当前期刊: Journal of Systems and Software Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Multilevel Analysis of The Java Virtual Machine Based on Kernel and Userspace Traces
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-04-06
    Houssem Daoud; Michel Dagenais

    Performance analysis of Java applications requires a deep understanding of the Java virtual machine and the system on which it is running. An unexpected latency can be caused by a bug in the source code, a misconfiguration or an external factor like CPU or disk contention. Existing tools have difficulties finding the root cause of some latencies because they do not efficiently collect performance data

    更新日期:2020-04-08
  • More precise construction of static single assignment programs using reaching definitions
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-04-06
    Abu Naser Masud; Federico Ciccozzi

    The Static Single Assignment (SSA) form is an intermediate representation used for the analysis and optimization of programs in modern compilers. The ϕ-function placement is the most computationally expensive part of converting any program into its SSA form. The most widely-used ϕ-function placement algorithms are based on computing dominance frontiers (DF). However, this kind of algorithms works under

    更新日期:2020-04-08
  • Correctness Checking for BPMN Collaborations with Sub-Processes
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-04-06
    Flavio Corradini; Andrea Morichetta; Andrea Polini; Barbara Re; Lorenzo Rossi; Francesco Tiezzi

    BPMN collaboration models are commonly used to describe the behaviour and interactions of processes in an inter-organisational context. An important role in this kind of models is played both by the message flow, and by sub-processes. The interplay between these features of BPMN models can conceal subtle or unexpected effects, which makes the design activity error-prone, thus leading to the possible

    更新日期:2020-04-06
  • Automated defect identification via path analysis-based features with transfer learning
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-04-05
    Yuwei Zhang; Dahai Jin; Ying Xing; Yunzhan Gong

    Recently, artificial intelligence techniques have been widely applied to address various specialized tasks in software engineering, such as code generation, defect identification, and bug repair. Despite the diffuse usage of static analysis tools in automatically detecting potential software defects, developers consider the large number of reported alarms and the expensive cost of manual inspection

    更新日期:2020-04-06
  • STEP-ONE: Simulated Testbed for Edge-Fog Processes based on the Opportunistic Network Environment simulator
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-27
    Jakob Mass; Satish Narayana Srirama; Chii Chang

    The Internet of Things (IoT) has evolved from a cloud-based architecture towards multi-layer architectures such as Fog computing, where network edge devices perform processing and messaging tasks. Researchers studied managing and scheduling applications in these architectures extensively, however some issues, especially the effect of mobility, have been less explored. Additionally, evaluation of these

    更新日期:2020-03-28
  • GAP: Forecasting commit activity in git projects
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-10
    Alexandre Decan; Eleni Constantinou; Tom Mens; Henrique Rocha

    Abandonment of active developers poses a significant risk for many open source software projects. This risk can be reduced by forecasting the future activity of contributors involved in such projects. Focusing on the commit activity of individuals involved in git repositories, this paper proposes a practicable probabilistic forecasting model based on the statistical technique of survival analysis.

    更新日期:2020-03-20
  • Software-testing education: A systematic literature mapping
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-19
    Vahid Garousi; Austen Rainer; Per Lauvås; Andrea Arcuri

    Context : With the rising complexity and scale of software systems, there is an ever-increasing demand for sophisticated and cost-effective software testing. To meet such a demand, there is a need for a highly-skilled software testing work-force (test engineers) in the industry. To address that need, many university educators worldwide have included software-testing education in their software engineering

    更新日期:2020-03-20
  • The Effects of Database Complexity on SQL Query Formulation
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-19
    Toni Taipalus

    In Structured Query Language (SQL) education, students often execute queries against a simple exercise database. Recently, databases that are more realistic have been utilized to the effect that students find exercises more interesting and useful, as these databases more accurately mimic databases students are likely to encounter in their future work environments. However, using even the most engaging

    更新日期:2020-03-20
  • A Classification Framework for Automated Control Code Generation in Industrial Automation
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-16
    Heiko Koziolek; Andreas Burger; Marie Platenius-Mohr; Raoul Jetley

    Software development for the automation of industrial facilities (e.g., oil platforms, chemical plants, power plants, etc.) involves implementing control logic, often in IEC 61131-3 programming languages. Developing safe and efficient program code is expensive and today still requires substantial manual effort. Researchers have thus proposed numerous approaches for automatic control logic generation

