning and implementation. Serv-Gears allows developers to continuously specify service-based monitors even during application operations. The specified monitors are included dynamically in the running application to collect monitoring results. Evolution plans are then effectively developed and assessed. Such an integrated development environment provided by Serv-Gears facilitates agile service-based application evolution.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2012:OFA, author = "Ajay Jain", title = "Optimizing feature-access time through dynamic updates to application menu layout", journal = j-SIGSOFT, volume = "37", number = "5", pages = "1--14", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347704", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As soon as a product or application is installed, users want to start using it with zero usability roadblocks. However, there is always a time quantity associated with a user's series of actions that must be performed while traversing application menu items to reach a specific (desired) menu option. This time factor plays a critical role in influencing user experience and engagement; the more the number of clicks, the greater the time taken in reaching the desired menu item. This time lag may leave the user frustrated. The time and distance traversed increases further if the menu structure comprises multiple nested menus within the parent menu. This paper proposes an improvised dynamic menu layout based on usage statistics. This work also demonstrates results of a statistical experiment that compares the time taken in reaching specific menu items with the proposed new layout vs. the traditional menu layout. Experimental data (under defined assumptions) is found to be significantly in favor of the proposed approach. The work also presents data samples, assumptions, limitations, and benefits of the proposed approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2012:MCS, author = "Larry Bernstein", title = "Managing computer suppliers", journal = j-SIGSOFT, volume = "37", number = "5", pages = "12--13", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347718", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Grechanik:2012:CDD, author = "Mark Grechanik", title = "The curse of database deadlocks: the problem with no good solution", journal = j-SIGSOFT, volume = "37", number = "5", pages = "13--14", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347719", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2012:SEEd, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}: is software engineering ready for {MOOCs}?", journal = j-SIGSOFT, volume = "37", number = "5", pages = "14--14", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347720", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2012:SNSe, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "37", number = "5", pages = "17--26", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347699", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2012:RPe, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "37", number = "5", pages = "27--33", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347700", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Harrison:2012:RFI, author = "Rachel Harrison and Daniela da Cruz and Pedro Henriques and Maria Jo{\~a}o Varanda Pereira and Shih-Hsi Liu and Tim Menzies and Marjan Mernik and Daniel Rodriguez", title = "Report from the {First International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE 2012)}", journal = j-SIGSOFT, volume = "37", number = "5", pages = "34--35", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347697", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The aim of the Realizing Artificial Intelligence Synergies in Software Engineering (RAISE) series of workshops is to provide a forum for researchers and industry practitioners to exchange and discuss the latest innovative synergistic AI and SE techniques and practices. Namely, we are interested in AI solutions to SE problems and SE practices to answer AI obstacles, and techniques that could benefit these realms bidirectionally. This report summarizes the First International RAISE Workshop and indicates some future activities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kruchten:2012:TDS, author = "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya and Joost Visser", title = "Technical debt in software development: from metaphor to theory report on the {Third International Workshop on Managing Technical Debt}", journal = j-SIGSOFT, volume = "37", number = "5", pages = "36--38", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347698", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The technical debt metaphor is gaining significant traction in the software development community as a way to understand and communicate issues of intrinsic quality, value, and cost. This is a report on a third workshop on managing technical debt, which took place as part of the 34rd International Conference on Software Engineering (ICSE 2012). The goal of this third workshop was to discuss managing technical debt as a part of the research agenda for the software engineering field, in particular focusing on eliciting and visualizing debt, and creating payback strategies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jahns:2012:PDI, author = "Veit Jahns", title = "Principles of data integration by Anhai Doan, {Alon} Halevy, Zachary {Ives}", journal = j-SIGSOFT, volume = "37", number = "5", pages = "43--43", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347721", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{StPierre:2012:BRU, author = "Richard {St. Pierre}", title = "Book Review: {{\booktitle{The UX book, process and guidelines for ensuring a quality user experience}} by Rex Hartson and Pardha S. Pyla}", journal = j-SIGSOFT, volume = "37", number = "5", pages = "43--44", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347722", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tan:2012:BRH, author = "Kwee Heong Tan", title = "Book Review: {{\booktitle{How Google tests software}} by James A. Whittaker, Jason Arbon and Jeff Carollo}", journal = j-SIGSOFT, volume = "37", number = "5", pages = "44--45", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347723", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kienle:2012:PDP, author = "Holger M. Kienle", title = "Personal data privacy and protection in a surveillance era: technologies and practices by Christina Akrivopoulou and Athanasios Psygkas", journal = j-SIGSOFT, volume = "37", number = "5", pages = "45--46", month = sep, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2347696.2347724", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{El-Deeb:2012:VSS, author = "Ahmed El-Deeb", title = "A view on the state of software engineering practice: experience from {Egypt}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--4", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382762", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "An excerpt from Thomas Friedman's famous book The World Is Flat, ``When developing countries start thinking about the challenge of flatism\ldots{}. It has to ask itself,'' ``To what extent is my country advancing or being left behind by the flattening of the world, and to what extent is it adapting to and taking advantage of all the new platforms for collaborations and competition?'' is vividly describing the appeal of many developing countries in entering the software industry. With the globalization of crafting software and its services, the software industry is seen as a lucrative economic growth opportunity. Unlike other industrial investments, the software industry is convenient to developing countries for its low-cost of establishment. All is needed is an affordable real estate rental, a bunch of PCs, and a few skilled workers to get the business running. The globalization of the software industry with attention given to accessing the right skills no matter where and reducing costs through cheap labor is even a realization to those countries ambitions to remedy part of their economic challenges. India preceded with utilizing such potential and made good use of such globalization, or flatism, of the software industry; positioning itself as a successful model to those nations aspiring to compete globally and establish economic growth. Egypt is no exception from this ambition. Geographically positioned in proximity to Europe at the crossroads of Europe, Africa, and Asia and with access to abundant low wage talent pool of multilingual technical graduates annually are all factors that made it conceivable that Egypt can compete in the global industry of software. However, such entrance into competition, notably with India as well as other Middle Eastern countries, have shaped trends in the practices of software engineering in Egypt as well as it did emerge several challenges that Egypt should learn to remedy if it wants to stay competitive in the global software industry. This paper attempts to shed light on salient current software engineering practices and related challenges that would be affecting Egypt's progress and competitive edge. In laying a foundation to such brief survey of practices, this paper also overviews major cornerstones that gave rise to the establishment and support of such industry in Egypt.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2012:SLT, author = "Vineet Sharma and S. A. M. Rizvi and Arun Sharma", title = "Software Licenses --- A tool to control distribution of software", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--4", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382769", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The International Workshop on Developing Tools as Plug-Ins (TOPI) is a venue for researchers and practitioners interested in plug-in development. The main interest is understanding the opportunities and challenges of developing tools as plug-ins, and thus, we seek for discussions regarding the characteristics of good plug-ins, interoperability requirements to making tools available across platforms, recent successful tools as plug-ins as well as foreseen medium and long term challenges of tools as plug-ins. The second edition of this workshop, TOPI 2012 was co-located with the International Conference on Software Engineering (ICSE 2012). TOPI 2012 received a total of 32 submissions. Among them, 14 were accepted as full papers and 4 as short papers. The audience during the whole workshop ranged from 25 to 30 participants. The final program comprised position papers including new proposals for plug-in architectures as well as their interaction with development environments and run-times, and papers discussing the implementation of different kind of tools as plug-ins. This report describes the main results of TOPI 2012.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ceccarello:2012:TGC, author = "Matteo Ceccarello and Nastaran Shafiei", title = "Tools to generate and check consistency of model classes for {Java PathFinder}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Java PathFinder (JPF) is a model checker for Java applications. Like any other model checker, JPF has to combat the notorious state space explosion problem. Since JPF is a JVM, it can only model check Java bytecode and needs to handle native calls differently. JPF tackles the state space explosion problem and handles native calls by means of so-called model classes and native peers. In this paper we focus on model classes. For a class that either causes a state space explosion or that contains native calls, one can introduce a model class that either abstracts away particular details or implements the native call in Java. Rather than model checking the original class, JPF model checks the model class instead. Writing such model classes is time consuming and error prone. In this paper we propose two tools to assist with the development of model classes. The one tool generates a skeleton of a model class. The other tool checks whether a model class is consistent with the original class.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chanda:2012:TBS, author = "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal and Swapan Bhattacharya", title = "Traceability between service component and class: a model based approach", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382761", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Service components are the key to the development of a service-oriented solution as they provide the implementation of the services. The implementation of Service components provides the actual function of the component and can be defined with one or more Java classes. We propose a model named Service Component to Class (SC2C) that maps the service components of an application with that of the classes that implement the service components. We also propose a visual model as a part of SC2C that represents the classes and relationship among classes. This model helps to establish traceability among service components and classes. We also introduce some traceability metrics to measure traceability between the artifacts of Service Oriented Architecture (SOA) and Object Oriented (OO) paradigms. This work, along with our earlier work, help in Software Configuration Management of a SOA application. We provide an insurance system case study to illustrate our approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Funes:2012:RMC, author = "Diego Funes and Junaid Haroon Siddiqui and Sarfraz Khurshid", title = "Ranged Model Checking", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382799", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We introduce ranged model checking, a novel technique for more effective checking of Java programs using the Java PathFinder (JPF) model checker. Our key insight is that the order in which JPF makes non-deterministic choices denes a total ordering of execution paths it explores in the program it checks. Thus, two in-order paths define a range for restricting the model checking run by defining a start point and an end point for JPF's exploration. Moreover, a given set of paths can be linearly ordered to define consecutive, (essentially) non-overlapping ranges that partition the exploration space and can be explored separately. While restricting the run of a model checker is a well-known technique in model checking, the key novelty of our work is conceptually to restrict the run using vertical boundaries rather than the traditional approach of using a horizontal boundary, i.e., the search depth bound. Initial results using our prototype implementation using the JPF libraries demonstrate the promise ranged model checking holds.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Khyzha:2012:AP, author = "Artem Khyzha and Pavel Par{\'\i}zek and Corina S. P{\u{a}}s{\u{a}}reanu", title = "Abstract pathfinder", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382794", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/multithreading.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We present Abstract Pathfinder, an extension to the Java Pathfinder (JPF) verification tool-set that supports data abstraction to reduce the large data domains of a Java program to small, finite abstract domains, making the program more amenable to verification. We use data abstraction to compute an over-approximation of the original program in such a way that if a (safety) property is true in the abstracted program the property is also true in the original program. Our approach enhances JPF with an abstract interpreter and abstract state-matching mechanisms, together with a library of abstractions from which the user can pick which abstractions to use for a particular application. We discuss the details of our implementation together with some preliminary experiments with analyzing multi-threaded Java programs, where Abstract Pathfinder achieves significant time and memory savings as compared with plain JPF.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mercer:2012:CVI, author = "Eric Mercer and Suzette Person and Neha Rungta", title = "Computing and visualizing the impact of change with {Java PathFinder} extensions", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Change impact analysis techniques estimate the potential effects of changes made to software. Directed Incremental Symbolic Execution (DiSE) is a Java PathFinder extension that computes the impact of changes on program execution behaviors. The results of DiSE are a set of impacted path conditions that can be efficiently processed by a subsequent client analysis. Path conditions, however, may not be intuitive for software developers without the context of the source code. In this paper we present a framework for visualizing the results of DiSE. The visualization includes annotated source code and control flow graphs indicating program statements that are changed and statements that may be impacted by the changes. A simulation mode enables users to also observe the impact of changes on symbolic execution of the program, by showing the changes to the path conditions as the user steps through the sequences of statements executed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mirzaei:2012:TAA, author = "Nariman Mirzaei and Sam Malek and Corina S. P{\u{a}}s{\u{a}}reanu and Naeem Esfahani and Riyadh Mahmood", title = "Testing {Android} apps through symbolic execution", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "There is a growing need for automated testing techniques aimed at Android apps. A critical challenge is the systematic generation of test cases. One method of systematically generating test cases for Java programs is symbolic execution. But applying symbolic execution tools, such as Symbolic Pathfinder (SPF), to generate test cases for Android apps is challenged by the fact that Android apps run on the Dalvik Virtual Machine (DVM) instead of JVM. In addition, Android apps are event driven and susceptible to path-divergence due to their reliance on an application development framework. This paper provides an overview of a two-pronged approach to alleviate these issues. First, we have developed a model of Android libraries in Java Pathfinder (JPF) to enable execution of Android apps in a way that addresses the issues of incompatibility with JVM and path-divergence. Second, we have leveraged program analysis techniques to correlate events with their handlers for automatically generating Android-specific drivers that simulate all valid events.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Panizo:2012:EJP, author = "Laura Panizo and Mar{\'\i}a del Mar Gallardo", title = "An extension of {Java PathFinder} for hybrid systems", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Hybrid systems are characterized by combining discrete and continuous behaviors. Verification of hybrid systems is, in general, a difficult task due to the potential complexity of the continuous dynamics. Currently, there are different formalisms and tools which are able to analyze specific types of hybrid systems, model checking being one of the most used approaches. In this paper, we describe an extension of Java PathFinder in order to analyze hybrid systems. We apply a general methodology which has been successfully used to extend Spin. This methodology is non-intrusive, and uses external libraries, such as the Parma Polyhedra Library, to abstract the continuous behavior of the hybrid system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Phan:2012:SQI, author = "Quoc-Sang Phan and Pasquale Malacaria and Oksana Tkachuk and Corina S. P{\u{a}}s{\u{a}}reanu", title = "Symbolic quantitative information flow", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382791", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Quantitative Information Flow (QIF) is a powerful approach to quantify leaks of confidential information in a software system. Here we present a novel method that precisely quantifies information leaks. In order to mitigate the state-space explosion problem, we propose a symbolic representation of data, and a general SMT-based framework to explore systematically the state space. Symbolic Execution fits well with our framework, so we implement a method of QIF analysis employing Symbolic Execution. We develop our method as a prototype tool that can perform QIF analysis for a software system developed in Java. The tool is built on top of Java Pathfinder, an open source model checking platform, and it is the first tool in the field to support information-theoretic QIF analysis.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rimlinger:2012:TGS, author = "Frank Rimlinger", title = "Test generation via symbolic simulation", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382795", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Mango extension project of JPF is an Eclipse Workbench plugin which creates a functional specification of Java source code. The specification is presented as a series of navigable pages within Eclipse views. Representative code examples containing faults are processed by Mango. The output specification views are then navigated for the purpose of discovering robust fault recognition rules for automated testing. This paper describes how the analyst and tool work together to generate a test for a selected vulnerability described in an Oracle publication, the exposition of confidential data by the exception handler mechanism.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Shafiei:2012:MCL, author = "Nastaran Shafiei and Peter Mehlitz", title = "Modeling class loaders in {Java PathFinder} version 7", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382800", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The class loading mechanism is one of the essential components of the Java runtime environment. Java class loading is performed on-demand, allows multiple, user extensible class loaders, and can associate a separate type namespace with each class loader. Previous versions of the Java Pathfinder (JPF) model checker only provided a single, hardcoded class loading mechanism. As one of the cornerstones of the upcoming JPF version 7 (JPF v7), we have implemented a standard Java conforming class loader infrastructure. Our implementation does not only support different class loaders and type namespaces, but also allows explicit instantiation of multiple bootstrap class loaders which is essential for model checking of distributed applications --- the primary motivation for our work. With the new class loading mechanism, such applications can be mapped to threads using different bootstrap class loaders, thus effectively separating all static fields between application threads. In addition, the JPF v7 class loading is considered to be the basis for future verification of Java security properties.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2012:SOO, author = "Meenakshi Sharma and Nasib S. Gill and Sunil Sikka", title = "Survey of object-oriented metrics: focusing on validation and formal specification", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382770", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "To quantify various attributes of object-oriented software systems, numerous object-oriented metrics have been proposed by various researchers. This paper surveys existing object-oriented metrics by focusing on the two major issues-Validation and Formal Specification. This paper provides researchers with an understanding of existing object-oriented metrics in terms of validation and formal specification. Because few metrics are validated and formally specified, there is a need of both validation and formal specification of object-oriented metrics.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{vanderMerwe:2012:VAA, author = "Heila van der Merwe and Brink van der Merwe and Willem Visser", title = "Verifying {Android} applications using {Java PathFinder}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382797", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Mobile application testing is a specialised and complex field. Due to mobile applications' event driven design and mobile runtime environment, there currently exist only a small number of tools to verify these applications. This paper describes the development of JPF-ANDROID, an Android application verification tool. JPF-ANDROID is built on Java Pathfinder, a Java model checking engine. JPF-ANDROID provides a simplified model of the Android framework on which an Android application can run. It then allows the user to script input events to drive the application flow. JPF-ANDROID provides a way to detect common property violations such as deadlocks and runtime exceptions in Android applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Zhang:2012:SSS, author = "Yufeng Zhang and Zhenbang Chen and Ji Wang", title = "{S2PF}: speculative symbolic {PathFinder}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--5", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382792", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Recently, symbolic execution has gained a significant progress in its techniques and applications. However, in practice, scalability is still a key challenge for symbolic execution. In this paper, we present S2PF, which improves the scalability of Symbolic PathFinder by integrating speculative symbolic execution with the general heuristic search framework. In addition, two optimizations are proposed to improve the speculative symbolic execution in S2PF. Experimental results on six programs show that, S2PF can reduce the solver invocations by 36.4\% to 48.7\% (with an average of 40.3\%), and save the search time by 30.6\% to 43.5\% (with an average of 35\%).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bell:2012:RSIa, author = "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser and Swapneel Sheth", title = "Report from the {Second International Workshop on Games and Software Engineering (GAS 2012)}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--6", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382763", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Meneely:2012:ICM, author = "Andrew Meneely and Oluyinka Williams", title = "Interactive churn metrics: socio-technical variants of code churn", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--6", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382785", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "A central part of software quality is finding bugs. One method of finding bugs is by measuring important aspects of the software product and the development process. In recent history, researchers have discovered evidence of a ``code churn'' effect whereby the degree to which a given source code file has changed over time is correlated with faults and vulnerabilities. Computing the code churn metric comes from counting source code differences in version control repositories. However, code churn does not take into account a critical factor of any software development team: the human factor, specifically who is making the changes. In this paper, we introduce a new class of human-centered metrics, ``interactive churn metrics'' as variants of code churn. Using the git blame tool, we identify the most recent developer who changed a given line of code in a file prior to a given revision. Then, for each line changed in a given revision, determined if the revision author was changing his or her own code (``self churn''), or the author was changing code last modified by somebody else (``interactive churn''). We derive and present several metrics from this concept. Finally, we conducted an empirical analysis of these metrics on the PHP programming language and its post-release vulnerabilities. We found that our interactive churn metrics are statistically correlated with post-release vulnerabilities and only weakly correlated with code churn metrics and source lines of code. The results indicate that interactive churn metrics are associated with software quality and are different from the code churn and source lines of code.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wang:2012:BPS, author = "Wenyuan Wang and Zheng Zhang", title = "Balanced partition scheme for distributed caching systems to solve load imbalance problems", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--6", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382772", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Distributed caching system is usually used to alleviate database load in constructing an enterprise web application system. It helps to speed up dynamic web applications. In order to improve the utilization of caching cluster, an appropriate data partitioning and placement scheme is usually applied. This paper proposes a Balanced Partition Scheme (BPS) to solve load imbalance problems and highly skewed data requests in web application. In the BPS, which is based on consistent hash algorithm, the partition and placement schemes are designed respectively to guarantee a system's load balance even when the requests of this system are highly skewed. The range of hash function is divided into several groups equally and those groups will be relocated when caching nodes are overloaded. The implementation and evaluation of the BPS is also presented in this paper. The effectiveness of the BPS has been verified in the simulation experiment and the BPS can successfully solve load imbalance problems when faced with a large number of get/set requests.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Caglayan:2012:IOA, author = "Bora Caglayan and Ayse Bener", title = "Issue ownership activity in two large software projects", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--7", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382786", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Issue management is one of the major challenges of software development teams. Balanced workload allocation of developers who are responsible for the maintenance of the software product would impact the long-term reliability of the product. In this paper, we analyse the issue report, issue ownership, and issue resolve patterns of two large software products over a period of time. We use GINI index to estimate the inequalities in issue ownership over time. Our results indicate that a small group of developers tends to take the ownership of a large portion of new issues especially when the active issue count is relatively high in the software development life cycle. We discuss the implications of this trend and propose long-term issue management strategies to deal with them.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Colombo:2012:PSS, author = "Regina Thienne Colombo and Marcelo Schneck Pess{\^o}a and Ana Cervigni Guerra and Amandio Balc{\~a}o Filho and C{\'e}lio Caruso Gomes", title = "Prioritization of software security intangible attributes", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--7", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382781", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Intangible elements, such as value ranges of software security properties (e.g., confidentiality, integrity and availability), can be seen as resources to enforce software security. There are no standard units regarding these properties, turning their measurement into a difficult process. On the other hand, we can measure or estimate priorities for intangible elements from tangible ones, since their priorities are proportional. The priorities of tangible resources can be used to assign values to the priorities of intangible resources through the experience of the involved analysts. In this paper, we present a theoretical process based on mathematical constructs to score the priority and to estimate measures of software security attributes. This process causes the complex systems decomposition into simpler and smaller systems, thus allowing the estimation of properties that will help the understanding and measurement of software security properties. Our results provide a model for access security; the priority score of security attributes is calculated using the AHP methodology. We illustrate the application of our approach in a Web management system for governmental research institutions, presenting results that may support managers in the prioritization, evaluation and management of security requirements related to Web applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lago:2012:RIW, author = "Patricia Lago and Grace A. Lewis and Andreas Metzger and Vladimir Tosic and Domenico Bianculli and Antinisca {Di Marco} and Andrea Polini and Pierluigi Plebani", title = "Report of the {4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2012)}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--7", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382764", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2012) was held at the International Conference on Software Engineering, ICSE 2012, on June 4, 2012. The special theme of this 4th edition of PESOS was ``The Internet of Services.'' PESOS 2012 brought together software engineering researchers from academia and industry, as well as practitioners working in the areas of service-oriented systems, to discuss research challenges, recent developments, novel application scenarios, as well as methods, techniques, experiences, and tools to support engineering, evolution and adaptation of large-scale, highly-dynamic service-oriented systems. For the first time, PESOS featured a special session on ``The Quest for Case Studies.'' This effort created an initial reference set of case studies, hosted on a publicly-available repository, for the research community in service-oriented systems. The multiple discussions throughout the day resulted in the identification service requirements for the Internet of Services.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2012:PMD, author = "Indu Singh and Manoj Kumar", title = "A proposed model for data warehouse user behaviour using intrusion detection system", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--7", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382771", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Data Warehouse (DW) systems maintain sensitive and crucial information, which is integrated from various heterogeneous sources of organization. With the ever increasing deployment and usage of networks, these systems are becoming more vulnerable to malicious attacks. With the increased number of attacks, intrusion detection has become vital part of Information Security. In this paper, we have proposed a model for analyzing and detecting anomalous events based on user behavior analysis through usage patterns, user profiles and session management. After monitoring the events in the system, if any intrusion activity occurs, then alerts are issued to system administrators. Since a user profile is not necessarily fixed but rather it evolves with changing time, so a dynamic user behavior modeling is represented as a sequence of events and combination of fact and dimension tables accessed by the users. In this way, DW systems may be protected by the malicious attacks.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hofer:2012:AWI, author = "Birgit Hofer and Franz Wotawa and Rui Abreu", title = "{AI} for the win: improving spectrum-based fault localization", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--8", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382784", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "A considerable amount of time in software engineering is spent in debugging. In practice, mainly debugging tools which allow for executing a program step-by-step and setting break points are used. This debugging method is however very time consuming and cumbersome. There is a need for tools which undertake the task of narrowing down the most likely fault locations. These tools must complete this task with as little user interaction as possible and the results computed must be beneficial so that such tools appeal to programmers. In order to come up with such tools, we present three variants of the well-known spectrum-based fault localization technique that are enhanced by using methods from Artificial Intelligence. Each of the three combined approaches outperforms the underlying basic method concerning diagnostic accuracy. Hence, the presented approaches support the hypothesis that combining techniques from different areas is beneficial. In addition to the introduction of these techniques, we perform an empirical evaluation, discuss open challenges of debugging and outline possible solutions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lochmann:2012:BIA, author = "Klaus Lochmann", title = "A benchmarking-inspired approach to determine threshold values for metrics", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--8", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382782", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In order to assess software quality by software metrics, usually, thresholds for metric values are needed. A common problem is to define reasonable threshold values. One possible solution is to use a benchmarking approach: the threshold value for a metric is calculated based on the metric values of a set of systems, which are called benchmarking base. A relevant question is, how the used benchmarking base influences the result of the software quality assessment. Based on the quality assessment approach of Quamoco, we conduct a series of experiments, using different benchmarking bases. For each benchmarking base a quality assessment of a series of test systems is conducted. We analyze the whether the quality assessment results of the test systems are concordant for different benchmarking bases. The main findings are: (1) The bigger the benchmarking base, the less divergent are the rankings, and the less is the variance of the results. (2) The size of the systems contained within a benchmarking base does not influence the results, i.e. a benchmarking base containing small systems works equally well for small and large systems, and vice versa. These results show that benchmarking is a feasible approach for determining threshold values.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Machado:2012:STP, author = "Ivan do Carmo Machado and John D. McGregor and Eduardo Santana de Almeida", title = "Strategies for testing products in software product lines", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--8", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382783", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The software product line engineering strategy enables the achievement of significant improvements in quality through reuse of carefully crafted software assets across multiple products. However, high levels of quality in the software product line assets, which are used to create products, must be accompanied by effective and efficient test strategies for the products in the software product line. The goal of this study is to understand which strategies for testing products in software product lines have been reported in the literature, enabling discussions on the significant issues, and also pointing out further research directions. A systematic literature review was carried out that identified two hundred seventy-three papers, published from the years 1998 and early in 2012. From such a set of papers, a systematic selection resulted in forty-one relevant papers. The analysis of the reported strategies comprised two important aspects: the selection of products for testing, and the actual test of products. The findings showed a range of strategies, dealing with both aspects, but few empirical evaluations of their effectiveness have been performed, which limits the inferences that can be drawn.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Misra:2012:JSC, author = "Janardan Misra and Annervaz KM and Vikrant Kaulgud and Shubhashis Sengupta and Gary Titus", title = "{Java} source-code clustering: Unifying syntactic and semantic features", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--8", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382766", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a report from an international workshop on ``Social and Algorithmic Issues in Business Support'' (SAIBS), which was organized in conjunction with the 16th ADBIS Conference in Poznan, Poland, on September 17, 2012. The main focus of this workshop was to provide a venue for the discussion whether social stands in opposition to algorithmic or systematic. We analyzed social contribution to business processes taking into account possible benefits and risk factors. Questions raised in collected research and discussion related to how far business could relay on social input and what were the limits or what were the areas where introducing crowdsourced components might increase overall risk value to unacceptable level? Algorithmic approach to observe and collect social behaviour was discussed in the context of internet auctions participants and car drivers equipped in mobile application for instant route planning and collecting feedback cartracking data. Having in mind Andrew Keen's critique of social contribution in Web 2.0-related phenomena we looked for the Wisdom of Crowds [1]. Collected conclusions and further dissemination of research results should lead to an improvement in utilizing social impact on software development and business processes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Brahmasani:2012:PXA, author = "Siva Brahmasani and Subramanian Selvakumar and E. Sivasankar", title = "Prevention of {XSS} attacks using {STCD}: Server side tagging and client side differentiation", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--9", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382768", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Variability (the ability of a software system or software artifact to be adapted for use in a specific context) is reflected in and facilitated through the software architecture. The Second International Workshop on Variability in Software Architecture (VARSA) was held in conjunction with the Joint 10th Working IEEE/IFIP Conference on Software Architecture and 6th European Conference on Software Architecture 2012 in Helsinki, Finland. The workshop aimed at exploring current and emerging methods, languages, notations technologies and tools to model, implement, and manage variability in the software architecture. It featured one industrial talk, five research paper presentations, and three working group discussions. Working groups discussed topics that emerged during the workshop. This report summarizes the themes of the workshop and presents the results of the working group discussions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mrunalini:2012:DPM, author = "M. Mrunalini and T. V. Suresh Kumar and K. Rajani Kanth", title = "Dynamic process model for identifying modified data using mobile agents in real time {ETL} processes", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--9", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382767", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Usability and accessibility issues are common causes why software fails to meet user requirements. However, requirements engineers still focus on functional requirements and might ignore to also elicit system usability and accessibility requirements. This is a high risk which can lead to project and software failure. Improving the usability and accessibility of a system in a later development stage is costly and time consuming. Targeting these concerns, the workshop envisioned that research must address the proper integration of system usability and accessibility requirements into the requirements engineering process and also must focus on how to manage and control the evaluation of these requirements in a systematic way. UsARE 2012 provided a platform for discussing issues which are relevant for both fields, the Requirements Engineering (RE) and the Human Computer Interaction (HCI). The workshop aim was to bring\ together people from these two communities (RE and HCI) to explore this integration. Researchers and practitioners were invited to submit contributions including problem statements, technical solutions, experience reports, planned work and vision papers. Envisioned results may help aligning RE and HCI processes in order to overcome open issues in these fields.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kaur:2012:MVC, author = "Parminder Kaur and Hardeep Singh", title = "A Modified Version Control Tool for Component-Based Systems", journal = j-SIGSOFT, volume = "37", number = "6", pages = "1--10", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382765", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 8th International Conference on the Quality of Information and Communications Technology (QUATIC 2012) took place in Lisbon, Portugal, from 3 to 6 September 2012. QUATIC serves as a forum for disseminating advanced methods, techniques and tools for supporting quality approaches to ICT engineering and management. The Conference Program of the 2012 edition was organized on a series of Thematic Tracks on the first day, each corresponding to a specific topic of interest, and a Main Track on the second and third days of the conference, with keynote speakers and extended paper presentations selected among the best papers of the thematic tracks. This short report summarizes the paper and keynote presentations at QUATIC 2012.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bernstein:2012:TLT, author = "Larry Bernstein", title = "Things i learned from taming software development", journal = j-SIGSOFT, volume = "37", number = "6", pages = "5--6", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382757", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Grechanik:2012:RBA, author = "Mark Grechanik", title = "Random benchmark application generation for evaluating program analysis and testing tools", journal = j-SIGSOFT, volume = "37", number = "6", pages = "6--7", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382758", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2012:LWD, author = "Robert Schaefer", title = "Limitations of web design", journal = j-SIGSOFT, volume = "37", number = "6", pages = "7--8", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382759", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2012:SEEe, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "8--9", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382760", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2012:SNSf, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "10--18", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382780", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2012:RPf, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "37", number = "6", pages = "19--23", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382779", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Garbervetsky:2012:RIW, author = "Diego Garbervetsky and Sunghun Kim", title = "Report from {2nd International Workshop on Developing Tools as Plug-Ins (TOPI 2012)}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "24--27", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382775", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The International Workshop on Developing Tools as Plug-Ins (TOPI) is a venue for researchers and practitioners interested in plug-in development. The main interest is understanding the opportunities and challenges of developing tools as plug-ins, and thus, we seek for discussions regarding the characteristics of good plug-ins, interoperability requirements to making tools available across platforms, recent successful tools as plug-ins as well as foreseen medium and long term challenges of tools as plug-ins. The second edition of this workshop, TOPI 2012 was co-located with the International Conference on Software Engineering (ICSE 2012). TOPI 2012 received a total of 32 submissions. Among them, 14 were accepted as full papers and 4 as short papers. The audience during the whole workshop ranged from 25 to 30 participants. The final program comprised position papers including new proposals for plug-in architectures as well as their interaction with development environments and run-times, and papers discussing the implementation of different kind of tools as plug-ins. This report describes the main results of TOPI 2012.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bell:2012:RSIb, author = "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser and Swapneel Sheth", title = "Report from the {Second International Workshop on Games and Software Engineering (GAS 2012)}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "26--27", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382776", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Second International Workshop on Games and Software Engineering (GAS 2012) was held in June 2012, collocated with ICSE 2012 in Zurich, Switzerland. GAS 2012 explores issues that crosscut the software engineering and the game engineering communities. Advances in game engineering techniques can be adopted by the software engineering community to develop more engaging applications across diverse domains: education; healthcare; fitness; sustainable activities (e.g., recycling awareness); and so on. Successful computer games feature a property that is not always found in traditional software: they are highly engaging. Engaging games enthrall players and result in users willing to spend increasing amounts of time and money playing them. Nine submissions were accepted for the workshop, which also featured a panel session and an informal poster session.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gruner:2012:FWF, author = "Stefan Gruner and Bernhard Rumpe", title = "{FormSERA Workshop on Formal Methods in Software Engineering Rigorous and Agile Approaches}: 2nd of {June 2012} at {ICSE'2012} in {Z{\"u}rich (CH)}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "28--30", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382777", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This report summarizes the activities and results of the FormSERA workshop on Formal Methods in Software Engineering --- Rigorous and Agile Approaches. The workshop took place on the 2nd of June 2012 in Z{\"u}rich (CH) under the umbrella of the 34th International Conference on Software Engineering, ICSE 2012, see http://www.formsera.org/.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tekinerdogan:2012:FTS, author = "Bedir Tekinerdogan", title = "{First Turkish Software Product Line Engineering Workshop} summary", journal = j-SIGSOFT, volume = "37", number = "6", pages = "30--34", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382778", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software reuse has been a goal of the software community since the early days of software engineering. In this context software product line engineering (SPLE) has gained a broad interest in both academic institutions and industry. This trend can also be observed in Turkey. In the recent years an increasing number of software companies in Turkey have adopted a SPLE approach while others are planning to make the transition. This paper summarizes the results of the First Turkish Software Product Line Engineering Workshop that has been organized in Ankara in June 2012. The primary goal of the workshop was to reflect on the state of practice in SPLE in Turkey. For this five leading SPLE companies in Turkey have shared their experiences in adopting SPLE, and using interactive discussions a research agenda for SPLE in Turkey has been defined. We report both on the experiences from the workshop and the resulting research topics.