Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMay 2009
SemDiff: Analysis and recommendation support for API evolution
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 599–602https://doi.org/10.1109/ICSE.2009.5070565As a framework evolves, changes in its Application Programming Interface (API) can break client programs that extend the framework. Repairing a client program can be a challenging task because developers need to understand the context surrounding the ...
- ArticleMay 2009
Ævol: A tool for defining and planning architecture evolution
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 591–594https://doi.org/10.1109/ICSE.2009.5070563Architecture evolution is a key feature of most software systems. There are few tools that help architects plan and execute these evolutionary paths. We demonstrate a tool to enable architects to describe evolution paths, associate properties with ...
- ArticleMay 2009
Alitheia Core: An extensible software quality monitoring platform
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 579–582https://doi.org/10.1109/ICSE.2009.5070560Research in the fields of software quality and maintainability requires the analysis of large quantities of data, which often originate from open source software projects. Pre-processing data, calculating metrics, and synthesizing composite results from ...
- ArticleMay 2009
How to avoid drastic software process change (using stochastic stability)
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 540–550https://doi.org/10.1109/ICSE.2009.5070552Before performing drastic changes to a project, it is worthwhile to thoroughly explore the available options within the current structure of a project. An alternative to drastic change are internal changes that adjust current options within a software ...
- ArticleMay 2009
The impact of process choice in high maturity environments: An empirical analysis
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 529–539https://doi.org/10.1109/ICSE.2009.5070551We present the results of a three year field study of the software development process choices made by project teams at two leading offshore vendors. In particular, we focus on the performance implications of project teams that chose to augment ...
-
- ArticleMay 2009
Maintaining and evolving GUI-directed test scripts
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 408–418https://doi.org/10.1109/ICSE.2009.5070540Since manual black-box testing of GUI-based APplications (GAPs) is tedious and laborious, test engineers create test scripts to automate the testing process. These test scripts interact with GAPs by performing actions on their GUI objects. An extra ...
- ArticleMay 2009
The secret life of bugs: Going past the errors and omissions in software repositories
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 298–308https://doi.org/10.1109/ICSE.2009.5070530Every bug has a story behind it. The people that discover and resolve it need to coordinate, to get information from documents, tools, or other people, and to navigate through issues of accountability, ownership, and organizational structure. This paper ...
- ArticleMay 2009
How we refactor, and how we know it
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 287–297https://doi.org/10.1109/ICSE.2009.5070529Much of what we know about how programmers refactor in the wild is based on studies that examine just a few software projects. Researchers have rarely taken the time to replicate these studies in other contexts or to examine the assumptions on which ...
- ArticleMay 2009
Complete and accurate clone detection in graph-based models
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 276–286https://doi.org/10.1109/ICSE.2009.5070528Model-Driven Engineering (MDE) has become an important development framework for many large-scale software. Previous research has reported that as in traditional code-based development, cloning also occurs in MDE. However, there has been little work on ...
- ArticleMay 2009
Learning operational requirements from goal models
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 265–275https://doi.org/10.1109/ICSE.2009.5070527Goal-oriented methods have increasingly been recognised as an effective means for eliciting, elaborating, analysing and specifying software requirements. A key activity in these approaches is the elaboration of a correct and complete set of opertional ...
- ArticleMay 2009
Reasoning about edits to feature models
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 254–264https://doi.org/10.1109/ICSE.2009.5070526Features express the variabilities and commonalities among programs in a software product line (SPL). A feature model defines the valid combinations of features, where each combination corresponds to a program in an SPL. SPLs and their feature models ...
- ArticleMay 2009
Automatically capturing source code context of NL-queries for software maintenance and reuse
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 232–242https://doi.org/10.1109/ICSE.2009.5070524As software systems continue to grow and evolve, locating code for maintenance and reuse tasks becomes increasingly difficult. Existing static code search techniques using natural language queries provide little support to help developers determine ...
- ArticleMay 2009
Automatic creation of SQL Injection and cross-site scripting attacks
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 199–209https://doi.org/10.1109/ICSE.2009.5070521We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and cross-site scripting (XSS) attacks are widespread forms of attack in which the attacker crafts the input to the application to access or modify ...
- ArticleMay 2009
License integration patterns: Addressing license mismatches in component-based development
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 188–198https://doi.org/10.1109/ICSE.2009.5070520In this paper we address the problem of combining software components with different and possibly incompatible legal licenses to create a software application that does not violate any of these licenses while potentially having its own. We call this ...
- ArticleMay 2009
Model evolution by run-time parameter adaptation
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 111–121https://doi.org/10.1109/ICSE.2009.5070513Models can help software engineers to reason about design-time decisions before implementing a system. This paper focuses on models that deal with non-functional properties, such as reliability and performance. To build such models, one must rely on ...
- ArticleMay 2009
A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 89–99https://doi.org/10.1109/ICSE.2009.5070511Automated systems for measurement and analysis are not adopted on a large scale in companies, despite the opportunities they offer. The fear of the “Big Brother” and the lack of reports giving insights into the real adoption process and concrete usages ...
- ArticleMay 2009
Succession: Measuring transfer of code and developer productivity
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 67–77https://doi.org/10.1109/ICSE.2009.5070509Code ownership transfer or succession is a crucial ingredient in open source code reuse and in offshoring projects. Measuring succession can help understand factors that affect the success of such transfers and suggest ways to make them more efficient. ...
- ArticleMay 2009
Tesseract: Interactive visual exploration of socio-technical relationships in software development
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 23–33https://doi.org/10.1109/ICSE.2009.5070505Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these independently. Research on networks of technical artifacts focuses on ...
- ArticleMay 2009
How tagging helps bridge the gap between social and technical aspects in software development
ICSE '09: Proceedings of the 31st International Conference on Software EngineeringPages 12–22https://doi.org/10.1109/ICSE.2009.5070504Empirical research on collaborative software development practices indicates that technical and social aspects of software development are often intertwined. The processes followed are tacit and constantly evolving, thus not all of them are amenable to ...