Model-driven approaches to softwareengineering have expanded their influence in recent years, with Object Management Group's Model-Driven Architecture (MDA) being the major force behind this boost. However, despi...
详细信息
ISBN:
(纸本)9780769530574
Model-driven approaches to softwareengineering have expanded their influence in recent years, with Object Management Group's Model-Driven Architecture (MDA) being the major force behind this boost. However, despite its merits, MDA remains insufficient for software system development, in the sense that it does not provide a concrete and comprehensive process for governing software development activities. There is there re a strongly felt need for new model-driven software development methodologies. In this paper we review a number of existing model-driven methodologies, and propose a general framework for Model-Driven Development (MDD) based on AMA. The framework can be used for assessing and comparing methodologies, engineering new methodologies, and adapting existing ones so that they meet the special requirements of the model-driven approach. We have used the framework herein to show how agile methodologies fare in this model-driven development context.
It is useful if a bug tracking system can detect bug report duplication with unfinished bug reports. To investigate the feasibility, we study relations between accuracy of duplicate bug report detection using features...
详细信息
ISBN:
(纸本)9781467396448
It is useful if a bug tracking system can detect bug report duplication with unfinished bug reports. To investigate the feasibility, we study relations between accuracy of duplicate bug report detection using features extracted from textual information in bug reports and the number of words in bug reports in this paper. The results show that increasing the number of words to be used in duplicate detection over a certain number does not affect the accuracy very much. The results also indicate that we had better use about 100 and 80 words in Eclipse and OpenOffice, respectively, in the detection because we may have many wrong candidates of duplication if we use words of more than the numbers. We thus think that detecting bug duplication in writing a new bug report has potential of giving duplicate bug report candidates.
Dependency resolution (DR) uses a component's explicitly declared requirements to calculate systems where all dependencies are satisfied. There can be many configurations to choose from when resolving dependencies...
详细信息
ISBN:
(纸本)9780769542669
Dependency resolution (DR) uses a component's explicitly declared requirements to calculate systems where all dependencies are satisfied. There can be many configurations to choose from when resolving dependencies. DR should aim to identify and return an optimal component configuration. This becomes a significant challenge when diverse and sometimes conflicting criteria such as user preferences, contextual constraints and functional requirements must be considered. In this paper we present a framework in which to represent and compose such criteria. This is achieved by defining criteria as ranking systems over complete lattices and composing them in different ways. We present a depth first branch and bound algorithm for this framework, and an example problem that demonstrates the frameworks application. The presented framework will enable the formal definition and composition of criteria to optimise dependency resolution.
Message-passing interface (MPI) programs are non-deterministic and challenging to ensure correctness. The introduction of one-sided communications makes the problem of non-determinism more severe for MPI programs. Thi...
详细信息
ISBN:
(纸本)9798350344172
Message-passing interface (MPI) programs are non-deterministic and challenging to ensure correctness. The introduction of one-sided communications makes the problem of non-determinism more severe for MPI programs. This paper reports our in-progress work of symbolic execution for the MPI programs with one-sided communications. Our approach can cover the non-determinism caused by the inputs, one-sided communication, and message-passing operations of MPI programs. The preliminary evaluation's results indicate the promising of our approach.
Background: researchers have a limited understanding of how practitioners conceive of and use evidence. Objective: to investigate how to automatically identify practitioner arguments and evidence in a corpus of practi...
详细信息
ISBN:
(纸本)9781509055753
Background: researchers have a limited understanding of how practitioners conceive of and use evidence. Objective: to investigate how to automatically identify practitioner arguments and evidence in a corpus of practitioner documents, and identify insights for further work. Method: we develop, apply and evaluate a preliminary process to identify practitioner arguments and factual stories, based on the presence of specific words, using a sample of 1,022 blog posts from a software practitioner's blog. Results: we identify unanswered questions relating to the process: selecting and scraping data, cleansing data, parsing components of arguments and stories, selecting the 'right' cases, and validating and interpreting the results. Conclusion: our work provides a foundation for more substantive research on identifying practitioners' evidence and arguments that, in turn, can support research in other areas e.g. evidence informed software practice.
Aspect-oriented approaches have resulted in a great impact on the processing of system properties during the development of software systems. However, a systematic way for eliciting early aspects from requirements is ...
