首页 > 最新文献

IET Software最新文献

英文 中文
A Differential Datalog Interpreter 差分数据解释器
4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-09-21 DOI: 10.3390/software2030020
Matthew James Stephenson
The core reasoning task for datalog engines is materialization, the evaluation of a datalog program over a database alongside its physical incorporation into the database itself. The de-facto method of computing is through the recursive application of inference rules. Due to it being a costly operation, it is a must for datalog engines to provide incremental materialization; that is, to adjust the computation to new data instead of restarting from scratch. One of the major caveats is that deleting data is notoriously more involved than adding since one has to take into account all possible data that has been entailed from what is being deleted. Differential dataflow is a computational model that provides efficient incremental maintenance, notoriously with equal performance between additions and deletions, and work distribution of iterative dataflows. In this paper, we investigate the performance of materialization with three reference datalog implementations, out of which one is built on top of a lightweight relational engine, and the two others are differential-dataflow and non-differential versions of the same rewrite algorithm with the same optimizations. Experimental results suggest that monotonic aggregation is more powerful than ascenting merely the powerset lattice.
数据记录引擎的核心推理任务是物质化,即对数据库上的数据记录程序进行评估,并将其物理地合并到数据库本身中。事实上的计算方法是通过递归应用推理规则。由于这是一个昂贵的操作,数据引擎必须提供增量物质化;也就是说,调整计算以适应新的数据,而不是从头开始。其中一个主要的注意事项是,删除数据比添加数据要复杂得多,因为必须考虑要删除的数据所包含的所有可能的数据。差分数据流是一种计算模型,它提供了高效的增量维护,在添加和删除之间具有相同的性能,以及迭代数据流的工作分布。在本文中,我们使用三个参考数据实现来研究物化的性能,其中一个是建立在轻量级关系引擎之上的,另外两个是具有相同优化的相同重写算法的差分数据流和非差分版本。实验结果表明,单调聚集比仅仅提升幂集晶格更有效。
{"title":"A Differential Datalog Interpreter","authors":"Matthew James Stephenson","doi":"10.3390/software2030020","DOIUrl":"https://doi.org/10.3390/software2030020","url":null,"abstract":"The core reasoning task for datalog engines is materialization, the evaluation of a datalog program over a database alongside its physical incorporation into the database itself. The de-facto method of computing is through the recursive application of inference rules. Due to it being a costly operation, it is a must for datalog engines to provide incremental materialization; that is, to adjust the computation to new data instead of restarting from scratch. One of the major caveats is that deleting data is notoriously more involved than adding since one has to take into account all possible data that has been entailed from what is being deleted. Differential dataflow is a computational model that provides efficient incremental maintenance, notoriously with equal performance between additions and deletions, and work distribution of iterative dataflows. In this paper, we investigate the performance of materialization with three reference datalog implementations, out of which one is built on top of a lightweight relational engine, and the two others are differential-dataflow and non-differential versions of the same rewrite algorithm with the same optimizations. Experimental results suggest that monotonic aggregation is more powerful than ascenting merely the powerset lattice.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136236435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Authorization in Microservice-Based Applications 基于微服务的应用程序中的用户授权
4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-09-19 DOI: 10.3390/software2030019
Niklas Sänger, Sebastian Abeck
Microservices have emerged as a prevalent architectural style in modern software development, replacing traditional monolithic architectures. The decomposition of business functionality into distributed microservices offers numerous benefits, but introduces increased complexity to the overall application. Consequently, the complexity of authorization in microservice-based applications necessitates a comprehensive approach that integrates authorization as an inherent component from the beginning. This paper presents a systematic approach for achieving fine-grained user authorization using Attribute-Based Access Control (ABAC). The proposed approach emphasizes structure preservation, facilitating traceability throughout the various phases of application development. As a result, authorization artifacts can be traced seamlessly from the initial analysis phase to the subsequent implementation phase. One significant contribution is the development of a language to formulate natural language authorization requirements and policies. These natural language authorization policies can subsequently be implemented using the policy language Rego. By leveraging the analysis of software artifacts, the proposed approach enables the creation of comprehensive and tailored authorization policies.
