Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development?
Emerson Murphy-Hill, Thomas Zimmermann, Nachiappan Nagappan
Pages: 1-11
doi>10.1145/2568225.2568226
Full text: PDF
Video games make up an important part of the software industry, yet the software engineering community rarely studies video games. This imbalance is a problem if video game development differs from general software development, as some game experts ... expand
Analyze this! 145 questions for data scientists in software engineering
Andrew Begel, Thomas Zimmermann
Pages: 12-23
doi>10.1145/2568225.2568233
Full text: PDF
In this paper, we present the results from two surveys related to data science applied to software engineering. The first survey solicited questions that software engineers would like data scientists to investigate about software, about software processes ... expand
The dimensions of software engineering success
Paul Ralph, Paul Kelly
Pages: 24-35
doi>10.1145/2568225.2568261
Full text: PDF
Software engineering research and practice are hampered by the lack of a well-understood, top-level dependent variable. Recent initiatives on General Theory of Software Engineering suggest a multifaceted variable – Software Engineering Success. ... expand
How do professionals perceive legacy systems and software modernization?
Ravi Khadka, Belfrit V. Batlajery, Amir M. Saeidi, Slinger Jansen, Jurriaan Hage
Pages: 36-47
doi>10.1145/2568225.2568318
Full text: PDF
Existing research in legacy system modernization has traditionally focused on technical challenges, and takes the standpoint that legacy systems are obsolete, yet crucial for an organization's operation. Nonetheless, it remains unclear whether practitioners ... expand
SESSION: Testing 1
SimRT: an automated framework to support regression testing for data races
Tingting Yu, Witawas Srisa-an, Gregg Rothermel
Pages: 48-59
doi>10.1145/2568225.2568294
Full text: PDF
Concurrent programs are prone to various classes of difficult-to-detect faults, of which data races are particularly prevalent. Prior work has attempted to increase the cost-effectiveness of approaches for testing for data races by employing race detection ... expand
Performance regression testing target prioritization via performance risk analysis
Peng Huang, Xiao Ma, Dongcai Shen, Yuanyuan Zhou
Pages: 60-71
doi>10.1145/2568225.2568232
Full text: PDF
As software evolves, problematic changes can significantly degrade software performance, i.e., introducing performance regression. Performance regression testing is an effective way to reveal such issues in early stages. Yet because of its high overhead, ... expand
Code coverage for suite evaluation by developers
Rahul Gopinath, Carlos Jensen, Alex Groce
Pages: 72-82
doi>10.1145/2568225.2568278
Full text: PDF
One of the key challenges of developers testing code is determining a test suite's quality -- its ability to find faults. The most common approach is to use code coverage as a measure for test suite quality, and diminishing returns in coverage or high ... expand
Time pressure: a controlled experiment of test case development and requirements review
Mika V. Mäntylä, Kai Petersen, Timo O. A. Lehtinen, Casper Lassenius
Pages: 83-94
doi>10.1145/2568225.2568245
Full text: PDF
Time pressure is prevalent in the software industry in which shorter and shorter deadlines and high customer demands lead to increasingly tight deadlines. However, the effects of time pressure have received little attention in software engineering research. ... expand
SESSION: Modeling
Verifying component and connector models against crosscutting structural views
Shahar Maoz, Jan Oliver Ringert, Bernhard Rumpe
Pages: 95-105
doi>10.1145/2568225.2568237
Full text: PDF
The structure of component and connector (C&C) models, which are used in many application domains of software engineering, consists of components at different containment levels, their typed input and output ports, and the connectors between them. C&C ... expand
TradeMaker: automated dynamic analysis of synthesized tradespaces
Hamid Bagheri, Chong Tang, Kevin Sullivan
Pages: 106-116
doi>10.1145/2568225.2568291
Full text: PDF
System designers today are focusing less on point solutions for complex systems and more on design spaces, often with a focus on understanding tradeoffs among non-functional properties across such spaces. This shift places a premium on the efficient ... expand
Lifting model transformations to product lines
Rick Salay, Michalis Famelis, Julia Rubin, Alessio Di Sandro, Marsha Chechik
