scispace - formally typeset
Search or ask a question
Author

Suntae Kim

Bio: Suntae Kim is an academic researcher from Chonbuk National University. The author has contributed to research in topics: Computer science & Software architecture. The author has an hindex of 11, co-authored 72 publications receiving 601 citations. Previous affiliations of Suntae Kim include Kangwon National University & Sogang University.


Papers
More filters
Proceedings ArticleDOI
25 May 2019
TL;DR: This work proposes a novel automated approach to debugging method names based on the analysis of consistency between method names and method code, which leverages deep feature representation techniques adapted to the nature of each artifact.
Abstract: To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging method names remains an important topic in the literature, where various approaches analyze commonalities among method names in a large dataset to detect inconsistent method names and suggest better ones. We note that the state-of-the-art does not analyze the implemented code itself to assess consistency. We thus propose a novel automated approach to debugging method names based on the analysis of consistency between method names and method code. The approach leverages deep feature representation techniques adapted to the nature of each artifact. Experimental results on over 2.1 million Java methods show that we can achieve up to 15 percentage points improvement over the state-of-the-art, establishing a record performance of 67.9% F1- measure in identifying inconsistent method names. We further demonstrate that our approach yields up to 25% accuracy in suggesting full names, while the state-of-the-art lags far behind at 1.1% accuracy. Finally, we report on our success in fixing 66 inconsistent method names in a live study on projects in the wild.

96 citations

Journal ArticleDOI
TL;DR: In this approach, architectural tactics are represented as feature models, and their semantics is defined using the Role-Based Metamodeling Language (RBML) which is a UML-based pattern specification notation.

90 citations

Journal ArticleDOI
02 Jul 2015-Symmetry
TL;DR: A new security design was developed with the MODBUS protocol, which was considered to offer phenomenal performance for future development and enhancement of real IT infrastructure and is considered to be a complete development.
Abstract: Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

79 citations

Proceedings ArticleDOI
03 Dec 2008
TL;DR: A hierarchical quality assessment model is presented for early assessment of SOA system quality so that design problems can be detected and resolved before they work into the implemented system where they are more difficult to resolve.
Abstract: Service-Oriented Architecture (SOA) is emerging as an effective solution to deal with rapid changes in the business environment. To handle fast-paced changes, organizations need to be able to assess the quality of its products prior to implementation. However, literature and industry has yet to explore the techniques for evaluating design quality of SOA artifacts. To address this need, this paper presents a hierarchical quality assessment model for early assessment of SOA system quality. By defining desirable quality attributes and tracing necessary metrics required to measure them, the approach establishes an assessment model for identification of metrics at different abstraction levels. Using the model, design problems can be detected and resolved before they work into the implemented system where they are more difficult to resolve. The model is validated against an empirical study on an existing SOA system to evaluate the quality impact from explicit and implicit changes to its requirements.

71 citations

Journal ArticleDOI
TL;DR: This work describes the experience of applying the COMET/UML method to developing the service robot for the elderly, T-Rot, which is under development at CIR, and focuses on an autonomous navigation system for the service robots.
Abstract: Our aim is to develop the service robot based on a systematic software engineering method, particularly for real-time, embedded and distributed systems with UML. To do so, we applied the COMET method, which is a UML-based method for the development of concurrent applications, specifically distributed and real-time applications. We describe our experience of applying the COMET/UML method to developing the service robot for the elderly, T-Rot, which is under development at CIR. Here, our emphasis was on an autonomous navigation system for the service robot, which is one of the most challenging issues and is essential in developing service robots, especially mobile service robots to help elderly people. It includes hardware integration for various sensors and actuators as well as software development and integration of modules like a path planner and a localizer.

48 citations


Cited by
More filters
Journal Article
TL;DR: This conversion is the first generic transformation from an arbitrary one-way asymmetricryption scheme to a chosen-ciphertext secure asymmetric encryption scheme in the random oracle model.
Abstract: This paper shows a generic and simple conversion from weak asymmetric and symmetric encryption schemes into an asymmetric encryption scheme which is secure in a very strong sense- indistinguishability against adaptive chosen-ciphertext attacks in the random oracle model. In particular, this conversion can be applied efficiently to an asymmetric encryption scheme that provides a large enough coin space and, for every message, many enough variants of the encryption, like the ElGamal encryption scheme.

