首页 > 最新文献

2013 35th International Conference on Software Engineering (ICSE)最新文献

英文 中文
V:Issue:lizer: Exploring requirements clarification in online communication over time V:Issue:lizer:随着时间的推移,探索在线交流中的需求澄清
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606709
E. Knauss, D. Damian
This demo introduces V:ISSUE:LIZER, a tool for exploring online communication and analyzing clarification of requirements over time. V:Issue:lizer supports managers and developers to identify requirements with insufficient shared understanding, to analyze communication problems, and to identify developers that are knowledgeable about domain or project related issues through visualizations. Our preliminary evaluation shows that V:Issue:lizer offers managers valuable information for their decision making. (Demo video: http://youtu.be/Oy3xvzjy3BQ).
这个演示介绍了V:ISSUE:LIZER,一个用于探索在线交流和分析需求澄清的工具。V:Issue:lizer支持管理人员和开发人员在缺乏共同理解的情况下识别需求,分析沟通问题,并通过可视化识别对领域或项目相关问题有知识的开发人员。我们的初步评估表明,V:Issue:lizer为管理者的决策提供了有价值的信息。(演示视频:http://youtu.be/Oy3xvzjy3BQ)。
{"title":"V:Issue:lizer: Exploring requirements clarification in online communication over time","authors":"E. Knauss, D. Damian","doi":"10.1109/ICSE.2013.6606709","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606709","url":null,"abstract":"This demo introduces V:ISSUE:LIZER, a tool for exploring online communication and analyzing clarification of requirements over time. V:Issue:lizer supports managers and developers to identify requirements with insufficient shared understanding, to analyze communication problems, and to identify developers that are knowledgeable about domain or project related issues through visualizations. Our preliminary evaluation shows that V:Issue:lizer offers managers valuable information for their decision making. (Demo video: http://youtu.be/Oy3xvzjy3BQ).","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Billions and billions of constraints: Whitebox fuzz testing in production 数以十亿计的约束:生产中的白盒模糊测试
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606558
E. Bounimova, Patrice Godefroid, D. Molnar
We report experiences with constraint-based whitebox fuzz testing in production across hundreds of large Windows applications and over 500 machine years of computation from 2007 to 2013. Whitebox fuzzing leverages symbolic execution on binary traces and constraint solving to construct new inputs to a program. These inputs execute previously uncovered paths or trigger security vulnerabilities. Whitebox fuzzing has found one-third of all file fuzzing bugs during the development of Windows 7, saving millions of dollars in potential security vulnerabilities. The technique is in use today across multiple products at Microsoft. We describe key challenges with running whitebox fuzzing in production. We give principles for addressing these challenges and describe two new systems built from these principles: SAGAN, which collects data from every fuzzing run for further analysis, and JobCenter, which controls deployment of our whitebox fuzzing infrastructure across commodity virtual machines. Since June 2010, SAGAN has logged over 3.4 billion constraints solved, millions of symbolic executions, and tens of millions of test cases generated. Our work represents the largest scale deployment of whitebox fuzzing to date, including the largest usage ever for a Satisfiability Modulo Theories (SMT) solver. We present specific data analyses that improved our production use of whitebox fuzzing. Finally we report data on the performance of constraint solving and dynamic test generation that points toward future research problems.
