By Topic

IEEE Transactions on Software Engineering

Issue 1 • Date Jan.-Feb. 2012

Filter Results

Displaying Results 1 - 23 of 23
  • Table of Contents [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • State of the Journal

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction: International Conference on Software Engineering

    Publication Year: 2012, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • How We Refactor, and How We Know It

    Publication Year: 2012, Page(s):5 - 18
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1141 KB) | HTML iconHTML

    Refactoring is widely practiced by developers, and considerable research and development effort has been invested in refactoring tools. However, little has been reported about the adoption of refactoring tools, and many assumptions about refactoring practice have little empirical support. In this paper, we examine refactoring tool usage and evaluate some of the assumptions made by other researcher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Work Item Tagging: Communicating Concerns in Collaborative Software Development

    Publication Year: 2012, Page(s):19 - 34
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1060 KB) | HTML iconHTML

    In collaborative software development projects, work items are used as a mechanism to coordinate tasks and track shared development work. In this paper, we explore how “tagging,” a lightweight social computing mechanism, is used to communicate matters of concern in the management of development tasks. We present the results from two empirical studies over 36 and 12 months, respective... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invariant-Based Automatic Testing of Modern Web Applications

    Publication Year: 2012, Page(s):35 - 53
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2716 KB) | HTML iconHTML

    Ajax-based Web 2.0 applications rely on stateful asynchronous client/server communication, and client-side runtime manipulation of the DOM tree. This not only makes them fundamentally different from traditional web applications, but also more error-prone and harder to test. We propose a method for testing Ajax applications automatically, based on a crawler to infer a state-flow graph for all (clie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GenProg: A Generic Method for Automatic Software Repair

    Publication Year: 2012, Page(s):54 - 72
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3121 KB) | HTML iconHTML

    This paper describes GenProg, an automated method for repairing defects in off-the-shelf, legacy programs without formal specifications, program annotations, or special coding practices. GenProg uses an extended form of genetic programming to evolve a program variant that retains required functionality but is not susceptible to a given defect, using existing test suites to encode both the defect a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Extensible Framework for Improving a Distributed Software System's Deployment Architecture

    Publication Year: 2012, Page(s):73 - 100
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3695 KB) | HTML iconHTML

    A distributed system's allocation of software components to hardware nodes (i.e., deployment architecture) can have a significant impact on its quality of service (QoS). For a given system, there may be many deployment architectures that provide the same functionality, but with different levels of QoS. The parameters that influence the quality of a system's deployment architecture are often not kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspectizing Java Access Control

    Publication Year: 2012, Page(s):101 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1616 KB) | HTML iconHTML

    It is inevitable that some concerns crosscut a sizeable application, resulting in code scattering and tangling. This issue is particularly severe for security-related concerns: It is difficult to be confident about the security of an application when the implementation of its security-related concerns is scattered all over the code and tangled with other concerns, making global reasoning about sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-Oriented Refactoring of Legacy Applications: An Evaluation

    Publication Year: 2012, Page(s):118 - 140
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1570 KB) | HTML iconHTML

    The primary claimed benefits of aspect-oriented programming (AOP) are that it improves the understandability and maintainability of software applications by modularizing crosscutting concerns. Before there is widespread adoption of AOP, developers need further evidence of the actual benefits as well as costs. Applying AOP techniques to refactor legacy applications is one way to evaluate costs and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Abstractions for Contract Validation

    Publication Year: 2012, Page(s):141 - 162
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1380 KB) | HTML iconHTML

    Pre/postcondition-based specifications are commonplace in a variety of software engineering activities that range from requirements through to design and implementation. The fragmented nature of these specifications can hinder validation as it is difficult to understand if the specifications for the various operations fit together well. In this paper, we propose a novel technique for automatically... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defining and Evaluating a Measure of Open Source Project Survivability

    Publication Year: 2012, Page(s):163 - 174
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (733 KB) | HTML iconHTML

    In this paper, we define and validate a new multidimensional measure of Open Source Software (OSS) project survivability, called Project Viability. Project viability has three dimensions: vigor, resilience, and organization. We define each of these dimensions and formulate an index called the Viability Index (VI) to combine all three dimensions. Archival data of projects hosted at SourceForge.net ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Code Quality to Improve Specification Mining

    Publication Year: 2012, Page(s):175 - 190
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1294 KB) | HTML iconHTML

    Formal specifications can help with program testing, optimization, refactoring, documentation, and, most importantly, debugging and repair. However, they are difficult to write manually, and automatic mining techniques suffer from 90-99 percent false positive rates. To address this problem, we propose to augment a temporal-property miner by incorporating code quality metrics. We measure code quali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Unauthorized Modification of Digital Objects

    Publication Year: 2012, Page(s):191 - 204
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB) | HTML iconHTML

    We consider the problem of malicious modification of digital objects. We present a protection mechanism designed to protect against unauthorized replacement or modification of digital objects while still allowing authorized updates transparently. We use digital signatures without requiring any centralized public key infrastructure. To explore the viability of our proposal, we apply the approach to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Differential Analysis of Process Algebra Models

    Publication Year: 2012, Page(s):205 - 219
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1095 KB) | HTML iconHTML

    The exact performance analysis of large-scale software systems with discrete-state approaches is difficult because of the well-known problem of state-space explosion. This paper considers this problem with regard to the stochastic process algebra PEPA, presenting a deterministic approximation to the underlying Markov chain model based on ordinary differential equations. The accuracy of the approxi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schedule of Bad Smell Detection and Resolution: A New Way to Save Effort

    Publication Year: 2012, Page(s):220 - 235
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1452 KB) | HTML iconHTML

    Bad smells are signs of potential problems in code. Detecting and resolving bad smells, however, remain time-consuming for software engineers despite proposals on bad smell detection and refactoring tools. Numerous bad smells have been recognized, yet the sequences in which the detection and resolution of different kinds of bad smells are performed are rarely discussed because software engineers d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2011 Reviewers List

    Publication Year: 2012, Page(s):236 - 238
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • 2011 Annual Index

    Publication Year: 2012
    Request permission for commercial reuse | PDF file iconPDF (282 KB)
    Freely Available from IEEE
  • Introduction to OnlinePlus Video [advertisement]

    Publication Year: 2012, Page(s): 239
    Request permission for commercial reuse | PDF file iconPDF (344 KB)
    Freely Available from IEEE
  • What's new in Transactions [advertisement]

    Publication Year: 2012, Page(s): 240
    Request permission for commercial reuse | PDF file iconPDF (344 KB)
    Freely Available from IEEE
  • [Cover3]

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org