By Topic

Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on

Date 23-28 May 2004

Filter Results

Displaying Results 1 - 25 of 137
  • Software architecture reconstruction

    Publication Year: 2004 , Page(s): 745 - 746
    Cited by:  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (197 KB) |  | HTML iconHTML  

    Architecture reconstruction is the reverse engineering process that aims at recovering the past design decisions that have been made about the software architecture of a system. To be a successful activity, we need to identify the proper architecturally significant information and to extract it from the artefacts. How to identify extract/present/analyse it? What are the critical issues that have t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectures and technologies for enterprise application integration

    Publication Year: 2004 , Page(s): 726 - 727
    Cited by:  Papers (5)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and Web-enabled business functions, all across multiple legacy applications. The underlying architectures for such systems are embodied in a range of diverse products known as enterprise application integration (EAI) technologies. In this paper, we highlig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An introduction to computing system dependability

    Publication Year: 2004 , Page(s): 730 - 731
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (208 KB) |  | HTML iconHTML  

    It is important that computer engineers, software engineers, project managers, and users understand the major elements of current technology in the field of dependability, yet this material tends to be unfamiliar to researchers and practitioners alike. Researchers are often concerned in one way or another with some aspect of what is mistakenly called software "reliability". All practitioners are c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elaborating security requirements by construction of intentional anti-models

    Publication Year: 2004 , Page(s): 148 - 157
    Cited by:  Papers (65)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (273 KB) |  | HTML iconHTML  

    Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systematically through the various stages of the requirements engineering process. The paper presents a constructive approach to the modeling, specification and analysis of application-specific security requirements. The method i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical comparison of dynamic impact analysis algorithms

    Publication Year: 2004 , Page(s): 491 - 500
    Cited by:  Papers (31)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    Impact analysis - determining the potential effects of changes on a software system - plays an important role in software engineering tasks such as maintenance, regression testing, and debugging. In previous work, two new dynamic impact analysis techniques, CoverageImpact and PathImpact, were presented. These techniques perform impact analysis based on data gathered about program behavior relative... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Responsibilities and rewards: specifying design patterns

    Publication Year: 2004 , Page(s): 666 - 675
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (326 KB) |  | HTML iconHTML  

    Design patterns provide guidance to system designers on how to structure individual classes or groups of classes, as well as constraints on the interactions among these classes, to enable them to implement flexible and reliable systems. Patterns are usually described informally. While such informal descriptions are useful and even essential, if we want to be sure that designers precisely and unamb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical studies on requirement management measures

    Publication Year: 2004 , Page(s): 42 - 44
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (222 KB) |  | HTML iconHTML  

    The goal of this research is to demonstrate that a subset of a set of 38 requirements management measures are good predictors of stability and volatility of requirements and change requests. At the time of writing we have theoretically validated ten of these 38 measures. We are currently planning and performing an industrial case study where we want to reach the goal described above. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using compressed bytecode traces for slicing Java programs

    Publication Year: 2004 , Page(s): 512 - 521
    Cited by:  Papers (13)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    Dynamic slicing is a well-known program debugging technique. Given a program P and input I, it finds all program statements which directly/indirectly affect the values of some variables' occurrences when P is executed with I. Dynamic slicing algorithms often proceed by traversing the execution trace of P produced by input I (or a dependence graph which captures control/data flow in the execution t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining version histories to guide software changes

    Publication Year: 2004 , Page(s): 563 - 572
    Cited by:  Papers (125)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (548 KB) |  | HTML iconHTML  

    We apply data mining to version histories in order to guide programmers along related changes: "Programmers who changed these functions also changed. . . ". Given a set of existing changes, such rules (a) suggest and predict likely further changes, (b) show up item coupling that is indetectable by program analysis, and (c) prevent errors due to incomplete changes. After an initial change, our ROSE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams

    Publication Year: 2004 , Page(s): 502 - 511
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    Dynamic slicing algorithms can greatly reduce the debugging effort by focusing the attention of the user on a relevant subset of program statements. Recently, algorithms for forward computation of dynamic slices have been proposed which maintain dynamic slices of all variables as the program executes. An advantage of this approach is that when a request for a slice is made, it is already available... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic-based model refinement for FLAVERS

    Publication Year: 2004 , Page(s): 635 - 644
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    FLAVERS is a finite-state verification approach that allows an analyst to incrementally add constraints to improve the precision of the model of the system being analyzed. Except for trivial systems, however, it is impractical to compute which constraints should be selected to produce precise results for the least cost. Thus, constraint selection has been a manual task, guided by the intuition of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polyphony in architecture

    Publication Year: 2004 , Page(s): 533 - 542
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    Based on interviews with a number of architects and managers from a wide range of organizations, we characterize how architecture is perceived in practice. We identify three groups of organizations that differ with respect to their level of architectural thinking and the alignment of business and IT on architectural issues. Analysis of the interviews further indicates that these three groups diffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding latent code errors via machine learning over program executions

