Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMay 2014
Socio-technical coordination (keynote)
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPage 1https://doi.org/10.1145/2591062.2600729Product architecture structures the coordination problem that the development organization must solve. The modularity strategy establishes design rules that fix module functionality and interfaces, and assigns development work for each module to a ...
- ArticleMay 2014
Exploiting undefined behaviors for efficient symbolic execution
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 727–729https://doi.org/10.1145/2591062.2594450Symbolic execution is an important and popular technique used in several software engineering tools for test case generation, debugging and program analysis. As such improving the performance of symbolic execution can have huge impact on the ...
- ArticleMay 2014
Analyzing software data: after the gold rush (a goldfish-bowl panel)
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 103–104https://doi.org/10.1145/2591062.2594395Over the past few years, the volume and types of data related to software engineering has grown at an unprecedented rate and shows no sign of slowing. This turn of events has led to a veritable gold rush, as researchers attempt to mine raw data and ...
- ArticleMay 2014
Privacy and security requirements framework for the internet of things (IoT)
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 739–741https://doi.org/10.1145/2591062.2591201Capturing privacy and security requirements in the very early stages is essential for creating sufficient public confidence in order to facilitate the adaption of novel systems such as the Internet of Things (IoT). However, traditional requirements ...
- ArticleMay 2014
Identifying caching opportunities, effortlessly
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 730–732https://doi.org/10.1145/2591062.2591198Memory consumption is a great concern for most non trivial software. In this paper we introduce a dedicated code profiler that identifies opportunities to reduce memory consumption by introducing caches.
-
- ArticleMay 2014
Incremental reachability checking of KernelC programs using matching logic
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 724–726https://doi.org/10.1145/2591062.2591197A fundamental phase in software development deals with verifying that software behaves correctly. Although accurate testing can discover many wrong behaviours, formal software verification techniques can help in developing applications that dependably ...
- ArticleMay 2014
Tracking requirements evolution by using issue tickets: a case study of a document management and approval system
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 245–254https://doi.org/10.1145/2591062.2591194Requirements evolve throughout the software life-cycle. When requirements change, requirements engineers must determine what software artifacts could be affected. The history of and rationale for requirements evolution provides engineers some ...
- ArticleMay 2014
Deriving requirements model from textual use cases
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 235–244https://doi.org/10.1145/2591062.2591193In this paper, we present an approach to derive structured requirements models from textual use case requirements in the form of process diagrams and ontology using methods based on computational linguistics. These proposed requirements models are ...
- ArticleMay 2014
Software feature location in practice: debugging aircraft simulation systems
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 225–234https://doi.org/10.1145/2591062.2591192In this paper, we report on a study that we have conducted at CAE, one of the largest civil aircraft simulation companies in the world, in which we have developed a feature location approach to help software engineers debug simulation scenarios. A ...
- ArticleMay 2014
Configurations everywhere: implications for testing and debugging in practice
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 215–224https://doi.org/10.1145/2591062.2591191Many industrial systems are highly-configurable, complicating the testing and debugging process. While researchers have developed techniques to statically extract, quantify and manipulate the valid system configurations, we conjecture that many of ...
- ArticleMay 2014
Empirical insights into the perceived benefits of agile software engineering practices: a case study from SAP
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 84–92https://doi.org/10.1145/2591062.2591189SAP AG has taught more than 4,000 developers the Agile Software Engineering methodology since 2010. As such, the company offers a unique setting to study its impact on developers' work. In this paper, we discuss how developers perceive the impact of ...
- ArticleMay 2014
Automated software integration flows in industry: a multiple-case study
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 54–63https://doi.org/10.1145/2591062.2591186There is a steadily increasing interest in the agile practice of continuous integration. Consequently, there is great diversity in how it is interpreted and implemented, and a need to study, document and analyze how automated software integration flows ...
- ArticleMay 2014
Architectural dependency analysis to understand rework costs for safety-critical systems
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 185–194https://doi.org/10.1145/2591062.2591185To minimize testing and technology upgrade costs for safety-critical systems, a thorough understanding and analysis of architectural dependencies is essential. Unmanaged dependencies create cost overruns and degraded qualities in systems. Architecture ...
- ArticleMay 2014
A candid industrial evaluation of formal software verification using model checking
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 175–184https://doi.org/10.1145/2591062.2591184Model checking is a powerful formal analytical approach to verifying software and hardware systems. However, general industrial adoption is far from widespread. Some difficulties include the inaccessibility of techniques and tools and the need for ...
- ArticleMay 2014
A systematic approach to transforming system requirements into model checking specifications
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 165–174https://doi.org/10.1145/2591062.2591183We propose a method that addresses the following dilemma: model checking can formally expose off-nominal behaviors and unintended scenarios in the requirements of concurrent reactive systems. Requirements engineers and non-technical stakeholders who ...
- ArticleMay 2014
Collecting and leveraging a benchmark of build system clones to aid in quality assessments
- Shane McIntosh,
- Martin Poehlmann,
- Elmar Juergens,
- Audris Mockus,
- Bram Adams,
- Ahmed E. Hassan,
- Brigitte Haupt,
- Christian Wagner
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 145–154https://doi.org/10.1145/2591062.2591181Build systems specify how sources are transformed into deliverables, and hence must be carefully maintained to ensure that deliverables are assembled correctly. Similar to source code, build systems tend to grow in complexity unless specifications are ...
- ArticleMay 2014
Assessing model-based testing: an empirical study conducted in industry
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 135–144https://doi.org/10.1145/2591062.2591180We compare manual testing without any automation performed by a tester at a software company with model-based testing (MBT) performed by a tester at a research center.
The system under test (SUT), of which two different versions were tested by each ...
- ArticleMay 2014
A case study on testing, commissioning, and operation of very-large-scale software systems
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 125–134https://doi.org/10.1145/2591062.2591179An increasing number of software systems today are very-large-scale software systems (VLSS) with system-of-systems (SoS) architectures. Due to their heterogeneity and complexity VLSS are difficult to understand and analyze, which results in various ...
- ArticleMay 2014
Objective safety compliance checks for source code
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 115–124https://doi.org/10.1145/2591062.2591178Safety standards such as IEC 61508 are an important instrument for developing safety-critical systems. They provide requirements and recommendations to assist engineers in system and software development. Nevertheless, applying this standard in ...
- ArticleMay 2014
Nondeterminism in MapReduce considered harmful? an empirical study on non-commutative aggregators in MapReduce programs
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 44–53https://doi.org/10.1145/2591062.2591177The simplicity of MapReduce introduces unique subtleties that cause hard-to-detect bugs; in particular, the unfixed order of reduce function input is a source of nondeterminism that is harmful if the reduce function is not commutative and sensitive to ...