首页 > 最新文献

Australian Software Engineering Conference (ASWEC'06)最新文献

英文 中文
Efficient and effective random testing using the Voronoi diagram 使用Voronoi图进行高效和有效的随机测试
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.25
T. Chen, Robert G. Merkel
Adaptive random testing (ART) is a method for improving the fault-finding effectiveness of random testing. Fixed-size candidate set ART is the most studied variant of this approach. However, existing implementations of FSCS-ART have had substantial selection overhead, with n test cases requiring O(n/sup 2/) time to generate. We describe the use of a geometric data structure known as the Voronoi diagram to reduce this overhead to no worse than O(n/spl radic/n) and, with further optimization, O(nlogn). We demonstrate experimentally that practical improvements in selection overhead can be gained using this improved implementation.
自适应随机测试(ART)是一种提高随机测试故障发现效率的方法。固定大小的候选集ART是该方法研究最多的变体。然而,现有的FSCS-ART实现有大量的选择开销,n个测试用例需要O(n/sup 2/)时间来生成。我们描述了一种称为Voronoi图的几何数据结构的使用,以将此开销降低到不低于O(n/spl radial /n),并且经过进一步优化,可以降低到O(nlogn)。我们通过实验证明,使用这种改进的实现可以获得选择开销方面的实际改进。
{"title":"Efficient and effective random testing using the Voronoi diagram","authors":"T. Chen, Robert G. Merkel","doi":"10.1109/ASWEC.2006.25","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.25","url":null,"abstract":"Adaptive random testing (ART) is a method for improving the fault-finding effectiveness of random testing. Fixed-size candidate set ART is the most studied variant of this approach. However, existing implementations of FSCS-ART have had substantial selection overhead, with n test cases requiring O(n/sup 2/) time to generate. We describe the use of a geometric data structure known as the Voronoi diagram to reduce this overhead to no worse than O(n/spl radic/n) and, with further optimization, O(nlogn). We demonstrate experimentally that practical improvements in selection overhead can be gained using this improved implementation.","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"28 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Validating ORA-SS data models using Alloy 使用Alloy验证ORA-SS数据模型
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.54
L. Wang, G. Dobbie, Jing Sun, L. Groves
Semistructured data is typically represented using XML. However, little semantic information can be captured using XML. Other data models, such as the object relationship attribute data model for semistructured data (ORA-SS), have been introduced to represent more detailed semantic information. Automatic analysis of the data models would enable us to reveal inconsistencies both at the schema and instance levels of the semistructured data. The aim of this paper is to encode the semantics of the ORA-SS data model in the Alloy formal language and automatically validate the semistructured data design using the Alloy analyzer. It enables us to check the consistency of an ORA-SS schema and its instances.
半结构化数据通常使用XML表示。但是,使用XML可以捕获的语义信息很少。引入了其他数据模型,例如半结构化数据的对象关系属性数据模型(ORA-SS),以表示更详细的语义信息。数据模型的自动分析将使我们能够揭示半结构化数据的模式和实例级别上的不一致性。本文的目的是用Alloy形式语言对ORA-SS数据模型的语义进行编码,并利用Alloy分析器对半结构化数据设计进行自动验证。它使我们能够检查ORA-SS模式及其实例的一致性。
{"title":"Validating ORA-SS data models using Alloy","authors":"L. Wang, G. Dobbie, Jing Sun, L. Groves","doi":"10.1109/ASWEC.2006.54","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.54","url":null,"abstract":"Semistructured data is typically represented using XML. However, little semantic information can be captured using XML. Other data models, such as the object relationship attribute data model for semistructured data (ORA-SS), have been introduced to represent more detailed semantic information. Automatic analysis of the data models would enable us to reveal inconsistencies both at the schema and instance levels of the semistructured data. The aim of this paper is to encode the semantics of the ORA-SS data model in the Alloy formal language and automatically validate the semistructured data design using the Alloy analyzer. It enables us to check the consistency of an ORA-SS schema and its instances.","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126977180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Formal verification of the IEEE 802.11i WLAN security protocol IEEE 802.11i无线局域网安全协议的正式验证
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.29
E. Sithirasenan, Saad Zafar, V. Muthukkumarasamy
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security protocol, the IEEE 802.11i assures rigid security for wireless networks with the support of IEEE 802.1X protocol for authentication, authorization and key distribution. In this study we investigate the integrity of the security model developed by us based on 802.11i robust security mechanism (RSN), strengthening our desire towards establishing a secure wireless network environment. We have used the symbolic analysis laboratory (SAL) tools to formally verify the behavior tree models. This paper presents the several linear temporal logic (LTL) formulas established to prove the credibility of our model. We also discuss probable software issues that could arise during implementation. By examining all possible execution traces of the security protocol we have proved our implementation model to be complete and consistent.
