Loading...
Search for: software-systems
0.007 seconds
Total 28 records

    Studying the relationship between the usage of APIS discussed in the crowd and post-release defects

    , Article Journal of Systems and Software ; Volume 170 , 2020 Tahmooresi, H ; Heydarnoori, A ; Nadri, R ; Sharif University of Technology
    Elsevier Inc  2020
    Abstract
    Software development nowadays is heavily based on libraries, frameworks and their proposed Application Programming Interfaces (APIs). However, due to challenges such as the complexity and the lack of documentation, these APIs may introduce various obstacles for developers and common defects in software systems. To resolve these issues, developers usually utilize Question and Answer (Q&A) websites such as Stack Overflow by asking their questions and finding proper solutions for their problems on APIs. Therefore, these websites have become inevitable sources of knowledge for developers, which is also known as the crowd knowledge. However, the relation of this knowledge to the software quality... 

    Tracing distributed collaborative development in apache software foundation projects

    , Article Empirical Software Engineering ; Volume 22, Issue 4 , 2017 , Pages 1795-1830 ; 13823256 (ISSN) Gharehyazie, M ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    Developing and maintaining large software systems typically requires that developers collaborate on many tasks. During such collaborations, when multiple people work on the same chunk of code at the same time, they communicate with each other and employ safeguards in various ways. Recent studies have considered group co-development in OSS projects and found that it is an essential part of many projects. However, those studies were limited to groups of size two, i.e., pairs of developers. Here we go further and characterize co-development in larger groups. We develop an effective methodology for capturing distributed collaboration beyond groups of size two, based on synchronized commit... 

    Tracing distributed collaborative development in apache software foundation projects

    , Article Empirical Software Engineering ; 2016 , Pages 1-36 ; 13823256 (ISSN) Gharehyazie, M ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    Developing and maintaining large software systems typically requires that developers collaborate on many tasks. During such collaborations, when multiple people work on the same chunk of code at the same time, they communicate with each other and employ safeguards in various ways. Recent studies have considered group co-development in OSS projects and found that it is an essential part of many projects. However, those studies were limited to groups of size two, i.e., pairs of developers. Here we go further and characterize co-development in larger groups. We develop an effective methodology for capturing distributed collaboration beyond groups of size two, based on synchronized commit... 

    Inferring causal molecular networks: Empirical assessment through a community-based effort