在现代软件开发中,微服务已经成为一种流行的架构风格,取代了传统的单片架构。将业务功能分解为分布式微服务提供了许多好处,但也增加了整个应用程序的复杂性。因此,基于微服务的应用程序中授权的复杂性需要一种全面的方法,从一开始就将授权集成为一个固有的组件。本文提出了一种使用基于属性的访问控制(ABAC)实现细粒度用户授权的系统方法。建议的方法强调结构保存,促进应用程序开发各个阶段的可追溯性。因此,授权工件可以从初始分析阶段无缝地跟踪到随后的实现阶段。一个重要的贡献是开发了一种语言来制定自然语言授权需求和策略。这些自然语言授权策略随后可以使用策略语言Rego来实现。通过利用对软件工件的分析,所建议的方法支持创建全面和定制的授权策略。
{"title":"User Authorization in Microservice-Based Applications","authors":"Niklas Sänger, Sebastian Abeck","doi":"10.3390/software2030019","DOIUrl":"https://doi.org/10.3390/software2030019","url":null,"abstract":"Microservices have emerged as a prevalent architectural style in modern software development, replacing traditional monolithic architectures. The decomposition of business functionality into distributed microservices offers numerous benefits, but introduces increased complexity to the overall application. Consequently, the complexity of authorization in microservice-based applications necessitates a comprehensive approach that integrates authorization as an inherent component from the beginning. This paper presents a systematic approach for achieving fine-grained user authorization using Attribute-Based Access Control (ABAC). The proposed approach emphasizes structure preservation, facilitating traceability throughout the various phases of application development. As a result, authorization artifacts can be traced seamlessly from the initial analysis phase to the subsequent implementation phase. One significant contribution is the development of a language to formulate natural language authorization requirements and policies. These natural language authorization policies can subsequently be implemented using the policy language Rego. By leveraging the analysis of software artifacts, the proposed approach enables the creation of comprehensive and tailored authorization policies.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135063218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantitative Review of the Research on Business Process Management in Digital Transformation: A Bibliometric Approach 数字化转型中业务流程管理研究的定量回顾:文献计量学方法
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-09-01 DOI: 10.3390/software2030018
Bui Quang Truong, Anh Nguyen-Duc, Nguyen Thi Cam Van
In recent years, research on digital transformation (DT) and business process management (BPM) has gained significant attention in the field of business and management. This paper aims to conduct a comprehensive bibliometric analysis of global research on DT and BPM from 2007 to 2022. A total of 326 papers were selected from Web of Science and Scopus for analysis. Using bibliometric methods, we evaluated the current state and future research trends of DT and BPM. Our analysis reveals that the number of publications on DT and BPM has grown significantly over time, with the Business Process Management Journal being the most active. The countries that have contributed the most to this field are Germany (with four universities in the top 10) and the USA. The Business Process Management Journal is the most active in publishing research on digital transformation and business process management. The analysis showed that “artificial intelligence” is a technology that has been studied extensively and is increasingly asserted to influence companies’ business processes. Additionally, the study provides valuable insights from the co-citation network analysis. Based on our findings, we provide recommendations for future research directions on DT and BPM. This study contributes to a better understanding of the current state of research on DT and BPM and provides insights for future research.
近年来,数字化转型(DT)和业务流程管理(BPM)的研究受到了商业和管理领域的广泛关注。本文旨在对2007年至2022年全球关于DT和BPM的研究进行全面的文献计量分析。从Web of Science和Scopus中选取326篇论文进行分析。采用文献计量学的方法,评价了DT和BPM的研究现状和未来的研究趋势。我们的分析显示,随着时间的推移,关于DT和BPM的出版物数量显著增长,其中业务流程管理期刊(Business Process Management Journal)最为活跃。在这一领域贡献最大的国家是德国(有4所大学进入前10名)和美国。《业务流程管理期刊》是在数字化转型和业务流程管理方面发表研究最活跃的期刊。分析显示,“人工智能”是一项被广泛研究的技术,越来越多的人认为它会影响企业的业务流程。此外,本研究还从共被引网络分析中提供了有价值的见解。在此基础上,对未来的研究方向提出了建议。本研究有助于更好地了解DT和BPM的研究现状,并为未来的研究提供见解。
{"title":"A Quantitative Review of the Research on Business Process Management in Digital Transformation: A Bibliometric Approach","authors":"Bui Quang Truong, Anh Nguyen-Duc, Nguyen Thi Cam Van","doi":"10.3390/software2030018","DOIUrl":"https://doi.org/10.3390/software2030018","url":null,"abstract":"In recent years, research on digital transformation (DT) and business process management (BPM) has gained significant attention in the field of business and management. This paper aims to conduct a comprehensive bibliometric analysis of global research on DT and BPM from 2007 to 2022. A total of 326 papers were selected from Web of Science and Scopus for analysis. Using bibliometric methods, we evaluated the current state and future research trends of DT and BPM. Our analysis reveals that the number of publications on DT and BPM has grown significantly over time, with the Business Process Management Journal being the most active. The countries that have contributed the most to this field are Germany (with four universities in the top 10) and the USA. The Business Process Management Journal is the most active in publishing research on digital transformation and business process management. The analysis showed that “artificial intelligence” is a technology that has been studied extensively and is increasingly asserted to influence companies’ business processes. Additionally, the study provides valuable insights from the co-citation network analysis. Based on our findings, we provide recommendations for future research directions on DT and BPM. This study contributes to a better understanding of the current state of research on DT and BPM and provides insights for future research.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"84 2 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89314142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges and Solutions for Engineering Applications on Smartphones 智能手机工程应用的挑战与解决方案
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-08-18 DOI: 10.3390/software2030017
Anthony Khoury, Mohamad Abbas Kaddaha, Maya Saade, R. Younes, Rachid Outbib, Pascal Lafon
This paper starts by presenting the concept of a mobile application. A literature review is conducted, which shows that there is still a certain lack with regard to smartphone applications in the domain of engineering as independent simulation applications and not only as extensions of smartphone tools. The challenges behind this lack are then discussed. Subsequently, three case studies of engineering applications for both smartphones and the internet are presented, alongside their solutions to the challenges presented. The first case study concerns an engineering application for systems control. The second case study focuses on an engineering application for composite materials. The third case study focuses on the finite element method and structure generation. The solutions to the presented challenges are then described through their implementation in the applications. The three case studies show a new system of thought concerning the development of engineering smartphone applications.
