首页 > 最新文献

International Conference on Software Maintenance, 2002. Proceedings.最新文献

英文 中文
A fine-grained version and configuration model in analysis and design 分析和设计中的细粒度版本和配置模型
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167813
Dirk Ohst, U. Kelter
In this paper we present a model of version and configuration management in the early phases of software development and an implementation of this model. We assume that software documents are modeled in a fine-grained way, that they are stored as syntax trees in XML files or a repository system, and that tools directly operate on these syntax trees. In contrast to file-based systems, structural changes in the document, e.g. the shifting of a method between two classes, can be identified in our model. Configurations allow us to manage groups of single modifications; such a group will mostly correspond to a specific design task or a similar activity. Configurations are thus a means to establish a connection to a change management system.
在本文中,我们提出了软件开发早期阶段的版本和配置管理模型以及该模型的实现。我们假设软件文档以细粒度的方式建模,它们以语法树的形式存储在XML文件或存储库系统中,并且工具直接操作这些语法树。与基于文件的系统相比,文档中的结构性变化,例如在两个类之间的方法转移,可以在我们的模型中识别出来。配置允许我们管理单个修改的组;这样的组通常对应于一个特定的设计任务或类似的活动。因此,配置是建立到变更管理系统的连接的一种方法。
{"title":"A fine-grained version and configuration model in analysis and design","authors":"Dirk Ohst, U. Kelter","doi":"10.1109/ICSM.2002.1167813","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167813","url":null,"abstract":"In this paper we present a model of version and configuration management in the early phases of software development and an implementation of this model. We assume that software documents are modeled in a fine-grained way, that they are stored as syntax trees in XML files or a repository system, and that tools directly operate on these syntax trees. In contrast to file-based systems, structural changes in the document, e.g. the shifting of a method between two classes, can be identified in our model. Configurations allow us to manage groups of single modifications; such a group will mostly correspond to a specific design task or a similar activity. Configurations are thus a means to establish a connection to a change management system.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Testability analysis for software components 软件组件的可测试性分析
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167799
N. T. Binh, M. Delaunay, C. Robach
In this paper, we propose to use the static single assignment form, which was originally proposed for code optimization in compilation techniques, in order to transform software components into a data-flow representation. Thus, hardware testability concepts can be used to analyze the testability of components that are described by C or Ada programs. Such a testability analysis helps designers during the specification phases of their components and testers during the testing phases to evaluate and eventually to modify the design.
在本文中,我们建议使用静态单赋值形式,它最初是为编译技术中的代码优化而提出的,以便将软件组件转换为数据流表示。因此,硬件可测试性概念可用于分析由C或Ada程序描述的组件的可测试性。这种可测试性分析可以帮助设计人员在其组件的规格说明阶段和测试人员在测试阶段评估并最终修改设计。
{"title":"Testability analysis for software components","authors":"N. T. Binh, M. Delaunay, C. Robach","doi":"10.1109/ICSM.2002.1167799","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167799","url":null,"abstract":"In this paper, we propose to use the static single assignment form, which was originally proposed for code optimization in compilation techniques, in order to transform software components into a data-flow representation. Thus, hardware testability concepts can be used to analyze the testability of components that are described by C or Ada programs. Such a testability analysis helps designers during the specification phases of their components and testers during the testing phases to evaluate and eventually to modify the design.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123484812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Constructing precise object relation diagrams 构建精确的对象关系图
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167823
Ana L. Milanova, A. Rountev, B. Ryder
The object relation diagram (ORD) of a program is a class interdependence diagram which has applications in a wide variety of software engineering problems (e.g., integration testing, integration coverage analysis, regression testing, impact analysis, program understanding, and reverse engineering). Because the imprecision of the ORD directly affects the practicality of its usage, it is important to investigate techniques for constructing precise ORDs. This paper makes three contributions. First, we develop the extended object relation diagram (ExtORD), a version of the ORD designed for use in integration coverage analysis. The ExtORD shows the specific statement that creates an interclass dependence, and can be easily constructed by extending techniques for ORD construction. Second, we develop a general algorithm for ORD construction, parameterized by class analysis. Third, we demonstrate empirically that relatively precise class analyses can significantly improve diagram precision compared to earlier work, resulting in average size reduction of 55% for the ORD and 39% for the ExtORD.
