The proceedings contain 75 papers. The topics discussed include: test scenario generation for reliability tactics from UML sequence diagram;test case prioritization based on information retrieval concepts;sat-based bo...
ISBN:
(纸本)9781479974252
The proceedings contain 75 papers. The topics discussed include: test scenario generation for reliability tactics from UML sequence diagram;test case prioritization based on information retrieval concepts;sat-based bounded software model checking for embedded software: a case study;model checking of software product lines in presence of nondeterminism and probabilities;traceability-driven system development and its application to automotive system development;improving fuzzy analogy based software development effort estimation;runtime verification by convergent formula progression;reducing false alarms from an industrial-strength static analyzer by SVM;a goal-oriented design methodology of IT-driven business architecture;SYNCEYE: an availability measurement tool for embedded systems;API document quality for resolving deprecated APIs;an empirical study on interaction factors influencing bug reopenings;and initial industrial experience of GQM-based product-focused project monitoring with trend patterns.
The proceedings contain 45 papers. The topics discussed include: optimization of multi-way clustering and retrieval using genetic algorithms in reusable class library;experiment of component-based software development...
ISBN:
(纸本)0818691832
The proceedings contain 45 papers. The topics discussed include: optimization of multi-way clustering and retrieval using genetic algorithms in reusable class library;experiment of component-based software development on multiple distributed object environments;an enhanced reflective architecture for adaptation of the object-oriented language/software;how to reconcile formal specifications and automatic programming: the Descartes system;automatically generating C++ programs from LOTOS behavior specifications;a refinement calculus for the development of real-time systems;a software metric combination model for software reuse;static and dynamic metrics for effective object clustering;on the danger of developing measures without clarifying concepts;a reuse case perspective on documenting frameworks;wwHww: an application framework of distributed systems for Enduser-initiative development;a comprehensive interface definition framework for software components;CTAG software generator model for constructing network applications;computer-assisted analysis and refinement of informal software requirements documents;and explicit representation of business policies.
The proceedings contain 146 papers. The topics discussed include: a context-based integrity framework;integration of safety verification with conformance testing in real-time reactive system;modular heap abstraction-b...
ISBN:
(纸本)9780769549224
The proceedings contain 146 papers. The topics discussed include: a context-based integrity framework;integration of safety verification with conformance testing in real-time reactive system;modular heap abstraction-based memory leak detection for heap-manipulating programs;a CSP-theoretic framework of checking conformance of business processes;applying recommendation systems for composing dynamic services for mobile devices;a preference and honesty aware trust model for web services;trust-based service composition and optimization;a trust impact analysis model for composite service evolution;modeling and verification of context-aware systems;the case for using simulation to validate event-B specifications;metrics for measuring the quality of modularization of scala systems;software quality construction: empirical study on the role of requirements, stakeholders and resources;and constructing traceability between features and requirements for software product line engineering.
The proceedings contain 146 papers. The topics discussed include: a context-based integrity framework;integration of safety verification with conformance testing in real-time reactive system;modular heap abstraction-b...
ISBN:
(纸本)9780769549224
The proceedings contain 146 papers. The topics discussed include: a context-based integrity framework;integration of safety verification with conformance testing in real-time reactive system;modular heap abstraction-based memory leak detection for heap-manipulating programs;a CSP-theoretic framework of checking conformance of business processes;applying recommendation systems for composing dynamic services for mobile devices;a preference and honesty aware trust model for web services;trust-based service composition and optimization;a trust impact analysis model for composite service evolution;modeling and verification of context-aware systems;the case for using simulation to validate event-B specifications;metrics for measuring the quality of modularization of scala systems;software quality construction: empirical study on the role of requirements, stakeholders and resources;and constructing traceability between features and requirements for software product line engineering.
The proceedings contain 71 papers. The topics discussed include: learn to align: a code alignment network for code clone detection;thread-sensitive data race detection for java;behavioral classification of android app...
ISBN:
(纸本)9781665437844
The proceedings contain 71 papers. The topics discussed include: learn to align: a code alignment network for code clone detection;thread-sensitive data race detection for java;behavioral classification of android applications using system calls;categorizing NPM packages by analyzing the text information in software repositories;tree-based mining of fine-grained code changes to detect unknown change patterns;effective bug triage based on a hybrid neural network;monitoring negative sentiment-related events in open source software projects;detecting duplicate questions in stack overflow via semantic and relevance approaches;design of software architecture for neural network cooperation: case of forgery detection;and data flow testing for PLC programs via dynamic symbolic execution.
