A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Sustainability of the Merlin++ particle tracking code
2019
EPJ Web of Conferences
This has resulted in usability issues for users and developers alike. The following presents recent improvements in adhering to modern software sustainability practices to address these issues. ...
Quantifiable improvements in code complexity and maintainability are presented via appropriate test metrics and the evolution of the software architecture is analyzed. ...
All conventions and coding practices are now also outlined in a developer guide which accompanies the source code. Establishing suitable conventions totalled approximately 360 man-hours. ...
doi:10.1051/epjconf/201921405028
fatcat:sd4trddykjbgfdc5xbrjay4ike
Hot clones, maintaining a link between software clones across repositories
2010
Proceedings of the 4th International Workshop on Software Clones - IWSC '10
As code snippets continues to evolve both on the side of the user and on the side of the author, both may wish to benefit from remote bug fixes or refinements-authors may be interested in the actual usage ...
In today's practice, no automated scheme is in place to inform both parties of any distant changes of the code. ...
We gratefully acknowledge the financial support of the Swiss National Science Foundation for the project "Bringing Models Closer to Code" (SNF Project No. 200020-121594, Oct. 2008 -Sept. 2010). ...
doi:10.1145/1808901.1808915
dblp:conf/iwsc/SchwarzWK10
fatcat:osq7okpoljhslimzxmqvckanta
Mining Software Repositories for Social Norms
2015
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering
Initial results include a study of coding convention violations in JEdit, ArgoUML and Glassfish projects. ...
This paper aims to introduce a new line of research on extracting social norms from the rich data available in software repositories. ...
Failure to adhere to this convention may result in the code not being accepted by the repository (e.g. based on automatic checking) or a ticket may be issued by quality assurance personnel. ...
doi:10.1109/icse.2015.209
dblp:conf/icse/DamSAG15
fatcat:geek3z2alfhqnp5hwuu46whmfq
Using Execution Paths to Evolve Software Patches
2009
2009 International Conference on Software Testing, Verification, and Validation Workshops
To preserve the core functionalities of the program, we evolve programs only from code in the original program. ...
We present an evolutionary approach using Genetic Programming (GP) to automatically create software repairs. ...
Our second implementation adheres to the conventional 1point crossover in GP by exchanging a statement from one parent with another. ...
doi:10.1109/icstw.2009.35
dblp:conf/icst/NguyenWGF09
fatcat:s3uljolxeffbfbvqb225js3bye
An Exploratory Study on the Evolution of C Programming in the Unix Operating System
2015
2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
Many trends point toward increasing code quality through adherence to numerous programming guidelines, while some others indicate adoption that has reached maturity. ...
Context: Numerous factors drive long term progress in programming practices. Goal: We study the evolution of C programming in the Unix operating system. ...
through the Operational Program "Education and Lifelong Learning" of the National Strategic Reference Framework (NSRF) -Research Funding Program: Thalis -Athens University of Economics and Business -Software ...
doi:10.1109/esem.2015.7321190
dblp:conf/esem/SpinellisLK15
fatcat:ljvwm6ige5fk3okvgl5dxmwmnq
Quality assurance of design support software: review and analysis of the state of the art
2002
Computers in industry (Print)
Usually the conventional software development models and testing techniques are used in the development of DSS. ...
Almost all software development concepts or mental models demand the developers to prepare specifications, then design software and finally write codes. ...
Like in the development of other software products, the developers of DSS use systematic development models and testing techniques, and adhere to practices such as usage of good programming styles and ...
doi:10.1016/s0166-3615(02)00082-9
fatcat:ic3hr25xgvf6fno7nyrwkasdhu
Enforcing structural regularities in software using IntensiVE
2010
Science of Computer Programming
The design and implementation of a software system is often governed by many different coding conventions, design patterns, architectural design rules, and other so-called structural regularities. ...
The Intensional Views Environment (IntensiVE), presented in this article, is a tool suite for documenting such structural regularities in (object-oriented) software systems and verifying their consistency ...
It means that they do not adhere to the naming convention. ...
doi:10.1016/j.scico.2009.11.005
fatcat:3meefp45ffccvc2s72xdq7n2se
Hot Clones: A Shotgun Marriage of Search-Driven Development and Clone Management
2012
2012 16th European Conference on Software Maintenance and Reengineering
As code snippets continue to evolve both on the side of the user and on the side of the author, both may wish to benefit from remote bug fixes or refinements -authors may be interested in the actual usage ...
In today's practice, no automated scheme is in place to inform both parties of any distant changes of the code. ...