    Publication Year: 2004 , Page(s): 480 - 490
    Cited by:  Papers (18)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (328 KB) |  | HTML iconHTML  

    This paper proposes a technique for identifying program properties that indicate errors. The technique generates machine learning models of program properties known to result from errors, and applies these models to program properties of user-written code to classify and rank properties that may lead the user to errors. Given a set of properties produced by the program analysis, the technique sele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual timed event scenarios

    Publication Year: 2004 , Page(s): 168 - 177
    Cited by:  Papers (7)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (569 KB) |  | HTML iconHTML  

    Formal description of real-time requirements is a difficult and error prone task. Conceptual and tool support for this activity plays a central role in the agenda of technology transference from the formal verification engineering community to the real-time systems development practice. In this article we present VTS, a visual language to define complex event-based requirements such as freshness, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature-oriented programming and the AHEAD tool suite

    Publication Year: 2004 , Page(s): 702 - 703
    Cited by:  Papers (20)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (218 KB) |  | HTML iconHTML  

    Feature oriented programming (FOP) is an emerging paradigm for application synthesis, analysis, and optimization. A target application is specified declaratively as a set of features, like many consumer products (e.g., personal computers, automobiles). FOP technology translates such declarative specifications into efficient programs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calculating architectural reliability via modeling and analysis

    Publication Year: 2004 , Page(s): 69 - 71
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (246 KB) |  | HTML iconHTML  

    We present a software architecture-based approach to compositional estimation of system's reliability. Our approach is applicable to early stages of development when the implementation artifacts are not yet available, and exact execution profile is unknown. The uncertainty of the execution profile is modeled using stochastic processes with unknown parameters. The compositional approach calculates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid small and large: distributed systems and global communities

    Publication Year: 2004
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    Summary form only given. Grid technologies seek to enable collaborative problem solving and resource sharing within distributed, multi-organizational virtual organizations. Two characteristics of Grid environments make the engineering of systems and applications particularly challenging. First, we face the familiar difficulties that arise when developing software that must provide reliability, per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing object-oriented software

    Publication Year: 2004 , Page(s): 739 - 740
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (197 KB) |  | HTML iconHTML  

    The best approach to testing object-oriented software depends on many factors: the application-under-test, the development approach, the organization of the development and quality assurance teams, the criticality of the application, the development environment and the implementation language(s), the use of design and language features, project timing and resource constraints. Nonetheless, we can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ProSim'04-the 5th international workshop on software process simulation and modeling

    Publication Year: 2004 , Page(s): 777 - 778
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • χ-SCTL/MUS: a formal methodology to evolve multi-perspective software requirements specifications

    Publication Year: 2004 , Page(s): 72 - 74
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (234 KB) |  | HTML iconHTML  

    The objective of this thesis is to extend the formal methodology of refinement of requirements specifications SCTL/MUS to a multi-perspective environment where coexist requirements specifications which belong to each stakeholder involved in the software development of the system. To reach this goal, the new methodology (referred to as χ-SCTL/MUS) bets on using a viewpoint-based approach which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing new approaches for software design quality improvement based on subjective evaluations

    Publication Year: 2004 , Page(s): 48 - 50
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    This research abstract presents two approaches for utilizing the developers' subjective design quality evaluations during the software lifecycle. In process-based approach developers study and improve their system's structure at fixed intervals. Tool-based approach uses subjective evaluations as input to tool analysis. These approaches or their combination are expected to improve software design a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental, pluggable infrastructure for modular configuration management policy composition

    Publication Year: 2004 , Page(s): 573 - 582
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    Building a configuration management (CM) system is a difficult endeavor that regularly requires tens of thousands of lines of code to be written. To reduce this effort, several experimental infrastructures have been developed that provide reusable repositories upon which to build a CM system. In this paper, we push the idea of reusability even further. Whereas existing infrastructures only reuse a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecting in the face of uncertainty: an experience report

    Publication Year: 2004 , Page(s): 543 - 551
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (362 KB) |  | HTML iconHTML  

    Understanding an application's functional and non-functional requirements is normally seen as essential for developing a robust product suited to client needs. This paper describes our experiences in a project that, by necessity, commenced well before concrete client requirements could be known. After a first version of the application was successfully released, emerging requirements forced an evo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GAMMATELLA: visualization of program-execution data for deployed software

    Publication Year: 2004 , Page(s): 699 - 700
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    To investigate the program-execution data efficiently, we must be able to view the data at different levels of detail. In our visualization approach, we represent software systems at three different levels: statement level, file level, and system level. At the statement level, we represent the actual code. The representation at the file level provides a miniaturized view of the source code similar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Precise modeling of design patterns in UML

    Publication Year: 2004 , Page(s): 252 - 261
    Cited by:  Papers (6)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (305 KB) |  | HTML iconHTML  

    Prior research attempts to formalize the structure of object-oriented design patterns for a more precise specification of design patterns. It also allows automation support to be developed for user-defined design patterns in the future CASE tools. Targeting to a particular type of automation (e.g. verification of pattern instances), previous specification approaches over-specify pattern structures... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.