Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001

12-19 May 2001

Filter Results

Displaying Results 1 - 25 of 112
  • Evaluating the accuracy of defect estimation models based on inspection data from two inspection cycles

    Publication Year: 2001, Page(s):145 - 154
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (952 KB) | HTML iconHTML

    Defect content estimation techniques (DCETs), based on defect data from inspection, estimate the total number of defects in a document to evaluate the development process. For inspections that yield few data points DCETs reportedly underestimate the number of defects. If there is a second inspection cycle, the additional defect data is expected to increase estimation accuracy. In this paper we con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of the mobile agent architecture for distributed consistency management

    Publication Year: 2001, Page(s):799 - 800
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (172 KB) | HTML iconHTML

    The proposed mobile agent architecture for carrying out incremental consistency checks between sets of distributed software engineering documents is described and evaluated. Functionality of architectural components and collaboration between them throughout the consistency check are described. Architecture simulation, based on concurrent "execution" of state chart models of components, is used for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating features in source code: an exploratory study

    Publication Year: 2001, Page(s):275 - 284
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (996 KB) | HTML iconHTML

    Most software systems are inflexible. Reconfiguring a system's modules to add or to delete a feature requires substantial effort. This inflexibility increases the costs of building variants of a system, amongst other problems. New languages and tools that are being developed to provide additional support for separating concerns show promise to help address this problem. However applying these mech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scenario-driven approach to traceability

    Publication Year: 2001, Page(s):123 - 132
    Cited by:  Papers (26)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1036 KB) | HTML iconHTML

    Design traceability has been widely recognized as being an integral aspect of software development. In the past years this fact has been amplified due to the increased use of legacy systems and COTS (commercial-off-the-shelf) components mixed with the growing use of elaborate "upstream" software modeling techniques such as the Unified Modeling Language (UML). The more intensive emphasis on upstrea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving legacy systems using feature engineering and CBSE

    Publication Year: 2001, Page(s):797 - 798
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (180 KB) | HTML iconHTML

    This dissertation explores the relationships between feature engineering, CBSE, and software evolution. Software end-users and developers have different perspectives of a software system, resulting in a complexity gap between user expectations and the software functionality. This gap together with aging code has resulted in lost assets for many organizations. By combining feature engineering and C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting the map metaphor in a tool for software evolution

    Publication Year: 2001, Page(s):265 - 274
    Cited by:  Papers (33)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1244 KB) | HTML iconHTML

    Software maintenance and evolution are the dominant activities in the software lifecycle. Modularization can separate design decisions and allow them to be independently revolved, but modularization often breaks down and complicated global changes are required. Tool support can reduce the costs of these unfortunate changes, but current tools are limited in their ability to manage information for l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the syllogistic structure of object-oriented programming

    Publication Year: 2001, Page(s):113 - 122
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (784 KB) | HTML iconHTML

    Recent works by J.F. Sowa (2000) and D. Rayside and G.T. Campbell (2000) demonstrate that there is a strong connection between object-oriented programming and the logical formalism of the syllogism, first set down by Aristotle in the Prior Analytics (1928). In this paper, we develop an understanding of polymorphic method invocations in terms of the syllogism, and apply this understanding to the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web engineering device independent Web services

    Publication Year: 2001, Page(s):795 - 796
    Cited by:  Papers (2)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (184 KB) | HTML iconHTML

    Today's Web services not only have to be flexible, but also have to be device independent to support mobile devices such as WAP and PDAs. Supporting multiple Web formats (e.g., WML, HTML, etc.) is still an open challenge. Most sites have to provide a separate application for every format and reuse is not common. We are working on a methodology and a tool to support the Web developer in building fl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing components versus objects: a transformational approach

    Publication Year: 2001, Page(s):253 - 263
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (840 KB) | HTML iconHTML

    A good object oriented design does not necessarily make a good component based design, and vice versa. What design principles do components introduce? The paper examines component based programming and how it expands the design space in the context of an event based component architecture. We present a conceptual model for addressing new design issues these components afford, and we identify funda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting program comprehension using semantic and structural information

    Publication Year: 2001, Page(s):103 - 112
    Cited by:  Papers (77)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (928 KB) | HTML iconHTML

    Focuses on investigating the combined use of semantic and structural information of programs to support the comprehension tasks involved in the maintenance and reengineering of software systems. "Semantic information" refers to the domain-specific issues (both the problem and the development domains) of a software system. The other dimension, structural information, refers to issues such as the ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model checking distributed objects design

    Publication Year: 2001, Page(s):793 - 794
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (184 KB) | HTML iconHTML

    Potential advantages brought about by distributed system architectures has given rise to the number of applications being based around it. Advantages include an increase in fault tolerance due to replicated components and achieving cost effective scalability by distributing the execution of a task over several relatively cheap hosts rather than a central mainframe. The construction of distributed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Holmes: an intelligent system to support software product line development

    Publication Year: 2001, Page(s):829 - 830
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB) | HTML iconHTML

    Holmes is a software product line tool that supports all core activities of software product line analysis and development. Holmes integrates its tools using a blackboard architecture based on a Linda tuple space. A novel feature is the use of a critiquing system to provide semantic support. This is demonstrated with an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivability analysis of networked systems