程序的对象关系图(ORD)是一个类相互依赖图,它在各种各样的软件工程问题中都有应用(例如,集成测试、集成覆盖分析、回归测试、影响分析、程序理解和逆向工程)。由于ORD的不精度直接影响其使用的实用性,因此研究构建精确ORD的技术是很重要的。本文有三个贡献。首先,我们开发了扩展对象关系图(ExtORD),这是ORD的一个版本,设计用于集成覆盖分析。敲诈显示了创建类间依赖的特定语句,并且可以通过扩展ORD构造技术轻松构造。其次,我们开发了一个通用的ORD构造算法,通过类分析参数化。第三,我们从经验上证明,相对精确的类分析可以显著提高图的精度,与早期的工作相比,ORD的平均大小减少了55%,敲诈d的平均大小减少了39%。
{"title":"Constructing precise object relation diagrams","authors":"Ana L. Milanova, A. Rountev, B. Ryder","doi":"10.1109/ICSM.2002.1167823","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167823","url":null,"abstract":"The object relation diagram (ORD) of a program is a class interdependence diagram which has applications in a wide variety of software engineering problems (e.g., integration testing, integration coverage analysis, regression testing, impact analysis, program understanding, and reverse engineering). Because the imprecision of the ORD directly affects the practicality of its usage, it is important to investigate techniques for constructing precise ORDs. This paper makes three contributions. First, we develop the extended object relation diagram (ExtORD), a version of the ORD designed for use in integration coverage analysis. The ExtORD shows the specific statement that creates an interclass dependence, and can be easily constructed by extending techniques for ORD construction. Second, we develop a general algorithm for ORD construction, parameterized by class analysis. Third, we demonstrate empirically that relatively precise class analyses can significantly improve diagram precision compared to earlier work, resulting in average size reduction of 55% for the ORD and 39% for the ExtORD.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
The principle of organizational maturity and E-type dynamics 组织成熟度原理与e型动力学
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167749
B. Curtis
The fundamental characteristic of an E-type system is its need to evolve to satisfy the needs of its users. Most approaches to system enhancements assume that a set of evolving requirements can be elicited from system clients that indicate their common needs at the time the requirements are elicited. However, decades of experience in requirements analysis and business process engineering indicates that client organizations frequently lack common processes for common business functions performed across the organization. Thus, the elicited requirements contain a cacophony of approaches used by different organizational units for performing the same business process. Therefore the requirements reflect the unnecessary complexity induced by a lack of process maturity. This complexity exacerbates the phenomena described by in the Laws of Software Evolution. The concepts underlying Watts Humphrey's Process Maturity Framework -best understood in its instantiation in the Capability Maturity Model (CMM)provide a way of predicting how organizational conditions will modulate the system's evolutionary trends as stated in Lehman's Laws of Software Evolution. Stated simply, the less mature the business processes automated in an E-type system, the greater the evolutionary effects described in the Laws of Software Evolution. Organizations with few or no stated processes will experience the greatest evolutionary impact in the system, since the specification of its enhancements will be little more precise than the ad hoc processes it is automating. Organizations that have local processes and procedures will have good local specifications, but their amalgamation into a system enhancement specification will be complex, since this amalgamation has not been previously worked out in the business processes being automated. An organization that has common business processes that can be tailored for local use has already performed much of the confusing, complex, and error prone work that would otherwise have to be worked out by the software requirements team. The more an organization has disciplined methods for improving its business processes and deploying the improvements across the organization in an orderly way, the more the organization will have control over the evolutionary effects described in the Laws of Software Evolution. In the most mature organizations, the control of system evolution and complexity is performed initially at the level of the business process, allowing the system to evolve as part of a planned improvement with built-in controls on complexity. Thus the level of evolutionary impact experienced in a system is modulated by the maturity of the business processes being automated.