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Swamy:2012:BRSb, author = "Harisankar Krishna Swamy", title = "Book Review: {{\booktitle{Structured parallel programming patterns for efficient computation}} by Michael McCool, Arch D. Robison and James Reinders}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "43--43", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382773", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bangalore:2012:BRA, author = "Srinivasan M. Bangalore", title = "Book Review: {{\booktitle{Agile Analytics}} by Ken Collier}", journal = j-SIGSOFT, volume = "37", number = "6", pages = "43--44", month = nov, year = "2012", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2382756.2382774", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:18 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2013:CLS, author = "Alok Mishra and Deepti Mishra", title = "A curriculum for large scale software development", journal = j-SIGSOFT, volume = "38", number = "1", pages = "1--2", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413042", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Large scale software developments are becoming common in software development organizations. Getting exposure to work on similar projects is very significant for this course. Here, major components of large scale software development curriculum are discussed along with suggestions towards making it a successful course of software engineering curriculum.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Couto:2013:CDE, author = "Cesar Couto and Cristiano Maffort and Rogel Garcia and Marco Tulio Valente", title = "{COMETS}: a dataset for empirical research on software evolution using source code metrics and time series analysis", journal = j-SIGSOFT, volume = "38", number = "1", pages = "1--3", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413047", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper documents a time series dataset on the evolution of seventeen object-oriented metrics extracted from ten open-source systems. By making this dataset public our goal is to assist researchers with interest in software evolution analysis and modeling.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Pande:2013:OCS, author = "Jeetendra Pande and Christopher J. Garcia and Durgesh Pant", title = "Optimal component selection for component based software development using pliability metric", journal = j-SIGSOFT, volume = "38", number = "1", pages = "1--6", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413044", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Component Based Software Development (CBSD) has gained widespread acceptance as it often results in higher quality software with a significant reduction in development time and costs. A key idea behind CBSD is the extensive reuse and composition of preexisting modules into new software. In this paper we introduce the pliability metric, which is well suited to a component-based orientation and extends previous metrics. Pliability is a flexible measure that assesses software quality across different quality attributes in terms of the quality of its components. In addition, we have developed an optimal component selection model based on integer programming, for maximizing pliability. Through computational experimentation we demonstrate that this model is capable of finding optimal solutions to problems with a very large number of components and requirements in a short time.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bedi:2013:MMT, author = "Punam Bedi and Vandana Gandotra and Archana Singhal and Himanshi Narang and Sumit Sharma", title = "Mitigating multi-threats optimally in proactive threat management", journal = j-SIGSOFT, volume = "38", number = "1", pages = "1--7", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413041", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In turbulent economic times, the cost effectiveness of security measures is of the utmost importance when designing safeguards or countermeasures. This paper presents an optimal approach: MMT-O, Mitigating Multi-Threats Optimally, to meet the above challenges. The proposed approach is based on an optimum mitigation path set generation algorithm that provides optimal plans for threat/vulnerability management which can be adopted at the design level of the software life cycle. In MMT-O, a multi-threat attack graph is generated by combining all of the individual threats responsible for security compromise of the system. It identifies a unique set of attacks needing mitigation by removing redundant nodes, as an attack can be a part of multiple threats. The proposed algorithm, implemented in Java, provides the minimum mitigation paths required to be blocked to avert the threat. Countermeasures using a multi-agent system are inducted in these identified mitigation paths to avert the threat optimally. The proposed approach has been applied on different test cases and the results validate its economic justification over traditional security solutions as a part of proactive threat management.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saxena:2013:UML, author = "Vipin Saxena and Deepak Arora and Nimesh Mishra", title = "{UML} modeling of load optimization for distributed computer systems based on genetic algorithm", journal = j-SIGSOFT, volume = "38", number = "1", pages = "1--7", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413043", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Distributed computing has now become one of the most efficient network system configurations to exhibit parallelism in loosely coupled systems. These systems are known for better reliability, availability, scalability and robustness, intended to provide high performance computing in a very efficient manner. The composition of distributed systems consists of multiple autonomous computers that can be geographically dispersed and interconnected with each other to provide optimum resource utilization. The degree of resource utilization is one of the key criteria for evaluating the performance of such systems. We propose a genetic-algorithm-based approach to load optimization in a distributed computing environment. Genetics algorithm has been adapted from the biological gene theory. Since it shows the existence of the fittest chromosome from the sample chromosomes population, it may be used to find the most optimum solution for any problem. This research work demonstrates the implication of genetic algorithms to optimize the overall waiting time for a set of processes to be executed on a set of servers. In order to understand the design complexity, we modeled the proposed approach using UML class and sequence diagrams. The results of the proposed model have been found beneficial when implemented and tested under various test scenarios using C++.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2013:ESE, author = "Gagandeep Singh and Hardeep Singh", title = "Effect of software evolution on metrics and applicability of {Lehman}'s laws of software evolution", journal = j-SIGSOFT, volume = "38", number = "1", pages = "1--7", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413046", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nagpal:2013:ASE, author = "Geeta Nagpal and Moin Uddin and Arvinder Kaur", title = "Analyzing software effort estimation using k means clustered regression approach", journal = j-SIGSOFT, volume = "38", number = "1", pages = "1--9", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413045", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software estimation is an area where more assurances have been broken than in any other area of software development. Numerous studies attempting new and reliable software effort estimation techniques have been proposed but no consensus as to which techniques are the most appropriate has been reached so far. Due to the intangible nature of ``software'', effort estimation with a high level of accuracy remains a dream for developers. It is unlikely to expect very accurate estimates of development effort because of the inherent uncertainty in software projects and the complex and dynamic interaction of factors that impact software development. Heterogeneity exists in software engineering datasets because data is obtained from diverse sources. This can be reduced by defining certain relationships between the data values by classifying them into different clusters. This study focuses on how the combination of clustering and regression techniques can reduce the potential problem in effectiveness of predictive efficiency due to heterogeneity of the data. Using a clustered approach creates subsets of data having a degree of homogeneity that enhances prediction accuracy. It was also observed in this study that ridge regression performs better than other regression techniques. Another key finding is that by selecting a subset of highly predictive attributes using Grey relational analysis a significant improvement in prediction can be achieved.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Huang:2013:TOQ, author = "Shihong Huang and Dragutin Petkovic and Kazunori Okada and Marc Sosnick and Shenhaochen Zhu and Rainer Todtenhoefer", title = "Toward objective and quantitative assessment and prediction of teamwork effectiveness in software engineering courses", journal = j-SIGSOFT, volume = "38", number = "1", pages = "7--9", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413071", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2013:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "10--19", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413072", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2013:RPa, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "38", number = "1", pages = "20--26", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413073", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bencomo:2013:RIW, author = "Nelly Bencomo and Gordon Blair and Sebastian G{\"o}tz and Brice Morin and Bernhard Rumpe", title = "Report on the {7th International Workshop on Models@Runtime}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "27--30", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413061", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 7th edition of the workshop Models@Runtime was held at the 15th International Conference on Model Driven Engineering Languages and Systems (MODELS). The workshop took place in the city of Innsbruck, Austria, on the 2nd of October 2012. The workshop was organised by Nelly Bencomo, Gordon Blair, Sebastian G{\~A}\P tz, Brice Morin and Bernhard Rumpe. It was attended by at least 48 people. In this report we present a synopsis of the presentations and breakout discussions that took place during the workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lago:2013:EIC, author = "Patricia Lago and Rick Kazman and Niklaus Meyer and Maurizio Morisio and Hausi A. M{\"u}ller and Frances Paulisch", title = "Exploring initial challenges for green software engineering: summary of the first {GREENS} workshop, at {ICSE 2012}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "31--33", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413062", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The GREENS workshop provides a forum for practitioners and academics to share knowledge, ideas, practices and current results related to green and sustainable software engineering. This first workshop was held at ICSE 2012 in Zurich, Switzerland. It featured a keynote talk, twelve research position statements and two breakout sessions that discussed topics that ranged from bringing sustainability and energy efficiency into all software lifecycle stages, to green measures and estimations, practices, notations, and tools to both greening the software engineering process, and greening the resulting Information and Communication Technology systems. This report presents the themes of the workshop, summarizes the results of the discussions held in the breakout sessions, as well as the identified research challenges.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bell:2013:RSI, author = "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser and Swapneel Sheth", title = "Report from the {Second International Workshop on Games and Software Engineering (GAS 2012)}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "34--35", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413063", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lago:2013:RIW, author = "Patricia Lago and Grace A. Lewis and Andreas Metzger and Vladimir Tosic and Domenico Bianculli and Antinisca {Di Marco} and Andrea Polini and Pierluigi Plebani", title = "Report of the {4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2012)}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "35--38", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413064", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2012) was held at the International Conference on Software Engineering, ICSE 2012, on June 4, 2012. The special theme of this 4th edition of PESOS was ``The Internet of Services.'' PESOS 2012 brought together software engineering researchers from academia and industry, as well as practitioners working in the areas of service-oriented systems, to discuss research challenges, recent developments, novel application scenarios, as well as methods, techniques, experiences, and tools to support engineering, evolution and adaptation of large-scale, highly-dynamic service-oriented systems. For the first time, PESOS featured a special session on ``The Quest for Case Studies.'' This effort created an initial reference set of case studies, hosted on a publicly-available repository, for the research community in service-oriented systems. The multiple discussions throughout the day resulted in the identification service requirements for the Internet of Services.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kaur:2013:MVC, author = "Parminder Kaur and Hardeep Singh", title = "A Modified Version Control Tool for Component-Based Systems", journal = j-SIGSOFT, volume = "38", number = "1", pages = "39--41", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2382765", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 8th International Conference on the Quality of Information and Communications Technology (QUATIC 2012) took place in Lisbon, Portugal, from 3 to 6 September 2012. QUATIC serves as a forum for disseminating advanced methods, techniques and tools for supporting quality approaches to ICT engineering and management. The Conference Program of the 2012 edition was organized on a series of Thematic Tracks on the first day, each corresponding to a specific topic of interest, and a Main Track on the second and third days of the conference, with keynote speakers and extended paper presentations selected among the best papers of the thematic tracks. This short report summarizes the paper and keynote presentations at QUATIC 2012.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Misra:2013:JSC, author = "Janardan Misra and Annervaz KM and Vikrant Kaulgud and Shubhashis Sengupta and Gary Titus", title = "{Java} source-code clustering: Unifying syntactic and semantic features", journal = j-SIGSOFT, volume = "38", number = "1", pages = "41--43", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2382766", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a report from an international workshop on ``Social and Algorithmic Issues in Business Support'' (SAIBS), which was organized in conjunction with the 16th ADBIS Conference in Poznan, Poland, on September 17, 2012. The main focus of this workshop was to provide a venue for the discussion whether social stands in opposition to algorithmic or systematic. We analyzed social contribution to business processes taking into account possible benefits and risk factors. Questions raised in collected research and discussion related to how far business could relay on social input and what were the limits or what were the areas where introducing crowdsourced components might increase overall risk value to unacceptable level? Algorithmic approach to observe and collect social behaviour was discussed in the context of internet auctions participants and car drivers equipped in mobile application for instant route planning and collecting feedback car-tracking data. Having in mind Andrew Keen's critique of social contribution in Web 2.0-related phenomena we looked for the Wisdom of Crowds [1]. Collected conclusions and further dissemination of research results should lead to an improvement in utilizing social impact on software development and business processes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mrunalini:2013:DPM, author = "M. Mrunalini and T. V. Suresh Kumar and K. Rajani Kanth", title = "Dynamic process model for identifying modified data using mobile agents in real time {ETL} processes", journal = j-SIGSOFT, volume = "38", number = "1", pages = "43--46", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2382767", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Usability and accessibility issues are common causes why software fails to meet user requirements. However, requirements engineers still focus on functional requirements and might ignore to also elicit system usability and accessibility requirements. This is a high risk which can lead to project and software failure. Improving the usability and accessibility of a system in a later development stage is costly and time consuming. Targeting these concerns, the workshop envisioned that research must address the proper integration of system usability and accessibility requirements into the requirements engineering process and also must focus on how to manage and control the evaluation of these requirements in a systematic way. UsARE 2012 provided a platform for discussing issues which are relevant for both fields, the Requirements Engineering (RE) and the Human Computer Interaction (HCI). The workshop aim was to bring\ together people from these two communities (RE and HCI) to explore this integration. Researchers and practitioners were invited to submit contributions including problem statements, technical solutions, experience reports, planned work and vision papers. Envisioned results may help aligning RE and HCI processes in order to overcome open issues in these fields.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Brahmasani:2013:PXA, author = "Siva Brahmasani and Subramanian Selvakumar and E. Sivasankar", title = "Prevention of {XSS} attacks using {STCD}: Server side tagging and client side differentiation", journal = j-SIGSOFT, volume = "38", number = "1", pages = "46--49", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2382768", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Variability (the ability of a software system or software artifact to be adapted for use in a specific context) is reflected in and facilitated through the software architecture. The Second International Workshop on Variability in Software Architecture (VARSA) was held in conjunction with the Joint 10th Working IEEE/IFIP Conference on Software Architecture and 6th European Conference on Software Architecture 2012 in Helsinki, Finland. The workshop aimed at exploring current and emerging methods, languages, notations technologies and tools to model, implement, and manage variability in the software architecture. It featured one industrial talk, five research paper presentations, and three working group discussions. Working groups discussed topics that emerged during the workshop. This report summarizes the themes of the workshop and presents the results of the working group discussions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2013:SLT, author = "Vineet Sharma and S. A. M. Rizvi and Arun Sharma", title = "Software Licenses --- A tool to control distribution of software", journal = j-SIGSOFT, volume = "38", number = "1", pages = "49--51", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2382769", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The International Workshop on Developing Tools as Plug-Ins (TOPI) is a venue for researchers and practitioners interested in plug-in development. The main interest is understanding the opportunities and challenges of developing tools as plug-ins, and thus, we seek for discussions regarding the characteristics of good plug-ins, interoperability requirements to making tools available across platforms, recent successful tools as plug-ins as well as foreseen medium and long term challenges of tools as plug-ins. The second edition of this workshop, TOPI 2012 was co-located with the International Conference on Software Engineering (ICSE 2012). TOPI 2012 received a total of 32 submissions. Among them, 14 were accepted as full papers and 4 as short papers. The audience during the whole workshop ranged from 25 to 30 participants. The final program comprised position papers including new proposals for plug-in architectures as well as their interaction with development environments and run-times, and papers discussing the implementation of different kind of tools as plug-ins. This report describes the main results of TOPI 2012.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Beshilas:2013:BRC, author = "Bill Beshilas", title = "Book Review: {{\booktitle{Collaborative enterprise architecture}} by Stefan Bente, Uwe Bombosch, and Shailendra Langade}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "54--54", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413051", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chapelle:2013:BRO, author = "Gregory Chapelle", title = "Book Review: {{\booktitle{The official Ubuntu book}}, seventh edition by Matthew Helmke and Amber Graner}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "54--55", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413052", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DelRa:2013:BRJ, author = "William {Del Ra III}", title = "Book Review: {{\booktitle{Java application architecture: modularity patterns with examples using OSGi}} by Kirk Knoernschild}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "55--55", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413053", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kienle:2013:BRG, author = "Holger M. Kienle", title = "Book Review: {{\booktitle{Grounded innovation: strategies for creating digital products}} by Lars Erik Holmquist}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "55--56", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413054", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Paige:2013:BRS, author = "Michael Paige", title = "Book Review: {{\booktitle{Sams teach yourself jQuery mobile in 24 hours}} by Phil Dutson}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "56--57", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413055", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sampaio:2013:BRQ, author = "Alberto Sampaio", title = "Book Review: {{\booktitle{Quantifying the user experience: practical statistics for user research}} by Jeff Sauro and James R. Lewis}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "57--58", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413056", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saur:2013:TLP, author = "Joe Saur", title = "Think like a programmer: an introduction to creative problem solving by V. {Anton} Spraul", journal = j-SIGSOFT, volume = "38", number = "1", pages = "58--58", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413057", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Stobie:2013:BRX, author = "Keith Stobie", title = "Book Review: {{\booktitle{OS X Mountain Lion Pocket Guide}} by Chris Seibold}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "59--59", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413058", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRM, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Modern embedded computing: designing connected, pervasive, media-rich systems}} by Peter Barry and Patrick Crowley}", journal = j-SIGSOFT, volume = "38", number = "1", pages = "59--60", month = jan, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2413038.2413059", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:22 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Catal:2013:TEB, author = "Cagatay Catal", title = "Teaching evidence-based software engineering to master students: a single lecture within a course or an entire semester-long course?", journal = j-SIGSOFT, volume = "38", number = "2", pages = "1--2", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439981", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper, we summarize our perspective on teaching evidence-based software engineering (EBSE) to master students. In this semester, we aimed to investigate this subject as a single lecture within a master course called Software Architecture instead of an entire semester-long course called EBSE. Each of the students delivered a systematic mapping study report related to the software architecture at the end of the semester and these project reports showed that this teaching approach is quite useful for master students even though this teaching activity is too short.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rabelo:2013:ACG, author = "Ricardo A. C. Rabelo and Hendrik T. Macedo and Eduardo O. Freire and Rodrigo M. Oliveira", title = "Automatic code generation of {SIMUROSOT} game strategies: an approach based on finite state machines", journal = j-SIGSOFT, volume = "38", number = "2", pages = "1--8", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439983", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Robot soccer is a multidisciplinary research field of growing academic interest. Scientific competitions worldwide have driven major technological advances in the field, since research institutes and universities often enroll their robotic teams and present the developments achieved during the previous year. The FIRA is a leading international organization that promotes such type of competition. One of its various competition categories is that of virtual robots competing in a simulation platform called SIMUROSOT. This 3D simulation platform is available so that researchers and students can develop robot teams and test their performance appropriately and repeatedly. The major problem with the mainstream encoding mechanism used in the preparation of robot teams for SimuroSot is the lack of a formal process to standardize the programming and model the game strategies. Such lack of standardization causes several limitations on the competition as a science promoter, namely: (1) the difficulty of understanding other's code, (2) absence of abstraction for the conceiving of game strategies, (3) need for high programming skills in order to produce effective game strategies and (4) lack of clear separation between robots movimentation primitives and specific application domain concerns --- in this case, the soccer domain. This paper proposes a semi-formal specification for the modeling of team game strategies to the FIRA SIMUROSOT category. This specification defines two levels of mapping: (1) mapping of the application domain information --- in this case, the soccer competition --- to Finite State Machines and (2) mapping of Finite State Machines that represent game strategies of a team to their respective coding in a target programming language, making use of coding standards that ensure the readability and maintainability of the final code. Encodings of game strategies in the programming language Lingo has been provided following the proposal. The error-free execution of such encodings on the simulation platform shows the proposal feasibility.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tiwari:2013:RRT, author = "Rajeev Tiwari and Noopur Goel", title = "Reuse: reducing test effort", journal = j-SIGSOFT, volume = "38", number = "2", pages = "1--11", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439982", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Testing effort consumes more than half of all development effort and is one of the important factors, which obstruct quality assurance. Software reuse enhances quality and productivity and at the same time reduces the time-to-market of the software products. As reuse applies to the development process, so too, it applies to the testing process. In this paper, we discuss reuse-oriented test approaches, which are used to reduce the testing effort. Further, we present the state-of-the-art in reuse-oriented test approaches employed in reuse-oriented development processes. At the end of the current paper, we argue that the current trend is towards built-in test and model based testing in the applications developed through reusable software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Zage:2013:SSE, author = "Wayne Zage", title = "The security and software engineering research center {(S2ERC)}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "6--7", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439977", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2013:RLL, author = "Robert Schaefer", title = "Relay ladder logic considered harmful", journal = j-SIGSOFT, volume = "38", number = "2", pages = "8--9", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439978", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2013:SEEa, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "9--10", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439979", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2013:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "11--19", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439980", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2013:RPb, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "38", number = "2", pages = "20--25", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2440001", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ralph:2013:RFS, author = "Paul Ralph and Pontus Johnson and Howell Jordan", title = "Report on the {First SEMAT Workshop on General Theory of Software Engineering (GTSE 2012)}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "26--28", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439999", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Many academic disciplines have general theories, which apply across the discipline and underlie much of its research. Examples include the Big Bang theory (cosmology), Maxwell's equations (electrodynamics), the theories of the cell and evolution (biology), the theory of supply and demand (economics), and the general theory of crime (criminology). Software engineering, in contrast, has no widely-accepted general theory. Consequently, the SEMAT Initiative organized a workshop to encourage development of general theory in software engineering. Workshop participants reached broad consensus that software engineering would benefit from better theoretical foundations, which require diverse theoretical approaches, consensus on a primary dependent variable and better instrumentation and descriptive research.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lewis:2013:RIIa, author = "Grace A. Lewis and Anca Ionita and Marin Litoiu", title = "Report of the {2012 IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA 2012)}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "29--32", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439998", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 2012 IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA 2012) was held as a co-located event of the International Conference on Software Maintenance, ICSM 2012, on September 24, 2012. MESOCA 2012 brought together software engineering researchers from academia and industry, as well as practitioners, to share results and open issues in the area of maintenance and evolution of service-oriented and cloudbased systems. The many discussions throughout the day resulted in the identification of promising areas of research to address existing gaps and problems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Froberg:2013:BRD, author = "Scott Froberg", title = "Book Review: {{\booktitle{Distributed and cloud computing from parallel processing to the Internet of Things}} by Kai Hwang, Geoffry C. Fox, and Jack J. Dongarra}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "34--34", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439991", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/bibnet/authors/d/dongarra-jack-j.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{M:2013:BRL, author = "Srinivasan M.", title = "Book Review: {{\booktitle{Learning Rails 3}} by Simon St. Laurent, Edd Dumbill and Eric J. Gruber}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "34--34", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439992", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Froberg:2013:BRP, author = "Scott Froberg", title = "Book Review: {{\booktitle{Private cloud computing: consolidation, virtualization, and service-oriented infrastructure}} by Stephen R. Smoot, Nam K. Tan}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "35--35", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439994", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gvero:2013:BRO, author = "Igor Gvero", title = "Book Review: {{\booktitle{Observing the user experience}}, 2nd edition: a practitioner's guide to user research by Elizabeth Goodman, Mike Kuniavsky, and Andrea Moed}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "35--35", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439993", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Berzal:2013:BRS, author = "Fernando Berzal", title = "Book Review: {{\booktitle{Structured parallel programming}} by Michael McCool, James Reinders \& Arch Robison}", journal = j-SIGSOFT, volume = "38", number = "2", pages = "35--39", month = mar, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2439976.2439995", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Baliyan:2013:FMH, author = "Niyati Baliyan and Vidushi Sharma and Shivani", title = "A fuzzy model for high-level clones in software", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--4", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464531", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "High-level similarities in software, referred to as High-Level Clones (HLCs) may manifest themselves as behavior clones, concept clones, collocated simple clones or domain model clones [3]. The presence of such similarities may deter the maintainability of software, while identifying them may improve the reuse, reengineering, evolution and understandability of software [2]. This study proposes an integrated measure of high-level cloning, using a four input fuzzy model. It also proves that the calculated extent of high-level cloning is practically equal to the simulation result in the MATLAB's fuzzy toolbox.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Meng:2013:PBL, author = "Zhang Meng", title = "{PPCA-based} license plate detection algorithm", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--4", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464541", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Detection of license plates is a critical part of License Plate Recognition (LPR) systems. In this paper we employ methods based on Probabilistic Principal Component Analysis (PPCA) to extract license plate areas out of vehicle images, and apply an improved normalization step to data preprocessing. The analysis of our experiment shows that this algorithm achieves good accuracy dealing with still vehicle images.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2013:SPM, author = "Alok Mishra and Deepti Mishra", title = "Software project management tools: a brief comparative view", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--4", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464537", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The task of managing a software project can be an extremely complex one, drawing on many personal, team, and organizational resources. The quality of a software product is dependent on the process in which the project is completed. Time delays in software development project and low productivity tend to fall right to the bottom line. Recently, the evolution of project management tools for both software and non-software applications has been accelerating at a rapid pace, and the number of available products have grown significantly. There are many project management tools and software being developed everyday to help managers to automate the administration of individual projects or groups of projects during their life-cycle. This article presents a short comparison of popular software project management tools.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chaudhary:2013:ERA, author = "Ritika Chaudhary and Ram Chatterjee", title = "Essence of reusability in aspect-oriented systems", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--5", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464532", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Programmers practicing software development have long realized that reusability is an important area of concern --- it is an attribute of quality, which depicts the extent to which a module can be used again in different applications with slight modification. Software professionals often adopt the Module-oriented Approach (MOA) and / or the Object-Oriented Approach (OOA) to develop reusable software. However, these approaches do not address crosscutting concerns (such as logging, security etc.), which are scattered throughout the code and which if poorly done adversely affect reusability and maintainability. Readers may note that ``reusability'' is a quality attribute whose assessment remains quite underexplored. This paper discusses the importance of reusability as a quality attribute and its essence in Aspect-Oriented Systems. This paper has been split into Introduction, Quality Parameters, Conclusion and Future Scope. In the Introduction, the focus is on how Aspect-Oriented Software development addresses the problem of crosscutting concerns. Quality parameters emphasize the concept of reusability within the domains of Object-Oriented Programming and Aspect-Oriented Programming and signify the importance of assessing reusability in Aspect-Oriented Systems. In the future, maintainability will be one of the factors to be considered for assessment of Aspect-Oriented Systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rao:2013:OST, author = "K. Koteswara Rao and GSVP Raju and Srinivasan Nagaraj", title = "Optimizing the software testing efficiency by using a genetic algorithm: a design methodology", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--5", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464539", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper presents a design method for optimizing software-testing efficiency by identifying the most critical path clusters in a program. This is done by the application of soft computing techniques, specifically genetic algorithms. We develop a genetic algorithm that selects the software path clusters to test, which are weighted in accordance with the criticality of the path. Exhaustive software testing is rarely possible because it becomes intractable for even medium-sized software applications. Typically only parts of a program can be tested, but these parts are not necessarily the most error prone ones. Therefore, we are designing a more selective approach for testing the paths that are more critical, which results in improving the testing efficiency.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hasteer:2013:PAR, author = "Nitasha Hasteer and Abhay Bansal and B. K. Murthy", title = "Pragmatic assessment of research intensive areas in cloud: a systematic review", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--6", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464533", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Cloud computing is a name given to a set of systems for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is aimed at making an organization more agile and cost effective. Due to the rapid evolution of Cloud Computing in the recent past, it is relevant to investigate the key areas of research of this technology. In this paper, we present a systematic review of research intensive areas in the field of cloud computing. Research papers in the period from 2009 to 2012 were gathered. A total of 36 research papers were reviewed systematically and categorized into four broad categories based on the issues addressed by them. We identified that the majority of the research papers focused on Cloud Security. By systematically analyzing the work accomplished so far, the gaps and yet to be explored areas in this field are brought to light.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Malhotra:2013:DFT, author = "Ruchika Malhotra and Divya Tiwari", title = "Development of a framework for test case prioritization using genetic algorithm", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--6", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464536", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software Testing is a time and effort consuming part of the software development life cycle. Retesting a software application during the maintenance phase, with the entire test suite and additional test cases for the modifications in the software, within budget and time, is a challenge for software testers. Test Case Prioritization is used to overcome this problem by prioritizing the test cases in order to maximize certain testing objectives like fault detection rate, statement coverage, etc. In this paper, we propose a framework for test case prioritization that emphasizes a new metric, APBC$_m$ (modified Average Percentage of Block Coverage). This metric evaluates the rate of code coverage by incorporating knowledge about the significance of blocks of code in the form of weights. We have used this metric as fitness evaluation function in a Genetic Algorithm in order to evaluate the effectiveness of a test case sequence. We have also developed a tool that implements the Genetic Algorithm in the Java language in order to compute and validate the results. Thereafter, we use the tool for test case prioritization, and compare and assess the results with those produced by the tool when APBC (Average Percentage of Block Coverage) is used as fitness function.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{N:2013:MER, author = "Parimala N. and Ranjeet Kumar", title = "Mapping extended rationale diagrams to {OLAP} queries", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--6", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464538", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We propose a method that enables decision makers to formulate OLAP queries. Firstly, the decision maker's analysis requirements are expressed as an extended rationale diagram. Subsequently, using the extended rationale diagram, we verify whether it is possible to get the information from the data warehouse. If it is, we generate the outline of the corresponding OLAP query. If it is not, we inform the user about the missing information.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Zaidi:2013:MVE, author = "Taskeen Zaidi and Vipin Saxena", title = "Modeling and validation of execution of tasks on high speed network under distributed environment", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--6", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464540", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "During the past years, distributed computing approach has become an integral part of many of the software companies. This is because of low cost infrastructure involvement and faster execution of the tasks, sharing of resources, etc. In the year 2009, the Indian Government has established distributed network called as National Knowledge Network (NKN). The main objective of NKN is to connect all of the Indian universities, research institutions, computing labs, digital libraries, countrywide classrooms, etc. In the present paper, a well-known object-oriented Unified Modeling Language (UML) is used to construct a model for the execution of the tasks across a distributed network. Authors have designed a static step topology for the faster execution of tasks. Static and dynamic behaviors of the execution of the tasks are represented through UML class and state diagrams, respectively. For validation of the UML model, the state diagram is converted into a Finite State Machine (FSM) and different test cases are generated to validate the proposed model across distributed network environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rao:2013:CPS, author = "V. Bhujanga Rao and P. Seetha Ramaiah and K. Raja Kumar", title = "Clinical programming software to manage patient's data with a cochlear implant", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--7", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464535", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Auditory prostheses (AP) using Cochlear Implant System, a.k.a. bionic ears, are widely used electronic devices that electrically stimulate the auditory nerve using an electrode array, surgically placed in the inner ear for patients suffering from severe to profound senosorineural deafness. The AP mainly contains an external Body Worn Speech Processor (BWSP) and an internal Implantable Receiver Stimulator (IRS). The BWSP receives an external sound or speech and generates encoded speech data bits for transmission to the IRS via a Radio Frequency transcutaneous link to excite the electrode array. After surgical placement of the electrode array in the inner ear, the BWSP should be fine-tuned to achieve the 80 to 100\% speech reception abilities of the patient by an audiologist using Clinical Programming Software (CPS). The tuning process involves several tasks such as identifying the active electrode contacts, determining the detection and pain threshold of each active electrode, and loading these values into BWSP by reprogramming the BWSP. The main objective of this paper is to describe a simple personal-computer based, user-friendly CPS, which fine tunes the BWSP to achieve the best possible speech reception abilities of each patient and to perform post-operative fitting procedures by an audiologist. The CPS was developed to perform the post-operative fine tuning procedures such as (i) measurement of electrode tissue impedance, (ii) fitting to determine the hearing threshold and comfort levels for each active electrode, and (iii) reprogramming the speech processor using the identified threshold and comfort values. Finally, experimental results are presented.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2013:TTO, author = "Ajay Jain", title = "Touch target optimization technique using virtual finger-tip library", journal = j-SIGSOFT, volume = "38", number = "3", pages = "1--9", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464534", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Touch functionality is the latest mantra for consumers buying new smartphones or mobile devices. With devices screens becoming more compact, providing a user interface with easy navigation and effective usage is becoming increasingly difficult. Typically, the screens are designed using relevant design guidelines and work well for the general majority of people. However, every user is different. The way they handle the touch screen, the size of their finger-tips, everything is different. A single common UI design then fails to satisfy all the different users. Hence, there is a need to bridge the existing gap between the device UI screen design and the variances attached with users' touch inputs. Our latest work1, discussed in this paper, solves this challenge to a significant extent by providing a library of virtual finger-tip entries. Each finger-tip entry in the library is pre-attached with a specific surface area attached to it. These finger-tips, although virtual, are provided with the functionality that they act as wearable objects for a device user. Once worn, the device owner need not worry about their actual finger-tip size (that is, the surface area of user's finger on the device screen). Irrespective of a user's actual finger-tip size, when you place your finger on any icon on the screen, it uses exactly the same surface area that the virtual finger-tip uses. Virtual finger-tip sizes are calculated dynamically based on the relative size interpretations from the actual finger-tip size and the touch inputs to the device. Multiple virtual finger tips options are listed in the library enabling a device user to select the most appropriate one depending on the touch target they plan to work on.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2013:SEEb, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "38", number = "3", pages = "5--6", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464527", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Krishnamurthi:2013:AES, author = "Shriram Krishnamurthi", title = "Artifact evaluation for software conferences", journal = j-SIGSOFT, volume = "38", number = "3", pages = "7--10", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464530", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software and other digital artifacts are amongst the most valuable contributions of computer science. Yet our conferences treat these mostly as second-class artifacts--especially conferences in the software sciences, which ought to know better. This article argues for elevating these other artifacts by making them part of the evaluation process for papers, and reports on experience from an iteration of an Artifact Evaluation Committee for ESEC/FSE 2011.