首页 > 最新文献

2013 35th International Conference on Software Engineering (ICSE)最新文献

英文 中文
Are your incoming aliases really necessary? Counting the cost of object ownership 你的入境假名真的有必要吗?计算对象所有权的成本
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606620
A. Potanin, M. Damitio, J. Noble
Object ownership enforces encapsulation within object-oriented programs by forbidding incoming aliases into objects' representations. Many common data structures, such as collections with iterators, require incoming aliases, so there has been much work on relaxing ownership's encapsulation to permit multiple incoming aliases. This research asks the opposite question: Are your aliases really necessary? In this paper, we count the cost of programming with strong object encapsulation. We refactored the JDK 5.0 collection classes so that they did not use incoming aliases, following either the owner-as-dominator or the owner-as-accessor encapsulation discipline. We measured the performance time overhead the refactored collections impose on a set of microbenchmarks and on the DaCapo, SPECjbb and SPECjvm benchmark suites. While the microbenchmarks show that individual operations and iterations can be significantly slower on encapsulated collection (especially for owner-as-dominator), we found less than 3% slowdown for owner-as-accessor across the large scale benchmarks. As a result, we propose that well-known design patterns such as Iterator commonly used by software engineers around the world need to be adjusted to take ownership into account. As most design patterns are used as a building block in constructing larger pieces of software, a small adjustment to respect ownership will not have any impact on the productivity of programmers but will have a huge impact on the quality of the resulting code with respect to aliasing.
对象所有权通过禁止传入的别名进入对象的表示来强制在面向对象程序中进行封装。许多常见的数据结构(例如带有迭代器的集合)都需要传入别名,因此在放宽所有权封装以允许多个传入别名方面做了很多工作。这项研究提出了一个相反的问题:你的别名真的有必要吗?在本文中,我们计算了使用强对象封装的编程成本。我们重构了JDK 5.0集合类,以便它们不使用传入别名,遵循所有者作为支配者或所有者作为访问者的封装原则。我们测量了重构集合在一组微基准测试以及DaCapo、SPECjbb和SPECjvm基准测试套件上施加的性能时间开销。虽然微基准测试显示,在封装的集合上,单个操作和迭代可能会明显变慢(特别是对于所有者作为主宰者),但我们发现,在大规模基准测试中,所有者作为存取者的速度会减慢不到3%。因此,我们建议需要调整众所周知的设计模式,例如世界各地的软件工程师通常使用的Iterator,以考虑所有权。由于大多数设计模式被用作构建较大软件块的构建块,因此对尊重所有权的一个小调整不会对程序员的生产力产生任何影响,但会对有关混叠的结果代码的质量产生巨大影响。
{"title":"Are your incoming aliases really necessary? Counting the cost of object ownership","authors":"A. Potanin, M. Damitio, J. Noble","doi":"10.1109/ICSE.2013.6606620","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606620","url":null,"abstract":"Object ownership enforces encapsulation within object-oriented programs by forbidding incoming aliases into objects' representations. Many common data structures, such as collections with iterators, require incoming aliases, so there has been much work on relaxing ownership's encapsulation to permit multiple incoming aliases. This research asks the opposite question: Are your aliases really necessary? In this paper, we count the cost of programming with strong object encapsulation. We refactored the JDK 5.0 collection classes so that they did not use incoming aliases, following either the owner-as-dominator or the owner-as-accessor encapsulation discipline. We measured the performance time overhead the refactored collections impose on a set of microbenchmarks and on the DaCapo, SPECjbb and SPECjvm benchmark suites. While the microbenchmarks show that individual operations and iterations can be significantly slower on encapsulated collection (especially for owner-as-dominator), we found less than 3% slowdown for owner-as-accessor across the large scale benchmarks. As a result, we propose that well-known design patterns such as Iterator commonly used by software engineers around the world need to be adjusted to take ownership into account. As most design patterns are used as a building block in constructing larger pieces of software, a small adjustment to respect ownership will not have any impact on the productivity of programmers but will have a huge impact on the quality of the resulting code with respect to aliasing.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An observable and controllable testing framework for modern systems 现代系统的可观察可控测试框架
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606721
Tingting Yu
Modern computer systems are prone to various classes of runtime faults due to their reliance on features such as concurrency and peripheral devices such as sensors. Testing remains a common method for uncovering faults in these systems. However, commonly used testing techniques that execute the program with test inputs and inspect program outputs to detect failures are often ineffective. To test for concurrency and temporal faults, test engineers need to be able to observe faults as they occur instead of relying on observable incorrect outputs. Furthermore, they need to be able to control thread or process interleavings so that they are deterministic. This research will provide a framework that allows engineers to effectively test for subtle and intermittent faults in modern systems by providing them with greater observability and controllability.