随着无线局域网(wlan)使用的增加,企业和教育机构越来越关注无线网络的安全性。最新的WLAN安全协议IEEE 802.11i通过支持IEEE 802.1X协议进行身份验证、授权和密钥分发,确保无线网络的严格安全性。在本研究中,我们研究了我们基于802.11i鲁棒安全机制(RSN)开发的安全模型的完整性,加强了我们建立安全无线网络环境的愿望。我们使用了符号分析实验室(SAL)工具来正式验证行为树模型。本文给出了几个线性时间逻辑(LTL)公式来证明模型的可信性。我们还讨论了在实现过程中可能出现的软件问题。通过检查安全协议的所有可能的执行轨迹,我们已经证明了我们的实现模型是完整和一致的。
{"title":"Formal verification of the IEEE 802.11i WLAN security protocol","authors":"E. Sithirasenan, Saad Zafar, V. Muthukkumarasamy","doi":"10.1109/ASWEC.2006.29","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.29","url":null,"abstract":"With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security protocol, the IEEE 802.11i assures rigid security for wireless networks with the support of IEEE 802.1X protocol for authentication, authorization and key distribution. In this study we investigate the integrity of the security model developed by us based on 802.11i robust security mechanism (RSN), strengthening our desire towards establishing a secure wireless network environment. We have used the symbolic analysis laboratory (SAL) tools to formally verify the behavior tree models. This paper presents the several linear temporal logic (LTL) formulas established to prove the credibility of our model. We also discuss probable software issues that could arise during implementation. By examining all possible execution traces of the security protocol we have proved our implementation model to be complete and consistent.","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127130918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Derivation of Java monitors Java监视器的派生
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.23
Brijesh Dongol
This paper describes the formalisation of Java thread synchronisation in an extended Owicki-Gries theory, which facilitates the proof of safety and progress properties of multi-threaded Java programs. Although we can use this formalisation to verify existing Java programs, our focus is on deriving them instead. The derivation process consists of two stages: design and transformation. In the design stage, we use the method of Feijen and van Gasteren to obtain a program that satisfies the given requirements. This solution will most likely make atomicity assumptions Java is unable to guarantee. In the transformation stage, we reduce the granularity of the statements and develop a solution that can be translated directly to a Java implementation
本文用扩展的Owicki-Gries理论描述了Java线程同步的形式化,这有助于证明多线程Java程序的安全性和进度特性。虽然我们可以使用这种形式化来验证现有的Java程序,但我们的重点是派生它们。衍生过程包括设计和转换两个阶段。在设计阶段,我们使用Feijen和van Gasteren的方法来获得满足给定要求的程序。这种解决方案很可能做出Java无法保证的原子性假设。在转换阶段,我们减少语句的粒度,并开发可以直接转换为Java实现的解决方案
{"title":"Derivation of Java monitors","authors":"Brijesh Dongol","doi":"10.1109/ASWEC.2006.23","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.23","url":null,"abstract":"This paper describes the formalisation of Java thread synchronisation in an extended Owicki-Gries theory, which facilitates the proof of safety and progress properties of multi-threaded Java programs. Although we can use this formalisation to verify existing Java programs, our focus is on deriving them instead. The derivation process consists of two stages: design and transformation. In the design stage, we use the method of Feijen and van Gasteren to obtain a program that satisfies the given requirements. This solution will most likely make atomicity assumptions Java is unable to guarantee. In the transformation stage, we reduce the granularity of the statements and develop a solution that can be translated directly to a Java implementation","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132624967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Agile practices in software development - experiences from student projects 软件开发中的敏捷实践——来自学生项目的经验
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.9
Jean-Guy Schneider, Rajesh Vasa
