Filters








503,576 Hits in 4.3 sec

Remote Access of Computer Controlled Experiments

Kristian Nilsson, Johan Zackrisson, Mats Pettersson
2008 International Journal of Online Engineering (iJOE)  
in this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program.  ...  Students are able to make reservations of experiment sessions through a web interface, which is administrated by the system administrator.  ...  The security laboratory is focusing on security and the possibility to experiment with dangerous software in a controlled environment.  ... 
doi:10.3991/ijoe.v4i4.704 fatcat:lhocqpvh2bgpxinarfyqdsbuii

OpenLabs Security Laboratory - The Online Security Experiment Platform

Johan Zackrisson, Charlie Svahnberg
2008 International Journal of Online Engineering (iJOE)  
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings.  ...  In this paper, a way to enable remote experiments is described, where users are given full control over the computer installation.  ...  Example of an experiment In a course on malicious software, an installation has been prepared with rootkits, adware and spyware.  ... 
doaj:76f7dd5b41584ed68f43e637e36dfe05 fatcat:3ykjjsd2cjaupflmzpdsfzau4q

What is Your Code Clone Detection and Evolution Research Made Of?

Chaman Wijesiriwardana, Prasad Wimalaratne
2021 Computing and informatics  
This paper presents a useful collection of Building Blocks identified based on a systematic literature review, and a conceptual framework of an experimental testbed to facilitate clone detection experiments  ...  Clone detection experiments usually consist of several tasks such as fetching data from a version control system, performing necessary pre-processing activities, and feeding the data to a clone detection  ...  This work devised a conceptual framework and a proof-of-concept experimental testbed to conduct CCDE experiments, which could be extended to conduct other types of software engineering experiments as well  ... 
doi:10.31577/cai_2021_3_690 fatcat:x6r4tn2wrrbvzlaglbby6jonqa

Experiment on the automatic detection of function clones in a software system using metrics

Mayrand, Leblanc, Merlo
1996 Proceedings of International Conference on Software Maintenance ICSM-96  
This paper presents a technique to automatically identify duplicate and near duplicate functions in a large software system.  ...  The results of applying the clone detection technique to two telecommunication monitoring systems tofaling one million lines of source code are provided as examples.  ...  Datrix is a trademark of Bell Canada  ... 
doi:10.1109/icsm.1996.565012 dblp:conf/icsm/MayrandLM96 fatcat:quwxspjdtvfsnlaynuuyotznl4

Analysis and clustering of model clones: An automotive industrial experience

Manar H. Alalfi, James R. Cordy, Thomas R. Dean
2014 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)  
We apply our model clone detection tool, SIMONE, to identify identical and near-miss Simulink subsystem clones and cluster them into classes based on clone size and similarity threshold.  ...  We then analyze clone detection results using graph visualizations generated by the SIMGraph, a SIMONE extension, to identify subsystem patterns.  ...  A modern automobile may have 100 million lines or more of production software source code on board, and up to 80% of the code deployed on up to 100 embedded control units can be generated from models specified  ... 
doi:10.1109/csmr-wcre.2014.6747198 dblp:conf/csmr/AlalfiCD14 fatcat:d2nokvjt35afvb27d5gblh4sca

Pattern mining of cloned codes in software systems

Wei Qu, Yuanyuan Jia, Michael Jiang
2014 Information Sciences  
Pattern mining of cloned codes in software systems is a challenging task due to various modifications and the large size of software codes.  ...  In this paper, we propose a novel pattern mining framework for cloned codes in software systems.  ...  Experimental results To demonstrate the effectiveness and efficiency of the proposed approach, we performed experiments on different programs in a health care software system.  ... 
doi:10.1016/j.ins.2010.04.022 fatcat:vvlqh62v6jhvxb3fx572nge2ra

Empirical studies on software evolution

Massimiliano Di Penta
2010 Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE) on - IWPSE-EVOL '10  
technology in a controlled environment Careful design Replication Evaluating the whole technology on a realistic project Lower level of control than experiments [Linkerman and Rombach, 97  ...  G U Conallen UML U n d e r g r a d G r a d Mean of F-Measure The comprehension level does not depend only on the kind of diagram, but rather on the interaction with Ability/Experience… 22  ...  The first underwent to a bug fixing (August, 26 1999) The same bug was discovered six months later on the other clone (February, 20 2000) CVS commit note: "...I had previously fixed the identical bug  ... 
doi:10.1145/1862372.1862375 dblp:conf/iwpse/Penta10 fatcat:vsbbogyfafd75bvsqzttdnulaq

Special issue on information retrieval for program comprehension

Letha Etzkorn, Tim Menzies
2008 Empirical Software Engineering  
Summary of paper: This paper reports a controlled experiment to assess the usefulness of an IR-based traceability recovery tool.  ...  The paper comments extensively on the retrieval accuracy achieved by the software engineers with and without the tool support and with different levels of experience and ability.  ... 
doi:10.1007/s10664-008-9097-1 fatcat:gjsmeb66sfdn3jef43cidt2d6i

