
显示样式: 排序: IF: - GO 导出
-
Guest Editor’s Introduction: Software Mathematical Models for Human Understanding Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-11-09 Iaakov Exman
The unrelenting trend of larger and larger sizes of Software Systems and data has made software comprehensibility an increasingly difficult problem. However, a tacit consensus that human understanding of software is essential for most software related activities, stimulated software developers to embed comprehensibility in their systems’ design. On the other hand, recent empirical successes of Deep
-
Linear Software Models: An Occam’s Razor Set of Algebraic Connectors Integrates Modules into a Whole Software System Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-11-09 Iaakov Exman; Harel Wallach
Well-designed software systems, with providers only modules, have been rigorously obtained by algebraic procedures from the software Laplacian Matrices or their respective Modularity Matrices. However, a complete view of the whole software system should display, besides provider relationships, also consumer relationships. Consumers may have two different roles in a system: either internal or external
-
Semantic Recovery of Traceability Links between System Artifacts Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-11-09 Jose María Alvarez-Rodríguez; Roy Mendieta; Valentín Moreno; Miguel Sánchez-Puebla; Juan Llorens
This paper introduces a mechanism to recover traceability links between the requirements and logical models in the context of critical systems development. Currently, lifecycle processes are covered by a good number of tools that are used to generate different types of artifacts. One of the cornerstone capabilities in the development of critical systems lies in the possibility of automatically recovery
-
Regular Expression Learning from Positive Examples Based on Integer Programming Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-11-09 Juntao Gao; Yingqian Zhang
This paper presents a novel method to infer regular expressions from positive examples. The method consists of a candidate’s construction phase and an optimization phase. We first propose multiscaling sample augmentation to capture the cycle patterns from single examples during the candidate’s construction phase. We then use common substrings to build regular expressions that capture patterns across
-
A Generic Approach on How to Formally Specify and Model Check Path Finding Algorithms: Dijkstra, A* and LPA* Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-11-09 Kazuhiro Ogata
The paper describes how to formally specify three path finding algorithms in Maude, a rewriting logic-based programming/specification language, and how to model check if they enjoy desired properties with the Maude LTL model checker. The three algorithms are Dijkstra Shortest Path Finding Algorithm (DA), A* Algorithm and LPA* Algorithm. One desired property is that the algorithms always find the shortest
-
Design and Implementation of Phylotastic, a Service Architecture for Evolutionary Biology Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-11-09 Abu Saleh Md. Tayeen; Thanh Hai Nguyen; Van Duc Nguyen; Enrico Pontelli
Access and reuse of authoritative phylogenetic knowledge have been a longstanding challenges in the evolutionary biology community — leading to a number of research efforts (e.g. focused on interoperation, standardization of formats, and development of minimum reporting requirements). The Phylotastic project was launched to provide an answer to such challenges — as an architectural concept collaboratively
-
Method for Predicting Mobile Service Evolution from User Reviews and Update Logs Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-11-09 Jiafei Song; Zhongjie Wang; Zhiying Tu; Xiaofei Xu
Because of rapid growth in mobile application markets, competition between companies that provide similar applications has become fierce. To improve user satisfaction for keeping existing users and attracting new users, application developers need to quickly respond to customer feedback regarding functionality and performance defects. In software engineering, specifying an accurate evolution plan according
-
Guidelines for Quality Assurance of Machine Learning-Based Artificial Intelligence Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-24 Gaku Fujii; Koichi Hamada; Fuyuki Ishikawa; Satoshi Masuda; Mineo Matsuya; Tomoyuki Myojin; Yasuharu Nishi; Hideto Ogawa; Takahiro Toku; Susumu Tokumoto; Kazunori Tsuchiya; Yasuhiro Ujita
Significant effort is being put into developing industrial applications for artificial intelligence (AI), especially those using machine learning (ML) techniques. Despite the intensive support for building ML applications, there are still challenges when it comes to evaluating, assuring, and improving the quality or dependability. The difficulty stems from the unique nature of ML, namely, system behavior
-
Context-Dependent Feature Values in Text Categorization Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-20 Edward Kai Fung Dang; Robert Wing Pong Luk; James Allan
Feature engineering is one aspect of knowledge engineering. Besides feature selection, the appropriate assignment of feature values is also crucial to the performance of many software applications, such as text categorization (TC) and speech recognition. In this work, we develop a general method to enhance TC performance by the use of context-dependent feature values (aka term weights), which are obtained