Pages: 117-128
doi>10.1145/2568225.2568267
Full text: PDF
Software product lines and model transformations are two techniques used in industry for managing the development of highly complex software. Product line approaches simplify the handling of software variants while model transformations automate software ... expand
Automated goal operationalisation based on interpolation and SAT solving
Renzo Degiovanni, Dalal Alrajeh, Nazareno Aguirre, Sebastian Uchitel
Pages: 129-139
doi>10.1145/2568225.2568323
Full text: PDF
Goal oriented methods have been successfully employed for eliciting and elaborating software requirements. When goals are assigned to an agent, they have to be operationalised: the agent’s operations have to be refined, by equipping them with ... expand
SESSION: Configuration, Variability, and Clones
Mining configuration constraints: static analyses and empirical results
Sarah Nadi, Thorsten Berger, Christian Kästner, Krzysztof Czarnecki
Pages: 140-151
doi>10.1145/2568225.2568283
Full text: PDF
Highly-configurable systems allow users to tailor the software to their specific needs. Not all combinations of configuration options are valid though, and constraints arise for technical or non-technical reasons. Explicitly describing these constraints ... expand
Which configuration option should I change?
Sai Zhang, Michael D. Ernst
Pages: 152-163
doi>10.1145/2568225.2568251
Full text: PDF
Modern software often exposes configuration options that enable users to customize its behavior. During software evolution, developers may change how the configuration options behave. When upgrading to a new software version, users may need to re-configure ... expand
Detecting differences across multiple instances of code clones
Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao
Pages: 164-174
doi>10.1145/2568225.2568298
Full text: PDF
Clone detectors find similar code fragments (i.e., instances of code clones) and report large numbers of them for industrial systems. To maintain or manage code clones, developers often have to investigate differences of multiple cloned code fragments. ... expand
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets
Kai Chen, Peng Liu, Yingjun Zhang
Pages: 175-186
doi>10.1145/2568225.2568286
Full text: PDF
Besides traditional problems such as potential bugs, (smartphone) application clones on Android markets bring new threats. That is, attackers clone the code from legitimate Android applications, assemble it with malicious code or advertisements, and ... expand
SESSION: Social Aspects of Software Engineering
Two's company, three's a crowd: a case study of crowdsourcing software development
Klaas-Jan Stol, Brian Fitzgerald
Pages: 187-198
doi>10.1145/2568225.2568249
Full text: PDF
Crowdsourcing is an emerging and promising approach which involves delegating a variety of tasks to an unknown workforce - the crowd. Crowdsourcing has been applied quite successfully in various contexts from basic tasks on Amazon Mechanical Turk to ... expand
Does latitude hurt while longitude kills? geographical and temporal separation in a large scale software development project
Patrick Wagstrom, Subhajit Datta
Pages: 199-210
doi>10.1145/2568225.2568279
Full text: PDF
Distributed software development allows firms to leverage cost advantages and place work near centers of competency. This distribution comes at a cost -- distributed teams face challenges from differing cultures, skill levels, and a lack of shared working ... expand
Software engineering at the speed of light: how developers stay current using twitter
Leif Singer, Fernando Figueira Filho, Margaret-Anne Storey
Pages: 211-221
doi>10.1145/2568225.2568305
Full text: PDF
The microblogging service Twitter has over 500 million users posting over 500 million tweets daily. Research has established that software developers use Twitter in their work, but this has not yet been examined in detail. Twitter is an important medium ... expand
Building it together: synchronous development in OSS
Qi Xuan, Vladimir Filkov
Pages: 222-233
doi>10.1145/2568225.2568238
Full text: PDF
In distributed software development synchronized actions are important for completion of complex, interleaved tasks that require the abilities of multiple people. Synchronous development is manifested when file commits by two developers are close together ... expand
Source
http://dl.acm.org/citation.cfm?id=2568225&picked=prox&preflayout=tabs
SESSION: Perspectives on Software Engineering
Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development?
