31,497 Hits in 2.6 sec

Sustainability of the Merlin++ particle tracking code

Scott Rowan, Sam Tygier, Yuanfang Cai, Colin C. Venters, Robert B. Appleby, Roger J. Barlow, A. Forti, L. Betev, M. Litmaath, O. Smirnova, P. Hristov
2019 EPJ Web of Conferences  
This has resulted in usability issues for users and developers alike. The following presents recent improvements in adhering to modern software sustainability practices to address these issues.  ...  Quantifiable improvements in code complexity and maintainability are presented via appropriate test metrics and the evolution of the software architecture is analyzed.  ...  All conventions and coding practices are now also outlined in a developer guide which accompanies the source code. Establishing suitable conventions totalled approximately 360 man-hours.  ... 
doi:10.1051/epjconf/201921405028 fatcat:sd4trddykjbgfdc5xbrjay4ike

Hot clones, maintaining a link between software clones across repositories

Nikolaus E. Schwarz, Erwann Wernli, Adrian Kuhn
2010 Proceedings of the 4th International Workshop on Software Clones - IWSC '10  
As code snippets continues to evolve both on the side of the user and on the side of the author, both may wish to benefit from remote bug fixes or refinements-authors may be interested in the actual usage  ...  In today's practice, no automated scheme is in place to inform both parties of any distant changes of the code.  ...  We gratefully acknowledge the financial support of the Swiss National Science Foundation for the project "Bringing Models Closer to Code" (SNF Project No. 200020-121594, Oct. 2008 -Sept. 2010).  ... 
doi:10.1145/1808901.1808915 dblp:conf/iwsc/SchwarzWK10 fatcat:osq7okpoljhslimzxmqvckanta

Mining Software Repositories for Social Norms

Hoa Khanh Dam, Bastin Tony Roy Savarimuthu, Daniel Avery, Aditya Ghose
2015 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering  
Initial results include a study of coding convention violations in JEdit, ArgoUML and Glassfish projects.  ...  This paper aims to introduce a new line of research on extracting social norms from the rich data available in software repositories.  ...  Failure to adhere to this convention may result in the code not being accepted by the repository (e.g. based on automatic checking) or a ticket may be issued by quality assurance personnel.  ... 
doi:10.1109/icse.2015.209 dblp:conf/icse/DamSAG15 fatcat:geek3z2alfhqnp5hwuu46whmfq

Using Execution Paths to Evolve Software Patches

ThanhVu Nguyen, Westley Weimer, Claire Le Goues, Stephanie Forrest
2009 2009 International Conference on Software Testing, Verification, and Validation Workshops  
To preserve the core functionalities of the program, we evolve programs only from code in the original program.  ...  We present an evolutionary approach using Genetic Programming (GP) to automatically create software repairs.  ...  Our second implementation adheres to the conventional 1point crossover in GP by exchanging a statement from one parent with another.  ... 
doi:10.1109/icstw.2009.35 dblp:conf/icst/NguyenWGF09 fatcat:s3uljolxeffbfbvqb225js3bye

An Exploratory Study on the Evolution of C Programming in the Unix Operating System

Diomidis Spinellis, Panagiotis Louridas, Maria Kechagia
2015 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)  
Many trends point toward increasing code quality through adherence to numerous programming guidelines, while some others indicate adoption that has reached maturity.  ...  Context: Numerous factors drive long term progress in programming practices. Goal: We study the evolution of C programming in the Unix operating system.  ...  through the Operational Program "Education and Lifelong Learning" of the National Strategic Reference Framework (NSRF) -Research Funding Program: Thalis -Athens University of Economics and Business -Software  ... 
doi:10.1109/esem.2015.7321190 dblp:conf/esem/SpinellisLK15 fatcat:ljvwm6ige5fk3okvgl5dxmwmnq

Quality assurance of design support software: review and analysis of the state of the art

E.Z. Opiyo, I. Horváth, J.S.M. Vergeest
2002 Computers in industry (Print)  
Usually the conventional software development models and testing techniques are used in the development of DSS.  ...  Almost all software development concepts or mental models demand the developers to prepare specifications, then design software and finally write codes.  ...  Like in the development of other software products, the developers of DSS use systematic development models and testing techniques, and adhere to practices such as usage of good programming styles and  ... 
doi:10.1016/s0166-3615(02)00082-9 fatcat:ic3hr25xgvf6fno7nyrwkasdhu

Enforcing structural regularities in software using IntensiVE

Johan Brichau, Andy Kellens, Sergio Castro, Theo D'Hondt
2010 Science of Computer Programming  
The design and implementation of a software system is often governed by many different coding conventions, design patterns, architectural design rules, and other so-called structural regularities.  ...  The Intensional Views Environment (IntensiVE), presented in this article, is a tool suite for documenting such structural regularities in (object-oriented) software systems and verifying their consistency  ...  It means that they do not adhere to the naming convention.  ... 
doi:10.1016/j.scico.2009.11.005 fatcat:3meefp45ffccvc2s72xdq7n2se