详细信息
ISBN:
(纸本)9780769549224
Aspect-oriented approaches have resulted in a great impact on the processing of system properties during the development of software systems. However, a systematic way for eliciting early aspects from requirements is still underdeveloped to better integrate early aspects with the analysis results. As an attempt towards the investigation of the interactions among goals, scenarios, and early aspects, we proposed, in this work, a goal-driven approach to the discovery of early aspects by means of a bidding process that organizes goals into goal clusters for discovering aspectual candidates by exploring the interactions among goals and use cases. By introducing early aspects, the goal-driven approach can be further enhanced to deal with the crosscutting properties in the analysis stage of software development. The proposed approach is illustrated using the problem domains of meeting scheduler system.
To deliver a business information system, it is necessary to not only verify the system, but also validate the system in order to assure the system can provide the business value which the users expect. However, conve...
详细信息
ISBN:
(纸本)9781479921430
To deliver a business information system, it is necessary to not only verify the system, but also validate the system in order to assure the system can provide the business value which the users expect. However, conventional acceptance testing only confirms that the system meets the requirements specifications. Therefore, it is difficult to detect lack of user requirements. This article proposes business-driven acceptance testing methodology in order to validate the system by confirming the system meets the users' business requirements. We explain the testing process, test case selection technique, test scenario design method, and discuss the experiences in the application of the proposed method to a large-scale human resource management system shared by multiple ministries and agencies of Japanese government.
Embedded control programs are hard to analyse because their behaviour depends on how they interact with hardware devices. In particular, embedded code typically uses interrupts to respond to external events in a timel...
详细信息
ISBN:
(纸本)0769524656
Embedded control programs are hard to analyse because their behaviour depends on how they interact with hardware devices. In particular, embedded code typically uses interrupts to respond to external events in a timely manner Such asynchronous control constructs make static analysis difficult due to the potentially large number of alternative control-flow paths they allow. We show how model checking can be used to effectively analyse the behaviour of interrupt-dependent programs. This is done by developing an abstraction of the code that captures its essential timing and functional properties, including those related to external interrupts. The model is made efficient by grouping program instructions into basic blocks whose behaviour is atomic with respect to interrupts.
Legacy systems pose significant challenges to companies. software modernization approaches have been proposed to address this issue. However, a lack of standardization and reliance on ad hoc processes often lead to so...
详细信息
ISBN:
(纸本)9798350344172
Legacy systems pose significant challenges to companies. software modernization approaches have been proposed to address this issue. However, a lack of standardization and reliance on ad hoc processes often lead to software modernization failures. Incremental modernization, a strategy that improves software systems in a step-by-step manner rather than attempting to simultaneously overhaul the entire system, aims to mitigate the risk of failure. However, this approach can increase costs owing to the complexity of integrating legacy and modernized products. In this paper, we present a case study that employs a cost-benefit estimation analysis in a large-scale industrial project that underwent incremental modernization in the past. We compare the actual and estimated cost-benefit values in the context of incremental modernization. As a result, we confirmed that the cost estimates were valid, but we could not judge whether the benefit estimates were valid.
The purpose of this study is to analyze the reliability growth of Open Source software (OSS) versus software developed in-house (i.e. Closed Source software, CSS) using software Reliability Growth Model. This study us...
详细信息
ISBN:
(纸本)9780769549224
The purpose of this study is to analyze the reliability growth of Open Source software (OSS) versus software developed in-house (i.e. Closed Source software, CSS) using software Reliability Growth Model. This study uses 22 datasets containing failure data of CSS and 18 datasets containing defect data of OSS projects. The failure data are modelled by eight SRGM (Musa Okumoto, Inflection S-Shaped, Goel Okumoto, Delayed S-Shaped, Logistic, Gompertz, Yamada Exponential, and Generalized Goel Model). These models are chosen due to their widespread use. The results can be summarized as follows All selected SRGM fit to defect data of the OSS projects in the same manner as that of CSS. OSS reliability grows similarly to that of CSS. Musa Okumoto and Inflection S-Shaped perform well for CSS, while for OSS Inflection S-Shaped and Gompertz are good performers. SRGM can be used for reliability characterization of OSS projects.
暂无评论