For example, a renamed method call in two different instances may be due to adherence to coding conventions, but may also be due to a deliberate change in one of the instances. ...
doi:10.1109/csmr.2012.67
dblp:conf/csmr/Schwarz12
fatcat:uxctejoltjgqriemzpndsptqye
Managing the Evolution of Aspect-Oriented Software with Model-Based Pointcuts
[chapter]
2006
Lecture Notes in Computer Science
Due to the fragile pointcut problem, seemingly safe modifications to the base code of an aspect-oriented program can have an unexpected impact on the semantics of the pointcuts defined in that program. ...
be verified when the base program evolves. ...
In particular, they wish to thank Yann-Gaël Guéhéneuc, Pascal Costanza, Kevin Sullivan, Sebastián González, Tom Tourwé, Mira Mezini and all anonymous reviewers. ...
doi:10.1007/11785477_28
fatcat:bl35wgvv5vapzakikqyndbxuj4
Investigating naming convention adherence in Java references
2015
2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)
The adherence to more elaborate conventions, such as the use of noun and verbal phrases in names, is not checked. ...
Naming conventions can help the readability and comprehension of code, and thus the onboarding of new developers. ...
We investigate only Java source code written in English because it is the most widely used natural language in software development. ...
doi:10.1109/icsm.2015.7332450
dblp:conf/icsm/ButlerWY15
fatcat:ak75b62df5agjd6glzdvbh6gvi
A Survey on Quality Perspective and Software Quality Models
2014
IOSR Journal of Computer Engineering
This paper presents acomprehensive overview ofQuality, definition of quality by different person and alsothis paper present overview on Software Quality Models, McCall's Quality Model, Boehm's Quality ...
Attributes of software that make the software adhere to standards or conventions relating toportability. ...
adhere to application related standards or Conventions or regulations in laws and similar prescriptions. Reliability: A set of attributes that relate to the capability of software to maintain its level ...
doi:10.9790/0661-16266372
fatcat:kh5edlj4ufe6jcc2fw2b4sy64m
DevSecOps: A CASE STUDY ON A SAMPLE IMPLEMENTATION OF DevSecOps
2020
International Journal of Engineering Applied Sciences and Technology
So, we did a sample implementation of DevSecOps & learned its utility in contrast with conventional security methods & the challenges faced while its implementation. ...
It is a critical task to integrate security into DevOps as conventional security methods have failed to keep up with fast development operations. ...
It is used to continuously inspect the code quality and guide the developers while code reviews. viii
D. ...
doi:10.33564/ijeast.2020.v05i02.022
fatcat:a7hlc3w4oneatb4adlo775j6aq
Structured information on state and evolution of dockerfiles on github
2018
Proceedings of the 15th International Conference on Mining Software Repositories - MSR '18
Our dataset enables answering a multitude of interesting research questions related to different kinds of software evolution behavior in the Docker ecosystem. ...
The environment is defined in a Dockerfile that specifies the steps to reach a certain system state as infrastructure code, with the aim of enabling reproducible builds of the container. ...
We further like to thank the Swiss Group for Software Engineering (CHOOSE) for providing financial support to attend the conference. ...
doi:10.1145/3196398.3196456
dblp:conf/msr/SchermannZC18
fatcat:sjlplcbwo5cmfbonvoywqhx2xq
Towards Osgeo Best Practices For Scientific Software Citation: Integration Options For Persistent Identifiers In Osgeo Project Repositories
2017
Zenodo
Currently the number of journal publications about research software remains low in comparison to the amount of research code published on various software repositories in the WWW. ...
The current situation of research software development and the need to recognize it as a significant contribution to science is introduced in relation to Open Science. ...
• Be able to trust in the quality of code created by others (individuals and groups), as best practices such as coding standards are adhered to. • Enable others to trust in and reuse one's own research ...
doi:10.5281/zenodo.1034878
fatcat:rpkz7optwrhizko4i66ybfsniq
Towards Mining Norms in Open Source Software Repositories
[chapter]
2014
Lecture Notes in Computer Science
In addition, it highlights the motivations for the study of normative behaviour in open source software development from the data available in various software repositories. ...
It provides a brief description of existing technologies in mining software repositories (MSR) that can be leveraged. ...
Failure to adhere to this convention may result in the code not being accepted by the repository (e.g. based on automatic checking) or a ticket may be issued by a quality assurance personnel. ...
doi:10.1007/978-3-642-55192-5_3
fatcat:jhzzzm247rd23lu26w7voijeo4
« Previous
Showing results 1 — 15 out of 31,497 results