    , Article Nature Methods ; Volume 13, Issue 4 , 2016 , Pages 310-322 ; 15487091 (ISSN) Hill, S. M ; Heiser, L.M ; Cokelaer, T ; Linger, M ; Nesser, N. K ; Carlin, D. E ; Zhang, Y ; Sokolov, A ; Paull, E. O ; Wong, C. K ; Graim, K ; Bivol, A ; Wang, H ; Zhu, F ; Afsari, B ; Danilova, L. V ; Favorov, A. V ; Lee, W. S ; Taylor, D ; Hu, C. W ; Long, B. L ; Noren, D. P ; Bisberg, A. J ; Mills, G. B ; Gray, J. W ; Kellen, M ; Norman, T ; Friend, S ; Qutub, A. A ; Fertig, E. J ; Guan, Y ; Song, M ; Stuart, J. M ; Spellman, P. T ; Koeppl, H ; Stolovitzky, G ; Saez Rodriguez, J ; Mukherjee, S ; Afsari, B ; Al-Ouran, R ; Anton, B ; Arodz, T ; Askari Sichani, O ; Bagheri, N ; Berlow, N ; Bisberg, A. J ; Bivol, A ; Bohler, A ; Bonet, J ; Bonneau, R ; Budak, G ; Bunescu, R ; Caglar, M ; Cai, B ; Cai, C ; Carlin, D. E ; Carlon, A ; Chen, L ; Ciaccio, M. F ; Cokelaer, T ; Cooper, G ; Coort, S ; Creighton, C. J ; Daneshmand, S. M. H ; De La Fuente, A ; Di Camillo, B ; Danilova, L. V ; Dutta-Moscato, J ; Emmett, K ; Evelo, C ; Fassia, M. K. H ; Favorov, A. V ; Fertig, E. J ; Finkle, J. D ; Finotello, F ; Friend, S ; Gao, X ; Gao, J ; Garcia Garcia, J ; Ghosh, S ; Giaretta, A ; Graim, K ; Gray, J. W ; Großeholz, R ; Guan, Y ; Guinney, J ; Hafemeister, C ; Hahn, O ; Haider, S ; Hase, T ; Heiser, L. M ; Hill, S. M ; Hodgson, J ; Hoff, B ; Hsu, C. H ; Hu, C. W ; Hu, Y ; Huang, X ; Jalili, M ; Jiang, X ; Kacprowski, T ; Kaderali, L ; Kang, M ; Kannan, V ; Kellen, M ; Kikuchi, K ; Kim, D. C ; Kitano, H ; Knapp, B ; Komatsoulis, G ; Koeppl, H ; Krämer, A ; Kursa, M. B ; Kutmon, M ; Lee, W. S ; Li, Y ; Liang, X ; Liu, Z ; Liu, Y ; Long, B. L ; Lu, S ; Lu, X ; Manfrini, M ; Matos, M. R. A ; Meerzaman, D ; Mills, G. B ; Min, W ; Mukherjee, S ; Müller, C. L ; Neapolitan, R. E ; Nesser, N. K ; Noren, D. P ; Norman, T ; Oliva, B ; Opiyo, S. O ; Pal, R ; Palinkas, A ; Paull, E. O ; Planas Iglesias, J ; Poglayen, D ; Qutub, A. A ; Saez Rodriguez, J ; Sambo, F ; Sanavia, T ; Sharifi-Zarchi, A ; Slawek, J ; Sokolov, A ; Song, M ; Spellman, P. T ; Streck, A ; Stolovitzky, G ; Strunz, S ; Stuart, J. M ; Taylor, D ; Tegnér, J ; Thobe, K ; Toffolo, G. M ; Trifoglio, E ; Unger, M ; Wan, Q ; Wang, H ; Welch, L ; Wong, C. K ; Wu, J. J ; Xue, A. Y ; Yamanaka, R ; Yan, C ; Zairis, S ; Zengerling, M ; Zenil, H ; Zhang, S ; Zhang, Y ; Zhu, F ; Zi, Z ; Sharif University of Technology
    Nature Publishing Group  2016
    Abstract
    It remains unclear whether causal, rather than merely correlational, relationships in molecular networks can be inferred in complex biological settings. Here we describe the HPN-DREAM network inference challenge, which focused on learning causal influences in signaling networks. We used phosphoprotein data from cancer cell lines as well as in silico data from a nonlinear dynamical model. using the phosphoprotein data, we scored more than 2,000 networks submitted by challenge participants. The networks spanned 32 biological contexts and were scored in terms of causal validity with respect to unseen interventional data. A number of approaches were effective, and incorporating known biology was... 

    A safe stopping protocol to enable reliable reconfiguration for component-based distributed systems

    , Article 6th International Conference on Fundamentals of Software Engineering, FSEN 2015, 22 April 2015 through 24 April 2015 ; Volume 9392 , November , 2015 , Pages 100-109 ; 03029743 (ISSN) ; 9783319246437 (ISBN) Ghafari, M ; Heydarnoori, A ; Haghighi, H ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    Despite the need for change, highly available software systems cannot be stopped to perform changes because disruption in their services may consequent irrecoverable losses. Current work on runtime evolution are either too disruptive, e.g., "blackouts" in unnecessary components in the quiescence criterion approach or presume restrictive assumptions such as the "black-box design" in the tranquility approach. In this paper, an architecture-based approach, called SAFER, is proposed which provides a better timeliness by relaxing any precondition required to start reconfiguration. We demonstrate the validity of the SAFER through model checking and a realization of the approach on a component... 

