scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Software Engineering and Knowledge Engineering in 2018"


Journal ArticleDOI
Honghao Gao1, Huaikou Miao1, Lilan Liu1, Jinyu Kai1, Kun Zhao1 
TL;DR: A visual verification platform to quantitatively compute the reliability and cost for evaluating the performance of service-based systems in the design phase and guidance for quantitative verification and graphical visualization for effectively generating formal models and checking the quantitative properties for service- based systems is proposed.
Abstract: Service-based systems are a new software mode for distributed business processes integration. It is difficult for traditional testing methods to verify the functional and nonfunctional requirements...

56 citations


Journal ArticleDOI
TL;DR: The results show that they, the percentage of appended minority class and the number of nearest neighbors, influence the prediction performance, and show that the over-sampling by SMOTE is effective in several classifiers.
Abstract: Software defect prediction suffers from the class-imbalance. Solving the class-imbalance is more important for improving the prediction performance. SMOTE is a useful over-sampling method which sol...

31 citations


Journal ArticleDOI
TL;DR: An updated review of the state of the art based on a Forward Snowballing approach, which identified a strong indication of solutions based on Artificial Intelligence and Machine Learning methods for effort estimation in Agile Software Development (ASD).
Abstract: One of the main issues of an agile software project is how to accurately estimate development effort. In 2014, a Systematic Literature Review (SLR) regarding this subject was published. The authors...

25 citations


Journal ArticleDOI
TL;DR: In software maintenance process, it is a fairly important activity to predict the severity of bug reports, but manually identifying the severity is a tedious and time-consuming process.
Abstract: In software maintenance process, it is a fairly important activity to predict the severity of bug reports. However, manually identifying the severity of bug reports is a tedious and time-consuming ...

23 citations


Journal ArticleDOI
TL;DR: Software industry is turning toward endorsing application (app, in short) development due to the ubiquitous use and interest in this computing pattern.
Abstract: Software industry is turning toward endorsing application (app, in short) development due to the ubiquitous use and interest in this computing pattern. Increasing trend and popularity of mobile app...

22 citations


Journal ArticleDOI
TL;DR: A knowledge model about relations, called Rela-model, is presented, which has the components such as concepts, relations between concepts, and rules, and has a simple specification language which can effectively represent the knowledge, thus it can be used in many real situations.
Abstract: Knowledge about relations plays a crucial role in human’s knowledge. Different methods for representing this type of knowledge have been proposed. However, due to the lack of theoretical foundation...

21 citations


Journal ArticleDOI
TL;DR: An adaptive access control model is proposed keeping in compliance with state–of-the-art scenario towards ensuring quality of context and trust relationship between owners and users and Comparative analysis shows how proposedAccess control model advances the state of art.
Abstract: Traditional discretionary access control (DAC) or mandatory access control (MAC) is not quite effective for remote environment. General role-based access control (RBAC) also has its limitations to ...

20 citations


Journal ArticleDOI
TL;DR: The elaborated body of knowledge, positively evaluated by IT professionals, would seem to be a valuable asset during the risk analysis performed before the kick-off of a project as well as in understanding the notion of usability.
Abstract: On the surface, one might think that revealing the factors that impact on software product usability and the success of an entire project would be relatively simple; however, reported evidence from...

16 citations


Journal ArticleDOI
TL;DR: A role modeling method is proposed, in which agent behaviors are represented as roles, to design how agents perform behavior adaptation at runtime by switching between roles.
Abstract: Self-organization has been proposed to be implemented in complex systems which require the automation capabilities to govern itself and to adapt upon changes Self-organizing systems can be modeled as multi-agent systems (MAS) since they share common characteristics in that they consist of multiple autonomous systems However, most existing MAS engineering methodologies do not fully support self-organizing systems design since they require predefined goals and agent behaviors, which is not the case in self-organizing systems Another feature that is currently not supported for designing self-organizing MAS is the separation between the design of agent behaviors and behavior adaptation, ie how agents adapt their behaviors to respond upon changes To tackle these issues, this paper proposes a role modeling method, in which agent behaviors are represented as roles, to design how agents perform behavior adaptation at runtime by switching between roles The applicability of the proposed role modeling method

14 citations


Journal ArticleDOI
TL;DR: A Tertiary Literature Review (TLR) is presented that aims to identify and analyze Systematic Literature Reviews (SLR) on the influence factors of software productivity reported in the scientific literature.
Abstract: Software organizations need to increase their productivity to stay competitive. Although there is a lot of research on productivity in software development, software organizations still do not know...

