By Topic

Proceedings. 26th International Conference on Software Engineering

23-28 May 2004

Filter Results

Displaying Results 1 - 25 of 137
  • An introduction to computing system dependability

    Publication Year: 2004, Page(s):730 - 731
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    It is important that computer engineers, software engineers, project managers, and users understand the major elements of current technology in the field of dependability, yet this material tends to be unfamiliar to researchers and practitioners alike. Researchers are often concerned in one way or another with some aspect of what is mistakenly called software "reliability". All practitioners are c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture reconstruction

    Publication Year: 2004, Page(s):745 - 746
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Architecture reconstruction is the reverse engineering process that aims at recovering the past design decisions that have been made about the software architecture of a system. To be a successful activity, we need to identify the proper architecturally significant information and to extract it from the artefacts. How to identify extract/present/analyse it? What are the critical issues that have t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile process tailoring and problem analysis (APTLY)

    Publication Year: 2004, Page(s):45 - 47
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Developing software using a well-defined, well-understood process improves the likelihood of delivering a product with the required quality. Enhancing that process to meet recognised process standards, such as CMMI and ISO 9000, can further facilitate the development of complex systems in a repeatable and predictable way. There are tradeoffs involved, however. In particular, because projects diffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Getting results from search-based approaches to software engineering

    Publication Year: 2004, Page(s):728 - 729
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Like other engineering disciplines, software engineering is typically concerned with near optimal solutions or those which fall within a specified applicable tolerance. More recently, search-based techniques have started to find application in software engineering problem domains. This area of search-based software engineering has its origins in work on search-based testing, which began in the mid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polyphony in architecture

    Publication Year: 2004, Page(s):533 - 542
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Based on interviews with a number of architects and managers from a wide range of organizations, we characterize how architecture is perceived in practice. We identify three groups of organizations that differ with respect to their level of architectural thinking and the alignment of business and IT on architectural issues. Analysis of the interviews further indicates that these three groups diffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal concept analysis in software engineering

    Publication Year: 2004, Page(s):743 - 744
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Given a binary relationship between objects and attributes, concept analysis is a powerful technique to organize pairs of related sets of objects and attributes into a concept lattice, where higher level concepts represent general features shared by many objects, while lower level concepts represent the object-specific features. Concept analysis was recently applied to several software engineering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical studies on requirement management measures

    Publication Year: 2004, Page(s):42 - 44
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    The goal of this research is to demonstrate that a subset of a set of 38 requirements management measures are good predictors of stability and volatility of requirements and change requests. At the time of writing we have theoretically validated ten of these 38 measures. We are currently planning and performing an industrial case study where we want to reach the goal described above. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectures and technologies for enterprise application integration

    Publication Year: 2004, Page(s):726 - 727
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and Web-enabled business functions, all across multiple legacy applications. The underlying architectures for such systems are embodied in a range of diverse products known as enterprise application integration (EAI) technologies. In this paper, we highlig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual timed event scenarios

    Publication Year: 2004, Page(s):168 - 177
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    Formal description of real-time requirements is a difficult and error prone task. Conceptual and tool support for this activity plays a central role in the agenda of technology transference from the formal verification engineering community to the real-time systems development practice. In this article we present VTS, a visual language to define complex event-based requirements such as freshness, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software visualization for object-oriented program comprehension

    Publication Year: 2004, Page(s):63 - 65
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Software visualisation is the process of modelling software systems for comprehension. The comprehension of software systems both during and after development is a crucial component of the software process. The complex interactions inherent in the object-oriented paradigm make visualisation a particularly appropriate comprehension technique, and the large volume of information typically generated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical comparison of dynamic impact analysis algorithms

    Publication Year: 2004, Page(s):491 - 500
    Cited by:  Papers (45)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    Impact analysis - determining the potential effects of changes on a software system - plays an important role in software engineering tasks such as maintenance, regression testing, and debugging. In previous work, two new dynamic impact analysis techniques, CoverageImpact and PathImpact, were presented. These techniques perform impact analysis based on data gathered about program behavior relative... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering for large-scale multi-agent systems - SELMAS'04

    Publication Year: 2004, Page(s):752 - 753
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    The development of multiagent systems (MAS) is not a trivial task. In addition, with the advances in Internet technologies, MAS are undergoing a transition from closed to open architectures composed of a huge number of autonomous agents, which operate and move across different environments. In fact, openness introduces additional complexity to the system modeling, design and implementation. It als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying DAML+OIL and beyond in Z/EVES

    Publication Year: 2004, Page(s):201 - 210
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Semantic Web, the next generation of Web, gives data well-defined and machine-understandable meaning so that they can be processed by remote intelligent agents cooperatively. Ontology languages are the building blocks of Semantic Web as they prescribe how data are defined and related. The existing reasoning and verification tools for Semantic Web are improving however still elementary. We believe ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast assembly level reverse execution method via dynamic slicing