    Measuring software security using SAN models

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012, 13 September 2012 through 14 September 2012 ; September , 2012 , Pages 80-86 ; 9781467323864 (ISBN) Nogoorani, S. D ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Security is one of the important issues in developing and implementing software systems especially in highly critical applications. Quantification and measurement of security is one of the approaches adopted to achieve the desired degree of security. In this paper, Stochastic Activity Networks (SANs) are used to formally model the attacks on the system under investigation. To this end, the semi-Markov attack model is sketched. Having the semi-Markov model, Probability of Attack Success (PAS), Mean Time to First Breach (MTFB), and System Misuse Proportion (SMP) are measured according to the appropriate transformation of the model to a SAN model. As a case study, we have studied a high-level... 

    Towards a process factory for developing situational requirements engineering processes

    , Article Proceedings of the ACM Symposium on Applied Computing, 26 March 2012 through 30 March 2012 ; March , 2012 , Pages 1089-1090 ; 9781450308571 (ISBN) Jafarinezhad, O ; Ramsin, R ; Sharif University of Technology
    2012
    Abstract
    Selecting a suitable Requirements Engineering (RE) process is usually based on personal preferences or existing company practices rather than on the characteristics of the project at hand (project situation). Feature-oriented software development is the overall process of developing software systems in terms of their features. The Software Product Line (SPL) approach is a paradigm for systematic reuse of software products, and a Software Factory is a SPL aimed at the industrialization of software development. Based on the notion that a software/RE process can be developed via an engineering process, this research aims to provide a feature-based RE process factory to develop RE processes... 

    An analytical review of process-centered software engineering environments

    , Article Proceedings - 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012 ; 2012 , Pages 64-73 ; 9780769546643 (ISBN) Matinnejad, R ; Ramsin, R ; Sharif University of Technology
    2012
    Abstract
    Process-centered Software Engineering Environments, or PSEEs, are intended for the definition, modification, and enactment of software process models, they thus bring software development processes into effect. Even though research efforts in process-centered software engineering abound, PSEE technology has not received the attention that it deserves. In order to create a concise but effective and practically applicable evaluation framework for PSEEs, this paper first presents a survey of PSEEs and highlights the current state of the art of the technology. The PSEEs which have been reviewed herein have been regarded as software systems, and as such, have been characterized in terms of their... 

    TCvisor: A hypervisor level secure storage

    , Article 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, 8 November 2010 through 11 November 2010, London ; 2010 ; 9781424488629 (ISBN) Rezaei, M ; Moosavi, N. S ; Nemati, H ; Azmi, R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we present design and implementation of TCvisor, a new trusted hypervisor. To this end, TCvisor provides a secure storage with different isolated view per user by using para-passthrough and combined key. In this regard, virtualization technology of processors has been used for complete isolation from operating system. By combining TPM base key, user's password and geo function key, TCvisor provides a secure storage in an environment with split data. We have applied feature wise security analysis TCvisor's secure storage from software system layers point then we have compared performance of TCvisor to selected candidates of existing layers  

    A service based approach to self-adaptive software systems based on constructing a group of autonomic elements

    , Article Proceedings of the 7th IEEE International Conference and Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2010, 22 March 2010 through 26 March 2010 ; March , 2010 , Pages 101-105 ; 9780769540047 (ISBN) Safi, G ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2010
    Abstract
    As requirements and environments become much more complex, the need for self-adaptive and self-healing software system grows. There are several existing works which present such systems by using different approaches. Using alternative solutions to provide a service or requirement is one of the most important approaches among existing works. In this paper an alternative-based approach for adding self-adaptive capabilities to software systems is proposed. In this approach a group of autonomic elements will be constructed based on different design or implementations that could be considered for a specific service or requirement. By using this approach, a highly adaptive software system could be... 

