首页 > 最新文献

Journal of Software-Evolution and Process最新文献

英文 中文
Towards an ontology for process compliance with the (machinery) legislations 建立流程符合(机械)法规的本体论
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-28 DOI: 10.1002/smr.2728
Barbara Gallina, Gergő László Steierhoffer, Thomas Young Olesen, Eszter Parajdi, Mike Aarup

Legislations impose requirements on the manufacturing of machinery. Typically, these requirements are interpreted and refined by (domain-specific) technical committees and published in terms of standards. At the company level, these refined requirements are further interpreted, refined, and documented in terms of internal processes. Due to the proliferation of (interdependent) legislations and standards and the consequent increase of the cognitive complexity, at the company level, manual knowledge management is becoming more and more challenging and requires automated decision support. Despite the availability of approaches aimed at automating the decision support, no one offers a satisfactory solution. In this paper, we focus on knowledge management for process compliance and we propose a novel structured ontology. Our ontology aims at mastering (by dividing and conquering via tracing) the cognitive complexity of the compliance problem, when heterogeneous and sometimes geographically distributed knowledge-driven organizational structures (legal department, standardization department, etc.) are involved and need to communicate. We also illustrate the potential usefulness of our proposed ontology in the context of pumps manufacturing and safety process compliance with the Machinery Directive and related harmonized standards including EN 809:1998+A1. Specifically, first, we identify the competencies that characterize departments and interdepartment interactions, then we formulate an initial set of competency questions that translate those identified competencies, then we show how the ontology can be exploited to retrieve the answers to the questions and how the answers can be exploited to build a justification for compliance. Precisely, we propose an argumentation pattern given in two different argumentation notations, and we show how it can be partly instantiated by exploiting the returned answers. The illustration also partly covers the compliance with the Machinery Regulation, expected to replace the Machinery Directive by January 2027. Finally, we sketch our intended future work.

法律对机械制造提出了要求。通常,这些要求由(特定领域的)技术委员会进行解释和完善,并以标准的形式发布。在公司层面,这些细化的要求会在内部流程中得到进一步解释、细化和记录。由于(相互依存的)立法和标准激增,认知复杂性随之增加,在公司层面,人工知识管理变得越来越具有挑战性,需要自动化决策支持。尽管有很多旨在实现决策支持自动化的方法,但没有一种能提供令人满意的解决方案。在本文中,我们将重点放在流程合规的知识管理上,并提出了一种新颖的结构化本体。我们的本体论旨在掌握合规问题的认知复杂性(通过追踪进行划分和征服),当涉及到异构的、有时是分布在不同地域的知识驱动型组织结构(法律部门、标准化部门等)并需要进行沟通时,我们的本体论就会发挥作用。我们还以泵制造和安全流程是否符合机械指令和相关协调标准(包括 EN 809:1998+A1)为背景,说明了我们提出的本体论的潜在用途。具体来说,首先,我们确定了各部门和部门间互动的能力特征,然后,我们提出了一组初步的能力问题,对这些已确定的能力进行翻译,接着,我们展示了如何利用本体来检索问题的答案,以及如何利用这些答案来建立合规理由。准确地说,我们提出了一种以两种不同论证符号给出的论证模式,并展示了如何通过利用返回的答案将其部分实例化。该说明还部分涵盖了《机械条例》的合规性,该条例预计将于 2027 年 1 月取代《机械指令》。最后,我们简要介绍了今后打算开展的工作。
{"title":"Towards an ontology for process compliance with the (machinery) legislations","authors":"Barbara Gallina,&nbsp;Gergő László Steierhoffer,&nbsp;Thomas Young Olesen,&nbsp;Eszter Parajdi,&nbsp;Mike Aarup","doi":"10.1002/smr.2728","DOIUrl":"10.1002/smr.2728","url":null,"abstract":"<p>Legislations impose requirements on the manufacturing of machinery. Typically, these requirements are interpreted and refined by (domain-specific) technical committees and published in terms of standards. At the company level, these refined requirements are further interpreted, refined, and documented in terms of internal processes. Due to the proliferation of (interdependent) legislations and standards and the consequent increase of the cognitive complexity, at the company level, manual knowledge management is becoming more and more challenging and requires automated decision support. Despite the availability of approaches aimed at automating the decision support, no one offers a satisfactory solution. In this paper, we focus on knowledge management for process compliance and we propose a novel structured ontology. Our ontology aims at mastering (by dividing and conquering via tracing) the cognitive complexity of the compliance problem, when heterogeneous and sometimes geographically distributed knowledge-driven organizational structures (legal department, standardization department, etc.) are involved and need to communicate. We also illustrate the potential usefulness of our proposed ontology in the context of pumps manufacturing and safety process compliance with the Machinery Directive and related harmonized standards including EN 809:1998+A1. Specifically, first, we identify the competencies that characterize departments and interdepartment interactions, then we formulate an initial set of competency questions that translate those identified competencies, then we show how the ontology can be exploited to retrieve the answers to the questions and how the answers can be exploited to build a justification for compliance. Precisely, we propose an argumentation pattern given in two different argumentation notations, and we show how it can be partly instantiated by exploiting the returned answers. The illustration also partly covers the compliance with the Machinery Regulation, expected to replace the Machinery Directive by January 2027. Finally, we sketch our intended future work.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.2728","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142185446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NG_MDERANK: A software vulnerability feature knowledge extraction method based on N-gram similarity NG_MDERANK:基于 N-gram 相似性的软件漏洞特征知识提取方法
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-27 DOI: 10.1002/smr.2727
Xiaoxue Wu, Shiyu Weng, Bin Zheng, Wei Zheng, Xiang Chen, Xiaobin Sun

