Work is currently being undertaken under the auspices of the Association for Computing Machinery (A CM) and the Institute for Electrical and Electronic Engineers Computer Society (IEEE-CS) to produce the software Engi...
详细信息
ISBN:
(纸本)0769518508
Work is currently being undertaken under the auspices of the Association for Computing Machinery (A CM) and the Institute for Electrical and Electronic Engineers Computer Society (IEEE-CS) to produce the softwareengineering volume for the project known as Computing Curriculum 2001 (CC2001). The work undertaken to date is considered and details are presented of the approach that is being taken. Summaries are given of three major events that have been used to assist in the development and appraisal of the work: a workshop at the Fifteenth conference on softwareengineering Education and Training (CSEE&T 2002), an International Summit on softwareengineering Education (SSEE) which was colocated with the 24th IEEE-CS/ACM International conference on softwareengineering (ICSE2002), and a workshop held in Chicago in May 2002. Finally an appraisal regarding progress and what still needs to be addressed is given in terms of the principles defined for the project.
Event-B requires engineers to satisfy proof obligations and inherit all predicates from abstract models while constructing concrete ones. Engineers typically derive predicates from abstract models through transformati...
详细信息
ISBN:
(纸本)9781538636817
Event-B requires engineers to satisfy proof obligations and inherit all predicates from abstract models while constructing concrete ones. Engineers typically derive predicates from abstract models through transformation with the intention of gradually refining the models. These kinds of intentions for refinement are essential for other engineers to understand the refinements. However, these are implicit and not directly specified in the models. Therefore, it is difficult to understand how each predicate in concrete models is obtained from the predicates in abstract models. This paper proposes an effective method of extracting these relationships. Our approach uses heuristics to avoid exhaustive matching between predicates. It tries to find a set of related predicates by tracing elements, such as variables and constants in predicates, and excluding predicates that use common variables, but differently. Our method facilitates understanding of the intentions of refinements and can be used to help reverse engineering by clarifying the relationships between predicates through refinements.
With the increasing complexity and uncertainty in requirements engineering (RE), the impact of power relationships between stakeholders becomes critical to the success of requirements engineering process, especially i...
详细信息
ISBN:
(纸本)9781479921430
With the increasing complexity and uncertainty in requirements engineering (RE), the impact of power relationships between stakeholders becomes critical to the success of requirements engineering process, especially in requirements negotiation to resolve conflicting requirements. In this paper, we make use of the basic principles of requirements negotiation and define reasoning rules to reason about stakeholder groups for requirements negotiation, based on an extended i* modeling framework that represents the power relationships between stakeholders in RE. We derive decision-makers and supporter groups of conflicting requirements using the reasoning rules based on power relationships between stakeholders, and further reason about representative stakeholders from the supporter groups to participate in requirements negotiation activity. We describe the reasoning process and provide a concrete case of reasoning about stakeholder groups for requirements negotiation based on the extended i* model.
Code clones (duplicated source code in a software system) are one of the major factors in decreasing maintainability. Many code clone detection methods have been proposed to find code clones automatically from large-s...
详细信息
ISBN:
(纸本)9780769539096
Code clones (duplicated source code in a software system) are one of the major factors in decreasing maintainability. Many code clone detection methods have been proposed to find code clones automatically from large-scale software. However, it is still hard to find harmful code clones to improve maintainability because there are many code clones that should remain. Thus, to help find harmful code clones, we propose a code clone visualization method and a metrics application on the visualized information. Our method enables the location of harmful code clones diffused in a software system. We apply our method to three open source software programs and visualize their code clone information.
Process algebras like Timed CSP offer a convenient level of abstraction for the specification and verification of distributed embedded real-time systems. Complex systems can be specified in terms of interacting module...
