opensciences / opensciences.github.io

Website for OpenScience -
http://openscience.us
MIT License
26 stars 18 forks source link

Chunk 1 ICSE '14 #89

Closed rahlk closed 9 years ago

rahlk commented 9 years ago

Source

http://dl.acm.org/citation.cfm?id=2568225&picked=prox&preflayout=tabs

SESSION: Perspectives on Software Engineering

Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development?

Emerson Murphy-Hill, Thomas Zimmermann, Nachiappan Nagappan Pages: 1-11 doi>10.1145/2568225.2568226 Full text: PDF

Video games make up an important part of the software industry, yet the software engineering community rarely studies video games. This imbalance is a problem if video game development differs from general software development, as some game experts ... expand

Analyze this! 145 questions for data scientists in software engineering

Andrew Begel, Thomas Zimmermann Pages: 12-23 doi>10.1145/2568225.2568233 Full text: PDF

In this paper, we present the results from two surveys related to data science applied to software engineering. The first survey solicited questions that software engineers would like data scientists to investigate about software, about software processes ... expand

The dimensions of software engineering success

Paul Ralph, Paul Kelly Pages: 24-35 doi>10.1145/2568225.2568261 Full text: PDF

Software engineering research and practice are hampered by the lack of a well-understood, top-level dependent variable. Recent initiatives on General Theory of Software Engineering suggest a multifaceted variable – Software Engineering Success. ... expand

How do professionals perceive legacy systems and software modernization?

Ravi Khadka, Belfrit V. Batlajery, Amir M. Saeidi, Slinger Jansen, Jurriaan Hage Pages: 36-47 doi>10.1145/2568225.2568318 Full text: PDF

Existing research in legacy system modernization has traditionally focused on technical challenges, and takes the standpoint that legacy systems are obsolete, yet crucial for an organization's operation. Nonetheless, it remains unclear whether practitioners ... expand

SESSION: Testing 1

SimRT: an automated framework to support regression testing for data races

Tingting Yu, Witawas Srisa-an, Gregg Rothermel Pages: 48-59 doi>10.1145/2568225.2568294 Full text: PDF

Concurrent programs are prone to various classes of difficult-to-detect faults, of which data races are particularly prevalent. Prior work has attempted to increase the cost-effectiveness of approaches for testing for data races by employing race detection ... expand

Performance regression testing target prioritization via performance risk analysis

Peng Huang, Xiao Ma, Dongcai Shen, Yuanyuan Zhou Pages: 60-71 doi>10.1145/2568225.2568232 Full text: PDF

As software evolves, problematic changes can significantly degrade software performance, i.e., introducing performance regression. Performance regression testing is an effective way to reveal such issues in early stages. Yet because of its high overhead, ... expand

Code coverage for suite evaluation by developers

Rahul Gopinath, Carlos Jensen, Alex Groce Pages: 72-82 doi>10.1145/2568225.2568278 Full text: PDF

One of the key challenges of developers testing code is determining a test suite's quality -- its ability to find faults. The most common approach is to use code coverage as a measure for test suite quality, and diminishing returns in coverage or high ... expand

Time pressure: a controlled experiment of test case development and requirements review

Mika V. Mäntylä, Kai Petersen, Timo O. A. Lehtinen, Casper Lassenius Pages: 83-94 doi>10.1145/2568225.2568245 Full text: PDF

Time pressure is prevalent in the software industry in which shorter and shorter deadlines and high customer demands lead to increasingly tight deadlines. However, the effects of time pressure have received little attention in software engineering research. ... expand

SESSION: Modeling

Verifying component and connector models against crosscutting structural views

Shahar Maoz, Jan Oliver Ringert, Bernhard Rumpe Pages: 95-105 doi>10.1145/2568225.2568237 Full text: PDF

The structure of component and connector (C&C) models, which are used in many application domains of software engineering, consists of components at different containment levels, their typed input and output ports, and the connectors between them. C&C ... expand

TradeMaker: automated dynamic analysis of synthesized tradespaces

Hamid Bagheri, Chong Tang, Kevin Sullivan Pages: 106-116 doi>10.1145/2568225.2568291 Full text: PDF