To address the problems of traditional software development methodologies, recent years have seen the introduction of more light-weight or "agile" development processes. These processes are intended to support early and quick production of working code by structuring the development into small release cycles and focus on continual interaction between developers and customers. As these kinds of software development processes are becoming more and more popular in industry, there is a growing demand to expose Software Engineering students to agile development practices. This, however, is not a straightforward task as the corresponding practices cannot be adjusted easily to a learning environment or may even run counter to educational goals. In this paper, we discuss our experiences in introducing agile practices in student software development projects and reflect on both the benefits and drawbacks of agile processes in this setting
为了解决传统软件开发方法的问题,近年来出现了更轻量级或“敏捷”开发过程的引入。这些过程旨在通过将开发组织成小的发布周期,并关注开发人员和客户之间的持续交互,来支持工作代码的早期和快速生产。随着这些类型的软件开发过程在行业中变得越来越流行,向软件工程专业的学生展示敏捷开发实践的需求也在不断增长。然而,这并不是一项简单的任务,因为相应的实践不能很容易地适应学习环境,甚至可能与教育目标背道而驰。在本文中,我们讨论了在学生软件开发项目中引入敏捷实践的经验,并反思了敏捷过程在这种情况下的优点和缺点
{"title":"Agile practices in software development - experiences from student projects","authors":"Jean-Guy Schneider, Rajesh Vasa","doi":"10.1109/ASWEC.2006.9","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.9","url":null,"abstract":"To address the problems of traditional software development methodologies, recent years have seen the introduction of more light-weight or \"agile\" development processes. These processes are intended to support early and quick production of working code by structuring the development into small release cycles and focus on continual interaction between developers and customers. As these kinds of software development processes are becoming more and more popular in industry, there is a growing demand to expose Software Engineering students to agile development practices. This, however, is not a straightforward task as the corresponding practices cannot be adjusted easily to a learning environment or may even run counter to educational goals. In this paper, we discuss our experiences in introducing agile practices in student software development projects and reflect on both the benefits and drawbacks of agile processes in this setting","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134372075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Requirements capture and specification for enterprise applications: a UML based attempt 企业应用程序的需求捕获和规范:基于UML的尝试
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.43
C. Choppy, G. Reggio
We propose a software development method for enterprise applications that combines the use of the structural concepts provided by problem frames, and the use of the UML notation. Problem frames are patterns that provide a precise conceptual model of what is the problem to be solved. The first step of our method is to match the current task with one of the problem frames that we propose for enterprise applications, and this helps to understand the nature of the problem under study. The problem frames to be considered for enterprise applications are clearly more complex than the basic ones. We then provide guidelines to develop all the artifacts required by the method through a dedicated choice of appropriate UML diagrams together with predefined schemas or skeletons for their contents. Thus, using our method provides a more direct path to the UML models, which saves time (no long questions about which diagrams to use and how) and improves the models quality (relevant issues are addressed, a uniform style is offered). In this paper, we consider the phases of modelling the domain, the requirements capture and specification, and their relationships.