Hot Clones: A Shotgun Marriage of Search-Driven Development and Clone Management

Niko Schwarz
2012 2012 16th European Conference on Software Maintenance and Reengineering  
As code snippets continue to evolve both on the side of the user and on the side of the author, both may wish to benefit from remote bug fixes or refinements -authors may be interested in the actual usage  ...  In today's practice, no automated scheme is in place to inform both parties of any distant changes of the code.  ...  For example, a renamed method call in two different instances may be due to adherence to coding conventions, but may also be due to a deliberate change in one of the instances.  ... 
doi:10.1109/csmr.2012.67 dblp:conf/csmr/Schwarz12 fatcat:uxctejoltjgqriemzpndsptqye

Managing the Evolution of Aspect-Oriented Software with Model-Based Pointcuts [chapter]

Andy Kellens, Kim Mens, Johan Brichau, Kris Gybels
2006 Lecture Notes in Computer Science  
Due to the fragile pointcut problem, seemingly safe modifications to the base code of an aspect-oriented program can have an unexpected impact on the semantics of the pointcuts defined in that program.  ...  be verified when the base program evolves.  ...  In particular, they wish to thank Yann-Gaël Guéhéneuc, Pascal Costanza, Kevin Sullivan, Sebastián González, Tom Tourwé, Mira Mezini and all anonymous reviewers.  ... 
doi:10.1007/11785477_28 fatcat:bl35wgvv5vapzakikqyndbxuj4

Investigating naming convention adherence in Java references

Simon Butler, Michel Wermelinger, Yijun Yu
2015 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
The adherence to more elaborate conventions, such as the use of noun and verbal phrases in names, is not checked.  ...  Naming conventions can help the readability and comprehension of code, and thus the onboarding of new developers.  ...  We investigate only Java source code written in English because it is the most widely used natural language in software development.  ... 
doi:10.1109/icsm.2015.7332450 dblp:conf/icsm/ButlerWY15 fatcat:ak75b62df5agjd6glzdvbh6gvi

A Survey on Quality Perspective and Software Quality Models

Sony Tripathi
2014 IOSR Journal of Computer Engineering  
This paper presents acomprehensive overview ofQuality, definition of quality by different person and alsothis paper present overview on Software Quality Models, McCall's Quality Model, Boehm's Quality  ...  Attributes of software that make the software adhere to standards or conventions relating toportability.  ...  adhere to application related standards or Conventions or regulations in laws and similar prescriptions.  Reliability: A set of attributes that relate to the capability of software to maintain its level  ... 
doi:10.9790/0661-16266372 fatcat:kh5edlj4ufe6jcc2fw2b4sy64m


Avanish Parashar, Aditya Dwivedi, Anand Kumar, Atif Ahmad Khan
2020 International Journal of Engineering Applied Sciences and Technology  
So, we did a sample implementation of DevSecOps & learned its utility in contrast with conventional security methods & the challenges faced while its implementation.  ...  It is a critical task to integrate security into DevOps as conventional security methods have failed to keep up with fast development operations.  ...  It is used to continuously inspect the code quality and guide the developers while code reviews. viii D.  ... 
doi:10.33564/ijeast.2020.v05i02.022 fatcat:a7hlc3w4oneatb4adlo775j6aq

Structured information on state and evolution of dockerfiles on github

Gerald Schermann, Sali Zumberi, Jürgen Cito
2018 Proceedings of the 15th International Conference on Mining Software Repositories - MSR '18  
Our dataset enables answering a multitude of interesting research questions related to different kinds of software evolution behavior in the Docker ecosystem.  ...  The environment is defined in a Dockerfile that specifies the steps to reach a certain system state as infrastructure code, with the aim of enabling reproducible builds of the container.  ...  We further like to thank the Swiss Group for Software Engineering (CHOOSE) for providing financial support to attend the conference.  ... 
doi:10.1145/3196398.3196456 dblp:conf/msr/SchermannZC18 fatcat:sjlplcbwo5cmfbonvoywqhx2xq

Towards Osgeo Best Practices For Scientific Software Citation: Integration Options For Persistent Identifiers In Osgeo Project Repositories

Peter Löwe, Markus Neteler, Jan Goebel, Marco Tullney
2017 Zenodo  
Currently the number of journal publications about research software remains low in comparison to the amount of research code published on various software repositories in the WWW.  ...  The current situation of research software development and the need to recognize it as a significant contribution to science is introduced in relation to Open Science.  ...  • Be able to trust in the quality of code created by others (individuals and groups), as best practices such as coding standards are adhered to. • Enable others to trust in and reuse one's own research  ... 
doi:10.5281/zenodo.1034878 fatcat:rpkz7optwrhizko4i66ybfsniq

Towards Mining Norms in Open Source Software Repositories [chapter]

Bastin Tony Roy Savarimuthu, Hoa Khanh Dam
2014 Lecture Notes in Computer Science  
In addition, it highlights the motivations for the study of normative behaviour in open source software development from the data available in various software repositories.  ...  It provides a brief description of existing technologies in mining software repositories (MSR) that can be leveraged.  ...  Failure to adhere to this convention may result in the code not being accepted by the repository (e.g. based on automatic checking) or a ticket may be issued by a quality assurance personnel.  ... 
doi:10.1007/978-3-642-55192-5_3 fatcat:jhzzzm247rd23lu26w7voijeo4
« Previous Showing results 1 — 15 out of 31,497 results