样式: 排序: IF: - GO 导出 标记为已读
-
Code-centric learning-based just-in-time vulnerability detection J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-29 Son Nguyen, Thu-Trang Nguyen, Thanh Trong Vu, Thanh-Dat Do, Kien-Tuan Ngo, Hieu Dinh Vo
Attacks against computer systems exploiting software vulnerabilities can cause substantial damage to the cyber infrastructure of our modern society and economy. To minimize the consequences, it is vital to detect and fix vulnerabilities as soon as possible. Just-in-time vulnerability detection (JIT-VD) discovers vulnerability-prone (“dangerous”) commits to prevent them from being merged into source
-
Supporting reusable model migration with Edelta J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-28 Lorenzo Bettini, Amleto Di Salle, Ludovico Iovino, Alfonso Pierantonio
In Model-Driven Engineering, metamodels define the vocabulary of concepts and relations that designers use to define a wide range of artifacts, including models, transformations, and editors. Therefore, whenever a metamodel undergoes modifications, the depending artifacts may no longer be valid, and consistency needs to be repaired through coupled evolution techniques. While several approaches have
-
How can feature usage be tracked across product variants? Implicit Feedback in Software Product Lines J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-24 Oscar Díaz, Raul Medeiros, Mustafa Al-Hajjaji
Implicit feedback involves collecting information about software usage to understand how and when the software is used. This research focuses on implicit feedback in the context of Software Product Lines (SPLs). Traditionally, product feedback is obtained by directly embedding ‘trackers’ into the code. However, in the case of SPLs, where products are part of a portfolio, directly coding into the product
-
Variability modeling of products, processes, and resources in cyber–physical production systems engineering J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-24 Kristof Meixner, Kevin Feichtinger, Hafiyyan Sayyid Fadhlillah, Sandra Greiner, Hannes Marcher, Rick Rabiser, Stefan Biffl
Cyber-Physical Production Systems (CPPSs), such as , execute a sequence of production steps to manufacture products from a product portfolio. In CPPS engineering, domain experts start with determining feasible production step sequences and resources based on . This process is hard to reproduce and highly inefficient. In this paper, we present the Extended Iterative Process Sequence Exploration (eIPSE)
-
A cloud-based data processing and visualization pipeline for the fibre roll-out in Germany J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-23 Michel Krämer, Pascal Bormann, Hendrik M. Würz, Kevin Kocon, Tobias Frechen, Jonas Schmid
To support the roll-out of fibre broadband Internet in Germany, Deutsche Telekom has set itself the goal of connecting more than 2.5 million households per year to FTTH (Fibre to the Home). However, planning and approval processes have been very complex and time-consuming in the past due to high communication overhead between stakeholders, missing automation, and lack of information about planning
-
A/B testing: A systematic literature review J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-22 Federico Quin, Danny Weyns, Matthias Galster, Camila Costa Silva
-
Translating meaning representations to behavioural interface specifications J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-22 Iat Tou Leong, Raul Barbosa
Higher-order logic can be used for meaning representation in natural language processing to encode the semantic relationships in text. Alternatively, using a formal specification language for meaning representation is more precise for specifying programs and widely supported by automatic theorem provers, while deductive verification based on higher order logic is less common for mainstream programming
-
A framework for the design of fault-tolerant systems-of-systems J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-22 Francisco Henrique Cerdeira Ferreira, Elisa Yumi Nakagawa, Antonia Bertolino, Francesca Lonetti, Vânia de Oliveira Neves, Rodrigo Pereira dos Santos
Systems-of-Systems (SoS) increasingly permeate everyday life in various critical domains. Due to their dynamic nature, guaranteeing their fault tolerance is challenging. Fault-tolerant SoS must deal with behavioral changes in constituent systems, whether accidental or deliberate. This work proposes ReViTA, a framework to assist professionals in designing fault-tolerant SoS that can continue to provide
-
The impact of hard and easy negative training data on vulnerability prediction performance J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-20 Fahad Al Debeyan, Lech Madeyski, Tracy Hall, David Bowes