我们报告了在生产环境中使用基于约束的白盒模糊测试的经验,这些测试涵盖了数百个大型Windows应用程序和从2007年到2013年超过500台机器年的计算。白盒模糊测试利用二进制跟踪的符号执行和约束求解来构造程序的新输入。这些输入执行以前未发现的路径或触发安全漏洞。在Windows 7的开发过程中,白盒模糊测试已经发现了三分之一的文件模糊错误,为潜在的安全漏洞节省了数百万美元。如今,微软的多个产品都在使用这种技术。我们描述了在生产环境中运行白盒模糊测试的主要挑战。我们给出了解决这些挑战的原则,并描述了根据这些原则构建的两个新系统:SAGAN,它从每次模糊测试运行中收集数据以进行进一步分析,以及JobCenter,它控制跨商品虚拟机的白盒模糊测试基础设施的部署。自2010年6月以来,SAGAN已经记录了超过34亿个解决的约束,数百万个符号执行,以及生成的数千万个测试用例。我们的工作代表了迄今为止白盒模糊测试的最大规模部署,包括对可满足模理论(SMT)求解器的最大使用。我们提出了具体的数据分析,改进了我们对白盒模糊测试的生产使用。最后,我们报告了约束求解和动态测试生成性能的数据,指出了未来的研究问题。
{"title":"Billions and billions of constraints: Whitebox fuzz testing in production","authors":"E. Bounimova, Patrice Godefroid, D. Molnar","doi":"10.1109/ICSE.2013.6606558","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606558","url":null,"abstract":"We report experiences with constraint-based whitebox fuzz testing in production across hundreds of large Windows applications and over 500 machine years of computation from 2007 to 2013. Whitebox fuzzing leverages symbolic execution on binary traces and constraint solving to construct new inputs to a program. These inputs execute previously uncovered paths or trigger security vulnerabilities. Whitebox fuzzing has found one-third of all file fuzzing bugs during the development of Windows 7, saving millions of dollars in potential security vulnerabilities. The technique is in use today across multiple products at Microsoft. We describe key challenges with running whitebox fuzzing in production. We give principles for addressing these challenges and describe two new systems built from these principles: SAGAN, which collects data from every fuzzing run for further analysis, and JobCenter, which controls deployment of our whitebox fuzzing infrastructure across commodity virtual machines. Since June 2010, SAGAN has logged over 3.4 billion constraints solved, millions of symbolic executions, and tens of millions of test cases generated. Our work represents the largest scale deployment of whitebox fuzzing to date, including the largest usage ever for a Satisfiability Modulo Theories (SMT) solver. We present specific data analyses that improved our production use of whitebox fuzzing. Finally we report data on the performance of constraint solving and dynamic test generation that points toward future research problems.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132407804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 172
2nd SEMAT workshop on a general theory of software engineering (GTSE 2013) 第二届SEMAT软件工程一般理论研讨会(GTSE 2013)
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606769
Pontus Johnson, I. Jacobson, M. Goedicke, M. Kajko-Mattsson
Most academic disciplines emphasize the importance of their general theories. Examples of well-known general theories include the Big Bang theory, Maxwell's equations, the theory of the cell, the theory of evolution, and the theory of demand and supply. Less known to the wider audience, but established within their respective fields, are theories with names such as the general theory of crime and the theory of marriage. Few general theories of software engineering have, however, been proposed, and none have achieved significant recognition. This workshop, organized by the SEMAT initiative, aims to provide a forum for discussing the concept of a general theory of software engineering. The topics considered include the benefits, the desired qualities, the core components and the form of a such a theory.
大多数学科都强调其一般理论的重要性。著名的一般理论的例子包括大爆炸理论、麦克斯韦方程、细胞理论、进化论和供求理论。不为广大观众所知,但在各自的领域内建立了一些理论,如犯罪一般理论和婚姻理论。然而,很少有软件工程的一般理论被提出,而且没有一个得到显著的认可。本次研讨会由SEMAT倡议组织,旨在提供一个讨论软件工程一般理论概念的论坛。考虑的主题包括这样一个理论的好处,期望的质量,核心组成部分和形式。
{"title":"2nd SEMAT workshop on a general theory of software engineering (GTSE 2013)","authors":"Pontus Johnson, I. Jacobson, M. Goedicke, M. Kajko-Mattsson","doi":"10.1109/ICSE.2013.6606769","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606769","url":null,"abstract":"Most academic disciplines emphasize the importance of their general theories. Examples of well-known general theories include the Big Bang theory, Maxwell's equations, the theory of the cell, the theory of evolution, and the theory of demand and supply. Less known to the wider audience, but established within their respective fields, are theories with names such as the general theory of crime and the theory of marriage. Few general theories of software engineering have, however, been proposed, and none have achieved significant recognition. This workshop, organized by the SEMAT initiative, aims to provide a forum for discussing the concept of a general theory of software engineering. The topics considered include the benefits, the desired qualities, the core components and the form of a such a theory.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130506324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Broken sets in software repository evolution 软件存储库演化中的破碎集
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606587
Jérôme Vouillon, R. D. Cosmo
Modern software systems are built by composing components drawn from large repositories, whose size and complexity increase at a fast pace. Software systems built with components from a release of a repository should be seamlessly upgradeable using components from the next release. Unfortunately, users are often confronted with sets of components that were installed together, but cannot be upgraded together to the latest version from the new repository. Identifying these broken sets can be of great help for a quality assurance team, that could examine and fix these issues well before they reach the end user. Building on previous work on component co-installability, we show that it is possible to find these broken sets for any two releases of a component repository, computing extremely efficiently a concise representation of these upgrade issues, together with informative graphical explanations. A tool implementing the algorithm presented in this paper is available as free software, and is able to process the evolution between two major releases of the Debian GNU/Linux distribution in just a few seconds. These results make it possible to integrate seamlessly this analysis in a repository development process.