-
Split Attention Pointer Network for Source Code Language Modeling Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-20 Zhimin Zhou; Zhongwen Chen
There is a growing interest in leveraging Deep Learning (DL) for automating Software Engineering tasks such as program completion. In this paper, we leverage Recurrent Neural Networks (RNNs) for Abstract Syntax Tree (AST)-based code completion. Our approach converts source code into AST nodes and a language model predicts the type and value attributes of next tokens. Our work demonstrates that the
-
An Effective Approach for Context Driven Testing in Practice — A Case Study Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-20 Quyet-Thang Huynh; Le-Trinh Pham; Nhu-Hang Ha; Duc-Man Nguyen
Software testing is a continuous process during the software development stages to ensure quality software products. Researchers, experts and software engineers keep going on studying new techniques, methods and approaches of testing to accommodate changes in software development because of the flexible requirement along with the changing of technology. So, developers and testers need to have effective
-
Algorithmic Transparency of Large-Scale *AIDA Programs Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-20 Yutaka Watanobe; Nikolay Mirenkov
Programming in pictures is an approach where pictures and moving pictures are used as super-characters to represent the features of computational algorithms and data structures, as well as for explaining the models and application methods involved. *AIDA is a computer language that supports programming in pictures. This language and its environment have been developed and promoted as a testbed for
-
ABMMRS Eradicator: Improving Accuracy in Recommending Move Methods for Web-based MVC Projects and Libraries Using Method’s External Dependencies Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-20 Atish Kumar Dipongkor; Iftekhar Ahmed; Rayhanul Islam; Nadia Nahar; Abdus Satter; Md. Saeed Siddik
Move Method Refactoring (MMR) is used to place highly coupled methods in appropriate classes for making source code more cohesive. Like other refactoring techniques, it is mandatory that applying MMR will preserve applications’ behaviors. However, traditional MMR techniques failed to meet this essential precondition for Action methods in web-based application and API methods in libraries projects.
-
AutoWPR: An Automatic Web Page Recoloring Method Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-20 Yonghao Long; Xiangping Chen; Fan Zhou
The color design is one of the important parts of GUI development. To gain an attractive color scheme, designers often seek inspiration from examples. However, transferring an example’s colors to a target web page is time-consuming and tedious. In this paper, we propose a method named AutoWPR to reuse the example web page’s colors for recoloring a web page. To preserve the semantic relations of web
-
Agent-Oriented Methodologies Evaluation Frameworks: A Review Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-20 Ali Jazayeri; Ellen J. Bass
Multi-agent systems and agent-oriented methodologies support analysis, characterization and development of complex software systems. These methodologies introduce different definitions for the essential components of multi-agent systems and cover different phases of the system development life cycle. Therefore, appropriate frameworks for evaluation and comparison of different methodologies would support
-
A New Semantic-based Multi-Level Classification Approach for Activity Recognition Using Smartphones Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-13 Ghassen Ben Brahim; Wassim El-Hajj; Cynthia El-Hayek; Hazem Hajj
In this paper, we address the problem of recognizing the semantic human activities through the analysis of large dataset collected from users’ sensor-based smartphones. Our approach is unique in terms of covering a large number of activities that users could possibly engage in, and considering the multi-level-based classification model. Our model has three properties that never seemed to be addressed
-
Scalable Influence Maximization Meets Efficiency and Effectiveness in Large-Scale Social Networks Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-13 Liqing Qiu; Shuang Zhang; Chunmei Gu; Xiangbo Tian
Influence maximization is a problem that aims to select top k influential nodes to maximize the spread of influence in social networks. The classical greedy-based algorithms and their improvements are relatively slow or not scalable. The efficiency of heuristic algorithms is fast but their accuracy is unacceptable. Some algorithms improve the accuracy and efficiency by consuming a large amount of memory
-
Two Improved Topic Word Detection Algorithms Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-13 Zehao Yu
Topic word extraction is the task of identifying single or multi-word expressions that represent the main topics of a document. In this paper, two improved algorithms for extracting and discovering topic words are proposed in the Rapid Topic word Detection (RTD) Algorithm and CategoryTextRank (CTextRank) Algorithm, which can effectively obtain information by extracting and filtering the topic words
-
Investigating the Relationship Between Mutants and Real Faults with Respect to Mutated Code Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-13 Mingwan Kim; Neunghoe Kim; Hoh Peter In
