May 2023
·
52 Reads
·
18 Citations
Ad
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
May 2023
·
52 Reads
·
18 Citations
June 2019
·
165 Reads
·
21 Citations
Journal of the Brazilian Computer Society
The technical debt (TD) concept inspires the development of useful methods and tools that support TD identification and management. However, there is a lack of evidence on how different TD identification tools could be complementary and, also, how human-based identification compares with them. To understand how to effectively elicit TD from humans, to investigate several types of tools for TD identification, and to understand the developers’ point of view about TD indicators and items reported by tools. We asked developers to identify TD items from a real software project. We also collected the output of three tools to automatically identify TD and compared the results in terms of their locations in the source code. Then, we collected developers’ opinions on the identification process through a focus group. Aggregation seems to be an appropriate way to combine TD reported by developers. The tools used cannot help in identifying many important TD types, so involving humans is necessary. Developers reported that the tools would help them to identify TD faster or more accurately and that project priorities and current development activities are important to be considered together, along with the values of principal and interest, when deciding to pay off a debt. This work contributes to the TD landscape, which depicts an understanding between different TD types and how they are best discovered.
September 2017
·
698 Reads
·
16 Citations
August 2017
·
1,725 Reads
·
28 Citations
Empirical Software Engineering
Many practitioners and academics believe in a delayed issue effect (DIE); i.e. the longer an issue lingers in the system, the more effort it requires to resolve. This belief is often used to justify major investments in new development processes that promise to retire more issues sooner. This paper tests for the delayed issue effect in 171 software projects conducted around the world in the period from 2006--2014. To the best of our knowledge, this is the largest study yet published on this effect. We found no evidence for the delayed issue effect; i.e. the effort to resolve issues in a later phase was not consistently or substantially greater than when issues were resolved soon after their introduction. This paper documents the above study and explores reasons for this mismatch between this common rule of thumb and empirical data. In summary, DIE is not some constant across all projects. Rather, DIE might be an historical relic that occurs intermittently only in certain kinds of projects. This is a significant result since it predicts that new development processes that promise to faster retire more issues will not have a guaranteed return on investment (depending on the context where applied), and that a long-held truth in software engineering should not be considered a global truism.
July 2017
·
194 Reads
·
3 Citations
IEEE Software
To celebrate the 200th issue of IEEE Software, Voice of Evidence uses data to examine whether it has helped bridge the gap between research and practice by extracting actionable lessons from the body of research.
November 2016
·
12 Reads
Computing in Science & Engineering
The guest editors of this special issue describe five articles that make up the second part of a series describing US Department of Defense software engineering efforts.
September 2016
·
2 Reads
Many practitioners and academics believe in a delayed issue effect (DIE); i.e. the longer an issue lingers in the system, the more effort it requires to resolve. This belief is often used to justify major investments in new development processes that promise to retire more issues sooner. This paper tests for the delayed issue effect in 171 software projects conducted around the world in the period from 2006--2014. To the best of our knowledge, this is the largest study yet published on this effect. We found no evidence for the delayed issue effect; i.e. the effort to resolve issues in a later phase was not consistently or substantially greater than when issues were resolved soon after their introduction. This paper documents the above study and explores reasons for this mismatch between this common rule of thumb and empirical data. In summary, DIE is not some constant across all projects. Rather, DIE might be an historical relic that occurs intermittently only in certain kinds of projects. This is a significant result since it predicts that new development processes that promise to faster retire more issues will not have a guaranteed return on investment (depending on the context where applied), and that a long-held truth in software engineering should not be considered a global truism.
May 2016
·
103 Reads
·
35 Citations
Programming languages can restrict state change by preventing it entirely (immutability) or by restricting which clients may modify state (read-only restrictions). The benefits of immutability and read-only restrictions in software structures have been long-argued by practicing software engineers, researchers, and programming language designers. However, there are many proposals for language mechanisms for restricting state change, with a remarkable diversity of techniques and goals, and there is little empirical data regarding what practicing software engineers want in their tools and what would benefit them. We systematized the large collection of techniques used by programming languages to help programmers prevent undesired changes in state. We interviewed expert software engineers to discover their expectations and requirements, and found that important requirements, such as expressing immutability constraints, were not reflected in features available in the languages participants used. The interview results informed our design of a new language extension for specifying immutability in Java. Through an iterative, participatory design process, we created a tool that reflects requirements from both our interviews and the research literature.
May 2016
·
22 Reads
·
6 Citations
IEEE Software
Every software system is potentially vulnerable in ways that aren't always imagined during development. White-collar crime involving data breaches are rampant, and governments are investigating the potential for terrorist attacks on power grids, airplanes, and other public services. Technology is a double-edged blade: although computers let us pursue ever-more-impressive innovations, we're likewise subjected to growing possibilities for abuse. So, how do we build secure products that are hardened against adversarial attacks? The article provides a look at this topic.
