Different rules for proving properties have been studied for systems with different kinds of fairness constraints, such as justice, compassion and strengthened compassion. This work(1) considers a kind of bounded fair...
详细信息
ISBN:
(纸本)9780769549224
Different rules for proving properties have been studied for systems with different kinds of fairness constraints, such as justice, compassion and strengthened compassion. This work(1) considers a kind of bounded fairness and propose a general form that includes these fairness constraints. The general form is referred to as mixed-fairness (m-fairness for short). A deductive rule for proving liveness properties under m-fairness is presented with examples illustrating the application of the deductive rule.
Context: Although the security of software development has been extensively studied, it has little empirical knowledge about the security aspect during software development. And also Problem Frames provides a systemat...
详细信息
ISBN:
(纸本)9781538626498
Context: Although the security of software development has been extensively studied, it has little empirical knowledge about the security aspect during software development. And also Problem Frames provides a systematic way for analysing requirement, but it also lacks empirical evidence. Objectives: In order to design security enhancement pattern for system, we combined security concerns with problem frames. Method: We performed a comprehensive mapping study to extract the security indexes and security concerns from the categorized papers. Results: We identified 406 candidate papers, of these, 184 articles generated security indexes, and 18 articles generated security concerns. According to the meaning of each security index, we matched security concerns for them. Furthermore, security concerns are applied to the domain of the problem frames. Conclusions: Through applying a mapping study, we extracted 3 security indexes and 4 security concerns. And we analysed how these concerns matched to the Problem Frames.
This paper is concerned with the risks associated with software development and with the range of factors that can impact on the quality of the project management process. The management goal is to mitigate these risk...
详细信息
ISBN:
(纸本)0769509169
This paper is concerned with the risks associated with software development and with the range of factors that can impact on the quality of the project management process. The management goal is to mitigate these risks leaving the project plan as unperturbed as possible. To achieve this goal risk analysis must attempt to identify the high risk elements of the project, provide ways of documenting the impacts of risk mitigation strategies and review the risks on a continuing basis as the project proceeds. A model is proposed for such risk analysis and to demonstrate its realization in a risk management tool, ProRisk.
We compute optimal scheduling policies for software development projects. We use reinforcement learning as the optimization technique. Our approach is based on a formal, stochastic scheduling model that explicitly cap...
详细信息
ISBN:
(纸本)9780769546094
We compute optimal scheduling policies for software development projects. We use reinforcement learning as the optimization technique. Our approach is based on a formal, stochastic scheduling model that explicitly captures the strong feedback between the tasks in software development ("ripple effects"). For sample projects, we compute the optimal policy, simulate the project, and analyze the task assignments that are made by the optimal policy. We find that optimal policies typically assign tasks according to the past performance of the developers and the characteristics of the software design. In particular, we address the problem of when to schedule large or strongly coupled components. We also sketch approaches to the optimization of large projects.
The increasing demand for open source software in various fields of computer science is obvious. Many developers adopt open source software in their development process, organization culture, and products. Hence, ther...
详细信息
ISBN:
(纸本)9780769539096
The increasing demand for open source software in various fields of computer science is obvious. Many developers adopt open source software in their development process, organization culture, and products. Hence, there are many cases where developers who are new to open source software should maintain and continue to develop the software. This paper suggests a methodology to evaluate unseen organizational effort for open source software. It proposes ways to coordinate developers to maintain it.
software vulnerabilities are, often the outcome of poor programming practices in the software developmental process. Elimination of bugs increases the expenses of the software. Bugs are created during software develop...
详细信息
ISBN:
(纸本)9781665438131
software vulnerabilities are, often the outcome of poor programming practices in the software developmental process. Elimination of bugs increases the expenses of the software. Bugs are created during software development process by programmers. Mitigation of flawed code in the programs can be achieved by training programmers to adopt secure code practices. Therefore, identification of flawed code created by authors becomes critical. In this work, a novel network theoretic approach to understand the relationships between programmers and flawed code in open source software projects is created. Experiments are conducted on multiple open source software to evaluate and validate the connections with authors and flaws, using multiple metrics motivated by concepts from natural language processing.
Ethics is recognised as an important concern in the development and operation of software systems. While there are codes of ethics and sets of ethical principles available to software professionals, there is a lack of...
详细信息
ISBN:
(纸本)9781665455374
Ethics is recognised as an important concern in the development and operation of software systems. While there are codes of ethics and sets of ethical principles available to software professionals, there is a lack of tool and process support for systematic ethical deliberation at most stages of the software lifecycle. To create and deploy ethical software, it is vital that ethical concerns of software systems are reflected in their artefacts, such as requirements, software architecture, code and test suites, and that software professionals are supported in considering the ethical as well as technical consequences of their decisions. This paper reports on some early work in identifying the challenges of ethical decision making and opportunities for addressing these challenges in the context of softwareengineering.
In this paper, we propose a novel method to investigate relationship between the files that are committed together by applying advanced social network analysis to a "network" of source files that are committ...
详细信息
ISBN:
(纸本)9780769549224
In this paper, we propose a novel method to investigate relationship between the files that are committed together by applying advanced social network analysis to a "network" of source files that are committed together. The source files constitute the nodes of the network and an edge is created between files which are committed together in the same revision. We present our findings with recommendations on how mining revision histories from a social network analysis perspective can be used to build inferences on change propagation, evaluate impact analysis, and extract cross-programming-language relationships. We performed empirical analysis on revision histories of a well-known open-source web application testing system, 'Selenium' and results are reported.
ChatGPT presents emerging opportunities in software development, yet its capabilities for understanding code remain largely understudied. This study aims to focus on the logical aspect of code comprehension of ChatGPT...
详细信息
ISBN:
(纸本)9798350344172
ChatGPT presents emerging opportunities in software development, yet its capabilities for understanding code remain largely understudied. This study aims to focus on the logical aspect of code comprehension of ChatGPT by examining its performance in detecting and fixing bugs. Our preliminary results suggest that ChatGPT seems to correct code in a different way than human logical steps.
When supervising softwareengineering team projects, having all team members contribute actively to the project is often a challenge. Most often than not, there will be teams having some members with limited or no con...
详细信息
ISBN:
(纸本)9781509055753
When supervising softwareengineering team projects, having all team members contribute actively to the project is often a challenge. Most often than not, there will be teams having some members with limited or no contribution. Thus one of the key roles of a team leader and academic supervisor are to monitor who is contributing and who is falling behind. Assessing the progress information of each team member becomes vital. This is to introduce strategies that encourages ensure every member is contributing effectively and efficiently in a timely manner. This paper proposes a rubric solution that assesses the progress information of each team member and provides a formative performance feedback on how each member is contributing to the project. This will enable each team member to reflect on his or her performance, and hopefully self-regulate and put in the necessary contribution. At the same time, this will assist the team leader and academic supervisor in monitoring the team member.
暂无评论