Mutation testing aims to evaluate the fault detection capability of a test suite. This evaluation substitutes faults with mutants by transforming program code to be defective. Evidences of the relationship between the detection rates of mutants and real faults have supported the use of mutants. It has also been known that the test suite size was a significant factor affecting the relationship. Our
-
A Revisit of Metrics for Test Case Prioritization Problems Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-13 Ziyuan Wang; Chunrong Fang; Lin Chen; Zhiyi Zhang
For the test case prioritization problems, the average percent of faults detected (APFD) and its variant versions are widely used as metrics to evaluate prioritized test suite’s efficiency of fault detection. By a revisit of metrics for test case prioritization, we observe that APFD is only available for the scenarios where all test suites under evaluation contain the same number of test cases. Such
-
A Proactive Approach to Test Case Selection — An Efficient Implementation of Adaptive Random Testing Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-10-13 Michael Omari; Jinfu Chen; Robert French-Baidoo; Yunting Sun
Fixed Sized Candidate Set (FSCS) is the first of a series of methods proposed to enhance the effectiveness of random testing (RT) referred to as Adaptive Random Testing methods or ARTs. Since its inception, test case generation overheads have been a major drawback to the success of ART. In FSCS, the bulk of this cost is embedded in distance computations between a set of randomly generated candidate
-
An Integration of Train Timetabling, Platforming and Routing-Based Cooperative Adjustment Methodology for Dealing with Train Delay Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-08-26 Yinggui Zhang; Zengru Chen; Min An; Aliyu Mani Umar
Train delay is a serious issue that can spread rapidly in the railway network leading to further delay of other trains and detention of passengers in stations. However, the current practice in the event of the trail delay usually depends on train dispatcher’s experience, which cannot manage train operation effectively and may have safety risks. The application of intelligent railway monitor and control
-
A Data-Driven Two-Stage Prediction Model for Train Primary-Delay Recovery Time Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-08-26 Bowen Gao; Dongxiu Ou; Decun Dong; Yusen Wu
Accurate prediction of train delay recovery is critical for railway incident management and providing passengers with accurate journey time. In this paper, a two-stage prediction model is proposed to predict the recovery time of train primary-delay based on the real records from High-Speed Railway (HSR). In Stage 1, two models are built to study the influence of feature space and model framework on
-
An Improved Faster R-CNN for UAV-Based Catenary Support Device Inspection Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-08-26 Jiahao Liu; Zhipeng Wang; Yunpeng Wu; Yong Qin; Xianbin Cao; Yonghui Huang
The catenary support device inspection is of crucial importance for ensuring safety and reliability of railway systems. At present, visual detection tasks of catenary support devices defect are performed by trained personnel based on the images taken periodically by industrial cameras installed on inspection vehicle in a limited period of time at midnight. However, the inspection mean is inappropriate
-
The Turnout Abnormality Diagnosis Based on Semi-Supervised Learning Method Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-08-26 Zeng Shu Shi; Yiman Du; Tao Du; Guochao Shan
In China, the turnout abnormality very easily causes traffic accident or affects the efficiency due to the operating environment of railway transportation. The existing monitoring means are relatively backward, and mature automatic diagnosis method is lacking. In this study, a method based on semi-supervised learning algorithm for abnormal state diagnosis of turnout action curve is proposed, which
-
Impact Analysis About Response Time Considering Deployment Change of SaaS Software Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-08-26 Bo Dong; Shi Ying; Lin Li; Hui Luo; Zhe Yang
The deployment change of SaaS (Software as a Service) software will influence its response time, which is an important performance metric. Therefore, studying the impact of deployment change on the response time of SaaS software could contribute to performance improvement of the software. However, there are few performance analysis methods which can directly analyze the relationship between deployment
-
An Automated Hybrid Approach for Generating Requirements Trace Links Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-08-26 Bangchao Wang; Rong Peng; Zhuo Wang; Xiaomin Wang; Yuanbang Li
Trace links between requirements and software artifacts provide available traceability information and in-depth insights for different stakeholders. Unfortunately, establishing requirements trace links is a tedious, labor-intensive and fallible task. To alleviate this problem, Information Retrieval (IR) methods, such as Vector Space Model (VSM), Latent Semantic Indexing (LSI), and their variants, have
-
Integrated Formal Tools for Software Architecture Smell Detection Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-07-29 Nacha Chondamrongkul; Jing Sun; Ian Warren; Scott Uk-Jin Lee
