首页 > 最新文献

Proceedings of the 24th International Conference on Software Engineering. ICSE 2002最新文献

英文 中文
Experiences in assessing product family software architecture for evolution 有评估产品族软件架构演进的经验
A. Maccari
Software architecture assessments are a means to detect architectural problems before the bulk of development work is done. They facilitate planning of improvement activities early in the lifecycle and allow limiting the changes on any existing software. This is particularly beneficial when the architecture has been planned to (or already does) support a whole product family, or a set of products that share common requirements, architecture, components or code. As the family requirements evolve and new products are added, the need to assess the evolvability of the existing architecture is vital. The author illustrates two assessment case studies in the mobile telephone software domain: the Symbian operating system platform and the network resource access control software system. By means of simple experimental data, evidence is shown of the usefulness of architectural assessment as rated by the participating stakeholders. Both assessments have led to the identification of previously unknown architectural defects, and to the consequent planning of improvement initiatives. In both cases, stakeholders noted that a number of side benefits, including improvement of communication and architectural documentation, were also of considerable importance. The lessons learned and suggestions for future research and experimentation are outlined.
软件体系结构评估是在完成大量开发工作之前检测体系结构问题的一种方法。它们促进了生命周期早期改进活动的计划,并允许限制对任何现有软件的更改。当架构计划(或已经)支持整个产品系列,或一组共享公共需求、架构、组件或代码的产品时,这一点尤其有益。随着家族需求的发展和新产品的加入,评估现有体系结构的可发展性的需求是至关重要的。作者举例说明了手机软件领域的两个评估案例:塞班操作系统平台和网络资源访问控制软件系统。通过简单的实验数据,证明了参与的利益相关者对架构评估的有效性。这两种评估都导致了之前未知的架构缺陷的识别,以及随后的改进计划。在这两种情况下,涉众注意到一些附带的好处,包括通信和架构文档的改进,也相当重要。总结了经验教训和对今后研究和实验的建议。
{"title":"Experiences in assessing product family software architecture for evolution","authors":"A. Maccari","doi":"10.1145/581413.581414","DOIUrl":"https://doi.org/10.1145/581413.581414","url":null,"abstract":"Software architecture assessments are a means to detect architectural problems before the bulk of development work is done. They facilitate planning of improvement activities early in the lifecycle and allow limiting the changes on any existing software. This is particularly beneficial when the architecture has been planned to (or already does) support a whole product family, or a set of products that share common requirements, architecture, components or code. As the family requirements evolve and new products are added, the need to assess the evolvability of the existing architecture is vital. The author illustrates two assessment case studies in the mobile telephone software domain: the Symbian operating system platform and the network resource access control software system. By means of simple experimental data, evidence is shown of the usefulness of architectural assessment as rated by the participating stakeholders. Both assessments have led to the identification of previously unknown architectural defects, and to the consequent planning of improvement initiatives. In both cases, stakeholders noted that a number of side benefits, including improvement of communication and architectural documentation, were also of considerable importance. The lessons learned and suggestions for future research and experimentation are outlined.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114950709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Goal-oriented software assessment 面向目标的软件评估
D. Weiss, D. Bennett, J.Y. Payseur, P. Tendick, Ping Zhang
Companies that engage in multi-site, multi-project software development continually face the problem of how to understand and improve their software development capabilities. We have defined and applied a goal-oriented process that enables such a company to assess the strengths and weaknesses of those capabilities. Our goals are to help (a) to decrease the time and cost to develop software, (b) to decrease the time needed to make changes to existing software, (c) to improve software quality, (d) to attract and retain a talented engineering staff, and (e) to facilitate more predictable management of software projects. In response to the variety of product requirements, market needs and development environments, we selected a goal-oriented process, rather than a criteria-oriented process, to advance our strategy and ensure relevance of the results. We describe the design of the process, discuss the results achieved and present vulnerabilities of the methodology. The process includes both interviews with projects' personnel and analysis of change data. Several common issues have emerged from the assessments across multiple projects, enabling strategic investments in software technology. Teams report satisfaction with the outcome in that they act on the recommendations, ask for additional future assessments, and recommend the process to sibling organizations.