现代计算机系统由于依赖于诸如并发和诸如传感器之类的外围设备等特性,容易出现各种类型的运行时故障。测试仍然是发现这些系统中故障的常用方法。然而,通常使用的使用测试输入执行程序并检查程序输出以检测故障的测试技术通常是无效的。为了测试并发性和时间错误,测试工程师需要能够在错误发生时观察到它们,而不是依赖于可观察到的错误输出。此外,它们需要能够控制线程或进程交织,以便它们是确定的。这项研究将提供一个框架,允许工程师通过提供更大的可观察性和可控性,有效地测试现代系统中的细微和间歇性故障。
{"title":"An observable and controllable testing framework for modern systems","authors":"Tingting Yu","doi":"10.1109/ICSE.2013.6606721","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606721","url":null,"abstract":"Modern computer systems are prone to various classes of runtime faults due to their reliance on features such as concurrency and peripheral devices such as sensors. Testing remains a common method for uncovering faults in these systems. However, commonly used testing techniques that execute the program with test inputs and inspect program outputs to detect failures are often ineffective. To test for concurrency and temporal faults, test engineers need to be able to observe faults as they occur instead of relying on observable incorrect outputs. Furthermore, they need to be able to control thread or process interleavings so that they are deterministic. This research will provide a framework that allows engineers to effectively test for subtle and intermittent faults in modern systems by providing them with greater observability and controllability.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards recognizing and rewarding efficient developer work patterns 致力于识别和奖励高效的开发人员工作模式
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606697
W. Snipes, Vinay Augustine, Anil R. Nair, E. Murphy-Hill
Software engineering researchers develop great techniques consisting of practices and tools that improve efficiency and quality of software development. Prior work evaluates developers' use of techniques such as Test-Driven-Development and refactoring by measuring actions in the development environment. What we still lack is a method to communicate effectively and motivate developers to adopt best practices and tools. This work proposes a game-like system to motivate adoption while continuously measuring developers' use of more efficient development techniques.
软件工程研究人员开发了大量的技术,包括提高软件开发效率和质量的实践和工具。先前的工作通过测量开发环境中的操作来评估开发人员对测试驱动开发和重构等技术的使用。我们仍然缺乏的是一种有效沟通和激励开发人员采用最佳实践和工具的方法。这项工作提出了一个类似游戏的系统来激励采用,同时不断衡量开发人员对更有效的开发技术的使用。
{"title":"Towards recognizing and rewarding efficient developer work patterns","authors":"W. Snipes, Vinay Augustine, Anil R. Nair, E. Murphy-Hill","doi":"10.1109/ICSE.2013.6606697","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606697","url":null,"abstract":"Software engineering researchers develop great techniques consisting of practices and tools that improve efficiency and quality of software development. Prior work evaluates developers' use of techniques such as Test-Driven-Development and refactoring by measuring actions in the development environment. What we still lack is a method to communicate effectively and motivate developers to adopt best practices and tools. This work proposes a game-like system to motivate adoption while continuously measuring developers' use of more efficient development techniques.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Building high assurance secure applications using security patterns for capability-based platforms 为基于功能的平台使用安全模式构建高保证的安全应用程序
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606727
Paul Rimba
Building high assurance secure applications requires the proper use of security mechanisms and assurances provided by the underlying secure platform. However, applications are often built using security patterns and best practices that are agnostic with respect to the intricate specifics of the different underlying platforms. This independence from the underlying platform leaves a gap between security patterns and underlying secure platforms. In this PhD research abstract, we propose a novel approach to bridge this gap. Specifically, we propose reusable capability-specific design fragments for security patterns, which are specialization for patterns in a capability-based system. The focus is on systems that adhere to a capability-based security model, which we consider as the underlying platforms, to provide desired application-wide security properties. We also discuss assumptions and levels of assurance for these reusable designs and their use in the verification of application designs.