The architecture smells are the poor design practices applied to the software architecture design. The smells in software architecture design can be cascaded to cause the issues in the system implementation and significantly affect the maintainability and reliability attribute of the software system. The prevention of architecture smells at the design phase can therefore improve the overall quality
-
Semantic Service Search in IT Crowdsourcing Platform: A Knowledge Graph-Based Approach Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-07-29 Qinyue Wu; Duankang Fu; Beijun Shen; Yuting Chen
Understanding user’s search intent in vertical websites like IT service crowdsourcing platform relies heavily on domain knowledge. Meanwhile, searching for services accurately on crowdsourcing platforms is still difficult, because these platforms do not contain enough information to support high-performance search. To solve these problems, we build and leverage a knowledge graph named ITServiceKG to
-
Exploiting Declarative Mapping Rules for Generating GraphQL Servers with Morph-GraphQL Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-07-29 David Chaves-Fraga; Freddy Priyatna; Ahmad Alobaid; Oscar Corcho
In the last decade, REST has become the most common approach to provide web services, yet it was not originally designed to handle typical modern applications (e.g. mobile apps). GraphQL was proposed to reduce the number of queries and data exchanged in comparison with REST. Since its release in 2015, it has gained momentum as an alternative approach to REST. However, generating and maintaining GraphQL
-
Semantics-Driven Programming of Self-Adaptive Reactive Systems Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-07-29 Ester Giallonardo; Francesco Poggi; Davide Rossi; Eugenio Zimeo
In recent years, new classes of highly dynamic, complex systems are gaining momentum. These classes include, but are not limited to IoT, smart cities, cyber-physical systems and sensor networks. These systems are characterized by the need to express behaviors driven by external and/or internal changes, i.e. they are reactive and context-aware. A desirable design feature of these systems is the ability
-
Semantic Restful Service Composition Using Task Specification Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-07-29 Shang-Pin Ma; Hsuan-Ju Lin; Ming-Jen Hsu
Existing Web API search engines allow only category-based browsing and keyword- or tag-based searches for RESTful services. In other words, they do not enable the discovery or composition of real-world RESTful services by application developers. This paper outlines a novel scheme, called Transformation–Annotation–Discovery (TAD), which transforms OpenAPI (Swagger) documents related to RESTful services
-
Software Agent-Centric Semantic Social Network for Cyber-Physical Interaction and Collaboration Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-07-29 Nazmul Hussain; Hai H. Wang; Christopher D. Buckingham; Xiaoyuan Zhang
Considerable research has recently focused on integrating cyber-physical systems in a social context. However, several challenges remain concerning appropriate methodologies, frameworks and techniques for supporting socio-cyber-physical collaboration. Existing systems do not recognize how cyber-physical resources can be socially connected so that they interact in collaborative decision-making like
-
An Approach to Software Maintenance: A Case Study in Small and Medium-Sized Businesses IT Organizations Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-06-26 Alexandre L’Erario; Hellen Christine Seródio Thomazinho; José Augusto Fabri
Software maintenance is the task of modifying a running product previously delivered to the client, in order to correct defects, improve performance or adapt it to the environment. This task is a crucial activity for enterprises. Without it, existing systems would become rapidly out-of-date and inefficient. The purpose of this paper is to present a software maintenance approach used in small and medium-sized
-
Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-06-26 Yi-Hui Chen; Eric Jui-Lin Lu; Ya-Wen Cheng
Most clustering algorithms build disjoint clusters. However, clusters might be overlapped because documents may belong to two or more categories in the real world. For example, a paper discussing the Apple Watch may be categorized into either 3C, Fashion, or even Clothing and Shoes. Therefore, overlapping clustering algorithms have been studied such that a resource can be assigned to one or more clusters
-
Deep Transfer Learning for Source Code Modeling Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-06-26 Yasir Hussain; Zhiqiu Huang; Yu Zhou; Senzhang Wang
In recent years, deep learning models have shown great potential in source code modeling and analysis. Generally, deep learning-based approaches are problem-specific and data-hungry. A challenging issue of these approaches is that they require training from scratch for a different related problem. In this work, we propose a transfer learning-based approach that significantly improves the performance
-
Concurrent Bug Finding Based on Bounded Model Checking Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-06-26 Milena Vujošević Janičić
Automated and reliable software verification is of crucial importance for development of high-quality software. Formal methods can be used for finding different kinds of bugs without executing the software, for example, for finding possible run-time errors. The methods like model checking and symbolic execution offer very precise static analysis but on real world programs do not always scale well.