As software grows in size and complexity, software vulnerabilities are increasing, leading to a range of serious insecurity issues. Open-source software vulnerability reports and documentation can provide researchers with great convenience for analysis and detection. However, the quality of different data sources varies, the data are duplicated and lack of correlation, which often requires a lot of manual management and analysis. In order to solve the problems of scattered and heterogeneous data and lack of correlation in traditional vulnerability repositories, this paper proposes a software vulnerability feature knowledge extraction method that combines the N-gram model and mask similarity. The method generates mask text data based on the extraction of N-gram candidate keywords and extracts vulnerability feature knowledge by calculating the similarity of mask text. This method analyzes the samples efficiently and stably in the environment of large sample size and complex samples and can obtain high-value semi-structured data. Then, the final node, relationship, and attribute information are obtained by secondary knowledge cleaning and extraction of the extracted semi-structured data results. And based on the extraction results, the corresponding software vulnerability domain knowledge graph is constructed to deeply explore the semantic information features and entity relationships of vulnerabilities, which can help to efficiently study software security problems and solve vulnerability problems. The effectiveness and superiority of the proposed method is verified by comparing it with several traditional keyword extraction algorithms on Common Weakness Enumeration (CWE) and Common Vulnerabilities and Exposures (CVE) vulnerability data.

随着软件规模和复杂性的增长,软件漏洞也在不断增加,导致了一系列严重的不安全问题。开源软件漏洞报告和文档可以为研究人员的分析和检测提供极大的便利。然而,不同数据源的质量参差不齐,数据重复且缺乏关联性,往往需要大量的人工管理和分析。为了解决传统漏洞库中数据分散、异构、缺乏关联性等问题,本文提出了一种结合 N-gram 模型和掩码相似性的软件漏洞特征知识提取方法。该方法在提取 N-gram 候选关键词的基础上生成掩码文本数据,并通过计算掩码文本的相似度提取漏洞特征知识。该方法能在样本量大、样本复杂的环境下高效、稳定地分析样本,并能获得高价值的半结构化数据。然后,通过对提取的半结构化数据结果进行二次知识清洗和提取,得到最终的节点、关系和属性信息。并根据提取结果构建相应的软件漏洞领域知识图谱,深入挖掘漏洞的语义信息特征和实体关系,有助于高效地研究软件安全问题和解决漏洞问题。通过在常见弱点枚举(CWE)和常见漏洞与暴露(CVE)漏洞数据上与几种传统关键词提取算法的比较,验证了所提方法的有效性和优越性。
{"title":"NG_MDERANK: A software vulnerability feature knowledge extraction method based on N-gram similarity","authors":"Xiaoxue Wu,&nbsp;Shiyu Weng,&nbsp;Bin Zheng,&nbsp;Wei Zheng,&nbsp;Xiang Chen,&nbsp;Xiaobin Sun","doi":"10.1002/smr.2727","DOIUrl":"10.1002/smr.2727","url":null,"abstract":"<p>As software grows in size and complexity, software vulnerabilities are increasing, leading to a range of serious insecurity issues. Open-source software vulnerability reports and documentation can provide researchers with great convenience for analysis and detection. However, the quality of different data sources varies, the data are duplicated and lack of correlation, which often requires a lot of manual management and analysis. In order to solve the problems of scattered and heterogeneous data and lack of correlation in traditional vulnerability repositories, this paper proposes a software vulnerability feature knowledge extraction method that combines the N-gram model and mask similarity. The method generates mask text data based on the extraction of N-gram candidate keywords and extracts vulnerability feature knowledge by calculating the similarity of mask text. This method analyzes the samples efficiently and stably in the environment of large sample size and complex samples and can obtain high-value semi-structured data. Then, the final node, relationship, and attribute information are obtained by secondary knowledge cleaning and extraction of the extracted semi-structured data results. And based on the extraction results, the corresponding software vulnerability domain knowledge graph is constructed to deeply explore the semantic information features and entity relationships of vulnerabilities, which can help to efficiently study software security problems and solve vulnerability problems. The effectiveness and superiority of the proposed method is verified by comparing it with several traditional keyword extraction algorithms on Common Weakness Enumeration (CWE) and Common Vulnerabilities and Exposures (CVE) vulnerability data.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The PIM.3 process improvement process—Part of the iNTACS certified process expert training PIM.3 流程改进流程--iNTACS 认证流程专家培训的一部分
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-27 DOI: 10.1002/smr.2726
Richard Messnarz, Vesna Djordjevic, Viktor Grémen, Winifred Menezes, Ahmed Alborae, Rainer Dreves, So Norimatsu, Thomas Wegner, Bernhard Sechser

This paper documents the results of the PIM.3 (Process Improvement Management) working group in INTACS (International Assessor Certification Schema) supported by the VDA-QMC (Verband der Deutschen Automobilindustrie/German Automotive Association–Quality Management Center). INTACS promotes Automotive SPICE, which is an international standard that allows process capability assessment of projects, which implement systems that integrate mechanics, electronics, and software including optionally cybersecurity, functional safety, and machine learning. The paper outlines that for the first time since more than 20 years, the INTACS and VDA-QMC included a process like PIM.3 Process Improvement Management in the scope for the assessor training. Before that, the assessments focused on the management, engineering, and support processes of series projects, while the improvement management has not been trained or assessed.