    Publication Year: 2001, Page(s):307 - 317
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (964 KB) | HTML iconHTML

    Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. Ensuring system survivability has increased in importance as critical infrastructures have become heavily dependent on computers. We present a systematic method for performing survivability analysis of networked systems. An architect injects failure and intrusion ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating wrappers for command line programs: the Cal-Aggie Wrap-O-Matic project

    Publication Year: 2001, Page(s):243 - 252
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (820 KB) | HTML iconHTML

    Software developers writing new software have strong incentives to make their products compliant to standards such as CORBA, COM, and Java Beans. Standards compliance facilitates interoperability, component based software assembly, and software reuse, thus leading to improved quality and productivity. Legacy software, on the other hand, is usually monolithic and hard to maintain and adapt. Many or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintenance support tools for Java programs: CCFinder and JAAT

    Publication Year: 2001, Page(s):837 - 838
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (168 KB) | HTML iconHTML

    This paper describes two software maintenance support tools, CCFinder (Code Clone Finder) and JAAT (Java Alias Analysis Tool), for Java programs. CCFinder identifies code clones in Java programs, while JAAT executes alias analysis for Java programs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding failures by cluster analysis of execution profiles

    Publication Year: 2001, Page(s):339 - 348
    Cited by:  Papers (100)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (940 KB) | HTML iconHTML

    We experimentally evaluate the effectiveness of using cluster analysis of execution profiles to find failures among the executions induced by a set of potential test cases. We compare several filtering procedures for selecting executions to evaluate for conformance to requirements. Each filtering procedure involves a choice of a sampling strategy and a clustering metric. The results suggest that f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software product lines: organizational alternatives

    Publication Year: 2001, Page(s):91 - 100
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (900 KB) | HTML iconHTML

    Software product lines are enjoying increasingly wide adoption in the software industry. Most authors focus on the technical and process aspects, and assume an organizational model consisting of a domain engineering unit and several application engineering units. In our cooperation with several software development organizations applying software product-line principles, we have identified several... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for heterogeneous groupware applications

    Publication Year: 2001, Page(s):475 - 484
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1112 KB) | HTML iconHTML

    The proliferation of wireless networks and small portable computing devices raises the need for applications that are adaptable to heterogeneous computing and communication environments and the contexts in which they are used. However, most current groupware systems as well as other software applications are not well prepared to handle the heterogeneity. The Manifold framework presented provides a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight analysis of operational specifications using inference graphs

    Publication Year: 2001, Page(s):57 - 67
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (944 KB) | HTML iconHTML

    The Amalia framework generates lightweight components that automate the analysis of operational specifications and designs. A key concept is the step analyzer, which enables Amalia to automatically tailor high-level analyses, such as behavior simulation and model checking, to different specification languages and representations. A step analyzer uses a new abstraction, called an inference graph, f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case study: extreme programming in a university environment

    Publication Year: 2001, Page(s):537 - 544
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (536 KB) | HTML iconHTML

    Extreme programming (XP) is a new and controversial software process for small teams. A practical training course at the University of Karlsruhe led to the following observations about the key practices of XP. First, it is unclear how to reap the potential benefits of pair programming, although pair programming produces high-quality code. Second, designing in small increments appears to be problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient filtering in publish-subscribe systems using binary decision diagrams

    Publication Year: 2001, Page(s):443 - 452
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (940 KB) | HTML iconHTML

    Implicit invocation or publish-subscribe has become an important architectural style for large-scale system design and evolution. The publish-subscribe style facilitates developing large-scale systems by composing separately developed components because the style permits loose coupling between various components. One of the major bottlenecks in using publish-subscribe systems for very large scale ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering analysis of object-oriented systems via duplication analysis

    Publication Year: 2001, Page(s):577 - 586
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (936 KB) | HTML iconHTML

    All software systems, no matter how they are designed, are subject to continuous evolution and maintenance activities to eliminate defects and extend their functionalities. This is particularly true for object-oriented systems, where we may develop different software systems using the same internal library or framework. These systems may evolve in quite different directions in order to cover diffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting the deployment of object-oriented frameworks

    Publication Year: 2001, Page(s):791 - 792
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (168 KB) | HTML iconHTML

    Frameworks are usually large and complex, and typically reusers need to understand them well enough to effectively use them. This research concentrates on verifying applications built on top of OO frameworks. The idea is to get framework builders to specify a set of constraints for the correct usage of the framework and check them using static analysis techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The specification and testing of quantified progress properties in distributed systems

    Publication Year: 2001, Page(s):201 - 210
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (800 KB) | HTML iconHTML

    There are two basic parts to the behavioral specification of distributed systems: safety and progress. In earlier work, we developed a tool to monitor progress properties of CORBA components specified using the temporal operator transient. In this paper, we address the specification and testing of transient properties that are quantified (over both bounded and unbounded domains). We categorize typ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CodeWeb: data mining library reuse patterns

    Publication Year: 2001, Page(s):827 - 828
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (200 KB) | HTML iconHTML

    Developers learn to use a software library not just from its documentation but also from toy examples and existing real-life application code (e.g. by using grep). The CodeWeb tool takes this simple idea further by a deeper analysis of a large collection of applications to see what characteristic usage of the library is like. We demonstrate the tool by showing how the KDE core libraries are used i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.