Test‐driven development, engagement in activity, and maintainability: An empirical study
Wiley | IET Software
by Wei Ren, Stephen Barrett
9M ago
By using a data-driven method, regression analysis, our empirical results show that TDD behaviours improve the engagement level, and engaging in development activities likely impact maintainability in a positive way. Specifically, the authors find that the positive impact of focussing on testing is more pronounced relative to coding activities. Our study adds to current software engineering literature that not only personal expertise but the engagement level in the development process are associated with software quality and calls for the emphasis on developer's engagement. Abstract The soft ..read more
Visit website
Revisit security in the era of DevOps: An evidence‐based inquiry into DevSecOps industry
Wiley | IET Software
by Xin Zhou, Runfeng Mao, He Zhang, Qiming Dai, Huang Huang, Haifeng Shen, Jingyue Li, Guoping Rong
9M ago
This work is aimed at evoking greater enthusiasm for DevSecOps in academia and industry. As the concept emerging from the software industry, the research on DevSecOps can offer the opportunity for reciprocal communication and collaboration between academics and industry. Abstract By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final stage of development. DevSecOps promotes security as a shared ..read more
Visit website
Guest Editorial: Machine learning applied to quality and security in software systems
Wiley | IET Software
by Honghao Gao, Walayat Hussain, Ramón J. Durán Barroso, Junaid Arshad, Yuyu Yin
9M ago
IET Software, EarlyView ..read more
Visit website
Structuring meaningful bug‐fixing patches to fix software defect
Wiley | IET Software
by Hui Li, Yong Liu, Xuexin Qi, Xi Yu, Shikai Guo
10M ago
The authors present an automatic software defect repair model based on deep neural network. Experiment results show that neural networks can learn patterns to fix software bugs well. Through the token replacement in the source code, the influence of different code styles can be well shielded, and the real-time repair of software source code defects can be generated in real-time with the pretraining model in actual production. Abstract Currently, software projects require a significant amount of time, effort and other resources to be invested in software testing to reduce the number of code d ..read more
Visit website
A memetic algorithm for high‐strength covering array generation
Wiley | IET Software
by Xu Guo, Xiaoyu Song, Jian‐tao Zhou, Feiyu Wang, Kecheng Tang, Zhuowei Wang
10M ago
This paper presents a hybrid heuristic memetic algorithm named QSSMA for the high-strength CAG problem. In QSSMA, quantum particle swarm optimisation (QPSO) and simulated annealing (SA) algorithms are used as global and local search respectively to equilibrate the exploration and exploitation capabilities to improve the efficiency of constructing high-covering strength test suites. Abstract Covering array generation (CAG) is the key research problem in combinatorial testing and is an NP-complete problem. With the increasing complexity of software under test and the need for higher interactio ..read more
Visit website
A case study of environmental considerations and opportunities in cyber physical systems
Wiley | IET Software
by Mario Cortes‐Cornax, Paula Lago, Claudia Roncancio
10M ago
In this paper, we discuss environmental impact considerations in the early stages of the implementation and opportunities to improve design choices of CPSs with a people-planet-system perspective. We discuss aspects related to system configuration, data management and the overall goal and functionalities supported by the CPS. Through a specific smart home case we illustrate the potential of considering life-cycle assessment of both the devices and data management. Abstract Cyber Physical Systems (CPS) are becoming more ubiquitous, complex and powerful as well as more and more present in our ..read more
Visit website
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Wiley | IET Software
by Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao
10M ago
The malware identification scheme includes two phases. The learning phase trains a symmetric cross entropy (SCE)-optimised temporal convolutional network (STCN) model on the word embedding from the pre-trained word matrix. The identification phase predicts the malware category on the trained STCN. Abstract Recent developments in the field of Internet of things (IoT) have aroused growing attention to the security of smart devices. Specifically, there is an increasing number of malicious software (Malware) on IoT systems. Nowadays, researchers have made many efforts concerning supervised machi ..read more
Visit website
Proposed ethical framework for software requirements engineering
Wiley | IET Software
by Seblewongel E. Biable, Nuno M. Garcia, Dida Midekso
10M ago
The authors wrote the proposed framework for requirements engineering ethics. It deals with background information, proposed framework, motivation to do the research, problem statements, contributions of the work, some literature reviews, including related works, and validation results, discussions, and concluding remarks. Abstract Requirements engineering is a fundamental process in software development phases. At the same time, it is a difficult phase and exposed many ethical violations. The main purpose is proposing an ethical framework for software requirements engineering that addresses ..read more
Visit website
CTHP: Selection for adoption of open‐source bioinformatics software based on a customised ISO 25010 quality model, three‐way decision and Delphi hierarchy process
Wiley | IET Software
by Yuqi Li, Yixin Bian, Ziheng Zhang, Song Zhao, Yiqi Liu
10M ago
A customised decision method for evaluation, comparison, and adoption of the Open Source Software (OSS) frameworks is proposed in this study. The important attributes of a framework such as reliability, maintainability, and documentation concerning project requirements and priorities can be obtained by customising the ISO 9126 quality model in terms of the required information during the OSS adoption process in the biomedical domain. After obtaining the necessary information for the following steps, three-way decision and DHP are integrated to get evaluation information and then make a decisi ..read more
Visit website
Revisiting ‘revisiting supervised methods for effort‐aware cross‐project defect prediction’
Wiley | IET Software
by Fuyang Li, Peixin Yang, Jacky Wai Keung, Wenhua Hu, Haoyu Luo, Xiao Yu
10M ago
Effort-aware cross-project defect prediction (EACPDP), which uses cross-project software modules to build a model to rank within-project software modules based on the defect density, has been suggested to allocate limited testing resource efficiently. To explore the effective defect density calculation strategies and methods on EACPDP, the authors compare four data filtering methods and five transfer learning methods with EASC using four commonly used defect density calculation strategies. Abstract Effort-aware cross-project defect prediction (EACPDP), which uses cross-project software modul ..read more
Visit website

Follow Wiley | IET Software on FeedSpot

Continue with Google
Continue with Apple
OR