我们为企业应用程序提出了一种软件开发方法,该方法结合了问题框架提供的结构概念的使用,以及UML符号的使用。问题框架是一种模式,它提供了要解决的问题的精确概念模型。我们方法的第一步是将当前任务与我们为企业应用程序提出的问题框架之一相匹配,这有助于理解所研究问题的性质。企业应用程序要考虑的问题框架显然要比基本框架复杂得多。然后,我们提供指导方针,通过专门选择适当的UML图以及预定义的模式或内容框架,开发方法所需的所有工件。因此,使用我们的方法为UML模型提供了更直接的路径,这节省了时间(没有关于使用哪个图以及如何使用的长问题)并提高了模型质量(解决了相关的问题,提供了统一的样式)。在本文中,我们考虑了领域建模的阶段,需求捕获和规范,以及它们之间的关系。
{"title":"Requirements capture and specification for enterprise applications: a UML based attempt","authors":"C. Choppy, G. Reggio","doi":"10.1109/ASWEC.2006.43","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.43","url":null,"abstract":"We propose a software development method for enterprise applications that combines the use of the structural concepts provided by problem frames, and the use of the UML notation. Problem frames are patterns that provide a precise conceptual model of what is the problem to be solved. The first step of our method is to match the current task with one of the problem frames that we propose for enterprise applications, and this helps to understand the nature of the problem under study. The problem frames to be considered for enterprise applications are clearly more complex than the basic ones. We then provide guidelines to develop all the artifacts required by the method through a dedicated choice of appropriate UML diagrams together with predefined schemas or skeletons for their contents. Thus, using our method provides a more direct path to the UML models, which saves time (no long questions about which diagrams to use and how) and improves the models quality (relevant issues are addressed, a uniform style is offered). In this paper, we consider the phases of modelling the domain, the requirements capture and specification, and their relationships.","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133992007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Formally analysing a security protocol for replay attacks 正式分析重播攻击的安全协议
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.30
Benjamin W. Long, C. Fidge
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we suspected a replay attack was possible on the protocol. To check this, we formally specified the protocol using Object-Z and then analysed its behaviour in the presence of an attacker using the symbolic analysis laboratory's model checker. To produce accurate results efficiently, our formalism included an abstraction of the protocol's data structures that captured just those characteristics that we believed made the protocol vulnerable. Ultimately, the model checker's analysis confirmed our suspicions about the protocol's weakness
kerberos - one协议是一种密钥分发协议,用于与Javacards一起使用,以在GSM移动电话网络上提供安全通信。通过检查,我们怀疑可能会对协议进行重放攻击。为了检查这一点,我们使用Object-Z正式指定协议,然后使用符号分析实验室的模型检查器在攻击者存在的情况下分析其行为。为了有效地产生准确的结果,我们的形式化包含了协议数据结构的抽象,它只捕获了那些我们认为使协议易受攻击的特征。最终,模型检查器的分析证实了我们对协议弱点的怀疑
{"title":"Formally analysing a security protocol for replay attacks","authors":"Benjamin W. Long, C. Fidge","doi":"10.1109/ASWEC.2006.30","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.30","url":null,"abstract":"The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we suspected a replay attack was possible on the protocol. To check this, we formally specified the protocol using Object-Z and then analysed its behaviour in the presence of an attacker using the symbolic analysis laboratory's model checker. To produce accurate results efficiently, our formalism included an abstraction of the protocol's data structures that captured just those characteristics that we believed made the protocol vulnerable. Ultimately, the model checker's analysis confirmed our suspicions about the protocol's weakness","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121936046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The value of architecturally significant information extracted from patterns for architecture evaluation: a controlled experiment 从架构评估模式中提取的架构重要信息的价值:一个控制实验
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.52
M. Babar, B. Kitchenham, P. Maheshwari
We have developed an approach to identify and capture architecturally significant information from patterns (ASIP), which can be used to improve architecture design and evaluation. Our experimental goal was to evaluate whether the use of the ASIP improves the quality of scenarios developed to evaluate software architecture. Out of 24 subjects 21 were experienced software engineers who had returned to University for a postgraduate studies and remaining 3 were fourth year undergraduate students. All participants were taking a course in software architecture. The participants were randomly assigned to two groups of equal size. Both groups developed scenarios for architecture evaluation. One group (treatment group) was given ASIP information the other (control group) was not. The outcome variable was the quality of the scenarios produced by each participant working individually. The treatment group participants also completed a post-experiment questionnaire. Our results support the hypothesis that ASIP information assists scenario development in the context of architecture evaluation.