本文首先介绍了移动应用程序的概念。进行了文献综述,这表明在工程领域的智能手机应用程序作为独立的仿真应用程序,而不仅仅是作为智能手机工具的扩展,仍然存在一定的缺乏。然后讨论了这种缺乏背后的挑战。随后,介绍了智能手机和互联网工程应用的三个案例研究,以及他们对所面临挑战的解决方案。第一个案例研究涉及系统控制的工程应用。第二个案例研究侧重于复合材料的工程应用。第三个案例研究的重点是有限元方法和结构生成。然后通过在应用程序中的实现来描述所提出的挑战的解决方案。这三个案例研究展示了一种关于工程智能手机应用开发的新思路。
{"title":"Challenges and Solutions for Engineering Applications on Smartphones","authors":"Anthony Khoury, Mohamad Abbas Kaddaha, Maya Saade, R. Younes, Rachid Outbib, Pascal Lafon","doi":"10.3390/software2030017","DOIUrl":"https://doi.org/10.3390/software2030017","url":null,"abstract":"This paper starts by presenting the concept of a mobile application. A literature review is conducted, which shows that there is still a certain lack with regard to smartphone applications in the domain of engineering as independent simulation applications and not only as extensions of smartphone tools. The challenges behind this lack are then discussed. Subsequently, three case studies of engineering applications for both smartphones and the internet are presented, alongside their solutions to the challenges presented. The first case study concerns an engineering application for systems control. The second case study focuses on an engineering application for composite materials. The third case study focuses on the finite element method and structure generation. The solutions to the presented challenges are then described through their implementation in the applications. The three case studies show a new system of thought concerning the development of engineering smartphone applications.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"122 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88257718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Synthesis-Based Stateful Approach for Guiding Design Thinking in Embedded System Development 嵌入式系统开发中一种基于综合的有状态方法指导设计思维
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-08-12 DOI: 10.3390/software2030016
Hung-Fu Chang, S. K. Mobasser
Embedded systems have attracted more attention and have become more critical due to the recent computer technology advancements and applications in various areas, such as healthcare, transportation, and manufacturing. Traditional software design approaches and the finite state machine cannot provide sufficient support due to two major reasons: the increasing need for more functions in designing an embedded system and sequential controls in the implementation. This deficiency particularly discourages inexperienced engineers who use conventional methods to design embedded software. Hence, we proposed a design method, the Synthesis-Based Stateful Software Design Approach (SSSDA), which synthesizes two existing methods, the Synthesis-Based Software Design Framework (SSDF) and Process and Artifact State Transition Abstraction (PASTA), to remedy the drawback of conventional methods. To show how to conduct our proposed design approach and investigate how it supports embedded system design, we studied an industrial project developed by a sophomore student team. Our results showed that our proposed approach could significantly help students lay out modules, improve testability, and reduce defects.
由于最近计算机技术的进步和在各个领域的应用,例如医疗保健、运输和制造业,嵌入式系统引起了越来越多的关注,并且变得越来越重要。传统的软件设计方法和有限状态机不能提供足够的支持,主要有两个原因:嵌入式系统设计中越来越多的功能需求和实现中的顺序控制。这一缺陷尤其不利于使用传统方法设计嵌入式软件的缺乏经验的工程师。因此,我们提出了一种设计方法,即基于综合的有状态软件设计方法(SSSDA),它综合了两种现有的方法,即基于综合的软件设计框架(SSDF)和过程与工件状态转换抽象(PASTA),以弥补传统方法的缺点。为了展示如何实施我们提出的设计方法并调查它如何支持嵌入式系统设计,我们研究了一个由大二学生团队开发的工业项目。我们的结果表明,我们提出的方法可以显著地帮助学生布置模块,提高可测试性,并减少缺陷。
{"title":"A Synthesis-Based Stateful Approach for Guiding Design Thinking in Embedded System Development","authors":"Hung-Fu Chang, S. K. Mobasser","doi":"10.3390/software2030016","DOIUrl":"https://doi.org/10.3390/software2030016","url":null,"abstract":"Embedded systems have attracted more attention and have become more critical due to the recent computer technology advancements and applications in various areas, such as healthcare, transportation, and manufacturing. Traditional software design approaches and the finite state machine cannot provide sufficient support due to two major reasons: the increasing need for more functions in designing an embedded system and sequential controls in the implementation. This deficiency particularly discourages inexperienced engineers who use conventional methods to design embedded software. Hence, we proposed a design method, the Synthesis-Based Stateful Software Design Approach (SSSDA), which synthesizes two existing methods, the Synthesis-Based Software Design Framework (SSDF) and Process and Artifact State Transition Abstraction (PASTA), to remedy the drawback of conventional methods. To show how to conduct our proposed design approach and investigate how it supports embedded system design, we studied an industrial project developed by a sophomore student team. Our results showed that our proposed approach could significantly help students lay out modules, improve testability, and reduce defects.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"53 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83720268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Test-driven development, engagement in activity, and maintainability: An empirical study 测试驱动的开发、活动参与和可维护性:一项实证研究
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-27 DOI: 10.1049/sfw2.12135
Wei Ren, Stephen Barrett

The software engineering community aims to achieve and maintain high-efficient software engineering practical activities. One of the techniques used for this purpose is Test-Driven Development (TDD), which is a cyclic and test-centered development method positively related to maintainability, which may vary depending on the context and application. Previous research has indicated that TDD's benefits on maintainability may be due to the improved focus on coding and testing activities. However, limited research has investigated the role of engagement in software quality. Therefore, this study investigates the relationship between TDD methods, engagement level in development activities, and maintainability. The primary research questions addressed in this study are does following TDD methods improve the engagement level in development activities? And does a higher engagement level leads to better maintainability? The study employs a statistical analysis technique, regression analysis to explore the research questions. The results show that TDD behaviours improve the engagement level, and engaging in development activities has a significant positive impact on maintainability. Additionally, the study finds that the positive impact of focussing on testing, such as writing more test cases, is more pronounced compared to coding activities. Our study adds to current software engineering literature that not only personal expertise but the engagement level in the development process are associated with software quality and calls for the emphasis on developer's engagement.