-
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-06-26 Bing Zhang; Chun Shan; Munawar Hussain; Jiadong Ren; Guoyan Huang
Because of the sequence and number of calls of functions, software network cannot reflect the real execution of software. Thus, to detect crucial functions (DCF) based on software network is controversial. To address this issue, from the viewpoint of software dynamic execution, a novel approach to DCF is proposed in this paper. It firstly models, the dynamic execution process as an execution sequence
-
Log-Based Anomaly Detection with the Improved K-Nearest Neighbor Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-03-23 Bingming Wang; Shi Ying; Guoli Cheng; Rui Wang; Zhe Yang; Bo Dong
Logs play an important role in the maintenance of large-scale systems. The number of logs which indicate normal (normal logs) differs greatly from the number of logs that indicate anomalies (abnormal logs), and the two types of logs have certain differences. To automatically obtain faults by K-Nearest Neighbor (KNN) algorithm, an outlier detection method with high accuracy, is an effective way to detect
-
Building a Credit Scoring Model Based on Data Mining Approaches Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-03-23 Jasmina Nalić; Goran Martinovic
Nowadays, one of the biggest challenges in banking sector, certainly, is assessment of the client’s creditworthiness. In order to improve the decision-making process and risk management, banks resort to using data mining techniques for hidden patterns recognition within a wide data. The main objective of this study is to build a high-performance customized credit scoring model. The model named Reliable
-
A Model-Based Test Case Prioritization Approach Based on Fault Urgency and Severity Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-03-23 Dan Wei; Qingying Sun; Xingqi Wang; Tianning Zhang; Bin Chen
With the aggrandizement scale of software system, the number of test cases has grown explosively. Test case prioritization (TCP) has been widely used in software testing to effectively improve testing efficiency. However, traditional TCP methods are mostly based on software code and they are difficult to apply to model-based testing. Moreover, existing model-based TCP techniques often do not take the
-
Knowledge Deduction and Reuse Application to the Products’ Design Process Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-03-23 Achraf Ben Miled; Rahma Dhaouadi; Romany F. Mansour
In this paper, we introduce a framework for knowledge reuse and deduction in mechanical products design and development. The proposed system effectively exploits the capitalized and inferred knowledge. To this end, we settled up an ontology dealing with the design process of mechanical products such as “the car”. The ontology-based framework is supported by a software tool that brings an automatic
-
Usability Requirements Extraction Method from Software Document Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-03-23 Rohayanti Hassan; Noor Atikah Amira Fauzi; Shahreen Kasim; Herman Khalid Omer
Extracting the usability requirements are crucial during requirements review and requirements validation for different purposes. Usability requirements are hard to be determined until the real user has experienced the software. It is even more challenging when these usability requirements are documented in natural language, which has an inconsistent and unrestricted structure. Automated requirements
-
Case Study Investigation of the Fault Detection and Error Locating Effects of Architecture-based Software Testing Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-03-23 Jihyun Lee; Sungwon Kang
For software testing, it is well known that the architecture of a software system can be utilized to enhance testability, fault detection and error locating. However, how much and what effects architecture-based software testing has on software testing have been rarely studied. Thus, this paper undertakes case study investigation of the effects of architecture-based software testing specifically with
-
Applicability of Machine Learning Methods on Mobile App Effort Estimation: Validation and Performance Evaluation Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-27 Mamta Pandey; Ratnesh Litoriya; Prateek Pandey
Software cost estimation is one of the most crucial tasks in a software development life cycle. Some well-proven methods and techniques have been developed for effort estimation in case of classical software. Mobile applications (apps) are different from conventional software by their nature, size and operational environment; therefore, the established estimation models for traditional desktop or web