e型系统的基本特征是它需要不断发展以满足用户的需要。大多数系统增强的方法都假设一组不断发展的需求可以从系统客户端引出,这些客户端在引出需求时指出它们的共同需求。然而,在需求分析和业务流程工程方面几十年的经验表明,客户组织经常缺乏跨组织执行的通用业务功能的通用流程。因此,得到的需求包含不同组织单位为执行相同的业务流程所使用的各种方法。因此,需求反映了由于缺乏过程成熟度而导致的不必要的复杂性。这种复杂性加剧了软件进化定律中描述的现象。Watts Humphrey的过程成熟度框架的基本概念——在能力成熟度模型(Capability Maturity Model, CMM)的实例中得到了最好的理解——提供了一种预测组织条件将如何调节雷曼软件演化定律中所述的系统演化趋势的方法。简单地说,在e型系统中自动化的业务过程越不成熟,软件进化定律中描述的进化效果就越大。具有很少或没有说明过程的组织将在系统中经历最大的演化影响,因为其增强的说明将不会比它正在自动化的特别过程更精确。拥有本地过程和过程的组织将拥有良好的本地规范,但是将它们合并到系统增强规范中将是复杂的,因为这种合并之前并没有在自动化的业务过程中完成。拥有可为本地使用量身定制的通用业务流程的组织已经执行了许多令人困惑、复杂和容易出错的工作,否则这些工作必须由软件需求团队来完成。一个组织在改进其业务过程和以有序的方式在整个组织中部署改进方面拥有的有纪律的方法越多,该组织就越能控制软件进化定律中描述的进化效果。在大多数成熟的组织中,对系统演化和复杂性的控制最初是在业务流程级别上执行的,允许系统演化为计划改进的一部分,并内置对复杂性的控制。因此,系统中所经历的进化影响的级别是由被自动化的业务流程的成熟度来调节的。
{"title":"The principle of organizational maturity and E-type dynamics","authors":"B. Curtis","doi":"10.1109/ICSM.2002.1167749","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167749","url":null,"abstract":"The fundamental characteristic of an E-type system is its need to evolve to satisfy the needs of its users. Most approaches to system enhancements assume that a set of evolving requirements can be elicited from system clients that indicate their common needs at the time the requirements are elicited. However, decades of experience in requirements analysis and business process engineering indicates that client organizations frequently lack common processes for common business functions performed across the organization. Thus, the elicited requirements contain a cacophony of approaches used by different organizational units for performing the same business process. Therefore the requirements reflect the unnecessary complexity induced by a lack of process maturity. This complexity exacerbates the phenomena described by in the Laws of Software Evolution. The concepts underlying Watts Humphrey's Process Maturity Framework -best understood in its instantiation in the Capability Maturity Model (CMM)provide a way of predicting how organizational conditions will modulate the system's evolutionary trends as stated in Lehman's Laws of Software Evolution. Stated simply, the less mature the business processes automated in an E-type system, the greater the evolutionary effects described in the Laws of Software Evolution. Organizations with few or no stated processes will experience the greatest evolutionary impact in the system, since the specification of its enhancements will be little more precise than the ad hoc processes it is automating. Organizations that have local processes and procedures will have good local specifications, but their amalgamation into a system enhancement specification will be complex, since this amalgamation has not been previously worked out in the business processes being automated. An organization that has common business processes that can be tailored for local use has already performed much of the confusing, complex, and error prone work that would otherwise have to be worked out by the software requirements team. The more an organization has disciplined methods for improving its business processes and deploying the improvements across the organization in an orderly way, the more the organization will have control over the evolutionary effects described in the Laws of Software Evolution. In the most mature organizations, the control of system evolution and complexity is performed initially at the level of the business process, allowing the system to evolve as part of a planned improvement with built-in controls on complexity. Thus the level of evolutionary impact experienced in a system is modulated by the maturity of the business processes being automated.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131822202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach to classify software maintenance requests 一种对软件维护请求进行分类的方法
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167756
G. D. Lucca, M. D. Penta, Sara Gradara
When a software system critical for an organization exhibits a problem during its operation, it is relevant to fix it in a short period of time, to avoid serious economical losses. The problem is therefore noticed by the organization in charge of the maintenance, and it should be correctly and quickly dispatched to the right maintenance team. We propose to automatically classify incoming maintenance requests (also said tickets), routing them to specialized maintenance teams. The final goal is to develop a router working around the clock, that, without human intervention, dispatches incoming tickets with the lowest misclassification error, measured with respect to a given routing policy. 6000 maintenance tickets from a large, multi-site, software system, spanning about two years of system in-field operation, were used to compare and assess the accuracy of different classification approaches (i.e., Vector Space model, Bayesian model, support vectors, classification trees and k-nearest neighbor classification). The application and the tickets were divided into eight areas and pre-classified by human experts. Preliminary results were encouraging, up to 84% of the incoming tickets were correctly classified.
