Sciweavers

ISSRE
2010
IEEE
13 years 6 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...
ISSRE
2010
IEEE
13 years 6 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra
ISSRE
2010
IEEE
13 years 6 months ago
A Case Study on Safety Cases in the Automotive Domain: Modules, Patterns, and Models
—Driven by market needs and laws, automotive manufacturers develop ever more feature-rich and complex vehicles. This new functionality plays even an active role in driving, what ...
Stefan Wagner, Bernhard Schätz, Stefan Puchne...
ISSRE
2010
IEEE
13 years 6 months ago
The Impact of Coupling on the Fault-Proneness of Aspect-Oriented Programs: An Empirical Study
—Coupling in software applications is often used as an indicator of external quality attributes such as fault-proneness. In fact, the correlation of coupling metrics and faults i...
Rachel Burrows, Fabiano Cutigi Ferrari, Otá...
ISSRE
2010
IEEE
13 years 6 months ago
Change Bursts as Defect Predictors
—In software development, every change induces a risk. What happens if code changes again and again in some period of time? In an empirical study on Windows Vista, we found that ...
Nachiappan Nagappan, Andreas Zeller, Thomas Zimmer...
ISSRE
2010
IEEE
13 years 6 months ago
Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test
—Large scale systems (LSS) contain multiple subsystems that interact across multiple nodes in sometimes unforeseen and complicated ways. As a result, pinpointing the subsystems t...
Haroon Malik, Bram Adams, Ahmed E. Hassan
ISSRE
2010
IEEE
13 years 6 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
RE
2008
Springer
13 years 6 months ago
Requirements for tools for ambiguity identification and measurement in natural language requirements specifications
This paper proposes a two-step approach to identifying ambiguities in natural language (NL) requirements specifications (RSs). In the first step, a tool would apply a set of ambig...
Nadzeya Kiyavitskaya, Nicola Zeni, Luisa Mich, Dan...
RE
2008
Springer
13 years 6 months ago
Use and Influence of Creative Ideas and Requirements for a Work-Integrated Learning System
In this paper, we describe a creativity workshop that was used in a large research project, called APOSDLE, to generate creative ideas and requirements for a workintegrated learni...
Sara Jones, Perry Lynch, Neil A. M. Maiden, Stefan...
RE
2008
Springer
13 years 6 months ago
Supporting Requirements Model Evolution throughout the System Life-Cycle
Requirements models are essential not just during system implementation, but also to manage system changes post-implementation. Such models should be supported by a requirements m...
Neil A. Ernst, John Mylopoulos, Yijun Yu, Tien Ngu...