Vulnerability prediction models have been shown to perform poorly in the real world. We examine how the composition of negative training data influences vulnerability prediction model performance. Inspired by other disciplines (e.g. image processing), we focus on whether distinguishing between negative training data that is ‘easy’ to recognise from positive data (very different from positive data)
-
Test case information extraction from requirements specifications using NLP-based unified boilerplate approach J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-17 Jin Wei Lim, Thiam Kian Chiew, Moon Ting Su, Simying Ong, Hema Subramaniam, Mumtaz Begum Mustafa, Yin Kia Chiam
Automated testing which extracts essential information from software requirements written in natural language offers a cost-effective and efficient solution to error-free software that meets stakeholders’ requirements in the software industry. However, natural language can cause ambiguity in requirements and increase the challenges of automated testing such as test case generation. Negative requirements
-
Few-shot code translation via task-adapted prompt learning J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-17 Xuan Li, Shuai Yuan, Xiaodong Gu, Yuting Chen, Beijun Shen
Pre-trained models such as CodeT5 and TransCoder have achieved impressive progress in software engineering. However, fine-tuning PLMs for code translation is confronted with significant challenges owing to the scarce availability of parallel code. Large language models such as ChatGPT have exhibited considerable promise in few-shot learning where only a small number of demonstration examples are given
-
Fast state transfer for updates and live migration of industrial controller runtimes in container orchestration systems J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-16 Heiko Koziolek, Andreas Burger, Abdulla Puthan Peedikayil
Many industrial processes (e.g., steel, fertilizer, paper production) utilize programmable logic controllers or distributed control systems, which cyclically execute control applications. Dynamic updates of such applications at runtime are desirable for optimizing the production while avoiding production stops. However, such updates are challenging since they require fast switching to an updated instance
-
Emerging technologies in higher education assessment and feedback practices: A systematic literature review J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-15 Ruchi Sembey, Rashina Hoda, John Grundy
The use of Emerging Technologies, such as Artificial Intelligence (AI), Learning Analytics (LA) and Extended Reality (XR) applications, in higher education has proliferated in recent times, as these technologies are considered to have a significant impact on the future of postsecondary teaching and learning. We wanted to find out the emerging technologies used in computing education, its evaluation
-
Testing concolic execution through consistency checks J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-15 Emilio Coppa, Alessio Izzillo
Symbolic execution is a well-known software testing technique that evaluates how a program runs when considering a input, i.e., an input that can initially assume any concrete value admissible for its data type. The dynamic twist of this technique is dubbed and has been demonstrated to be a practical technique for testing even complex real-world programs. Unfortunately, developing concolic engines
-
Zipper-based embedding of strategic attribute grammars J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-15 José Nuno Macedo, Emanuel Rodrigues, Marcos Viera, João Saraiva
Strategic term re-writing and attribute grammars are two powerful programming techniques widely used in language engineering. The former relies on strategies to apply term re-write rules in defining large-scale language transformations, while the latter is suitable to express context-dependent language processing algorithms. These two techniques can be expressed and combined via a powerful navigation
-
Equivalence, identity, and unitarity checking in black-box testing of quantum programs J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-15 Peixun Long, Jianjun Zhao
Quantum programs exhibit inherent non-deterministic behavior, which poses more significant challenges for error discovery compared to classical programs. While several testing methods have been proposed for quantum programs, they often overlook fundamental questions in black-box testing. In this paper, we bridge this gap by presenting three novel algorithms specifically designed to address the challenges
-
Addressing combinatorial experiments and scarcity of subjects by provably orthogonal and crossover experimental designs J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-14 Fabio Massacci, Aurora Papotti, Ranindya Paramitha
Experimentation in Software and Security Engineering is a common research practice, in particular with human subjects. The combinatorial nature of software configurations and the difficulty of recruiting experienced subjects or running complex and expensive experiments make the use of full factorial experiments unfeasible to obtain statistically significant results. Provide comprehensive alternative