The proceedings contain 64 papers. The topics discussed include: floating point accuracy testing in deep neural network computations via hypothesis testing;structural similarity of boundary conditions and an efficient...
ISBN:
(纸本)9781728195537
The proceedings contain 64 papers. The topics discussed include: floating point accuracy testing in deep neural network computations via hypothesis testing;structural similarity of boundary conditions and an efficient local search algorithm for goal conflict identification;DependLoc: a dependency-based framework for bug localization;asynchronous test equivalence for probabilistic processes;AI deployment architecture: multi-case study for key factor identification;a divide & conquer approach to testing concurrent programs with JPF;a generalized notion of non-interference for flow security of sequential and concurrent programs;an integrated framework for the formal analysis of critical interactive systems;a formal model for behavior trees based on context-free grammar;and an asset-based assistance for secure by design.
The proceedings contain 75 papers. The topics discussed include: aligning the map requirements modeling with the B-method for formal software development;using genetic algorithms to aid test-data generation for data-f...
详细信息
ISBN:
(纸本)0769530575
The proceedings contain 75 papers. The topics discussed include: aligning the map requirements modeling with the B-method for formal software development;using genetic algorithms to aid test-data generation for data-flow coverage;finding a test order using object-oriented slicing technique;function call flow based fitness function design in evolutionary testing;secure behavior of web browsers to prevent information leakages;realizability of collaboration-based service specifications;the validation and verification of WSCDL;a method for early requirements triage and selection utilizing product strategies;enterprise assets security requirements construction from ESRMG grammar based on security patterns;construction method of a high-order markov chain usage model;and field escape analysis for data confidentiality in java components.
The proceedings contain 58 papers. The topics discussed include: task recommendation with developer social network in software crowdsourcing;EXPSOL: recommending online threads for exception-related bug reports;retrie...
ISBN:
(纸本)9781509055753
The proceedings contain 58 papers. The topics discussed include: task recommendation with developer social network in software crowdsourcing;EXPSOL: recommending online threads for exception-related bug reports;retrieving design pattern usage examples using domain matching;LibSift: automated detection of third-party libraries in Android applications;does the role matter? an investigation of the code quality of casual contributors in GitHub;a model checking based approach for containment checking of UML sequence diagrams;model driven software security architecture of systems-of-systems;analytical study of cognitive layered approach for understanding security requirements using problem domain ontology;a map of threats to validity of systematic literature reviews in softwareengineering;heterogeneous cross-company effort estimation through transfer learning;an algorithmic-based change effort estimation model for software development;achieving high code coverage in Android UI testing via automated widget exercising;testing android apps via guided gesture event generation;model-based API-call constraint checking for automotive control software;and minimalist qualitative models for model checking cyber-physical feature coordination.
The proceedings contain 10 papers. The topics discussed include: introducing software system course to engineering undergraduate students - an experience report;mining and detecting bugs in introductory programs;teach...
The proceedings contain 10 papers. The topics discussed include: introducing software system course to engineering undergraduate students - an experience report;mining and detecting bugs in introductory programs;teaching softwareengineering virtually during COVID-19 pandemic era: lessons learned;the perceived effects of introducing coaching on the development of student’s soft skills managing software quality;applying softwareengineering to teach online project-based softwareengineering courses;report on the 9th international workshop on quantitative approaches to software quality (QuASoQ 2021);the impacts of requirements relationships knowledge on requirements quality and software development project success;and predicting requirements volatility: an industry case study.
The proceedings contain 82 papers. The topics discussed include: an approach for measuring software evolution using source code features;software development based on software pattern evolution;application of CBSE to ...
ISBN:
(纸本)0769505090
The proceedings contain 82 papers. The topics discussed include: an approach for measuring software evolution using source code features;software development based on software pattern evolution;application of CBSE to projects with evolving requirements - a lesson-learned;connector modeling method for component extraction;COMO: a UML-based component development methodology;development of an intelligent web interface to online library catalog databases;design of a framework for dynamic content adaptation to web-enabled terminals and enterprise applications;evaluation of process scheduling mechanism for a web server based on its behavior while executing;automatic selecting of required NetNews articles;a formal specification of the concurrency control in real-time databases;a visual programming method for developing sequence controller programs;a study of productivity and efficiency for object-oriented methods and languages;strongly formative pilot studies on constraints in early life-cycle work;a straightforward approach to effort estimation for updating programs in object-oriented prototyping development;inter-class test technique between black-box-class and white-box-class for component customization failures;an event, activity and process based methodology for requirements elicitation and its application to an educational information system;an integrated framework of supply chain management system;and a detecting and interpreting method of the inconsistency of software requirements specifications.
暂无评论