从事多站点、多项目软件开发的公司不断面临着如何理解和提高其软件开发能力的问题。我们已经定义并应用了一个目标导向的过程,使这样的公司能够评估这些能力的优势和劣势。我们的目标是帮助(a)减少开发软件的时间和成本,(b)减少更改现有软件所需的时间,(c)提高软件质量,(d)吸引和留住有才能的工程人员,以及(e)促进更可预测的软件项目管理。为了应对各种各样的产品需求、市场需求和开发环境,我们选择了一个目标导向的过程,而不是一个标准导向的过程,以推进我们的战略并确保结果的相关性。我们描述了该过程的设计,讨论了所取得的结果,并提出了该方法的漏洞。这个过程包括与项目人员的访谈和对变化数据的分析。从跨多个项目的评估中出现了几个共同的问题,使软件技术的战略投资成为可能。团队报告对结果的满意程度,因为他们根据建议采取行动,要求额外的未来评估,并向兄弟组织推荐该过程。
{"title":"Goal-oriented software assessment","authors":"D. Weiss, D. Bennett, J.Y. Payseur, P. Tendick, Ping Zhang","doi":"10.1145/581339.581369","DOIUrl":"https://doi.org/10.1145/581339.581369","url":null,"abstract":"Companies that engage in multi-site, multi-project software development continually face the problem of how to understand and improve their software development capabilities. We have defined and applied a goal-oriented process that enables such a company to assess the strengths and weaknesses of those capabilities. Our goals are to help (a) to decrease the time and cost to develop software, (b) to decrease the time needed to make changes to existing software, (c) to improve software quality, (d) to attract and retain a talented engineering staff, and (e) to facilitate more predictable management of software projects. In response to the variety of product requirements, market needs and development environments, we selected a goal-oriented process, rather than a criteria-oriented process, to advance our strategy and ensure relevance of the results. We describe the design of the process, discuss the results achieved and present vulnerabilities of the methodology. The process includes both interviews with projects' personnel and analysis of change data. Several common issues have emerged from the assessments across multiple projects, enabling strategic investments in software technology. Teams report satisfaction with the outcome in that they act on the recommendations, ask for additional future assessments, and recommend the process to sibling organizations.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"127 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129824629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Reporting about industrial strength software engineering courses for undergraduates 报道行业实力的本科软件工程课程
Matthias Gehrke, H. Giese, U. Nickel, Jörg Niere, M. Tichy, J. Wadsack, Albert Zündorf
How do you organize an "industrial strength" one semester educational programming project for up to 200 second year students? This paper reports on four years of experience with such projects at the University of Paderborn and the University of Braunschweig. Key properties of our project design are: starting with an existing large application, regular hard deadlines with peer reviews and presentations to a large audience, working in groups, applying project and configuration management tools, a standard system architecture with interchangeable components and competing software agents, quality assurance and standard conformance testing through final overall system integration spanning all groups, and exposure to real-world project threats.
你如何为200名二年级学生组织一个“工业实力”的一学期教育规划项目?本文报告了在帕德博恩大学和布伦瑞克大学进行此类项目的四年经验。我们项目设计的关键属性是:从一个现有的大型应用程序开始,定期的严格截止日期,同行评审和向大量观众展示,在小组中工作,应用项目和配置管理工具,一个具有可互换组件和竞争软件代理的标准系统体系结构,通过跨越所有小组的最终整体系统集成进行质量保证和标准一致性测试,以及暴露于现实世界的项目威胁。
{"title":"Reporting about industrial strength software engineering courses for undergraduates","authors":"Matthias Gehrke, H. Giese, U. Nickel, Jörg Niere, M. Tichy, J. Wadsack, Albert Zündorf","doi":"10.1145/581388.581389","DOIUrl":"https://doi.org/10.1145/581388.581389","url":null,"abstract":"How do you organize an \"industrial strength\" one semester educational programming project for up to 200 second year students? This paper reports on four years of experience with such projects at the University of Paderborn and the University of Braunschweig. Key properties of our project design are: starting with an existing large application, regular hard deadlines with peer reviews and presentations to a large audience, working in groups, applying project and configuration management tools, a standard system architecture with interchangeable components and competing software agents, quality assurance and standard conformance testing through final overall system integration spanning all groups, and exposure to real-world project threats.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116685165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Semantic anomaly detection in online data sources 在线数据源中的语义异常检测
O. Raz, P. Koopman, M. Shaw
Much of the software we use for everyday purposes incorporates elements developed and maintained by someone other than the developer. These elements include not only code and databases but also dynamic data feeds from online data sources. Although everyday software is not mission critical, it must be dependable enough for practical use. This is limited by the dependability of the incorporated elements. It is particularly difficult to evaluate the dependability of dynamic data feeds, because they may be changed by their proprietors as they are used. Further, the specifications of these data feeds are often even sketchier than the specifications of software components. We demonstrate a method of inferring invariants about the normal behavior of dynamic data feeds. We use these invariants as proxies for specifications to perform on-going detection of anomalies in the data feed. We show the feasibility of our approach and demonstrate its usefulness for semantic anomaly detection: identifying occasions when a dynamic data feed is delivering unreasonable values, even though its behavior may be superficially acceptable (i.e., it is delivering parsable results in a timely fashion).