-
Story Point-Based Effort Estimation Model with Machine Learning Techniques Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-27 Muaz Gultekin; Oya Kalipsiz
Until now, numerous effort estimation models for software projects have been developed, most of them producing accurate results but not providing the flexibility to decision makers during the software development process. The main objective of this study is to objectively and accurately estimate the effort when using the Scrum methodology. A dynamic effort estimation model is developed by using regression-based
-
A Case Representation and Similarity Measurement Model with Experience-Grounded Semantics Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-27 Nady Slam; Wushour Slamu; Pei Wang
Case-based reasoning heavily depends on the structure and content of the cases, and semantics is essential to effectively represent cases. In the field of structured case representation, most of the works regarding case representation and measurement of semantic similarity between cases are based on model-theoretic semantics and their extensions. The purpose of this study is to explore the potential
-
Feedback2Code: A Deep Learning Approach to Identifying User-Feedback-Related Source Code Files Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-27 Shuhan Yan; Tianjiao Du; Beijun Shen; Yuting Chen; Zhilei Ren
Users frequently raise feedback when using software products. Feedback from users regarding their experiences and expectations and software defects they found adds values to software maintenance and evolution — software managers collect user feedback and then dispatch feedback issues that developers (and/or maintainers) need to track and process. Feedback tracking is often supported by open source
-
Software Analysis Method for Assessing Software Sustainability Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-27 Theresia Ratih Dewi Saputri; Seok-Won Lee
Software sustainability evaluation has become an essential component of software engineering (SE) owing to sustainability considerations that must be incorporated into software development. Several studies have been performed to address the issues associated with sustainability concerns in the SE process. However, current practices extensively rely on participant experiences to evaluate sustainability
-
Thread Scheduling Sequence Generation Based on All Synchronization Pair Coverage Criteria Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-27 JunXia Guo; Zheng Li; CunFeng Shi; RuiLian Zhao
Testing multi-thread programs becomes extremely difficult because thread interleavings are uncertain, which may cause a program getting different results in each execution. Thus, Thread Scheduling Sequence (TSS) is a crucial factor in multi-thread program testing. A good TSS can obtain better testing efficiency and save the testing cost especially with the increase of thread numbers. Focusing on the
-
Piecewise Aggregation for HMM Fitting: A Pre-Fitting Model for Seamless Integration with Time-Series Data Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Joaquim Assunção; Paulo Fernandes; Jean-Marc Vincent
We propose a simple, fast, deterministic pre-fitting approach which derives the Baum–Welch algorithm initial values directly from the input data. Such pre-fitting has the purpose of improving the fitting time for a given Hidden Markov Model (HMM) while maintaining the original Baum–Welch algorithm as the fitting one. The fitting time is improved by avoiding the Baum–Welch algorithm sensitiveness through
-
Using Bayesian Network to Estimate the Value of Decisions within the Context of Value-Based Software Engineering: A Multiple Case Study Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Emilia Mendes; Vitor Freitas; Mirko Perkusich; João Nunes; Felipe Ramos; Alexandre Costa; Renata Saraiva; Arthur Freire
Context: Companies must make a paradigm shift in which both short- and long-term value aspects are employed to guide their decision-making. Such need is pressing in innovative industries, such as ICT, and is the core of Value-based Software Engineering (VBSE). Objective: This paper details three case studies where value estimation models using Bayesian Network (BN) were built and validated. These estimation
-
Point-of-Interest Recommendation Based on User Contextual Behavior Semantics Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Dongjin Yu; Kaihui Xu; Dongjing Wang; Ting Yu; Wanqing Li