软件工程社区旨在实现和维护高效的软件工程实践活动。用于此目的的技术之一是测试驱动开发(TDD),这是一种循环的、以测试为中心的开发方法,与可维护性呈正相关,可维护性可能因上下文和应用程序而异。先前的研究表明,TDD在可维护性方面的优势可能是由于改进了对编码和测试活动的关注。然而,有限的研究调查了参与在软件质量中的作用。因此,本研究调查了TDD方法、开发活动中的参与水平和可维护性之间的关系。本研究中提出的主要研究问题是,以下TDD方法是否能提高开发活动的参与水平?更高的参与度是否会带来更好的可维护性?本研究采用统计分析技术,回归分析,探讨研究问题。结果表明,TDD行为提高了参与度,参与开发活动对可维护性有显著的积极影响。此外,研究发现,与编码活动相比,专注于测试的积极影响更为明显,比如编写更多的测试用例。我们的研究补充了当前的软件工程文献,即不仅个人专业知识,而且开发过程中的参与程度都与软件质量有关,并呼吁强调开发人员的参与。
{"title":"Test-driven development, engagement in activity, and maintainability: An empirical study","authors":"Wei Ren,&nbsp;Stephen Barrett","doi":"10.1049/sfw2.12135","DOIUrl":"https://doi.org/10.1049/sfw2.12135","url":null,"abstract":"<p>The software engineering community aims to achieve and maintain high-efficient software engineering practical activities. One of the techniques used for this purpose is Test-Driven Development (TDD), which is a cyclic and test-centered development method positively related to maintainability, which may vary depending on the context and application. Previous research has indicated that TDD's benefits on maintainability may be due to the improved focus on coding and testing activities. However, limited research has investigated the role of engagement in software quality. Therefore, this study investigates the relationship between TDD methods, engagement level in development activities, and maintainability. The primary research questions addressed in this study are does following TDD methods improve the engagement level in development activities? And does a higher engagement level leads to better maintainability? The study employs a statistical analysis technique, regression analysis to explore the research questions. The results show that TDD behaviours improve the engagement level, and engaging in development activities has a significant positive impact on maintainability. Additionally, the study finds that the positive impact of focussing on testing, such as writing more test cases, is more pronounced compared to coding activities. Our study adds to current software engineering literature that not only personal expertise but the engagement level in the development process are associated with software quality and calls for the emphasis on developer's engagement.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"509-525"},"PeriodicalIF":1.6,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50145743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Measured Agile Software Development Metrics Using an Agile Model-Based Software Engineering Approach versus Scrum Only 比较使用基于敏捷模型的软件工程方法与仅使用Scrum的度量敏捷软件开发指标
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-26 DOI: 10.3390/software2030015
Moe Huss, Daniel R. Herber, J. Borky
This study compares the reliability of estimation, productivity, and defect rate metrics for sprints driven by a specific instance of the agile approach (i.e., scrum) and an agile model-Bbased software engineering (MBSE) approach called the integrated Scrum Model-Based System Architecture Process (sMBSAP) when developing a software system. The quasi-experimental study conducted ten sprints using each approach. The approaches were then evaluated based on their effectiveness in helping the product development team estimate the backlog items that they could build during a time-boxed sprint and deliver more product backlog items (PBI) with fewer defects. The commitment reliability (CR) was calculated to compare the reliability of estimation with a measured average scrum-driven value of 0.81 versus a statistically different average sMBSAP-driven value of 0.94. Similarly, the average sprint velocity (SV) for the scrum-driven sprints was 26.8 versus 31.8 for the MBSAP-driven sprints. The average defect density (DD) for the scrum-driven sprints was 0.91, while that of the sMBSAP-driven sprints was 0.63. The average defect leakage (DL) for the scrum-driven sprints was 0.20, while that of the sMBSAP-driven sprints was 0.15. The t-test analysis concluded that the sMBSAP-driven sprints were associated with a statistically significant larger mean CR, SV, DD, and DL than that of the scrum-driven sprints. The overall results demonstrate formal quantitative benefits of an agile MBSE approach compared to an agile alone, thereby strengthening the case for considering agile MBSE methods within the software development community. Future work might include comparing agile and agile MBSE methods using alternative research designs and further software development objectives, techniques, and metrics.