当一个组织的关键软件系统在运行过程中出现问题时,需要在短时间内修复它,以避免严重的经济损失。因此,负责维护的组织应该注意到这个问题,并且应该正确、快速地将其分配给合适的维护团队。我们建议对传入的维护请求(也称为票证)进行自动分类,将它们路由到专门的维护团队。最终目标是开发一种全天候工作的路由器,在没有人为干预的情况下,根据给定的路由策略,以最低的错误分类错误调度传入票据。来自一个大型、多站点、软件系统的6000个维护单,跨越大约两年的系统现场运行,用于比较和评估不同分类方法(即向量空间模型、贝叶斯模型、支持向量、分类树和k近邻分类)的准确性。申请和门票被分为八个区域,并由人类专家预先分类。初步结果令人鼓舞,高达84%的入场门票被正确分类。
{"title":"An approach to classify software maintenance requests","authors":"G. D. Lucca, M. D. Penta, Sara Gradara","doi":"10.1109/ICSM.2002.1167756","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167756","url":null,"abstract":"When a software system critical for an organization exhibits a problem during its operation, it is relevant to fix it in a short period of time, to avoid serious economical losses. The problem is therefore noticed by the organization in charge of the maintenance, and it should be correctly and quickly dispatched to the right maintenance team. We propose to automatically classify incoming maintenance requests (also said tickets), routing them to specialized maintenance teams. The final goal is to develop a router working around the clock, that, without human intervention, dispatches incoming tickets with the lowest misclassification error, measured with respect to a given routing policy. 6000 maintenance tickets from a large, multi-site, software system, spanning about two years of system in-field operation, were used to compare and assess the accuracy of different classification approaches (i.e., Vector Space model, Bayesian model, support vectors, classification trees and k-nearest neighbor classification). The application and the tickets were divided into eight areas and pre-classified by human experts. Preliminary results were encouraging, up to 84% of the incoming tickets were correctly classified.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116395298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
A quantitative evaluation of maintainability enhancement by refactoring 通过重构增强可维护性的定量评估
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167822
Y. Kataoka, Takeo Imai, Hiroki Andou, T. Fukaya
Program refactoring is a technique to enhance the maintainability of a program. Although the concept itself is considered to be effective, there are few quantitative evaluation of its impact to the software maintainability. It is sometimes difficult to judge whether the refactoring in question should be applied or not without knowing the effect accurately. We propose a quantitative evaluation method to measure the maintainability enhancement effect of program refactoring. We focused on the coupling metrics to evaluate the refactoring effect. By comparing the coupling before and after the refactoring, we could evaluate the degree of maintainability enhancement. We applied our method to a certain program and showed that our method was really effective to quantify the refactoring effect and helped us to choose appropriate refactorings.