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2013:SNSc, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "38", number = "3", pages = "11--20", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464528", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2013:RPc, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "38", number = "3", pages = "21--28", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464529", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ebert:2013:BRS, author = "John Ebert", title = "Book Review: {{\booktitle{SOA with REST: principles, patterns \& constraints for building enterprise solutions with REST}} by Thomas Erl, Benjamin Carlyle, Cesare Pautasso, Raj Balasubramanian}", journal = j-SIGSOFT, volume = "38", number = "3", pages = "32--33", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464551", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gvero:2013:BRC, author = "Igor Gvero", title = "Book Review: {{\booktitle{Core Java volume I: fundamentals}}, 9th edition by Cay S. Horstmann and Gary Cornell}", journal = j-SIGSOFT, volume = "38", number = "3", pages = "33--33", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464552", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2013:BRM, author = "Robert Schaefer", title = "Book Review: {{\booktitle{Managing the unmanageable: rules, tools, and insights for managing software people and teams}} by Micky W. Mantle and Ron Lichty}", journal = j-SIGSOFT, volume = "38", number = "3", pages = "34--35", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464553", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRL, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Learning JavaScript: a hands-on guide to the fundamentals of modern JavaScript}} by Tim Wright}", journal = j-SIGSOFT, volume = "38", number = "3", pages = "35--36", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464554", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:TTD, author = "Vasile G. Teodorovici", title = "{Tcl\slash Tk}: a developer's guide, third edition by Clif Flynt", journal = j-SIGSOFT, volume = "38", number = "3", pages = "36--36", month = may, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2464526.2464555", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2013:NAS, author = "Paritosh Jain and Nitish Garg", title = "A novel approach for slicing of object oriented programs", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--4", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492266", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper extends the graph-less technique proposed by Beszedes for slicing Object Oriented Programs. The proposed approach computes the dynamic slices of the OOPs, especially, in case of polymorphism. The approach generates the defined-used (d-u) chains of the objects and variables used in the program and computes the slice using the generated d-u chains; it then debugs the program by detecting the various possible bugs and generates messages suggesting that a bug may be present. A GUI tool has been developed to compute and display the computed slices. The tool allows the user to browse the program and see the generated advice.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Raina:2013:ATR, author = "Shikha Raina and Arun Prakash Agarwal", title = "An automated tool for regression testing in web applications", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--4", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492272", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Regression testing of web applications is a costly activity as it tends to generate more test cases than the previous stages of software testing. This cost can be reduced significantly by identifying and testing only the modified parts of a web application. This will require locating the changes that have been introduced in the web application from the previous version that was tested. In this paper we have introduced an automated tool for locating the changes in the web application which will thereby aid in effective regression testing of the application. This tool compromise of 3 parts, (a) a web crawler that crawls the web application, (b) an HTML DOM tree generator that generates the DOM tree for a specified web page, (c) an comparator that compares the new DOM tree with a previous version of the DOM tree stored in our system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{S:2013:NSO, author = "Indu S. and Srinivas N. K. and Harish P. J. and GangaPrasad R. and Nobby Varghese and N. S. Sreekanth and Supriya N. Pal", title = "[{NLP@Desktop}]: a service oriented architecture for integrating {NLP} services in desktop clients", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--4", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492265", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Research and development in Natural Language Processing (NLP) has made significant progress over the last decade. Many robust NLP systems have been developed for handling machine translation, question-answering, summarization, topic detection, cluster analysis, information extraction, named entity recognition (NER), etc. Despite this advancement in NLP research, the results are still not accessible for common desktop users. In the current scenario, it is difficult to integrate a new NLP tool with the existing text processing applications. To overcome this, we have implemented a service deployer framework based on DBus[1] for the seamless integration of NLP applications with desktop clients like email clients, word processors, browsers etc. This framework enables NLP researchers to make their products equipped for the desktop clients with minimal efforts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Badri:2013:RBU, author = "Mourad Badri and Linda Badri and William Flageol", title = "On the relationship between use cases and test suites size: an exploratory study", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--5", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492261", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software testing, which plays a crucial role in software quality assurance, is a time and resource consuming process. It is, therefore, necessary to estimate as soon as possible the effort required to test software, so that activities can be planned and resources can be optimally allocated. Unfortunately, little is known about the prediction of the testing effort. In this paper, we address the testing effort from the perspective of test suites size. The study presented aims at exploring empirically the relationships between use cases and the size of test suites in object-oriented systems. We introduce four metrics to characterize the size and complexity of use cases. The size of test suites is measured in terms of lines of test code. We performed an experimental study using data collected from five cases studies. Results provide evidence that there is a significant relationship between use case metrics and the size of test suites.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Goel:2013:ARO, author = "Brij Mohan Goel and Pradeep Kumar Bhatia", title = "Analysis of reusability of object-oriented systems using object-oriented metrics", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--5", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492264", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In object-oriented systems, assessing reusability plays a key role in reducing a cost and improving the quality of the software. Object-oriented programming helps in achieving the concept of reusability through different types of inheritance programs, which further help in developing reusable software modules. And object-oriented metrics identify the effectiveness of each reuse strategy. Software reusability has considerable effect on software quality. Software quality increases as reuse of software components increases. But software quality improvement cannot be understood unless it is measured. This paper focuses on an empirical evaluation of object-oriented metrics in C++ using three different object-oriented features. Three programs have been considered as input for the study --- the first program uses multilevel inheritance, the second program uses multiple inheritance and the third program uses hierarchical inheritance. We have found that multilevel inheritance has more impact on reusability among these three features.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Pandey:2013:SEA, author = "Adesh Kr. Pandey and C. P. Agrawal and Arun Sharma and P. Sasikala", title = "Study of empirical approaches to analyze the software metrics", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--5", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492270", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software affects nearly every aspect of human lives. Software functional quality is a key to achieve industrial and business relevance, in particular to industrial development and growth. Software metrics are important indicators to improve the processes and products in all organizations. They define baselines of quality and productivity and enable comparisons against industry averages that help in identifying opportunities for improvement. In addition, Software metrics design and analysis are major activities in the software development life cycle. Software metrics play a vital role in software cost, quality, scheduling, reliability and maintenance. There are various methods to decide which metrics should be used for which purposes. Attributes of a metric may be independent; or attributes may depend on one another. Analytical Hierarchy Process (AHP) is used to assign weights to various parameters of a decision model when they are related to each other in a particular hierarchy. Analytical Network Process (ANP) and Fuzzy ANP are used to solve the decision problem, where attributes of decision parameters form dependency networks. The objective of this paper is to explore the possibilities of using empirical approaches like AHP, ANP and Fuzzy ANP to analyze the software metrics by measuring the weights of different attributes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Taibi:2013:ROS, author = "Fathi Taibi", title = "Reusability of open-source program code: a conceptual model and empirical investigation", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--5", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492276", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Reusing program modules is one of the most direct and useful ways to develop cost effective software, especially with the availability of huge amounts of open-source projects. Reuse saves cost, increases the speed of development and improves software reliability. The quality of popular open-source packages is good as shown by various empirical studies. However, the quality of less known packages and the large number of projects developed by programming enthusiasts is unknown. Reusing them may be the source of more problems rather than being a solution to a problem. In this paper, a conceptual model is proposed to measure the reusability of program modules. A balanced set of well-established metrics is used to compute the most significant factors of reusability and an empirical investigation is conducted to measure the reusability of the modules of randomly selected open-source Java projects. The results obtained are thoroughly analyzed to discover the real reusability potential of open-source program code together with suggestions on how to improve this potential.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2013:RBR, author = "Kuldeep Kumar and Sandeep Kumar", title = "A rule-based recommendation system for selection of software development life cycle models", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--6", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492269", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The selection of a software development life cycle (SDLC) model for a software project is highly dependent upon the characteristics of the software product to be developed. We classified software products according to characteristics that matter for SDLC selection. We surveyed literature to elicit recommendations for SDLC selection. We formalized our findings to present a rule based recommendation system that can be helpful to software developers in selecting the most appropriate SDLC model to be used for the development of a software product. We conducted an initial evaluation of our system. We believe our SDLC recommendation system provides useful hints for selecting an SDLC, and provides a base for validating and refining SDLC recommendation rules.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Varshney:2013:SBS, author = "Sapna Varshney and Monica Mehrotra", title = "Search based software test data generation for structural testing: a perspective", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--6", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492277", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software testing is an important and expensive phase of the software development life cycle. Over the past few decades, there has been an ongoing research to automate the process of software testing but the attempts have been constrained by the size and the complexity of software especially due to the use of dynamic memory allocation which makes the software behavior highly unpredictable. The use of metaheuristic global search techniques for software test data generation has been the focus of researchers in recent years. Many new techniques and hybrid methods have been proposed to tackle the problem more effectively. This study provides an overview of the various techniques that have been applied for structural test data generation. It also presents the open areas, challenges and future directions in the field of search based software testing with an emphasis on test data generation for structural testing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bhasin:2013:CAB, author = "Harsh Bhasin and Neha Singla and Shruti Sharma", title = "Cellular automata based test data generation", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--7", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492262", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Manual Test Data Generation is an expensive, error prone and tedious task. Therefore, there is an immediate need to make the automation of this process as efficient and effective as possible. The work presented intends to automate the process of Test Data Generation with a goal of attaining maximum coverage. A Cellular Automata system is discrete in space and time. Cellular Automata have been applied to things like designing water distribution systems and studying the patterns of migration. This fascinating technique has been amalgamated with standard test data generation techniques to give rise to a technique which generates better test cases than the existing techniques. The approach has been verified on programs selected in accordance with their Lines of Code and utility. The results obtained have been verified. The proposed work is a part of a larger system being developed, which takes into account both black box and white box testing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dalal:2013:ESR, author = "Sandeep Dalal and Rajender Singh Chhillar", title = "Empirical study of root cause analysis of software failure", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--7", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492263", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Root Cause Analysis (RCA) is the process of identifying project issues, correcting them and taking preventive actions to avoid occurrences of such issues in the future. Issues could be variance in schedule, effort, cost, productivity, expected results of software, performance parameters and customer satisfaction. RCA also involves collecting valid data, analyzing it, deriving metrics and finding root causes using RCA methods. In this paper we will do Root cause analysis of some severe software failures that happened in the past and of some failures in ongoing projects in the software Industry. We will also describe various RCA methods and processes used in the software Industry to reduce the chances of software failure.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rai:2013:BIO, author = "Deepak Rai and Kirti Tyagi", title = "Bio-inspired optimization techniques: a critical comparative study", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--7", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492271", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Despite insistent and breathtaking advances in computing, we continue to be humbled by the variety and adaptability of the natural world around us. Bio-inspired optimization is a term that covers a wide variety of computational approaches that are based on the principles of biological systems. This motivates the application of biology to optimization problems. Biologically inspired computing and optimization is a major subset of natural computation. This paper presents a critical survey of bio-inspired optimization techniques. There are many legacy optimization techniques available. This survey explains almost all important bio-inspired optimization techniques based on their development, intention, performance and application. It provides insight into determining the direction of future optimization techniques research.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singhal:2013:CRV, author = "Abhishek Singhal and Abhay Bansal and Avadhesh Kumar", title = "A critical review of various testing techniques in aspect-oriented software systems", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--9", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492275", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software testing is a very crucial phase of the software development life cycle. In order to develop quality software using any approach such as module-oriented, object-oriented, aspect-oriented and componentbased, testing plays a crucial role. Aspect-Oriented Programming (AOP) is a relatively new software development approach and testing of software developed using this approach has not matured enough. Researchers have proposed various testing techniques for AOP. It is important to analyze existing Aspect-Oriented testing techniques in order to develop new, better, more efficient techniques. This paper presents a critical review of various existing testing techniques for AOP.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jiang:2013:CBP, author = "JianMin Jiang and Shi Zhang and Ping Gong and Zhong Hong", title = "Configuring business process models", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--10", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492267", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "A configurable business process model (sometimes referred to as a reference business process model) may be configured to meet the specific requirements of an organization. The configuration activity is required to automatically determine the variability of a configurable process model and ensure the correctness of a specific process model. However, few approaches solve the problem. In this paper, we propose an innovative approach for automatically separating a configurable process model into atomic and correct sub-process models (sub-process models without abnormal behavioral problems). The atomic sub-process models that fulfill specific requirements are merged into specific process models that are provided for organizations. Compared with existing approaches, since the configuration activity is incorporated into the verification process of a process model at design time and can obtain all feasible configurations, our approach avoids independently handling the configuration activity and does not suffer from computational complexity. Moreover, our approach is language-independent. We have developed a prototype tool for configuring these process models.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Voola:2013:CRP, author = "Persis Voola and A. Vinaya Babu", title = "Comparison of requirements prioritization techniques employing different scales of measurement", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--10", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492278", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The objective of this paper is to conduct a controlled experiment with the three requirements prioritization techniques: Numerical Assignment (NA), Analytic Hierarchy Process (AHP) and Extensive Numerical Assignment (ENA), each based on ordinal, ratio and interval scales respectively. NA and AHP are widely used traditional requirements prioritization techniques. ENA is a novel technique introduced by the authors, which acknowledges the uncertain and incomplete nature of human judgment about requirements priorities, which are in turn uncertain guesses about the upcoming product. The aim of the experiment is to examine the three techniques using various objective and subjective measures like number of decisions, time consumption, ease of use, attractiveness, scalability and reprioritizability. The experiment was executed by prioritizing the requirements of a university website system with students as participants in the experiment. The results of the experiment proved that ENA transcends NA and AHP.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Shareef:2013:CCA, author = "Jawwad Wasat Shareef and R. K. Pandey", title = "{CAME}: {Component Assembly Metrics Extraction} using {UML}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--12", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492273", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In Object-Oriented software development, complexity metrics help software engineers to identify the deficiencies in the design of the software system that are likely to become problem points in the subsequent phases of the SDLC, like testing and maintenance. Metrics for Component Based Software Development (CBSD) have also been proposed by the researchers. Lately the emphasis has been on metrics that are applicable during early phases of the SDLC. The XML Meta Data Interchange (XMI) standard has been implemented in most of the commercial and open source UML tools. It is now possible to automate the metrics extraction procedure right from the UML design documents. Detection of design deficiencies early in the design phase saves a lot of time and effort and results in a more maintainable design. In the present paper, we discuss the design and implementation of a metrics tool for CBSD. We have implemented component based metrics in a parser-based tool, which hereafter we refer to as CAME (Component Assembly Metrics Extraction), to calculate metrics from UML design documents. CAME is capable of generating software metrics proposed by researchers for Component Based Software Systems. We demonstrate our tool using UML component assembly diagrams for a University Case Registration System (UCRS) and its representation in UML and metrics extraction procedure.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Shirole:2013:UBM, author = "Mahesh Shirole and Rajeev Kumar", title = "{UML} behavioral model based test case generation: a survey", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--13", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492274", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In software engineering, system modeling is the process of formulating a representation of a real system in an abstract way to understand its behavior. Software testing encourages reusing these models for testing purpose. This expedites the process of test case generation. UML structural and behavioral specification diagrams have been used by testing researchers for generation of test scenarios and test data. The aim of this survey is to improve the understanding of UML based testing techniques. We have focused on test case generation from the behavioral specification diagrams, namely sequence, state chart and activity diagrams. We classify the various research approaches that are based on formal specifications, graph theoretic, heuristic testing, and direct UML specification processing. We discuss the issues of test coverage associated with these approaches.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jones:2013:FPU, author = "Capers Jones", title = "Function points as a universal software metric", journal = j-SIGSOFT, volume = "38", number = "4", pages = "1--27", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492268", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Function point metrics are the most accurate and effective metrics yet developed for software sizing and also for studying software productivity, quality, costs, risks, and economic value. Unlike the older ``lines of code'' metric function points can be used to study requirements, design, and in fact all software activities from development through maintenance. In the future function point metrics can easily become a universal metric used for all software applications and for all software contracts in all countries. The government of Brazil already requires function points for all software contracts, and South Korea and Italy may soon follow. However, there are some logistical problems with function point metrics that need to be understood and overcome in order for function point metrics to become the primary metric for software economic analysis. Manual function point counting is too slow and costly to be used on large software projects above 10,000 function points in size. Also, application size is not constant but grows at about 2\% per calendar month during development and 8\% or more per calendar year for as long as software is in active use. This paper discusses a method of high-speed function point counting that can size any application in less than two minutes, and which can predict application growth during development and for five years after release. This new method is based on pattern matching and is covered by U.S. utility patent application and hence is patent pending.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Anderson:2013:IC, author = "Glyn Anderson", title = "Idle cycles", journal = j-SIGSOFT, volume = "38", number = "4", pages = "6--9", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492284", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2013:BES, author = "Robert Schaefer", title = "Business-efficient software development processes", journal = j-SIGSOFT, volume = "38", number = "4", pages = "7--8", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492283", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2013:SNSd, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "10--18", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492250", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2013:RPd, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "38", number = "4", pages = "19--24", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492249", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wang:2013:RFA, author = "Qianxiang Wang and Lin Liu", title = "Report on the {Fourth Asia-Pacific Symposium on Internetware (Internetware 2012)}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "25--26", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492281", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Internet provides an open infrastructure for exchanging and sharing information resources among people all over the world. The rapid development and wide application of the Internet makes it a new mainstream platform for using, developing, deploying and executing software systems. In order to provide an interactive forum for researchers and professionals from related disciplines to meet and exchange ideas addressing the challenges in the Internetware setting, the Technical Committees on Software Engineering and System Software of China Computer Federation (CCF) sponsored the Asia-Pacific Symposium on Internetware series, with ACM's Cooperation. In this report, we report news from the Internetware 2012, specially the 5 keynotes and 4 regular papers that were recommended for publication in a special issue on ``Internetware'' of the International Journal of Software and Informatics after presented at the symposium.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Xie:2013:RIS, author = "Tao Xie and Lu Zhang and Hong Mei", title = "Report on the {International Symposium on High Confidence Software (ISHCS 2011\slash 2012)}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "27--33", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492282", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "To provide a forum for researchers in related research areas to address the challenges in high confidence software, exchange ideas, and foster collaborations, the Institute of Software and Key Laboratory of High Confidence Software Technologies (Ministry of Education) at Peking University hosted and sponsored the International Symposium on High Confidence Software in 2011 and 2012. The symposium consisted of a series of invited talks from internationally known researchers on the symposium topic, discussion/panel sessions, and poster sessions to enable substantial interactions among attendees.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chapelle:2013:BRP, author = "Gregory Chapelle", title = "Book Review: {{\booktitle{A practical guide to Linux commands, editors, and shell-programming}}, third edition by Mark G. Sobell}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "38--38", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492251", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kimm:2013:BRO, author = "Larry Kimm", title = "Book Review: {{\booktitle{It's our research: getting stakeholder buy-in for user experience research projects}} by Tomer Sharon}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "38--39", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492252", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Paige:2013:BRT, author = "Michael Paige", title = "Book Review: {{\booktitle{The tangled web: a guide to securing modern web applications}} by Michal Zalewski}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "39--40", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492253", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saur:2013:BRD, author = "Joe Saur", title = "Book Review: {{\booktitle{Design for Emotion}} by Trevor van Gorp and Edie Adams}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "40--40", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492254", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRS, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Security and privacy for Microsoft Office 2010 users}} by Mitch Tulloch}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "40--41", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492255", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRU, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Ubuntu unleashed}}, 2013 edition by Matthew Helmke with Andrew Hudson and Paul Hudson}", journal = j-SIGSOFT, volume = "38", number = "4", pages = "41--41", month = jul, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2492248.2492256", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Terra:2013:QCC, author = "Ricardo Terra and Luis Fernando Miranda and Marco Tulio Valente and Roberto S. Bigonha", title = "{Qualitas.class Corpus}: a compiled version of the {Qualitas Corpus}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--4", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507314", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper documents a compiled version of the Qualitas Corpus named Qualitas.class Corpus. We provide compiled Java projects for the 111 systems included in the corpus. We also gathered a large amount of metrics data (such as measurements from complexity, coupling, and CK metrics) about the systems. By making Qualitas.class Corpus public, our goal is to assist researchers by removing the compilation effort when conducting empirical studies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Raghunath:2013:DRB, author = "Amritha Raghunath and Sadhana Ramachandran and Selvakumar Subramanian and Sreevatsan Vaidyanathan", title = "Data rate based adaptive thread assignment solution for combating the {SlowPOST} denial of service attack", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--5", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507310", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Denial of Service (DoS) attacks represent a major threat to network security, especially in today's networked world. There has been significant research in this area, primarily focused on mitigating and preventing DoS attacks affecting transport layer services. This paper addresses issues arising from a new variation of a DoS attack, namely the SlowPOST attack that affects Application Layer services. In SlowPOST, the malicious clients send data at a slow rate after the connection is established, and the server is left waiting for the data to arrive. These attacks are particularly devastating due to their ability to resist detection due to their protocol compliance. In addition, such attacks do not require the massive resources that DoS attacks normally require, making them easier to launch. Some solutions for this issue have already been deployed in some commercial servers. These solutions are based on either monitoring traffic or enforcing a time limit on the transmission of the protocol headers. In order to achieve reliable detection, the detection parameters need to adapt to the constantly changing traffic. This paper proposes a novel algorithm that uses the data rate of connections to evolve a threshold for determining potential attackers in SlowPOST. This proposed method is tested by subjecting a server to an attack, and it was observed that in the absence of this method, the servicing of legitimate requests is not completed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2013:MMQ, author = "Gagandeep Singh", title = "Metrics for measuring the quality of object-oriented software", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--5", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507311", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper presents metrics for measuring the quality of object-oriented software. Quality of software generally depends on five parameters namely efficiency, understandability, complexity, reusability and maintainability. All of these parameters are associated with certain metrics. Quality of software can be measured by using object-oriented metrics. Software tends to become more complex over a series of releases and maintaining them becomes a more difficult task. Thus quality of software also tends to decrease over time. In this paper, a study is performed using object-oriented metrics that are computed over different releases of the software application JFreeChart.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bajaj:2013:MPD, author = "Punam Bajaj and Vineet Arora", title = "Multi-person decision-making for requirements prioritization using fuzzy {AHP}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--6", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507302", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The success of a system depends upon how effectively it accomplishes its intended purpose by meeting all stakeholders' concerns pertaining to conflicting requirements such as cost, size, time, performance etc. Conflicts occur because the requirements are individually refined, without consideration to how they may impact the other stakeholders in the system. As the stakeholders' concerns are uncertain and subjective in nature, this paper proposes a novel approach to prioritize the conflicting requirements using Fuzzy Analytic Hierarchy Process and an alpha cut. A total compatible ordering is achieved to resolve the conflicting preferences of the stakeholders. It assists the project managers to develop a system that meets the expectations of all the stakeholders. A case study of the Travel Management Planning Website is presented to illustrate the application of the methodology.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2013:TGC, author = "Pavitdeep Singh and Satwinder Singh and Jatinder Kaur", title = "Tool for generating code metrics for {C\#} source code using abstract syntax tree technique", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--6", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507312", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/csharp.bib; http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software maintenance is one of the key activities in any software engineering process in which source code analysis plays a crucial role. Due to the high cost of maintenance, it has become quite necessary to produce high quality software. Over time, numerous analyses have been performed on source code to determine complexity and other metrics. Lots of papers have been published for object oriented languages but mostly concentrating on C++ and Java, very few has been published for more modern languages like C\#. This paper proposes a Software Quality Assurance Tool for measuring the different code metrics for the object oriented language C\# at the class and method levels. The technique consists of generating the abstract syntax tree of the source code using Nfactory libraries. The Interface is built using the Win Form application which provides an impressive GUI for the tool.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sinhal:2013:NFB, author = "Amit Sinhal and Bhupendra Verma", title = "A novel fuzzy based approach for effort estimation in software development", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--6", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507313", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Accurate and credible software effort estimation is always a challenge for academic research and software industry. In the beginning, estimation was carried out using only human expertise or algorithmic models, but more recently, interest has turned to a range of Soft Computing techniques. New paradigms such as Fuzzy Logic enable a choice for software effort estimation. Constructive Cost Model (COCOMO) is considered to be the most widely used model for effort estimation. Effort drivers have immense influence on COCOMO and this paper investigates the role of cost drivers (effort features) in improving the precision of effort estimation using Fuzzy Logic. Fuzzy logic-based estimation models are more appropriate when indistinct and incorrect information is to be used. This paper aims at estimating effort in an efficient way using a Fuzzy technique. For this purpose, the COCOMO81 dataset and the Fuzzy Inference System (FIS) of MATLAB are used for implementation. At the end, the outcomes are compared against traditional methods using parameters like Mean Magnitude of Relative Error (MMRE) and Pred (25).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ahmad:2013:FAA, author = "Aakash Ahmad and Pooyan Jamshidi and Claus Pahl", title = "A framework for acquisition and application of software architecture evolution knowledge: 14", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--7", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507301", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software systems continuously evolve as a consequence of frequent changes in their functional requirements and the environment surrounding them. Architecture-centric software evolution (ACSE) enables changes in software structure and behaviour while abstracting the complex implementation-specific details. However, due to recurring evolution there is a need for solutions that enable a systematic reuse of frequent changes in software architectures. In recent years, architecture change patterns and evolution styles proved successful in promoting reuse expertise to tackle architecture evolution. However, there do not exist any solutions that enable a continuous acquisition and application of architecture evolution knowledge to systematically address frequent changes in software architectures. In this paper, we propose a framework PatEvol that aims to unify the concepts of (i) software repository mining and (ii) software evolution to enable acquisition and application of architecture evolution knowledge. In the proposed PatEvol framework, we present knowledge acquisition (architecture evolution mining) to enable post-mortem analysis of evolution histories to empirically discover evolution-centric knowledge. Furthermore, we support reuse of discovered knowledge to enable knowledge application (architecture evolution execution) that enables evolution-off-the-shelf in software architectures. Tool support facilitates the knowledge acquisition and knowledge application processes in the PatEvol framework.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hazra:2013:CAR, author = "Rumpa Hazra and Shouvik Dey and Ananya Kanjilal and Swapan Bhattacharya", title = "Comparative analysis of real time resource access control protocols using {UML} 2.0", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--7", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507305", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The behaviors of real time software systems do not depend only on the values of input and output signals, but also on the times of their occurrences. Real time systems (RTS) interact with their environments using time constrained input/output signals. The complexity of Real Time Systems is continually increasing which makes their design very challenging. In RTS, the scheduling of tasks with hard deadlines has been an important area of research. Unified Modeling Language (UML), the standard visual object-oriented modeling language, is suitable to deal with this complexity. The main objective of this paper is to compare two protocols using UML 2.0 models. The shortcomings of the existing Priority Inheritance protocol are represented using one UML model. Further, the Stack Based Priority Ceiling protocol is used to overcome this difficulty using an improved model.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{DeSousaCoelho:2013:SDM, author = "Jailton {De Sousa Coelho, Jr.} and Jos{\'e} Luis Braga and Bernardo Giori Ambr{\'o}sio", title = "System dynamics model for simulation of the software inspection process", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--8", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507306", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Repairing a defect in the late phases of software development can be a hundred times more expensive than finding and fixing it during the requirements and design phase. Software inspection is a technique that may be used to aid in the identification of defects during early stages of the process and avoid propagation of such defects to later phases. The cost-benefit of inspections may be significant if they are efficiently performed. Since this process is affected by several quality factors, the analysis of the overall context of inspection may become complex. Project managers are reluctant to introduce inspection due to uncertainty regarding its real benefits. This paper presents a system dynamics model, which is a descriptive technique for systems modeling and simulation and involves several variables that strongly influence inspection efficiency. The influence levels of model variables are quantified based on real or empirical experiments reported in the literature, in order to approximate model results to values that would be obtained in the real world. The model allows the reproduction of scenarios without paying the costs and facing the risks of a real project implementation. Therefore, it enables the analysis of inspection effects on the software development process.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2013:MSD, author = "Ajay Jain and Kusha Chopra", title = "Malware signing detection system", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--8", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507307", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software malware not only creates financial damages to corporate and individual computer users, but also invades privacy, exploits their devices and induces other significant losses. While efficient tools and technologies that control and limit malware spread across devices in the public domain are being developed, the problem is far from being resolved. We worked on a methodology that uses techniques to detect malware during in-house development and prevents malware from being released in the field. This work helps determine and handle situations where a person, authorized to access an authentic signing certificate [1] signs malware (or set of file(s)) intended to perform harmful operations, such as spreading a virus on a computer using the said certificate, and releases the malicious code publicly or to a community.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bhasin:2013:CGT, author = "Harsh Bhasin and Neha Singla", title = "Cellular-genetic test data generation", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--9", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507303", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Test Data Generation is the soul of automated testing. The dream of having efficient and robust automated testing software can be fulfilled only if the task of designing a robust automated test data generator can be accomplished. In the work we explore the gaps in the existing techniques and intend to fill these gaps by proposing new algorithms. The following work presents algorithms that handle almost all the constructs of procedural programming languages. The proposed technique uses cellular automata as its base. The use of Cellular Automata brings a blend of artificial life to the work. The work is a continuation of our earlier attempt to amalgamate Cellular Automata based algorithms to generate test data. The technique has been applied to C programs and is currently being tested on a financial enterprise resource planning system. Since, the solution of most of the problems can be found by observing nature, we must explore artificial nature to accomplish the above task.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chanda:2013:BSE, author = "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal and Swapan Bhattacharya", title = "Behavioral and structural evolution of {SOA} from {OO}: an integrated approach", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--9", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507304", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Service Oriented Architecture caters to the ``Separation of Concerns'' and incorporates reusability, granularity, modularity, componentization and interoperability. There are many software products that have been developed in the object-oriented paradigm. To incorporate the positive aspects of the service-oriented paradigm, they need to be evolved to the service-oriented domain. In this paper, we define an integrated approach towards consistent evolution of Object Oriented (OO) paradigm to the Service Oriented (SOA) domain. There are some proven Object Oriented Design Tools that can be used for Service Oriented Application design incorporating both the behavioral and structural aspects. The work in this paper involves a set of activities like formalizing the different UML diagrams, formal mapping of object components to service level components and establishing consistency among them. We also establish a traceability model for consistent evolution of Service Oriented Applications from existing Object Oriented Applications by mapping behavioral and structural artifacts of both domains. This will establish traceability from implementation phases back to the requirements phases of an SOA application.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jalila:2013:EEO, author = "A. Jalila and D. Jeya Mala", title = "Empirical evidence on {OCL} formal specification-based metrics as a predictor of fault-proneness", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--10", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507308", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "OCL formal specification has been widely used for precise software modeling. In general, it is used to express constraints on design documents. As a novel approach, its usage can be extended to support effective testing, such as testing fault-prone components to improve software quality. In this paper, CK (Chidamber and Kemerer) metrics that can be extracted from OCL expressions are validated against module complexity. Moreover, our study proposes a new metric suite that can be directly extracted from OCL expressions to quantify module complexity. A weight has been assigned to each metric to reflect its importance in fault-prone component identification. Our study shows that metrics collected from OCL specifications are good predictors of the fault-prone components of a system during design time. An early knowledge of fault-prone components of the system can be useful to distribute efforts required for software development and testing activities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mala:2013:CCT, author = "D. Jeya Mala and K. Sabari Nathan and S. Balamurugan", title = "Critical components testing using hybrid genetic algorithm", journal = j-SIGSOFT, volume = "38", number = "5", pages = "1--13", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507309", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As quality of software plays a vital role in real time systems, it is essential to identify the crucial parts in the system and to test them effectively. In the proposed approach, the critical components are identified by means of mutation based impact analysis. The next task is to test the critical components using the Hybrid Genetic Algorithm (HGA) based test case generation and optimization approach. The mutants are automatically generated by seeding faults into each method of all the components in the Software Under Test (SUT). The initial set of test cases is generated using randomized test data. The generated test cases are executed over the original and the mutant to identify whether the test case detects the error or not. Based on the results, the Mutation Score (MS) is calculated, which always lies between 0 and 1. The best test cases are chosen based on having higher mutation scores and are executed on mutants to analyze how each component affects the other components in the SUT. Based on the analysis, the critical components are identified and they need rigorous testing using the test cases generated by the HGA. The algorithm uses the RemoveTop and LocalBest improvement heuristics to achieve near optimal solutions. In unit testing, the test cases are executed against the original and the mutant. The test case optimization is done by evaluating the effectiveness of test suites using the Mutation Score and the Branch Coverage Value (BCV). In pair-wise testing, the effective test cases are selected based on the higher mutation scores and branch coverage values. The components are executed against these test cases and the execution traces are recorded. The traced results are compared against the expected outputs which were previously stored in the repository and the statuses are updated. Based on the statuses, the faulty methods are revealed. The efficiency of the proposed approach is compared with Genetic Algorithm (GA) and we concluded that the final test suite size and the total execution time are reduced in the proposed approach. Finally various graphs and PDF reports are generated for visualization purposes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Raccoon:2013:U, author = "Raccoon and Dog", title = "Unknownness", journal = j-SIGSOFT, volume = "38", number = "5", pages = "8--17", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507318", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2013:Pa, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "38", number = "5", pages = "17--18", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507319", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2013:SEEc, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "18--18", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2517896", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2013:SNSe, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "19--27", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507290", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2013:RPe, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "38", number = "5", pages = "28--33", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507289", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Prikladnicki:2013:CHA, author = "Rafael Prikladnicki and Yvonne Dittrich and Helen Sharp and Cleidson {De Souza} and Marcelo Cataldo and Rashina Hoda", title = "Cooperative and human aspects of software engineering: {CHASE} 2013", journal = j-SIGSOFT, volume = "38", number = "5", pages = "34--37", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507321", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software is created by people for people working in a range of environments and under various conditions. Understanding the cooperative and human aspects of software development is crucial in order to comprehend how methods and tools are used, and thereby improve the creation and maintenance of software. Both researchers and practitioners have recognized the need to investigate these aspects, but the results of such investigations are dispersed in different conferences and communities. The 6th workshop on Cooperative and Human Aspects of Software Engineering held at the International Conference on Software Engineering continued the tradition from earlier workshops and provide a lively forum to discuss current developments and high quality research in the field, providing both a meeting place for the community and the possibility for researchers interested in joining the field to present and discuss their work in progress and to get an overview of the field. Further dissemination of research results will lead to improvement of software development and deployment across the globe.