构建高保证安全的应用程序需要正确使用底层安全平台提供的安全机制和保证。然而,应用程序通常是使用安全模式和最佳实践构建的,这些模式和最佳实践与不同底层平台的复杂细节无关。这种与底层平台的独立性在安全模式和底层安全平台之间留下了一个缺口。在这篇博士研究摘要中,我们提出了一种新的方法来弥合这一差距。具体地说,我们为安全模式提出了可重用的特定于功能的设计片段,这是基于功能的系统中模式的专门化。重点是遵循基于功能的安全模型的系统,我们将其视为底层平台,以提供所需的应用程序范围的安全属性。我们还讨论了这些可重用设计的假设和保证级别,以及它们在验证应用程序设计中的使用。
{"title":"Building high assurance secure applications using security patterns for capability-based platforms","authors":"Paul Rimba","doi":"10.1109/ICSE.2013.6606727","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606727","url":null,"abstract":"Building high assurance secure applications requires the proper use of security mechanisms and assurances provided by the underlying secure platform. However, applications are often built using security patterns and best practices that are agnostic with respect to the intricate specifics of the different underlying platforms. This independence from the underlying platform leaves a gap between security patterns and underlying secure platforms. In this PhD research abstract, we propose a novel approach to bridge this gap. Specifically, we propose reusable capability-specific design fragments for security patterns, which are specialization for patterns in a capability-based system. The focus is on systems that adhere to a capability-based security model, which we consider as the underlying platforms, to provide desired application-wide security properties. We also discuss assumptions and levels of assurance for these reusable designs and their use in the verification of application designs.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123333074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enabling a classroom design studio with a collaborative sketch design tool 启用教室设计工作室与协作草图设计工具
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606657
Dastyni Loksa, Nicolas Mangano, Thomas D. Latoza, A. Hoek
The use of a studio approach - a hands-on teaching method that emphasizes in-class discussion and activities - is becoming an increasingly accepted method of teaching within software engineering. In such studios, emphasis is placed not only on the artifacts to be produced, but also on the process used to arrive at those artifacts. In this paper, we introduce Calico, a sketch-based collaborative software design tool, and discuss how it supports the delivery of a studio approach to software design education. We particularly describe our experiences with Calico in Software Design I, a course aimed at introducing students to the early, creative phases of software design. Our results show that Calico enabled students to work effectively in teams on their design problems, quickly developing, refining, and evaluating their designs.
使用工作室方法——一种强调课堂讨论和活动的动手教学方法——正在成为软件工程中越来越被接受的教学方法。在这样的工作室中,重点不仅放在要生产的工件上,而且放在用于达到这些工件的过程上。在本文中,我们介绍了Calico,一个基于草图的协作软件设计工具,并讨论了它如何支持软件设计教育的工作室方法的交付。我们在软件设计I中特别描述了我们使用Calico的经验,这是一门旨在向学生介绍软件设计的早期创造性阶段的课程。我们的结果表明,Calico使学生能够有效地在团队中解决他们的设计问题,快速开发,改进和评估他们的设计。
{"title":"Enabling a classroom design studio with a collaborative sketch design tool","authors":"Dastyni Loksa, Nicolas Mangano, Thomas D. Latoza, A. Hoek","doi":"10.1109/ICSE.2013.6606657","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606657","url":null,"abstract":"The use of a studio approach - a hands-on teaching method that emphasizes in-class discussion and activities - is becoming an increasingly accepted method of teaching within software engineering. In such studios, emphasis is placed not only on the artifacts to be produced, but also on the process used to arrive at those artifacts. In this paper, we introduce Calico, a sketch-based collaborative software design tool, and discuss how it supports the delivery of a studio approach to software design education. We particularly describe our experiences with Calico in Software Design I, a course aimed at introducing students to the early, creative phases of software design. Our results show that Calico enabled students to work effectively in teams on their design problems, quickly developing, refining, and evaluating their designs.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124303291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Fostering software quality assessment 促进软件质量评估
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606725
M. Brandtner
Software quality assessment shall monitor and guide the evolution of a system based on quality measurements. This continuous process should ideally involve multiple stakeholders and provide adequate information for each of them to use. We want to support an effective selection of quality measurements based on the type of software and individual information needs of the involved stakeholders. We propose an approach that brings together quality measurements and individual information needs for a context-sensitive tailoring of information related to a software quality assessment. We address the following research question: How can we better support different stakeholders in the quality assessment of a software system? For that we will devise theories, models, and prototypes to capture their individual information needs, tailor information from software repositories to these needs, and enable a contextual analysis of the quality aspects. Such a context-sensitive tailoring will provide a effective and individual view on the latest development trends in a project. We outline the milestones as well as evaluation approaches in this paper.