程序重构是一种增强程序可维护性的技术。虽然这个概念本身被认为是有效的,但很少有定量的评估它对软件可维护性的影响。如果不准确地知道重构的效果,有时很难判断是否应该应用重构。提出了一种量化评价方法来衡量程序重构的可维护性增强效果。我们关注耦合度量来评估重构效果。通过比较重构前后的耦合,我们可以评估可维护性增强的程度。我们将我们的方法应用到一个特定的程序中,结果表明我们的方法在量化重构效果方面非常有效,并帮助我们选择合适的重构。
{"title":"A quantitative evaluation of maintainability enhancement by refactoring","authors":"Y. Kataoka, Takeo Imai, Hiroki Andou, T. Fukaya","doi":"10.1109/ICSM.2002.1167822","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167822","url":null,"abstract":"Program refactoring is a technique to enhance the maintainability of a program. Although the concept itself is considered to be effective, there are few quantitative evaluation of its impact to the software maintainability. It is sometimes difficult to judge whether the refactoring in question should be applied or not without knowing the effect accurately. We propose a quantitative evaluation method to measure the maintainability enhancement effect of program refactoring. We focused on the coupling metrics to evaluate the refactoring effect. By comparing the coupling before and after the refactoring, we could evaluate the degree of maintainability enhancement. We applied our method to a certain program and showed that our method was really effective to quantify the refactoring effect and helped us to choose appropriate refactorings.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 207
Evaluating context-sensitive slicing and chopping 评估上下文敏感的切片和斩切
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167744
J. Krinke
We present an empirical evaluation of three context-sensitive slicing algorithms and five context-sensitive chopping algorithms, and compare them to context-insensitive methods. Besides the algorithms by Reps et al. (1994, 1995) and Agrawal (2001) we investigate six new algorithms based on variations of k-limited call strings and approximative chopping based on summary information. It turns out that chopping based on summary information may have a prohibitive complexity, and that approximate algorithms are almost as precise and much faster.
我们提出了三种上下文敏感的切片算法和五种上下文敏感的切割算法的经验评估,并将它们与上下文不敏感的方法进行比较。除了rep等人(1994,1995)和Agrawal(2001)的算法外,我们还研究了六种基于k限制呼叫字符串变化和基于摘要信息的近似截断的新算法。事实证明,基于汇总信息的切割可能具有令人望而却步的复杂性,而近似算法几乎同样精确,而且速度更快。
{"title":"Evaluating context-sensitive slicing and chopping","authors":"J. Krinke","doi":"10.1109/ICSM.2002.1167744","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167744","url":null,"abstract":"We present an empirical evaluation of three context-sensitive slicing algorithms and five context-sensitive chopping algorithms, and compare them to context-insensitive methods. Besides the algorithms by Reps et al. (1994, 1995) and Agrawal (2001) we investigate six new algorithms based on variations of k-limited call strings and approximative chopping based on summary information. It turns out that chopping based on summary information may have a prohibitive complexity, and that approximate algorithms are almost as precise and much faster.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Putting escape analysis to work for software testing 将逸出分析用于软件测试
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167800
Amie L. Souter, L. Pollock
Developed primarily for optimization of functional and object-oriented software, escape analysis discerns information to determine whether the lifetime of data exceeds its static scope. We demonstrate how to apply escape analysis to software engineering tasks. In particular we present novel software testing and retesting techniques for object-oriented software which utilize escape analysis. We exploit a combined pointer and escape analysis that is able to identify how individual objects allocated in one region of a program interact with other regions of a program. The analysis framework increases flexibility and scalability as testing coverage can be targeted to a specific arbitrary region of a program, followed by integration testing that can be focused on particular sets of objects escaping the region. We demonstrate how regression testing can be performed utilizing this framework. We believe such a flexible framework becomes increasingly beneficial as applications become more component-oriented.