我们日常使用的许多软件都包含了由开发人员以外的人开发和维护的元素。这些元素不仅包括代码和数据库,还包括来自在线数据源的动态数据源。尽管日常软件不是任务关键型的,但它必须足够可靠,以供实际使用。这受到合并元素的可靠性的限制。评估动态数据源的可靠性尤其困难,因为它们可能在使用过程中被所有者更改。此外,这些数据源的规范通常比软件组件的规范更粗略。我们展示了一种推断动态数据源正常行为的不变量的方法。我们使用这些不变量作为规范的代理,以执行对数据提要中异常的持续检测。我们展示了我们的方法的可行性,并展示了它对语义异常检测的有用性:识别动态数据提要提供不合理值的情况,即使它的行为表面上是可以接受的(即,它及时地提供了可解析的结果)。
{"title":"Semantic anomaly detection in online data sources","authors":"O. Raz, P. Koopman, M. Shaw","doi":"10.1145/581376.581378","DOIUrl":"https://doi.org/10.1145/581376.581378","url":null,"abstract":"Much of the software we use for everyday purposes incorporates elements developed and maintained by someone other than the developer. These elements include not only code and databases but also dynamic data feeds from online data sources. Although everyday software is not mission critical, it must be dependable enough for practical use. This is limited by the dependability of the incorporated elements. It is particularly difficult to evaluate the dependability of dynamic data feeds, because they may be changed by their proprietors as they are used. Further, the specifications of these data feeds are often even sketchier than the specifications of software components. We demonstrate a method of inferring invariants about the normal behavior of dynamic data feeds. We use these invariants as proxies for specifications to perform on-going detection of anomalies in the data feed. We show the feasibility of our approach and demonstrate its usefulness for semantic anomaly detection: identifying occasions when a dynamic data feed is delivering unreasonable values, even though its behavior may be superficially acceptable (i.e., it is delivering parsable results in a timely fashion).","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"96 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Research abstract for semantic anomaly detection in dynamic data feeds with incomplete specifications 不完全规范动态数据源语义异常检测研究摘要
O. Raz
Everyday software must be dependable enough for its intended use. Because this software is not usually mission-critical, it may be cost-effective to detect improper behavior and notify the user or take remedial action. Detecting improper behavior requires a model of proper behavior. Unfortunately, specifications of everyday software are often incomplete and imprecise. The situation is exacerbated when the software incorporates third-party elements such as commercial-off-the-shelf software components, databases, or dynamic data feeds from online data sources. We want to make the use of dynamic data feeds more dependable. We are specifically interested in semantic problems with these feeds-cases in which the data feed is responsive, it delivers well-formed results, but the results are inconsistent, out of range, incorrect, or otherwise unreasonable. We focus on a particular facet of dependability: availability or readiness for usage, and change the fault model from the traditional "fail-silent" (crash failures) to "semantic". We investigate anomaly detection as a step towards increasing the semantic availability of dynamic data feeds.