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dingsoyr:2013:RCL, author = "Torgeir Dings{\o}yr and Nils Brede Moe", title = "Research challenges in large-scale agile software development", journal = j-SIGSOFT, volume = "38", number = "5", pages = "38--39", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507322", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Agile software development methods are increasingly used in large-scale software development. This article summarizes some of the discussion on research challenges in large-scale agile development at a workshop at the International Conference on Agile Software Development (XP2013), in the form of a research agenda.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Galster:2013:VSE, author = "Matthias Galster and Mehdi Mirakhorli and Jane Cleland-Huang and Janet E. Burge and Xavier Franch and Roshanak Roshandel and Paris Avgeriou", title = "Views on software engineering from the twin peaks of requirements and architecture", journal = j-SIGSOFT, volume = "38", number = "5", pages = "40--42", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507323", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The disciplines of requirements engineering (RE) and software architecture (SA) are fundamental to the success of software projects. Even though RE and SA are often considered in isolation, drawing a line between RE and SA is neither feasible nor reasonable as requirements and architectural design impact each other. This observation motivated the Twin Peaks model that was the subject of the Second International Workshop on the Twin Peaks of Requirements and Architecture ([email protected] 2013). [email protected] 2013 was held in conjunction with the 35th International Conference on Software Engineering 2013 in San Francisco, CA. The workshop aimed at providing a forum for researchers, practitioners and educators from the areas of RE and SA to discuss their experiences, forge new collaborations, and explore innovative solutions that address the challenges that occur when relating RE and SA. The workshop provided participants with an opportunity to become familiar with the relationship between RE and SA in the broader context of software engineering, rather than in an isolated context of either RE or SA. The workshop featured one industrial keynote, five research paper presentations, two invited talks and four working group discussions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hunt:2013:RDA, author = "Johanna Hunt and Xiaofeng Wang", title = "{Research Dojo}: applying agile principles to agile research --- workshop summary from {XP2013}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "43--46", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507324", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This report summarizes key findings from a workshop held at the 14th International Conference on Agile Software Development (XP2013) called ``Research Dojo: Collaborative Approaches for our Agile Community''. Both software development and research are knowledge-intensive endeavors. While agile approaches have been increasingly adopted in software development projects, whether such approaches can beneficially be applied to conducting research is a phenomenon yet to be fully explored. The objective of the workshop was to gain a deeper understanding of the similarities and differences between academic research and agile software development, in order to explore whether agile practices can also be used for collaboratively conducted research. The opinions of the workshop participants are summarized and observations of the research dojo session carried out by the participants are reported. We conclude by identifying further areas for investigation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Johnson:2013:RSS, author = "Pontus Johnson and Paul Ralph and Michael Goedicke and Pan-Wei Ng and Klaas-Jan Stol and Kari Smolander and Iaakov Exman and Dewayne E. Perry", title = "Report on the {Second SEMAT Workshop on General Theory of Software Engineering (GTSE 2013)}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "47--50", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2529923", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kruchten:2013:TDT, author = "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya and Davide Falessi", title = "Technical debt: towards a crisper definition report on the {4th International Workshop on Managing Technical Debt}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "51--54", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507326", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As the pace of software delivery increases and technology rapidly changes, organizations seek guidance on how to insure the sustainability of their software development effort. Over the past four years running the workshops on Managing Technical Debt, we have seen increased interest from the software industry to understanding and managing technical debt. A better understanding of the concept of technical debt, and how to approach it, both from a theoretical and a practical perspective is necessary to advance its state of the art and practice. In this paper, we highlight the current confusion in industry on the definition of technical debt, their contributions that have led to a deeper understanding of this concept and the limits of the metaphor, the criteria to discriminate what is technical debt and not, and areas of further investigation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lewis:2013:RIIb, author = "Grace A. Lewis and Nachiappan Nagappan and Jeff Gray and David Rosenblum and Henry Muccini and Emad Shihab", title = "Report of the {2013 ICSE 1st International Workshop on Engineering Mobile-Enabled Systems (MOBS 2013)}: 12", journal = j-SIGSOFT, volume = "38", number = "5", pages = "55--58", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507327", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 2013 1st International Workshop on Engineering Mobile-Enabled Systems (MOBS 2013) was held in conjunction with the 35th International Conference on Software Engineering, ICSE 2013, on May 25, 2013 in San Francisco, CA USA. MOBS 2013 brought together software engineering researchers from academia and industry, as well as practitioners, to share results and open issues in diverse areas of engineering mobile-enabled systems. The many discussions throughout the day resulted in the identification of three promising areas of research to address existing gaps and problems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hunt:2013:RPS, author = "Johanna Hunt and Olumide Akerele and Tomi Juhola and Michael Waterman", title = "Report from the {PhD} symposium at {XP2013}: an adaptive experiment in feedback", journal = j-SIGSOFT, volume = "38", number = "5", pages = "59--62", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507328", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper, we describe the PhD Symposium organized as a part of the 14th International Conference on Agile Software Development (XP2013). The Symposium was run with an experimental adaptive structure and was divided into two workshops distributed across the conference as well as individual sessions during the conference. The activities of the second workshop were adapted based on the learning needs of the attendees. In this report we describe the structure of the two scheduled workshops, the activities conducted both during and between them, and evaluate the outcome of this Symposium format.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Beschastnikh:2013:BRP, author = "Ivan Beschastnikh", title = "Book Review: {{\booktitle{Presentation patterns: techniques for crafting better presentations}} by Neal Ford, Matthew McCullough and Nathaniel Schutta}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "67--67", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507291", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gvero:2013:CCE, author = "Igor Gvero", title = "Computers as components, 3rd edition: principles of embedded computing system design by Marilyn {Wolf}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "67--68", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507292", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRD, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Drupal For Designers}} by Dani Nordin}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "68--68", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.250729", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRJ, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{jQuery, jQuery UI and jQuery Mobile: recipes and examples}} by Adriaan de Jonge and Phil Dutson}", journal = j-SIGSOFT, volume = "38", number = "5", pages = "68--69", month = sep, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2507288.2507294", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chauhan:2013:DSM, author = "Sandeep Chauhan and Arun Sharma and P. S. Grover", title = "Developing self managing software systems using agile modeling", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--3", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Design, development and operation of self managing systems are extremely challenging. Having an appropriate development model is of paramount significance for self managing systems. Various approaches have been studied and used in the past. It has been observed that self managing systems may be very good candidates for agile modelling and development. In this paper, we propose a generic architecture along with a life cycle and an Agile Modelling Approach (AMA) for developing self-managing systems. AMA may be applied to software development projects in an effective, flexible and lightweight manner. Moreover, AMA may be used for requirements, analysis, architecture and design, along with the use-case, object, aspect, data or user-interface models.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2013:QAE, author = "Rakesh Kumar and Hardeep Singh", title = "A qualitative analysis of effects of security risks on architecture of an information system", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--3", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532809", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Information systems are the backbone of almost every business. The rise in the usage and the development of information networks over the years has added to the magnitude and frequent occurrences of threats to these very systems. Therefore, researchers and developers need to fill the gaps between early knowledge about risks and current level of risks and threats posed to information systems. The paper, done qualitatively, explores the various effects on the architecture of the information systems when the systems are exposed to attacks. The conceptual results, presented in the paper explore the relation of security risks to the architectural components of information systems. The findings can help the developer community to design architecturally sound and secure information systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{B:2013:SHE, author = "Sugavanesh B. and Hari Prasath R. and Selvakumar S.", title = "{SHS}-{HTTPS} enforcer: enforcing {HTTPS} and preventing {MITM} attacks", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--4", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532802", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Web servers provide immunity against Man In The Middle (MITM) attacks and eavesdropping by using HTTP Strict Transport Security (HSTS) to force user agents to communicate only over HTTPS connections. However, the initial connection request from a user is made over an insecure HTTP connection. This issue was addressed by user agents; Google Chrome and Firefox, implicitly, by including a static list of URLs to be accessed only over secure HTTPS connections. Since, these user agents maintain their lists independently, the URLs used by one user agent are invisible to another. A user is prone to MITM attacks, especially in public hotspot environments, when accessing a URL present in the list of secure URLs of one browser but not in another, since the initial handshake from that user agent is insecure. Attacks can be initiated by modifying the outgoing HTTP packets and also the HTTPS response packets from the webserver. This motivated us to propose a solution independent of user agents, by merging the static URL lists of different user agents and enforcing HTTPS for all those URLs. In this paper, we propose a solution, SHSHTTPS Enforcer that introduces a local daemon to enforce URL redirection before the request flows out of the client for the URLs in a list compiled from multiple sources. The proposed solution has been demonstrated through a prototype implementation of the Squid Proxy server as our local daemon. The experiment was conducted by providing a URL, which was not present in one browser's list but was present in another browser's list. It was evident that SHS-HTTPS Enforcer enforced HTTPS successfully and MITM attacks were prevented.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Castelluccia:2013:TEB, author = "Daniela Castelluccia and Giuseppe Visaggio", title = "Teaching evidence-based software engineering: learning by a collaborative mapping study of open source software", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--4", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532803", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper, we share our experiences about teaching evidence-based software engineering to students of a Master degree program in Computer Science. We provided a semester-long course, composed of lessons about empirical and experimental methods. It also included a collaborative project concerning a systematic mapping study of the challenges in the adoption of open source software in a business context. All students collaborated on the project by analyzing emerging results in the scientific literature. They evaluated the proposals in terms of level of novelty and evidence and delivered a complete report, which summarized the risk factors in the adoption of open source software and offers technical knowledge about evolutionary patterns and development community support, with practical implications. As a side effect, this problem-based learning approach provides a positive impact in terms of students' participation, teamwork attitude, professional interest in open source software, and exam passing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jeet:2013:SRE, author = "Kawal Jeet and Renu Dhir", title = "Software re-engineering using imperialist competitive algorithm", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--5", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532808", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Maintenance is one of the important phases of the software development life cycle which contributes to the effective and long term use of any software system. It can become cumbersome and costly for software maintainers when subsystem boundaries are not clearly defined. Further, the problem gets worse due to the system evolution, lack of current documentation and lack of original design documentation. The application of clustering techniques and tools helps software maintenance programmers to recover high-level views of system designs and hence leads to better understanding and maintenance of software systems. In this paper, we have used a sociopolitical Imperialist Competitive Algorithm for software module clustering and compared it with existing evolutionary approaches. We conclude that the novel socio-political approach produces better quality clusters as compared to the earlier evolutionary genetic approaches.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Garg:2013:NBG, author = "Deepak Garg and Amitava Datta and Tim French", title = "A novel bipartite graph approach for selection and prioritisation of test cases", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--6", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532806", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Every regression testing cycle of a software application results in new test cases being introduced in a test suite. Many test cases from previous regression testing cycles become unstable or unusable due to the removal/addition of the new functionalities. The execution of a large number of unusable test cases results in less test coverage and higher test execution time. The lower test coverage is due to the coverage of the non-existent code statements. The higher test execution time is due to the execution of unused and broken test cases. In this paper, we propose a new bipartite graph approach to eliminate the subset of test cases that are not relevant for the testing of the current version of a software application. The suggested approach helps in executing a minimal set of test cases that are required to cover more code statements.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Goel:2013:IHL, author = "Brij Mohan Goel and Pradeep Kumar Bhatia", title = "Investigating of high and low impact faults in object-oriented projects", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--6", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532807", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "For optimum utilization of resources and reducing the cost of software, the fault detection and elimination process must be properly planned and for this type of planning prediction of fault-prone module is gaining importance among researchers. It would be valuable to know how object-oriented design metrics and class fault-proneness are related when fault impact is taken into account. In this paper, we use the logistic regression method to empirically investigate the usefulness of object-oriented design metrics in predicting fault-proneness when taking fault impact into account. Our results, based on a public domain NASA Promise data set, indicate that most of these design metrics are statistically related to fault-proneness of classes across fault impact, and the prediction capabilities of the investigated metrics greatly depend on the impact of faults. More specifically, these design metrics are able to predict high/low impact faults in fault-prone classes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mary:2013:PSA, author = "S. Roselin Mary and Paul Rodrigues and E. R.. Naganathan", title = "Patterns of software architecture in {Vastu}: a new revelation", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--6", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532815", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Patterns play an important role in architecture. Plenty of patterns exist but remain undiscovered. Many of the patterns used in different fields are knowingly or unknowingly used in the field of software architecture. This technical paper briefly explains various patterns in the Indian architectural science Vastu and also presents a brief discussion of various available software architectural patterns. An attempt is made here to find correlations between patterns existing in vastu and software architecture. Further, based on the facts established in vastu, it may be possible to build any kind of complex systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Levine:2013:CSS, author = "Gertrude N. Levine", title = "Computer security with service degradations", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--7", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532810", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Computer systems invest substantial resources in securing their service. Costs of failure prevention are balanced against those of detection and recovery, even though recovery mechanisms can cause greater degradations of services. Most computer users consider degradations of service to be insidious and injurious. Yet, service degradations commonly assist in both the prevention and the curtailment of failures. Their toleration enables service continuation following fault activation, during which degradations are monitored for symptoms of security breaches.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Haller:2013:MT, author = "Klaus Haller", title = "Mobile Testing", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--8", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532813", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Mobile apps are everywhere. Some apps entertain and others enable business transactions. Apps increasingly interact with complex IT landscapes. For example, a banking app on a mobile device acts as a front end that invokes services on a back-end server of the bank, which might contact even more servers. Mobile testing becomes crucial and challenging. This paper follows a user-centric testing approach. The app's architecture matters for testing, as does its user base and usage context. Addressing these factors ensures that test cases cover all relevant areas. Most apps need test automation for two reasons: agility and compatibly. Agile projects test frequently, such as every night, to detect bugs early. Compatibility tests ensure that an app runs on all relevant devices and operating system versions on the market. Thus, testers execute test scripts on many devices. This demands for a private device cloud and a mobile test automation framework. Swisscom IT Services followed this path, enabling us to address the major quality issues we identified for mobile apps: pre-usage failures (installation fails, app crashes during startup) and lack of basic regression testing (upgrades buggier than predecessor).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2013:RPT, author = "Lalit Kumar Singh and Gopika Vinod and A. K. Tripathi", title = "Reliability prediction through system modeling", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--10", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.25328012", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Quantifying software reliability, such as performance and dependability, through stochastic behavior models (or labeled transition systems) is already a common practice in the software analysis community. However, those models are usually too fine grained to represent an accurate view of the software system by its stakeholders. Scenarios, on the other hand, are capable not only to describe the system traces as behavior models do but also depict very clearly the system components designed to provide the intended system behavior as well as to outline a high level architecture view of the system being described. In this paper, we introduce a case study of a safety critical computer based system that is running in an Indian Nuclear Power Plant. We define clear component interfaces, from which we analyze its software reliability.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dutta:2013:ERD, author = "Animesh Dutta and Shrutilipi Bhattacharjee and Ananya Kanjilal and Ranjan Dasgupta and Swapan Bhattacharya", title = "Engineering of requirements for a distributed teleteaching system: a conceptual graph-based approach", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--12", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532814", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This work proposes a graph based requirement analysis approach and its verification methodology to address the challenges of requirements engineering in the context of a distributed teleteaching system. Requirements are generally expressed in natural language and in the absence or limited use of the requirements elicitation phase, verification of requirements and traceability of requirements to different artifacts of the subsequent phases becomes difficult. In this work we use i* diagrams, the well known standard for agent based requirements analysis. Then we propose Extended Means Ends Analysis (EMEA) with the addition of some new constructs. Next we define a transformation algorithm to derive a conceptual graph (CG) and propose a method for conceptual graph based requirements specification and its verification. A metrics based evaluation for performance measurement of the proposed method in terms of requirements traceability is presented.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mala:2013:CAT, author = "D. Jeya Mala and S. Balamurugan and K. Sabari Nathan", title = "Criticality analyzer and tester: an effective approach for critical component identification \& verification using {ABC}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--12", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532811", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Now a days, software industries satisfy users' needs through developing software. To satisfy their customers, the software developers need to identify the critical components that make serious impacts on users' requirements. Tracking critical components is an important and timeconsuming process. In this paper, we propose a novel approach, Criticality Analysis, which identifies the critical components of an application. The identified critical components are verified to ensure that they are failure-free using the intelligent search based optimization algorithm, Artificial Bee Colony.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ahmad:2013:WSE, author = "Faisal Ahmad and Suvamoy Changder and Anirban Sarkar", title = "{Web} service execution model for cloud environment", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--13", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Web services describe a standardized way of integrating Web-based applications. In recent days, with the advancement of cloud computing, web services play pivoting roles towards meeting complex business objectives on a large scale. However, engineering dynamic web services is a complex task as they can be added, modified and deleted on the fly and even without any prior notification. Executing a large scale business process using dynamic web services is very challenging. This paper proposes an execution machine, called Web Service Dynamic Execution Machine (WSDE machine), which works in the execution layer of the three layered architecture for web service dynamics [23]. The proposed machine is capable of executing business processes having both deterministic and non-deterministic flows, where the related web services are represented using a graph-based semantic based formal model. The generic nature of the WSDE machine is useful in improving performance, scalability and maintainability of large scale web service based information systems. In this paper, the proposed WSDE machine is also illustrated with a suitable case study.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{deCastro:2013:SGP, author = "Ronney Moreira de Castro and Jos{\'e} Luis Braga and Liziane Santos Soares", title = "Selection of good practices for small software development teams: a knowledge-based approach", journal = j-SIGSOFT, volume = "38", number = "6", pages = "1--15", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532804", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The world is increasingly dependent on technology and computing systems. Software organizations are facing a highly competitive market, and thus seeking good practices and processes that help keep them competitive. The quality of their products becomes a differentiating factor and is directly associated with these processes. The software products they deliver play a major role in this competitive scenario, to which small organizations do not have easy access. Our study is directed to those small and micro-organizations that lack the necessary financial assets to hire people, adopt and implement expensive processes, or even implement good development practices. In this paper we present our approach to help those organizations find good practices to enhance their software development processes. The method consisted of obtaining a possible company profile based on technical attributes, given as input to a knowledge-based system that derived a list of possible practices to be adopted according to that profile. Then project managers can select those more suitable to the company's present demands, and implement them in smaller steps according to the organization maturity levels. The approach was currently tested in two organizations that are by now implementing the suggested practices. The proposed system is freely available through the internet.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Katic:2013:WAC, author = "Marija Katic", title = "Why attending conferences is important for your research: {ESEC\slash FSE 2013} experience summary", journal = j-SIGSOFT, volume = "38", number = "6", pages = "5--6", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532787", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper, a personal perspective on how important for a scientist is to attend conferences is given. The report is influenced by the author's attendance of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2013). ESEC/FSE 2013 took place in Saint Petersburg, Russia and gathered researchers, practitioners, and educators from all over the world that presented and discussed the most recent work, trends, and challenges in the field of software engineering. ESEC/FSE joined the main conference, and several co-located events: two conferences, four workshops, doctoral symposium and seven tutorials. While the main conference covered broad topics in software engineering, the two co-located conferences were targeted to the specific software engineering community: multicore software engineering, performance, and tools, and to the search-based software engineering community. Additionally, there were four interesting workshops: on social software engineering, on software evolution, on software ecosystem architectures, and on software development lifecycle for mobile. Keywords Software engineering, discuss, attending conferences.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2013:Pb, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "38", number = "6", pages = "6--7", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532783", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2013:WLM, author = "Robert Schaefer", title = "Why {Lehman} matters: mediocracy", journal = j-SIGSOFT, volume = "38", number = "6", pages = "8--9", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532786", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ardis:2013:SEEd, author = "Mark A. Ardis and Peter B. Henderson", title = "Software engineering education {(SEEd)}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "9--10", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532785", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2013:SNSf, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "11--20", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532782", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2013:RPf, author = "Peter G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "38", number = "6", pages = "21--28", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532781", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Graziotin:2013:RDP, author = "Daniel Graziotin and Andreas Jedlitschka", title = "Recent developments in product-focused software process improvement: {PROFES} 2013 conference report", journal = j-SIGSOFT, volume = "38", number = "6", pages = "29--34", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532789", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This report summarizes the presentations and discussions that happened at PROFES 2013, the 14th International Conference on Product-Focused Software Process Improvement, which was held June 12--14, 2013 in Paphos, Cyprus. The main theme of PROFES is software process improvement (SPI) motivated by product, process, and service quality needs. PROFES 2013 addressed both quality engineering and management topics, divided into the areas of Decision Support in Software Engineering, Empirical Software Engineering, Managing Software Processes, Safety-Critical Software Engineering, Software Measurement, Software Process Improvement, and Software Maintenance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2013:ISD, author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti Mishra", title = "Information systems in distributed environments: {ISDE} 2013", journal = j-SIGSOFT, volume = "38", number = "6", pages = "34--35", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532790", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a report from a one-day fourth international workshop on ``Information Systems in Distributed Environments'' (ISDE), which was organized in conjunction with the OnTheMove Federated Conferences \& Workshops (OTM 2013) at Technical University of Graz, Austria, on September 13, 2013. The main focus of this workshop was to provide a venue for the discussion of challenges related to the development, operation, and maintenance of distributed information systems, and their creation in the context of global development projects. Further dissemination of research results will lead to an improvement of distributed information system development and deployment across the globe.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kienle:2013:BRE, author = "Holger M. Kienle", title = "Book Review: {{\booktitle{Effective JavaScript: 68 specific ways to harness the power of JavaScript}} by David Herman}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "40--41", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532791", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Moreland:2013:BRP, author = "Doug Moreland", title = "Book Review: {{\booktitle{A practical approach to large-scale agile development: how HP transformed LaserJet FutureSmart firmware}} by Gary Gruver, Mike Young and Pat Fulghm}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "41--42", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532792", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Payton:2013:BRD, author = "Ryan Payton", title = "Book Review: {{\booktitle{DevOps Troubleshooting}} by Kyle Rankin}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "42--42", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2013:BRD, author = "Robert Schaefer", title = "Book Review: {{\booktitle{Dynamic reconfigurable network-on-chip design: innovations for computational processing and communication}} by Jih-Sheng Shen and Pao-Ann Hsuing}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "42--43", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532794", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bangalore:2013:HFD, author = "Bangalore", title = "{Hadoop} Fundamentals by Doug Eadline", journal = j-SIGSOFT, volume = "38", number = "6", pages = "43--44", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532795", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:XML, author = "Vasile G. Teodorovici", title = "{OS} X mountain lion: the missing manual by {David} Pogue", journal = j-SIGSOFT, volume = "38", number = "6", pages = "44--44", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRO, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{The object-oriented thought process}}, fourth edition by Matt Weisfeld}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "44--45", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532797", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teodorovici:2013:BRA, author = "Vasile G. Teodorovici", title = "Book Review: {{\booktitle{Advanced programming in the UNIX environment}}, third edition by W. Richard Stevens and Stephen A. Rago}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "45--45", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2532798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jahns:2013:BRD, author = "Veit Jahns", title = "Book Review: {{\booktitle{Data insights: new ways to visualize and make sense of data}} by Hunter Whitney}", journal = j-SIGSOFT, volume = "38", number = "6", pages = "45--46", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2544424", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tracz:2013:SEC, author = "Will Tracz", title = "Software engineering: the current practice by Vaclav Rajlich", journal = j-SIGSOFT, volume = "38", number = "6", pages = "46--46", month = nov, year = "2013", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2532780.2544425", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nautiyal:2014:NAC, author = "Lata Nautiyal and Neena Gupta and Sushil Chandra Dimri", title = "A Novel Approach to Component-Based Software Testing", journal = j-SIGSOFT, volume = "39", number = "6", pages = "1--4", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674640", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In the present era when component-based software development plays an important role in the software development community, testing is an important activity, which should not be neglected. Component-based software testing is an essential activity, which supports productivity in component-based software development. Past studies indicate that more than fifty percent of the cost of software development is dedicated to the testing activity, which results in an increased cost of the software. This paper describes the issues and challenges of component-based systems. This paper also suggests the requirement of a novel approach to testing of component-based software. It also proposes a novel approach to testing of component-based software while considering some important factors like component study, component test case design, component test execution, and component test analysis and component test documentation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sabharwal:2014:IIC, author = "Sangeeta Sabharwal and Manuj Aggarwal", title = "Identifying Interactions for Combinatorial Testing using Data Flow Techniques", journal = j-SIGSOFT, volume = "39", number = "6", pages = "1--4", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674643", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Combinatorial (t-way) testing has been proved to be an effective technique that identifies faults caused by interactions among a small number of input parameters. However, the degree of interaction to be considered for testing is still an open issue. Although higher strength t-way testing improves fault detection, it leads to a considerable increase in number of interactions to be tested and hence the test set size. In this paper, an approach is proposed that attempts to reduce the number of interactions to be tested. The source code is transformed into a flow graph and data flow analysis is applied to it to identify the interactions that exist in the system. The initial results suggest that the approach is able to achieve a considerable reduction in the number of interactions to be tested.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Zaidi:2014:PES, author = "Taskeen Zaidi and Vipin Saxena", title = "Performance Estimation of Static Step Topology Across Distributed Networks through Simulation Tool", journal = j-SIGSOFT, volume = "39", number = "6", pages = "1--4", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674644", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "During the past years, distributed computing has become more popular because of several advantages over centralized computing. Such types of platforms offer high performance computing environment at a too low cost. Many of organizations have shifted their old centralized based computing labs into distributed computing labs that are based upon a static topological structure. The present work is related to the performance estimation of newly proposed step topology across the distributed computing network. The well-known Unified Modeling Language is used to design a model for computation of performance of the topology. The performance is measured in terms of transferring the video and audio files that are having a large size in terms for bytes. A simulation tool provides transferring of packets across distributed networks designed through step topology.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nautiyal:2014:MRC, author = "Lata Nautiyal and Neena Gupta and Sushil Chandra Dimri", title = "Measurement of the Reliability of a Component-Based Development using a Path-Based Approach", journal = j-SIGSOFT, volume = "39", number = "6", pages = "1--5", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674641", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Component-based systems are based on the idea of assembling lots of independent and pre-defined components based on discriminating designs. Component-based systems provide a better reuse of software components along with flexibility, scalability and better quality of services to fulfill the requirements of the end user. We can consider component-based software engineering successful only if it has the ability to select and integrate reliable components. In this paper we propose an innovative reliability model in terms of multiple execution paths and the usage percentage of each and every component.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Parashar:2014:MCR, author = "Anshu Parashar and Jitender Kumar Chhabra", title = "Measuring Change-Readiness of Classes by Mining Change-History", journal = j-SIGSOFT, volume = "39", number = "6", pages = "1--5", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674642", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The change-history of a software system records how the system evolved over time. The change-history can tell which components (classes) are changed together, i.e. are change-coupled. In this paper, we propose two metrics for quantifying change-coupling among classes on the basis of their change-history and then propose another measure to compute a change-readiness index of the classes. The change-readiness of a class is measured as how much the class is ready to change. In this paper, we define change-history-based metrics, demonstrate computation of these measures by example and validate them theoretically. The SVNSearch subversion web-based utility has been used to mine the change logs of the EGit project of Eclipse. Further, change-readiness is computed for the classes of EGit and our findings are discussed. It has been found that the metrics based on change-history can be helpful to predict the future change behavior of the classes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kaur:2014:MSI, author = "Navdeep Kaur and Parminder Kaur", title = "Mitigation of {SQL} Injection Attacks using Threat Modeling", journal = j-SIGSOFT, volume = "39", number = "6", pages = "1--6", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674638", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Day after day, SQL Injection (SQLI) attack is consistently proliferating across the globe. According to Open Web Application Security Project (OWASP) Top Ten Cheat Sheet-2014, SQLI is at top in the list of online attacks. The cause of spread of SQLI is thought to be Unsecure Software Engineering. The Software Development process itself appears to look at security as an add-on to be checked and deployed towards the end of the software development lifecycle which leads to vulnerabilities in web applications. This paper is an attempt to integrate security in early stages of SDLC i.e. in design phase to mitigate SQLI vulnerability. How SQLI attack happens is illustrated. Threat Modeling is performed to mitigate the SQLI vulnerability.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2014:DLB, author = "Narander Kumar and Shalini Agarwal and Taskeen Zaidi and Vipin Saxena", title = "A Distributed Load-balancing Scheme Based on a Complex Network Model of Cloud Servers", journal = j-SIGSOFT, volume = "39", number = "6", pages = "1--6", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674639", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "Efficient management of resources in a federation of interacting computing servers and devices, for example, in a cloud computing environment, requires a load-balancing system that is self-regulatory and oblivious in nature. Due to the increasing size of data centers and their distribution across the globe, centralized load-balancing approaches suffer significant deficiencies in terms of communication overhead caused by the need to collect state dependent information. The technology of the cloud in its current state runs as many as 200 virtual machines on a single server, which clearly shows the importance of studying distributed load-balancing systems in the cloud. In the present paper, the federation of cloud servers is modeled as a complex network. In a complex network the structure and dynamics of the underlying system are encoded in the network topology itself. A method using random walks on complex networks for discovering free resources in a Cloud Server Network is given. The given method is used to balance the overall load on the network by equalising loads on overloaded and underloaded nodes without the need of a global load balancer. Simulation results are obtained through Network Simulator Version 2, which show that the proposed load-balancing scheme performs well for a large network by uniformly distributing the workload among the servers in polynomial time.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2014:P, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "39", number = "6", pages = "6--7", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674636", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2014:SNS, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "39", number = "6", pages = "8--16", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674634", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2014:RP, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "39", number = "6", pages = "17--22", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674635", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ralph:2014:HDG, author = "Paul Ralph and Iaakov Exman and Pan-Wei Ng and Pontus Johnson and Michael Goedicke and Alper Tolga Kocata and Kate Liu Yan", title = "How to Develop a General Theory of Software Engineering: Report on the {GTSE 2014} Workshop", journal = j-SIGSOFT, volume = "39", number = "6", pages = "23--25", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674647", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Many academic disciplines have general theories, which apply across the discipline and explain diverse phenomena. General theories facilitate developing a cumulative body of knowledge, increase a field's resistance to fads and pseudoscience, and help us respond to novel situations where old heuristics break down. The goal of the SEMAT General Theory of Software Engineering (GTSE) workshop is therefore to promote developing and testing general theories for software engineering. The Third GTSE workshop was co-located with the International Conference on Software Engineering (ICSE) in 2014. Participants explored different types of theories and how to assemble them into a framework. Participants debated how to make theories practical to practitioners and agreed that different types of practitioners (e.g. developers) have different needs for theories.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Robles:2014:FRT, author = "Gregorio Robles and Jes{\'u}s M. Gonz{\'a}lez-Barahona and Dirk Riehle", title = "{FLOSS Research Track at the 10th International Symposium on Open Collaboration (OpenSym 2014)}", journal = j-SIGSOFT, volume = "39", number = "6", pages = "26--27", month = nov, year = "2014", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2674632.2674648", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a report from the Free/Libre/Open Source (FLOSS) research track at the 10th International Symposium on Open Collaboration (OpenSym 2014), which took place in Berlin, Germany, August 27-29. As part of a broader community interested in ``everything open'', including open access, open data, open educational resources, Wikipedia, wikis and open collaboration, this research track was a place to discuss software engineering related issues from various points of view, based on a selection of research papers that was considered by the programme committee. As such, we had contributions on technical (such as the usefulness of automatic bug reporting tools, the implementation of standards, or linking various data sources), community-related (integration, congruence), economic (business models, or the impact of FLOSS in the growth of businesses), and fundamental (such as software forks) matters. We look forward to next year's OpenSym, which will take place 19-21 August 2015 in San Francisco, California, see http://opensym.org.