现代软件系统是通过组合从大型存储库中提取的组件来构建的,这些存储库的大小和复杂性都在快速增长。使用存储库发行版中的组件构建的软件系统应该可以使用下一个发行版中的组件无缝升级。不幸的是,用户经常会遇到一起安装的组件集,但不能从新的存储库一起升级到最新版本。识别这些故障集对质量保证团队有很大帮助,他们可以在问题到达最终用户之前检查并解决这些问题。基于之前关于组件共安装性的工作,我们展示了可以为组件存储库的任何两个版本找到这些破损集,非常有效地计算出这些升级问题的简明表示,以及信息丰富的图形解释。实现本文中提出的算法的工具可以作为免费软件获得,并且能够在几秒钟内处理Debian GNU/Linux发行版的两个主要版本之间的演变。这些结果使得在存储库开发过程中无缝地集成这种分析成为可能。
{"title":"Broken sets in software repository evolution","authors":"Jérôme Vouillon, R. D. Cosmo","doi":"10.1109/ICSE.2013.6606587","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606587","url":null,"abstract":"Modern software systems are built by composing components drawn from large repositories, whose size and complexity increase at a fast pace. Software systems built with components from a release of a repository should be seamlessly upgradeable using components from the next release. Unfortunately, users are often confronted with sets of components that were installed together, but cannot be upgraded together to the latest version from the new repository. Identifying these broken sets can be of great help for a quality assurance team, that could examine and fix these issues well before they reach the end user. Building on previous work on component co-installability, we show that it is possible to find these broken sets for any two releases of a component repository, computing extremely efficiently a concise representation of these upgrade issues, together with informative graphical explanations. A tool implementing the algorithm presented in this paper is available as free software, and is able to process the evolution between two major releases of the Debian GNU/Linux distribution in just a few seconds. These results make it possible to integrate seamlessly this analysis in a repository development process.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123025878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Strategies for product-line verification: Case studies and experiments 产品线验证策略:案例研究和实验
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606594
S. Apel, Alexander von Rhein, Philipp Wendler, Armin Größlinger, Dirk Beyer
Product-line technology is increasingly used in mission-critical and safety-critical applications. Hence, researchers are developing verification approaches that follow different strategies to cope with the specific properties of product lines. While the research community is discussing the mutual strengths and weaknesses of the different strategies - mostly at a conceptual level - there is a lack of evidence in terms of case studies, tool implementations, and experiments. We have collected and prepared six product lines as subject systems for experimentation. Furthermore, we have developed a model-checking tool chain for C-based and Java-based product lines, called SPLverifier, which we use to compare sample-based and family-based strategies with regard to verification performance and the ability to find defects. Based on the experimental results and an analytical model, we revisit the discussion of the strengths and weaknesses of product-line-verification strategies.
