Actionable code smell identification with fusion learning of metrics and semantics
Code smell detection is one of the essential tasks in the field of software engineering. Identifying whether a code snippet has a code smell is subjective and varies by programming language, developer, and development method. Moreover, developers ...
Highlights
- We provide a method to collect actionable code smells automatically.
- We propose a dual-stream model for detecting and identifying actionable code smells.
- We comprehensively evaluate our approach on the publicly available and ...
Exploring issues of story-based effort estimation in Agile Software Development (ASD)
- Muhammad Iqbal,
- Muhammad Ijaz,
- Tehseen Mazhar,
- Tariq Shahzad,
- Qamar Abbas,
- YazeedYasin Ghadi,
- Wasim Ahmad,
- Habib Hamam
Effort estimation based on user stories plays a pivotal role in agile software development, where accurate predictions of project efforts are vital for success. While various supervised ML tools attempt to estimate effort, the prevalence ...
Evaluating the effectiveness of size-limited execution trace with near-omniscient debugging
Debugging is an important task to identify the defects in the software. Especially, logging is an important feature of a software system to record runtime information. Detailed logging allows developers to collect run-time information when they ...
Highlights
- Effectiveness evaluation of near-omniscient debugging with 831 actual bugs.
- Keeping the majority of infected states.
- Predictable trace size from the number of methods.
- Reducing execution time significantly when all tests are ...
Toward a novel taxonomy to capture code smells caused by refactoring
- Investigate the associated risk of applying refactoring techniques and reveal the bad smells that may appear when fixing other bad smells.
- Conducted several controlled experiments to identify the smells that emerge after refactoring.
Code smells tend to have an impact on software quality attributes such as reusability, maintainability, and understandability. These are code flaws that do not necessarily prevent the system from operating; rather, they increase the possibility ...
S2O: A smart objects orchestrator framework based on the web of things
- The Web of Things is a new paradigm in which everyday objects are connected to the Internet using popular Web technologies. Connecting smart things in a network is not enough to create added value; it should be possible to compose these ...
The Web of Things (WoT) is a new paradigm in which everyday objects are connected to the Internet using popular Web technologies. The smart things are abstracted into RESTful Web services to facilitate their manipulation. The composition of these ...
Synthesizing LTL contracts from component libraries using rich counterexamples
We provide a method to synthesize an LTL Assume/Guarantee (A/G) specification, or contract, as an interconnection of elements from a library, each of which is also represented by an LTL A/G contract. Our approach, based on counterexample-guided ...
Highlights
- CEGIS is effectively used to synthesize LTL contract compositions from libraries.
- Rich counterexamples include topology details and traces generated by a model-checker.
- Synthesis is expedited by exploiting specific structures of ...
Implementing an environment for hybrid software evaluation
Quantum computing is a revolutionary paradigm in computer science based on the principles of quantum mechanics. It has the potential to solve problems that are currently unsolvable for classical computing. Applications of quantum computing ...
Agile effort estimation in Colombia: An assessment and opportunities for improvement
Effort estimation is fundamental for the development of software projects and critical to their success. The objective of this paper is to understand how Colombian agile practitioners perform effort estimates and to identify opportunities for ...
Out of step: Code clone detection for mobile apps across different language codebases
Clone detection provides insight about replicated fragments in a code base. With the rise of multi-language code bases, new techniques addressing cross-language code clone detection enable the analysis of polyglot systems. Such techniques have ...
PX-MBT: A framework for model-based player experience testing
- Saba Gholizadeh Ansari,
- I.S.W.B. Prasetya,
- Mehdi Dastani,
- Gabriele Keller,
- Davide Prandi,
- Fitsum Meshesha Kifetew,
- Frank Dignum
As video games become more complex and widespread, player experience (PX) testing becomes crucial in the game industry. Attracting and retaining players are key elements to guarantee the success of a game in the highly competitive market. ...
Toolkit for specification, validation and verification of social, legal, ethical, empathetic and cultural requirements for autonomous agents
A growing range of applications use AI and other autonomous agents to perform tasks that raise social, legal, ethical, empathetic, and cultural (SLEEC) concerns. To support a framework for the consideration of these concerns, we introduce SLEEC-...
Local deadlock analysis of Simulink models based on timed behavioural patterns and theorem proving
Compositional deadlock analysis of process networks is a well-known challenge. We propose a compositional deadlock analysis strategy for timed process networks, more specifically, those obtained from Simulink multi-rate block diagrams. We handle ...
Verifying safety of neural networks from topological perspectives
Neural networks (NNs) are increasingly applied in safety-critical systems such as autonomous vehicles. However, they are fragile and are often ill-behaved. Consequently, their behaviors should undergo rigorous guarantees before deployment in ...
Highlights
- To the best of our knowledge, this is the first work using topological properties of NNs to tackle the safety verification problems of neural networks.
- The proposed set-boundary based method controls the wrapping effect of existing ...
A pragma based C++ framework for hybrid quantum/classical computation
Quantum computers promise exponential speed ups over classical computers for various tasks. This emerging technology is expected to have its first huge impact in High Performance Computing (HPC), as it can solve problems beyond the reach of HPC. ...
Stark: A tool for the analysis of CPSs robustness
We present the Software Tool for the Analysis of Robustness in the unKnown environment (Stark), our Java tool for the specification, analysis and verification of robustness properties of Cyber-Physical Systems (CPSs). Stark includes: (i) a ...