我们已经开发了一种从模式(ASIP)中识别和捕获架构重要信息的方法,这些信息可用于改进架构设计和评估。我们的实验目标是评估ASIP的使用是否提高了为评估软件架构而开发的场景的质量。在24名研究对象中,21名是回到大学攻读研究生的有经验的软件工程师,其余3名是四年级本科生。所有的参与者都参加了软件架构的课程。参与者被随机分为两组,人数相等。两个小组都为架构评估开发了场景。一组(治疗组)给予ASIP信息,另一组(对照组)不给予。结果变量是每个参与者单独工作所产生的情景的质量。实验组参与者还完成了一份实验后问卷。我们的结果支持ASIP信息在架构评估的背景下帮助场景开发的假设。
{"title":"The value of architecturally significant information extracted from patterns for architecture evaluation: a controlled experiment","authors":"M. Babar, B. Kitchenham, P. Maheshwari","doi":"10.1109/ASWEC.2006.52","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.52","url":null,"abstract":"We have developed an approach to identify and capture architecturally significant information from patterns (ASIP), which can be used to improve architecture design and evaluation. Our experimental goal was to evaluate whether the use of the ASIP improves the quality of scenarios developed to evaluate software architecture. Out of 24 subjects 21 were experienced software engineers who had returned to University for a postgraduate studies and remaining 3 were fourth year undergraduate students. All participants were taking a course in software architecture. The participants were randomly assigned to two groups of equal size. Both groups developed scenarios for architecture evaluation. One group (treatment group) was given ASIP information the other (control group) was not. The outcome variable was the quality of the scenarios produced by each participant working individually. The treatment group participants also completed a post-experiment questionnaire. Our results support the hypothesis that ASIP information assists scenario development in the context of architecture evaluation.","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An empirically-based criterion for determining the success of an open-source project 一个基于经验的标准,用于确定一个开源项目的成功
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.12
D. Feitelson, G. Heller, S. Schach
In order to determine a success criterion for open-source software projects, we analyzed 122,205 projects in the SourceForge database. There were 80,597 projects with no downloads at all. We restricted our analysis to the 41,608 projects that together were downloaded 704,897,520 times. Contrary to what we had expected, the distribution of the number of downloads of each project is not Zipf-like; only a portion of the log-log plot of the number of downloads and their rank appears to be a straight line. We performed least-squares analysis (utilizing the Bayesian information criterion) to divide the plot into three segments. On the basis of the shapes of the corresponding curves and the locations of their boundary points, we categorized the projects as follows: 85 superprojects (highly successful projects with more than 1.1 million downloads); just over 10,000 successful projects (with more than 1680 downloads each); and struggling projects (with 1680 downloads or fewer). In terms of our criterion, only a quarter of the projects that have one or more downloads can be deemed to be successful.