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hughes:2016:BRA, author = "Jeffrey Hughes and Cassandra Sparks and Alley Stoughton and Rinku Parikh and Albert Reuther and Suresh Jagannathan", title = "{Building Resource Adaptive Software Systems (BRASS)}: Objectives and System Evaluation", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--2", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853081", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid obsolescence --- if at some cost in terms of frustration. In the case of the U.S. military, having access to well-functioning software systems and underlying content is critical to national security, but updates are no less problematic than among civilian users and often demand considerable time and expense. To address these challenges, DARPA has announced a new four-year research project to investigate the fundamental computational and algorithmic requirements necessary for software systems and data to remain robust and functional in excess of 100 years. The Building Resource Adaptive Software Systems, or BRASS, program seeks to realize foundational advances in the design and implementation of long-lived software systems that can dynamically adapt to changes in the resources they depend upon and environments in which they operate. [1] MIT Lincoln Laboratory will provide the test framework and evaluation of proposed software tools in support of this revolutionary vision", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bhardwaj:2016:KSM, author = "Mridul Bhardwaj and Ajay Rana", title = "Key Software Metrics and its Impact on each other for Software Development Projects", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--4", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853087", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Every software development project is unique and different from repeatable manufacturing process. Each software project share different challenges related to technology, people and timelines. If every project is unique, how project manager can estimate project in a consistent way by applying his past experience. One of the major challenges faced by the project manager is to identify the key software metrics to control and monitor the project execution. Each software development project may be unique but share some common metric that can be used to control and monitor the project execution. These metrics are software size, effort, project duration and productivity. These metrics tells project manager about what to deliver (size), how it was delivered in past (productivity) and how long will it take to deliver with current team capability (time and effort). In this paper, we explain the relationship among these key metrics and how they statistically impact each other. These relationships have been derived based on the data published in book ``Practical Software Estimation'' by International Software Benchmarking Group. This paper also explains how these metrics can be used in predicting the total number of defects. Study suggests that out of the four key software metrics software size significantly impact the other three metrics (project effort, duration and productivity). Productivity does not significantly depend on the software size but it represents the nonlinear relationship with software size and maximum team size, hence, it is recommended not to have a very big team size as it might impact the overall productivity. Total project duration only depends on the software size and it does not depend on the maximum team size. It implies that we cannot reduce project duration by increasing the team size. This fact is contrary to the perception that we can reduce the project duration by increasing the project team size. We can conclude that software size is the important metrics and a significant effort must be put during project initiation phases to estimate the project size. As software size will help in estimating the project duration and project efforts so error in estimating the software size will have significant impact on the accuracy of project duration and effort. All these key metrics must be re-calibrated during the project development life cycle", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Drori:2016:TSD, author = "Offer Drori", title = "Template for a System Design File Using {OODPM} Version 2015", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--4", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853090", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Object Oriented Design by Prototype Methodology (OODPM) integrates two known technologies: the object approach and the prototype concept. Object oriented methodology is used for internal system design, and prototype methodology is used for external system design. This document is a template for a system design file using OODPM version 2015 (titles of paragraphs only). For full explanations for each paragraph look at [1]. This version developed after tens of projects that developed and plan using version 6 in a very vast projects for national information systems. This version companion by ``OODPM --- Methodology for Management Information Systems life Cycle'' (meanwhile only in Hebrew)", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gulati:2016:SRB, author = "Jayati Gulati and Priya Bhardwaj and Bharti Suri and Anu Singh Lather", title = "A Study of Relationship between Performance, Temperament and Personality of a Software Programmer", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--5", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853089", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper focuses on finding the relationship between the performance, temperament and personality of a software programmer. The rationale behind conducting this study is to find out if personality influences the performance of software engineering students. We conducted a survey of 66 students pursuing engineering to find out their personality traits and its relationship with their programming abilities. The personality test used was Goldberg's IPIP (International Personality Item Pool) and Keirsey Temperament Sorter. The results showed that IPIP test personality traits of extroversion, agreeableness, conscientiousness, emotional stability and intellect are not significantly correlated with performance of the respondents. However, on temperament dimension it was found that there was a significant correlation between ``Guardian'' temperament and high performance which indicates that these respondents had sensing and judging type of temperament", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Nautiyal:2016:NAE, author = "Lata Nautiyal and Preeti", title = "A Novel Approach of Equivalence Class Partitioning for Numerical Input", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--5", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853084", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software testing is an indispensible phase of software development that supports not only productivity but also quality assurance from small to large scale software products. Software Systems essentially need an effective way to develop a strategy for testing various aspects of the system. When we are testing software the first and potentially most critical step is to design test cases. There are many methods which assist test case design. This paper will document the approach known as Equivalence class partitioning. We have partitioned the input into two classes Even and Odd. The proposed approach works for integer inputs only. Partitioning is done on basis of assessment of input conditions that serves as a set of valid as well as invalid set of input values for a test case", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rathore:2016:DTR, author = "Santosh Singh Rathore and Sandeep Kumar", title = "A Decision Tree Regression based Approach for the Number of Software Faults Prediction", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--6", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853083", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software fault prediction is an important activity to make software quality assurance (SQA) process more efficient, economic and targeted. Most of earlier works related to software fault prediction have focused on classifying software modules as faulty or non-faulty. However, prediction of the number of faults in a given software module is not adequately investigated. In this paper, we explore the capability of decision tree regression (DTR) for the number of faults prediction in two different scenarios, intra-release prediction and inter-releases prediction for the given software system. The experimental study is performed over five open-source software projects with their nineteen releases collected from the PROMISE data repository. The predictive accuracy of DTR is evaluated using absolute error and relative error, prediction at level l and goodness-of-t measure. The results show that decision tree regression produced significant prediction accuracy for the number of faults prediction in both the considered scenarios. The relative comparison of intra-release and inter-releases fault prediction shows that intra-project prediction produced better accuracy compared to inter-releases prediction across all the datasets", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Shah:2016:ESD, author = "Unnati S. Shah", title = "An Excursion to Software Development Life Cycle Models: an Old to Ever-growing Models", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--6", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853080", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software Engineering provides a standard way to develop and maintain a complex software. Industry uses software development Life Cycles (SDLC) to develop a software. SDLC plays an important role as it helps to define the software requirements, model the software component, reduce development and maintenance cost and finally provides manageable software. There exist numerous SDLC models viz. Waterfall, Incremental, Rapid, Agile, Hybrid etc. After a comprehensive study and analysis of existing SDLC models, I observe all models are complementary, not competitive. I divide all models into three broad categories viz. Traditional models, Agile models and Hybrid models. The main objective of the paper is to give a quick review of SDLC models and an effective answer to the most confusing question arise in software engineering practice ``how to select an efficient SDLC model for practice?'' Many factors viz. nature of requirements, the size of software development team, project size, customer interaction etc. have an effect on selection criteria. This paper presents a brief insight into each model and its comparative analysis. The analysis helps to understand the basic characteristics of each model and its applicability. Furthermore, the analysis helps software manager to select the appropriate model for practice", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Baliyan:2016:HFS, author = "Niyati Baliyan and Sandeep Kumar", title = "A Hierarchical Fuzzy System for Quality Assessment of Semantic {Web} Application as a Service", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--7", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853085", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Semantic Web enabled applications are becoming popular due to the presence of their machine comprehensible description, which makes them easily sharable across machines. If such applications are deployed as services to the user through the Cloud, they can facilitate transparency and reusability. There exist no attributes, metrics, or models for monitoring the quality of such applications. In the current work, a hierarchical fuzzy system for quality assessment of Semantic Web based applications delivered as services on the Cloud, is proposed. The quality attributes proposed herein have been validated through the standard IEEE-1061 validation framework. Experimental results reveal that the proposed hierarchical fuzzy system handles the multiplicity of quality attributes, and can be used for the relative ranking of Semantic Web applications available as services", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{kotti:2016:QSA, author = "Jayasri kotti and Seetharamaiah Panchumarthy", title = "The Quantitative Safety Assessment and Evaluation for Safety-Critical Computer Systems", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--8", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853091", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The rapid increase in computer-related technologies puts greater demands on the software-controlled systems. These demands place the software in total control over safety-critical systems. A fault in such a Safety-Critical Computer Systems (SCCS) can result in catastrophic concerns such as loss of life, harm, or equipment damage. In order to detect and prevent such faults, some safety standards, safety analysis and fault-tolerant techniques have been developed. Still, it requires adequate methodologies and frameworks to complete verification of these SCCS. In this work, the software safety is considered into 3 parts: Safety Modeling, Safety Measurement and Safety Management, with assurance lying down to develop high quality software for SCCS. The proposed methodology is SM-Cube (Safety Modeling, Safety Measurement and Safety Management) which is the Safety-Critical Computer Systems concerned. SM-Cube provides a clarified differentiation for assessing and evaluating the safety embedded into the software. SM-Cube consists of required processes and operations for developing SCCS free of faults. This proposed SM-cube has been applied to safety-critical software based Railroad Crossing Control System (RCCS) which is a laboratory prototype. The outcomes of the prototype confirmed that all critical operations have been safe and risk free. The development of the software based on the proposed SM-cube for RCCS have shown a simplified and improved safety-critical operations of the overall system performance", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ozturk:2016:IGTa, author = "Muhammed Maruf {\"O}zt{\"u}rk and Ahmet Zengin", title = "Improved {GUI} Testing using Task Parallel Library", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--8", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853086", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "While performing a software engineering project, testing is one of the effort intensive activity accounting for up to 50\% of total software development cost. To reduce this cost, parallel execution of test cases is a preferred way for developers. Task Parallel Library (TPL) is a powerful and scalable library providing a wide range of methods while facilitating test harnesses. Here, we propose a novel algorithm P-GUI, thereby using TPL. Results of experiment designed on 10 web pages show that proposed algorithm achieved a speedup of 1.4 on average", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Park:2016:SPE, author = "June Sung Park and Paul E. McMahon and Barry Myburgh", title = "{Scrum} Powered by Essence", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--8", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853088", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This paper shows how Scrum project management practice can be described using Essence kernel and language which has recently been adopted as an official Object Management Group standard for creating and enacting software engineering methods. Practical benefits of using Essence as a common foundation for defining software engineering practices are demonstrated. These practical benefits include the ability to compare practices, assess potential gaps, make needed practice improvements, and assemble select practices into a coherent method to benefit the project team. In addition, by providing practical checklists, as opposed to conceptual discussions, the Essence-powered practice becomes something the team uses on a daily basis. This is a fundamental difference from traditional approaches, which tend to overemphasize method description as opposed to method use", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Soujanya:2016:GFC, author = "K. L. S. Soujanya and A. AnandaRao", title = "A Generic Framework for Configuration Management of {SPL} and Controlling Evolution of Complex Software Products", journal = j-SIGSOFT, volume = "41", number = "1", pages = "1--10", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853082", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Efficient configuration management system is crucial for the success of any software product line (SPL). Due to ever changing needs of customers, SPL undergoes constant changes that are to be tracked in real time. In the context of customer-driven development, anticipation and change management are to be given paramount importance. It demands implementation of software variability that drives home changed, extended and customized configurations besides economy at scale. Moreover, the emergence of distributed technologies, the unprecedented growth of component based, service-oriented systems throw ever increasing challenges to software product line configuration management. Derivation of a new product is a dynamic process in software product line that should consider functionality and quality attributes. Very few approaches are found on configuration management (CM) of SPL though CM is enough matured for traditional products. They are tailor made and inadequate to provide a general solution. Stated differently, a comprehensive approach for SPL configuration management and product derivation is still to be desired. In this paper, we proposed a framework that guides in doing so besides helping in SPL definitions in generic way. Our framework facilitates SPL configuration management and product derivation based on critical path analysis, weight computation and feedback. We proposed two algorithms namely Quality Driven Product Derivation (QDPD) and Composition Analysis algorithm for generating satisfied compositions and to find best possible composition respectively. The usage of weights and critical path analysis improves quality of product derivation. The framework is extensible and flexible thus it can be leveraged with variability-aware design patterns and ontology. We built a prototype that demonstrates the proof of concept. We tested our approach with Dr. School product line. The results reveal that the framework supports configuration management of SPL and derivation of high quality product in the product line. We evaluated results with ground truth to establish significance of our implementation", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2016:Pa, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "41", number = "1", pages = "5--5", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853074", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2016:WWE, author = "Robert Schaefer", title = "The World Will Not End With a Bang But With {Http Error 404}", journal = j-SIGSOFT, volume = "41", number = "1", pages = "5--7", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853075", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Xie:2016:PPI, author = "Tao Xie", title = "The Pursuit of Practice-Impactful Research", journal = j-SIGSOFT, volume = "41", number = "1", pages = "7--8", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853077", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2016:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "41", number = "1", pages = "9--17", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853078", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2016:RPa, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "41", number = "1", pages = "18--24", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853076", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Exman:2016:SPG, author = "Iaakov Exman and Dewayne E. Perry and Balbir Barn and Paul Ralph", title = "Separability Principles for a General Theory of Software Engineering: Report on the {GTSE 2015} Workshop", journal = j-SIGSOFT, volume = "41", number = "1", pages = "25--27", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853093", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The four GTSE (General Theory of Software Engineering) Workshops have brought awareness to, more or less mature, differing approaches, candidate theories for SE (Software Engineering). But one asks how to appraise the generality of these theories? And in case they are specialized sub-theories, are they amenable to combination into more general theories? The papers of the fourth GTSE Workshop addressed these questions by means of what can be collectively refer to as Separability Principles. In a sense, participants used well known techniques applied to design software systems to design SE theories. Separability is a powerful tool for understanding relations among SE candidate theories and guide how to assemble sub-theories into a general framework. Participants enthusiastically debated a series of related issues. The specialized vs. general theories questions were raised in diverse forms, such as, SE meaning multiple things, good predictive theories for narrow problems, ability of General theories to generate specific theories, and last but not least, whether ``General'' capture the contents of the workshop itself. The 4th GTSE edition was collocated with ICSE 2015 (International Conference of Software Engineering) in Firenze, Italy", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fraser:2016:SER, author = "Steven Fraser", title = "{Software Engineering Research and Industrial Practice IEEE ICSE 2015 Workshop Report: May 17, 2015}", journal = j-SIGSOFT, volume = "41", number = "1", pages = "28--31", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853094", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This report provides an overview of the presentations and discussions of the 2nd IEEE ICSE Workshop on ``Software Engineering Research and Industrial Practice'' held May 17, 2015 in Florence Italy. The program consisted of keynotes, paper presentations, a panel, and a group dinner.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Alebrahim:2016:VQS, author = "Azadeh Alebrahim and Stephan Fa{\ss}bender and Martin Filipczyk and Michael Goedicke and Maritta Heisel and Uwe Zdun", title = "Variability for Qualities in Software Architecture", journal = j-SIGSOFT, volume = "41", number = "1", pages = "32--35", month = jan, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2853073.2853095", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Variability is a key factor of most systems. While there are many works covering variability in functionality, there is a research gap regarding variability in software qualities. There is an obvious imbalance between the importance of variability in the context of quality attributes, and the intensity of research in this area. To improve this situation, the First International Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA) was held jointly with ECSA 2015 in Cavtat/Dubrovnik, Croatia as a one-day workshop. The goal of VAQUITA was to investigate and stimulate the discourse about the matter of variability, qualities, and software architectures. The workshop featured three research paper presentations, one keynote talk, and two working group discussions. In this workshop report, we summarize the keynote talk and the presented papers. Additionally, we present the results of the working group discussions", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jie:2016:ICS, author = "Jason Lee Hua Jie", title = "Industrial Case Study of Transition from {V-Model} into {Agile SCRUM} in Embedded Software Testing Industries", journal = j-SIGSOFT, volume = "41", number = "2", pages = "1--3", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As the software features and technology advances, delivering quality embedded software for consumer products become more important and challenging than ever within organizations. This is particularly vital when these products are delivered as part of chips. These chips or better known as system-on-chip (SoC) are embedded as part of today's gadgets. They are used by consumers for their everyday use, namely mobile phones and tablets. In this case study, I will share several significant changes which have taken place in the testing embedded software industries when the transition takes place from V-model methodology to Agile Scrum in the organization. These changes are particularly related to software testing perspectives. Apart from that, I will share the challenges that have been faced and how we have managed them since the organization fully adopted Agile Scrum within the first 18 months. Finally, I will describe the way Agile Scrum has evolved and keys for QA successes in ensuring business wins with our major players of embedded software original equipment manufacturers (OEMs).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2016:IME, author = "Richa Sharma and Peeyush Aggarwal and Ashish Sureka", title = "Insights from Mining Eleven Years of Scholarly Paper Publications in Requirements Engineering {(RE)} Series of Conferences", journal = j-SIGSOFT, volume = "41", number = "2", pages = "1--6", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894794", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We present insights from a bibliometric analysis and scientific paper publication mining of 551 papers in Requirements Engineering (RE) series of conference (11 years from 2005 to 2015). We study cross-disciplinary and interdisciplinary nature of RE research by analyzing the cited disciplines in the reference section of each paper. We apply topic modeling on a corpus consisting of 551 abstracts and extract topics as frequently co-occurring and connected terms. We use topic modeling to study the structure and composition of RE research and analyze popular topics in industry as well as research track. Co-authorship in papers is an indicator of collaboration and interaction between scientists as well as institutions and we analyze co-authorship data to investigate university-industry collaboration, internal and external collaborations. We present results on the distribution of the number of co-authors in each paper as well as distribution of authors across world regions. We present our analysis on the public or proprietary dataset as well as the domain of the dataset used in studies published in Requirements Engineering (RE) series of conferences.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ozturk:2016:IGTb, author = "Muhammed Maruf {\"O}zt{\"u}rk and Ahmet Zengin", title = "Improved {GUI} Testing using Task Parallel Library", journal = j-SIGSOFT, volume = "41", number = "2", pages = "1--8", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2936305", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "While performing a software engineering project, testing is one of the effort intensive activity accounting for up to 50\% of total software development cost. To reduce this cost, parallel execution of test cases is a preferred way for developers. Task Parallel Library (TPL) is a powerful and scalable library providing a wide range of methods while facilitating test harnesses. Here, we propose a novel algorithm P-GUI, thereby using TPL. Results of experiment designed on 10 web pages show that proposed algorithm achieved a speedup of 1.4 on average.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2016:GBD, author = "Jagannath Singh and Subhrakanta Panda and P. M. Khilar and D. P. Mohapatra", title = "A Graph-Based Dynamic Slicing of Distributed Aspect-Oriented Software", journal = j-SIGSOFT, volume = "41", number = "2", pages = "1--8", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894791", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Distributed computing has become very popular these days due to its speed, accuracy and fault tolerance capability. In this pa-per, we have considered the distributed Aspect-Oriented Programs (AOPs) where message passing and synchronization are handled by Aspects. In this paper, we present a parallel dynamic slicing algorithm for distributed AOPs. We introduce parallelism into our slicing algorithm to make the slice computation process much faster. Our algorithm is implemented on our developed tool, called DDG generator, to generate the required intermediate graphs for distributed AOPs. The proposed slicing technique is compared with one related existing technique using three case studies. The experimental results show that our proposed slicing algorithm generates precise slices in less time as compared to the existing algorithm.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hu:2016:UUC, author = "Wei-Chung Hu and Hewijin Christine Jiau", title = "{UCFrame}: a Use Case Framework for Crowd-Centric Requirement Acquisition", journal = j-SIGSOFT, volume = "41", number = "2", pages = "1--13", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894795", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "To build needed mobile applications in specific domains, requirements should be collected and analyzed in holistic approach. However, resource is limited for small vendor groups to perform holistic requirement acquisition and elicitation. The rise of crowdsourcing and crowdfunding gives small vendor groups new opportunities to build needed mobile applications for the crowd. By finding prior stakeholders and gathering requirements effectively from the crowd, mobile application projects can establish sound foundation in early phase of software process. Therefore, integration of crowd-based requirement engineering into software process is important for small vendor groups. Conventional requirement acquisition and elicitation methods are analyst-centric. Very little discussion is in adapting requirement acquisition tools for crowdcentric context. In this study, several tool features of use case documentation are revised in crowd-centric context. These features constitute a use case-based framework, called UCFrame, for crowd-centric requirement acquisition. An instantiation of UCFrame is also presented to demonstrate the effectiveness of UCFrame in collecting crowd requirements for building two mobile applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2016:Pb, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "41", number = "2", pages = "5--5", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894788", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2016:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "41", number = "2", pages = "6--15", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894790", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2016:RPb, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "41", number = "2", pages = "16--22", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894789", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Axelsson:2016:NAS, author = "Jakob Axelsson and Efi Papatheocharous and Jaana Nyfjord and Martin T{\"o}rngren", title = "Notes On Agile and Safety-Critical Development", journal = j-SIGSOFT, volume = "41", number = "2", pages = "23--26", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Agile approaches have been highly influential to the software engineering practices in many organizations, and are increasingly being applied in larger companies, and for developing systems outside the pure software domain. To understand more about the current state of agile, its applications to safety-critical systems, and the consequences on innovation and large organizations, a seminar was organized in Stockholm in 2014. This paper gives an overview of the topics discussed at that seminar, a summary of the main results and suggestions for future work as input to a research agenda for agile development of safety-critical software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Staalhane:2016:ASA, author = "Tor St{\aa}lhane and Thor Myklebust", title = "Agile Safety Analysis", journal = j-SIGSOFT, volume = "41", number = "2", pages = "27--29", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894797", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper, we describe a method for performing safety analysis based on user stories in an agile setting. The chosen analysis method is a generic hazards list, combined with FMEA --- both because it is simple and intuitive to use and because it is efficient. In order to handle failure propagation in an efficient and easy-to-understand way, we have chosen to use the input-Focused FMEA from the HiP-HOPS project.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doss:2016:COA, author = "O. Doss and T. P. Kelly", title = "Challenges and Opportunities in Agile Development in Safety Critical Systems: a Survey", journal = j-SIGSOFT, volume = "41", number = "2", pages = "30--31", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this paper we describe the results of a recent practitioner survey designed to elicit the opinions as to the challenges and opportunities posed by the application of agile development methods in the field of safety critical systems development. In particular, the survey explored the relationship between three key activities in safety engineering and an agile approach --- namely, safety requirements development, hazard analysis, and safety case development. The results of this survey are presented together with brief discussion of the implications for integration.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hanssen:2016:PWA, author = "Geir K. Hanssen and Thor Myklebust and Tor St{\aa}lhane", title = "Proceedings on the {1st Workshop on Agile Methods Applied to Development and Certification of Safety-critical Software}", journal = j-SIGSOFT, volume = "41", number = "2", pages = "32--33", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894799", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The first international workshop on agile methods applied to development and certification of safety-critical software (ASCS) was organized as part of the XP 2015 conference on May 25th 2015. The workshop gathered 17 experts from industry and academia to share recent industrial experience and research on applications of agile methods in the safety critical software domain. The workshop was organized as a series of talks and discussions to share experience and ideas. The workshop audience also provided guidelines for future research needed to advance the field.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Torre:2016:IWU, author = "Damiano Torre and Yvan Labiche and Marcela Genero and Maged Elaasar and Tuhin Kanti Das and Bernhard Hoisl and Matthias Kowal", title = "{1st International Workshop on UML Consistency Rules (WUCOR 2015)}: Post workshop report", journal = j-SIGSOFT, volume = "41", number = "2", pages = "34--37", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Unified Modeling Language (UML), with its 14 different diagram types, is the de-facto standard modeling language for object-oriented software modeling and documentation. Since the various UML diagrams describe different views of one, and only one, software system under development, they strongly depend on each other in many ways. In other words, the UML diagrams describing a software system must be consistent. Inconsistencies among these diagrams may be a source of faults during software development and analysis. It is therefore paramount that these inconsistencies be detected, analyzed and --- hopefully --- fixed. The goal of this workshop was to gather input and feedbacks on UML consistency rules from the community. This workshop provided an opportunity for researchers who have been working in the area of UML consistency to interact with each other at a highly interactive venue, improve the body of knowledge on UML consistency rules and discuss ideas for further research in this area. This report summarizes details of the workshop and the results obtained that day.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Avgeriou:2016:TDB, author = "Paris Avgeriou and Neil A. Ernst and Robert L. Nord and Philippe Kruchten", title = "Technical Debt: Broadening Perspectives Report on the {Seventh Workshop on Managing Technical Debt (MTD 2015)}", journal = j-SIGSOFT, volume = "41", number = "2", pages = "38--41", month = mar, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2894784.2894800", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Increasingly software engineers use the metaphor of technical debt to communicate issues related to the growing cost of change. In this article, we report on the Seventh Workshop on Managing Technical Debt (MTD 2015), held in Bremen, Germany, on October 2, 2015, collocated with the International Conference on Software Maintenance and Evolution (ICSME). The 30 workshop participants from industry and academia engaged in lively discussions, which helped clarify issues, refine questions, and promote common understanding about technical debt in software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Brooks:2016:CST, author = "Andrew Brooks and Laura Krebs and Brandon Paulsen", title = "A Comparison of Sorting Times between {Java 8} and {Parallel Colt}: an Exploratory Experiment", journal = j-SIGSOFT, volume = "41", number = "4", pages = "1--5", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967316", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "An exploratory experiment found that sorting arrays of random integers using Java 8's parallel sort required only 50\%-70\% of the time taken using the parallel sort of the Parallel Colt library. Factors considered responsible for the performance advantage include the use of a dual-pivot quicksort on locally held data at certain phases of execution and work-stealing by threads, a feature of the fork--join framework. The default performance of Parallel Colt's parallel sort was found to degrade dramatically for small array sizes due to unnecessary thread creation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Honig:2016:LAS, author = "William L. Honig and Natsuko Noda and Shingo Takada", title = "Lack of Attention to Singular (or Atomic) Requirements Despite Benefits for Quality, Metrics and Management", journal = j-SIGSOFT, volume = "41", number = "4", pages = "1--5", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967315", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "There are seemingly many advantages to being able to identify, document, test, and trace single or ``atomic'' requirements. Why then has there been little attention to the topic and no widely used definition or process on how to define atomic requirements? Definitions of requirements and standards focus on user needs, system capabilities or functions; some definitions include making individual requirements singular or without the use of conjunctions. In a few cases there has been a description of atomic system events or requirements. This work is surveyed here although there is no well accepted and used best practice for generating atomic requirements. Due to their importance in software engineering, quality and metrics for requirements have received considerable attention. In the seminal paper on software requirements quality, Davis et al. proposed specific metrics including the ``unambiguous quality factor'' and the ``verifiable quality factor''; these and other metrics work best with a clearly enumerable list of single requirements. Atomic requirements are defined here as a natural language statement that completely describes a single system function, feature, need, or capability, including all information, details, limits, and characteristics. A typical user login screen is used as an example of an atomic requirement which can include both functional and nonfunctional requirements. Individual atomic requirements are supported by a system glossary, references to applicable industry standards, mock ups of the user interface, etc. One way to identify such atomic requirements is from use case or system event analysis. This definition of atomic requirements is still a work in progress and offered to prompt discussion. Atomic requirements allow clear naming or numbering of requirements for traceability, change management, and importance ranking. Further, atomic requirements defined in this manner are suitable for rapid implementation approaches (implementing one requirement at a time), enable good test planning (testing can clearly indicate pass or fail of the whole requirement), and offer other management advantages in project control.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Osterweil:2016:PEM, author = "Leon J. Osterweil", title = "Preview: Ethical and Moral Issues for Software Engineers", journal = j-SIGSOFT, volume = "41", number = "4", pages = "5--5", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967311", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2016:Pc, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "41", number = "4", pages = "6--7", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967312", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Xie:2016:OTO, author = "Tao Xie", title = "Outward Thinking for Our Research Community", journal = j-SIGSOFT, volume = "41", number = "4", pages = "7--8", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967313", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2016:SNSc, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "41", number = "4", pages = "9--17", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967314", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2016:RPc, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "41", number = "4", pages = "18--24", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967310", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mishra:2016:ISD, author = "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti Mishra", title = "Information Systems in Distributed Environments 2015", journal = j-SIGSOFT, volume = "41", number = "4", pages = "25--26", month = jul, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2967307.2967317", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a report from a one-day sixth international workshop on ``Information Systems in Distributed Environments'' (ISDE), which was organized in conjunction with the OnTheMove Federated Conferences \& Workshops (OTM 2015) October 26-30, 2015, Rhodes, Greece. The main focus of this event was to provide a venue for the discussion of challenges related to the development, operation, and maintenance of distributed information systems, and their creation in the context of global development projects. Further dissemination of research results will lead to an improvement of distributed information system development and deployment across the globe.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Osterweil:2016:P, author = "Leon J. Osterweil", title = "Be Prepared", journal = j-SIGSOFT, volume = "41", number = "5", pages = "4--5", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994210", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2016:Pd, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "41", number = "5", pages = "6--5", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994211", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2016:SSS, author = "Robert Schaefer", title = "Science, Society, and Software Engineering. {Part 2}: If science is outlawed, will only outlaws do science?", journal = j-SIGSOFT, volume = "41", number = "5", pages = "7--8", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994212", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Elbaum:2016:SI, author = "Sebastian Elbaum", title = "The State of {ICSE}", journal = j-SIGSOFT, volume = "41", number = "5", pages = "9--10", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994213", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2016:SNSd, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "41", number = "5", pages = "11--18", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994209", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2016:RPd, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "41", number = "5", pages = "19--26", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994208", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kuhrmann:2016:SIC, author = "Marco Kuhrmann and Rory V. O'Connor and Dewayne E. Perry and David Raffo", title = "Summary of the {International Conference on Software and System Processes (ICSSP 2016)}: [Co-located with {ICSE 2016}]", journal = j-SIGSOFT, volume = "41", number = "5", pages = "27--30", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994215", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The International Conference on Software and Systems Process (ICSSP), continuing the success of Software Process Workshop (SPW), the Software Process Modeling and Simulation Workshop (ProSim) and the International Conference on Software Process (ICSP) conference series, has become the established premier event in the field of software and systems engineering processes. It provides a leading forum for the exchange of research outcomes and industrial best-practices in process development from software and systems disciplines. ICSSP 2016 was held in Austin, Texas, from 14-15 May 2016, co-located with the 38th International Conference on Software Engineering (ICSE). The theme of mICSSP 2016 was studying ``Process(es) in Action'' by recognizing that the AS-Planned and AS-Practiced processes can be quite different in many ways including their ows, their complexity and the evolving needs of stakeholders. Papers presented at ICSSP discussed this issue addressing different domains, providing concepts, evidence, and experiences.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2016:NYS, author = "Richa Sharma and Ashish Sureka", title = "A Nine Year Story of the {India} Software Engineering Conference from 2008 to 2016", journal = j-SIGSOFT, volume = "41", number = "5", pages = "31--44", month = sep, year = "2016", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/2994205.2994214", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The India Software Engineering Conference (ISEC) is an annual conference in the field of Software Engineering (SE) in India. ISEC started in the year 2008 and completed 9 years in 2016. The ISEC conference has evolved into a high-quality academic event for SE researchers from universities and industry in India with considerable international participation. Assessment and evaluation of ISEC conference quality, status and evolution is important for the national SE scientific community, ISEC steering committee, sponsors and science and technology-related government bodies. In this paper, we conduct scientific paper publication mining and scientometric and bibliometric analysis of 9 years of ISEC publications and programs. We conduct an in-depth multi-dimensional analysis of the conference across various aspects such as a summary of 9 years of ISEC programs (paper submission data, tutorials, workshops, keynotes, invited talks, geographical location, program and general chairs), author-affiliation-based geographical contribution (analysis at the international and national levels), topic analysis, university and industry collaborations, contributions across university types in India, prolific and new authors, gender equality and imbalance, program committee characteristics, open-source or closed-source datasets and citation-based impact. We also present our recommendations for future editions of the ISEC based on our comprehensive analysis study presented in this paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sahu:2017:CDS, author = "Madhusmita Sahu and Durga Prasad Mohapatra", title = "Computing Dynamic Slices of Feature--Oriented Programs Using Execution Trace File", journal = j-SIGSOFT, volume = "42", number = "2", pages = "1--16", month = apr, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3089649.3089657", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Feature-Oriented Programming (FOP) is a general paradigm for synthesizing programs in software product lines. A family of software systems constitutes a software product line (SPL). The unique characteristics of feature-oriented programs such as mixin layers, refinements of classes, refinements of constructors, constants, refinements, etc. pose special difficulties in the slicing of these programs. This paper proposes a dynamic slicing algorithm for feature-oriented programs. The algorithm is named Execution Trace File Based Feature-Oriented Dynamic Slicing (ETBFODS) algorithm. The ETBFODS algorithm uses a dependence based representation called Dynamic Feature Composition Dependence Graph (DFCDG) and an execution trace file to store execution history of the program for a given input. The dynamic slice is computed by traversing the DFCDG in breadth--first or depth-first wise and then mapping the resultant traversed vertices to the program statements.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Elbaum:2017:SI, author = "Sebastian Elbaum", title = "The State of {ICSE}", journal = j-SIGSOFT, volume = "42", number = "2", pages = "4--5", month = apr, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3089649.3089651", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2017:Pa, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "42", number = "2", pages = "5--6", month = apr, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3089649.3089652", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2017:RPa, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "42", number = "2", pages = "7--14", month = apr, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3089649.3089653", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Duarte:2017:IWC, author = "Carlos Henrique C. Duarte and Andreas Jedlitschka and Ayse Bener", title = "{4th International Workshop on Conducting Empirical Studies in Industry (CESI 2016)}: Post-workshop Report", journal = j-SIGSOFT, volume = "42", number = "2", pages = "15--18", month = apr, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3089649.3089655", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Few would deny today the importance of empirical studies in the field of Software Engineering. An increasing number of studies are being conducted involving the software industry, but, while literature abounds on idealistic empirical procedures, relatively little is known about the dynamics and complexity of conducting empirical studies in the software industry. How research results are put into action in industrial settings and how much cross company learning takes place through replication of empirical studies in different contexts? What are the impediments when attempting to follow prescriptive procedures in the organizational setting and how to best handle them? These drivers underlie the organization of the fourth in a series of workshops, CESI 2016, held on 17th May, 2016 at ICSE 2016. This report summarizes the workshop details and the proceedings of the day.