Emerson Murphy-Hill, Thomas Zimmermann, Nachiappan Nagappan Pages: 1-11 doi>10.1145/2568225.2568226 Full text: PDF
Video games make up an important part of the software industry, yet the software engineering community rarely studies video games. This imbalance is a problem if video game development differs from general software development, as some game experts ... expand
Analyze this! 145 questions for data scientists in software engineering
Andrew Begel, Thomas Zimmermann Pages: 12-23 doi>10.1145/2568225.2568233 Full text: PDF
In this paper, we present the results from two surveys related to data science applied to software engineering. The first survey solicited questions that software engineers would like data scientists to investigate about software, about software processes ... expand
The dimensions of software engineering success
Paul Ralph, Paul Kelly Pages: 24-35 doi>10.1145/2568225.2568261 Full text: PDF
Software engineering research and practice are hampered by the lack of a well-understood, top-level dependent variable. Recent initiatives on General Theory of Software Engineering suggest a multifaceted variable – Software Engineering Success. ... expand
How do professionals perceive legacy systems and software modernization?
Ravi Khadka, Belfrit V. Batlajery, Amir M. Saeidi, Slinger Jansen, Jurriaan Hage Pages: 36-47 doi>10.1145/2568225.2568318 Full text: PDF
Existing research in legacy system modernization has traditionally focused on technical challenges, and takes the standpoint that legacy systems are obsolete, yet crucial for an organization's operation. Nonetheless, it remains unclear whether practitioners ... expand
SESSION: Testing 1
SimRT: an automated framework to support regression testing for data races
Tingting Yu, Witawas Srisa-an, Gregg Rothermel Pages: 48-59 doi>10.1145/2568225.2568294 Full text: PDF
Concurrent programs are prone to various classes of difficult-to-detect faults, of which data races are particularly prevalent. Prior work has attempted to increase the cost-effectiveness of approaches for testing for data races by employing race detection ... expand
Performance regression testing target prioritization via performance risk analysis
Peng Huang, Xiao Ma, Dongcai Shen, Yuanyuan Zhou Pages: 60-71 doi>10.1145/2568225.2568232 Full text: PDF
As software evolves, problematic changes can significantly degrade software performance, i.e., introducing performance regression. Performance regression testing is an effective way to reveal such issues in early stages. Yet because of its high overhead, ... expand
Code coverage for suite evaluation by developers
Rahul Gopinath, Carlos Jensen, Alex Groce Pages: 72-82 doi>10.1145/2568225.2568278 Full text: PDF
One of the key challenges of developers testing code is determining a test suite's quality -- its ability to find faults. The most common approach is to use code coverage as a measure for test suite quality, and diminishing returns in coverage or high ... expand
Time pressure: a controlled experiment of test case development and requirements review
Mika V. Mäntylä, Kai Petersen, Timo O. A. Lehtinen, Casper Lassenius Pages: 83-94 doi>10.1145/2568225.2568245 Full text: PDF
Time pressure is prevalent in the software industry in which shorter and shorter deadlines and high customer demands lead to increasingly tight deadlines. However, the effects of time pressure have received little attention in software engineering research. ... expand
SESSION: Modeling
Verifying component and connector models against crosscutting structural views
Shahar Maoz, Jan Oliver Ringert, Bernhard Rumpe Pages: 95-105 doi>10.1145/2568225.2568237 Full text: PDF
The structure of component and connector (C&C) models, which are used in many application domains of software engineering, consists of components at different containment levels, their typed input and output ports, and the connectors between them. C&C ... expand
TradeMaker: automated dynamic analysis of synthesized tradespaces
Hamid Bagheri, Chong Tang, Kevin Sullivan Pages: 106-116 doi>10.1145/2568225.2568291 Full text: PDF
System designers today are focusing less on point solutions for complex systems and more on design spaces, often with a focus on understanding tradeoffs among non-functional properties across such spaces. This shift places a premium on the efficient ... expand
Lifting model transformations to product lines