软件质量评估应监视和指导基于质量度量的系统的发展。理想情况下,这个持续的过程应该涉及多个涉众,并为他们每个人提供足够的信息。我们希望支持基于软件类型和相关涉众的个人信息需求的质量度量的有效选择。我们提出了一种方法,该方法将质量度量和个人信息需求结合在一起,以便对与软件质量评估相关的信息进行上下文敏感的剪裁。我们处理以下的研究问题:我们如何在软件系统的质量评估中更好地支持不同的涉众?为此,我们将设计理论、模型和原型来捕获他们的个人信息需求,根据这些需求定制软件存储库中的信息,并启用质量方面的上下文分析。这种对上下文敏感的裁剪将为项目的最新发展趋势提供有效和个性化的视图。我们在本文中概述了里程碑以及评估方法。
{"title":"Fostering software quality assessment","authors":"M. Brandtner","doi":"10.1109/ICSE.2013.6606725","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606725","url":null,"abstract":"Software quality assessment shall monitor and guide the evolution of a system based on quality measurements. This continuous process should ideally involve multiple stakeholders and provide adequate information for each of them to use. We want to support an effective selection of quality measurements based on the type of software and individual information needs of the involved stakeholders. We propose an approach that brings together quality measurements and individual information needs for a context-sensitive tailoring of information related to a software quality assessment. We address the following research question: How can we better support different stakeholders in the quality assessment of a software system? For that we will devise theories, models, and prototypes to capture their individual information needs, tailor information from software repositories to these needs, and enable a contextual analysis of the quality aspects. Such a context-sensitive tailoring will provide a effective and individual view on the latest development trends in a project. We outline the milestones as well as evaluation approaches in this paper.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
X-PERT: Accurate identification of cross-browser issues in web applications X-PERT:准确识别web应用程序中的跨浏览器问题
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606616
Shauvik Roy Choudhary, M. Prasad, A. Orso
Due to the increasing popularity of web applications, and the number of browsers and platforms on which such applications can be executed, cross-browser incompatibilities (XBIs) are becoming a serious concern for organizations that develop web-based software. Most of the techniques for XBI detection developed to date are either manual, and thus costly and error-prone, or partial and imprecise, and thus prone to generating both false positives and false negatives. To address these limitations of existing techniques, we developed X-PERT, a new automated, precise, and comprehensive approach for XBI detection. X-PERT combines several new and existing differencing techniques and is based on our findings from an extensive study of XBIs in real-world web applications. The key strength of our approach is that it handles each aspects of a web application using the differencing technique that is best suited to accurately detect XBIs related to that aspect. Our empirical evaluation shows that X-PERT is effective in detecting real-world XBIs, improves on the state of the art, and can provide useful support to developers for the diagnosis and (eventually) elimination of XBIs.