-
Barriers to device longevity and reuse: A vintage device empirical study J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-11 Craig Goodwin, Sandra Woolley
This extended paper contributes a methodology and a detailed analysis of app installation and functionality on a ‘vintage’ device. Experimental results are presented that demonstrate barriers to the reuse of vintage Apple devices, and solutions are posited. 230 apps across 23 unique app categories were tested to determine if they could be downloaded, installed, and opened, and whether they appeared
-
Survey of annotation generators for deductive verifiers J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-10 Sophie Lathouwers, Marieke Huisman
Deductive verifiers require intensive user interaction in the form of writing precise specifications, thereby limiting their use in practice. While many solutions have been proposed to generate specifications, their evaluations and comparisons to other tools are limited. As a result, it is unclear what the best approaches for specification inference are and how these impact the overall specification
-
-
DeepCover: Advancing RNN test coverage and online error prediction using state machine extraction J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-07 Pouria Golshanrad, Fathiyeh Faghih
Recurrent neural networks (RNNs) have emerged as powerful tools for processing sequential data in various fields, including natural language processing and speech recognition. However, the lack of explainability in RNN models has limited their interpretability, posing challenges in understanding their internal workings. To address this issue, this paper proposes a methodology for extracting a state
-
Design for dependability — State of the art and trends J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-05 Hezhen Liu, Chengqiang Huang, Ke Sun, Jiacheng Yin, Xiaoyu Wu, Jin Wang, Qunli Zhang, Yang Zheng, Vivek Nigam, Feng Liu, Joseph Sifakis
This paper presents an overview of design for dependability as a process involving three distinct but interrelated activities: risk analysis, risk mitigation, and risk assessment. Although these activities have been the subject of numerous works, few of them address the issue of their integration into rigorous design flows. Moreover, most existing results focus on dependability for small-size safety-critical
-
Deriving modernity signatures of codebases with static analysis J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-03 Chris Admiraal, Wouter van den Brink, Marcus Gerhold, Vadim Zaytsev, Cristian Zubcu
This paper addresses the problem of determining the modernity of software systems by analysing the use of new language features and their adoption over time. We propose the concept of to estimate the age of a codebase, naturally adjusted for maintenance practices, such that the modernity of a regularly updated system would be above that of a more recently created one which neglects current features
-
Extracting goal models from natural language requirement specifications J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-30 Souvick Das, Novarun Deb, Agostino Cortesi, Nabendu Chaki
Unstructured (or, semi-structured) natural language is mostly used to capture the requirement specifications both for legacy software systems and for modern day software systems. The adoption of a formal approach to the specification of the requirements, using goal models, enables rigorous and formal inspections while analyzing the requirements for satisfiability, consistency, completeness, conflicts
-
Sustainability competencies and skills in software engineering: An industry perspective J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-02 Rogardt Heldal, Ngoc-Thanh Nguyen, Ana Moreira, Patricia Lago, Leticia Duboc, Stefanie Betz, Vlad C. Coroamă, Birgit Penzenstadler, Jari Porras, Rafael Capilla, Ian Brooks, Shola Oyedeji, Colin C. Venters
Achieving the UN Sustainable Development Goals (SDGs) demands a shift by industry, governments, society, and individuals to reach adequate levels of awareness and actions to address sustainability challenges. Software systems will play an important role in moving towards these targets. Sustainability skills are necessary to support the development of software systems and to provide sustainable IT-supported
-
iCoLa+: An extensible meta-language with support for exploratory language development J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-30 Damian Frölich, L. Thomas van Binsbergen
Programming languages providing high-level abstractions can increase a programmers’ productivity and the safety of a program. Language-oriented programming is a paradigm in which domain-specific languages are developed to solve problems within specific domains with (high-level) abstractions relevant to those domains. However, language development involves complex design and engineering processes. These