January 2016
·
112 Reads
·
7 Citations
IEEE Software
This special issue offers a range of perspectives on software engineering's future from professionals working around the world in diverse areas of software. The content ranges from detailed technical articles about the research areas behind today's trends to shorter essays and opinion pieces from folks working to sharpen the focus of their own visions of that future. The Web extra at https://youtu.be/LnSHGDl9O7U is an audio recording of st Shull and Anita Carleton of the Software Engineering Institute and Rafael Prikladnicki of Pontificia Universidade Catolica do Rio Grande do Sul talking about the authors, articles, and discussions that went into the IEEE Software January/February 2016 theme issue on the future of software engineering.
Ad
... The most recent Stack Overflow Annual Developer Survey 1 reveals that the accumulation of TD is a primary concern for developers, contributing significantly to frustration. Therefore, the quality and sustainability of software projects, as well as the motivation and productivity of developers, to some extent, depend on effective TD management (TDM) [2]. ...
May 2023
... Moreover, excessive TD can lead to missed business opportunities and potentially result in a development standstill, causing companies to lose clients. Consequently, effective management and timely resolution of TD are critical to maintaining the health, competitiveness, and sustainability of software projects [1], [4]. ...
June 2019
Journal of the Brazilian Computer Society
... Mixed-methods approaches to persona creation generally begin with qualitative techniques in the initial phase of the process. This includes methods such as interviews, observations, and field studies, followed by the application of quantitative techniques for data analysis (Mesgari et al., 2019;Mead et al., ). Additionally, personas can be generated through quantitative methods by either using secondary sources (e.g., forum posts, user reviews) (Rahimi and Cleland-Huang, 2014) or employing questionnaires to gather substantial amounts of data for persona generation (Schafer et al., 2019). ...
September 2017
... To help practitioners with deciding which sources to start reading first, we assessed the popularity of papers to find the most popular sources. In the academic world, citations are the de-facto metric for this purpose and have been used in many studies, e.g., a recent IEEE Software paper [67]. We list in Table 5 and Table 6 the top 5 highly-cited papers based on two metrics: (1) absolute citation values, and (2) normalized citations (average citations per year). ...
Reference:
A survey on software testability
July 2017
IEEE Software
... PI Menzies worked on (a) CCF-1302216, 2013-2017, $271,553; (b) "SHF: Medium: Collaborative: Transfer Learning in SE"; (c) Intellectual merit: define novel methods for sharing data. That work generated the publications (d) [63], [64], [65], [66], [67], [68] concerning prediction and planning methods [69]. Broader impact: enable a new kind of open science-one where all data is routinely shared and is capable of building effective models no matter if it is obfuscated for security purposes. ...
August 2017
Empirical Software Engineering
... Coblenz et al. [5] conducted interviews with professional developers and found that participants stated that incorrect state mutations are a major source of bugs in programs. For example, an object thought to be immutable would be changed by some other object, perhaps because of optimization by reusing references instead of using immutable copies. ...
May 2016
... [41] Cyber operations could qualify as an armed attack if its "scale and effects" are comparable to that of an armed attack, Tallinn 2.0 provides a helpful framework to analyze whether such a cyber operation constitutes an armed attack. [42] The right to self-defence would justify weaponized honeypots that might otherwise be themselves considered a use of force in violation of the UN Charter. However, actions taken in self-defence must be limited to those necessary to repel the attack and proportionate to the attack and must cease when the attack is complete. ...
May 2016
IEEE Software
... This study follows a **cross-sectional** (cross-section) design, as data were collected at a single point in time to provide an overview of the current state of the field [31]. This design was selected because it is widely used in other research fields, such as psychology, and is considered appropriate for describing relationships between variables [10,16,17,26]. ...
January 2008
... Mathematician Alan Perlis, the first recipient of the Turin Award, described the relationship between computers and humans as one of a youth in endless puberty but constantly growing out of his clothes [27]. Our lives have been heavily influenced and interfered by software, and though the discipline of software engineering is quite new, society has been seen to be maturing. ...
January 2016
IEEE Software
... In the past two decades, many works on developing an integrated software system of numerical simulation, virtual flight, and optimization have been reported, such as the AVT-161 program of the NATO Research and Technology Organization [5], the SikMa (which stands for simulation of complex maneuvers) program [6], the Digital-X program [7,8] of the DLR, and the Computational Research and Engineering Acquisition Tools and Environment (CREATE) program [9,10] of the U.S. Department of Defense High Performance Computing Modernization Program in America. Especially in the CREATE-AV (AV stands for AeroVehicle) subprogram, which is a 12-year long-term program since 2008, the two multiphysics simulation systems called Kestrel [11,12] and Helios [13,14] were developed for fixed-wing aircraft and helicopters, respectively. ...
January 2016
Computing in Science & Engineering