日常软件必须对其预期用途足够可靠。由于该软件通常不是关键任务,因此检测不当行为并通知用户或采取补救措施可能是经济有效的。检测不当行为需要一个正确行为的模型。不幸的是,日常软件的规格说明常常是不完整和不精确的。当软件包含第三方元素(如商业现成的软件组件、数据库或来自在线数据源的动态数据源)时,情况就会恶化。我们希望动态数据源的使用更加可靠。我们对这些提要的语义问题特别感兴趣——在这些情况下,数据提要是响应性的,它提供了格式良好的结果,但结果不一致、超出范围、不正确或不合理。我们关注可靠性的一个特定方面:可用性或使用准备,并将故障模型从传统的“故障沉默”(崩溃故障)更改为“语义”。我们研究异常检测作为提高动态数据源的语义可用性的一个步骤。
{"title":"Research abstract for semantic anomaly detection in dynamic data feeds with incomplete specifications","authors":"O. Raz","doi":"10.1145/581469.581476","DOIUrl":"https://doi.org/10.1145/581469.581476","url":null,"abstract":"Everyday software must be dependable enough for its intended use. Because this software is not usually mission-critical, it may be cost-effective to detect improper behavior and notify the user or take remedial action. Detecting improper behavior requires a model of proper behavior. Unfortunately, specifications of everyday software are often incomplete and imprecise. The situation is exacerbated when the software incorporates third-party elements such as commercial-off-the-shelf software components, databases, or dynamic data feeds from online data sources. We want to make the use of dynamic data feeds more dependable. We are specifically interested in semantic problems with these feeds-cases in which the data feed is responsive, it delivers well-formed results, but the results are inconsistent, out of range, incorrect, or otherwise unreasonable. We focus on a particular facet of dependability: availability or readiness for usage, and change the fault model from the traditional \"fail-silent\" (crash failures) to \"semantic\". We investigate anomaly detection as a step towards increasing the semantic availability of dynamic data feeds.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121307447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Living with COTS 与COTS一起生活
R. Balzer
Summary form only given. Computer usage has evolved from small special purpose applications to large commercial off the shelf software (COTS) products that dominate the landscape. These COTS products present major challenges for our traditional software assistance paradigm. This talk explores those challenges and suggests research opportunities for software assistance in extending COTS products, in integrating them with other components, and in using them.
只提供摘要形式。计算机的使用已经从小型的特殊用途应用程序发展到占据主导地位的大型商业现成软件(COTS)产品。这些COTS产品对我们传统的软件辅助模式提出了主要的挑战。这次演讲探讨了这些挑战,并提出了在扩展COTS产品、将它们与其他组件集成以及使用它们方面的软件辅助研究机会。
{"title":"Living with COTS","authors":"R. Balzer","doi":"10.1145/581340.581343","DOIUrl":"https://doi.org/10.1145/581340.581343","url":null,"abstract":"Summary form only given. Computer usage has evolved from small special purpose applications to large commercial off the shelf software (COTS) products that dominate the landscape. These COTS products present major challenges for our traditional software assistance paradigm. This talk explores those challenges and suggests research opportunities for software assistance in extending COTS products, in integrating them with other components, and in using them.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Mobile computing middleware for context-aware applications 用于上下文感知应用程序的移动计算中间件
L. Capra
The hypothesis of this paper is that a new form of middleware can be developed that delivers better quality of service to mobile applications. This middleware should maintain in its internal data structures an updated representation of context information, and make it available to executing applications so that they can listen to changes in the context (i.e. inspection of the middleware) and influence the behaviour of the middleware accordingly (i.e. adaptation of the middleware). The main contribution of this research is an investigation of the underlying principles of mobile computing middleware, and in particular of reflection as a means to allow applications to dynamically inspect and adapt middleware behaviour according to the current execution context.
本文的假设是,可以开发一种新形式的中间件,为移动应用程序提供更高质量的服务。此中间件应在其内部数据结构中维护上下文信息的更新表示,并使其可用于执行应用程序,以便它们可以侦听上下文中的变化(即对中间件的检查)并相应地影响中间件的行为(即对中间件的调整)。本研究的主要贡献是对移动计算中间件的基本原理的调查,特别是作为一种允许应用程序根据当前执行上下文动态检查和调整中间件行为的方法的反射。
{"title":"Mobile computing middleware for context-aware applications","authors":"L. Capra","doi":"10.1145/581469.581471","DOIUrl":"https://doi.org/10.1145/581469.581471","url":null,"abstract":"The hypothesis of this paper is that a new form of middleware can be developed that delivers better quality of service to mobile applications. This middleware should maintain in its internal data structures an updated representation of context information, and make it available to executing applications so that they can listen to changes in the context (i.e. inspection of the middleware) and influence the behaviour of the middleware accordingly (i.e. adaptation of the middleware). The main contribution of this research is an investigation of the underlying principles of mobile computing middleware, and in particular of reflection as a means to allow applications to dynamically inspect and adapt middleware behaviour according to the current execution context.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115842302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Specifying multithreaded Java semantics for program verification 为程序验证指定多线程Java语义
Abhik Roychoudhury, T. Mitra
Most current work on multithreaded Java program verification assumes a model of execution that is based on interleaving of the operations of the individual threads. However, the Java language specification supports a weaker model of execution, called the Java Memory Model (JMM). The JMM allows certain reordering of operations within a thread and thus permits more behaviors than the interleaving based execution model. Therefore, programs verified by assuming interleaved thread execution may not behave correctly for certain Java multithreading implementations. The main difficulty with the JMM is that it is informally described in an abstract rule-based declarative style, which is unsuitable for formal verification. We develop an equivalent formal executable specification of the JMM. Our specification is operational and uses guarded commands. We then use this executable model to verify popular software construction idioms for multithreaded Java. Our prototype verifier tool detects a bug in the widely used "Double Checked Locking" idiom, which verifiers based on interleaving execution model cannot possibly detect.