本研究在开发软件系统时,比较了由敏捷方法(即scrum)的特定实例和敏捷基于模型的软件工程(MBSE)方法(称为集成的scrum基于模型的系统架构过程(sMBSAP))驱动的sprint的评估可靠性、生产力和缺陷率指标。准实验研究使用每种方法进行了10次冲刺。然后根据这些方法在帮助产品开发团队评估他们可以在时间限定的冲刺期间构建的待办事项项以及交付更多具有更少缺陷的产品待办事项项(PBI)方面的有效性来评估这些方法。通过计算承诺信度(CR)来比较估算信度与测量的平均scrum驱动值(0.81)和统计上不同的平均smbsap驱动值(0.94)。类似地,scrum驱动的sprint的平均冲刺速度(SV)是26.8,而mbsap驱动的sprint是31.8。scrum驱动的sprint的平均缺陷密度(DD)是0.91,而smbsap驱动的sprint的平均缺陷密度是0.63。scrum驱动的sprint的平均缺陷泄漏(DL)是0.20,而smbsap驱动的sprint的平均缺陷泄漏(DL)是0.15。t检验分析得出结论,smbsap驱动的sprint与统计上显著大于scrum驱动的sprint的平均CR、SV、DD和DL相关。总体结果证明了与单独的敏捷方法相比,敏捷MBSE方法的正式量化好处,从而加强了在软件开发社区中考虑敏捷MBSE方法的案例。未来的工作可能包括使用替代研究设计和进一步的软件开发目标、技术和度量来比较敏捷和敏捷MBSE方法。
{"title":"Comparing Measured Agile Software Development Metrics Using an Agile Model-Based Software Engineering Approach versus Scrum Only","authors":"Moe Huss, Daniel R. Herber, J. Borky","doi":"10.3390/software2030015","DOIUrl":"https://doi.org/10.3390/software2030015","url":null,"abstract":"This study compares the reliability of estimation, productivity, and defect rate metrics for sprints driven by a specific instance of the agile approach (i.e., scrum) and an agile model-Bbased software engineering (MBSE) approach called the integrated Scrum Model-Based System Architecture Process (sMBSAP) when developing a software system. The quasi-experimental study conducted ten sprints using each approach. The approaches were then evaluated based on their effectiveness in helping the product development team estimate the backlog items that they could build during a time-boxed sprint and deliver more product backlog items (PBI) with fewer defects. The commitment reliability (CR) was calculated to compare the reliability of estimation with a measured average scrum-driven value of 0.81 versus a statistically different average sMBSAP-driven value of 0.94. Similarly, the average sprint velocity (SV) for the scrum-driven sprints was 26.8 versus 31.8 for the MBSAP-driven sprints. The average defect density (DD) for the scrum-driven sprints was 0.91, while that of the sMBSAP-driven sprints was 0.63. The average defect leakage (DL) for the scrum-driven sprints was 0.20, while that of the sMBSAP-driven sprints was 0.15. The t-test analysis concluded that the sMBSAP-driven sprints were associated with a statistically significant larger mean CR, SV, DD, and DL than that of the scrum-driven sprints. The overall results demonstrate formal quantitative benefits of an agile MBSE approach compared to an agile alone, thereby strengthening the case for considering agile MBSE methods within the software development community. Future work might include comparing agile and agile MBSE methods using alternative research designs and further software development objectives, techniques, and metrics.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"43 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78344153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry 重温DevOps时代的安全:基于证据的DevSecOps行业调查
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-26 DOI: 10.1049/sfw2.12132
Xin Zhou, Runfeng Mao, He Zhang, Qiming Dai, Huang Huang, Haifeng Shen, Jingyue Li, Guoping Rong

By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final stage of development. DevSecOps promotes security as a shared responsibility integrated into the DevOps process that seamlessly intertwines development, operations, and security from the start throughout to the end of cycles. While some companies have already begun to embrace this new strategy, both industry and academia are still seeking a common understanding of the DevSecOps movement. The goal of this study is to report the state-of-the-practice of DevSecOps, including the impact of DevOps on security, practitioners' understanding of DevSecOps, and the practices associated with DevSecOps as well as the challenges of implementing DevSecOps. The authors used a mixed-methods approach for this research. The authors carried out a grey literature review on DevSecOps, and surveyed the practitioners of DevSecOps in industry of China. The status quo of DevSecOps in industry is summarized. Three major software security risks are identified with DevOps, where the establishment of DevOps pipeline provides opportunities for security-related activities. The authors classify the interpretations of DevSecOps into three core aspects of DevSecOps capabilities, cultural enablers, and technological enablers. To materialise the interpretations into daily software production activities, the recommended DevSecOps practices from three perspectives—people, process, and technology. Although a preliminary consensus is that DevSecOps is regarded as an extension of DevOps, there is a debate on whether DevSecOps is a superfluous term. While DevSecOps is attracting an increasing attention by industry, it is still in its infancy and more effort needs to be invested to promote it in both research and industry communities.