13 citations


Journal ArticleDOI
Weihua Huang, Zhong Ma, Xinfa Dai, Mingdi Xu, Yi Gao 
TL;DR: This research presents a novel and scalable approach called "Smart Cassandra DSP Integration (SCSI)” that automates and automates the very labor-intensive and therefore time-heavy and expensive process of load balancing in the cloud.
Abstract: Load balancing, which redistributes dynamic workloads across computing nodes within cloud to improve resource utilization, is one of the main challenges in cloud computing system. Most existing rul...

Journal ArticleDOI
Li Wang1, Min An1, Min An2, Yong Qin1, Limin Jia1 
TL;DR: The results show that by using the proposed methodology the qualitative and quantitative risk data and information with maintenance costs associated with railway assets can be evaluated efficiently and effectively, which provide very useful information to railway engineers, managers, and decision makers.
Abstract: This paper presents a risk-based maintenance decision making modeling methodology for railway asset maintenance optimization, which takes risk and maintenance cost objectives into consideration in the decision making process. A bottom-up risk analysis approach has been developed by using fuzzy reasoning approach (FRA) and fuzzy-analytical hierarchy process (Fuzzy-AHP) to produce a risk model. A total cost model has also been developed to estimate repair/renewal, maintenance and performance review costs. A risk-based maintenance decision making support model has then been developed by integrating the risk model with cost model in which multi-criteria decision making (MCDM) techniques are employed to process the proposed risk-based maintenance decision making support model. An illustrative example on a section of a track system maintenance decision selection is used to demonstrate the application of the proposed methodology. The results show that by using the proposed methodology the qualitative and quantitative risk data and information with maintenance costs associated with railway assets can be evaluated efficiently and effectively, which provide very useful information to railway engineers, managers, and decision makers.

Journal ArticleDOI
TL;DR: This paper surveys existing approaches for OWL-to-OOP mapping trying to identify reasons for this shy adoption of ontologies among conventional software developers and presents a classification of the surveyed approaches and tools based on their technical characteristics and their resulting artifacts.
Abstract: Despite the many integration tools proposed for mapping between OWL ontologies and the object-oriented paradigm, developers are still reluctant to incorporate ontologies into their code repositorie...

Journal ArticleDOI
TL;DR: Bogie is one of the most major mechanical part of railway train and its security and reliability are of paramount importance.
Abstract: Bogie is one of the most major mechanical part of railway train. Its security and reliability are of paramount importance. Since research in this field is still on the early stage, which focus on e...

Journal ArticleDOI
TL;DR: Experimental results show that the proposed WMI method achieves higher prediction accuracy of both minority class and majority class and at last, four unbalanced datasets from NASA software defect datasets are used to validate the proposed approach.
Abstract: The class imbalance problem has negative effects on the performance of feature selection in imbalanced data Traditional feature selection algorithms always study on the balanced class distribution

Journal ArticleDOI
TL;DR: Behind these two alternative matrices there is just one unified algebraic theory of software composition — the Linear Software Models — here concerning the application of the matrices’ eigenvectors to software modularity.
Abstract: We have recently shown that one can obtain the numbers and sizes of modules of a software system from the eigenvectors of its modularity matrix symmetrized and weighted by an affinity matrix. Howev...