本文记录了 INTACS(国际评估师认证模式)PIM.3(流程改进管理)工作组在 VDA-QMC(德国汽车工业协会/德国汽车协会-质量管理中心)支持下取得的成果。INTACS 推广汽车 SPICE,这是一项国际标准,允许对项目的过程能力进行评估,这些项目实施的系统集成了机械、电子和软件,包括可选的网络安全、功能安全和机器学习。文件概述了 INTACS 和 VDA-QMC 20 多年来首次将 PIM.3 流程改进管理等流程纳入评估员培训范围。在此之前,评估的重点是系列项目的管理、工程和支持过程,而改进管理则没有经过培训或评估。
{"title":"The PIM.3 process improvement process—Part of the iNTACS certified process expert training","authors":"Richard Messnarz,&nbsp;Vesna Djordjevic,&nbsp;Viktor Grémen,&nbsp;Winifred Menezes,&nbsp;Ahmed Alborae,&nbsp;Rainer Dreves,&nbsp;So Norimatsu,&nbsp;Thomas Wegner,&nbsp;Bernhard Sechser","doi":"10.1002/smr.2726","DOIUrl":"10.1002/smr.2726","url":null,"abstract":"<p>This paper documents the results of the PIM.3 (Process Improvement Management) working group in INTACS (International Assessor Certification Schema) supported by the VDA-QMC (Verband der Deutschen Automobilindustrie/German Automotive Association–Quality Management Center). INTACS promotes Automotive SPICE, which is an international standard that allows process capability assessment of projects, which implement systems that integrate mechanics, electronics, and software including optionally cybersecurity, functional safety, and machine learning. The paper outlines that for the first time since more than 20 years, the INTACS and VDA-QMC included a process like PIM.3 Process Improvement Management in the scope for the assessor training. Before that, the assessments focused on the management, engineering, and support processes of series projects, while the improvement management has not been trained or assessed.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are your comments outdated? Toward automatically detecting code-comment consistency 您的注释过时了吗?自动检测代码注释的一致性
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-27 DOI: 10.1002/smr.2718
Yuan Huang, Yinan Chen, Xiangping Chen, Xiaocong Zhou

In software development and maintenance, code comments can help developers understand source code and improve communication among developers. However, developers sometimes neglect to update the corresponding comment when changing the code, resulting in outdated comments (i.e., inconsistent codes and comments). Outdated comments are dangerous and harmful and may mislead subsequent developers. More seriously, the outdated comments may lead to a fatal flaw sometime in the future. To automatically identify the outdated comments in source code, we proposed a learning-based method, called CoCC, to detect the consistency between code and comment. To efficiently identify outdated comments, we extract multiple features from both codes and comments before and after they change. Besides, we also consider the relation between code and comment in our model. Experiment results show that CoCC can effectively detect outdated comments with precision over 90%. In addition, we have identified the 15 most important factors that cause outdated comments and verified the applicability of CoCC in different programming languages. We also used CoCC to find outdated comments in the latest commits of open source projects, which further proves the effectiveness of the proposed method.

在软件开发和维护过程中,代码注释可以帮助开发人员理解源代码,改善开发人员之间的交流。然而,开发人员在修改代码时有时会忽略更新相应的注释,导致注释过时(即代码和注释不一致)。过时的注释是危险和有害的,可能会误导后续的开发人员。更严重的是,过时的注释可能会在将来的某个时候导致致命的缺陷。为了自动识别源代码中的过时注释,我们提出了一种基于学习的方法,称为 CoCC,用于检测代码与注释之间的一致性。为了有效识别过期注释,我们从代码和注释变化前后提取了多个特征。此外,我们还在模型中考虑了代码和注释之间的关系。实验结果表明,CoCC 可以有效检测过时注释,精确度超过 90%。此外,我们还找出了导致注释过时的 15 个最重要因素,并验证了 CoCC 在不同编程语言中的适用性。我们还使用 CoCC 查找了开源项目最新提交中的过时注释,这进一步证明了所提方法的有效性。
{"title":"Are your comments outdated? Toward automatically detecting code-comment consistency","authors":"Yuan Huang,&nbsp;Yinan Chen,&nbsp;Xiangping Chen,&nbsp;Xiaocong Zhou","doi":"10.1002/smr.2718","DOIUrl":"10.1002/smr.2718","url":null,"abstract":"<p>In software development and maintenance, code comments can help developers understand source code and improve communication among developers. However, developers sometimes neglect to update the corresponding comment when changing the code, resulting in outdated comments (i.e., inconsistent codes and comments). Outdated comments are dangerous and harmful and may mislead subsequent developers. More seriously, the outdated comments may lead to a fatal flaw sometime in the future. To automatically identify the outdated comments in source code, we proposed a learning-based method, called CoCC, to detect the consistency between code and comment. To efficiently identify outdated comments, we extract multiple features from both codes and comments before and after they change. Besides, we also consider the relation between code and comment in our model. Experiment results show that CoCC can effectively detect outdated comments with precision over 90%. In addition, we have identified the 15 most important factors that cause outdated comments and verified the applicability of CoCC in different programming languages. We also used CoCC to find outdated comments in the latest commits of open source projects, which further proves the effectiveness of the proposed method.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complex outsourcing relationships management model 复杂的外包关系管理模式
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-26 DOI: 10.1002/smr.2724
Ghulam Murtaza Khan, Siffat Ullah Khan, Mahmood Niazi, Muhammad Ilyas, Mamoona Humayun, Akash Ahmad, Javed Ali Khan, Sajjad Mahmood