By suggesting new visiting places, point-of-interest (POI) recommendation not only assists users to find their preferred places, but also helps businesses to attract potential customers. Recent studies have proposed many approaches to the POI recommendation. However, the data sparsity and complexity of user check-in behavior still pose big challenges to accurate personalized POI recommendation. To
-
Improve Language Modeling for Code Completion Through Learning General Token Repetition of Source Code with Optimized Memory Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Yixiao Yang; Xiang Chen; Jiaguang Sun
In last few years, applying language model to source code is the state-of-the-art method for solving the problem of code completion. However, compared with natural language, code has more obvious repetition characteristics. For example, a variable can be used many times in the following code. Variables in source code have a high chance to be repetitive. Cloned code and templates, also have the property
-
Exposing IoT Objects in the Internet Using the Resource Management Architecture Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Carlos Eduardo Pantoja; Heder Dorneles Soares; José Viterbo; Tielle Alexandre; Amal El-Fallah Seghrouchni; Arthur Casals
This paper proposes an architecture for sharing IoT Objects’ resources in the Internet of Things providing a model for its owners to expose devices, which can be consumed by clients inspired by the Sensor-as-a-Service model. The main idea relies on the fact that users, such as developers and researchers, do not always have access to the necessary hardware and resources. Exposing devices in IoT should
-
A Case-Based Reasoning Approach for the Cybersecurity Incident Recording and Resolution Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Raul Ceretta Nunes; Marcelo Colomé; Fabio André Barcelos; Marcelo Garbin; Gustavo Bathu Paulus; Luis Alvaro De Lima Silva
Intelligent computing techniques have a paramount importance to the treatment of cybersecurity incidents. In such Artificial Intelligence (AI) context, while most of the algorithms explored in the cybersecurity domain aim to present solutions to intrusion detection problems, these algorithms seldom approach the correction procedures that are explored in the resolution of cybersecurity incident problems
-
A Robust Visual Tracker Based on DCF Algorithm Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Menglei Jin; Weibin Liu; Weiwei Xing
Since Correlation Filter appeared in the field of video object tracking, it is very popular due to its excellent performance. The Correlation Filter-based tracking algorithms are very competitive in terms of accuracy and speed as well as robustness. However, there are still some fields for improvement in the Correlation Filter-based tracking algorithms. First, during the training of the classifier
-
API Misuse Detection in C Programs: Practice on SSL APIs Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Chi Li; Zuxing Gu; Min Zhou; Jiecheng Wu; Jiarui Zhang; Ming Gu
Libraries offer reusable functionality through Application Programming Interfaces (APIs) with usage constraints such as call conditions or orders. Constraint violations, i.e. API misuses, commonly lead to bugs and security issues. Although researchers have developed various API misuse detectors in the past few decades, recent studies show that API misuse is prevalent in real-world projects, especially
-
Formalization and Verification of TESAC Using CSP Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Dongzhen Sun; Huibiao Zhu; Yuan Fei; Lili Xiao; Gang Lu; Jiaqi Yin
Cloud computing is an emerging computing paradigm in IT industries. The wide adoption of cloud computing is raising concerns about management of data in the cloud. Access control and data security are two critical issues of cloud computing. Time-efficient secure access control (TESAC) model is a new data access control scheme which can minimize many significant problems. This scheme has better performance
-
Multistep Flow Prediction on Car-Sharing Systems: A Multi-Graph Convolutional Neural Network with Attention Mechanism Int. J. Softw. Eng. Knowl. Eng. (IF 0.886) Pub Date : 2020-02-11 Hongming Zhu; Yi Luo; Qin Liu; Hongfei Fan; Tianyou Song; Chang Wu Yu; Bowen Du
Multistep flow prediction is an essential task for the car-sharing systems. An accurate flow prediction model can help system operators to pre-allocate the cars to meet the demand of users. However, this task is challenging due to the complex spatial and temporal relations among stations. Existing works only considered temporal relations (e.g. using LSTM) or spatial relations (e.g. using CNN) independently