由于web应用程序的日益普及,以及可以执行这些应用程序的浏览器和平台的数量,跨浏览器不兼容性(xbi)正成为开发基于web的软件的组织所严重关注的问题。迄今为止开发的大多数XBI检测技术要么是手动的,因此成本高昂且容易出错,要么是不完整且不精确的,因此容易产生假阳性和假阴性。为了解决现有技术的这些局限性,我们开发了X-PERT,这是一种新的自动化、精确和全面的XBI检测方法。X-PERT结合了几种新的和现有的差异技术,并基于我们对实际web应用程序中的xbi进行的广泛研究的发现。我们的方法的关键优势在于,它使用最适合准确检测与该方面相关的xbi的差分技术来处理web应用程序的每个方面。我们的经验评估表明,X-PERT在检测现实世界的xbi方面是有效的,改进了目前的技术水平,可以为开发人员提供诊断和(最终)消除xbi的有用支持。
{"title":"X-PERT: Accurate identification of cross-browser issues in web applications","authors":"Shauvik Roy Choudhary, M. Prasad, A. Orso","doi":"10.1109/ICSE.2013.6606616","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606616","url":null,"abstract":"Due to the increasing popularity of web applications, and the number of browsers and platforms on which such applications can be executed, cross-browser incompatibilities (XBIs) are becoming a serious concern for organizations that develop web-based software. Most of the techniques for XBI detection developed to date are either manual, and thus costly and error-prone, or partial and imprecise, and thus prone to generating both false positives and false negatives. To address these limitations of existing techniques, we developed X-PERT, a new automated, precise, and comprehensive approach for XBI detection. X-PERT combines several new and existing differencing techniques and is based on our findings from an extensive study of XBIs in real-world web applications. The key strength of our approach is that it handles each aspects of a web application using the differencing technique that is best suited to accurately detect XBIs related to that aspect. Our empirical evaluation shows that X-PERT is effective in detecting real-world XBIs, improves on the state of the art, and can provide useful support to developers for the diagnosis and (eventually) elimination of XBIs.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
Sketching software in the wild 野外写生软件
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606687
D. Socha, J. Tenenberg
This paper argues that understanding how professional software developers use diagrams and sketches in their work is an underexplored terrain. We illustrate this by summarizing a number of studies on sketching and diagramming across a variety of domains, and arguing for their limited generalizability. In order to develop further insight, we describe the design of a research project we are embarking upon and its grounding theoretical assumptions.
本文认为,理解专业软件开发人员如何在他们的工作中使用图表和草图是一个未被探索的领域。我们通过总结一些关于不同领域的素描和绘图的研究来说明这一点,并论证它们有限的普遍性。为了进一步深入了解,我们描述了我们正在着手的一个研究项目的设计及其基础理论假设。
{"title":"Sketching software in the wild","authors":"D. Socha, J. Tenenberg","doi":"10.1109/ICSE.2013.6606687","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606687","url":null,"abstract":"This paper argues that understanding how professional software developers use diagrams and sketches in their work is an underexplored terrain. We illustrate this by summarizing a number of studies on sketching and diagramming across a variety of domains, and arguing for their limited generalizability. In order to develop further insight, we describe the design of a research project we are embarking upon and its grounding theoretical assumptions.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121771055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Scaling agile methods to regulated environments: An industry case study 将敏捷方法扩展到受监管的环境:一个行业案例研究
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606635
Brian Fitzgerald, Klaas-Jan Stol, Ryan O'Sullivan, Donal O'Brien
Agile development methods are growing in popularity with a recent survey reporting that more than 80% of organizations now following an agile approach. Agile methods were seen initially as best suited to small, co-located teams developing non-critical systems. The first two constraining characteristics (small and co-located teams) have been addressed as research has emerged describing successful agile adoption involving large teams and distributed contexts. However, the applicability of agile methods for developing safety-critical systems in regulated environments has not yet been demonstrated unequivocally, and very little rigorous research exists in this area. Some of the essential characteristics of agile approaches appear to be incompatible with the constraints imposed by regulated environments. In this study we identify these tension points and illustrate through a detailed case study how an agile approach was implemented successfully in a regulated environment. Among the interesting concepts to emerge from the research are the notions of continuous compliance and living traceability.