Global software development (GSD) refers to developing software with a distributed team spanning multiple locations and time zones. Based on relationships, there are four types of outsourcing: dyadic (one client–one vendor), multi-vendor (one client–many vendors), co-sourcing (many clients–one vendor), and complex outsourcing (many clients–many vendors). Compared to the other types of outsourcing contracts, complex outsourcing contracts are the hardest to work on and have the highest risk of project failure. This paper presents a model, the complex outsourcing relationships management model (CORMM), to assist the complex outsourcing stakeholders (both the clients and vendors) in managing their relationships in the context of GSD. This paper aims to develop a CORMM to assist the complex outsourcing relationships management stakeholders in GSD. Also, we are interested in identifying the applicability and effectiveness of the CORMM in the real-world industry. The research approach follows a structured methodology comprising multiple phases. Initially, it leverages a systematic literature review (SLR) as its primary research method. The second phase involves the validation of the SLR findings via an empirical study. Subsequently, in the third phase, a model is developed. Finally, the proposed research approach is validated by incorporating two industrial case studies to assess the organization's relationship management utilizing the Motorola tool. The case study results show that CORMM can successfully point out relationship management issues in a complex outsourcing context. The feedback received from the participants of both companies indicates several positive and valuable insights about the CORMM and its application in the context of complex outsourcing relationships. The results highlight that CORMM serves as an assessment tool for evaluating an organization's relationship management capability and a means for organizations to enhance their position. Through CORMM, complex outsourcing organizations (many clients–many vendors) can identify strengths and weaknesses in their relationship management practices, enabling targeted improvement efforts.

全球软件开发(GSD)是指由一个跨越多个地点和时区的分布式团队开发软件。根据关系,外包可分为四种类型:二元外包(一个客户-一个供应商)、多供应商外包(一个客户-多个供应商)、联合外包(多个客户-一个供应商)和复杂外包(多个客户-多个供应商)。与其他类型的外包合同相比,复杂外包合同最难处理,项目失败的风险也最高。本文提出了一个模型,即复杂外包关系管理模型(CORMM),以帮助复杂外包利益相关者(客户和供应商)在 GSD 的背景下管理他们之间的关系。本文旨在开发一个 CORMM,以协助全球可持续发展服务中的复杂外包关系管理相关方。此外,我们还希望确定 CORMM 在实际行业中的适用性和有效性。研究方法采用结构化方法,包括多个阶段。首先,它采用系统文献综述(SLR)作为主要研究方法。第二阶段是通过实证研究验证系统文献综述的结论。随后,在第三阶段建立模型。最后,通过结合两个行业案例研究,利用摩托罗拉工具对组织的关系管理进行评估,从而验证所提出的研究方法。案例研究结果表明,CORMM 可以成功指出复杂外包环境中的关系管理问题。从两家公司的参与者那里得到的反馈表明,CORMM 及其在复杂外包关系中的应用具有积极而宝贵的意义。结果突出表明,CORMM 是评估组织关系管理能力的一种评估工具,也是组织提高自身地位的一种手段。通过 CORMM,复杂的外包组织(许多客户-许多供应商)可以确定其关系管理实践中的优缺点,从而有针对性地改进工作。
{"title":"Complex outsourcing relationships management model","authors":"Ghulam Murtaza Khan,&nbsp;Siffat Ullah Khan,&nbsp;Mahmood Niazi,&nbsp;Muhammad Ilyas,&nbsp;Mamoona Humayun,&nbsp;Akash Ahmad,&nbsp;Javed Ali Khan,&nbsp;Sajjad Mahmood","doi":"10.1002/smr.2724","DOIUrl":"10.1002/smr.2724","url":null,"abstract":"<p>Global software development (GSD) refers to developing software with a distributed team spanning multiple locations and time zones. Based on relationships, there are four types of outsourcing: dyadic (one client–one vendor), multi-vendor (one client–many vendors), co-sourcing (many clients–one vendor), and complex outsourcing (many clients–many vendors). Compared to the other types of outsourcing contracts, complex outsourcing contracts are the hardest to work on and have the highest risk of project failure. This paper presents a model, the complex outsourcing relationships management model (CORMM), to assist the complex outsourcing stakeholders (both the clients and vendors) in managing their relationships in the context of GSD. This paper aims to develop a CORMM to assist the complex outsourcing relationships management stakeholders in GSD. Also, we are interested in identifying the applicability and effectiveness of the CORMM in the real-world industry. The research approach follows a structured methodology comprising multiple phases. Initially, it leverages a systematic literature review (SLR) as its primary research method. The second phase involves the validation of the SLR findings via an empirical study. Subsequently, in the third phase, a model is developed. Finally, the proposed research approach is validated by incorporating two industrial case studies to assess the organization's relationship management utilizing the Motorola tool. The case study results show that CORMM can successfully point out relationship management issues in a complex outsourcing context. The feedback received from the participants of both companies indicates several positive and valuable insights about the CORMM and its application in the context of complex outsourcing relationships. The results highlight that CORMM serves as an assessment tool for evaluating an organization's relationship management capability and a means for organizations to enhance their position. Through CORMM, complex outsourcing organizations (many clients–many vendors) can identify strengths and weaknesses in their relationship management practices, enabling targeted improvement efforts.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the importance of CI/CD practices for database applications 数据库应用程序 CI/CD 实践的重要性
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-11 DOI: 10.1002/smr.2720
Jasmin Fluri, Fabrizio Fornari, Ela Pustulka