    更新日期:2020-03-20
  • Adaptive metamorphic testing with contextual bandits
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-13
    Helge Spieker; Arnaud Gotlieb

    Metamorphic Testing is a software testing paradigm which aims at using necessary properties of a system under test, called metamorphic relations, to either check its expected outputs, or to generate new test cases. Metamorphic Testing has been successful to test programs for which a full oracle is not available or to test programs for which there are uncertainties on expected outputs such as learning

    更新日期:2020-03-20
  • On Tracking Java Methods with Git Mechanisms
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-13
    Yoshiki Higo; Shinpei Hayashi; Shinji Kusumoto

    Method-level historical information is useful in (#2.8)various research on mining software repositories such as fault-prone module detection or evolutionary coupling identification. An existing technique named Historage converts a Git repository of a Java project to a finer-grained one. In a finer-grained repository, each Java method exists as a single file. Treating Java methods as files has an advantage

    更新日期:2020-03-20
  • Improving Software Bug-Specific Named Entity Recognition with Deep Neural Network
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-10
    Cheng Zhou; Bin Li; Xiaobing Sun

    There is a large volume of bug data in the bug repository, which contains rich bug information. Existing studies on bug data mining mainly rely on using information retrieval (IR) technology to search relevant historical bug reports. These studies basically treat a bug report as a closed unit, ignoring the semantic and structural information within it. Named-entity recognition (NER) is an important

    更新日期:2020-03-20
  • Scalability Assessment of Microservice Architecture Deployment Configurations: A Domain-based Approach Leveraging Operational Profiles and Load Tests
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-02-24
    Alberto Avritzer; Vincenzo Ferme; Andrea Janes; Barbara Russo; André van Hoorn; Henning Schulz; Daniel Menasché; Vilc Rufino

    Microservices have emerged as an architectural style for developing distributed applications. Assessing the performance of architecture deployment configurations — e.g., with respect to deployment alternatives — is challenging and must be aligned with the system usage in the production environment. In this paper, we introduce an approach for using operational profiles to generate load tests to automatically

    更新日期:2020-03-07
  • Substructure Similarity Search for Engineering Service-Based Systems
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-05
    Jintao Wu; Xing Guo; Guijun Yang; Shuhui Wu; Jianguo Wu

    With the broad application of service-oriented architecture in service-oriented software engineering, service-based systems (SBSs) are becoming ever more widely used. As a result, the selection of appropriate component services destined to fulfill the functional requirements becomes a critical challenge for successfully building SBSs, especially when the pre-specified SBS plan involves a complicated

    更新日期:2020-03-07
  • Bug Severity Prediction Using Question-and-Answer Pairs from Stack Overflow
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-02
    Youshuai Tan; Sijie Xu; Zhaowei Wang; Tao Zhang; Zhou Xu; Xiapu Luo

    Nowadays, bugs have been common in most software systems. For large-scale software projects, developers usually conduct software maintenance tasks by utilizing software artifacts (e.g., bug reports). The severity of bug reports describes the impact of the bugs and determines how quickly it needs to be fixed. Bug triagers often pay close attention to some features such as severity to determine the importance

    更新日期:2020-03-07
  • Enhancing Example-Based Code Search with Functional Semantics
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-03-02
    Zhengzhao Chen; Renhe Jiang; Zejun Zhang; Yu Pei; Minxue Pan; Tian Zhang; Xuandong Li

    As the quality and quantity of open source code increase, effective and efficient search for code implementing certain semantics, or semantics-based code search, has become an emerging need for software developers to retrieve and reuse existing source code. Previous techniques in semantics-based code search encode the semantics of loop-free Java code snippets as constraints and utilize an SMT solver

    更新日期:2020-03-07
  • An Ontology-Based Learning Approach for Automatically Classifying Security Requirements
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-02-29
    Tong Li; Zhishuai Chen

    Although academia has recognized the importance of explicitly specifying security requirements in early stages of system developments for years, in reality, many projects mix security requirements with other types of requirements. Thus, there is a strong need for precisely and efficiently classifying such security requirements from other requirements in requirement specifications. Existing studies

    更新日期:2020-03-07
  • Systematic Literature Review of Empirical Studies on Mental Representations of Programs
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-02-29
    Leah Bidlake; Eric Aubanel; Daniel Voyer