-
RRGcode: Deep hierarchical search-based code generation J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-28 Qianwen Gou, Yunwei Dong, Yujiao Wu, Qiao Ke
Retrieval-augmented code generation strengthens the generation model by using a retrieval model to select relevant code snippets from a code corpus. The synergy between retrieval and generation ensures that the generated code closely corresponds to the intended functionality. Existing methods simply feed the retrieved results to the generation model. However, if the retrieval corpus contains erroneous
-
Property probes: Live exploration of program analysis results J. Syst. Softw. (IF 3.5) Pub Date : 2024-02-01 Anton Risberg Alaküla, Görel Hedin, Niklas Fors, Adrian Pop
We present property probes, a mechanism for helping a developer explore partial program analysis results in terms of the source program interactively while the program is edited. A node locator data structure is introduced that maps between source code spans and program representation nodes, and that helps identify probed nodes in a robust way, after modifications to the source code. We have developed
-
A data-driven active learning approach to reusing ML solutions in scientific applications J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-30 Hamideh Hajiabadi, Christopher Gerking, Lennart Hilbert, Anne Koziolek
Artificial intelligence can revolutionize scientific projects, but scientists face challenges in reusing, integrating, and deploying cost-effective and high-quality machine learning solutions. Determining suitable algorithms and parameters is difficult, especially for non-programmer scientists. Some algorithms, like deep learning-based methods, offer flexibility but require extensive training on annotated
-
A language-parametric test coverage framework for executable domain-specific languages J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-28 Faezeh Khorram, Erwan Bousse, Antonio Garmendia, Jean-Marie Mottu, Gerson Sunyé, Manuel Wimmer
Test coverage is an effective technique to measure test case quality and to enable fault localization. However, for Executable Domain-Specific Languages (xDSLs), coverage metrics and associated tools are currently manually defined for each xDSL resulting in costly, error-prone, and non-reusable work. To address this problem, we propose a novel language-parametric test coverage framework for xDSLs.
-
Shedding Light on the Dark Side – A Systematic Literature Review of the Issues in Agile Software Development Methodology Use J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-26 Jan-Niklas Meckenstock
Context Agile software development (ASD) methodologies address problems of traditional approaches, but can also cause various issues. A systematization of the spectrum of negative facets and how they arise has not been developed, leaving the dark side of ASD opaque. Objective The paper systematizes findings on various negative facets to define what specific issues constitute the dark side of ASD. It
-
The influence of the city metaphor and its derivates in software visualization J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-24 David Moreno-Lumbreras, Jesus M. Gonzalez-Barahona, Gregorio Robles, Valerio Cosentino
Context: The city metaphor is widely used in software visualization to represent complex systems as buildings and structures, providing an intuitive way for developers to understand software components. Various software visualization tools have utilized this approach. Objective: Identify the influence of the city metaphor on software visualization research, determine its state-of-the-art status, and
-
API usage templates via Structural Generalization J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-24 May Mahmoud, Robert J. Walker, Jörg Denzinger
APIs matter in software development, but determining how to use them can be challenging. Developers often refer to a small set of API usage examples, analyzing the information there to understand and adapt them to their own context. Generalization over many examples may aid in understanding commonalities and differences, reducing information overload while including greater variety. We propose ASGard
-
JITGNN: A deep graph neural network framework for Just-In-Time bug prediction J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-24 Hossein Keshavarz, Gema Rodríguez-Pérez
Just-In-Time (JIT) bug prediction is the problem of predicting software failure immediately after a change is submitted to the code base. JIT bug prediction is often preferred to other types of bug prediction (subsystem, module, file, class, or function-level) because changes are associated with one developer and the predictions can be applied when the design decisions are fresh in the developer’s