Continuous integration and continuous delivery (CI/CD) automate software integration and reduce repetitive engineering work. While the use of CI/CD presents efficiency gains, in database application development, this potential has not been fully exploited. We explore the state of the art in this area, with a focus on current practices, common software tools, challenges, and preconditions that apply to database applications. The work is grounded in a synoptic literature review and contributes a novel generic CI/CD pipeline for database system application development. Our generic pipeline was tailored to three industrial development use cases in which we measured the benefits of integration and deployment automation. The measurements demonstrate clearly that introducing CI/CD had significant benefits. It reduced the number of failed deployments, improved their stability, and increased the number of deployments. Interviews with the developers before and after the implementation of the CI/CD show that the pipeline brings clear benefits to the development team (i.e., a reduced cognitive load). These findings put current database release practices driven by business expectations, such as fixed release windows, in question.

摘要持续集成和持续交付(CI/CD)可实现软件集成自动化,减少重复性工程工作。虽然使用 CI/CD 可以提高效率,但在数据库应用程序开发中,这一潜力尚未得到充分挖掘。我们探讨了这一领域的技术现状,重点关注适用于数据库应用的当前实践、常用软件工具、挑战和前提条件。这项工作以文献综述为基础,并为数据库系统应用程序开发提供了一个新颖的通用 CI/CD 流水线。我们的通用管道是针对三个工业开发用例量身定制的,在这些用例中,我们测量了集成和部署自动化的优势。测量结果清楚地表明,引入 CI/CD 有显著的好处。它减少了部署失败的次数,提高了部署的稳定性,并增加了部署次数。在实施 CI/CD 前后对开发人员的访谈显示,该管道为开发团队带来了明显的好处(即减少了认知负荷)。这些发现对目前由业务期望驱动的数据库发布实践(如固定发布窗口)提出了质疑。
{"title":"On the importance of CI/CD practices for database applications","authors":"Jasmin Fluri,&nbsp;Fabrizio Fornari,&nbsp;Ela Pustulka","doi":"10.1002/smr.2720","DOIUrl":"10.1002/smr.2720","url":null,"abstract":"<p>Continuous integration and continuous delivery (CI/CD) automate software integration and reduce repetitive engineering work. While the use of CI/CD presents efficiency gains, in database application development, this potential has not been fully exploited. We explore the state of the art in this area, with a focus on current practices, common software tools, challenges, and preconditions that apply to database applications. The work is grounded in a synoptic literature review and contributes a novel generic CI/CD pipeline for database system application development. Our generic pipeline was tailored to three industrial development use cases in which we measured the benefits of integration and deployment automation. The measurements demonstrate clearly that introducing CI/CD had significant benefits. It reduced the number of failed deployments, improved their stability, and increased the number of deployments. Interviews with the developers before and after the implementation of the CI/CD show that the pipeline brings clear benefits to the development team (i.e., a reduced cognitive load). These findings put current database release practices driven by business expectations, such as fixed release windows, in question.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"36 12","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.2720","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IABC-TCG: Improved artificial bee colony algorithm-based test case generation for smart contracts IABC-TCG:基于人工蜂群算法的智能合约测试用例生成改进版
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-08 DOI: 10.1002/smr.2719
Shunhui Ji, Jiahao Gong, Hai Dong, Pengcheng Zhang, Shaoqing Zhu

With the widespread application of smart contracts, there is a growing concern over the quality assurance of smart contracts. The data flow testing is an important technology to ensure the correctness of smart contracts. We propose an approach named IABC-TCG (Improved Artificial Bee Colony-Test Case Generation) to generate test cases for the data flow testing of smart contracts. With a dominance relations-based fitness function, an improved artificial bee colony algorithm is used to generate test cases, in which the bee colony search coefficient is adaptively adjusted to improve the effectiveness and efficiency of the search. In addition, an improved test case selection and updation strategy is used to avoid unnecessary test cases. The experimental results show that IABC-TCG achieves 100% coverage for all the test requirements on a dataset of 30 smart contracts and outperforms the baseline approaches in terms of the number of test cases and the execution time. Performing tests with the generated test cases, IABC-TCG can find more errors with less test cost.