产品线技术越来越多地用于关键任务和安全关键应用。因此,研究人员正在开发验证方法,遵循不同的策略来处理产品线的特定属性。虽然研究界正在讨论不同策略的相互优势和劣势——主要是在概念层面上——但在案例研究、工具实现和实验方面缺乏证据。我们收集并准备了6条产品线作为实验的主题系统。此外,我们已经为基于c和基于java的产品线开发了一个模型检查工具链,称为SPLverifier,我们使用它来比较基于样本和基于家族的策略在验证性能和发现缺陷的能力方面的差异。基于实验结果和分析模型,我们重新讨论了产品线验证策略的优缺点。
{"title":"Strategies for product-line verification: Case studies and experiments","authors":"S. Apel, Alexander von Rhein, Philipp Wendler, Armin Größlinger, Dirk Beyer","doi":"10.1109/ICSE.2013.6606594","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606594","url":null,"abstract":"Product-line technology is increasingly used in mission-critical and safety-critical applications. Hence, researchers are developing verification approaches that follow different strategies to cope with the specific properties of product lines. While the research community is discussing the mutual strengths and weaknesses of the different strategies - mostly at a conceptual level - there is a lack of evidence in terms of case studies, tool implementations, and experiments. We have collected and prepared six product lines as subject systems for experimentation. Furthermore, we have developed a model-checking tool chain for C-based and Java-based product lines, called SPLverifier, which we use to compare sample-based and family-based strategies with regard to verification performance and the ability to find defects. Based on the experimental results and an analytical model, we revisit the discussion of the strengths and weaknesses of product-line-verification strategies.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
4th International workshop on Emerging Trends in Software Metrics (WETSoM 2013) 第四届软件度量新趋势国际研讨会(2013)
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606787
S. Counsell, M. Marchesi, E. Tempero, C. A. Visaggio
The International Workshop on Emerging Trends in Software Metrics aims at gathering together researchers and practitioners to discuss the progress of software metrics. The motivation for this workshop is the low impact that software metrics has on current software development. The goals of this workshop includes critically examining the evidence for the effectiveness of existing metrics and identifying new directions for metrics. Evidence for existing metrics includes how the metrics have been used in practice and studies showing their effectiveness. Identifying new directions includes use of new theories, such as complex network theory, on which to base metrics.
关于软件度量新趋势的国际研讨会旨在将研究人员和实践者聚集在一起讨论软件度量的进展。这个研讨会的动机是软件度量对当前软件开发的影响很小。本次研讨会的目标包括严格检查现有度量标准有效性的证据,并确定度量标准的新方向。现有度量标准的证据包括度量标准在实践中的使用情况以及显示其有效性的研究。确定新的方向包括使用新的理论,如复杂网络理论,以此为基础的指标。
{"title":"4th International workshop on Emerging Trends in Software Metrics (WETSoM 2013)","authors":"S. Counsell, M. Marchesi, E. Tempero, C. A. Visaggio","doi":"10.1109/ICSE.2013.6606787","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606787","url":null,"abstract":"The International Workshop on Emerging Trends in Software Metrics aims at gathering together researchers and practitioners to discuss the progress of software metrics. The motivation for this workshop is the low impact that software metrics has on current software development. The goals of this workshop includes critically examining the evidence for the effectiveness of existing metrics and identifying new directions for metrics. Evidence for existing metrics includes how the metrics have been used in practice and studies showing their effectiveness. Identifying new directions includes use of new theories, such as complex network theory, on which to base metrics.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feedback-directed unit test generation for C/C++ using concolic execution 使用concolic执行的C/ c++的反馈导向单元测试生成
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606559
P. Garg, Franjo Ivancic, Gogul Balakrishnan, Naoto Maeda, Aarti Gupta
In industry, software testing and coverage-based metrics are the predominant techniques to check correctness of software. This paper addresses automatic unit test generation for programs written in C/C++. The main idea is to improve the coverage obtained by feedback-directed random test generation methods, by utilizing concolic execution on the generated test drivers. Furthermore, for programs with numeric computations, we employ non-linear solvers in a lazy manner to generate new test inputs. These techniques significantly improve the coverage provided by a feedback-directed random unit testing framework, while retaining the benefits of full automation. We have implemented these techniques in a prototype platform, and describe promising experimental results on a number of C/C++ open source benchmarks.