Rick Salay, Michalis Famelis, Julia Rubin, Alessio Di Sandro, Marsha Chechik Pages: 117-128 doi>10.1145/2568225.2568267 Full text: PDF
Software product lines and model transformations are two techniques used in industry for managing the development of highly complex software. Product line approaches simplify the handling of software variants while model transformations automate software ... expand
Automated goal operationalisation based on interpolation and SAT solving
Renzo Degiovanni, Dalal Alrajeh, Nazareno Aguirre, Sebastian Uchitel Pages: 129-139 doi>10.1145/2568225.2568323 Full text: PDF
Goal oriented methods have been successfully employed for eliciting and elaborating software requirements. When goals are assigned to an agent, they have to be operationalised: the agent’s operations have to be refined, by equipping them with ... expand
SESSION: Configuration, Variability, and Clones
Mining configuration constraints: static analyses and empirical results
Sarah Nadi, Thorsten Berger, Christian Kästner, Krzysztof Czarnecki Pages: 140-151 doi>10.1145/2568225.2568283 Full text: PDF
Highly-configurable systems allow users to tailor the software to their specific needs. Not all combinations of configuration options are valid though, and constraints arise for technical or non-technical reasons. Explicitly describing these constraints ... expand
Which configuration option should I change?
Sai Zhang, Michael D. Ernst Pages: 152-163 doi>10.1145/2568225.2568251 Full text: PDF
Modern software often exposes configuration options that enable users to customize its behavior. During software evolution, developers may change how the configuration options behave. When upgrading to a new software version, users may need to re-configure ... expand
Detecting differences across multiple instances of code clones
Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao Pages: 164-174 doi>10.1145/2568225.2568298 Full text: PDF
Clone detectors find similar code fragments (i.e., instances of code clones) and report large numbers of them for industrial systems. To maintain or manage code clones, developers often have to investigate differences of multiple cloned code fragments. ... expand
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets
Kai Chen, Peng Liu, Yingjun Zhang Pages: 175-186 doi>10.1145/2568225.2568286 Full text: PDF
Besides traditional problems such as potential bugs, (smartphone) application clones on Android markets bring new threats. That is, attackers clone the code from legitimate Android applications, assemble it with malicious code or advertisements, and ... expand
SESSION: Social Aspects of Software Engineering
Two's company, three's a crowd: a case study of crowdsourcing software development
Klaas-Jan Stol, Brian Fitzgerald Pages: 187-198 doi>10.1145/2568225.2568249 Full text: PDF
Crowdsourcing is an emerging and promising approach which involves delegating a variety of tasks to an unknown workforce - the crowd. Crowdsourcing has been applied quite successfully in various contexts from basic tasks on Amazon Mechanical Turk to ... expand
Does latitude hurt while longitude kills? geographical and temporal separation in a large scale software development project
Patrick Wagstrom, Subhajit Datta Pages: 199-210 doi>10.1145/2568225.2568279 Full text: PDF
Distributed software development allows firms to leverage cost advantages and place work near centers of competency. This distribution comes at a cost -- distributed teams face challenges from differing cultures, skill levels, and a lack of shared working ... expand
Software engineering at the speed of light: how developers stay current using twitter
Leif Singer, Fernando Figueira Filho, Margaret-Anne Storey Pages: 211-221 doi>10.1145/2568225.2568305 Full text: PDF
The microblogging service Twitter has over 500 million users posting over 500 million tweets daily. Research has established that software developers use Twitter in their work, but this has not yet been examined in detail. Twitter is an important medium ... expand
Building it together: synchronous development in OSS
Qi Xuan, Vladimir Filkov Pages: 222-233 doi>10.1145/2568225.2568238 Full text: PDF
In distributed software development synchronized actions are important for completion of complex, interleaved tasks that require the abilities of multiple people. Synchronous development is manifested when file commits by two developers are close together ... expand