By Topic

Software Maintenance, 2009. ICSM 2009. IEEE International Conference on

Date 20-26 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 98
  • [Title page]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2009 , Page(s): x - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2009 , Page(s): 585 - 587
    Save to Project icon | Request Permissions | PDF file iconPDF (57 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (22 KB)  
    Freely Available from IEEE
  • Welcome from the general chair

    Publication Year: 2009 , Page(s): v
    Save to Project icon | Request Permissions | PDF file iconPDF (120 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome from the program co-chairs

    Publication Year: 2009 , Page(s): vi
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2009 , Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (348 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2009 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • 25 years of software maintenance

    Publication Year: 2009 , Page(s): 3 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (416 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Reduce, reuse, recycle, recover: Techniques for improved regression testing

    Publication Year: 2009
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Architecture of product lines

    Publication Year: 2009 , Page(s): 6
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Experimental assessment of manual versus tool-based maintenance of GUI-directed test scripts

    Publication Year: 2009 , Page(s): 9 - 18
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (162 KB) |  | HTML iconHTML  

    Since manual black-box testing of GUI-based APplications (GAPs) is tedious and laborious, test engineers create test scripts to automate the testing process. These test scripts interact with GAPs by performing actions on their GUI objects. As GAPs evolve, testers should fix their corresponding test scripts so that they can reuse them to test successive releases of GAPs. Currently, there are two ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prioritizing JUnit test cases in absence of coverage information

    Publication Year: 2009 , Page(s): 19 - 28
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (698 KB) |  | HTML iconHTML  

    Better orderings of test cases can detect faults in less time with fewer resources, and thus make the debugging process earlier and accelerate software delivery. As a result, test case prioritization has become a hot topic in the research of regression testing. With the popularity of using the JUnit testing framework for developing Java software, researchers also paid attention to techniques for p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prioritizing component compatibility tests via user preferences

    Publication Year: 2009 , Page(s): 29 - 38
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (602 KB) |  | HTML iconHTML  

    Many software systems rely on third-party components during their build process. Because the components are constantly evolving, quality assurance demands that developers perform compatibility testing to ensure that their software systems build correctly over all deployable combinations of component versions, also called configurations. However, large software systems can have many configurations,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linux kernels as complex networks: A novel method to study evolution

    Publication Year: 2009 , Page(s): 41 - 50
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (471 KB) |  | HTML iconHTML  

    In recent years, many graphs have turned out to be complex networks. This paper presents a novel method to study Linux kernel evolution - using complex networks to understand how Linux kernel modules evolve over time. After studying the node degree distribution and average path length of the call graphs corresponding to the kernel modules of 223 different versions (V1.1.0 to V2.4.35), we found tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a better understanding of software evolution: An empirical study on open source software

    Publication Year: 2009 , Page(s): 51 - 60
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (417 KB) |  | HTML iconHTML  

    Software evolution is a fact of life. Over the past thirty years, researchers have proposed hypotheses on how software changes, and provided evidence that both supports and refutes these hypotheses. To paint a clearer image of the software evolution process, we performed an empirical study on long spans in the lifetime of seven open source projects. Our analysis covers 653 official releases, and a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey-based study of the mapping of system properties to ISO/IEC 9126 maintainability characteristics

    Publication Year: 2009 , Page(s): 61 - 70
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (558 KB) |  | HTML iconHTML  

    The ISO/IEC 9126 international standard for software product quality is a widely accepted reference for terminology regarding the multi-faceted concept of software product quality. Based on this standard, the Software Improvement Group has developed a pragmatic approach for measuring technical quality of software products. This quality model introduces another level below the hierarchy defined by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Criteria for the evaluation of implemented architectures

    Publication Year: 2009 , Page(s): 73 - 82
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    Software architecture evaluation methods aim at identifying potential maintainability problems for a given architecture. Several of these methods exist, which typically prescribe the structure of the evaluation process. Often left implicit, however, are the concrete system attributes that need to be studied in order to assess the maintainability of implemented architectures. To determine this set ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Playing roles in design patterns: An empirical descriptive and analytic study

    Publication Year: 2009 , Page(s): 83 - 92
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (336 KB) |  | HTML iconHTML  

    This work presents a descriptive and analytic study of classes playing zero, one, or two roles in six different design patterns (and combinations thereof). First, we answer three research questions showing that (1) classes playing one or two roles do exist in programs and are not negligible and that there are significant differences among the (2) internal (class metrics) and (3) external (change-p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decomposing object-oriented class modules using an agglomerative clustering technique

    Publication Year: 2009 , Page(s): 93 - 101
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (212 KB) |  | HTML iconHTML  

    Software can be considered a live entity, as it undergoes many alterations throughout its lifecycle. Furthermore, developers do not usually retain a good design in favor of adding new features, comply with requirements or meet deadlines. For these reasons, code can become rather complex and difficult to understand. More particularly in object-oriented systems, classes may become very large and les... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting virus mutations via dynamic matching

    Publication Year: 2009 , Page(s): 105 - 114
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle the obfuscated viruses well since its detection methods that are based upon static signatures are not resilient to even slight variations in the code that forms the virus. In this paper, we propose a new type of virus si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression model checking

    Publication Year: 2009 , Page(s): 115 - 124
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (284 KB) |  | HTML iconHTML  

    Model checking is a promising technique for verifying program behavior and is increasingly finding usage in industry. To date, however, researchers have primarily considered model checking of single versions of programs. It is well understood that model checking can be very expensive for large, complex programs. Thus, simply reapplying model checking techniques on subsequent versions of programs a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated performance analysis of load tests

    Publication Year: 2009 , Page(s): 125 - 134
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    The goal of a load test is to uncover functional and performance problems of a system under load. Performance problems refer to the situations where a system suffers from unexpectedly high response time or low throughput. It is difficult to detect performance problems in a load test due to the absence of formally defined performance objectives and the large amount of data that must be examined. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inquiring the usage of aspect-oriented programming: An empirical study

    Publication Year: 2009 , Page(s): 137 - 146
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (503 KB) |  | HTML iconHTML  

    Back in 2001, the MIT announced aspect-oriented programming as a key technology in the next 10 years. Nowadays, 8 years later, AOP is not widely adopted. Several reasons can explain this distrust in front of AOP, and one of them is the lack of robust tools for analysis, testing and maintenance. In order to develop dedicated solutions for assisting the development with AOP, and increase its adoptio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.