Sciweavers

97
Voted
SIGSOFT
2009
ACM
16 years 2 months ago
Fitting the pieces together: a machine-checked model of safe composition
Programs of a software product line can be synthesized by composing features which implement a unit of program functionality. In most product lines, only some combination of featu...
Benjamin Delaware, William R. Cook, Don S. Batory
84
Voted
SIGSOFT
2009
ACM
16 years 2 months ago
Reo2MC: a tool chain for performance analysis of coordination models
In this paper, we present Reo2MC, a tool chain for the performance evaluation of coordination models. Given a coordination model represented by a stochastic Reo connector, Reo2MC ...
Farhad Arbab, Sun Meng, Young-Joo Moon, Marta Z. K...
125
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
A verification system for timed interval calculus
Timed Interval Calculus (TIC) is a highly expressive set-based notation for specifying and reasoning about embedded real-time systems. However, it lacks mechanical proving support...
Chunqing Chen, Jin Song Dong, Jun Sun 0001
112
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Systematically refactoring inheritance to delegation in java
Because of the strong coupling of classes and the proliferation of unneeded class members induced by inheritance, the suggestion to use composition and delegation instead has beco...
Hannes Kegel, Friedrich Steimann
96
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
SpyWare: a change-aware development toolset
Our research is driven by the motivation that change must be put in the center, if one wants to understand the complex processes of software evolution. We built a toolset named Sp...
Romain Robbes, Michele Lanza
114
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Sufficient mutation operators for measuring test effectiveness
Mutants are automatically-generated, possibly faulty variants of programs. The mutation adequacy ratio of a test suite is the ratio of non-equivalent mutants it is able to identif...
Akbar Siami Namin, James H. Andrews, Duncan J. Mur...
109
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Clone detection in automotive model-based development
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from m...
Benjamin Hummel, Bernhard Schätz, Elmar J&uum...
105
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Best practices in extreme programming course design
Teaching (and therefore learning) eXtreme Programming (XP) in a university setting is difficult because of course time limitations and the soft nature of XP that requires first-ha...
Kai Stapel, Daniel Lübke, Eric Knauss
105
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Tool support for data validation by end-user programmers
End-user programming tools for creating spreadsheets and webforms offer no data types except "string" for storing many kinds of data, such as person names and street add...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
90
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Recommending adaptive changes for framework evolution
Barthélémy Dagenais, Martin P. Robil...