Search Results - "2010 Asia Pacific Software Engineering Conference"

Refine Results
  1. 1

    The Qualitas Corpus: A Curated Collection of Java Code for Empirical Studies by Tempero, E, Anslow, C, Dietrich, J, Han, Ted, Jing Li, Lumpe, M, Melton, H, Noble, J

    “…In order to increase our ability to use measurement to support software development practise we need to do more analysis of code. However, empirical studies of…”
    Get full text
    Conference Proceeding
  2. 2

    An Automatic Testing Approach for Compiler Based on Metamorphic Testing Technique by Qiuming Tao, Wei Wu, Chen Zhao, Wuwei Shen

    “…Compilers play an important role in software development, and it is quite necessary to perform abundant testing to ensure the correctness of compilers. A…”
    Get full text
    Conference Proceeding
  3. 3

    Evaluating Mutation Testing Alternatives: A Collateral Experiment by Kintis, M, Papadakis, M, Malevris, N

    “…Mutation testing while being a successful fault revealing technique for unit testing, it is a rather expensive one for practical use. To bridge these two…”
    Get full text
    Conference Proceeding
  4. 4

    Detecting Duplicate Bug Report Using Character N-Gram-Based Features by Sureka, Ashish, Jalote, Pankaj

    “…We present an approach to identify duplicate bug reports expressed in free-form text. Duplicate reports needs to be identified to avoid a situation where…”
    Get full text
    Conference Proceeding
  5. 5

    Changes in the Software Development Profession to Meet the Need for Innovation from Businesses and Government by Nally, M

    “…Around the world there is spectacular growth in the deployment of intelligent devices that communicate via intelligent management systems. Solutions that fit…”
    Get full text
    Conference Proceeding
  6. 6

    Approaching Non-functional Properties of Software Product Lines: Learning from Products by Sincero, J, Schröder-Preikschat, W, Spinczyk, O

    “…Approaching the configuration of non-functional properties (NFPs) in traditional software systems is not an easy task, addressing the configuration of these…”
    Get full text
    Conference Proceeding
  7. 7

    A Model and Architecture of REBOK (Requirements Engineering Body of Knowledge) and Its Evaluation by Aoyama, M, Nakatani, T, Saito, S, Suzuki, M, Fujita, K, Nakazaki, H, Suzuki, R

    “…Requirements engineering has been extensively developed as a discipline. Many statistics on the software development indicate requirements process is the most…”
    Get full text
    Conference Proceeding
  8. 8

    Bridging the Gap between Fault Trees and UML State Machine Diagrams for Safety Analysis by HyeonJeong Kim, Wong, W E, Debroy, V, DooHwan Bae

    “…Poorly designed software systems are one of main causes of accidents in safety-critical systems, and thus, the importance of safety analysis for software has…”
    Get full text
    Conference Proceeding
  9. 9

    Evaluating Cloud Platform Architecture with the CARE Framework by Liang Zhao, Liu, A, Keung, J

    “…There is an emergence of Cloud application platforms such as Microsoft's Azure, Google's App Engine and Amazon's EC2/SimpleDB/S3. Startups and Enterprise…”
    Get full text
    Conference Proceeding
  10. 10

    Using Faults-Slip-Through Metric as a Predictor of Fault-Proneness by Afzal, W

    “…Background: The majority of software faults are present in small number of modules, therefore accurate prediction of fault-prone modules helps improve software…”
    Get full text
    Conference Proceeding
  11. 11

    Formal Transformation from Sequence Diagrams to Coloured Petri Nets by Bowles, J, Meedeniya, D

    “…In this paper we define a formal strongly consistent transformation from UML2 sequence diagrams to coloured Petri nets (CPNs). We define the language of…”
    Get full text
    Conference Proceeding
  12. 12

    Software Configuration Management in Global Software Development: A Systematic Map by Fauzi, S S M, Bannerman, P L, Staples, M

    “…Many companies use Global Software Development (GSD) to access skilled people, reduce costs and utilize around the clock development. GSD has numerous social…”
    Get full text
    Conference Proceeding
  13. 13

    Message from the Industry Program Chairs

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  14. 14

    Message from the Research Program Chairs

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  15. 15

    Message from the General Chairs

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  16. 16

    Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs by Alshammari, Bandar, Fidge, Colin, Corney, Diane

    “…Refactoring focuses on improving the reusability, maintainability and performance of programs. However, the impact of refactoring on the security of a given…”
    Get full text
    Conference Proceeding
  17. 17

    Enhancing Domain Knowledge for Requirements Elicitation with Web Mining by Kaiya, H, Shimizu, Y, Yasui, H, Kaijiri, K, Saeki, M

    “…To elicit software requirements, we have to have knowledge about a problem domain, e.g., healthcare, shopping or banking where the software is applied. A…”
    Get full text
    Conference Proceeding
  18. 18

    Towards Tool Support for Situational Engineering of Agile Methodologies by Abad, Z S H, Sadi, M H, Ramsin, R

    “…Various agile software development methodologies, practices, and techniques have been proposed in the last decade, some present novel ideas, while many are…”
    Get full text
    Conference Proceeding
  19. 19

    Model-Based Methods for Linking Web Service Choreography and Orchestration by Jun Sun, Yang Liu, Jin Song Dong, Geguang Pu, Tian Hut Tan

    “…In recent years, many Web service composition languages have been proposed. Web service choreography describes collaboration protocols of cooperating Web…”
    Get full text
    Conference Proceeding
  20. 20

    Combinatorial Testing with Shielding Parameters by Baiqiang Chen, Jun Yan, Jian Zhang

    “…Combinatorial testing is an important approach to detecting interaction errors for a system with several parameters. Existing research in this area assumes…”
    Get full text
    Conference Proceeding