Journal ArticleDOI
Yuteng Lu1, Meng Sun1
TL;DR: This paper carries out a formal modeling and verification approach based on timed automata for IEEE 802.11i protocol, using the UPPAAL model checker, to check correctness of the changes in the protocol and provide better security.
Abstract: IEEE 802.11i is the IEEE standard that provides enhanced MAC security and has been widely used in wireless networks and Internet of Things. It improves IEEE 802.11 (1999) by providing a Robust Secu...

Journal ArticleDOI
TL;DR: This study extends the application of ARSs from the input space of programs to their output space, and shows that adaptive random testing (ART) can outperform Random testing (RT) in both failure detection effectiveness and failure detection efficiency.
Abstract: As part of a software testing process, output verification poses a challenge when the output is not numeric or textual, such as graphical. The industry practice of using human oracles (testers) to observe and verify the correctness of the actual results is both expensive and error-prone. In particular, this practice is usually unsustainable when developing web applications — the most popular software of our era. This is because web applications change frequently due to the fast-evolving requirements amid popular demand. To improve the cost effectiveness of browser output verification, in this study we design failure-based testing techniques and evaluate the effectiveness and efficiency thereof in the context of web testing. With a novel application of the concept of adaptive random sequence (ARS), our approach leverages peculiar characteristics of failure patterns found in browser layout rendering. An empirical study shows that the use of failure patterns and inclination to guide the testing flow leads to...

Journal ArticleDOI
TL;DR: It is shown that inadequate model-based approaches for behavior preservation, synchronized model enhancement and empirical evaluation of the proposed refactoring techniques are major obstacles in fully automated modelRefactoring process.
Abstract: Model refactoring enhances the platform-independent design models of software aiming at smoother impact of requirement changes, thereby improving the design quality and assisting in their evolution...

Journal ArticleDOI
TL;DR: The results showed that in most cases, smelly files were more prone to structural changes and files with more smell instances tend to undergo higher structural changes, and quite a few smell types were related to structural change-proneness.
Abstract: Code smells are used to describe the bad structures in the source code, which could hinder software maintainability, understandability and changeability. Nowadays, scholars mainly focus on the impa...

Journal ArticleDOI
TL;DR: This work investigates the problem of model selection in software systems by making use of information theoretic (criterion-based) approaches to model selection by which several issues like overfitting, etc., that are prevalent in previous works can be handled elegantly by strengthening the model selection procedure and studying a large collection of fault data.
Abstract: Many research studies in the past have shown that the distribution of bugs in software systems follows the Pareto principle. Some studies have also proposed the Pareto distribution (PD) to model bugs in software systems. However, several other probability distributions such as the Weibull, Bounded Generalized Pareto, Double Pareto (DP), Log Normal and Yule–Simon distributions have also been proposed and each of them has been evaluated for their fitness to model bugs in different studies. We investigate this problem further by making use of information theoretic (criterion-based) approaches to model selection by which several issues like overfitting, etc., that are prevalent in previous works, can be handled elegantly. By strengthening the model selection procedure and studying a large collection of fault data, the results are made more accurate and stable. We conduct experiments on fault data from 74 releases of various open source and proprietary software systems and observe that the DP distribution outp...

Journal ArticleDOI
TL;DR: This work uses Answer set programming to formally express race conditions and thus represent potential data races often occurred in multithreaded applications with shared memory models and conjecture that ASP has several other applications in constraint-based software testing research and can be utilized to express and solve similar test case generation problems where constraints play a key role in determining the complexity of searches.
Abstract: We introduce a technique to formally represent and specify race conditions in multithreaded applications Answer set programming (ASP) is a logic-based knowledge representation paradigm to formally

Journal ArticleDOI
TL;DR: A gated hierarchical LSTM (GH-LSTMs) model is proposed which combines regional L STM and sentence-level LSTm via a gated operation for the task of target-based sentiment analysis and yields better performance than Support Vector Machine (SVM) and several typical neural network models.
Abstract: In the field of target-based sentiment analysis, the deep neural model combining attention mechanism is a remarkable success. In current research, it is commonly seen that attention mechanism is co...