    Publication Year: 2004, Page(s):522 - 531
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    One of the most time consuming parts of debugging is trying to locate a bug. In this context, there are two powerful debugging aids which shorten debug time considerably: reverse execution and dynamic slicing. Reverse execution eliminates the need for repetitive program restarts every time a bug location is missed. Dynamic slicing, on the other hand, isolates code parts that influence an erroneous... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial: an overview of UML 2.0

    Publication Year: 2004, Page(s):741 - 742
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    This paper covers the salient aspects of the first major revision of the Unified Modeling Language - UML 2.0. In this brief summary, we briefly review some of the main points covered in the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parametric analysis of real-time embedded systems with abstract approximation interpretation

    Publication Year: 2004, Page(s):39 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    My research area is fundamental of formal analysis of real-time embedded systems. The main objective of this research is the theoretical and practical development of a verification algorithm for the formal analysis of real-time embedded systems based on the combination of real-time model checking and abstract interpretation of real-time models. The objective of the proposed combination is an impro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The CommUnity workbench

    Publication Year: 2004, Page(s):709 - 710
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    CommUnity proposes a formal approach to software architecture. It uses a parallel program design language in the style of Unity programs (Chandy and Misra, 1988), combining elements from IP (Francez and Forman, 1996). The concepts of software architecture - including configuration, connection, connector, component, instantiation - are clearly defined. CommUnity was initially developed to show how ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traits: tools and methodology

    Publication Year: 2004, Page(s):676 - 686
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (969 KB) | HTML iconHTML

    Traits are an object-oriented programming language construct that allow groups of methods to be named and reused in arbitrary places in an inheritance hierarchy. Classes can use methods from traits as well as defining their own methods and instance variables. Traits thus enable a new style of programming, in which traits rather than classes are the primary unit of reuse. However, the additional su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software modeling techniques and the semantic Web

    Publication Year: 2004, Page(s):724 - 725
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Following the success of XML, W3C envisions the semantic Web (Berners-Lee et al., 2001) as the next generation of Web in which data are given well-defined and machine-understandable semantics so that they can be processed by intelligent software agents. Semantic Web can be regarded as an emerging area from the knowledge representation and the Web communities. The software engineering community can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting statechart synthesis with an algebraic approach

    Publication Year: 2004, Page(s):242 - 251
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1250 KB) | HTML iconHTML

    The idea of synthesizing statecharts out of a collection of scenarios has received a lot of attention in recent years. However due to the poor expressive power of first generation scenario languages, including UML 1.x sequence diagrams, the proposed solutions often use ad hoc tricks and suffer from many shortcomings. The recent adoption in UML 2.0 of a richer scenario language, including interesti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using simulation to empirically investigate test coverage criteria based on statechart

    Publication Year: 2004, Page(s):86 - 95
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    A number of testing strategies have been proposed using state machines and statecharts as test models in order to derive test sequences and validate classes or class clusters. Though such criteria have the advantage of being systematic, little is known on how cost effective they are and how they compare to each other. This article presents a precise simulation and analysis procedure to analyze the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theme: an approach for aspect-oriented analysis and design

    Publication Year: 2004, Page(s):158 - 167
    Cited by:  Papers (66)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Aspects are behaviours that are tangled and scattered across a system. In requirements documentation, aspects manifest themselves as descriptions of behaviours that are intertwined, and woven throughout. Some aspects may be obvious, as specifications of typical crosscutting behaviour. Others may be more subtle, making them hard to identify. In either case, it is difficult to analyse requirements t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a software testing and reliability early warning metric suite

    Publication Year: 2004, Page(s):60 - 62
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    The field reliability is measured too late for affordably guiding corrective action to improve the quality of the software. Software developers can benefit from an early warning of their reliability while they can still affordably react. This early warning can be built from a collection of internal metrics. An internal metric, such as the number of lines of code, is a measure derived from the prod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Imposing a memory management discipline on software deployment

    Publication Year: 2004, Page(s):583 - 592
    Cited by:  Papers (11)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    The deployment of software components frequently fails because dependencies on other components are not declared explicitly or are declared imprecisely. This results in an incomplete reproduction of the environment necessary for proper operation, or in interference between incompatible variants. In this paper, we show that these deployment hazards are similar to pointer hazards in memory models of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding latent code errors via machine learning over program executions

    Publication Year: 2004, Page(s):480 - 490
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    This paper proposes a technique for identifying program properties that indicate errors. The technique generates machine learning models of program properties known to result from errors, and applies these models to program properties of user-written code to classify and rank properties that may lead the user to errors. Given a set of properties produced by the program analysis, the technique sele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.