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bures:2017:SES, author = "Tomas Bures and Danny Weyns and Bradley Schmer and Eduardo Tovar and Eric Boden and Thomas Gabor and Ilias Gerostathopoulos and Pragya Gupta and Eunsuk Kang and Alessia Knauss and Pankesh Patel and Awais Rashid and Ivan Ruchkin and Roykrong Sukkerd and Christos Tsigkanos", title = "Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions", journal = j-SIGSOFT, volume = "42", number = "2", pages = "19--24", month = apr, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3089649.3089656", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Smart Cyber--Physical Systems (sCPS) are modern CPS systems that are engineered to seamlessly integrate a large number of computation and physical components; they need to control entities in their environment in a smart and collective way to achieve a high degree of effectiveness and efficiency. At the same time, these systems are supposed to be safe and secure, deal with environment dynamicity and uncertainty, cope with external threats, and optimize their behavior to achieve the best possible outcome. This ``smartness'' typically stems from highly cooperative behavior, self-awareness, self-adaptation, and self-optimization. Most of the ``smartness'' is implemented in software, which makes the software one of the most complex and most critical constituents of sCPS. As the specifics of sCPS render traditional software engineering approaches not directly applicable, new and innovative approaches to software engineering of sCPS need to be sought. This paper reports on the results of the Second International Workshop on Software Engineering for Smart Cyber--Physical Systems (SEsCPS 2016), which specifically focuses on challenges and promising solutions in the area of software engineering for sCPS.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Liu:2017:PMB, author = "Pan Liu and Jun Ai and Zhenning (Jimmy) Xu", title = "Probability Model-Based Test Suite Reduction", journal = j-SIGSOFT, volume = "42", number = "3", pages = "1--6", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127371", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The paper presents a test suite reduction approach based on probability models in regression testing. First, we model the process of software testing by using the joint probability of both test cases and program faults, and propose two probability models for the software's old and new versions, respectively. Then, a theorem combining set operations and probability models is given to implement our approach. Different from the traditional coverage-based test suite reduction methods, the reduced test suite constructed by our approach does not need to cover all test requirements, but also remains the same fault detection capability of the original test suite. The paper presents a test suite reduction approach based on probability models in regression testing. First, we model the process of software testing by using the joint probability of both test cases and program faults, and propose two probability models for the software's old and new versions, respectively. Then, a theorem combining set operations and probability models is given to implement our approach. Different from the traditional coverage-based test suite reduction methods, the reduced test suite constructed by our approach does not need to cover all test requirements, but also remains the same fault detection capability of the original test suite.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2017:BSA, author = "Lov Kumar and Ranjan Kumar Behera and Santanu Rath and Ashish Sureka", title = "A Bibliometric Study of {ACM SIGSOFT} Software Engineering Notes from 2007 to 2016", journal = j-SIGSOFT, volume = "42", number = "3", pages = "1--7", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127369", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Bibliometric analysis is a commonly used technique to analyze scholarly publications to extract useful insights about research and scientific papers which can then be used for decision making by policy makers and administrators. Bibliometric analysis helps in understanding various aspects of scientific knowledge creation and dissemination such as author and institute productivity, impact of articles in terms of citations, university and industry collaboration, geographical contributions and ethnic and gender minority in authorship. ACM SIGSOFT Software Engineering Notes (SEN) is a non-refereed but a reputed and edited publication for informal writings and reports about Software Engineering (SE). ACM SIGSOFT SEN publishes various types of submissions such as paper, report, column, announcement and book review. These submissions are published in the ACM Digital Library (DL). We conduct a bibliometric analysis of articles published in ACM SIGSOFT SEN during a ten year period from 2007 to 2016. Our objective is to provide a historical overview (one decade) of ACM SIGSOFT SEN and reflect on the past so that the ACM SIGSOFT community and contributors can assess the strengths and shortcomings of the SEN. We believe that the bibliometric analysis presented in this paper can provide insights on the extent to which the SEN is meeting its desired objectives.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Rathee:2017:ROO, author = "Amit Rathee and Jitender Kumar Chhabra", title = "Restructuring of Object-Oriented Software Through Cohesion Improvement Using Frequent Usage Patterns", journal = j-SIGSOFT, volume = "42", number = "3", pages = "1--8", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127370", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Due to wide adoption of object-oriented programming in software development, there is always a requirement to produce well-designed software systems, so that the overall software maintenance cost is reduced and reusability of the component is increased. But, due to prolonged maintenance activities, the internal structure of software system deteriorates. In this situation, restructuring is a widely used solution to improve the overall internal structure of the system without changing its external behavior. As, it is known that, one technique to perform restructuring is to use refactoring on the existing source code to alter its internal structure without modifying its external functionality. However, the refactoring solely depends on our ability to identify various code smells present in the system. Refactoring aims at improving cohesion and reducing coupling in the software system. So, in this paper, a restructuring approach based on refactoring is proposed through improvement in cohesion. This paper focuses on improving the cohesion of different classes of object-oriented software using a newly proposed similarity metric based on Frequent Usage Patterns (FUP). The proposed similarity metric measure the relatedness among member functions of the classes. The metric makes use of FUPs used by member functions. The FUP consists of unordered sequences of member variables accessed by member function in performing its task. The usage pattern includes both direct and indirect usages based on sub-function calls within a member function. Based on the values of the similarity metric, we performed hierarchical agglomerative clustering using complete linkage strategy to cluster member functions. Finally, based on the clusters obtained, the source code of the software is refactored using proposed refactoring algorithm. The applicability of our proposed approach is tested using two java projects related to different domains of real life. The result obtained encourages the applicability of proposed approach in the restructuring of a software system.patterns, refactoring, hierarchical clustering, maintainability. usage patterns, refactoring, hierarchical clustering, maintainability.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Monteiro:2017:BTM, author = "Felipe R. Monteiro and Francisco A. P. Janu{\'a}rio and Lucas C. Cordeiro and Eddie B. de Lima Filho", title = "{BMCLua}: a Translator for Model Checking {Lua} Programs", journal = j-SIGSOFT, volume = "42", number = "3", pages = "1--10", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127367", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Lua is a programming language designed as scripting language, which is fast, lightweight, and suitable for embedded applications. Due to its features, Lua is widely used in the development of games and interactive applications for digital TV. However, during the development phase of such applications, some errors may be introduced, such as deadlock, arithmetic overflow, and division by zero. This paper describes a novel verification approach for software written in Lua, using as backend the Efficient SMTBased Context-Bounded Model Checker (ESBMC). Such an approach, called bounded model checking --- Lua (BMCLua), consists in translating Lua programs into ANSI-C source code, which is then verified with ESBMC. Experimental results show that the proposed verification methodology is effective and efficient, when verifying safety properties in Lua programs. The performed experiments have shown that BMCLua produces an ANSI-C code that is more efficient for verification, when compared with other existing approaches. To the best of our knowledge, this work is the first that applies bounded model checking to the verification of Lua programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumar:2017:TLC, author = "Lov Kumar and Ranjan Kumar Behera and Santanu Rath and Ashish Sureka", title = "Transfer Learning for Cross-Project Change-Proneness Prediction in Object-Oriented Software Systems: a Feasibility Analysis", journal = j-SIGSOFT, volume = "42", number = "3", pages = "1--11", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127368", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Change-prone classes or modules are defined as regions of the source code which are more likely to change as a result of a software development of maintenance activity. Automatic identification of change-prone classes are useful for the software development team as they can focus their testing efforts on areas within the source code which are more likely to change. Several machine learning techniques have been proposed for predicting change-prone classes based on the application of source code metrics as indicators. However, most of the work has focused on within-project training and model building. There are several real word scenario in which sufficient training dataset is not available for model building such as in the case of a new project. Cross-project prediction is an approach which consists of training a model from dataset belonging to one project and testing it on dataset belonging to a different project. Cross-project change-proneness prediction is relatively unexplored. We propose a machine learning based approach for cross-project change-proneness prediction. We conduct experiments on 10 open-source Eclipse plug-ins and demonstrate the effectiveness of our approach. We frame several research questions comparing the performance of within project and cross project prediction and also propose a Genetic Algorithm (GA) based approach for identifying the best set of source code metrics. We conclude that for within project experimental setting, Random Forest (RF) technique results in the best precision. In case of cross-project change-proneness prediction, our analysis reveals that the NDTF ensemble method performs higher than other individual classifiers (such as decision tree and logistic regression) and ensemble methods in the experimental dataset. We conduct a comparison of within-project, cross-project without GA and cross-project with GA and our analysis reveals that cross-project with GA performs best followed by within-project and then cross-project without GA.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Banerjee:2017:RAF, author = "Shreya Banerjee and Anirban Sarkar", title = "A Requirements Analysis Framework for Development of Service Oriented Systems", journal = j-SIGSOFT, volume = "42", number = "3", pages = "1--12", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127366", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In Service Oriented Systems (SOS), implementation of business processes is accomplished through services in distributed, loosely coupled manner based on business process requirements of the users. Consequently, importance of business process requirements analysis for development of SOS is strongly highlighted in both academia and industry. Usually, traditional requirements engineering is competent enough to specify and analysis business requirements for development of software systems efficiently. However, Service Oriented Requirement Engineering (SORE) emerging for SOS development is differed from traditional requirement engineering due to complex nature of services. Yet, a serious gap is still exist between early and detailed specification of business process requirements in SORE and further mapping towards design of SOS from set of business processes. To address this issue, in this paper, a requirements analysis framework is proposed for development of SOS systems. The contribution of the proposed work is formal representation of business process requirements for SOS based on business scenario and Cause-Effect-Dependency (CED) graph in dimensions of six aspects of services --- What, Why, How, Who, When and Where (5W1H). Both early and detailed level requirements analysis in the context of SORE is facilitated by the proposed approach. Beside, traceability of proposed approach towards design of business processes for development of SOS is also exhibited in this paper. Moreover, the practical utility of the proposed approach is demonstrated using a suitable case study.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Osterweil:2017:R, author = "Leon J. Osterweil", title = "Be Responsible", journal = j-SIGSOFT, volume = "42", number = "3", pages = "5--8", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127361", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2017:Pb, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "42", number = "3", pages = "9--9", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127362", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2017:RPb, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "42", number = "3", pages = "10--17", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127363", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fontana:2017:TDA, author = "Francesca Arcelli Fontana and Alexander Chatzigeorgiou and Wolfgang Trumler and Clemente Izurieta and Paris Avgeriou and Robert L. Nord", title = "Technical Debt in Agile Development: Report on the {Ninth Workshop on Managing Technical Debt (MTD 2017)}", journal = j-SIGSOFT, volume = "42", number = "3", pages = "18--21", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127372", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We report on the Ninth International Workshop on Managing Technical Debt, collocated with the 18th International Conference on Agile Software Development (XP 2017) in Cologne. The technical debt research community continues to expand through collaborations of industry, tool vendors, and academia. The theme of this year's workshop was on technical debt in agile development. Presentations and discussion centered on the topics: technical debt at the code level, architectural technical debt assessment, agile approaches and their impact on technical debt management, and selling the business case of technical debt management.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gleirscher:2017:SCA, author = "Mario Gleirscher and Stefan Kugele and Jonathan Sprinkle", title = "Safe Control of Autonomous \& Connected Vehicles {(SCAV'17)}: Report from the {1st International Workshop at CPSWeek 2017}", journal = j-SIGSOFT, volume = "42", number = "3", pages = "22--23", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127373", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this report, we summarize topics, challenges, and research questions discussed in the workshop contributions and during the sessions of our workshop. This summary has the purpose of leveraging the transfer of our findings into future activities of the automatic vehicle control (AVC) community.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Galster:2017:TUS, author = "Matthias Galster and Damian A. Tamburri and Rick Kazman", title = "Towards Understanding the Social and Organizational Dimensions of Software Architecting", journal = j-SIGSOFT, volume = "42", number = "3", pages = "24--25", month = jul, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3127360.3127374", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software architecting is about making decisions that have system-wide impact and that shape software product and process alike. While researchers and practitioners have tried to define and scope the role of the architecture, social and organizational impacts on the architect and the architecting process are often neglected. These impacts were the topics of the First International Workshop on the Social and Organizational Dimensions of Software Architecting. This report summarizes the workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dabaghchian:2017:CAS, author = "Maryam Dabaghchian and Zvonimir Rakamaric and Burcu K. Ozkan and Erdal Mutlu and Serdar Tasiran", title = "Consistency-Aware Scheduling for Weakly Consistent Programs", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--5", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149493", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Modern geo-replicated data stores provide high availability by relaxing the underlying consistency requirements. Programs layered over such data stores are called weakly consistent programs. Due to the reduced consistency requirements, they exhibit highly nondeterministic behaviors, some of which might violate program invariants. Therefore, implementing correct weakly consistent programs and reasoning about them is challenging. In this paper, we present a systematic scheduling approach that is aware of the underlying consistency model. Our approach dynamically explores all possible program behaviors allowed by the used data store consistency model, and it evaluates program invariants during the exploration. We implement the approach in a prototype model checker for Antidote, which is a causally consistent key-value data store with convergent conflict handling. We evaluate our tool on several benchmarks. The results show that our approach is e effective in detecting buggy behaviors in weakly consistent programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Milewicz:2017:SPM, author = "Reed M. Milewicz and Simon Poulding", title = "Scalable Parallel Model Checking via {Monte-Carlo} Tree Search", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--5", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149495", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The future of model checking lies in parallel and distributed computing, but parallel graph search algorithms tailored to directed model checking remains an underdeveloped area of research. In this work, we examine the application of parallel Monte Carlo Tree Search algorithms. We demonstrate how exploratory, randomly sampled rollouts of the search space, coordinated through a minimally communicating work-sharing protocol, can enable us to push the boundaries on the scope and scale of problems amenable to serial search.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Noller:2017:SSE, author = "Yannic Noller and Hoang Lam Nguyen and Minxing Tang and Timo Kehrer", title = "Shadow Symbolic Execution with {Java PathFinder}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--5", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149492", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Regression testing ensures that a software system when it evolves still performs correctly and that the changes introduce no unintended side-effects. However, the creation of regression test cases that show divergent behavior needs a lot of effort. A solution is the idea of shadow symbolic execution, originally implemented based on KLEE for programs written in C, which takes a unified version of the old and the new program and performs symbolic execution guided by concrete values to explore the changed behavior. In this work, we apply the idea of shadow symbolic execution to Java programs and, hence, provide an extension of the Java PathFinder (JPF) project to perform shadow symbolic execution on Java bytecode. The extension has been applied on several subjects from the JPF test classes where it successfully generated test inputs that expose divergences relevant for regression testing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sharma:2017:VCS, author = "Vaibhav Sharma and Michael W. Whalen and Stephen McCamant and Willem Visser", title = "{Veritesting} Challenges in Symbolic Execution of {Java}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--5", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149491", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Scaling symbolic execution to industrial-sized programs is an important open research problem. Veritesting is a promising technique that improves scalability by combining the advantages of static symbolic execution with those of dynamic symbolic execution. The goal of veritesting is to reduce the number of paths to explore in symbolic execution by creating formulas describing regions of code using disjunctive formulas. In previous work, veritesting was applied to binary-level symbolic execution. Integrating veritesting with Java bytecode presents unique challenges: notably, incorporating non-local control jumps caused by runtime polymorphism, exceptions, native calls, and dynamic class loading. If these language features are not accounted for, we hypothesize that the static code regions described by veritesting are often small and may not lead to substantial reduction in paths. We examine this hypothesis by running a Soot-based static analysis on six large open-source projects used in the Defects4J collection. We find that while veritesting can be applied in thousands of regions, allowing static symbolic execution involving non-local control jumps amplifies the performance improvement obtained from veritesting. We hope to use these insights to support efficient veritesting in Symbolic PathFinder in the near future. Toward this end, we brie y address some engineering challenges to add veritesting into SPF.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wang:2017:JRJ, author = "Kaiyuan Wang and Sarfraz Khurshid and Milos Gligoric", title = "{JPR}: Replaying {JPF} Traces Using Standard {JVM}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--5", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149494", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/multithreading.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "Java PathFinder (JPF) is a backtrackable Java Virtual Machine (JVM), which is implemented in Java and runs on a standard JVM (e.g., Oracle HotSpot). Thus, a JPF developer can use off-the-shelf Java debuggers (e.g., jdb) when debugging code that makes up JPF. JPF explores all non-deterministic executions of a given target program and monitors for property violations. To facilitate debugging of the target program, JPF can capture and replay the execution trace that leads to a property violation. While the deterministic replay is invaluable, the replay with JPF does not allow the developer to attach an off-the-shelf Java debugger to the target program (e.g., step through the application code, set breakpoints, etc.). We present a technique, dubbed JPR, to improve the debugging experience of the JPF captured traces by migrating the JPF traces to a new format that can be executed using the standard JVM. JPR annotates each JPF trace, during the capture phase, with extra data (e.g., instruction index, instruction count, etc.); the annotated trace is then used to instrument Java bytecode to enforce the same execution trace on a standard JVM. JPR is compatible with various optimizations, e.g., state matching and partial-order reduction. We evaluated JPR on all multithreaded Java programs in the official JPF distribution. Our results show that JPR successfully replayed all JPF traces on the standard JVM with reasonable overhead during both recording and replaying.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sarkar:2017:HEI, author = "Santonu Sarkar and Gargi Alavani", title = "How Easy it is to Write Software for Heterogeneous Systems?", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--7", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149511", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Every other personal computer today is provided with a coprocessor making it a heterogeneous computing environment. As the heterogeneous and high-performance computing (HPC) infrastructure becomes a commodity, the need to improve software development productivity to build efficient parallel programs for this infrastructure becomes all the more crucial. While the mainstream software development methodology focuses on modular design, reusability, ease of understanding and so on, parallel program development emphasizes on performance, optimal use of a hardware resource, scalability, execution correctness, and portability across multiple hardware platforms. In this paper, we identify a few unique software development productivity requirements for heterogeneous systems. These requirements are concerned with design abstraction, reusability, and design verification. While these requirements are applicable for a conventional software as well, their implications are far reaching in the context of parallel programs. Here we discuss significant efforts in building tools and frameworks to (i) provide powerful abstraction over the hardware, (ii) build software libraries for parallel hardware access and (iii) implement verification mechanisms to check the correctness of a program behavior in a heterogeneous runtime environment. We also identify several important gaps in the existing work that needs to be addressed in order to make the current body of work useful in practice.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Theisen:2017:SER, author = "Christopher Theisen and Marcel Dunaiski and Laurie Williams and Willem Visser", title = "Software Engineering Research at the {International Conference on Software Engineering} in 2016", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--7", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149496", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "With the goal of helping software engineering researchers understand how to improve their papers, Mary Shaw presented ``Writing Good Software Engineering Research Papers'' in 2003. Shaw analyzed the abstracts of the papers submitted to the 2002 International Conference of Software Engineering (ICSE) to determine trends in research question type, contribution type, and validation approach. We revisit Shaw's work to see how the software engineering research community has evolved since 2002. The goal of this paper is to aid software engineering researchers in understanding trends in research question design, research question type, and validation approach by analyzing the abstracts of the papers submitted to ICSE 2016. We implemented Shaw's recommendation for replicating her study through the use of multiple coders and the calculation of inter-rater reliability and demonstrate that her approach can be repeated. Our results indicate that reviewers have increased expectations that papers have solid evaluations of the research contribution. Additionally, the 2016 results include at least 17\% mining software repository (MSR) papers, a category of papers not seen in 2002. The advent of MSR papers has increased the use of generalization/characterization research questions, the production of empirical report contribution, and validation by evaluation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Satish:2017:TPA, author = "Preeti Satish and Peri Nikhil and Krishnan Rangarajan", title = "A Test Prioritization Algorithm That Cares for {``Don't Care''} Values and Higher Order Combinatorial Coverage", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--9", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149510", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The efficiency of prioritization algorithms depends on how early the faults are detected. In this paper, we present a novel prioritization algorithm for combinatorial testing. Our approach takes ACTS tool generated test cases with ``don't care'' values as the starting point and refines them for increased effectiveness without increasing the number of test cases. Our algorithm maximizes the number of higher order combinations tested, by filling the ``don't care'' values in the test suite effectively. It also orders the test cases using a cost function that includes higher order coverage, thereby achieving early fault detection. The effectiveness of our algorithms is demonstrated by performing a comparative evaluation using the metric t way Rate of Fault Detection, on 2 real life case studies and numerous synthetic covering arrays of different sizes. The results show that our algorithms perform better in terms of covering higher order pairs and also faster.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Vieira:2017:CPO, author = "Ianegitz Vieira and Alexandre Alvaro", title = "A Centralized Platform of Open Government Data as Support to Applications in the Smart Cities Context", journal = j-SIGSOFT, volume = "42", number = "4", pages = "1--13", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149512", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Purpose --- This article aims to present the design, implementation and validation of an Open Government Data Platform. Design/methodology/approach --- The development of the work took place in 4 steps: survey of the state of the art of literature; design of the open government data platform; implementation and testing of the platform; and, finally, experimental validation with a group of students of a Brazilian university. Findings --- Through the validations of the platform can be noted advantages with respect to the productivity gain for the development of solutions, in the context of Smart Cities, using the proposed platform. Research limitations/implications --- The experiment was developed in a controlled manner in the context of a Brazilian university. In addition, there is a need to capture more data from other town hall to store on the platform. Originality/value --- The centralized storage of open government data is a tool that enables the decision-making of public managers as well as the beginning of the transformation of the present cities to a smart city.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2017:Pc, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "42", number = "4", pages = "5--6", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149489", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mei:2017:RSE, author = "Hong Mei", title = "A Review of Software Engineering Research in {China}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "6--9", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149488", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2017:RPc, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "42", number = "4", pages = "10--17", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149490", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kuhrmann:2017:SIW, author = "Marco Kuhrmann and J{\"u}rgen M{\"u}nch and Paolo Tell and Philipp Diebold", title = "Summary of the {1st International Workshop on Hybrid Development Approaches in Software Systems Development}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "18--20", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149519", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The first international HELENA workshop was held co-located with the 2017 International Conference on Software and Systems Process (ICSSP). The goals of this workshop were to bring the HELENA team together, foster general networking, discuss the current state of the project, and develop a roadmap towards future activities. From the 84 researchers and practitioners from 25 active countries, 25 participated in this workshop. The overall status report shows that the HELENA survey is increasingly gaining attention, and more then 300 data points have been collected so far. The team agreed on a number of topics for future activities, e.g., organizational transformation, adaptation and evolution, and development approaches for safety-critical systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chechik:2017:RWM, author = "Marsha Chechik and Davide {Di Ruscio}", title = "Report from the {9th Workshop on Modelling in Software Engineering (MiSE 2017)}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "21--24", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149520", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "MiSE 2017 was the 9th edition of the workshop on Modelling in Software Engineering, held on 21-22 May 2017 as a satellite event of the 39th International Conference on Software Engineering (ICSE 2917), Buenos Aires, Argentina. The goal of this 2-day workshop was to bring together researchers and practitioners in order to exchange innovative technical ideas and experiences related to modeling. The 9th edition of the MiSE workshop provided a forum to discuss successful applications of software-modeling techniques and to gain insights into challenging modeling problems, including uncertainty management, model heterogeneity, model reuse and evolution, testing, and the adoption of models in critical application domains like self-adaptive and real-time systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mohalik:2017:WDA, author = "Swarup Kumar Mohalik and Badrinath Ramamurthy and Mahesh Babu Jayaraman and Meenakshi D'Souza", title = "{Workshop on Developmental aspects of Intelligent Adaptive Systems (DIAS)}: Co-located with {10th Innovations in Software Engineering Conference (ISEC), Jaipur, India}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "25--27", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149521", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "With the proliferation of the Internet of Things and the associated trend of integration of software with ``things'', it is predicted that the complexity of the systems-of-future will be characterized not only by scale and variety of devices and software but also by the constant change of the system context due to the mobility of devices and M2M interactions. Consequently, the current paradigm of automation will be inadequate for the management and operation of these systems. The dominant approach to address this issue is to design and develop autonomous systems that can adapt to the changes in various levels and keep delivering the expected functionality. Such systems need fundamentally different architectures, components and methodologies incorporating new paradigms such as machine learning and intelligent decision making. In this workshop, we attempt to discuss the in uence of these paradigms on the development life cycle of adaptive software, starting from requirements, design and architecture and also their verification and validation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Borg:2017:SIW, author = "Markus Borg and Elizabeth Bjarnason and Michael Unterkalmsteiner and Tingting Yu and Gregory Gay and Michael Felderer", title = "Summary of the {4th International Workshop on Requirements Engineering and Testing (RET 2017)}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "28--31", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149522", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The RET (Requirements Engineering and Testing) workshop series provides a meeting point for researchers and practitioners from the two separate fields of Requirements Engineering (RE) and Testing. The long term aim is to build a community and a body of knowledge within the intersection of RE and Testing, i.e., RET. The 4th workshop was co-located with the 25th International Requirements Engineering Conference (RE'17) in Lisbon, Portugal and attracted about 20 participants. In line with the previous workshop instances, RET 2017 offered an interactive setting with a keynote, an invited talk, paper presentations, and a concluding hands-on exercise.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gotz:2017:RIW, author = "Sebastian G{\"o}tz and Christian Piechnick and Andreas Wortmann", title = "Report on the {4th International Workshop on Model-driven Robot Software Engineering (MORSE)}", journal = j-SIGSOFT, volume = "42", number = "4", pages = "32--34", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149523", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 4th edition of the international workshop on model-driven robot software engineering (MORSE) was held at the International Conference on Software Technologies: Applications and Foundations (STAF). The workshop took place in the city of Marburg, Germany, on the 21st of July 2017. The focus of this year's edition of the workshop was on scenario-based development and interaction modeling. In this report, we first present a synopsis of the workshop sessions before we highlight concerns raised in workshop's interactive discussion.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Galster:2017:VCS, author = "Matthias Galster and Danny Weyns and Michael Goedicke and Uwe Zdun and J{\'a}come Cunha and Jaime Chavarriaga", title = "Variability and Complexity in Software Design: Towards Quality through Modeling and Testing", journal = j-SIGSOFT, volume = "42", number = "4", pages = "35--37", month = oct, year = "2017", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3149485.3149524", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Today's software systems must accommodate a wide range of usage and deployment scenarios. The increasing size and heterogeneity of software-intensive systems, dynamic and critical operating conditions, fast moving and highly competitive markets, and increasingly powerful and versatile hardware makes it more and more difficult to handle the additional complexity in design caused by variability. This paper reports results of the Second International Workshop on Variability and Complexity in Software Design. It also outlines directions the field might move in the future.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Adriano:2019:MSF, author = "Christian Adriano", title = "Microtasking Software Failure Resolution: Early Results", journal = j-SIGSOFT, volume = "44", number = "1", pages = "36--36", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310016", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Open source software development enabled distributed teams of programmers to contribute to large software systems that became standards in the operation of government and business. Crowdsourcing went further by enabling contributions in the form of small and independent tasks. This allowed teams to scale from dozens to hundreds of people. While crowdsourcing established as industry practice in the areas of software testing, it is challenging for source code related tasks, e.g., software debugging. One of the reasons is that the complex dependencies in the source code can make many tasks difficult to partition and sequence, and later aggregate their outcomes. I am investigating these problems in the context of failure resolution tasks. A failure resolution task consists of inspecting the source code with the objective to identify and explain the root-cause of a software failure. My approach partitions code inspection into questions that are automatically instantiated from templates. I present here my research plan and the early results of experiments on the efficacy, efficiency, and scalability of my approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2018:Pa, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--2", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178336", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mukherjee:2018:PSI, author = "Debashis Mukherjee and Dibyanshu Shekhar and Rajib Mall", title = "Proposal for A Structural Integration Test Coverage Metric for Object-Oriented Programs", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--4", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178330", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Though a large number of test coverage metrics have been proposed in the context of unit and system testing of object oriented programs, structural coverage metrics for integration testing have scarcely been reported. In this context, we propose an integration test coverage metric based on the coverage of the data and control dependency edges of the JSysDG (Java System Dependency Graph).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Yaman:2018:UIC, author = "Sezin Gizem Yaman", title = "User Involvement in Continuous Experimentation", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--4", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178322", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software product and service companies need capabilities to evaluate their development decisions and customer and user value. Continuous experimentation, as an experiment-driven development approach, may reduce such development risks by iteratively testing product and service assumptions that are critical to the success of the software. Experiment-driven development is gaining increasing attention by the practitioners, yet it is a novel research area to be investigated. Involving users and customers in the software development process and understanding their needs and behaviors are essential aspects when building successful software products and services. Continuous experimentation approach in software development comprises user involvement by its nature, however, due to novelty of the concept, there is no clear understanding of the user involvement practices. My doctoral project aims to investigate how software development organizations can involve the users in continuous experimentation. The contributions of the research are to (a) find out how involve users in software companies that begin to adopt continuous experimentation approach, (b) identify the barriers hindering involving the users in the approach, and (c) investigate what kinds of strategies have been used for experimentation with different software product and services.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Akbarinasaji:2018:PLB, author = "Shirin Akbarinasaji", title = "Prioritizing lingering bugs", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178326", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As the software projects become more complex, the release decision is made without resolving all the bugs in the issue tracking system. Accumulation of the bugs in the bug repository is similar to financial obligation as we borrow time and resources to engage in another activity rather than resolving the bugs. Deferring the bug in the next release may have some consequences. Therefore, the decision whether to resolve the bug in the current release or postponing it to the next release is a crucial decision. In this proposal, we study the deferred bugs (lingering bugs) against the nondeferred bugs (regular bugs). Our aim is to develop the predictive model which can predict whether the bug would linger or not. Additionally, we are interested in measuring of the lingering bug in terms of principal (standard time it takes to x them) and risk of liability (impact). We propose to use reinforcement learning for prioritization of lingering bugs with respect to their impact.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Arruda:2018:REC, author = "Darlan Arruda", title = "Requirements Engineering in the Context of Big Data Applications", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178323", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Requirements Engineering (RE) plays an essential role in the software engineering process, being considered as one of the most critical phases of the software development life-cycle. As we might expect, then, the Requirements Engineering would play a similar role in the context of Big Data applications. However, practicing Requirements Engineering is a challenging and complex task. It involves (i) stakeholders with diverse backgrounds and levels of knowledge, (ii) different application domains, (iii) it is expensive and error-prone, (iii) it is important to be aligned with business goals, to name a few. Because it involves such complex activities, a lot has to be understood in order to properly address Requirements Engineering. Especially, when the technology domain (e.g., Big Data) is not yet well explored. In this context, this paper describes a research plan on Requirements Engineering involving the development of Big Data applications. The high-level goal is to investigate: (i) On the technical front, the Requirements Engineering activities with respect to the analysis and specification of Big Data requirements and, (ii) on the management side, the relationship between RE and Business Goals in the development of Big Data Software applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Cartaxo:2018:SKT, author = "Bruno Cartaxo", title = "Supporting Knowledge Transfer From Secondary Studies to Software Engineering Practice", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178325", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Researchers have been arguing that there is a lack of connection between Secondary Studies (SSs) and Software Engineering (SE) practice. The medical field has faced the same problem, and recently introduced the concept of briefings / summaries, and Rapid Reviews as alternatives to transfer knowledge to practice. Goal: The overarching goal of this research is to investigate, propose, and evaluate strategies to support researchers to transfer knowledge from SSs to SE practice. Method: First, we investigated how SSs in SE cover practitioners' issues reported in StackExchange, a leading Question \& Answer platform. Second, we generated Evidence Briefings based on those SSs in order to propose a medium to transfer knowledge to practice. Third, we are planning to conduct an action research, with close collaboration with practitioners, in order explore and evaluate the applicability of Rapid Reviews in SE practice. Preliminary Results: Among 424 practitioners' issues on Stack Exchange, that were considered as related to a set o selected SSs, the SSs could successfully cover 14.1\% (60) of them. Based on a qualitative techniques, we identified 45 recurrent issues spread in many SE topics. Additionally, both practitioners and researchers positively evaluated the content and format of 12 Evidence Briefings that we created based on SSs. Conclusions: Our results until now corroborate with claims that SSs lack connection with practice. On the other side, the good reception of the Evidence Briefings shows a possible route toward an effective knowledge transfer from SSs to practice.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Dwivedi:2018:TAN, author = "Ashish Kumar Dwivedi and Santanu Kumar Rath", title = "Transformation of Alloy Notation into a Semantic Notation", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178331", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Transformation of a model based on first-order logic to a model that provides semantic notations is helpful necessary during the analysis phase of any proposed software. The semantic notations often guide the designer to develop pseudocode correctly. This study focuses on facilitation of transformation of one formal model, i.e., Alloy into another, i.e., OWL. The proposed approach extends the concept of existing techniques i.e., UML2Alloy and TwoUse to transform Alloy model into OWL. UML2Alloy transforms UML model into Alloy model, whereas TwoUse approach bridges the gap between UML model and OWL model. Alloy2OWL is based on metamodel-based transformation techniques, which help to map source model, i.e., Alloy into target model, i.e., OWL. For the proper explanation of this study, a model transformation framework is presented, which can be applied to other transformation languages. The proposed approach utilizes the Model-Driven Development techniques to deal with the analysis of Alloy model and determines design problems within a specification. In this paper, various challenges are also presented which occur during the transformation of Alloy to OWL.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Lee:2018:OTC, author = "Amanda Lee", title = "One-Time Contributors to {FLOSS}: Surveys and Data Analysis", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178327", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Free/Libre Open Source Software (FLOSS) projects rely on a steady influx of newcomer volunteer developers to survive. As these projects, unlike traditional software projects, often do not pay their contributors to work on them, volunteers must be obtained instead. Once obtained, a volunteer goes through a lengthy process in order to join the project, including obtaining sufficient knowledge of the codebase and learning the rules of the community. However, some developers drop out after they make a single commit to the code database. These developers are knowledgeable enough to commit code and make it through the onboarding process, but leave the project rather than join, therefore depriving the project of potential talent. We propose to understand these One-Time code Contributors (OTCs) through surveys and through data-mining the projects? software repositories: if they are a unique demographic, why they only commit once, if anything can be done to assist them. Once they are determined as a separate demographic, the study pivots to examine other factors that might affect OTCs, including such factors as project governance and project architecture.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2018:RPa, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178337", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Noorwali:2018:SCD, author = "Ibtehal Noorwali", title = "Stakeholder Concern-Driven Requirements Analytics", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178324", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The requirements engineering (RE) process and resultant requirements usually inform and interact with downstream (e.g., design and testing) and side-stream (e.g., project management, quality management) processes in various ways. Each of these processes involves numerous internal stakeholders (e.g., managers, developers, architects, etc.) who, in turn, have different concerns with regard to the impact of requirements on their respective processes. In other words, the various stakeholders need different types of requirements information and measurements in order for them to manage, control, and track their respective process activities (e.g., design traceability information for architects, requirements progress for project managers, etc.). The burden of providing this information usually falls within the realm of the requirements management process. However, due to the lack of identified metrics and analytical methods, the process of providing the various stakeholders with the information that addresses their various concerns becomes cumbersome. This is further complicated by large project sizes, numerous stakeholders, time pressure, large numbers of requirements, other software artifacts, and others. This proposal aims to address this problem by proposing to provide stakeholders with concern-driven requirements analytics that will address their various concerns. We intend to achieve this through identifying metrics and analytical methods that can be readily used in the requirements management process. We further propose to provide the stakeholder with a dashboard that allows them to choose from the various requirements analytics options along with visualization techniques that would best visualize the data and address their concerns.