    Toward a framework for evaluating heterogeneous architecture styles

    , Article Proceedings - 2009 1st Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, 1 April 2009 through 3 April 2009, Dong Hoi ; 2009 , Pages 155-160 ; 9780769535807 (ISBN) Moaven, S ; Kamandi, A ; Habibi, J ; Ahmadi, H ; Sharif University of Technology
    2009
    Abstract
    Evaluating architectures and choosing the correct one is a critical issue in software engineering domain, in accordance with extremely extension of architecturedriven designs. In the first years of defining architecture styles, some special quality attributes were introduced as their basic attributes. After a moment, by utilizing them in practice, some results were obtained confirming some of attributes; some others meanwhile were not witnessed. As software architecture construction process is dependent on and addressed by both usage conditions and quality attributes, in this paper a framework has been proposed to provide an environment and a platform that can cover evaluation of... 

    Self-reconfiguration in highly available pervasive computing systems

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 23 June 2008 through 25 June 2008, Oslo ; Volume 5060 LNCS , 2008 , Pages 289-301 ; 03029743 (ISSN) ; 3540692940 (ISBN); 9783540692942 (ISBN) Hemmati, H ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    High availability of software systems is an essential requirement for pervasive computing environments. In such systems self-adaptation, using dynamic reconfiguration is also a key feature. However, dynamic reconfiguration potentially decreases the system availability by making parts of the system temporary frozen, especially during incomplete or faulty execution of the reconfiguration process. In this paper, we propose Assured Dynamic Reconfiguration Framework (ADRF), consisting of run-time analysis phases, assuring the desired correctness and completeness of dynamic reconfiguration process. We also specify factors that affect availability of reconfigurable software in pervasive computing... 

    Designing an agile methodology for mobile software development: A hybrid method engineering approach

    , Article 2nd International Conference on Research Challenges in Information Science, RCIS 2008, Marrakech, 3 June 2008 through 6 June 2008 ; 2008 , Pages 337-342 ; 1424416779 (ISBN); 9781424416776 (ISBN) Rahimian, V ; Ramsin, R ; Sharif University of Technology
    2008
    Abstract
    New Advances in mobile computer technology and the rapid growth of wireless networks in quality and quantity has introduced new applications and concerns in computer science and industry. The unique requirements and constraints associated with mobile systems have brought new challenges to software development for such environments, as it demands extensive improvements to traditional systems development methodologies in order to fulfill the special needs of this field. We examine the challenges of developing software for mobile systems, starting by reviewing mobile systems' characteristics and investigating the status quo of mobile software development methods. It has been shown that Agile... 

    Performance evaluation of mobile software systems: Challenges for a software engineer

    , Article 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2008, Mexico City, 12 November 2008 through 14 November 2008 ; December , 2008 , Pages 346-351 ; 9781424424993 (ISBN) Rahimian, V ; Habibi, J ; Sharif University of Technology
    2008
    Abstract
    New Advances in mobile computer technology, along with rapid growth of quality and quantity of wireless networks, introduce new capabilities, applications, and concerns to computer science and industry. Unique requirements and constraints of mobile systems bring new challenges to software development for such environments. It demands reconsidering the traditional approaches of information access, software design, and performance evaluation. Despite the various constraints and problems, research endeavors aimed at ameliorating the status quo through enhancing/devising software design and performance evaluation techniques for mobile software systems have been relatively few and far in between.... 

    A novel method for modeling and evaluation of uncertain information systems

    , Article Proceedings - 11th International Conference on Information Technology, ICIT 2008, 17 December 2008 through 20 December 2008, Bhubaneswar ; 2008 , Pages 238-243 ; 9780769535135 (ISBN) Haroonabadi, A ; Teshnehlab, M ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    None of the processing models in the software development has explained the software systems performance evaluation and modeling; likewise, there exist uncertainty in the information systems because of the natural essence of requirements and this may cause other challenges in the processing of software development. By the definition of UML extended version (Fuzzy UML), software functionality requirements that are stated in an uncertain way are supported; moreover, the concrete model is converted to formal model for modeling and performance evaluation of the software systems. This paper describes a methodology to develop a fuzzy coloured Petri net (F-CPN) model of a system. The F-CPN model... 

