Refactoring, the process of improving the design of existing code by changing its internal structure without affecting its external behavior, tends to improve soft-ware quality by improving design, improving readabili...
详细信息
ISBN:
(纸本)9780769539096
Refactoring, the process of improving the design of existing code by changing its internal structure without affecting its external behavior, tends to improve soft-ware quality by improving design, improving readability, and reducing bugs. There are many different refactoring methods, each having a particular purpose and effect. Consequently, the effect of refactorings on software quality attribute may vary. software testing is an external software quality attributes that takes lots of time and effort to make sure that the software performs as intended. In this paper, we propose a classification of refactoring methods based on their measurable effect on software testing effort. This, in turn, helps the software developers decide which refactoring methods to apply in order to optimize a software system with regard to the testing effort.
The monitoring and control software is one of the most important parts of substation automation system. With the rapid development of substation automation system, a main tendency of the monitoring and control softwar...
详细信息
ISBN:
(纸本)9781424448135
The monitoring and control software is one of the most important parts of substation automation system. With the rapid development of substation automation system, a main tendency of the monitoring and control software is to be supportive of the network architecture and to have powerful functions of configuration and real-time performance. The gross structure of SCADA system in substation is introduced in this paper, the entirety design of the configuration monitor software is also discussed, and the key technologies of the configuration software for substation monitoring and control is described. The reliability of this software is very good, and this software can also offer the human-computer interaction interface, So this software has better monitoring effect.
A feature-oriented approach has been used extensively in product line engineering, as it provides an effective way of identifying variabilities among products. However, incorporating feature variations into product li...
详细信息
ISBN:
(纸本)0769522459
A feature-oriented approach has been used extensively in product line engineering, as it provides an effective way of identifying variabilities among products. However, incorporating feature variations into product line assets is still a difficult undertaking, as effects of a feature variation may affect a large part of product line assets. In this position paper, I propose an approach of feature-oriented analysis and aspect-oriented component development, which can improve reusability and adaptability of product line assets as well as traceability from requirements to design.
Open Source software is widely used from endusers, software engineers and researchers. The license that accompanies such software is very important for its further use and distribution. However, engineers and research...
详细信息
ISBN:
(纸本)9781509055753
Open Source software is widely used from endusers, software engineers and researchers. The license that accompanies such software is very important for its further use and distribution. However, engineers and researchers are many times not able to choose the appropriate license based on the purpose of the product under development due to the lack of sufficient information on the specifics of each license. In this work, we are addressing the above issue by introducing findOSSLicense that recommends appropriate licenses to users. We are employing a hybrid recommendation using constraintbased, content-based and collaborative approaches. Licenses are recommended based on user needs, on the licenses found in similar open source projects and on the licenses used by similar users. A three-phase process that considers different sources of information is used. We have evaluated findOSSLicense using its initial set of users. The results demonstrate the usefulness of findOSSLicense in the license guiding process.
Design patterns are an invaluable resource for developers. Yet, for some of them the implementation of an application concern and the code needed to enforce the design pattern solution can be tangled within the same c...
详细信息
ISBN:
(纸本)9780769546094
Design patterns are an invaluable resource for developers. Yet, for some of them the implementation of an application concern and the code needed to enforce the design pattern solution can be tangled within the same class. This potentially makes classes more complex, more prone to changes and less reusable. In order to keep the complexity of classes under manageable levels, this paper proposes a solution based on aspectorientation. Our solution makes aspects and application classes independent of each other, while connecting code is used to concisely express the role played by classes within design patterns. Developers needing to modify the role of an application class should only update such connecting code, thus keeping changes to application code to a minimum. The performance overhead of such an approach is evaluated and compared with the standard implementation.
This paper investigates the relationship between the use of predicate-based and statement-based program spectra for bug localization. Branch and path spectra are also considered. Although statement and predicate spect...
详细信息
ISBN:
(纸本)9780769542669
This paper investigates the relationship between the use of predicate-based and statement-based program spectra for bug localization. Branch and path spectra are also considered. Although statement and predicate spectra can be based on the same raw data, the way the data is aggregated results in different information being lost. We propose a simple and cheap modification to the statement-based approach which retains strictly more information. This allows us to compare statement and predicate "metrics" (functions used to rank the statements, predicates or paths). We show that improved bug localization performance is possible using single-bug models and benchmarks.
Code-based metrics and network analysis based metrics are widely used to predict defects in software. However, their effectiveness in predicting bugs either individually or together is still actively researched. In th...
详细信息
ISBN:
(纸本)9781479921430
Code-based metrics and network analysis based metrics are widely used to predict defects in software. However, their effectiveness in predicting bugs either individually or together is still actively researched. In this paper, we evaluate the performance of these metrics using three different techniques, namely, Logistic regression, Support vector machines and Random forests. We analysed the performance of these techniques under three different scenarios on a large dataset. The results show that code metrics outperform network metrics and also no considerable advantage in using both of them together. Further, an analysis on the influence of individual metrics for prediction of bugs shows that network metrics (except out-degree) are uninfluential.
Architecture frameworks are methods used in architecture modeling. They provide a structured and systematic approach to designing systems. To date there has been little analysis on their roles in system and software e...
详细信息
ISBN:
(纸本)0769522459
Architecture frameworks are methods used in architecture modeling. They provide a structured and systematic approach to designing systems. To date there has been little analysis on their roles in system and softwareengineering and if they are satisfactory. This study provides a model of understanding through analyzing the goals, inputs and outcomes of six Architecture Frameworks. It characterizes two classes of architecture frameworks and identifies some of their deficiencies. To overcome these deficiencies, we propose to use costs, benefits and risks for architecture analysis. We also propose a method to delineate architecture activities from detailed design activities.
In this paper, we tackle the problem of conformance checking which verifies if the event logs (observed) match/fit the reference (arbitrary) process. We use concepts from Communicating Sequential Processes (CSP), whic...
详细信息
ISBN:
(纸本)9780769549224
In this paper, we tackle the problem of conformance checking which verifies if the event logs (observed) match/fit the reference (arbitrary) process. We use concepts from Communicating Sequential Processes (CSP), which facilitates automated analysis using PAT toolkit. By this technique one can identify all the logs which cannot be properly replayed on the process. We illustrate our approach with an example. Finally, we introduce some metrics based on conformance checking. They are related to fitness, closeness, and appropriateness of the event logs vis-a-vis reference process models.
We present a model- and pattern-based method that allows software engineers to take quality requirements into account right from the beginning of the software development process. The method comprises requirements ana...
详细信息
ISBN:
(纸本)9780769546094
We present a model- and pattern-based method that allows software engineers to take quality requirements into account right from the beginning of the software development process. The method comprises requirements analysis as well as the derivation of a software architecture from requirements documents, in which quality requirements are reflected explicitly. For requirements analysis, we use an enhancement of the problem frame approach, where software development problems are represented by problem diagrams. The derivation of a software architecture starts from a set of problem diagrams, annotated with functional as well as quality requirements. First, we set up an initial software architecture, taking into account the decomposition of the overall software development problem into subproblems. Then, we incorporate quality requirements into that architecture by using security or performance patterns or mechanisms. The method is tool-supported, which allows developers to check semantic integrity conditions in the different models.
暂无评论