    Programmers are frequently tasked with modifying, enhancing, and extending applications. To perform these tasks, programmers must understand existing code by forming mental representations. Empirical research is required to determine the mental representations constructed during program comprehension to inform the development of programming languages, instructional practices, and tools. To make recommendations

    更新日期:2020-03-07
  • QMM-VANET: An Efficient Clustering Algorithm Based on QoS and Monitoring of Malicious Vehicles in Vehicular Ad Hoc Networks
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-02-26
    Hamideh Fatemidokht; Marjan Kuchaki Rafsanjani

    Vehicular ad hoc networks (VANETs) are considered as a subset of mobile ad hoc networks (MANETs) that can be used in the transportation field. These networks considerably improve the traffic safety and accident prevention. Because of the characteristics of VANETs such as self-organization, frequent link disconnections and rapid topology changes, developing efficient routing protocols is a challenging

    更新日期:2020-03-07
  • Formal Analysis and Verification of the PSTM Architecture Using CSP
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-02-22
    Ailun Liu; Huibiao Zhu; Miroslav Popovic; Shuangqing Xiang; Lei Zhang

    Starting with the analysis of the source codes of the Python Software Transactional Memory (PSTM) architecture, this paper applies process algebra CSP to formally verify the architecture at a fine-grained level. We analyze the communication process and components of the architecture from multiple perspectives and establish models describing the communication behaviors of the PSTM architecture. We use

    更新日期:2020-03-07
  • On Adaptive Change Recommendation
    J. Syst. Softw. (IF 2.559) Pub Date : 2020-02-12
    Leon Moonen; David Binkley; Sydney Pugh

    As the complexity of a software system grows, it becomes harder for developers to be aware of all the dependencies between its artifacts (e.g., files or methods). Change impact analysis helps to overcome this challenge, by recommending relevant source-code artifacts related to a developer’s current changes. Association rule mining has shown promise in determining change impact by uncovering relevant

    更新日期:2020-03-07
  • A posteriori operation detection in evolving software models.
    J. Syst. Softw. (IF 2.559) Pub Date : 2013-03-09
    Philip Langer,Manuel Wimmer,Petra Brosch,Markus Herrmannsdörfer,Martina Seidl,Konrad Wieland,Gerti Kappel

    As every software artifact, also software models are subject to continuous evolution. The operations applied between two successive versions of a model are crucial for understanding its evolution. Generic approaches for detecting operations a posteriori identify atomic operations, but neglect composite operations, such as refactorings, which leads to cluttered difference reports. To tackle this limitation

    更新日期:2019-11-01
  • Towards automated traceability maintenance.
    J. Syst. Softw. (IF 2.559) Pub Date : 2013-03-09
    Patrick Mäder,Orlena Gotel

    Traceability relations support stakeholders in understanding the dependencies between artifacts created during the development of a software system and thus enable many development-related tasks. To ensure that the anticipated benefits of these tasks can be realized, it is necessary to have an up-to-date set of traceability relations between the established artifacts. This goal requires the creation

    更新日期:2019-11-01
  • Testing and Validating Machine Learning Classifiers by Metamorphic Testing.
    J. Syst. Softw. (IF 2.559) Pub Date : 2011-05-03
    Xiaoyuan Xie,Joshua W K Ho,Christian Murphy,Gail Kaiser,Baowen Xu,Tsong Yueh Chen

    Machine Learning algorithms have provided core functionality to many application domains - such as bioinformatics, computational linguistics, etc. However, it is difficult to detect faults in such applications because often there is no "test oracle" to verify the correctness of the computed outputs. To help address the software quality, in this paper we present a technique for testing the implementations

    更新日期:2019-11-01
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
聚焦肿瘤,探索癌症
欢迎探索2019年最具下载量的材料科学论文
论文语言润色服务
宅家赢大奖
如何将化学应用到可持续发展目标中
向世界展示您的会议墙报和演示文稿
全球疫情及响应:BMC Medicine专题征稿
新版X-MOL期刊搜索和高级搜索功能介绍
化学材料学全球高引用
ACS材料视界
x-mol收录
自然科研论文编辑服务
南方科技大学
南方科技大学
舒伟
中国科学院长春应化所于聪-4-8
复旦大学
课题组网站
X-MOL
香港大学化学系刘俊治
中山大学化学工程与技术学院
试剂库存
天合科研
down
wechat
bug