通过采用敏捷和精益实践,DevOps旨在通过加快开发和部署周期来实现快速价值交付,但这会导致更多的安全问题,只有在开发的最后阶段,孤立的安全角色才能完全解决这些问题。DevSecOps将安全作为一种共享责任加以促进,并将其集成到DevOps流程中,该流程将开发、运营和安全从开始到结束无缝地交织在一起。虽然一些公司已经开始接受这一新战略,但工业界和学术界仍在寻求对DevSecOps运动的共同理解。本研究的目的是报告DevSecOps的实践状况,包括DevOps对安全的影响、从业者对DevSecOps的理解、与DevSecOps相关的实践以及实施DevSecOpss的挑战。作者在这项研究中采用了混合方法。作者对DevSecOps进行了灰色文献综述,并对中国工业界DevSecOps的从业者进行了调查。概述了DevSecOps在行业中的现状。DevOps确定了三大软件安全风险,其中DevOps管道的建立为安全相关活动提供了机会。作者将DevSecOps的解释分为三个核心方面:DevSecOpss能力、文化使能因素和技术使能因素。为了将解释具体化到日常软件生产活动中,建议从三个角度——人员、过程和技术——进行DevSecOps实践。尽管初步的共识是DevSecOps被视为DevOps的延伸,但关于DevSecOps是否是一个多余的术语仍存在争议。虽然DevSecOps正吸引着业界越来越多的关注,但它仍处于起步阶段,需要投入更多的精力在研究和行业社区推广。
{"title":"Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry","authors":"Xin Zhou,&nbsp;Runfeng Mao,&nbsp;He Zhang,&nbsp;Qiming Dai,&nbsp;Huang Huang,&nbsp;Haifeng Shen,&nbsp;Jingyue Li,&nbsp;Guoping Rong","doi":"10.1049/sfw2.12132","DOIUrl":"https://doi.org/10.1049/sfw2.12132","url":null,"abstract":"<p>By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final stage of development. <i>DevSecOps</i> promotes security as a shared responsibility integrated into the DevOps process that seamlessly intertwines development, operations, and security from the start throughout to the end of cycles. While some companies have already begun to embrace this new strategy, both industry and academia are still seeking a common understanding of the DevSecOps movement. The goal of this study is to report the state-of-the-practice of DevSecOps, including the impact of DevOps on security, practitioners' understanding of DevSecOps, and the practices associated with DevSecOps as well as the challenges of implementing DevSecOps. The authors used a mixed-methods approach for this research. The authors carried out a grey literature review on DevSecOps, and surveyed the practitioners of DevSecOps in industry of China. The status quo of DevSecOps in industry is summarized. Three major software security risks are identified with DevOps, where the establishment of DevOps pipeline provides opportunities for security-related activities. The authors classify the interpretations of DevSecOps into three core aspects of DevSecOps capabilities, cultural enablers, and technological enablers. To materialise the interpretations into daily software production activities, the recommended DevSecOps practices from three perspectives—people, process, and technology. Although a preliminary consensus is that DevSecOps is regarded as an extension of DevOps, there is a debate on whether DevSecOps is a superfluous term. While DevSecOps is attracting an increasing attention by industry, it is still in its infancy and more effort needs to be invested to promote it in both research and industry communities.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"435-454"},"PeriodicalIF":1.6,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50144606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest Editorial: Machine learning applied to quality and security in software systems 嘉宾评论:机器学习应用于软件系统的质量和安全
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-25 DOI: 10.1049/sfw2.12141
Honghao Gao, Walayat Hussain, Ramón J. Durán Barroso, Junaid Arshad, Yuyu Yin
<p>During the development of software systems, even with advanced planning, problems with quality and security occur. These defects may result in threats to program development and maintenance. Therefore, to control and minimise these defects, machine learning can be used to improve the quality and security of software systems. This special issue focuses on recent advances in architecture, algorithms, optimisation, and models for machine learning applied to quality and security in software systems. After a rigorous review according to relevance, originality, technical novelties, and presentation quality, we selected 4 manuscripts. A summary of these accepted papers is outlined below.</p><p>In the first paper entitled “Robust Malware Identification via Deep Temporal Convolutional Network with Symmetric Cross Entropy Learning” by Sun et al., the authors propose a robust Malware identification method using the temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface (API) function names in many cases. Here, considering the numerous unlabelled samples in practical intelligent environments, the authors pre-train the TCN model on an unlabelled set using a word embedding method, that is, <i>word</i>2<i>vec</i>. In the experiments, the proposed method is compared to several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real-world dataset. The performance comparisons demonstrate the better performance and noise robustness of the proposed method, that the proposed method can yield the best identification accuracy of 98.75% in real-world scenarios.