Continuous Software Quality Control in Practice

Daniela Steidl, Florian Deissenboeck, Martin Poehlmann, Robert Heinke, Barbel Uhink-Mergenthaler
2014 2014 IEEE International Conference on Software Maintenance and Evolution  
We provide an experience report of the quality consulting company CQSE, and show how code quality can be improved in practice: we revise our former expectations on quality control from [1] and propose  ...  We show the applicability of our approach with a case study on 41 systems of Munich RE and demonstrate its impact.  ...  Based on our experience, we proposed a new quality control process for which we provided a running case study of 41 industry projects.  ... 
doi:10.1109/icsme.2014.95 dblp:conf/icsm/SteidlDPHU14 fatcat:ixi7m5y76rftteoi6kohk3ds3u

Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs

Saman Bazrafshan, Rainer Koschke
2014 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation  
We conducted a controlled experiment to extend the previous study on the use of clone information by investigating the effect of clone information on the performance of developers in common bug-fixing  ...  Duplicated source code-clones-is known to occur frequently in software systems and bears the risk of inconsistent updates of the code.  ...  ACKNOWLEDGMENTS The authors would like to thank the students who participated in the experiment. This work was supported by research grants of the Deutsche Forschungsgemeinschaft (DFG).  ... 
doi:10.1109/scam.2014.10 dblp:conf/scam/BazrafshanK14 fatcat:clsclwlmofcsvpst7c6ngtbio4

BioPartsDB: a synthetic biology workflow web-application for education and research

Giovanni Stracquadanio, Kun Yang, Jef D. Boeke, Joel S. Bader
2016 Bioinformatics  
Synthetic biology has become a widely used technology, and expanding applications in research, education and industry require progress tracking for team-based DNA synthesis projects.  ...  We developed BIOPARTSDB as an open source, extendable workflow management system for synthetic biology projects with entry points for oligos and larger DNA constructs and ending with sequence-verified clones  ...  Tasks include organizing an experimental plan, tracking protocols, retaining quality control assessments, assessing performance and storing a verified part in a repository.  ... 
doi:10.1093/bioinformatics/btw394 pmid:27412090 pmcid:PMC5181553 fatcat:ofl5z2w6nzdovhcevpvpzzb66u

MicroArray Facility: a laboratory information management system with extended support for Nylon based technologies

Paul Honoré, Samuel Granjeaud, Rebecca Tagett, Stéphane Deraco, Emmanuel Beaudoing, Jacques Rougemont, Stéphane Debono, Pascal Hingamp
2006 BMC Genomics  
With experimental designs that repeatedly span thousands of genes and hundreds of samples, relying on a dedicated database infrastructure is no longer an option.GEP technology is a fast moving target,  ...  Notably single channel radioactive probes, microarray stripping and reuse, vector control hybridizations and spike-in controls are all natively supported by the software suite.  ...  Users manage gene lists, clone lists and microarray experiments through three software modules (Gene Finder, Clone Chooser and Microarray Facility respectively).  ... 
doi:10.1186/1471-2164-7-240 pmid:16987406 pmcid:PMC1592093 fatcat:i5mulxjhubhqzph6ecr26nwfie

Continuous and Focused Developer Feedback on Software Quality (CoFoDeF)

Stefan Wagner
2015 Research Ideas and Outcomes  
Hosting institution Institute of Software Technology, University of Stuttgart  ...  A Controlled Experiment for the Empirical Evaluation of Safety Analysis Techniques for Safety-Critical Software.  ...  Their focus is not on giving continuous feedback to the developers. Summary Continuous quality control is an approach to address quality decay in software regularly during a software project.  ... 
doi:10.3897/rio.1.e7576 fatcat:2ji7meanhjgrborp5jfm7wxrvy

Code Clone Detection on Specialized PDGs with Heuristics

Yoshiki Higo, Shinji Kusumoto
2011 2011 15th European Conference on Software Maintenance and Reengineering  
The experiment in this paper shows that the proposed methods are effective for PDG-based code clone detection by applying them to 4 open source systems.  ...  Moreover, PDG-based detection is time consuming, so that application to actual software systems is not feasible.  ...  ACKNOWLEDGMENTS The present research is being conducted as a part of the Stage Project, the Development of Next Generation IT Infrastructure, supported by the Ministry of Education, Culture, Sports, Science  ... 
doi:10.1109/csmr.2011.12 dblp:conf/csmr/HigoK11 fatcat:fshc7xbp7vf7fo6kzr22f7z5ka

A Third-Party Extension Support Framework Using Patterns

Yiyang Hao, Hironori Washizaki, Yoshiaki Fukazawa
2015 2015 Asia-Pacific Software Engineering Conference (APSEC)  
We further conducted a comparative experiment to test our tool with volunteers from Waseda University and noticed a significant decrease of required effort.  ...  Software extension is a fundamental challenge in software engineering which involves extending the functionalities of a software module without modifying it.  ...  In Figure 10b we see that control group spent more time on finishing the experiment than the experiment group.  ... 
doi:10.1109/apsec.2015.36 dblp:conf/apsec/HaoWF15 fatcat:u7k23vztujcqjg6vfmy6pu4nru
« Previous Showing results 1 — 15 out of 503,576 results