当前大多数关于多线程Java程序验证的工作都假定了一种基于各个线程的交错操作的执行模型。然而,Java语言规范支持一种较弱的执行模型,称为Java内存模型(Java Memory model, JMM)。JMM允许线程内操作的某些重新排序,因此比基于交错的执行模型允许更多的行为。因此,对于某些Java多线程实现,通过假设交错线程执行来验证的程序可能行为不正确。JMM的主要困难在于,它是以一种抽象的基于规则的声明式风格进行非正式描述的,这种风格不适合正式验证。我们开发了一个等价的JMM的正式可执行规范。我们的规范是可操作的,并使用受保护的命令。然后,我们使用这个可执行模型来验证多线程Java的流行软件构造习惯。我们的原型验证器工具可以检测到广泛使用的“双重检查锁定”习语中的错误,而基于交错执行模型的验证器不可能检测到这个错误。
{"title":"Specifying multithreaded Java semantics for program verification","authors":"Abhik Roychoudhury, T. Mitra","doi":"10.1145/581396.581399","DOIUrl":"https://doi.org/10.1145/581396.581399","url":null,"abstract":"Most current work on multithreaded Java program verification assumes a model of execution that is based on interleaving of the operations of the individual threads. However, the Java language specification supports a weaker model of execution, called the Java Memory Model (JMM). The JMM allows certain reordering of operations within a thread and thus permits more behaviors than the interleaving based execution model. Therefore, programs verified by assuming interleaved thread execution may not behave correctly for certain Java multithreading implementations. The main difficulty with the JMM is that it is informally described in an abstract rule-based declarative style, which is unsuitable for formal verification. We develop an equivalent formal executable specification of the JMM. Our specification is operational and uses guarded commands. We then use this executable model to verify popular software construction idioms for multithreaded Java. Our prototype verifier tool detects a bug in the widely used \"Double Checked Locking\" idiom, which verifiers based on interleaving execution model cannot possibly detect.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Software engineering economics: background, current practices, and future directions 软件工程经济学:背景、当前实践和未来方向
H. Erdogmus, B. Boehm, W. Harrison, D. Reifer, K. Sullivan
The field of software economics seeks to develop technical theories, guidelines, and practices of software development based on sound, established, and emerging models of value and value-creation - adapted to the domain of software development as necessary. The premise of the field is that software development is an ongoing investment activity - in which developers and managers continually make investment decisions requiring the expenditure of valuable resources, such as time, talent, and money. The overriding aim of this activity is to maximize the value added subject to an equitable distribution among the participating stakeholders. The goal of the paper is to expose the audience to this line of thinking and introduce the tools pertinent to its pursuit. The paper is designed to be self-contained and will cover concepts from introductory to advanced. Both practitioners and researchers with an interest in the impact of value considerations in software decision-making will benefit from attending it.