随着智能合约的广泛应用,人们越来越关注智能合约的质量保证。数据流测试是确保智能合约正确性的一项重要技术。我们提出了一种名为IABC-TCG(改进人工蜂群-测试用例生成)的方法来生成智能合约数据流测试用例。通过基于支配关系的适配函数,使用改进的人工蜂群算法生成测试用例,其中蜂群搜索系数可进行自适应调整,以提高搜索的有效性和效率。此外,还采用了改进的测试用例选择和更新策略,以避免不必要的测试用例。实验结果表明,IABC-TCG 在 30 个智能合约的数据集上实现了所有测试要求的 100% 覆盖率,并在测试用例数量和执行时间方面优于基线方法。在使用生成的测试用例进行测试时,IABC-TCG 能以更低的测试成本发现更多错误。
{"title":"IABC-TCG: Improved artificial bee colony algorithm-based test case generation for smart contracts","authors":"Shunhui Ji,&nbsp;Jiahao Gong,&nbsp;Hai Dong,&nbsp;Pengcheng Zhang,&nbsp;Shaoqing Zhu","doi":"10.1002/smr.2719","DOIUrl":"10.1002/smr.2719","url":null,"abstract":"<p>With the widespread application of smart contracts, there is a growing concern over the quality assurance of smart contracts. The data flow testing is an important technology to ensure the correctness of smart contracts. We propose an approach named IABC-TCG (Improved Artificial Bee Colony-Test Case Generation) to generate test cases for the data flow testing of smart contracts. With a dominance relations-based fitness function, an improved artificial bee colony algorithm is used to generate test cases, in which the bee colony search coefficient is adaptively adjusted to improve the effectiveness and efficiency of the search. In addition, an improved test case selection and updation strategy is used to avoid unnecessary test cases. The experimental results show that IABC-TCG achieves 100% coverage for all the test requirements on a dataset of 30 smart contracts and outperforms the baseline approaches in terms of the number of test cases and the execution time. Performing tests with the generated test cases, IABC-TCG can find more errors with less test cost.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"36 12","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141927488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and prioritization of the challenges faced by vendor organizations in the shape of cyber security: A FUZZY-AHP -based systematic approach 确定供应商组织在网络安全方面面临的挑战并排定优先次序:基于 FUZZY-AHP 的系统方法
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-06 DOI: 10.1002/smr.2717
Abdul Wahid Khan, Shah Zaib, Meshari D. Alanazi, Shabana Habib

The goal of this research study was to identify and prioritize the significant cybersecurity challenges that vendor firms encounter during software development. Using Systematic Literature Reviews (SLRs), 13 significant challenges were found, including “Security issues/Access of Cyberattacks”, “Lack of Right Knowledge”, “Cost Security Issues”, and “Lack of Confidentiality and Trust” among others. To address these concerns, a multifaceted strategy that prioritizes continuing education, training, and investment in cybersecurity measures, as well as cross-industry cooperation and coordination with government entities, is required. These challenges were ranked using the Fuzzy Analytic Hierarchy Process (F-AHP). We obtained the following results after applying the Fuzzy Analytic Hierarchy Process: CSC1 (Cyber Security Challenge-1) “Security Issues/Access of Cyber Attacks”, CSC2 “Lack of Right Knowledge”, and CSC3 “Framework” are the top most critical cyber security challenges, with weightages of 0.1687, 0.1672, and 0.1194, respectively. This study lays the groundwork for future research and assists vendor organizations in addressing the cybersecurity concerns they face during software development. The study also emphasizes the significance of addressing cybersecurity during the software development process in order to avoid the financial and reputational losses associated with cyber intrusions.

本研究的目标是确定供应商公司在软件开发过程中遇到的重大网络安全挑战,并对其进行优先排序。通过系统文献回顾(SLR),我们发现了 13 项重大挑战,包括 "安全问题/网络攻击的获取"、"缺乏正确的知识"、"成本安全问题 "和 "缺乏保密性和信任 "等。要解决这些问题,需要采取多方面的战略,优先考虑继续教育、培训和网络安全措施投资,以及跨行业合作和与政府实体的协调。我们采用模糊层次分析法(F-AHP)对这些挑战进行了排序。应用模糊分析层次过程后,我们得出了以下结果:CSC1(网络安全挑战-1)"安全问题/网络攻击的获取"、CSC2 "缺乏正确的知识 "和 CSC3 "框架 "是最关键的网络安全挑战,权重分别为 0.1687、0.1672 和 0.1194。本研究为今后的研究奠定了基础,有助于供应商组织解决在软件开发过程中面临的网络安全问题。本研究还强调了在软件开发过程中解决网络安全问题的重要性,以避免网络入侵带来的经济和声誉损失。
{"title":"Identification and prioritization of the challenges faced by vendor organizations in the shape of cyber security: A FUZZY-AHP -based systematic approach","authors":"Abdul Wahid Khan,&nbsp;Shah Zaib,&nbsp;Meshari D. Alanazi,&nbsp;Shabana Habib","doi":"10.1002/smr.2717","DOIUrl":"10.1002/smr.2717","url":null,"abstract":"<p>The goal of this research study was to identify and prioritize the significant cybersecurity challenges that vendor firms encounter during software development. Using Systematic Literature Reviews (SLRs), 13 significant challenges were found, including “Security issues/Access of Cyberattacks”, “Lack of Right Knowledge”, “Cost Security Issues”, and “Lack of Confidentiality and Trust” among others. To address these concerns, a multifaceted strategy that prioritizes continuing education, training, and investment in cybersecurity measures, as well as cross-industry cooperation and coordination with government entities, is required. These challenges were ranked using the Fuzzy Analytic Hierarchy Process (F-AHP). We obtained the following results after applying the Fuzzy Analytic Hierarchy Process: CSC1 (Cyber Security Challenge-1) “Security Issues/Access of Cyber Attacks”, CSC2 “Lack of Right Knowledge”, and CSC3 “Framework” are the top most critical cyber security challenges, with weightages of 0.1687, 0.1672, and 0.1194, respectively. This study lays the groundwork for future research and assists vendor organizations in addressing the cybersecurity concerns they face during software development. The study also emphasizes the significance of addressing cybersecurity during the software development process in order to avoid the financial and reputational losses associated with cyber intrusions.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"36 12","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organizing Graphical User Interface tests from behavior-driven development as videos to obtain stakeholders' feedback 将行为驱动开发的图形用户界面测试制作成视频,以获取利益相关者的反馈意见
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-05 DOI: 10.1002/smr.2721
Jianwei Shi, Jonas Mönnich, Jil Klünder, Kurt Schneider