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Teixeira:2018:IQC, author = "Eudis Teixeira", title = "Improving the Quality of Controlled Experiments in Software Engineering", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178321", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "All experimental studies are prone to risk with regard to the validity of their results. After applying a determined action to control a threat, during planning or executing an experiment, new risks to the study validity can arise. Aim. To improve the quality of controlled experiments in Software Engineering (SE), setting out strategies that permit researchers giving priority to specific threats in causes virtue and consequences (trade-offs), which exist between threats to validity and possible measures for control. Method. We will employ a knowledge base acquired through a survey and a Systematic Literature Review to model an approach for prioritizing and controlling threats to validity. The proposed approach will also be evaluated through experiments. Contribution. To improve the control processes for threats to validity considered to be critical, reducing efforts required by researchers, thereby improving the quality of future controlled experiments in the Software Engineering area by increasing its results? validity.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wang:2018:HCW, author = "Huaimin Wang", title = "Harnessing the crowd wisdom for software trustworthiness", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--6", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178328", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2018:PMF, author = "Ritu Jain and Ugrasen Suman", title = "A Project Management Framework for Global Software Development", journal = j-SIGSOFT, volume = "43", number = "1", pages = "1--10", month = jan, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3178315.3178329", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Global software development (GSD) is a prevalent trend which has fascinated most software companies. However, the failure rate of GSD projects reveals the fact that these types of projects are not an easy endeavor. Management of GSD project is a domain where standards are still lacking and companies are still struggling to acquire a win-win situation. Project management body of knowledge (PMBOK) provides a standard framework for managing projects. However, the framework does not consider the aspects of GSD. Thus, it can't be applied directly for GSD projects. In this paper, we have proposed a project management framework for GSD projects. This framework assimilates the knowledge areas of PMBOK with knowledge areas needed for effective management of GSD. It would guide GSD project manager about the aspects to be considered while executing distributed projects. This framework would also act as a baseline to researchers for further investigation in GSD project management domain.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Osterweil:2018:G, author = "Leon J. Osterweil", title = "Be Gracious", journal = j-SIGSOFT, volume = "43", number = "2", pages = "4--6", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3203094.3203100", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2018:SSS, author = "Robert Schaefer", title = "Science, Society, and Software Engineering: {Part 3} --- The Catch", journal = j-SIGSOFT, volume = "43", number = "2", pages = "4--6", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3041765.3041770", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2018:Pb, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "43", number = "2", pages = "6--7", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3203094.3203101", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Osterweil:2018:YSD, author = "Leon J. Osterweil", title = "Your Software Dwells in the House of Tomorrow, Too", journal = j-SIGSOFT, volume = "43", number = "2", pages = "7--8", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3041765.3041769", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2018:RPb, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "43", number = "2", pages = "8--11", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3203094.3203102", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2018:RPc, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "43", number = "2", pages = "9--16", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3041765.3041771", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2018:ERW, author = "Paramvir Singh and Sheikh Umar Farooq and Saurabh Tiwari and Ashish Sureka", title = "An Experience Report on {Workshop on Emerging Software Engineering Education}", journal = j-SIGSOFT, volume = "43", number = "2", pages = "12--23", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3203094.3203112", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Doernhoefer:2018:SNS, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "43", number = "2", pages = "17--25", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3041765.3041772", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gerard:2018:RIW, author = "S{\'e}bastien G{\'e}rard and Dimitrios S. Kolovos and Ivano Malavolta and Henry Muccini", title = "Report from the {1st International Workshop on Collaborative Modelling in MDE (COMMitMDE 2016)}", journal = j-SIGSOFT, volume = "43", number = "2", pages = "26--27", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3041765.3041773", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "COMMitMDE was the 1st international workshop on Collaborative Modelling in MDE, held on the 4th of October 2016 as a satellite event of the 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), St. Malo, France. The goal of the workshop was to bring together researchers and practitioners in order to investigate (i) the potential impact of collaborative software engineering methods and principles into Model-Driven Engineering (MDE) practices and (ii) how MDE methods and techniques can support collaborative software engineering activities. The 1st COMMitMDE workshop provided a forum to discuss the state of research and practice on collaborative MDE, to create new synergies between tool vendors, researchers, and practitioners, to inform the community about the new means for collaborative MDE, and to reect on the needs and research gaps in the collaborative MDE area.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Izurieta:2018:TDR, author = "Clemente Izurieta and Ipek Ozkaya and Carolyn Seaman and Will Snipes", title = "Technical Debt: a Research Roadmap Report on the {Eighth Workshop on Managing Technical Debt (MTD 2016)}", journal = j-SIGSOFT, volume = "43", number = "2", pages = "28--31", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3041765.3041774", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We report here on the Eighth International Workshop on Managing Technical Debt, collocated with the International Conference on Software Maintenance and Evolution (ICSME 2016). The technical debt research community continues to expand through collaborations of industry, tool vendors, and academia. The major themes of discussion this year indicate convergence on a common definition on technical debt and its elements which drive the maturation of a research roadmap, demonstrating that managing technical debt is a mainstream topic in software engineering research bringing empirical analysis, data science, software design and architecture analysis and automation among other challenges together.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Leite:2018:RIW, author = "Julio C. S. P. Leite and Liping Zhao and Sylwia Kopcz{\'n}ska and Sam Supakkul and Lawrence Chung", title = "Report from the {6th International Workshop on Requirements Patterns (RePa'16)}", journal = j-SIGSOFT, volume = "43", number = "2", pages = "32--33", month = apr, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3041765.3041775", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:16:51 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "RePa 2016 was part of the 24th IEEE International Requirements Engineering Conference (RE'16) held in Beijing. The all day program consisted in an Introduction, a Keynote, Paper Presentations and Discussion Sessions. All papers were presented and the attendance was around 15 people.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2018:Pc, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "43", number = "3", pages = "5--5", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229792", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Confucius'2 Analects is the oldest guide to applied software engineering research and practice in existence. You don't believe me? Fine. We'll use random sampling to demonstrate. I have Ezra Pound's peculiar, but engaging, translation to hand, and can write a small program to generate five random samples easily, since the Analects has twenty books, and each book has approximately twenty ``items.'' I've sorted the resulting samples for our convenience.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bu:2018:MBC, author = "Lei Bu and Tian Zhang and Xin Chen and Linzhang Wang and Jianhua Zhao and Xuandong Li", title = "Model-based Construction and Verification of Cyber-Physical Systems", journal = j-SIGSOFT, volume = "43", number = "3", pages = "6--10", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "By combining communication, computation, and control (3C), Cyber-Physical Systems (CPS)0tightly couple the physical world with the cyber-world, to enable more applications, enhance performance, increase dependability and etc. Among these goals, as CPS are widely used in the safety-critical area, guaranteeing the basic dependability/safety is after all the prerequisite and often the top concern. However, the behavior of CPS is extremely complex. First of all, due to the existence of both discrete control modes transition and continuous real-time behavior in CPS, the behavior of CPS is a complex hybrid state space, which is difficult to understand and handle. Secondly, most CPS applications are working in the open environment and acquiring real-time data from the environment intensively to adjust their own behavior. The dynamic environment makes the behavior space more complex to reason. When a system is too complex to analyze directly, building an abstract model of the system and then conducting analysis on the model to answer questions about the original system is an important and widely-used method. Meanwhile, a reasonable model also plays important roles in the phase of specification, design, development, testing, monitoring and so on. Therefore, it is an important topic of investigating how model-based methods can be applied in the context of CPS to increase the quality and dependability of the system. During the past decade, our research group at Nanjing University has devoted a lot of efforts into this mission. We conducted comprehensive research in a wide spectrum of CPS including model-driven design, verification, control, monitoring, and testing. In this paper, we will make a general review of the progress we made on these directions recently.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2018:RPd, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "43", number = "3", pages = "11--16", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229791", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Benala:2018:SSD, author = "Tirimula Rao Benala and Rajib Mall", title = "{SEET}: Software Development Effort Estimation Using Ensemble Techniques", journal = j-SIGSOFT, volume = "43", number = "3", pages = "17--17", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software development effort estimation (SDEE) is a significant activity in project management and serves as the basis for project bidding, planning, staffing, resource allocation, scheduling, and cost estimation. The accuracy of SDEE techniques varies from project to project, which makes them rather unreliable. In this backdrop, we propose a foundation centered ensemble-based SDEE approach. The primary goal of this approach is to design an ensemble consisting of different machine learning methods for improving the prediction accuracy of SDEE. In recent times, several research results have been reported on machine learning based ensemble design, but extreme learning machine (ELM) and least square support vector regression (LSSVR) have not been used to develop an ensemble. We chose three machine learning techniques, namely ELM, LSSVR, and multilayer perceptron (MLP) as the base techniques to build an ensemble. We investigated the performance of a homogeneous ensemble design using a linear combination rule with standardized accuracy as a weight factor. The performance of the ensemble model is validated and compared with root mean square error (RMSE) based weighted average ensemble model with equivalent configuration. The experimental study was conducted using publicly available PROMISE repository test suite. We achieved promising results for SEET model compared to base learners and RMSE ensemble model.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sitaraman:2018:STF, author = "Murali Sitaraman and Bruce W. Weide", title = "A Synopsis of Twenty Five Years of {RESOLVE PhD} Research Efforts", journal = j-SIGSOFT, volume = "43", number = "3", pages = "17--17", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229794", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In 1994, ACM SIGSOFT Software Engineering Notes (SEN), courtesy of Will Tracz, SEN Editor at the time, published a 48-page special feature on RESOLVE: a combined specification and programming language with a design discipline to facilitate construction of formally verified component-based software. In the quarter-century since, several PhD dissertations from members of the RESOLVE/Reusable Software Research Group (RSRG) have explored a variety of topics in this area. They range across fundamental software engineering and formal methods research, practical adaptations, software engineering education, and tool development. This article summarizes key contributions of these dissertations in a way that is accessible to researchers and practitioners in software engineering. The dissertations are summarized in chronological order. Some of the paragraphs below are paraphrased or taken nearly verbatim from abstracts of the works themselves, with a few terminological updates and added connections to current research.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Welch:2018:FID, author = "Daniel Welch", title = "Formalization Integrated Development Environments: The Current Landscape", journal = j-SIGSOFT, volume = "43", number = "3", pages = "17--17", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229795", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Development Environments (F-IDEs) for specification and programming languages. Specifically we summarize the toolchains for some well-known languages in this category, and conclude with a summary of RESOLVESTUDIO, an F-IDE for the RESOLVE language.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fowler:2018:BUP, author = "Megan Fowler and Tim Schwab", title = "{BeginToReason}: Understanding the Purpose of Code", journal = j-SIGSOFT, volume = "43", number = "3", pages = "18--18", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Computer science (CS) students often evaluate the behavior of the code they write by running it on specific inputs, studying the outputs, and then inductively reasoning to a more general understanding of the code. This is a good starting point in the student's career, but successful graduates must be able to reason deductively about the code they create and encounter. They must be able to reason about the code on all inputs, without running the code. This paper describes an online system named ``BeginToReason'' that is designed to introduce symbolic reasoning, and the results of its use. Eighty students across six lab sections completed a written assessment while working with the BeginToReason System. The objective was to observe student understanding of the purpose of presented code both before and after completing a lesson using the BeginToReason System. Keywords: Symbolic reasoning, reasoning tool, online system, verification engine", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kraemer:2018:RAC, author = "Eileen Kraemer and Aubrey Lawson", title = "Reasoning About Concurrency: Scenarios for Activities", journal = j-SIGSOFT, volume = "43", number = "3", pages = "18--18", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229797", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In computing, concurrency refers to the notion that different parts or units of a program or algorithm may be executed out-of-order or in partial order, without affecting the final outcome. Concurrency is historically a difficult topic for students. When confronted with non-deterministic systems, students are challenged to refine their reasoning about sequence, state, and what makes a program ``correct''. A number of problems in concurrency have been posed in the form of relatable examples, e.g. dining philosophers, an ornamental garden, a single lane bridge. These classical problems provide a ``real-world'' analogy that can be used to motivate student engagement and exploration. We explore the questions of whether the RESOLVE framework could support the concepts and operations needed to implement these classical problems, what additional features in RESOLVE would be required for specification and implementation and what related student activities might be developed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kraemer:2018:TDC, author = "Eileen Kraemer", title = "Teaching the Design-by-Contract Concept in a Software Engineering Course Using {RESOLVE}", journal = j-SIGSOFT, volume = "43", number = "3", pages = "18--18", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Design by contract (DBC) is a key concept in software engineering. The RESOLVE language and environment support the teaching and learning of DBC concepts. However, students encounter obstacles in fully achieving the desired educational outcomes. Some of these obstacles are related to the complexity of the content. Additional appropriate exercises can help to address these obstacles. Other obstacles are related to features of the environment and documentation. We propose a variety of interventions to address these obstacles, including potential revisions to the environment, updates to the documentation, and the creation of additional instructional materials.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Weide:2018:RCD, author = "Alan Weide", title = "Reasoning Challenges of Data Abstraction and Aliasing in Concurrent Programs", journal = j-SIGSOFT, volume = "43", number = "3", pages = "18--18", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229799", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Substantial effort has been directed toward the specification and verification of concurrent programs. Separation logic is one such project and is considered by many to be the state of the art int he field. However, the shortcomings of separation logic in the face of data abstraction cannot be overlooked. This paper enumerates several variants of a concurrent program for which separation logic cannot capture the desired level of abstraction without compromising its readability and usefulness", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sun:2018:RAR, author = "Yu-Shan Sun", title = "Reasoning About Reference Behavior with {RESOLVE}", journal = j-SIGSOFT, volume = "43", number = "3", pages = "18--19", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229800", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "As an alternative to reasoning about references explicitly and ACM SIGSOFT Software Engineering Notes Page 18 July 2018 Volume 43 Number 3 routinely as needed for Java-like programs, this paper summarizes the RESOLVE approach in reasoning via reference-hiding data abstractions for the majority of programs and only reasoning about references when they are unavoidable. Furthermore, this paper raises discussion topics for reasoning about various implementation classifications and to explore when there is a need to be concerned about establishing the frame property", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Asim:2018:EDB, author = "Saad F. Asim", title = "An Exercise in Design: The Binary Decision Diagram", journal = j-SIGSOFT, volume = "43", number = "3", pages = "19--19", month = jul, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3229783.3229801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The Binary Decision Diagram (BDD), a data structure used to efficiently represent Boolean formulas, enjoys use in the field of software verification. However, widely used implementations of the BDD are not themselves verifiable. This paper summarizes the design and implementation of a provably correct realization of the BDD as detailed in the author's master's thesis.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2018:Pd, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "43", number = "4", pages = "6--7", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282524", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Tom DeMarco and Timothy Lister's Peopleware: Productive Projects and Teams (Third Edition) is a fairly famous book. The first edition was published in 1987, and it has been widely read ever since. I reviewed DeMarco and Lister's Waltzing with Bears in this column before Peopleware precisely because some people might not be aware of Waltzing, while I assumed most people reading SEN would know of, and have read Peopleware.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Glass:2018:ECH, author = "Robert L. Glass and Frank Land", title = "Errors in Computing History", journal = j-SIGSOFT, volume = "43", number = "4", pages = "7--8", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282521", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The history of computing in practice is barely 70 years old. The field of computing theory/academe is barely 60 years old, if we start counting with the advent of computer science and information systems courses/degrees in the 1960s. Yet computing historians have gotten a number of things dreadfully wrong in that short period of time.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jin:2018:OMB, author = "Zhi Jin", title = "Open Models: Beyond the Open Source Software Development", journal = j-SIGSOFT, volume = "43", number = "4", pages = "9--12", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282522", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Free/libre and open source software (FLOSS) originated from ``hacker culture'' and struggled against software privatization. The idea is that anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve the design of the software. This is in contrast to proprietary software, where the software is under restrictive copyright licensing and the source code is usually hidden from the users. To give the users such freedom and control in their use of software, Richard Stallman launched the GNU project (Stallman, 1983), together with a manifesto stating that everyone will be permitted to modify and redistribute GNU.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2018:RPe, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "43", number = "4", pages = "13--20", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282523", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Edited by PGN (Risks Forum Moderator), with contributions by others as indicated. Opinions are individual rather than organizational, with usual disclaimers implied. We address problems relating to software, hardware, people, and other circumstances relevant to computer systems. References (R i j) to the online Risks Forum denote RISKS vol i number j. Cited RISKS items generally identify contributors and sources, together with URLs. Official RISKS archives are available at www.risks.org, with nice html formatting and search engine courtesy of Lindsay Marshall at Newcastle:; http://catless.ncl.ac.uk/Risks/i.j.html (also ftp://www.sri.com/risks). CACM Inside Risks: http://www.csl.sri.com/neumann/insiderisks.html", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fraser:2018:ACPa, author = "Steven Fraser and Dennis Mancl", title = "Agile Culture: a Panels Report from {XP 2017}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "21--23", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302395", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The culture of agile development practices and an assessment of agile's ``success'' were the topics of two XP2017 panel sessions. There were three primary conclusions of these two panels. Agile has high brand recognition in the software industry, but it isn't always successfully implemented. In some cases, the labels used to explain and promote agile practices can get in the way of agile success. It was also recognized that despite a negative perception, agile's reputation as being a cult was more a reflection of a small, but growing core of practitioners.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Raibulet:2018:RIWa, author = "Claudia Raibulet and Mariagrazia Fugini and Khalil Drira and Patrizio Pelliccione and Ilias Gerostathopoulos and Christian Prehofer and Klaus Moessner", title = "Report of the {1st International Workshop on Context-aware Autonomous and Smart Architectures (CASA@ECSA 2017)}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "24--27", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302396", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 2017 1st International Workshop on Context-aware, Autonomous and Smart Architectures (CASA 2017) was held in conjunction with the 11th European Conference on Software Architecture (ECSA 2017), on September, 12th, 2017 in Canterbury, United Kingdom. The goal of this one-day workshop was to bring together researchers and practitioners from academic environment and from the industry to share their solutions, ideas, visions, and doubts in the design of software architectures for context-aware, autonomous, and smart solutions. The workshop focused on architectural aspects offering a complementary vision of such solutions with respect to the available application- and user-oriented perspectives on context-awareness, autonomy, and smartness. Furthermore, the workshop aimed to enable discussions, partnerships, and collaborations among the software engineers interested in these solutions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Northrop:2018:DSSa, author = "Linda Northrop and Ipek Ozkaya and George Fairbanks and Michael Keeling", title = "Designing the Software Systems of the Future", journal = j-SIGSOFT, volume = "43", number = "4", pages = "28--30", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302397", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We report here on the Future of Software DesignWorkshop that was held on Jan 12-14, 2018 in Pittsburgh, PA under the sponsorship of the Carnegie Mellon University Software Engineering Institute. The software industry is awash in modern trends that involve artificial intelligence (AI), autonomy, data everywhere, etc. These trends affect the structure of software-intensive systems and their designs. The goal of the workshop was to bring together participants from diverse backgrounds to formulate ideas for software design of future systems and related research opportunities and challenges. In this report we summarize the outcomes of the workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{vanderLinden:2018:ESWa, author = "Dirk van der Linden and Awais Rashid", title = "The Effect of Software Warranties on Cybersecurity", journal = j-SIGSOFT, volume = "43", number = "4", pages = "31--35", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302398", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This workshop focused on bringing software developers and legal professionals together to understand the shared challenges they face in promoting the development of secure software on the one hand, and software at all, on the other hand. This report summarizes current scientific research on the topics and challenges discussed in the workshop breakout sessions. The insights from the workshop highlight a number of interesting directions for further research on the interplay between software warranties and cybersecurity.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Borg:2018:SIWa, author = "Markus Borg and Adnan Causevic and Serge Demeyer and Sigrid Eldh", title = "Summary of the {1st IEEE Workshop on the Next Level of Test Automation (NEXTA 2018)}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "36--38", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302399", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "NEXTA is a new workshop on test automation that provides a meeting point for academic researchers and industry practitioners. While test automation already is an established practice in industry, the concept needs to evolve to go beyond its current state to support the ever faster release cycles of tomorrow's software engineering. NEXTA implications for research and practice will include test case generation, automated test result analysis, test suite assessment and maintenance, and infrastructure for the future of test automation. The first instance of NEXTA was co-located with the 11th IEEE Conference on Software Testing, Verification and Validation (ICST 2018) in V{\"a}ster{\aa}s, Sweden on April 9, 2018. NEXTA 2018 offered an interactive setting with a keynote and paper presentations, stimulated by two novel awards to incentivize interaction and dissemination: a Best Questions Award and a Most Viral Tweet Award. The workshop attracted 15 paper submissions and about 50 participants. Based on the positive feedback, we plan to organize the workshop again next year.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fraser:2018:NSBa, author = "Steven Fraser and Dennis Mancl", title = "No Silver Bullet Reloaded: Report on {XP 2017} Panel Session", journal = j-SIGSOFT, volume = "43", number = "4", pages = "39--41", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302400", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "At XP2017 in K{\~A}\P ln, a panel was convened to discuss the classic 1987 IEEE Software paper by Frederick P. Brooks, ``No Silver Bullet: Essence and Accidents in Software Engineering.'' The ideas presented in his paper have influenced several generations of software developers. Brooks emphasized the notions of essential complexity and accidental complexity, and he offered suggestions for promising approaches to software development. While his approaches are linked to what we now recognize as ``agile practices,'' panelists offered an implicit caveat that they must be done with discipline to avoid increased accidental complexity. Panelists also observed that agile development itself is not a ``silver bullet''.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bures:2018:SESa, author = "Tomas Bures and Danny Weyns and Bradley Schmer and John Fitzgerald", title = "Software Engineering for Smart Cyber-Physical Systems: Models, System-Environment Boundary, and Social Aspects", journal = j-SIGSOFT, volume = "43", number = "4", pages = "42--44", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302401", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Smart Cyber-Physical Systems (sCPS) are a novel kind of Cyber-Physical Systems engineered to take advantage of large-scale cooperation between devices, users and environment to achieve added value in face of uncertainty and various situations in their environment. Examples of sCPS include modern traffic systems, Industry 4.0 systems, systems for smart-buildings, smart energy grids, etc. The uniting aspect of all these systems is that to achieve their high-level of intelligence, adaptivity and ability to optimize and learn, they heavily rely on software. This makes them software-intensive systems, where software becomes their most complex part. Engineering sCPS thus becomes a recognized software engineering discipline, which however, due to specifics of sCPS, can only partially rely on the existing body of knowledge in software engineering. In fact, it turns out that many of the traditional approaches to architecture modeling and software development fail to cope with the high dynamicity and uncertainty of sCPS. This calls for innovative approaches that jointly reflect and address the specifics of such systems. This paper maps the discussions and results of the Third International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2017), which specifically focuses on challenges and promising solutions in the area of software engineering for sCPS.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gleirscher:2018:SRIa, author = "Mario Gleirscher and Stefan Kugele and Sven Linker", title = "{SCAV'18}: Report of the {2nd International Workshop on Safe Control of Autonomous Vehicles}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "45--47", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302402", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This report summarizes the discussions, open issues, take-away messages, and conclusions of the 2nd SCAV workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kuhrmann:2018:SICa, author = "Marco Kuhrmann and Rory V. O'Connor and Dan Houston and Regina Hebig and David Raffo", title = "Summary of the {International Conference on Software and System Processes (ICSSP 2018)}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "48--51", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282534", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The International Conference on Software and System Processes (ICSSP), continuing the success of Software Process Workshop (SPW), the Software Process Modeling and Simulation Workshop (ProSim) and the International Conference on Software Process (ICSP) conference series, has become the established premier event in the field of software and systems engineering processes. It provides a leading forum for the exchange of research outcomes and industrial best-practices in process development from software and systems disciplines. ICSSP 2018 was held in Gothenburg, Sweden, 26-27 May 2018, co-located with the 40th International Conference on Software Engineering (ICSE). The theme of ICSSP 2018 was studying ``Demands on Processes, Processes on Demand'' by recognizing the demands on processes that include the need for both well-developed plans and incremental deliveries (agile and hybrid processes), utilization of increased automation (model-based engineering and DevOps), higher degrees of customer collaboration, comprehensive analysis of existing products for reuse (open source and COTS), and performance requirements of enterprise-level architectures. Papers presented at ICSSP discussed these issues across different domains, providing concepts, evidence, and experiences.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fraser:2018:ACPb, author = "Steven Fraser and Dennis Manci", title = "Agile Culture: a Panels Report from {XP 2017}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "52--52", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282536", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The culture of agile development practices and an assessment of agile's ``success'' were the topics of two XP2017 panel sessions. There were three primary conclusions of these two panels. Agile has high brand recognition in the software industry, but it isn't always successfully implemented. In some cases, the labels used to explain and promote agile practices can get in the way of agile success. It was also recognized that despite a negative perception, agile's reputation as being a cult was more a reflection of a small, but growing core of practitioners.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Haider:2018:AAD, author = "Umaima Haider and John D. McGregor and Rabih Bashroush", title = "The {ALI Architecture Description Language}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "52--52", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282545", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Architecture Description Languages (ADLs) have emerged over the past two decades as a means to abstract details of large-scale systems in order to enable better intellectual control over the complete systems. Recently, there has been an explosion in the number of ADLs created in the research community. However, industrial adoption of these ADLs has been rather limited. This has been attributed to various reasons, including the lack of support of some ADLs for: variability management, requirements traceability, architectural artefact reusability and multiple architectural views. To overcome these limitations, this paper is a report on ALI, an ADL that was designed to complement existing work by adding mechanisms to address the aforementioned limitations. The ALI design principles, concepts, notations and formal semantics are presented in this paper. The notation is illustrated using two distinct case studies, one from the information systems domain an Asset Management System (AMS); and another from the embedded systems domain --- a Wheel Brake System (WBS).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jain:2018:MDN, author = "Ajay Jain and Sachin Soni", title = "Multi-Directional navigation method for optimized consumption of user generated content through semantic mapping of features derived from the user generated content", journal = j-SIGSOFT, volume = "43", number = "4", pages = "52--52", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282535", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Gone are the days when a buyer used to depend solely on the product marketing team to know what's good about a product or product features. With the advent of social media, product purchase has become democratic with product buyers, product users are vocal about reporting back their experience about the product. According to Forrester, ``buyers will spend more time on web pages that have social content than those that don't'' and ``user-generated content has significant influence on a buyer's purchase decision.'' The research doesn't lie --- User Generated Content (termed as UGC) is more effective at driving purchase intent and brand loyalty than any other media. To create engaging, authentic customer experiences, companies should weave UGC throughout their owned websites, showcasing the voices that consumers trust the most: their own.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Raibulet:2018:RIWb, author = "Claudia Raibulet and Mariagrazia Fugini and Khalil Drira and Patrizio Pelliccione and Ilias Gerostathopoulos and Christian Prefoher and Klaus Moessne", title = "Report of the {1st International Workshop on Context-aware Autonomous and Smart Architectures (CASA@ECSA 2017)}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "52--53", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282537", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The 2017 1st International Workshop on Context-aware, Autonomous and Smart Architectures (CASA 2017) was held in conjunction with the 11th European Conference on Software Architecture (ECSA 2017), on September, 12th, 2017 in Canterbury, United Kingdom. The goal of this one-day workshop was to bring together researchers and practitioners from academic environment and from the industry to share their solutions, ideas, visions, and doubts in the design of software architectures for context-aware, autonomous, and smart solutions. The workshop focused on architectural aspects offering a complementary vision of such solutions with respect to the available application- and user-oriented perspectives on context-awareness, autonomy, and smartness. Furthermore, the workshop aimed to enable discussions, partnerships, and collaborations among the software engineers interested in these solutions", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Borg:2018:SIWb, author = "Markus Borg and Adnan Causevic and Serge Demeyer and Sigrid Eldh", title = "Summary of the {1st IEEE Workshop on the Next Level of Test Automation (NEXTA 2018)}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "53--53", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282540", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "NEXTA is a new workshop on test automation that provides a meeting point for academic researchers and industry practitioners. While test automation already is an established practice in industry, the concept needs to evolve to go beyond its current state to support the ever faster release cycles of tomorrow's software engineering. NEXTA implications for research and practice will include test case generation, automated test result analysis, test suite assessment and maintenance, and infrastructure for the future of test automation. The first instance of NEXTA was co-located with the 11th IEEE Conference on Software Testing, Verification and Validation (ICST 2018) in V{\"a}ster{\aa}s, Sweden on April 9, 2018. NEXTA 2018 offered an interactive setting with a keynote and paper presentations, stimulated by two novel awards to incentivize interaction and dissemination: a Best Questions Award and a Most Viral Tweet Award. The workshop attracted 15 paper submissions and about 50 participants. Based on the positive feedback, we plan to organize the workshop again next year.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Fraser:2018:NSBb, author = "Steven Fraser and Dennis Manci", title = "No Silver Bullet Reloaded: Report on {XP 2017} Panel Session", journal = j-SIGSOFT, volume = "43", number = "4", pages = "53--53", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282541", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "At XP2017 in Koln, a panel was convened to discuss the classic 1987 IEEE Software paper by Frederick P. Brooks, ``No Silver Bullet: Essence and Accidents in Software Engineering.'' The ideas presented in his paper have influenced several generations of software developers. Brooks emphasized the notions of essential complexity and accidental complexity, and he offered suggestions for promising approaches to software development. While his approaches are linked to what we now recognize as ``agile practices,'' panelists offered an implicit caveat that they must be done with discipline to avoid increased accidental complexity. Panelists also observed that agile development itself is not a ``silver bullet''.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Northrop:2018:DSSb, author = "Lina Northrop and Ipek Ozkaya and George Fairbanks and Michael Keeling", title = "Designing the Software Systems of the Future", journal = j-SIGSOFT, volume = "43", number = "4", pages = "53--53", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282538", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "We report here on the Future of Software Design Workshop that was held on Jan 12-14, 2018 in Pittsburgh, PA under the sponsorship of the Carnegie Mellon University Software Engineering Institute. The software industry is awash in modern trends that involve artificial intelligence (AI), autonomy, data everywhere, etc. These trends affect the structure of software-intensive systems and their designs. The goal of the workshop was to bring together participants from diverse backgrounds to formulate ideas for software design of future systems and related research opportunities and challenges. In this report we summarize the outcomes of the workshop", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{vanderLinden:2018:ESWb, author = "Dirk van der Linden and Awais Rashid", title = "The Effect of Software Warranties on Cybersecurity", journal = j-SIGSOFT, volume = "43", number = "4", pages = "53--53", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282539", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This workshop focused on bringing software developers and legal professionals together to understand the shared challenges they face in promoting the development of secure software on the one hand, and software at all, on the other hand. This report summarizes current scientific research on the topics and challenges discussed in the workshop breakout sessions. The insights from the workshop highlight a number of interesting directions for further research on the interplay between software warranties and cybersecurity.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bures:2018:SESb, author = "Tomas Bures and Danny Weyns and Bradley Schmerl and John Fitzgerald", title = "Software Engineering for Smart Cyber-Physical Systems: Models, System-Environment Boundary, and Social Aspects", journal = j-SIGSOFT, volume = "43", number = "4", pages = "54--54", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282542", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Smart Cyber-Physical Systems (sCPS) are a novel kind of Cyber-Physical Systems engineered to take advantage of large-scale cooperation between devices, users and environment to achieve added value in face of uncertainty and various situations in their environment. Examples of sCPS include modern traffic systems, Industry 4.0 systems, systems for smart-buildings, smart energy grids, etc. The uniting aspect of all these systems is that to achieve their high-level of intelligence, adaptivity and ability to optimize and learn, they heavily rely on software. This makes them software-intensive systems, where software becomes their most complex part. Engineering sCPS thus becomes a recognized software engineering discipline, which however, due to specifics of sCPS, can only partially rely on the existing body of knowledge in software engineering. In fact, it turns out that many of the traditional approaches to architecture modeling and software development fail to cope with the high dynamicity and uncertainty of sCPS. This calls for innovative approaches that jointly reflect and address the specifics of such systems. This paper maps the discussions and results of the Third International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2017), which specifically focuses on challenges and promising solutions in the area of software engineering for sCPS.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gleirscher:2018:SRIb, author = "Mario Gleirscher and Stefan Kugele and Sven Linker", title = "{SCAV'18}: Report of the {2nd International Workshop on Safe Control of Autonomous Vehicles}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "54--54", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282543", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This report summarizes the discussions, open issues, take-away messages, and conclusions of the 2nd SCAV workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kuhrmann:2018:SICb, author = "Marco Kuhrmann and Rory V. O'Connor and Dan Houston and Regina Hebig and David Raffo", title = "Summary of the {International Conference on Software and System Processes (ICSSP 2018)}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "54--54", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282534", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The International Conference on Software and System Processes (ICSSP), continuing the success of Software Process Workshop (SPW), the Software Process Modeling and Simulation Workshop (ProSim) and the International Conference on Software Process (ICSP) conference series, has become the established premier event in the field of software and systems engineering processes. It provides a leading forum for the exchange of research outcomes and industrial best-practices in process development from software and systems disciplines. ICSSP 2018 was held in Gothenburg, Sweden, 26-27 May 2018, co-located with the 40th International Conference on Software Engineering (ICSE). The theme of ICSSP 2018 was studying ``Demands on Processes, Processes on Demand'' by recognizing the demands on processes that include the need for both well-developed plans and incremental deliveries (agile and hybrid processes), utilization of increased automation (model-based engineering and DevOps), higher degrees of customer collaboration, comprehensive analysis of existing products for reuse (open source and COTS), and performance requirements of enterprise-level architectures. Papers presented at ICSSP discussed these issues across different domains, providing concepts, evidence, and experiences.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bultan:2018:SCA, author = "Tevfik Bultan", title = "Side-Channel Analysis via Symbolic Execution and Model Counting", journal = j-SIGSOFT, volume = "43", number = "4", pages = "55--55", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302416", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "An important problem in computer security is the detection of side-channel vulnerabilities. Information gained by observing nonfunctional properties of program executions (i.e., sidechannels such as execution time or memory usage) can enable attackers to infer secrets that the program accesses (such as a password). In this talk, I will discuss how symbolic execution, combined with a model counting constraint solver, can be used for quantifying side-channel leakage in Java programs. I will also discuss automata-based model counting techniques. We have implemented these techniques by integrating our model counting constraint solver, called Automata-Based model Counter (ABC), with the symbolic execution tool Symbolic Path Finder (SPF).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Paquin:2018:AAS, author = "Maria Paquin and Elena Sherman and Amit Jain", title = "Assessing the Adequacy of Synthetic Programs for Learning {SPF's} Configurations", journal = j-SIGSOFT, volume = "43", number = "4", pages = "55--55", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282526", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Static program analysis is a powerful technique that reasons about a program's behavior without actually executing the program. To balance between the precision and the efficiency of an analyzer, developers often manually tune-up analyzer's parameters for a specific program. However, this task can be tedious and time-consuming. To automate the search for the optimal parameters for a program, researchers employ machine learning (ML) techniques, that from the existing data learn the relationship between the program and the optimal parameters, which it encodes in an ML model. The existing, or training, data set, plays an important role in the correctness of an ML model. In this work we investigate whether automatically generated programs are adequate for training an ML model, which determines SPF's configurations for a given Java method. To do this, we compare the performance of a model trained on real programs with that of a model trained on synthetic programs. Our results indicate that while synthetic programs are inadequate for training a model alone, adding them to the training set of real programs improves the classification power of the resulting model.