-
White-box validation of quantitative product lines by statistical model checking and process mining J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-23 Roberto Casaluce, Andrea Burattin, Francesca Chiaromonte, Alberto Lluch Lafuente, Andrea Vandin
We propose a novel methodology to validate software product line (PL) models by integrating Statistical Model Checking (SMC) with Process Mining (PM). We consider the feature-oriented language QFLan from the PL engineering domain. QFLan allows to model PL equipped with rich cross-tree and quantitative constraints, as well as aspects of dynamic PLs such as the staged configurations. This richness allows
-
The eXchange Calculus (XC): A functional programming language design for distributed collective systems J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-20 Giorgio Audrito, Roberto Casadei, Ferruccio Damiani, Guido Salvaneschi, Mirko Viroli
Distributed collective systems are systems formed by homogeneous dynamic collections of devices acting in a shared environment to pursue a joint task or goal. Typical applications emerge in the context of wireless sensor networks, robot swarms, groups of wearable-augmented people, and computing infrastructures. Programming such systems is notoriously hard, due to requirements of scalability, concurrency
-
Variability debt in opportunistic reuse: A multi-project field study J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-17 Daniele Wolfart, Jabier Martinez, Wesley K.G. Assunção, Thelma E. Colanzi, Alexander Egyed
Technical debt is a metaphor to guide the identification, measurement, and general management of decisions that are appropriate in the short term but create obstacles in the future evolution and maintenance of systems. Variability management, which is the ability to create system variants to satisfy different business or technical needs, is a potential source of technical debt. Variability debt, recently
-
L′OP-ART: A linear-time adaptive random testing algorithm for object-oriented programs J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-18 Jinfu Chen, Jingyi Chen, Lili Zhu, Chengying Mao, Qihao Bao, Rubing Huang
Object-oriented (OO) programming offers useful and desirable characteristics in the resulting code. These OO characteristics, however, demand an effective testing method. Adaptive random testing (ART) serves as an effective testing technique where test cases are distributed uniformly according to a proper metric for difference (distance) between test cases. Recently proposed object and method invocation
-
Coverage-guided fuzzing for deep reinforcement learning systems J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-11 Xiaohui Wan, Tiancheng Li, Weibin Lin, Yi Cai, Zheng Zheng
While the past decade has witnessed a growing demand for employing deep reinforcement learning (DRL) in various domains to solve real-world problems, the reliability of DRL systems has become more of a concern. In particular, DRL agents are often trained on data from a potentially biased distribution over environmental settings, causing the trained agents to fail in certain cases despite high average-case
-
Field-sensitive program slicing J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-11 Carlos Galindo, Jens Krinke, Sergio Pérez, Josep Silva
The granularity level of the traditional program dependence graph (PDG) for composite data structures (tuples, lists, records, objects, etc.) is inaccurate when slicing their inner elements. We present the constrained-edges PDG (CE-PDG) that addresses this accuracy problem. The CE-PDG enhances the representation of composite data structures by decomposing statements into a subgraph that represents
-
Analyzing the Tower of Babel with Kaiaulu J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-09 Carlos Paradis, Rick Kazman, Damian Tamburri
Context: An extensive body of work has examined socio-technical activities in software development; however, the availability of tools to enable these studies is limited. Aim: We extend Kaiaulu, a software package for Mining Software Repositories to enable a broad spectrum analysis of Social Smells and Motifs. Methods: We perform a literature review to identify what tools are available which implement
-
An empirical study of code reuse between GitHub and stack overflow during software development J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-08 Xiangping Chen, Furen Xu, Yuan Huang, Xiaocong Zhou, Zibin Zheng
With the rise of programming Q&A websites (e.g., Stack Overflow) and the open-source movement, code reuse has become a common phenomenon. Our study aims to provide a comprehensive study of the code reuse behavior of programmers during software development, i.e., we mainly focus on the code reuse between the code snippets in the commits of open-source projects and the code snippets on Stack Overflow
-