457 citations

Journal ArticleDOI
TL;DR: The main aspects of CPS and the corresponding applications, technologies, and standards are surveyed and the existing security measures are presented and analyzed while identifying their main limitations.

204 citations

Journal ArticleDOI
TL;DR: This study finds a considerable degree of co-authorship clustering and a positive impact of the extent of co -authorship on the diffusion of works on enterprise architecture and proposes an agenda for future research based on the findings from the above analyses and their comparison to empirical insights from the literature.
Abstract: Management of the enterprise architecture has become increasingly recognized as a crucial part of both business and IT management. Still, a common understanding and methodological consistency seems far from being developed. Acknowledging the significant role of research in moving the development process along, this article employs different bibliometric methods, complemented by an extensive qualitative interpretation of the research field, to provide a unique overview of the enterprise architecture literature. After answering our research questions about the collaboration via co-authorships, the intellectual structure of the research field and its most influential works, and the principal themes of research, we propose an agenda for future research based on the findings from the above analyses and their comparison to empirical insights from the literature. In particular, our study finds a considerable degree of co-authorship clustering and a positive impact of the extent of co-authorship on the diffusion of works on enterprise architecture. In addition, this article identifies three major research streams and shows that research to date has revolved around specific themes, while some of high practical relevance receive minor attention. Hence, the contribution of our study is manifold and offers support for researchers and practitioners alike.

194 citations

Journal ArticleDOI
01 May 2011
TL;DR: An ontology-based unified robot knowledge framework that integrates low-level data with high-level knowledge for robot intelligence and the experimental results that demonstrate the advantages of using the proposed knowledge framework are presented.
Abstract: A significant obstacle for service robots is the execution of complex tasks in real environments. For example, it is not easy for service robots to find objects that are partially observable and are located at a place which is not identical but near the place where the robots saw them previously. To overcome the challenge effectively, robot knowledge represented as a semantic network can be extremely useful. This paper presents an ontology-based unified robot knowledge framework that integrates low-level data with high-level knowledge for robot intelligence. This framework consists of two sections: knowledge description and knowledge association. Knowledge description includes comprehensively integrated robot knowledge derived from low-level knowledge regarding perceptual features, part objects, metric maps, and primitive behaviors, as well as high-level knowledge about perceptual concepts, objects, semantic maps, tasks, and contexts. Knowledge association uses logical inference with both unidirectional and bidirectional rules. This characteristic enables reasoning to be performed even when only a partial information is available. The experimental results that demonstrate the advantages of using the proposed knowledge framework are also presented.

167 citations

Journal ArticleDOI
TL;DR: This review aims to obtain an overview of the existing approaches in analyzing and improving software evolvability at architectural level, and investigate impacts on research and practice.
Abstract: Context: Software evolvability describes a software system's ability to easily accommodate future changes. It is a fundamental characteristic for making strategic decisions, and increasing economic value of software. For long-lived systems, there is a need to address evolvability explicitly during the entire software lifecycle in order to prolong the productive lifetime of software systems. For this reason, many research studies have been proposed in this area both by researchers and industry practitioners. These studies comprise a spectrum of particular techniques and practices, covering various activities in software lifecycle. However, no systematic review has been conducted previously to provide an extensive overview of software architecture evolvability research. Objective: In this work, we present such a systematic review of architecting for software evolvability. The objective of this review is to obtain an overview of the existing approaches in analyzing and improving software evolvability at architectural level, and investigate impacts on research and practice. Method: The identification of the primary studies in this review was based on a pre-defined search strategy and a multi-step selection process. Results: Based on research topics in these studies, we have identified five main categories of themes: (i) techniques supporting quality consideration during software architecture design, (ii) architectural quality evaluation, (iii) economic valuation, (iv) architectural knowledge management, and (v) modeling techniques. A comprehensive overview of these categories and related studies is presented. Conclusion: The findings of this review also reveal suggestions for further research and practice, such as (i) it is necessary to establish a theoretical foundation for software evolution research due to the fact that the expertise in this area is still built on the basis of case studies instead of generalized knowledge; (ii) it is necessary to combine appropriate techniques to address the multifaceted perspectives of software evolvability due to the fact that each technique has its specific focus and context for which it is appropriate in the entire software lifecycle.

155 citations