为了确定开源软件项目的成功标准,我们分析了SourceForge数据库中的122205个项目。有80597个项目完全没有下载量。我们将分析限制在41,608个项目上,这些项目总共被下载了704,897,520次。与我们的预期相反,每个项目的下载量分布并不是zipf式的;在下载数量和排名的对数-对数图中,只有一部分看起来是一条直线。我们进行了最小二乘分析(利用贝叶斯信息准则),将该图分为三个部分。根据相应曲线的形状及其边界点的位置,我们将项目分类如下:85个超级项目(下载量超过110万次的非常成功的项目);超过1万个成功项目(每个项目下载量超过1680次);还有挣扎中的项目(下载量不超过1680次)。根据我们的标准,只有1 / 4拥有1次或多次下载量的项目能够称得上成功。
{"title":"An empirically-based criterion for determining the success of an open-source project","authors":"D. Feitelson, G. Heller, S. Schach","doi":"10.1109/ASWEC.2006.12","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.12","url":null,"abstract":"In order to determine a success criterion for open-source software projects, we analyzed 122,205 projects in the SourceForge database. There were 80,597 projects with no downloads at all. We restricted our analysis to the 41,608 projects that together were downloaded 704,897,520 times. Contrary to what we had expected, the distribution of the number of downloads of each project is not Zipf-like; only a portion of the log-log plot of the number of downloads and their rank appears to be a straight line. We performed least-squares analysis (utilizing the Bayesian information criterion) to divide the plot into three segments. On the basis of the shapes of the corresponding curves and the locations of their boundary points, we categorized the projects as follows: 85 superprojects (highly successful projects with more than 1.1 million downloads); just over 10,000 successful projects (with more than 1680 downloads each); and struggling projects (with 1680 downloads or fewer). In terms of our criterion, only a quarter of the projects that have one or more downloads can be deemed to be successful.","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129814052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An agent-oriented approach to change propagation in software evolution 软件进化中面向代理的变更传播方法
Pub Date : 2006-04-18 DOI: 10.1109/ASWEC.2006.10
K. Dam, M. Winikoff, L. Padgham
Software maintenance and evolution are inevitable activities since almost all software that is useful and successful stimulates user-generated requests for change and improvements. One of the most critical problems in software maintenance and evolution is to maintain consistency between software artefacts by propagating changes correctly. Although many approaches have been proposed, automated change propagation is still a significant technical challenge in software engineering. In this paper we present a novel, agent-oriented approach to deal with change propagation in evolving software systems that are developed using the Prometheus methodology. A meta-model with a set of the object constraint language (OCL) rules forms the basis of the proposed framework. The underlying change propagation mechanism of our framework is based on the well-known Belief-Desire-Intention (BDI) agent architecture. Traceability information and design heuristics are also incorporated into the framework to facilitate the change propagation process.
软件维护和发展是不可避免的活动,因为几乎所有有用和成功的软件都会刺激用户生成更改和改进的请求。软件维护和发展中最关键的问题之一是通过正确传播变更来维护软件工件之间的一致性。尽管已经提出了许多方法,自动化变更传播仍然是软件工程中一个重要的技术挑战。在本文中,我们提出了一种新颖的,面向代理的方法来处理使用普罗米修斯方法开发的不断发展的软件系统中的变化传播。具有一组对象约束语言(OCL)规则的元模型构成了所提议框架的基础。我们的框架的底层变化传播机制是基于众所周知的信念-欲望-意图(BDI)代理架构。可追溯性信息和设计启发式也被合并到框架中,以促进变更传播过程。
{"title":"An agent-oriented approach to change propagation in software evolution","authors":"K. Dam, M. Winikoff, L. Padgham","doi":"10.1109/ASWEC.2006.10","DOIUrl":"https://doi.org/10.1109/ASWEC.2006.10","url":null,"abstract":"Software maintenance and evolution are inevitable activities since almost all software that is useful and successful stimulates user-generated requests for change and improvements. One of the most critical problems in software maintenance and evolution is to maintain consistency between software artefacts by propagating changes correctly. Although many approaches have been proposed, automated change propagation is still a significant technical challenge in software engineering. In this paper we present a novel, agent-oriented approach to deal with change propagation in evolving software systems that are developed using the Prometheus methodology. A meta-model with a set of the object constraint language (OCL) rules forms the basis of the proposed framework. The underlying change propagation mechanism of our framework is based on the well-known Belief-Desire-Intention (BDI) agent architecture. Traceability information and design heuristics are also incorporated into the framework to facilitate the change propagation process.","PeriodicalId":285684,"journal":{"name":"Australian Software Engineering Conference (ASWEC'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127844812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
期刊
Australian Software Engineering Conference (ASWEC'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1