    A decision support system for software architecture-style selection

    , Article 6th ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2008, Prague, 20 August 2008 through 22 August 2008 ; 2008 , Pages 213-220 ; 9780769533025 (ISBN) Moaven, S ; Ahmadi, H ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    2008
    Abstract
    Due to the enlargement and complexity of software systems and the need for maintenance and update, success of systems depends strongly on their architecture. Software architecture has been a key element in software development process in two past decades. Therefore, choosing the correct architecture is a critical issue in software engineering domain, with respect to the extremely extension of architecturedriven designs. Moreover, software architecture selection is a multi-criteria decision-making problem in which different goals and objectives should be considered. In this paper, a Decision Support System (DSS) has been designed which provides software architects with more precise and... 

    Recasting constraint automata into Büchi automata

    , Article 5th International Colloquium on Theoretical Aspects of Computing, ICTAC 2008, Istanbul, 1 September 2008 through 3 September 2008 ; Volume 5160 LNCS , 2008 , Pages 156-170 ; 03029743 (ISSN) ; 3540857613 (ISBN); 9783540857617 (ISBN) Izadi, M ; Bonsangue, M. M ; Sharif University of Technology
    2008
    Abstract
    Constraint automata have been proposed as the operational semantics of Reo, a glue-code language for the exogenous composition and orchestration of components in a software system. In this paper we recast the theory of constraint automata into that of Büchi automata on infinite strings of records. We use records to express simultaneity constraints of I/O operations and show that every constraint automaton can be expressed as a Büchi automaton on an appropriate alphabet of records. Further, we give examples of component compositions that are expressible as Büchi automata but not as constraint automata. Finally, we show that the join composition operator for constraint automata and its... 

    A fuzzy model for solving architecture styles selection multi-criteria problem

    , Article EMS 2008, European Modelling Symposium, 2nd UKSim European Symposium on Computer Modelling and Simulation, Liverpool, 8 September 2008 through 10 September 2008 ; 2008 , Pages 388-393 ; 9780769533254 (ISBN) Moaven, S ; Ahmadi, H ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    2008
    Abstract
    The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. In this way, the role of software architecture is significantly important in software development. It serves as an evaluation and implementation plan for software development and software evaluation. Consequently, choosing the correct architecture is a critical issue in software engineering domain. Moreover, software architecture selection is a multicriteria decision-making problem in which different goals and objectives must be taken into consideration. In this paper, more precise and suitable decisions in selection of architecture styles have been... 

    Toward a new analyzable architectural description language based on OSAN

    , Article 2nd International Conference on Software Engineering Advances - ICSEA 2007, Cap Esterel, 25 August 2007 through 31 August 2007 ; 2007 ; 0769529372 (ISBN); 9780769529370 (ISBN) Kamandi, A ; Habibi, J ; Sharif University of Technology
    2007
    Abstract
    In the last two decades, a number of architecture-based software development notations, methods, techniques, and tools were formulated. Of particular interest to the software architecture researchers and practitioners were the notations and languages for modeling software architectures, known as ADLs. Object Stochastic Activity Network (OSAN) is a new model which inherits useful features from Petri nets, stochastic activity networks and queue networks, which made it a powerful and flexible tool to model concurrent systems and evaluate and verify them. This paper introduces OSAN as a new analyzable architecture description language, which can be used both for modeling architectural aspects of... 

    Methodology support for the model driven architecture

    , Article 14th Asia Pacific Software Engineering Conference, ASPCE 2007, Nagoya, 4 December 2007 through 7 December 2007 ; January , 2007 , Pages 454-461 ; 15301362 (ISSN); 0769530575 (ISBN); 9780769530574 (ISBN) Chitforoush, F ; Yazdandoost, M ; Ramsin, R ; Sharif University of Technology
    2007
    Abstract
    Model-driven approaches to software engineering have expanded their influence in recent years, with Object Management Group's Model-Driven Architecture (MDA) being the major force behind this boost. However, despite its merits, MDA remains insufficient for software system development, in the sense that it does not provide a concrete and comprehensive process for governing software development activities. There is therefore a strongly felt need for new model-driven software development methodologies. In this paper we review a number of existing model-driven methodologies, and propose a general framework for Model-Driven Development (MDD) based on MDA. The framework can be used for assessing...