敏捷开发方法越来越受欢迎,最近的一项调查报告显示,超过80%的组织正在采用敏捷方法。敏捷方法最初被认为最适合于小型的、位于同一地点的团队开发非关键系统。前两个约束特征(小型和位于同一地点的团队)在描述涉及大型团队和分布式环境的成功敏捷采用的研究中已经得到了解决。然而,敏捷方法在规范环境中开发安全关键系统的适用性尚未得到明确证明,并且在该领域存在很少严谨的研究。敏捷方法的一些基本特征似乎与受监管的环境所施加的约束不相容。在本研究中,我们确定了这些紧张点,并通过详细的案例研究说明了敏捷方法如何在受监管的环境中成功实施。从研究中出现的有趣概念包括持续遵从性和生活可追溯性的概念。
{"title":"Scaling agile methods to regulated environments: An industry case study","authors":"Brian Fitzgerald, Klaas-Jan Stol, Ryan O'Sullivan, Donal O'Brien","doi":"10.1109/ICSE.2013.6606635","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606635","url":null,"abstract":"Agile development methods are growing in popularity with a recent survey reporting that more than 80% of organizations now following an agile approach. Agile methods were seen initially as best suited to small, co-located teams developing non-critical systems. The first two constraining characteristics (small and co-located teams) have been addressed as research has emerged describing successful agile adoption involving large teams and distributed contexts. However, the applicability of agile methods for developing safety-critical systems in regulated environments has not yet been demonstrated unequivocally, and very little rigorous research exists in this area. Some of the essential characteristics of agile approaches appear to be incompatible with the constraints imposed by regulated environments. In this study we identify these tension points and illustrate through a detailed case study how an agile approach was implemented successfully in a regulated environment. Among the interesting concepts to emerge from the research are the notions of continuous compliance and living traceability.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 181
PorchLight: A tag-based approach to bug triaging PorchLight:基于标签的bug分类方法
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606580
Gerald Bortis, A. Hoek
Bug triaging is an important activity in any software development project. It involves developers working through the set of unassigned bugs, determining for each of the bugs whether it represents a new issue that should receive attention, and, if so, assigning it to a developer and a milestone. Current tools provide only minimal support for bug triaging and especially break down when developers must triage a large number of bug reports, since those reports can only be viewed one-by-one. This paper presents PorchLight, a novel tool that uses tags, attached to individual bug reports by queries expressed in a specialized bug query language, to organize bug reports into sets so developers can explore, work with, and ultimately assign bugs effectively in meaningful groups. We describe the challenges in supporting bug triaging, the design decisions upon which PorchLight rests, and the technical aspects of the implementation. We conclude with an early evaluation that involved six professional developers who assessed PorchLight and its potential for their day-to-day triaging duties.
在任何软件开发项目中,Bug分类都是一项重要的活动。它涉及开发人员处理一组未分配的错误,确定每个错误是否代表一个应该得到关注的新问题,如果是,则将其分配给开发人员和里程碑。当前的工具只提供了最低限度的错误分类支持,特别是当开发人员必须分类大量的错误报告时,因为这些报告只能逐一查看。本文介绍了一种新颖的工具PorchLight,它使用标签,通过用专门的bug查询语言表达的查询附加到单个bug报告上,将bug报告组织成一组,这样开发人员就可以在有意义的组中有效地探索、处理并最终分配bug。我们描述了支持bug分类的挑战,PorchLight所依赖的设计决策,以及实现的技术方面。我们在早期评估中总结了六个专业开发人员,他们评估了PorchLight及其在日常分类工作中的潜力。
{"title":"PorchLight: A tag-based approach to bug triaging","authors":"Gerald Bortis, A. Hoek","doi":"10.1109/ICSE.2013.6606580","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606580","url":null,"abstract":"Bug triaging is an important activity in any software development project. It involves developers working through the set of unassigned bugs, determining for each of the bugs whether it represents a new issue that should receive attention, and, if so, assigning it to a developer and a milestone. Current tools provide only minimal support for bug triaging and especially break down when developers must triage a large number of bug reports, since those reports can only be viewed one-by-one. This paper presents PorchLight, a novel tool that uses tags, attached to individual bug reports by queries expressed in a specialized bug query language, to organize bug reports into sets so developers can explore, work with, and ultimately assign bugs effectively in meaningful groups. We describe the challenges in supporting bug triaging, the design decisions upon which PorchLight rests, and the technical aspects of the implementation. We conclude with an early evaluation that involved six professional developers who assessed PorchLight and its potential for their day-to-day triaging duties.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
2013 35th International Conference on Software Engineering (ICSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1