On the effectiveness of developer features in code smell prioritization: A replication study J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-08 Zijie Huang, Huiqun Yu, Guisheng Fan, Zhiqing Shao, Ziyi Zhou, Mingchen Li
Code smells are sub-optimal design and implementation choices that hinder software maintainability. Although significant progress has been achieved in code smell detection, numerous results are perceived as trivial by developers. In response, a code smell prioritization approach capturing developer features has been proposed by a prior study (MSR’20), and it outperformed a code metric baseline (KBS)
-
Automatic testing of runtime enforcers with Test4Enforcers J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-02 Oliviero Riganelli, Daniela Micucci, Leonardo Mariani
Users regularly use apps to access services in a range of domains, such as health, productivity, entertainment, and business. The safety and correctness of the runtime behaviour of these apps is thus a key concern for users. Indeed, unreliable apps may generate dissatisfaction, frustration and issues to users. Runtime enforcement techniques can be used to implement software enforcers that monitor executions
-
Test data generation for covering mutation-based path using MGA for MPI program J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-07 Xiangying Dang, Jinyong Wang, Dunwei Gong, Xiangjuan Yao, Changqing Wei, Biao Xu
Message Passing Interface (MPI) is a communication protocol used for parallel programming in various languages, valued for its reliability and broad applicability. Mutation testing is a software testing method for systematically simulating software faults. However, the significant number of inserted mutation branches in the program escalates the testing cost. To address this issue, we propose the comprehensive
-
Delivering computing module for the large part-time software development class from pre- to post-pandemic: an online learning experience J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-05 Olga Pishchukhina, Daria Gordieieva, Austen Rainer
Introduction Covid-19 pandemic brought dramatic changes to higher education settings, particularly for curriculum delivery, moving quickly to online learning. This paper discusses teaching experience covering practices of technology-enhanced learning for the MSc Computing Foundations module (20 CATS) for a large class studying part-time Software Engineering course at the School of Electronics, Electrical
-
An empirical assessment of different word embedding and deep learning models for bug assignment J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-06 Rongcun Wang, Xingyu Ji, Senlei Xu, Yuan Tian, Shujuan Jiang, Rubing Huang
Bug assignment, or bug triage, focuses on identifying the appropriate developers to repair newly discovered bugs, thereby managing them more effectively. Several deep learning-based approaches have been proposed for automated bug assignment. These approaches view automated bug assignment as a text classification task — the textual description of a bug report is utilized as the input and the potential
-
A qualitative and quantitative analysis of container engines J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-05 Luciano Baresi, Giovanni Quattrocchi, Nicholas Rasi
Containerization is a virtualization technique that allows one to create and run executables consistently on any infrastructure. Compared to virtual machines, containers are lighter since they do not bundle a (guest) operating system but they share its kernel, and they only include the files, libraries, and dependencies that are required to properly execute a process. In the past few years, multiple
-
Flexible control flow graph alignment for delivering data-driven feedback to novice programming learners J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-04 Md Towhidul Absar Chowdhury, Maheen Riaz Contractor, Carlos R. Rivero
Supporting learners in introductory programming assignments at scale is a necessity. This support includes automated feedback on what learners did incorrectly. Existing approaches cast the problem as automatically repairing learners’ incorrect programs extrapolating the data from an existing correct program from other learners. However, such approaches are limited because they only compare programs
-
-
Software product lines and features from the perspective of set theory with an application to feature location J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-03 Ulrich Eisenecker, Richard Müller
Features are a central concept of Software Product Lines (SPLs). Over the last decades, several understandings of what features are have evolved. They have important similarities but also some differences. However, there is no unifying formal theory of features. We present a definition of features that is completely independent of the representation of features in software artifacts and a comprehensive
-
Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored Petri nets J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-03 Nazakat Ali, Sasikumar Punnekkat, Abdul Rauf
Context Collaborative systems enable multiple independent systems to work together towards a common goal. These systems can include both human-system and system-system interactions and can be found in a variety of settings, including smart manufacturing, smart transportation, and healthcare. Safety is an important consideration for collaborative systems because one system's failure can significantly
-
Query-oriented two-stage attention-based model for code search J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-03 Huanhuan Yang, Ling Xu, Chao Liu, Luwen Huangfu
-
Thriving in the era of hybrid work: Raising cybersecurity awareness using serious games in industry trainings J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-02 Tiange Zhao, Tiago Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque
The important missions of modern software engineering education are to prepare software engineers to work in a hybrid mode and to address the need to enable them to write secure code and deliver secure products and services to the customer. Providing training akin to an authentic experience poses several challenges, such as hybrid infrastructures, lack of engagement, and interactions. Cybersecurity
-
A survey of energy concerns for software engineering J. Syst. Softw. (IF 3.5) Pub Date : 2024-01-02 Sung Une Lee, Niroshinie Fernando, Kevin Lee, Jean-Guy Schneider
There is growing attention to energy efficiency in the software engineering field. This has been driven by modern technologies, for example, Internet of Things (IoT), Social Networking Services (SNS) and quantum computing. In addition to this, recent trends and concerns such as Environment, Social, and Governance (ESG) and human/societal/environmental well-being for responsible Artificial Intelligence
-
Log statements generation via deep learning: Widening the support provided to developers J. Syst. Softw. (IF 3.5) Pub Date : 2023-12-27 Antonio Mastropaolo, Valentina Ferrari, Luca Pascarella, Gabriele Bavota
Logging assists in monitoring events that transpire during the execution of software. Previous research has highlighted the challenges confronted by developers when it comes to logging, including dilemmas such as where to log, what data to record, and which log level to employ (e.g., info, fatal). In this context, we introduced LANCE, an approach rooted in deep learning (DL) that has demonstrated the
-
Edge to cloud tools: A Multivocal Literature Review J. Syst. Softw. (IF 3.5) Pub Date : 2023-12-27 Sergio Moreschini, Elham Younesian, David Hästbacka, Michele Albano, Jiří Hošek, Davide Taibi
Edge-to-cloud computing is an emerging paradigm for distributing computational tasks between edge devices and cloud resources. Different approaches for orchestration, offloading, and many more purposes have been introduced in research. However, it is still not clear what has been implemented in the industry. This work aims to merge this gap by mapping the existing knowledge on edge-to-cloud tools by
-
On the impact of multiple source code representations on software engineering tasks — An empirical study J. Syst. Softw. (IF 3.5) Pub Date : 2023-12-27 Karthik Chandra Swarna, Noble Saji Mathews, Dheeraj Vagavolu, Sridhar Chimalakonda
Efficiently representing source code is crucial for various software engineering tasks such as code classification and clone detection. Existing approaches primarily use Abstract Syntax Tree (AST), and only a few focus on semantic graphs such as Control Flow Graph (CFG) and Program Dependency Graph (PDG), which contain information about source code that AST does not. Even though some works tried to
-
Time, causality, and realizability: Engineering interactive, distributed software systems J. Syst. Softw. (IF 3.5) Pub Date : 2023-12-27 Manfred Broy
Today, software systems are distributed, concurrent, interactive, embedded, and often time-critical. They communicate and cooperate by data exchange. Introducing notions of time, causality, and realizability into interface-based data flow models results into a powerful model for engineering cyber-physical and, generally, distributed software systems. Architectures and their specification are designed
-
Processes, methods, and tools in model-based engineering—A qualitative multiple-case study J. Syst. Softw. (IF 3.5) Pub Date : 2023-12-26 Jörg Holtmann, Grischa Liebel, Jan-Philipp Steghöfer
Research on model-based engineering (MBE) has occasionally touched upon the relationship between development processes and concrete MBE practices. However, the alignment of these elements has rarely been the central focus of these studies. As a result, important questions regarding the alignment of MBE and development processes, as well as the impact of development processes on the utilization and