在工业中,软件测试和基于覆盖率的度量是检查软件正确性的主要技术。本文讨论了用C/ c++编写的程序的自动单元测试生成。主要思想是通过在生成的测试驱动程序上使用聚合执行来提高由反馈导向的随机测试生成方法获得的覆盖率。此外,对于具有数值计算的程序,我们以一种惰性的方式使用非线性求解器来生成新的测试输入。这些技术显著地提高了由反馈导向的随机单元测试框架提供的覆盖率,同时保留了完全自动化的好处。我们已经在一个原型平台中实现了这些技术,并描述了在许多C/ c++开源基准测试中有希望的实验结果。
{"title":"Feedback-directed unit test generation for C/C++ using concolic execution","authors":"P. Garg, Franjo Ivancic, Gogul Balakrishnan, Naoto Maeda, Aarti Gupta","doi":"10.1109/ICSE.2013.6606559","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606559","url":null,"abstract":"In industry, software testing and coverage-based metrics are the predominant techniques to check correctness of software. This paper addresses automatic unit test generation for programs written in C/C++. The main idea is to improve the coverage obtained by feedback-directed random test generation methods, by utilizing concolic execution on the generated test drivers. Furthermore, for programs with numeric computations, we employ non-linear solvers in a lazy manner to generate new test inputs. These techniques significantly improve the coverage provided by a feedback-directed random unit testing framework, while retaining the benefits of full automation. We have implemented these techniques in a prototype platform, and describe promising experimental results on a number of C/C++ open source benchmarks.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
5th International workshop on Modeling in Software Engineering (MiSE 2013) 第五届软件工程建模国际研讨会(MiSE 2013)
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606772
J. Atlee, R. Baillargeon, M. Chechik, R. France, J. Gray, R. Paige, Bernhard Rumpe
Models are an important tool in conquering the increasing complexity of modern software systems. Key industries are strategically directing their development environments towards more extensive use of modeling techniques. This workshop sought to understand, through critical analysis, the current and future uses of models in the engineering of software-intensive systems. The MISE-workshop series has proven to be an effective forum for discussing modeling techniques from the MDD and the software engineering perspectives. An important goal of this workshop was to foster exchange between these two communities. The 2013 Modeling in Software Engineering (MiSE) workshop was held at ICSE 2013 in San Francisco, California, during May 18–19, 2013. The focus this year was analysis of successful applications of modeling techniques in specific application domains to determine how experiences can be carried over to other domains. Details are available at: https://sselab.de/lab2/public/wiki/MiSE/index.php.
模型是克服现代软件系统日益增加的复杂性的重要工具。关键行业正在战略性地将其开发环境导向更广泛地使用建模技术。这个研讨会试图通过批判性的分析来理解模型在软件密集型系统工程中的当前和未来的应用。mse -workshop系列已经被证明是从MDD和软件工程的角度讨论建模技术的有效论坛。这次研讨会的一个重要目标是促进这两个社区之间的交流。2013年软件工程建模(MiSE)研讨会于2013年5月18日至19日在加州旧金山举行的ICSE 2013上举行。今年的重点是分析建模技术在特定应用领域的成功应用,以确定如何将经验转移到其他领域。详情请访问:https://sselab.de/lab2/public/wiki/MiSE/index.php。
{"title":"5th International workshop on Modeling in Software Engineering (MiSE 2013)","authors":"J. Atlee, R. Baillargeon, M. Chechik, R. France, J. Gray, R. Paige, Bernhard Rumpe","doi":"10.1109/ICSE.2013.6606772","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606772","url":null,"abstract":"Models are an important tool in conquering the increasing complexity of modern software systems. Key industries are strategically directing their development environments towards more extensive use of modeling techniques. This workshop sought to understand, through critical analysis, the current and future uses of models in the engineering of software-intensive systems. The MISE-workshop series has proven to be an effective forum for discussing modeling techniques from the MDD and the software engineering perspectives. An important goal of this workshop was to foster exchange between these two communities. The 2013 Modeling in Software Engineering (MiSE) workshop was held at ICSE 2013 in San Francisco, California, during May 18–19, 2013. The focus this year was analysis of successful applications of modeling techniques in specific application domains to determine how experiences can be carried over to other domains. Details are available at: https://sselab.de/lab2/public/wiki/MiSE/index.php.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121663227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the relationships between domain-based coupling and code clones: An exploratory study 基于域的耦合与代码克隆关系的探索性研究
Pub Date : 2013-05-18 DOI: 10.5555/2486788.2486980
M. S. Rahman, Amir Aryani, C. Roy, F. Perin
Knowledge of similar code fragments, also known as code clones, is important to many software maintenance activities including bug fixing, refactoring, impact analysis and program comprehension. While a great deal of research has been conducted for finding techniques and implementing tools to identify code clones, little research has been done to analyze the relationships between code clones and other aspects of software. In this paper, we attempt to uncover the relationships between code clones and coupling among domain-level components. We report on a case study of a large-scale open source enterprise system, where we demonstrate that the probability of finding code clones among components with domain-based coupling is more than 90%. While such a probabilistic view does not replace a clone detection tool per se, it certainly has the potential to complement the existing tools by providing the probability of having code clones between software components. For example, it can both reduce the clone search space and provide a flexible and language independent way of focusing only on a specific part of the system. It can also provide a higher level of abstraction to look at the cloning relationships among software components.