软件经济学领域寻求发展软件开发的技术理论、指导方针和实践,这些理论、指导方针和实践是基于健全的、已建立的和新兴的价值和价值创造模型的——必要时适应软件开发领域。该领域的前提是软件开发是一项持续的投资活动——开发人员和管理人员不断地做出投资决策,这需要花费宝贵的资源,如时间、人才和金钱。此活动的首要目标是在参与的利益相关者之间公平分配的前提下最大化附加价值。本文的目标是向读者展示这一思路,并介绍与之相关的工具。这篇论文的设计是独立的,将涵盖从入门到高级的概念。对软件决策中价值考虑的影响感兴趣的实践者和研究人员都将从参加它中受益。
{"title":"Software engineering economics: background, current practices, and future directions","authors":"H. Erdogmus, B. Boehm, W. Harrison, D. Reifer, K. Sullivan","doi":"10.1145/581339.581444","DOIUrl":"https://doi.org/10.1145/581339.581444","url":null,"abstract":"The field of software economics seeks to develop technical theories, guidelines, and practices of software development based on sound, established, and emerging models of value and value-creation - adapted to the domain of software development as necessary. The premise of the field is that software development is an ongoing investment activity - in which developers and managers continually make investment decisions requiring the expenditure of valuable resources, such as time, talent, and money. The overriding aim of this activity is to maximize the value added subject to an equitable distribution among the participating stakeholders. The goal of the paper is to expose the audience to this line of thinking and introduce the tools pertinent to its pursuit. The paper is designed to be self-contained and will cover concepts from introductory to advanced. Both practitioners and researchers with an interest in the impact of value considerations in software decision-making will benefit from attending it.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128261490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An infrastructure for the rapid development of XML-based architecture description languages 用于快速开发基于xml的体系结构描述语言的基础设施
Eric M. Dashofy, A. Hoek, R. Taylor
Research and experimentation in software architectures over the past decade (1992-2002) have yielded a plethora of software architecture description languages (ADLs). Continuing innovation indicates that it is reasonable to expect more new ADLs, or at least ADL features. This research process is impeded by the difficulty and cost associated with developing new notations. An architect in need of a unique set of modeling features must either develop a new architecture description language from scratch or undertake the daunting task of modifying an existing language. In either case, it is unavoidable that a significant effort will be expended in building or adapting tools to support the language. To remedy this situation, we have developed an infrastructure for the rapid development of new architecture description languages. Key aspects of the infrastructure are its XML-based modular extension mechanism, its base set of reusable and customizable architectural modeling constructs, and its equally important set of flexible support tools. The paper introduces the infrastructure and demonstrates its value in the context of several real-world applications.
过去十年(1992-2002)对软件架构的研究和实验产生了大量的软件架构描述语言(adl)。持续的创新表明有理由期待更多新的ADL,或者至少是ADL特性。这一研究过程受到开发新符号的难度和成本的阻碍。需要一组独特的建模特性的架构师必须从零开始开发一种新的架构描述语言,或者承担修改现有语言的艰巨任务。无论哪种情况,都不可避免地要花费大量精力来构建或调整工具以支持该语言。为了纠正这种情况,我们开发了一种用于快速开发新体系结构描述语言的基础结构。基础设施的关键方面是其基于xml的模块化扩展机制、可重用和可定制的体系结构建模构造的基本集,以及同样重要的灵活支持工具集。本文介绍了该基础设施,并在几个实际应用的背景下展示了其价值。
{"title":"An infrastructure for the rapid development of XML-based architecture description languages","authors":"Eric M. Dashofy, A. Hoek, R. Taylor","doi":"10.1145/581372.581374","DOIUrl":"https://doi.org/10.1145/581372.581374","url":null,"abstract":"Research and experimentation in software architectures over the past decade (1992-2002) have yielded a plethora of software architecture description languages (ADLs). Continuing innovation indicates that it is reasonable to expect more new ADLs, or at least ADL features. This research process is impeded by the difficulty and cost associated with developing new notations. An architect in need of a unique set of modeling features must either develop a new architecture description language from scratch or undertake the daunting task of modifying an existing language. In either case, it is unavoidable that a significant effort will be expended in building or adapting tools to support the language. To remedy this situation, we have developed an infrastructure for the rapid development of new architecture description languages. Key aspects of the infrastructure are its XML-based modular extension mechanism, its base set of reusable and customizable architectural modeling constructs, and its equally important set of flexible support tools. The paper introduces the infrastructure and demonstrates its value in the context of several real-world applications.","PeriodicalId":186061,"journal":{"name":"Proceedings of the 24th International Conference on Software Engineering. ICSE 2002","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 243
期刊
Proceedings of the 24th International Conference on Software Engineering. ICSE 2002
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1