By Topic

Software Engineering, 2007. ICSE 2007. 29th International Conference on

Date 20-26 May 2007

Filter Results

Displaying Results 1 - 25 of 98
  • 29th International Conference on Software Engineering - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1133 KB)
    Freely Available from IEEE
  • 29th International Conference on Software Engineering - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • 29th International Conference on Software Engineering - Copyright notice

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • 29th International Conference on Software Engineering - TOC

    Publication Year: 2007, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2007, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (183 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Co-Chairs

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (138 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2007, Page(s):xvii - xxii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • ICSE 2007 Sponsors and Supporters

    Publication Year: 2007, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Parallel Randomized State-Space Search

    Publication Year: 2007, Page(s):3 - 12
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB) | HTML iconHTML

    Model checkers search the space of possible program behaviors to detect errors and to demonstrate their absence. Despite major advances in reduction and optimization techniques, state-space search can still become cost-prohibitive as program size and complexity increase. In this paper, we present a technique for dramatically improving the cost- effectiveness of state-space search techniques for er... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequential Circuits for Relational Analysis

    Publication Year: 2007, Page(s):13 - 22
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    The alloy tool-set has been gaining popularity as an alternative to traditional manual testing and checking for design correctness. Alloy uses a first-order relational logic for modeling designs. The alloy analyzer translates alloy formulas for a given scope, i.e., a bound on the universe of discourse, to Boolean formulas in conjunctive normal form (CNF), which are subsequently checked using prepo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sound Assertion Semantics for the Dependable Systems Evolution Verifying Compiler

    Publication Year: 2007, Page(s):23 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    The verifying compiler (VC) project is a core component of the dependable systems evolution grand challenge. The VC offers the promise of automatically proving that a program or component is correct, where correctness is defined by program assertions. While several VC prototypes exist, all adopt a semantics for assertions that is unsound. This paper presents a consolidation of VC requirements anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behaviour Model Synthesis from Properties and Scenarios

    Publication Year: 2007, Page(s):34 - 43
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (605 KB) | HTML iconHTML

    Synthesis of behaviour models from software development artifacts such as scenario-based descriptions or requirements specifications not only helps significantly reduce the effort of model construction, but also provides a bridge between approaches geared toward requirements analysis and those geared towards reasoning about system design at the architectural level. However, the models favoured by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Oriented Model Driven Development: A Case Study for Portlets

    Publication Year: 2007, Page(s):44 - 53
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Model driven development (MDD) is an emerging paradigm for software construction that uses models to specify programs, and model transformations to synthesize executables. Feature oriented programming (FOP) is a paradigm for software product lines where programs are synthesized by composing features. feature oriented model driven development (FOMDD) is a blend of FOP and MDD that shows how product... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching and Merging of Statecharts Specifications

    Publication Year: 2007, Page(s):54 - 64
    Cited by:  Papers (37)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB) | HTML iconHTML

    Model Management addresses the problem of managing an evolving collection of models, by capturing the relationships between models and providing well-defined operators to manipulate them. In this paper, we describe two such operators for manipulating hierarchical Statecharts: Match, for finding correspondences between models, and Merge, for combining models with respect to known correspondences be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression Test Selection for AspectJ Software

    Publication Year: 2007, Page(s):65 - 74
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    As aspect-oriented software development gains popularity, there is growing interest in using aspects to implement cross-cutting concerns in object-oriented systems. When aspect-oriented features are added to an object-oriented program, or when an existing aspect-oriented program is modified, the new program needs to be regression tested to validate these changes. To reduce the cost of regression t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feedback-Directed Random Test Generation

    Publication Year: 2007, Page(s):75 - 84
    Cited by:  Papers (94)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    We present a technique that improves random test generation by incorporating feedback obtained from executing test inputs as they are created. Our technique builds inputs incrementally by randomly selecting a method call to apply and finding arguments from among previously-constructed inputs. As soon as an input is built, it is executed and checked against a set of contracts and filters. The resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compatibility and Regression Testing of COTS-Component-Based Software

    Publication Year: 2007, Page(s):85 - 95
    Cited by:  Papers (13)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Software engineers frequently update COTS components integrated in component-based systems, and can often chose among many candidates produced by different vendors. This paper tackles both the problem of quickly identifying components that are syntactically compatible with the interface specifications, but badly integrate in target systems, and the problem of automatically generating regression te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones

    Publication Year: 2007, Page(s):96 - 105
    Cited by:  Papers (73)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    Detecting code clones has many software engineering applications. Existing approaches either do not scale to large code bases or are not robust against minor code modifications. In this paper, we present an efficient algorithm for identifying similar subtrees and apply it to tree representations of source code. Our algorithm is based on a novel characterization of subtrees with numerical vectors i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder

    Publication Year: 2007, Page(s):106 - 115
    Cited by:  Papers (34)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (822 KB) | HTML iconHTML

    The increasing performance-price ratio of computer hardware makes possible to explore a distributed approach at code clone analysis. This paper presents D-CCFinder, a distributed approach at large-scale code clone analysis. D-CCFinder has been implemented with 80 PC workstations in our student laboratory, and a vast collection of open source software with about 400 million lines in total has been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis

    Publication Year: 2007, Page(s):116 - 126
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (789 KB) | HTML iconHTML

    Server page technique is commonly used for implementing Web application user interfaces. Server pages can represent many similar Web pages in a generic form. Yet our previous study revealed high rates of repetitions in Web applications, particularly in the user interfaces. Code duplication, commonly known as 'cloning', signals untapped opportunities to achieve simpler, smaller, more generic, and m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Inference of Pointcuts in Aspect-Oriented Refactoring

    Publication Year: 2007, Page(s):127 - 136
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Software refactoring is the process of reorganizing the internal structure of code while preserving the external behavior. Aspect-Oriented Programming (AOP) provides new modularization of software systems by encapsulating crosscutting concerns. Based on these two techniques, aspect-oriented (AO) refactoring restructures crosscutting elements in code. AO refactoring includes two steps: aspect minin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Framework for Automated Round-Trip Software Engineering in Static Aspect Weaving and Transformations

    Publication Year: 2007, Page(s):137 - 146
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    We present a formal framework for a recently introduced approach to automated round-trip software engineering (ARE) in source-level aspect weaving systems. Along with the formalization we improve the original method and suggest a new concept of weaving transactions in aspect-oriented programming (AOP). As the major contribution we formally show how, given a tree-shaped intermediate representation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Feature Interactions in Multi-Language Aspect-Oriented Frameworks

    Publication Year: 2007, Page(s):147 - 157
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    The simultaneous use of multiple aspect languages has the potential of becoming a significant one, as new aspect- oriented frameworks are developed and existing ones expand to incorporate features of others. A key challenge in combining multiple aspect-oriented languages is identifying and resolving adverse feature interactions. These interactions occur due to the incompatible and inconsistent tre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking Code Clones in Evolving Software

    Publication Year: 2007, Page(s):158 - 167
    Cited by:  Papers (41)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has provided evidence that it may not always be practical, feasible, or cost-effective to eliminate certain clone groups. We propose a technique for tracking clones in evolving software. Our technique relies on the concept of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do Maintainers Utilize Deployed Design Patterns Effectively?

    Publication Year: 2007, Page(s):168 - 177
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    One claimed benefit of deploying design patterns is facilitating maintainers to perform anticipated changes. However, it is not at all obvious that the relevant design patterns deployed in software will invariably be utilized for the changes. Moreover, we observe that many well-known design patterns consist of three types of programming elements (called participants), and that performing an antici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.