System designers today are focusing less on point solutions for complex systems and more on design spaces, often with a focus on understanding tradeoffs among non-functional properties across such spaces. This shift places a premium on the efficient ... expand

Lifting model transformations to product lines

Rick Salay, Michalis Famelis, Julia Rubin, Alessio Di Sandro, Marsha Chechik Pages: 117-128 doi>10.1145/2568225.2568267 Full text: PDF

Software product lines and model transformations are two techniques used in industry for managing the development of highly complex software. Product line approaches simplify the handling of software variants while model transformations automate software ... expand

Automated goal operationalisation based on interpolation and SAT solving

Renzo Degiovanni, Dalal Alrajeh, Nazareno Aguirre, Sebastian Uchitel Pages: 129-139 doi>10.1145/2568225.2568323 Full text: PDF

Goal oriented methods have been successfully employed for eliciting and elaborating software requirements. When goals are assigned to an agent, they have to be operationalised: the agent’s operations have to be refined, by equipping them with ... expand

SESSION: Configuration, Variability, and Clones

Mining configuration constraints: static analyses and empirical results

Sarah Nadi, Thorsten Berger, Christian Kästner, Krzysztof Czarnecki Pages: 140-151 doi>10.1145/2568225.2568283 Full text: PDF

Highly-configurable systems allow users to tailor the software to their specific needs. Not all combinations of configuration options are valid though, and constraints arise for technical or non-technical reasons. Explicitly describing these constraints ... expand

Which configuration option should I change?

Sai Zhang, Michael D. Ernst Pages: 152-163 doi>10.1145/2568225.2568251 Full text: PDF

Modern software often exposes configuration options that enable users to customize its behavior. During software evolution, developers may change how the configuration options behave. When upgrading to a new software version, users may need to re-configure ... expand

Detecting differences across multiple instances of code clones

Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao Pages: 164-174 doi>10.1145/2568225.2568298 Full text: PDF

Clone detectors find similar code fragments (i.e., instances of code clones) and report large numbers of them for industrial systems. To maintain or manage code clones, developers often have to investigate differences of multiple cloned code fragments. ... expand

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets

Kai Chen, Peng Liu, Yingjun Zhang Pages: 175-186 doi>10.1145/2568225.2568286 Full text: PDF

Besides traditional problems such as potential bugs, (smartphone) application clones on Android markets bring new threats. That is, attackers clone the code from legitimate Android applications, assemble it with malicious code or advertisements, and ... expand

SESSION: Social Aspects of Software Engineering

Two's company, three's a crowd: a case study of crowdsourcing software development

Klaas-Jan Stol, Brian Fitzgerald Pages: 187-198 doi>10.1145/2568225.2568249 Full text: PDF

Crowdsourcing is an emerging and promising approach which involves delegating a variety of tasks to an unknown workforce - the crowd. Crowdsourcing has been applied quite successfully in various contexts from basic tasks on Amazon Mechanical Turk to ... expand

Does latitude hurt while longitude kills? geographical and temporal separation in a large scale software development project

Patrick Wagstrom, Subhajit Datta Pages: 199-210 doi>10.1145/2568225.2568279 Full text: PDF

Distributed software development allows firms to leverage cost advantages and place work near centers of competency. This distribution comes at a cost -- distributed teams face challenges from differing cultures, skill levels, and a lack of shared working ... expand

Software engineering at the speed of light: how developers stay current using twitter

Leif Singer, Fernando Figueira Filho, Margaret-Anne Storey Pages: 211-221 doi>10.1145/2568225.2568305 Full text: PDF

The microblogging service Twitter has over 500 million users posting over 500 million tweets daily. Research has established that software developers use Twitter in their work, but this has not yet been examined in detail. Twitter is an important medium ... expand

Building it together: synchronous development in OSS

Qi Xuan, Vladimir Filkov Pages: 222-233 doi>10.1145/2568225.2568238 Full text: PDF

In distributed software development synchronized actions are important for completion of complex, interleaved tasks that require the abilities of multiple people. Synchronous development is manifested when file commits by two developers are close together ... expand

rahlk commented 9 years ago

CLOSED