Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Software Maintenance, 2008. ICSM 2008. IEEE International Conference on

Date Sept. 28 2008-Oct. 4 2008

Filter Results

Displaying Results 1 - 25 of 87
  • [CD label]

    Publication Year: 2008 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (401 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (596 KB)  
    Freely Available from IEEE
  • Hub page

    Publication Year: 2008 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (273 KB)  
    Freely Available from IEEE
  • Session list

    Publication Year: 2008 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (23 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): iv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • Brief author index

    Publication Year: 2008 , Page(s): xvii - xxi
    Save to Project icon | Request Permissions | PDF file iconPDF (31 KB)  
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2008 , Page(s): xxii - liv
    Save to Project icon | Request Permissions | PDF file iconPDF (94 KB)  
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2008 , Page(s): lv
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • Information for authors

    Publication Year: 2008 , Page(s): lvi
    Save to Project icon | Request Permissions | PDF file iconPDF (18 KB)  
    Freely Available from IEEE
  • Frequently asked questions

    Publication Year: 2008 , Page(s): lvii - lix
    Save to Project icon | Request Permissions | PDF file iconPDF (194 KB)  
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2008 , Page(s): lx
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB)  
    Freely Available from IEEE
  • Welcome from the General Chairs

    Publication Year: 2008 , Page(s): lxi - lxii
    Save to Project icon | Request Permissions | PDF file iconPDF (260 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome from the Program Chairs

    Publication Year: 2008 , Page(s): lxiii - lxiv
    Save to Project icon | Request Permissions | PDF file iconPDF (162 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2008 , Page(s): lxv - lxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (105 KB)  
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2008 , Page(s): lxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008 , Page(s): lxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB)  
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2008 , Page(s): lxix - lxx
    Save to Project icon | Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2008 , Page(s): lxxi - lxxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (780 KB)  
    Freely Available from IEEE
  • Offering software maintenance as an offshore service

    Publication Year: 2008 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (81 KB) |  | HTML iconHTML  

    This keynote is directed to the software service organizations in the emerging countries of Asia and South America as well as to outsourcing companies in Eastern Europe. It summarizes the sad state of many western user organizations caught in the legacy software trap and how eastern software shops can help them. The talk focuses on the processes, techniques and tools required to run a remote software maintenance operation, the legalities of maintenance contracts and the economics of outsourced services. The speaker shares his experience in how to establish a good customer relationship and how to charge the services in a way that is acceptable to both the customer and the service provider. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refinement and test case generation in Unifying Theory of Programming

    Publication Year: 2008 , Page(s): 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (93 KB)  

    This talk presents a theory of testing that integrates into Hoare and Hepsilas Unifying Theory of Programming (UTP). We give test cases a denotational semantics by viewing them as specification predicates. This reformulation of test cases allows for relating test cases via refinement to specifications and programs. Having such a refinement order that integrates test cases, we develop a testing theory for fault-based testing. Fault-based testing uses test data designed to demonstrate the absence of a set of pre-specified faults. A well-known fault-based technique is mutation testing. In mutation testing, first, faults are injected into a program by altering (mutating) its source code. Then, test cases that can detect these errors are designed. The assumption is that other faults will be caught, too. We apply the mutation technique to both specifications and programs. Using our theory of testing, two new test case generation laws for detecting injected (anticipated) faults are presented: one is based on the semantic level of design specifications, the other on the algebraic properties of a programming language. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On evaluating the efficiency of software feature development using algebraic manifolds

    Publication Year: 2008 , Page(s): 7 - 16
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (809 KB) |  | HTML iconHTML  

    Managers are often unable to explain objectively why or when effort was misplaced during the development process. In this paper, we present a formal technique to depict the expended effort during the life-cycle of a software feature using feature development manifolds (FDMs). Using the FDMs we can compute the preferred development path for a given feature. This development path includes the versions of a software feature that contributed to the final version of the feature in a positive way. The preferred development path excludes versions of the software feature that should have been skipped. Once the preferred development path is computed the amount of wasted effort can be quantified using the metric that we have developed. We demonstrate the effectiveness of our approach to compute wasted software feature development by applying our technique to two large open source software systems, Gaim and Firefox. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A constraint-driven human resource scheduling method in software development and maintenance process

    Publication Year: 2008 , Page(s): 17 - 26
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB) |  | HTML iconHTML  

    Software processes are highly people-dependent and knowledge transfer-centric compared to traditional manufacturing processes. Different people are responsible for different types of knowledge transformation according to the skill set and expertise they master. This adds a great deal of complicated factors in resolving the scheduling problem in software development and maintenance process planning. The existing human resource scheduling methods do not take into account the differences between human resource capabilities and capacities in processes execution. This paper presents a constraint-driven human resource scheduling method in software development and maintenance process. A constraint model is set up based on the software process model and human resource model. A constraint-driven scheduling method is provided to realize the optimal human resource scheduling in software development and maintenance process. The method can be used in the mature organizations whose human resources have the determinate capabilities. It provides the excellent decision support to the project manager. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using structural and semantic metrics to improve class cohesion

    Publication Year: 2008 , Page(s): 27 - 36
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (383 KB) |  | HTML iconHTML  

    Several refactoring methods have been proposed in the literature to improve the cohesion of classes. Very often, refactoring operations are guided by cohesion metrics based on the structural information of the source code, such as attribute references in methods. In this paper we present a novel approach to guide the extract class refactoring (M. Fowler, 1999), taking into account structural and semantic cohesion metrics. The proposed approach has been evaluated in a case study conducted on JHotDraw, an open source software system. The achieved results revealed that the performance achieved with the proposed approach significantly outperforms the results achieved with methods considering only structural or semantic information. The proposed approach has also been integrated in the Eclipse platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating the effects of framework design knowledge in example-based framework learning

    Publication Year: 2008 , Page(s): 37 - 46
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB) |  | HTML iconHTML  

    Studying example applications is a common approach to learning software frameworks. However, to be truly effective in adapting example solutions with high confidence and accuracy, a developer needs to learn enough about the framework designs. The empirical study described in this paper investigates the effectiveness of a new approach to framework learning, where example-based learning is augmented with instruction on framework designs. Learning framework designs up-front from an instructor helps developers acquire the necessary design knowledge and avoid the time-consuming task of recovering such knowledge from code and other artifacts. The particular question of interest in this study is how characteristics of the framework designs influence project outcome. 11 student projects are analyzed using both qualitative and quantitative methods to characterize the overall reuse practice and to detect salient patterns that address the question. The contribution of this paper is a set of well-supported hypotheses that can be tested in future studies as well as their implications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of programming and application-specific knowledge on maintenance effort:A hazard rate model

    Publication Year: 2008 , Page(s): 47 - 56
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (178 KB) |  | HTML iconHTML  

    We empirically test the relative impact of general programming knowledge and application-specific knowledge on maintenance productivity. One hundred undergraduates participated in a quasi-experiment that required them to perform two maintenance tasks in sequence on an inventory control application. Each maintenance task involved a modification to the original application and the hours needed to complete each maintenance task are used to measure productivity. Since subjects may submit modifications that do not meet all the user requirements, the person-hours spent can be less than the actual hours required if modified applications were to meet the user requirements completely. That is, the observed time effort censored the actual required time effort. To overcome the challenge of this censored time problem, we use a proportional hazard model to model the effect of human capital on productivity. The method of maximum likelihood estimation was used to estimate the model parameters. Our study enables us to draw several implications for formulating hiring policies relating to software maintenance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.