Journal ArticleDOI
TL;DR: A solution is proposed that identifies the potentially reusable objects in a set of automated test scripts and then provides developers with suggestions about these objects and compared to approaches that are based solely on searching for repetitive source code fragments, the proposed system identifies potentiall objects.
Abstract: In the automated testing based on actions in user interface of the tested application, one of the key challenges is maintenance of these tests The maintenance overhead can be decreased by suitably structuring the test scripts, typically by employing reusable objects To aid in the development, maintenance and refactoring of these test scripts, potentially reusable objects can be identified by a semi-automated process In this paper, we propose a solution that identifies the potentially reusable objects in a set of automated test scripts and then provides developers with suggestions about these objects During this process, we analyze the semantics of specific test steps using a system of abstract signatures The solution can be used to identify the potentially reusable objects in both recorded automated test sets and tests programmed in an unstructured style Moreover, compared to approaches that are based solely on searching for repetitive source code fragments, the proposed system identifies potentiall

Journal ArticleDOI
TL;DR: It has been recognized by many researchers that the notion of test architecture should be utilized for software testing to cope with the task of testing complicated software, as it can support test architecture design and test case generation based on test architecture as well as efficient fault detection and error locating.
Abstract: It has been recognized by many researchers that the notion of test architecture should be utilized for software testing to cope with the task of testing complicated software, as it can support test architecture design and test case generation based on test architecture as well as efficient fault detection and error locating. However, in the current software testing theory and practice, the notion of test architecture and how it can be utilized for software testing are not well understood. To redress this situation, this paper provides foundational concepts and principles of architecture-based software testing to help utilize test architecture for software testing. Case study experiments are conducted to show how the concepts and principles of architecture-based software testing work and the effects that can be obtained by using architecture-based software testing.

Journal ArticleDOI
TL;DR: A novel quality model is presented, which provides a quantitative assessment of the attributes evaluated at each stage of development of scientific applications.
Abstract: This paper presents a novel quality model, which provides a quantitative assessment of the attributes evaluated at each stage of development of scientific applications. This model is defined by sel...

Journal ArticleDOI
TL;DR: A multi-level assessment system on how the cleanliness status of streets is collected using mobile stations is proposed, connected via city network, analyzed in the cloud and presented to city administrators online or on mobile.
Abstract: Advancements in mobile, cloud computing and other techniques have made the world even smaller and connected like never before. It has become a challenge and an opportunity for cities to leverage th...

Journal ArticleDOI
TL;DR: A test case prioritization technique based on Unified Modeling Language (UML) model, built before coding, to detect errors as earlier as possible and reduce the cost of modification and results show that the error can be detected effectively and stability can be increased significantly as compared to the current code-based techniques.
Abstract: Test case prioritization is one of the most useful activities in testing. Most existing test case prioritization techniques are based on code coverage, which requires access to source code. However...

Journal ArticleDOI
TL;DR: This work presents a semantic-based approach to enrich user’ queries expressed in SPARQL Language by his preferences in order to adapt the returned results and make them more precise and more relevant.
Abstract: Systems of data integration using ontologies aim to implement a collaborative environment between sources for sharing data and services to respond a user request for information. Their users’ requests are an exact expression of their needs. However, the multiplicity of data sources, their scalability and the increasing difficulty to control their descriptions and their contents are the reasons behind the implacability of this assumption today. The users now may not know the data sources they questioned, nor their description or content. Consequently, their queries reflect no more a need that must be satisfied but an intention that must be refined according to data sources available at the time of interrogation. In this work, we present a semantic-based approach to enrich user’ queries expressed in SPARQL Language by his preferences in order to adapt the returned results and make them more precise and more relevant. The proposed approach is applied on a movies management system based on the standard MovieL...

Journal ArticleDOI
TL;DR: This paper presents a role-playing game especially focused on the class diagram, which is called Classutopia, which provides modeling challenges, comprehension and correction of diagrams with different complexity levels for learning conceptual modeling design.
Abstract: One of the more complex topics to teach to Software Engineering students is the conceptual modeling design, which has several concepts that students must learn in order to specify the structural, b...