By Topic

IET Software

Issue 4 • Date August 2012

Filter Results

Displaying Results 1 - 12 of 12
  • Enhancing comprehensibility of software clustering results

    Publication Year: 2012, Page(s):283 - 295
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (188 KB)

    As requirements of organisations change, so do the software systems within them. When changes are carried out under tough deadlines, software developers often do not follow software engineering principles, which results in deteriorated structure of the software. A badly structured system is difficult to understand for further changes. To improve structure, re-modularisation may be carried out. Clu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symptom matching for event streams

    Publication Year: 2012, Page(s):296 - 306
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (369 KB)

    Enterprise systems produce a vast amount of logging data. This critical and valuable information must be processed automatically for timely system analysis and recovery. As a result of industry demands, a standard database containing known issues has been introduced - a symptom database. Each symptom consists of a rule pattern and corresponding solutions. Patterns used for symptom identification a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic optimisation algorithm for Java dynamic compilation

    Publication Year: 2012, Page(s):307 - 312
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (229 KB)

    Dynamic compilation increases Java virtual machine (JVM) performance because running compiled codes is faster than interpreting Java bytecodes. However, inappropriate decision on dynamic compilation may degrade performance owing to compilation overhead. A good heuristic algorithm for dynamic compilation should achieve an appropriate balance between compilation overhead and performance gain in each... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web application for recommending personalised mobile tourist routes

    Publication Year: 2012, Page(s):313 - 322
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (703 KB)

    This study deals with the problem of deriving personalised recommendations for daily sightseeing itineraries for tourists visiting any destination. The authors' approach considers selected places of interest that a traveller would potentially wish to visit and derives a near-optimal itinerary for each day of visit; the places of potential interest are selected based on stated or implied user prefe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for evaluation and validation of software complexity measures

    Publication Year: 2012, Page(s):323 - 334
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (189 KB)

    This study proposes a framework for the evaluation and validation of software complexity measure. This framework is designed to analyse whether or not software metric qualifies as a measure from different perspectives. Unlike existing frameworks, it takes into account the practical usefulness of the measure and includes all the factors that are important for theoretical and empirical validation in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient effort estimation system viz. function points and quality assurance coverage

    Publication Year: 2012, Page(s):335 - 341
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (163 KB)

    Software development effort estimation is important for quality management in the software development industry, yet its automation still remains a challenging issue. Accurate estimation of software effort is critical in software engineering. Existing methods for software cost estimation will use very few quality factors for the estimation. So, in order to overcome this drawback, the authors propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient top-k algorithm for eXtensible Markup Language keyword search

    Publication Year: 2012, Page(s):342 - 349
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (551 KB)

    The ability to compute top-k matches to eXtensible Markup Language (XML) queries is gaining importance owing to the increasing of large XML repositories. Current work on top-k match to XML queries mainly focuses on employing XPath, XQuery or NEXI as the query language, whereas little work has concerned on top-k match to XML keyword search. In this study, the authors propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidimentional size measure for design of component-based software system

    Publication Year: 2012, Page(s):350 - 357
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (345 KB)

    The motivation of this study is to bridge the gap between component providers and component users, especially in the area of component evaluation, using component information flow (CIF) measurement and multidimensional approaches for measurement interpretation. By measuring the design of component-based software systems (CBSS), software designers, testers and maintainers may be able to locate weak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile software development methodology for medium and large projects

    Publication Year: 2012, Page(s):358 - 363
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (124 KB)

    Extreme programming (XP) is one of the most widely used agile methodologies for software development. It intends to improve software quality and responsiveness to changing customer requirements. Despite the facts that the use of XP offers a number of benefits and it has been a widely used agile methodology, XP does not offer the same benefits when it comes to medium and large software projects. So... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based testing of embedded systems in hardware in the loop environment

    Publication Year: 2012, Page(s):364 - 376
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (835 KB)

    The evolution of software testing technologies has significantly reduced software testing execution times, but the test design and generation are still often implemented with slow manual-oriented methods. Model-based testing (MBT) offers automation to test design and generation, and different MBT solutions are familiar from research, but more effort needs to be done to adopt MBT for industrial use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auditing the XSS defence features implemented in web application programs

    Publication Year: 2012, Page(s):377 - 390
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (442 KB)

    Cross site scripting (XSS) vulnerability is mainly caused by the failure of web applications in sanitising user inputs embedded in web pages. Even though state-of-the-art defensive coding methods and vulnerability detection methods are often used by developers and security auditors, XSS flaws still remain in many applications because of (i) the difficulty of adopting these methods, (ii) the inadeq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-driven approach to developing domain functional requirements in software product lines

    Publication Year: 2012, Page(s):391 - 401
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (390 KB)

    Existing product requirements form a rich source for domain requirements analysis in software product lines (SPLs). Most existing domain analysis techniques depend on domain experts' experience and manual operation to identify the commonalities and variabilities of product requirements. They often demand a high level of manual effort and a large up-front investment, which can present a prohibitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Software publishes papers on all aspects of the software lifecycle, including design, development, implementation and maintenance.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_sen@theiet.org