Demonstrating software early and responding to feedback is crucial in agile development. However, it is difficult for stakeholders who are not on-site customers but end users, marketing people, or designers, and so forth to give feedback in an agile development environment. Successful graphical user interface (GUI) test executions can be documented and then demonstrated for feedback. In our new concept, GUI tests from behavior-driven development (BDD) are recorded, augmented, and demonstrated as videos. A GUI test is divided into several GUI unit tests, which are specified in Gherkin, a semi-structured natural language. For each GUI unit test, a video is generated during test execution. Test steps specified in Gherkin are traced and highlighted in the video. Stakeholders review these generated videos and provide feedback, for example, on misunderstandings of requirements or on inconsistencies. To evaluate the impact of videos in identifying inconsistencies, we asked 22 participants to identify inconsistencies between (1) given requirements in regular sentences and (2) demonstrated behaviors from videos with Gherkin specifications or from Gherkin specifications alone. Our results show that participants tend to identify more inconsistencies from demonstrated behaviors, which are not in accordance with given requirements. They tend to recognize inconsistencies more easily through videos than through Gherkin specifications alone. The types of inconsistency are threefold: The mentioned feature can be incorrectly implemented, not implemented, or an unspecified new feature. We use a fictitious example showing how this feedback helps a product owner and her team manage requirements. We conclude that GUI test videos can help stakeholders give feedback more effectively. By obtaining early feedback, inconsistencies can be resolved, thus contributing to higher stakeholder satisfaction.

在敏捷开发中,尽早展示软件并对反馈做出回应至关重要。然而,在敏捷开发环境中,对于不是现场客户而是最终用户、营销人员或设计师等利益相关者来说,很难给出反馈意见。成功的图形用户界面(GUI)测试执行可以被记录下来,然后进行演示以获得反馈。在我们的新概念中,来自行为驱动开发(BDD)的图形用户界面测试将被录制、增强并以视频的形式展示。一个图形用户界面测试被分为若干个图形用户界面单元测试,这些单元测试是用半结构化自然语言 Gherkin 指定的。每个图形用户界面单元测试都会在测试执行过程中生成一段视频。Gherkin 中指定的测试步骤会在视频中被跟踪和突出显示。利益相关者会查看这些生成的视频,并提供反馈,例如,对需求的误解或不一致的反馈。为了评估视频在识别不一致性方面的影响,我们请 22 位参与者识别以下两者之间的不一致性:(1) 普通句子中的给定需求;(2) 视频中与 Gherkin 规范或仅与 Gherkin 规范相关的演示行为。我们的结果表明,参与者倾向于从示范行为中识别出更多不一致之处,因为这些行为与给定要求不符。他们往往更容易通过视频识别出不一致,而不是仅仅通过 Gherkin 规范。不一致的类型有三种:提到的功能可能是未正确实现、未实现或未指定的新功能。我们用一个虚构的例子来说明这种反馈是如何帮助产品负责人及其团队管理需求的。我们的结论是,图形用户界面测试视频可以帮助利益相关者更有效地提供反馈。通过获取早期反馈,不一致问题可以得到解决,从而提高利益相关者的满意度。
{"title":"Organizing Graphical User Interface tests from behavior-driven development as videos to obtain stakeholders' feedback","authors":"Jianwei Shi,&nbsp;Jonas Mönnich,&nbsp;Jil Klünder,&nbsp;Kurt Schneider","doi":"10.1002/smr.2721","DOIUrl":"10.1002/smr.2721","url":null,"abstract":"<p>Demonstrating software early and responding to feedback is crucial in agile development. However, it is difficult for stakeholders who are not on-site customers but end users, marketing people, or designers, and so forth to give feedback in an agile development environment. Successful graphical user interface (GUI) test executions can be documented and then demonstrated for feedback. In our new concept, GUI tests from behavior-driven development (BDD) are recorded, augmented, and demonstrated as videos. A GUI test is divided into several GUI unit tests, which are specified in Gherkin, a semi-structured natural language. For each GUI unit test, a video is generated during test execution. Test steps specified in Gherkin are traced and highlighted in the video. Stakeholders review these generated videos and provide feedback, for example, on misunderstandings of requirements or on inconsistencies. To evaluate the impact of videos in identifying inconsistencies, we asked 22 participants to identify inconsistencies between (1) given requirements in regular sentences and (2) demonstrated behaviors from videos with Gherkin specifications or from Gherkin specifications alone. Our results show that participants tend to identify more inconsistencies from demonstrated behaviors, which are not in accordance with given requirements. They tend to recognize inconsistencies more easily through videos than through Gherkin specifications alone. The types of inconsistency are threefold: The mentioned feature can be incorrectly implemented, not implemented, or an unspecified new feature. We use a fictitious example showing how this feedback helps a product owner and her team manage requirements. We conclude that GUI test videos can help stakeholders give feedback more effectively. By obtaining early feedback, inconsistencies can be resolved, thus contributing to higher stakeholder satisfaction.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"36 12","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.2721","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the impact of unchanged modules across versions on the evaluation of within-project defect prediction models 揭示不同版本中不变模块对项目内缺陷预测模型评估的影响
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-02 DOI: 10.1002/smr.2715
Xutong Liu, Yufei Zhou, Zeyu Lu, Yuanqing Mei, Yibiao Yang, Junyan Qian, Yuming Zhou