</p><p>In the second paper entitled “Just-In-Time Defect Prediction Enhanced by the Joint Method of Line Label Fusion and File Filtering” by Zhang et al., the authors propose a Just-in-Time defect prediction model enhanced by the joint method of line label Fusion and file Filtering (JIT-FF). First, to distinguish added and removed lines while preserving the original software changes information, the authors represent the code changes as original, added, and removed codes according to line labels. Second, to obtain semantics-enhanced code representation, the authors propose a cross-attention-based line label fusion method to perform complementary feature enhancement. Third, to generate code changes containing fewer defect-irrelevant files, the authors formalise the file filtering as a sequential decision problem and propose a reinforcement learning-based file filtering method. Finally, based on generated code changes, CodeBERT-based commit representation and multi-layer perceptron-based defect prediction are performed to identify the defective software changes. The experiments demonstrate that JIT-FF predicts defective software changes more effectively.</p><p>In the third paper entitled “Android Malwar
在软件系统的开发过程中,即使有先进的计划,也会出现质量和安全问题。这些缺陷可能会对程序开发和维护造成威胁。因此,为了控制和最小化这些缺陷,机器学习可以用来提高软件系统的质量和安全性。本期特刊重点介绍了应用于软件系统质量和安全的机器学习的体系结构、算法、优化和模型的最新进展。在经过相关性、原创性、技术新颖性和表达质量的严格审查后,我们选择了4篇稿件。下面概述了这些被接受的论文的摘要。在Sun等人发表的第一篇题为“基于对称交叉熵学习的深度时间卷积网络的鲁棒恶意软件识别”的论文中,作者提出了一种使用时间卷积网络(TCN)的鲁棒恶意软件识别方法。此外,在许多情况下,词嵌入技术通常用于理解输入操作码(opcode)和应用程序编程接口(API)函数名之间的上下文关系。在这里,考虑到实际智能环境中大量的未标记样本,作者使用一种词嵌入方法,即word2vec,在一个未标记的集合上预训练TCN模型。在一个合成的恶意软件数据集和一个真实的数据集上,将该方法与几种传统的统计方法和最新的神经网络进行了比较。性能比较表明,该方法具有较好的性能和噪声鲁棒性,在实际场景中,该方法的识别准确率达到了98.75%。在Zhang等人的第二篇文章《线标签融合和文件过滤联合方法增强的即时缺陷预测》中,作者提出了一种线标签融合和文件过滤联合方法增强的即时缺陷预测模型(JIT-FF)。首先,为了在保留原始软件变更信息的同时区分添加和删除的行,作者根据行标签将代码变更表示为原始、添加和删除的代码。其次,为了获得语义增强的代码表示,作者提出了一种基于交叉注意的线标签融合方法来进行互补特征增强。第三,为了生成包含较少缺陷无关文件的代码更改,作者将文件过滤形式化为顺序决策问题,并提出了一种基于强化学习的文件过滤方法。最后,基于生成的代码变更,采用基于codebert的提交表示和基于多层感知器的缺陷预测来识别有缺陷的软件变更。实验表明,JIT-FF能更有效地预测软件缺陷变更。在Wang等人的第三篇论文《通过高效API调用序列提取和机器学习分类器检测Android恶意软件》中,作者提出了一种新的Android恶意软件检测框架,其中作者提供了一种高效的API调用序列提取算法和对不同类型分类器的研究。在API调用序列提取中,作者提出了一种将函数调用图从多图转换为有向简单图的算法,成功地避免了不必要的重复路径搜索。作者还提出了一种修剪搜索,这进一步减少了要搜索的路径数量。该算法大大降低了时间复杂度。作者生成转移矩阵作为分类特征,并研究了三种类型的机器学习分类器来完成恶意软件检测任务。在实际的apk上进行了实验,结果表明,该方法减少了运行时间,具有较高的检测精度。在第四篇论文“通过混合区块链可靠性预测选择可靠的区块链节点”中,作者郑等人提出了混合区块链可靠性预测模型H-BRP,提取区块链可靠性因素,然后对每个用户进行个性化预测。连接到不可靠的区块链节点容易造成资源浪费,甚至由于重复交易而丢失加密货币。提出的模型主要旨在选择可靠的区块链节点,并评估和预测它们的可靠性。在100个区块链请求者和200个区块链对等体上进行的综合实验证明了所提出的H-BRP模型的有效性。此外,还发布了200万个测试用例的实现和数据集。特邀编辑谨向所有贡献宝贵意见的作者和众多高素质的匿名审稿人表示衷心的感谢。 我们认为所选的贡献代表了该领域的最新技术,将引起社区的极大兴趣。我们也要感谢IET软件出版工作人员一直以来的支持和奉献。我们特别感谢IET Software总编辑Hana Chockler教授给予我们的支持和鼓励。
{"title":"Guest Editorial: Machine learning applied to quality and security in software systems","authors":"Honghao Gao,&nbsp;Walayat Hussain,&nbsp;Ramón J. Durán Barroso,&nbsp;Junaid Arshad,&nbsp;Yuyu Yin","doi":"10.1049/sfw2.12141","DOIUrl":"10.1049/sfw2.12141","url":null,"abstract":"&lt;p&gt;During the development of software systems, even with advanced planning, problems with quality and security occur. These defects may result in threats to program development and maintenance. Therefore, to control and minimise these defects, machine learning can be used to improve the quality and security of software systems. This special issue focuses on recent advances in architecture, algorithms, optimisation, and models for machine learning applied to quality and security in software systems. After a rigorous review according to relevance, originality, technical novelties, and presentation quality, we selected 4 manuscripts. A summary of these accepted papers is outlined below.&lt;/p&gt;&lt;p&gt;In the first paper entitled “Robust Malware Identification via Deep Temporal Convolutional Network with Symmetric Cross Entropy Learning” by Sun et al., the authors propose a robust Malware identification method using the temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface (API) function names in many cases. Here, considering the numerous unlabelled samples in practical intelligent environments, the authors pre-train the TCN model on an unlabelled set using a word embedding method, that is, &lt;i&gt;word&lt;/i&gt;2&lt;i&gt;vec&lt;/i&gt;. In the experiments, the proposed method is compared to several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real-world dataset. The performance comparisons demonstrate the better performance and noise robustness of the proposed method, that the proposed method can yield the best identification accuracy of 98.75% in real-world scenarios.