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Phan:2018:TIG, author = "Quoc-Sang Phan", title = "Test input generation using separation logic", journal = j-SIGSOFT, volume = "43", number = "4", pages = "55--55", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3302418", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Unit testing is the practice of testing individual units of a program, where a unit can be a method or a group of methods. Unit testing is important for software development, and automated test case generation is important for reducing the cost and improving the quality of unit testing. When an input of a un is a dynamically allocated data structure, such as list and tree, it has unbounded domain, and strict requirements over the shape or size. This makes test case generation notoriously hard. In this talk, we present Java StarFinder (JSF), a JPF extension for testing units that manipulate data structures. JSF is a symbolic execution engine that uses separation logic specification to capture the constraints over the input, and performs context-sensitive lazy initialization to construct valid test cases.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Wang:2018:PBJ, author = "Kaiyuan Wang and Hayes Converse and Milos Gligoric and Sasa Misailovic and Sarfraz Khurshid", title = "A Progress Bar for the {JPF} Search Using Program Executions", journal = j-SIGSOFT, volume = "43", number = "4", pages = "55--55", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282525", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software model checkers, such as JPF, are routinely used to explore executions of programs that have very large state spaces. Sometimes the exploration can take a significant amount of time before a bug is found or the checking is complete, in which case the user must patiently wait, possibly for quite some time, to learn the result of checking. A progress bar that accurately shows the status of the search provides the user useful feedback about the time expected for the search to complete. This paper introduces JPFBar, a novel technique to estimate the percentage of work done by the JPF search by computing weights for the execution paths it explores and summing up the weights. JPFBar is embodied into a listener that prints a progress bar during JPF execution. An experimental evaluation using a variety of Java subjects shows that JPFBar provides accurate information about the search's progress and fares well in comparison with a state-based progress estimator that is part of the standard JPF distribution.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Cordeiro:2018:BJV, author = "Lucas C. Cordeiro and Daniel Kroening and Peter Schrammel", title = "Benchmarking of {Java} Verification Tools at the {Software Verification Competition (SV-COMP)}", journal = j-SIGSOFT, volume = "43", number = "4", pages = "56--56", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282529", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Empirical evaluation of verification tools by benchmarking is a common method in software verification research. The Competition on Software Verification (SV-COMP) aims at standardization and reproducibility of benchmarking within the software verification community in an annual basis, through comparative evaluation of fully-automatic software verifiers for C programs. Building upon this success, we describe here how to re-use the ecosystem developed around SV-COMP for benchmarking Java verification tools. We provide a detailed description of the rules for benchmark verification tasks, the integration of new tools into SV-COMP's benchmarking framework and also give experimental results of a benchmarking run on three state-of-the-art Java verification tools, JPF-SE, JayHorn and JBMC.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Jones:2018:MSC, author = "Joseph Jones and James Wasson and Sean Brown and Seth Poulsen and Peter Aldous and Eric Mercer", title = "Memory safety in {C} by abstract interpretation", journal = j-SIGSOFT, volume = "43", number = "4", pages = "56--56", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282530", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Pointer arithmetic is a core feature of the C programming language and C program analysis is impossible without an understanding of its effects. Many program analyses opt to be unsound in the presence of pointer arithmetic or preserve soundness at the cost of precision. However, the number of operations that can be performed on pointers is actually quite small. As was observed by Might et al., these few operations can be precisely modeled with a simplified Peano arithmetic. This paper presents an interpreter that uses a memory model based on this arithmetic. It desugars C programs to a simple imperative language using standard semantics-preserving techniques to simplify the interpretation. The result is a prototype analysis that reasons precisely about memory safety in full C programs without programmer annotations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saha:2018:ASS, author = "Seemanta Saha and Ismet Burak Kadron and William Eiers and Lucas Bang and Tevfik Bultan", title = "Attack Synthesis for Strings using Meta-Heuristics", journal = j-SIGSOFT, volume = "43", number = "4", pages = "56--56", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282527", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Information leaks are a significant problem in modern computer systems and string manipulation is prevalent in modern software. We present techniques for automated synthesis of side-channel attacks that recover secret string values based on timing observations on string manipulating code. Our attack synthesis techniques iteratively generate inputs which, when fed to code that accesses the secret, reveal partial information about the secret based on the timing observations, leading to recovery of the secret at the end of the attack sequence. We use symbolic execution to extract path constraints, automata-based model counting to estimate the probability of execution paths, and meta-heuristic methods to maximize information gain based on entropy for synthesizing adaptive attack steps.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Zheng:2018:ADS, author = "Guolong Zheng and Quang Loc Le and ThanhVu Nguyen and Quoc-Sang Phan", title = "Automatic Data Structure Repair using Separation Logic", journal = j-SIGSOFT, volume = "43", number = "4", pages = "66--66", month = oct, year = "2018", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3282517.3282528", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:10 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software systems are often shipped and deployed with both known and unknown bugs. On-the-fly program repairs, which handle runtime errors and allow programs to continue successfully, can help software reliability, e.g., by dealing with inconsistent or corrupted data without interrupting the running program. We report on our work-in-progress that repairs data structure using separation logic. Our technique, inspired by existing works on specification-based repair, takes as input specification written in a separation logic formula and a concrete data structure that fails that specification, and performs on-the-fly repair to make the data conforms with the specification. The use of separation logic allows us to compactly and precisely represent desired properties of data structures and use existing analyses in separation logic to detect and repair bugs in complex data structures. We have developed a prototype, called STARFIX, to repair invalid Java data structures violating given specifications in separation logic. Preliminary results show that tool can efficiently detect and repair inconsistent data structures including lists and trees.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2019:Pa, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "44", number = "1", pages = "7--7", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310015", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In every larger-scale endeavor, or at least in most larger-scale endeavors, there comes a time to evaluate progress, solicit opinion, ask your public, survey your customers --- in short, to find out if what you are doing is actually worth doing. In some cases, this step may be omitted, or the results ignored: it is possible that if Herman Melville had shown people Moby Dick when he was half-done with it, everyone except Nathaniel Hawthorne would have said ``Er, we're not sure what this is all about. Where's the nice adventure of Omoo? Just what are you up to, Sir?'' He should not have therefore ditched the manuscript and gone on to something else; also, Nathaniel Hawthorne gets 50,000 votes. However, in general, you (and I) are not Melville writing Moby Dick. Scientific projects tend to publish some papers before they are ``complete'' and if these are universally derided and rejected, or receive no citations, it is often the case that they are doing nothing of much interest. There are exceptions, but they are rarer, perhaps, than we might think. Most things that are ignored are ignored for a good reason.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Schaefer:2019:WDW, author = "Robert Schaefer", title = "What Do We Mean When We Talk about Artificial Intelligence?: (Part 1)", journal = j-SIGSOFT, volume = "44", number = "1", pages = "7--10", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310014", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This is a good time as any to address the more philosophical questions of what software is and how we use it, in particular software used as a replacement for human intelligence-AI. My intent in this and in the next few columns is to address some of the fundamentals, that is, the science of AI or what should be nailed-down before software engineering begins. You get more traction when you design on a solid science base of knowledge. A simple analogy, for example-one might not choose to labor over a not-quite-working perpetual-motion machine if one were aware of the second law of thermodynamics. Then again, there is no equivalent ``law of human intelligence,'' so people keep trying.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2019:RPa, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "44", number = "1", pages = "11--17", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310021", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Edited by PGN (Risks Forum Moderator, with contributions by others as indicated. Opinions are individual rather than organizational, with usual disclaimers implied. We address problems relating to software, hardware, people, and other circumstances relevant to computer systems. References (R i j) to the online Risks Forum denote RISKS vol i number j. Cited RISKS items generally identify contributors and sources, together with URLs. Official RISKS archives are available at www.risks.org, with nice html formatting and search engine courtesy of Lindsay Marshall at Newcastle:; http://catless.ncl.ac.uk/Risks/i.j.html (also ftp://www.sri.com/risks). CACM Inside Risks: http://www.csl.sri.com/neumann/insiderisks.html", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mascardi:2019:EMAa, author = "Viviana Mascardi and Danny Weyns and Alessandro Ricci", title = "Engineering Multi-Agent Systems: State of Affairs and the Road Ahead", journal = j-SIGSOFT, volume = "44", number = "1", pages = "18--28", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310035", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The continuous integration of software-intensive systems together with the ever-increasing computing power offer a breeding ground for intelligent agents and multi-agent systems (MAS) more than ever before. Over the past two decades, a wide variety of languages, models, techniques and methodologies have been proposed to engineer agents and MAS. Despite this substantial body of knowledge and expertise, the systematic engineering of large-scale and open MAS still poses many challenges. Researchers and engineers still face fundamental questions regarding theories, architectures, languages, processes, and platforms for designing, implementing, running, maintaining, and evolving MAS. This paper reports on the results of the 6th International Workshop on Engineering Multi-Agent Systems (EMAS 2018, 14th-15th of July, 2018, Stockholm, Sweden), where participants discussed the issues above focusing on the state of affairs and the road ahead for researchers and engineers in this area.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Eck:2019:PMCa, author = "Stefan Eck and Hans A. Hansson", title = "{PROMPT} --- Master Courses for Professional Software Developers", journal = j-SIGSOFT, volume = "44", number = "1", pages = "29--30", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310036", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "PROMPT [1] is an educational initiative in cooperation with several academic parties and leading industrial companies and organizations. Together, the parties offer advanced level courses in software engineering in a web-based format, tailored to fit professional engineers and software developers who need to be able to combine full-time work and studies. The long-term goal of PROMPT is to guarantee the supply of advanced software competencies and innovativeness in industry. The courses are free of charge within Europe, cover typically 7.5 university credits and are run over a whole semester, at a pace of 25\% of full-time. All courses are developed in close cooperation with the Swedish industry and trade organizations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Unterkalmsteiner:2019:SIW, author = "Michael Unterkalmsteiner and Tingting Yu and Gregory Gay and Elizabeth Bjarnason and Markus Borg and Michael Felderer", title = "Summary of the {5th International Workshop on Requirements Engineering and Testing (RET 2018)}", journal = j-SIGSOFT, volume = "44", number = "1", pages = "31--34", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310037", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The RET (Requirements Engineering and Testing) workshop series provides a meeting point for researchers and practitioners from the two separate fields of Requirements Engineering (RE) and Testing. The goal is to improve the connection and alignment of these two areas through an exchange of ideas, challenges, practices, experiences and results. The long term aim is to build a community and a body of knowledge within the intersection of RE and Testing, i.e. RET. The 5th workshop was held in colocation with ICSE 2018 in Gothenburg, Sweden. The workshop continued in the same interactive vein as the predecessors. We introduced a new format for the presentations in which the paper authors had the opportunity to interact extensively with the audience. Each author was supported by a member of the organization committee to prepare either an extensive demo, collect more data in form of a questionnaire or perform a hands-on tutorial. We named this new format ``X-ray session''. In order to create an RET knowledge base, this cross-cutting area elicits contributions from both RE and Testing, and from both researchers and practitioners. A range of papers were presented from short positions papers to full research papers that cover connections between the two fields. The workshop attracted 27 participants and the positive feedback on the new format encourages us to organize the workshop the next year again.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Eck:2019:PMCb, author = "Stefan Eck and Hans A. Hansson", title = "{PROMPT} --- Master Courses for Professional Software Developers", journal = j-SIGSOFT, volume = "44", number = "1", pages = "35--35", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310036", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "PROMPT [1] is an educational initiative in cooperation with several academic parties and leading industrial companies and organizations. Together, the parties offer advanced level courses in software engineering in a web-based format, tailored to fit professional engineers and software developers who need to be able to combine full-time work and studies. The long-term goal of PROMPT is to guarantee the supply of advanced software competencies and innovativeness in industry. The courses are free of charge within Europe, cover typically 7.5 university credits and are run over a whole semester, at a pace of 25\% of full-time. All courses are developed in close cooperation with the Swedish industry and trade organizations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kumari:2019:EGP, author = "Neha Kumari and Rajeev Kumar", title = "Evolution of Generic Programming in {OOPLs}", journal = j-SIGSOFT, volume = "44", number = "1", pages = "35--35", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310033", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Generic Programming enables program constructs to be reused in a variety of situations. In programming languages, idea of generic programming is being opted through a variety of generic mechanisms. Generic mechanisms are either directly applied to pre-existing language constructs or it provides its own components for generic implementation. In this paper, we present such generic mechanisms in an organized way such that it appears as ``one mechanism intensify other''. Our aim is to exhibit generic evolution among mainstream object oriented programming languages (OOPLs). Hence, we analyze such approaches for better expressiveness and type-safety of generic programming as they evolved in OOPLs. This brief review article will help developers and researchers to precisely understand the generic mechanism in mainstream OOPLs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Mascardi:2019:EMAb, author = "Viviana Mascardi and Danny Weyns and Alessandro Ricci", title = "Engineering Multi-Agent Systems: State of Affairs and the Road Ahead", journal = j-SIGSOFT, volume = "44", number = "1", pages = "35--35", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310035", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "The continuous integration of software-intensive systems together with the ever-increasing computing power offer a breeding ground for intelligent agents and multi-agent systems (MAS) more than ever before. Over the past two decades, a wide variety of languages, models, techniques and methodologies have been proposed to engineer agents and MAS. Despite this substantial body of knowledge and expertise, the systematic engineering of large-scale and open MAS still poses many challenges. Researchers and engineers still face fundamental questions regarding theories, architectures, languages, processes, and platforms for designing, implementing, running, maintaining, and evolving MAS. This paper reports on the results of the 6th International Workshop on Engineering Multi-Agent Systems (EMAS 2018, 14th-15th of July, 2018, Stockholm, Sweden), where participants discussed the issues above focusing on the state of affairs and the road ahead for researchers and engineers in this area.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Roy:2019:EIC, author = "Subhajit Roy", title = "Envisioning an Intelligent Collaborative Integrated Development Environment", journal = j-SIGSOFT, volume = "44", number = "1", pages = "35--35", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310034", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Abstract Programming editors have evolved over the years. However, we still lack an environment that can allow on-the-fly collaboration between multiple programmers. We envision Incide, an integrated development environment that allows a synergistic collaboration environment by using program synthesis technology to combine partial solutions from multiple programmers attempting to solve the (same) problem into one concrete solution. This solution is then communicated to the editor of each programmer as patches along with personalization on syntactic elements like choice of programming language constructs and variable names. We believe that such editors will improve productivity on complex solutions by bringing a discipline into combining the intuition and intellect of multiple programmers.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Muna:2019:APL, author = "Altherwi Muna", title = "Assessing Programming Language Impact on Software Development Productivity Based on Mining {OSS} Repositories", journal = j-SIGSOFT, volume = "44", number = "1", pages = "36--37", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310017", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "This study is to investigate the impact of high-level, general-purpose, programming languages on software development productivity and quality. In particular, a comparison is to be made between scripting languages and traditionally compiled, system programming ones to examine differences, if any. The data obtained for the research is from open source repositories gathered from Github. The results are going to be based on the analysis of possibly the largest open source dataset through examining a population of 15,000 projects and by including a sample of 4349 projects, where a main language can be identified. The investigation, so far, has revealed considerable differences in productivity between the two language groups.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Singh:2019:UNL, author = "Maninder Singh", title = "Using Natural Language Processing and Graph Mining to Explore Inter-Related Requirements in Software Artefacts", journal = j-SIGSOFT, volume = "44", number = "1", pages = "37--37", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310018", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Software development is prone to software faults due to the involvement of multiple stakeholders especially during the fuzzy phases (requirements and design). Software inspections are commonly used in industry to detect and fix problems in requirements and design artifacts thereby mitigating the fault propagation to later phases. The requirements documented in natural language (NL) are prone to contain faults because of different vocabularies among stakeholders. This research employs various NL processing with semantic analysis (SA) and mining solutions from graph theory to NL requirements to develop inter-related requirements (IRRs) that can help identify requirements that may need similar fixes. Additionally, our approach aims at aiding requirements' engineers with fault-prone regions both pre and post inspection. Pre-inspection, our approach using IRRs help removing redundant and extraneous faults within related requirements while post-inspection, it aids engineers analyse the impact of a change in one requirement on another related requirements. So, this research aims at developing a graph of inter-related requirements using natural language processing and semantic analysis approaches on a given requirements document that can be used to aid various decisions pre and post-inspections.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Turlea:2019:MLT, author = "Ana Turlea", title = "Model-in-the-Loop Testing for Cyber Physical Systems", journal = j-SIGSOFT, volume = "44", number = "1", pages = "37--37", month = jan, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3310013.3310019", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Sat Oct 19 18:11:11 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Context: Nowadays, there is of high interest to use automated testing, not only because it optimizes the manual testing by reducing the needed time and cost, but also because manual testing is more likely to produce errors. Increasing the safety of software controlled complex systems, that use many distributed electronic controlled units, requires extensive testing. In model based testing, the test specification is derived from the system requirements and a model that describes selected functional and nonfunctional aspects of the system under test.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2019:Pb, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "44", number = "2", pages = "3--4", month = apr, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3325642.3325644", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Mon Oct 21 05:42:17 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Gerald M. Weinberg's The Psychology of Computer Programming: Silver Anniversary Edition is this month's Passages selection. Weinberg died last August, but this book alone makes him immortal in the world of software engineering. The Psychology is one of my favorite software engineering classics, and one of the books that originally motivated this column. Tim Budd gave me my first copy, when I was a young and ignorant professor at Oregon State, when he retired (the opposite of the usual retirement gifting procedure) and I read it with great pleasure and attention for the first time, not long after, and began to form the idea of Passages not long after that. Why did I not write about it before this?", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Elbaum:2019:SI, author = "Sebastian Elbaum", title = "The State of {ICSE}", journal = j-SIGSOFT, volume = "44", number = "2", pages = "4--5", month = apr, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3325642.3325645", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Mon Oct 21 05:42:17 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "In this state of the conference I want to share a short reflection about my four years as steering committee chair, some highlights of the upcoming ICSE operational guidelines, and a quick update on the next ICSEs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2019:RPb, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "44", number = "2", pages = "6--12", month = apr, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3325642.3325643", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Mon Oct 21 05:42:17 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", abstract = "Edited by PGN (Risks Forum Moderator, with contributions by others as indicated. Opinions are individual rather than organizational, with usual disclaimers implied. We address problems relating to software, hardware, people, and other circumstances relevant to computer systems. References (R i j) to the online Risks Forum denote RISKS vol i number j. Cited RISKS items generally identify contributors and sources, together with URLs. Official RISKS archives are available at www.risks.org, with nice html formatting and search engine courtesy of Lindsay Marshall at Newcastle:; http://catless.ncl.ac.uk/Risks/i.j.html (also ftp://www.sri.com/risks). CACM Inside Risks: http://www.csl.sri.com/neumann/insiderisks.html", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Groce:2019:P, author = "Alex Groce", title = "Passages", journal = j-SIGSOFT, volume = "44", number = "3", pages = "10--11", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356775", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356775", abstract = "Gerald M. Weinberg's An Introduction to General Systems Thinking is this month's Passages selection. Weinberg's Psychology of Computer Programming was last month's Passages selection. I believe that many more software engineers have read last month's \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Soldani:2019:GLS, author = "Jacopo Soldani", title = "Grey Literature: a Safe Bridge Between Academy and Industry?", journal = j-SIGSOFT, volume = "44", number = "3", pages = "11--12", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356776", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356776", abstract = "With ``grey literature'' we identify materials and research produced outside of the traditional academic publishing and distribution channels. Currently available grey literature spans from industrial whitepapers and technical reports to blog post and \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Arumugam:2019:SCA, author = "Lakshmanan Arumugam and Vikram N. Subramanian and Meiyappan Nagappan", title = "{SEGarage}: a Curated Archive for Software Engineering Research Tools", journal = j-SIGSOFT, volume = "44", number = "3", pages = "13--13", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356777", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356777", abstract = "SEGarage is a curated archive for software engineering tools developed through software engineering research. This service aims to ease the effort of finding and downloading tools from past research.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2019:RPc, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "44", number = "3", pages = "16--21", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3372312", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3372312", abstract = "Discussion of the two 737 Max fatal losses has persisted (noted in R 31 11 to R 31 27), and is still ongoing. The desired use of lighter engines altered the nose-lift behavior, and resulted in an automated system that attempted to compensate for the \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Pastor:2019:DSP, author = "Oscar Pastor", title = "Design Science for {PhD} Research in the Software Engineering Domain", journal = j-SIGSOFT, volume = "44", number = "3", pages = "22--22", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3372314", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3372314", abstract = "The keynote introduced the principles of Design Science with the perspective developed by Prof. Roel Wieringa in his book ``Design Science'', clearly distinguishing between questions of knowledge and engineering problems, and introducing the research \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Aldaeej:2019:TET, author = "Abdullah Aldaeej", title = "Towards Effective Technical Debt Decision Making in Software Startups", journal = j-SIGSOFT, volume = "44", number = "3", pages = "22--22", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356793", abstract = "Context: Technical Debt (TD) is a metaphor used to describe outstanding software maintenance tasks or shortcuts made in the software development to achieve short-term benefits (i.e. time to market), but negatively impact the software quality in the long \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Matsubara:2019:DSE, author = "Patr{\'\i}cia Gomes Fernandes Matsubara", title = "Dealing with software estimates distortions from the perspective of negotiation theories", journal = j-SIGSOFT, volume = "44", number = "3", pages = "22--22", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356794", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356794", abstract = "Software estimation is a critical task in software projects, and the accuracy of software estimates has been a concern for researchers and practitioners. Researchers have already identified some factors that impact estimates accuracy, like cognitive \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Motta:2019:EBF, author = "Rebeca C. Motta", title = "An Evidence-Based Framework for Supporting the Engineering of {IoT} Software Systems", journal = j-SIGSOFT, volume = "44", number = "3", pages = "22--23", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356795", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356795", abstract = "Internet of Things represents a promising paradigm for the development of systems that have been largely explored in the academy and industry. One of the recognized features of IoT is its large multidisciplinarity by the integration of different devices \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neto:2019:SSR, author = "Amadeu Anderlin Neto", title = "A Strategy to Support Replications of Controlled Experiments in Software Engineering", journal = j-SIGSOFT, volume = "44", number = "3", pages = "23--23", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356796", abstract = "Replication is essential to build knowledge in empirical science. Experiment replications reported in the software engineering context present variabilities on their experiment elements, e.g., variables, materials. Further understanding these \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kamei:2019:UGL, author = "Fernando Kenji Kamei", title = "The Use of Grey Literature Review as Evidence for Practitioners", journal = j-SIGSOFT, volume = "44", number = "3", pages = "23--23", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356797", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356797", abstract = "Context: In the last years, diverse research areas increased their interest in Grey Literature (GL). In Software Engineering (SE), SE practitioners became heavy consumers of GL, by way of contrast to traditional research papers. Problem: This is \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Kreitz:2019:SDS, author = "Mark Kreitz", title = "Security by Design in Software Engineering", journal = j-SIGSOFT, volume = "44", number = "3", pages = "23--23", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356798", abstract = "Security is a non-functional requirement difficult-to-handle during software development. However, it appears to be common in software engineering, that security is taken care of during the design- and test-phase only. If security is neglected during \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saarimaki:2019:MIO, author = "Nyyti Saarim{\"a}ki", title = "Methodological Issues in Observational Studies", journal = j-SIGSOFT, volume = "44", number = "3", pages = "24--24", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356799", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356799", abstract = "Background: Starting from the 1960s, practitioners and researchers have looked for ways to empirically investigate new technologies such as inspecting the effectiveness of new methods, tools, or practices. With this purpose, the empirical software \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Langdon:2019:SFG, author = "William B. Langdon and Westley Weimer and Christopher Timperley and Oliver Krauss and Zhen Yu Ding and Yiwei Lyu and Nicolas Chausseau and Eric Schulte and Shin Hwei Tan and Kevin Leach and Yu Huang and Gabin An", title = "The State and Future of Genetic Improvement", journal = j-SIGSOFT, volume = "44", number = "3", pages = "25--29", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356801", abstract = "We report the discussion session at the sixth international Genetic Improvement workshop, GI-2019 @ ICSE, which was held as part of the 41st ACM/IEEE International Conference on Software Engineering on Tuesday 28th May 2019. Topics included GI \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Calefato:2019:SIC, author = "Fabio Calefato and Paolo Tell and Alpana Dubey", title = "Summary of the {14th International Conference on Global Software Engineering (ICGSE)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "30--33", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356802", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356802", abstract = "The International Conference on Global Software Engineering, in its 14th iteration, continues to provide researchers and practitioners with a leading forum to share their research findings, experiences, and new ideas on diverse topics related to global \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Sutton:2019:SIC, author = "Stanley M. Sutton and Ove Armbrust and Regina Hebig and Paul Clarke", title = "Summary of the {2019 International Conference on Software and System Processes (ICSSP 2019)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "34--37", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356803", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356803", abstract = "The 2019 International Conference on Software and System Processes (ICSSP 2019) was held in conjunction with the 41st International Conference on Software Engineering (ICSE 2019) in Montreal, Canada, May 25-26, 2019. ICSSP is a leading international \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Ciccozzi:2019:RIW, author = "Federico Ciccozzi and Nico Hochgeschwender and Ivano Malavolta and Andreas Wortmann", title = "Report on the {2nd International Workshop on Robotics Software Engineering (RoSE'19)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "38--40", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356804", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356804", abstract = "The 2nd edition of the 2nd International Workshop on Robotics Software Engineering (RoSE) was held at the International Conference on Software Engineering (ICSE) in the city of Montreal, Canada, on the 27th of May 2019. The focus of this edition of the \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Karre:2019:RSE, author = "Sai Anirudh Karre and Lalit Mohan and Y. Raghu Raghu Reddy and K. V. Raghavan and R. D. Naik and Rahul Purandare and Amey Karkare", title = "A report on {1st Software Engineering Research in India Update Meeting (SERI 2019)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "41--42", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356805", abstract = "Software Engineering Researchers in India from both academia and industry are widely contributing to various research problems. In this report, we brie y summarize the key insights from 1st Software Engineering Research in India Update Meeting (SERI \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Steghofer:2019:SSS, author = "Jan-Philipp Stegh{\"o}fer and Nan Niu and Jin L. C. Guo and Anas Mahmoud", title = "{SST'19} --- Software and Systems Traceability: Summary of the {10th International Workshop at the 41st International Conference on Software Engineering (ICSE), May 27, 2019}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "43--47", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356806", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356806", abstract = "Traceability is the ability to relate different artifacts during the development and operation of a system to each other. It enables program comprehension, change impact analysis, and facilitates the cooperation of engineers from different disciplines. \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tonelli:2019:WSI, author = "Roberto Tonelli and Marco Ortu and Stephane Ducasse and Michele Marchesi", title = "Workshop Summary: {2019 IEEE \slash {ACM} Second International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB 2019)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "48--52", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356807", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356807", abstract = "The second Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB 2019) intends to pursue the experience of WETSEB 2018 which inherited from the past eight editions of WETSoM (Workshop on Emerging Trends on Software Metrics) the \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Choi:2019:SEI, author = "Byoungju Choi and Mar{\'\i}a-Jos{\'e} Escalona and Kim Herzig", title = "Summary of the {14th edition of the {IEEE\slash} ACM Workshop on Automation of Software Test (AST)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "53--53", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356808", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356808", abstract = "Effective and efficient testing with reduced costs and a high fault detection capability is the desirable goal in industry which can be achieved only through automation of all parts of the testing process. In the past decades, a great amount of research \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Siegmund:2019:SSE, author = "Janet Siegmund and Andrew Begel and Norman Peitek", title = "Summary of the {Sixth Edition of the International Workshop on Eye Movements in Programming}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "54--55", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356809", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356809", abstract = "The study of eye gaze data has great potential for research in computer programming, computing education, and software engineering practice. To highlight its role for the software engineering community, the Sixth Edition of the International Workshop on \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Xie:2019:WSI, author = "Xiaoyuan Xie and Pak-Lok Poon and Laura L. Pullum", title = "Workshop Summary: {2019 IEEE \slash {ACM} Fourth International Workshop on Metamorphic Testing (MET 2019)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "56--59", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356810", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356810", abstract = "MET is a relatively new workshop on metamorphic testing for academic researchers and industry practitioners. The first international workshop on MET (MET 2016) was co-located with the 38th International Conference on Software Engineering (ICSE 2016) in \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Gerostathopoulos:2019:CDD, author = "Ilias Gerostathopoulos and Marco Konersmann and Stephan Krusche and David I. Mattos and Jan Bosch and Tomas Bures and Brian Fitzgerald and Michael Goedicke and Henry Muccini and Helena H. Olsson and Thomas Brand and Robert Chatley and Nikolaos Diamantopoulos and Arik Friedman and Miguel Jim{\'e}nez and Jan Ole Johanssen and Putra Manggala and Masumi Koseki and Jorge Melegati and Nuthan Munaiah and Gabriel Tamura and Vasileios Theodorou and Jeffrey Wong and Iris Figalist", title = "Continuous Data-driven Software Engineering --- Towards a Research Agenda: Report on the {Joint 5th International Workshop on Rapid Continuous Software Engineering (RCoSE 2019) and 1st International Works}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "60--64", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356811", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356811", abstract = "The rapid pace with which software needs to be built, together with the increasing need to evaluate changes for end users both quantitatively and qualitatively calls for novel software engineering approaches that focus on short release cycles, \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Marijan:2019:GPA, author = "Dusica Marijan and Sagar Sen", title = "Good Practices in Aligning Software Engineering Research and Industry Practice", journal = j-SIGSOFT, volume = "44", number = "3", pages = "65--67", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356812", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356812", abstract = "There is a long-standing challenge to narrow the gap between software engineering research and industry practice, to align their interests and realize true synergies between the two communities. Some difficulties to this challenge include mismatched \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Marijan:2019:IRA, author = "Dusica Marijan and Weiyi Shang and Rakesh Shukla", title = "Implications of Resurgence in Artificial Intelligence for Research Collaborations in Software Engineering", journal = j-SIGSOFT, volume = "44", number = "3", pages = "68--70", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356813", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356813", abstract = "Challenges of implementing successful research collaborations between industry and academia in software engineering are varied and many. Differing timelines, metrics, expectations, and perceptions of these two communities are some common obstacles, \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Neumann:2019:RPd, author = "Peter G. Neumann", title = "Risks to the Public", journal = j-SIGSOFT, volume = "44", number = "4", pages = "5--10", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.3364453", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.3364453", abstract = "RISKS items seem to be burgeoning, making it very difficult to devote detailed accounts in the six pages that our recent SEN sections are occupying. We try to emphasize those items here that have the most content relating to software engineer- ing and \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Bures:2019:SES, author = "Tomas Bures and Danny Weyns and Bradley Schmerl and John Fitzgerald and Adina Aniculaesei and Christian Berger and Jo{\~a}o Cambeiro and Jan Carlson and Shafiul Azam Chowdhury and Marian Daun and Nianyu Li and Matthias Markthaler and Claudio Menghi and Birgit Penzenstadler and Aedan Pettit and Robert Pettit and Luca Sabatucci and Christos Tranoris and Hans Vangheluwe and Sebastian Voss and Edith Zavala", title = "Software Engineering for Smart Cyber-Physical Systems {(SEsCPS} 2018) --- Workshop Report", journal = j-SIGSOFT, volume = "44", number = "4", pages = "11--13", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.3364465", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.3364465", abstract = "Smart Cyber-Physical Systems (sCPS) are a novel kind of Cyber- Physical System engineered to take advantage of large-scale cooperation between devices, users and environment to achieve added value in the face of uncertainty and changing environments. \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Le:2019:SAG, author = "Xuan-Bach D. Le and Corina Pasareanu and Rohan Padhye and David Lo and Willem Visser and Koushik Sen", title = "Saffron: Adaptive Grammar-based Fuzzing for Worst-Case Analysis", journal = j-SIGSOFT, volume = "44", number = "4", pages = "14--14", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.3364455", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.3364455", abstract = "Fuzz testing has been gaining ground recently with substantial efforts devoted to the area. Typically, fuzzers take a set of seed inputs and leverage random mutations to continually improve the inputs with respect to a cost, e.g. program code coverage, \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Almaawi:2019:QEK, author = "Alyas Almaawi and Hayes Converse and Milos Gligoric and Sasa Misailovic and Sarfraz Khurshid", title = "Quantifying the Exploration of the {Korat} Solver for Imperative Constraints", journal = j-SIGSOFT, volume = "44", number = "4", pages = "15--15", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.3364456", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.3364456", abstract = "Tools that explore very large state spaces to nd bugs, e.g., when model checking, or to nd solutions, e.g., when constraint solving, can take a considerable amount of time before the search terminates, and the user may not get useful feedback on the \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Storey:2019:SDP, author = "Kyle Storey and Eric Mercer and Pavel Parizek", title = "A Sound Dynamic Partial Order Reduction Engine for {Java Pathfinder}", journal = j-SIGSOFT, volume = "44", number = "4", pages = "15--15", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.3364457", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.3364457", abstract = "When model checking a multi-threaded program, it is often necessary to enumerate the possible ordering of concurrent events to evaluate the behavior of the program. However, enumerating every possible order of events quickly leads to state-space \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Noller:2019:CSS, author = "Yannic Noller and Hoang Lam Nguyen and Minxing Tang and Timo Kehrer and Lars Grunske", title = "Complete Shadow Symbolic Execution with {Java PathFinder}", journal = j-SIGSOFT, volume = "44", number = "4", pages = "15--16", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.33644558", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.33644558", abstract = "Regression testing ensures the correctness of the software during its evolution, with special attention on the absence of unintended side-effects that might be introduced by changes. However, the manual creation of regression test cases, which expose \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Saha:2019:IAS, author = "Seemanta Saha and William Eiers and Ismet Burak Kadron and Lucas Bang and Tevfik Bultan", title = "Incremental Attack Synthesis", journal = j-SIGSOFT, volume = "44", number = "4", pages = "16--16", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.336445759", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.336445759", abstract = "Information leakage is a significant problem in modern software systems. Information leaks due to side channels are especially hard to detect and analyze. In recent years, techniques have been developed for automated synthesis of adaptive side-channel \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Berglund:2019:MSJ, author = "Lasse Berglund and Cyrille Artho", title = "Method summaries for {JPF}", journal = j-SIGSOFT, volume = "44", number = "4", pages = "16--16", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.33644560", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.33644560", abstract = "Java Pathfinder (JPF) is a virtual machine executing Java byte-code that is able to perform model checking using backtracking execution. Due to backtracking, parts of a program may be executed multiple times during model checking. Hence, we explore \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Chen:2019:SVR, author = "Zhenbang Chen and Hengbiao Yu and Ji Wang and Wei Dong", title = "Symbolic Verification of Regular Properties for {Java} Programs", journal = j-SIGSOFT, volume = "44", number = "4", pages = "17--17", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.33644561", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.33644561", abstract = "Verifying the regular properties of a program is challenging. In this extended abstract, we report our recent progress of verifying regular properties based on dynamic symbolic execution (DSE). We propose two algorithms for DSE to improve the \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Namakonov:2019:SDR, author = "Egor Namakonov and Eric Mercer and Pavel Parizek and Kyle Storey", title = "Symbolic data race detection for {Habanero} programs", journal = j-SIGSOFT, volume = "44", number = "4", pages = "18--18", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.33644562", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.33644562", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Hooker:2019:JHT, author = "Joshua Hooker and Peter Aldous and Eric Mercer and Benjamin Ogles and Kyle Storey and S. Jacob Powell", title = "{JPF-HJ}: a Tool for Task Parallel Program Analysis", journal = j-SIGSOFT, volume = "44", number = "4", pages = "19--19", month = dec, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3364452.33644563", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:40 MDT 2021", bibsource = "http://www.math.utah.edu/pub/tex/bib/java2010.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3364452.33644563", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", }