Background

Software defect prediction (SDP) is a topic actively researched in the software engineering community. Within-project defect prediction (WPDP) involves using labeled modules from previous versions of the same project to train classifiers. Over time, many defect prediction models have been evaluated under the WPDP scenario.

Problem

Data duplication poses a significant challenge in current WPDP evaluation procedures. Unchanged modules, characterized by identical executable source code, are frequently present in both target and source versions during experimentation. However, it is still unclear how and to what extent the presence of unchanged modules affects the performance assessment of WPDP models and the comparison of multiple WPDP models.

Method

In this paper, we provide a method to detect and remove unchanged modules from defect datasets and unveil the impact of data duplication in WPDP on model evaluation.

Results

The experiments conducted on 481 target versions from 62 projects provide evidence that data duplication significantly affects the reported performance values of individual learners in WPDP. However, when ranking multiple WPDP models based on prediction performance, the impact of removing unchanged instances is not substantial. Nevertheless, it is important to note that removing unchanged instances does have a slight influence on the selection of models with better generalization.

Conclusion

We recommend that future WPDP studies take into consideration the removal of unchanged modules from target versions when evaluating the performance of their models. This practice will enhance the reliability and validity of the results obtained in WPDP research, leading to improved understanding and advancements in defect prediction models.

背景软件缺陷预测(SDP)是软件工程界积极研究的一个课题。项目内缺陷预测(WPDP)涉及使用同一项目以前版本的标注模块来训练分类器。随着时间的推移,许多缺陷预测模型都在 WPDP 情景下进行了评估。问题数据重复给当前的 WPDP 评估程序带来了巨大挑战。在实验过程中,目标版本和源代码版本中经常会出现未改变的模块,这些模块的特点是可执行源代码完全相同。方法在本文中,我们提供了一种从缺陷数据集中检测和移除未修改模块的方法,并揭示了 WPDP 中数据重复对模型评估的影响。结果在 62 个项目的 481 个目标版本上进行的实验提供了证据,证明数据重复会显著影响 WPDP 中单个学习者的报告性能值。不过,在根据预测性能对多个 WPDP 模型进行排名时,删除未更改实例的影响并不大。结论我们建议,未来的 WPDP 研究在评估模型性能时,应考虑从目标版本中删除未改变的模块。这种做法将提高 WPDP 研究结果的可靠性和有效性,从而加深对缺陷预测模型的理解并推动缺陷预测模型的发展。
{"title":"Unveiling the impact of unchanged modules across versions on the evaluation of within-project defect prediction models","authors":"Xutong Liu,&nbsp;Yufei Zhou,&nbsp;Zeyu Lu,&nbsp;Yuanqing Mei,&nbsp;Yibiao Yang,&nbsp;Junyan Qian,&nbsp;Yuming Zhou","doi":"10.1002/smr.2715","DOIUrl":"10.1002/smr.2715","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Background</h3>\u0000 \u0000 <p>Software defect prediction (SDP) is a topic actively researched in the software engineering community. Within-project defect prediction (WPDP) involves using labeled modules from previous versions of the same project to train classifiers. Over time, many defect prediction models have been evaluated under the WPDP scenario.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Problem</h3>\u0000 \u0000 <p>Data duplication poses a significant challenge in current WPDP evaluation procedures. Unchanged modules, characterized by identical executable source code, are frequently present in both target and source versions during experimentation. However, it is still unclear how and to what extent the presence of unchanged modules affects the performance assessment of WPDP models and the comparison of multiple WPDP models.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Method</h3>\u0000 \u0000 <p>In this paper, we provide a method to detect and remove unchanged modules from defect datasets and unveil the impact of data duplication in WPDP on model evaluation.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>The experiments conducted on 481 target versions from 62 projects provide evidence that data duplication significantly affects the reported performance values of individual learners in WPDP. However, when ranking multiple WPDP models based on prediction performance, the impact of removing unchanged instances is not substantial. Nevertheless, it is important to note that removing unchanged instances does have a slight influence on the selection of models with better generalization.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusion</h3>\u0000 \u0000 <p>We recommend that future WPDP studies take into consideration the removal of unchanged modules from target versions when evaluating the performance of their models. This practice will enhance the reliability and validity of the results obtained in WPDP research, leading to improved understanding and advancements in defect prediction models.</p>\u0000 </section>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"36 12","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Software-Evolution and Process
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1