转义分析主要是为了优化功能和面向对象的软件而开发的,它可以识别信息,以确定数据的生命周期是否超出其静态范围。我们演示了如何将escape分析应用于软件工程任务。特别地,我们提出了利用逸出分析的面向对象软件的新的软件测试和重测试技术。我们利用组合的指针和转义分析,能够识别在程序的一个区域中分配的单个对象如何与程序的其他区域交互。分析框架增加了灵活性和可伸缩性,因为测试覆盖可以针对程序的特定任意区域,随后集成测试可以集中在逃离该区域的特定对象集上。我们将演示如何利用此框架执行回归测试。我们相信,随着应用程序越来越面向组件,这种灵活的框架将变得越来越有益。
{"title":"Putting escape analysis to work for software testing","authors":"Amie L. Souter, L. Pollock","doi":"10.1109/ICSM.2002.1167800","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167800","url":null,"abstract":"Developed primarily for optimization of functional and object-oriented software, escape analysis discerns information to determine whether the lifetime of data exceeds its static scope. We demonstrate how to apply escape analysis to software engineering tasks. In particular we present novel software testing and retesting techniques for object-oriented software which utilize escape analysis. We exploit a combined pointer and escape analysis that is able to identify how individual objects allocated in one region of a program interact with other regions of a program. The analysis framework increases flexibility and scalability as testing coverage can be targeted to a specific arbitrary region of a program, followed by integration testing that can be focused on particular sets of objects escaping the region. We demonstrate how regression testing can be performed utilizing this framework. We believe such a flexible framework becomes increasingly beneficial as applications become more component-oriented.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Path profile-based dynamic impact analysis 基于路径轮廓的动态影响分析
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167776
James Law, G. Rothermel
{"title":"Path profile-based dynamic impact analysis","authors":"James Law, G. Rothermel","doi":"10.1109/ICSM.2002.1167776","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167776","url":null,"abstract":"","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127973857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling the cost-benefits tradeoffs for regression testing techniques 对回归测试技术的成本效益权衡进行建模
Pub Date : 2002-10-03 DOI: 10.1109/ICSM.2002.1167767
Alexey G. Malishevsky, G. Rothermel, Sebastian G. Elbaum
Regression testing is an expensive activity that can account for a large proportion of the software maintenance budget. Because engineers add tests into test suites as software evolves, over time, increased test suite size makes revalidation of the software more expensive. Regression test selection, test suite reduction, and test case prioritization techniques can help with this, by reducing the number of regression tests that must be run and by helping testers meet testing objectives more quickly. These techniques, however can be expensive to employ and may not reduce overall regression testing costs. Thus, practitioners and researchers could benefit from cost models that would help them assess the cost-benefits of techniques. Cost models have been proposed for this purpose, but some of these models omit important factors, and others cannot truly evaluate cost-effectiveness. In this paper, we present new cost-benefits models for regression test selection, test suite reduction, and test case prioritization, that capture previously omitted factors, and support cost-benefits analyses where they were not supported before. We present the results of an empirical study assessing these models.
回归测试是一项昂贵的活动,可以占软件维护预算的很大一部分。因为随着软件的发展,工程师将测试添加到测试套件中,随着时间的推移,测试套件大小的增加使得软件的重新验证更加昂贵。回归测试选择、测试套件缩减和测试用例优先级排序技术可以通过减少必须运行的回归测试的数量和帮助测试人员更快地满足测试目标来帮助实现这一点。然而,这些技术的使用可能是昂贵的,并且可能不会降低总体回归测试成本。因此,从业者和研究人员可以从成本模型中受益,这些模型将帮助他们评估技术的成本效益。为此目的提出了成本模型,但其中一些模型忽略了重要因素,而另一些模型无法真正评估成本效益。在本文中,我们为回归测试选择、测试套件缩减和测试用例优先化提出了新的成本收益模型,这些模型捕获了以前被忽略的因素,并在以前不被支持的地方支持成本收益分析。我们提出了一项评估这些模型的实证研究结果。
{"title":"Modeling the cost-benefits tradeoffs for regression testing techniques","authors":"Alexey G. Malishevsky, G. Rothermel, Sebastian G. Elbaum","doi":"10.1109/ICSM.2002.1167767","DOIUrl":"https://doi.org/10.1109/ICSM.2002.1167767","url":null,"abstract":"Regression testing is an expensive activity that can account for a large proportion of the software maintenance budget. Because engineers add tests into test suites as software evolves, over time, increased test suite size makes revalidation of the software more expensive. Regression test selection, test suite reduction, and test case prioritization techniques can help with this, by reducing the number of regression tests that must be run and by helping testers meet testing objectives more quickly. These techniques, however can be expensive to employ and may not reduce overall regression testing costs. Thus, practitioners and researchers could benefit from cost models that would help them assess the cost-benefits of techniques. Cost models have been proposed for this purpose, but some of these models omit important factors, and others cannot truly evaluate cost-effectiveness. In this paper, we present new cost-benefits models for regression test selection, test suite reduction, and test case prioritization, that capture previously omitted factors, and support cost-benefits analyses where they were not supported before. We present the results of an empirical study assessing these models.","PeriodicalId":385190,"journal":{"name":"International Conference on Software Maintenance, 2002. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2002-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127766735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
期刊
International Conference on Software Maintenance, 2002. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1