作者:
Beaubrun, RonaldPierre, SamuelConan, JeanUniversité Laval
Department of Computer Science and Software Engineering Pavilion Adrien-Pouliot Québec QC G1K 7P4 Canada
Department of Computer Engineering Ecole Polytechnique of Montreal P.O. Box 6079 Station Centre-ville Montréal QC H3C 3A7 Canada
Future wireless networks are aimed at providing multimedia services to mobile users anywhere at anytime. Such networks are based on the Code Division Multiple Access (CDMA) technology to increase both data rates and n...
详细信息
ISBN:
(纸本)9781622763535
Future wireless networks are aimed at providing multimedia services to mobile users anywhere at anytime. Such networks are based on the Code Division Multiple Access (CDMA) technology to increase both data rates and number of connected mobile users in each cell. Taking into account the soft capacity of CDMA technology and the level of interference, this paper presents an evaluation of the real capacity of future wireless networks, in terms of the maximum number of mobile users that each cell can support without degradation of quality of service (QoS). Numerical results reveal that an increase in the traffic intensity requires an increase in the transmitted power in order to maintain good QoS. More specifically, results have shown that picocells need to develop less power than microcells or macrocells in order to maintain the same level of QoS. Also, it has been shown that the required minimum signal to interference ratio per user is higher for macrocells than for microcells or picocells.
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature lo...
详细信息
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature location in source code. Both techniques provide a set of ranked facts from the software, as result to the feature identification problem. One of the techniques is based on a scenario based probabilistic ranking of events observed while executing a program under given scenarios. The other technique is defined as an information retrieval task, based on the latent semantic indexing of the source code. We show the viability and effectiveness of the combined technique with two case studies. A first case study is a replication of feature identification in Mozilla, which allows us to directly compare the results with previously published data. The other case study is a bug location problem in Mozilla. The results show that the combined technique improves feature identification significantly with respect to each technique used independently
Open-source and industrial software systems often lack up-to-date documents on the implementation of user-observable functionalities. This lack of documents is particularly hindering for large systems. Moreover, as wi...
详细信息
ISBN:
(纸本)1595932437
Open-source and industrial software systems often lack up-to-date documents on the implementation of user-observable functionalities. This lack of documents is particularly hindering for large systems. Moreover, as with any other software artifacts, user-observable functionalities evolve through software evolution activities. Evolution activities sometimes have undesired and unexpected side-effects on other functionalities, causing these to fail or to malfunction. In this position paper, we promote the idea that a traceability link between user-observable functionalities and constituents of a software architecture (classes, methods. . . implementing the functionalities) is essential to reduce the software evolution effort. We outline an approach to recover and to study the evolution of features -subsets of the constituents of a software architecture - responsible for a functionality. Copyright 2005 ACM.
Issues such as whether a product is easy to learn, to use, and whether the user can efficiently complete tasks using it, may greatly affect a product's acceptance in the marketplace. In softwareengineering, the s...
详细信息
ISBN:
(纸本)0889864276
Issues such as whether a product is easy to learn, to use, and whether the user can efficiently complete tasks using it, may greatly affect a product's acceptance in the marketplace. In softwareengineering, the support for usability is widely believed to be independent of software architecture design. This belief stems from the efforts to separate the user interface component from the application's internal logic, thus enabling changes to the interface without affecting the software architecture. This assumption has been recently challenged by Bass et al. who argue that architectural patterns must be in place in order to support good usability design. We investigate the degree to which this revised belief is true with a case study on the redesign of an existing application for better supporting usability. The redesign is based on implementing a task-oriented interface and help system. Preliminary results show that much, though not all, of the required changes can be done without major changes to the software architecture of GIMP. The results do support the idea that the envisioned usability redesign could not easily be implemented without some powerful architectural features that do not necessarily correspond to the specific patterns identified by Bass et al.
This paper proposes to model each cell of future wireless networks as a G/G/c/c queueing system. As such a model has not been explicitly addressed in the literature, we apply maximum entropy principles to evaluate bot...
详细信息
This paper proposes to model each cell of future wireless networks as a G/G/c/c queueing system. As such a model has not been explicitly addressed in the literature, we apply maximum entropy principles to evaluate both traffic distribution and blocking probability within each cell. Analysis of numerical results enables to specify the conditions under which the system offers good quality of service in terms of blocking probability. More specifically, such an analysis reveals that coefficient of variation of call arrivals has more impact over the blocking probability than coefficient of variation of channel holding time.
The aim of the experiment presented in this paper is to present an insight into the evaluation of the potential benefits of introducing a function clone detection technology in an industrial software development proce...
The aim of the experiment presented in this paper is to present an insight into the evaluation of the potential benefits of introducing a function clone detection technology in an industrial software development process. To take advantage of function clone detection, two modifications to the software development process are presented. Our experiment consists of evaluating the impact that these proposed changes would have had on a specific software system if they had been applied over a 3 year period (involving 10000 person-months), where 6 subsequent versions of the software under study were released. The software under study is a large telecommunication system. In total 89 million lines of code have been analyzed. A first result showed that, against our expectations, a significant number of clones are being removed from the system over time. However, this effort is insufficient to prevent the growth of the overall number of clones in the system. In this context the first process change would have added value. We have also found that the second process change would have provided programmers with a significant number of opportunities for correcting problems before customers experienced them. This result shows a potential for improving the software system quality and customer satisfaction
This paper demonstrates the use of an integrated toolset for program understanding. By leveraging the unique capabilities of individual tools, and exploiting their power in combination, the resultant toolset is able t...
This paper demonstrates the use of an integrated toolset for program understanding. By leveraging the unique capabilities of individual tools, and exploiting their power in combination, the resultant toolset is able to facilitate specific reverse engineering tasks that would otherwise be difficult or impossible. This is illustrated by applying the integrated toolset to several typical reverse engineering scenarios, including code localization, data flow analysis, pattern matching, system clustering, and visualization, using a mid-size production program as the reference system.
暂无评论