详细信息
ISBN:
(纸本)9780769546094
Process algebras like Timed CSP offer a convenient level of abstraction for the specification and verification of distributed embedded real-time systems. Complex systems can be specified in terms of interacting modules whose interaction can be analyzed using the mechanisms of the process algebra. In this paper, we present a development approach that supports the construction of distributed real-time systems by exploiting Timed CSP's concept of modularity. Individual system components are refined to their low-level implementations and shown to be a formally correct implementation of their respective Timed CSP specifications. Their interaction can then be analyzed by composing the individual process specifications. The key idea underlying the presented approach is a formal relation between timed process algebraic specifications and implementations given in a general purpose programming language.
The aim of our research is to empirically analyze the impact of requirements traceability quality to the productivity of the enterprise applications development. We analyze traceability links of Requirements Specifica...
详细信息
ISBN:
(纸本)9780769549224
The aim of our research is to empirically analyze the impact of requirements traceability quality to the productivity of the enterprise applications development. We analyze traceability links of Requirements Specification Documents (RSDs) collected from the enterprise applications development. These RSDs are classified into two groups in terms of project performance. One group includes RSDs of significant cost overrun projects;another group includes RSDs of normal range cost projects. Our analysis revealed that high quality of traceability in RSDs significantly reduces the cost overrun in the enterprise applications development.
Feature location is the activity of identifying an initial location in the source code that implements special functionality in a software system. Existing techniques for feature location broadly fall into three categ...
详细信息
ISBN:
(纸本)9780769549224
Feature location is the activity of identifying an initial location in the source code that implements special functionality in a software system. Existing techniques for feature location broadly fall into three categories, based on the type of information they use: text, static, and dynamic. The techniques based on dynamic may generate large amount of data and is difficult to utilize. This paper presents a method combing the text and static techniques. A feature location technique based on topic modeling is introduced, and the topic cohesion and coupling is computed by software dependency network to improve the effects of feature location. When the topic cohesion degree is low and topic coupling degree is high, software dependency network is used to find additional candidate program elements. This method is empirically evaluated through several experiments. Experimental results show that the topic modeling based feature location improves the effectiveness of feature location when compared with other techniques.
Since IT systems are used to support business strategies of an organisation, strategic business requirements therefore are the motivation of the majority the requirements engineering approaches. But current requiremen...
详细信息
ISBN:
(纸本)9780769549224
Since IT systems are used to support business strategies of an organisation, strategic business requirements therefore are the motivation of the majority the requirements engineering approaches. But current requirements engineering approaches do not capture strategic business requirements but rather focus on functional and non-functional types of requirements. In this exploratory study two groups of business analysts explored requirements from a business scenario where different stakeholder views were given. A number of views represented the viewpoints of top management and the other views represented the viewpoints of operational level staff of the organisation. The collected data showed that the requirements captured from top management are different from the requirements captured from operational level staff in a way that strategic business requirements refer to the future direction of the organisation, however the requirements captured from operational level staff are about functionality and constraints of the system. The results indicate that strategic business requirements are associated to the top management and to capture them, business analysts have to pursue top management of the organsation.
The using of multiple custom class loaders in component-based Java programs may lead to more runtime type errors. These errors can happen at various program statements and may be wrapped in different types of exceptio...
详细信息
ISBN:
(纸本)9780769549224
The using of multiple custom class loaders in component-based Java programs may lead to more runtime type errors. These errors can happen at various program statements and may be wrapped in different types of exceptions by JVM, therefore posing difficulties for dealing with them. Traditional static analysis approaches only consider static types and thus cannot detect many of them. We propose a semi-static approach based on points-to analysis and dynamically gathered behavior information of Java class loaders to detect runtime type errors in component-based Java programs without running them. We also implement a prototype tool for OSGi-based programs, where OSGi is a typical Java component framework.
In this paper we present a pattern-based software development process using problem frames and corresponding architectural patterns. In decomposing a complex problem into simple subproblems, the relationships between ...
详细信息
ISBN:
(纸本)9780769526850
In this paper we present a pattern-based software development process using problem frames and corresponding architectural patterns. In decomposing a complex problem into simple subproblems, the relationships between the subproblems are recorded explicitly. Based on this information, we give guidelines on how to derive the software architecture for the overall problem from the software architectures of the simple subproblems.
暂无评论