&lt;/p&gt;&lt;p&gt;In the second paper entitled “Just-In-Time Defect Prediction Enhanced by the Joint Method of Line Label Fusion and File Filtering” by Zhang et al., the authors propose a Just-in-Time defect prediction model enhanced by the joint method of line label Fusion and file Filtering (JIT-FF). First, to distinguish added and removed lines while preserving the original software changes information, the authors represent the code changes as original, added, and removed codes according to line labels. Second, to obtain semantics-enhanced code representation, the authors propose a cross-attention-based line label fusion method to perform complementary feature enhancement. Third, to generate code changes containing fewer defect-irrelevant files, the authors formalise the file filtering as a sequential decision problem and propose a reinforcement learning-based file filtering method. Finally, based on generated code changes, CodeBERT-based commit representation and multi-layer perceptron-based defect prediction are performed to identify the defective software changes. The experiments demonstrate that JIT-FF predicts defective software changes more effectively.&lt;/p&gt;&lt;p&gt;In the third paper entitled “Android Malwar","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"345-347"},"PeriodicalIF":1.6,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44482903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structuring meaningful bug-fixing patches to fix software defect 构建有意义的bug修复补丁来修复软件缺陷
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-12 DOI: 10.1049/sfw2.12140
Hui Li, Yong Liu, Xuexin Qi, Xi Yu, Shikai Guo

Currently, software projects require a significant amount of time, effort and other resources to be invested in software testing to reduce the number of code defects. However, this process decreases the efficiency of software development and leads to a significant waste of workforce and resources. To address this challenge, researchers developed various solutions utilising deep neural networks. However, these solutions are frequently challenged by issues, such as a vast vocabulary, network training difficulties and elongated training processes resulting from the handling of redundant information. To overcome these limitations, the authors proposed a new neural network-based model named HopFix, designed to detect software defects that may be introduced during the coding process. HopFix consists of four parts: data preprocessing, encoder, decoder and code generation components, which were used for preprocessing data, extracting information about software defects, analysing defect information, generating software patches and controlling the generation process of software patches, respectively. Experimental studies on Bug-Fix Pairs (BFP) show that HopFix correctly fixed 47.2% (BFPsmall datasets) and 25.7% (BFPmedium datasets) of software defects.

目前,软件项目需要投入大量的时间、精力和其他资源进行软件测试,以减少代码缺陷的数量。然而,这个过程降低了软件开发的效率,并导致劳动力和资源的严重浪费。为了应对这一挑战,研究人员利用深度神经网络开发了各种解决方案。然而,这些解决方案经常受到问题的挑战,例如庞大的词汇表、网络训练困难以及由于处理冗余信息而导致的训练过程延长。为了克服这些限制,作者提出了一种新的基于神经网络的模型,名为HopFix,旨在检测编码过程中可能引入的软件缺陷。HopFix由四个部分组成:数据预处理、编码器、解码器和代码生成组件,分别用于数据预处理,提取软件缺陷信息,分析缺陷信息,生成软件补丁和控制软件补丁的生成过程。对错误修复对(BFP)的实验研究表明,HopFix正确修复了47.2%(BFPsmall数据集)和25.7%(BFPmedium数据集)的软件缺陷。
{"title":"Structuring meaningful bug-fixing patches to fix software defect","authors":"Hui Li,&nbsp;Yong Liu,&nbsp;Xuexin Qi,&nbsp;Xi Yu,&nbsp;Shikai Guo","doi":"10.1049/sfw2.12140","DOIUrl":"https://doi.org/10.1049/sfw2.12140","url":null,"abstract":"<p>Currently, software projects require a significant amount of time, effort and other resources to be invested in software testing to reduce the number of code defects. However, this process decreases the efficiency of software development and leads to a significant waste of workforce and resources. To address this challenge, researchers developed various solutions utilising deep neural networks. However, these solutions are frequently challenged by issues, such as a vast vocabulary, network training difficulties and elongated training processes resulting from the handling of redundant information. To overcome these limitations, the authors proposed a new neural network-based model named HopFix, designed to detect software defects that may be introduced during the coding process. HopFix consists of four parts: data preprocessing, encoder, decoder and code generation components, which were used for preprocessing data, extracting information about software defects, analysing defect information, generating software patches and controlling the generation process of software patches, respectively. Experimental studies on Bug-Fix Pairs (BFP) show that HopFix correctly fixed 47.2% (<i>BFP</i><sub><i>small</i></sub> datasets) and 25.7% (<i>BFP</i><sub><i>medium</i></sub> datasets) of software defects.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"566-581"},"PeriodicalIF":1.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Software
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1