了解类似的代码片段,也称为代码克隆,对许多软件维护活动都很重要,包括bug修复、重构、影响分析和程序理解。虽然已经进行了大量的研究来寻找识别代码克隆的技术和实现工具,但很少有研究来分析代码克隆与软件其他方面之间的关系。在本文中,我们试图揭示代码克隆和领域级组件之间的耦合之间的关系。我们报告了一个大型开源企业系统的案例研究,在这个案例中,我们证明了在具有基于域的耦合的组件之间发现代码克隆的概率超过90%。虽然这种概率视图本身并不能取代克隆检测工具,但它确实有可能通过提供软件组件之间代码克隆的概率来补充现有工具。例如,它既可以减少克隆搜索空间,又可以提供一种灵活的、与语言无关的方法,只关注系统的特定部分。它还可以提供更高层次的抽象来查看软件组件之间的克隆关系。
{"title":"On the relationships between domain-based coupling and code clones: An exploratory study","authors":"M. S. Rahman, Amir Aryani, C. Roy, F. Perin","doi":"10.5555/2486788.2486980","DOIUrl":"https://doi.org/10.5555/2486788.2486980","url":null,"abstract":"Knowledge of similar code fragments, also known as code clones, is important to many software maintenance activities including bug fixing, refactoring, impact analysis and program comprehension. While a great deal of research has been conducted for finding techniques and implementing tools to identify code clones, little research has been done to analyze the relationships between code clones and other aspects of software. In this paper, we attempt to uncover the relationships between code clones and coupling among domain-level components. We report on a case study of a large-scale open source enterprise system, where we demonstrate that the probability of finding code clones among components with domain-based coupling is more than 90%. While such a probabilistic view does not replace a clone detection tool per se, it certainly has the potential to complement the existing tools by providing the probability of having code clones between software components. For example, it can both reduce the clone search space and provide a flexible and language independent way of focusing only on a specific part of the system. It can also provide a higher level of abstraction to look at the cloning relationships among software components.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Why did this code change? 为什么这个代码会改变?
Pub Date : 2013-05-18 DOI: 10.1109/ICSE.2013.6606676
Sarah Rastkar, G. Murphy
When a developer works on code that is shared with other developers, she needs to know why the code has been changed in particular ways to avoid reintroducing bugs. A developer looking at a code change may have access to a short commit message or a link to a bug report which may provide detailed information about how the code changed but which often lacks information about what motivated the change. This motivational information can sometimes be found by piecing together information from a set of relevant project documents, but few developers have the time to find and read the right documentation. We propose the use of multi-document summarization techniques to generate a concise natural language description of why code changed so that a developer can choose the right course of action.
当开发人员处理与其他开发人员共享的代码时,他需要知道代码以特定方式更改的原因,以避免重新引入错误。查看代码更改的开发人员可能可以访问简短的提交消息或错误报告的链接,这些报告可能提供有关代码如何更改的详细信息,但通常缺乏有关更改动机的信息。这种激励信息有时可以通过从一组相关的项目文档中拼凑信息来找到,但是很少有开发人员有时间找到并阅读正确的文档。我们建议使用多文档摘要技术来生成代码变更原因的简明自然语言描述,以便开发人员可以选择正确的操作过程。
{"title":"Why did this code change?","authors":"Sarah Rastkar, G. Murphy","doi":"10.1109/ICSE.2013.6606676","DOIUrl":"https://doi.org/10.1109/ICSE.2013.6606676","url":null,"abstract":"When a developer works on code that is shared with other developers, she needs to know why the code has been changed in particular ways to avoid reintroducing bugs. A developer looking at a code change may have access to a short commit message or a link to a bug report which may provide detailed information about how the code changed but which often lacks information about what motivated the change. This motivational information can sometimes be found by piecing together information from a set of relevant project documents, but few developers have the time to find and read the right documentation. We propose the use of multi-document summarization techniques to generate a concise natural language description of why code changed so that a developer can choose the right course of action.","PeriodicalId":322423,"journal":{"name":"2013 35th International Conference on Software Engineering (ICSE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
2013 35th International Conference on Software Engineering (ICSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1