SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Extended search

Boolean operators must be entered wtih CAPITAL LETTERS

Träfflista för sökning "AMNE:(NATURAL SCIENCES Computer and Information Sciences) ;pers:(Runeson Per)"

Search: AMNE:(NATURAL SCIENCES Computer and Information Sciences) > Runeson Per

  • Result 1-10 of 219
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Borg, Markus, et al. (author)
  • Software Engineers' Information Seeking Behavior in Change Impact Analysis : An Interview Study
  • 2017
  • In: IEEE International Conference on Program Comprehension. - : IEEE Computer Society. - 9781538605356 ; , s. 12-22, s. 12-22
  • Conference paper (peer-reviewed)abstract
    • Software engineers working in large projects must navigate complex information landscapes. Change Impact Analysis (CIA) is a task that relies on engineers' successful information seeking in databases storing, e.g., source code, requirements, design descriptions, and test case specifications. Several previous approaches to support information seeking are task-specific, thus understanding engineers' seeking behavior in specific tasks is fundamental. We present an industrial case study on how engineers seek information in CIA, with a particular focus on traceability and development artifacts that are not source code. We show that engineers have different information seeking behavior, and that some do not consider traceability particularly useful when conducting CIA. Furthermore, we observe a tendency for engineers to prefer less rigid types of support rather than formal approaches, i.e., engineers value support that allows flexibility in how to practically conduct CIA. Finally, due to diverse information seeking behavior, we argue that future CIA support should embrace individual preferences to identify change impact by empowering several seeking alternatives, including searching, browsing, and tracing. © 2017 IEEE.
  •  
2.
  •  
3.
  • Skoglund, Mats, et al. (author)
  • Improving class firewall regression test selection by removing the class firewall
  • 2007
  • In: International journal of software engineering and knowledge engineering. - 0218-1940. ; 17:3, s. 359-378
  • Journal article (peer-reviewed)abstract
    • One regression test selection technique proposed for object-oriented programs is the Class firewall regression test selection technique. The selection technique selects test classes for regression test, which test changed classes and classes depending on changed classes. However, in empirical studies of the application of the technique, we observed that another technique found the same defects, selected fewer tests and required a simpler, less costly, analysis. The technique, which we refer to as the Change-based regression test selection technique, is basically the Class firewall technique, but with the class firewall removed. In this paper we formulate a hypothesis stating that these empirical observations are not incidental, but an inherent property of the Class firewall technique. We prove that the hypothesis holds for Java in a stable testing environment, and conclude that the effectiveness of the Class firewall regression testing technique can be improved without sacrificing the defect detection capability of the technique, by removing the class firewall.
  •  
4.
  • Skoglund, Mats, et al. (author)
  • A case study of the class firewall regression test selection technique on a large scale distributed software system
  • 2005
  • In: 2005 International Symposium on Empirical Software Engineering (ISESE), Proceedings. - NEW YORK : IEEE. - 9780780395084 - 0780395077 ; , s. 74-83
  • Conference paper (peer-reviewed)abstract
    • Regression testing is expensive and may consume much of organizations' software development budgets. Thus, it is of interest to reduce the total time devoted to test execution by using test selection techniques. Many techniques have been proposed but few have been evaluated on real-world, large scale systems. In this paper we report on an empirical evaluation of using the class firewall regression test selection technique, in combination with scenario testing, on a large scale industrial software system using the Java byte code in the analysis. The study was performed on a large complex distributed software system in one of Sweden's largest banks. Effects of using scenario testing together with regression test selection are reported. The results are that not all test cases were selected by the class firewall selection technique. Using scenario testing, where test cases are dependent,. affects the number of test cases selected, as do the location and number of changes in the system.
  •  
5.
  • Thelin, Thomas, et al. (author)
  • A replicated experiment of usage-based and checklist-based reading
  • 2004
  • In: Proceedings - International Software Metrics Symposium. - 1530-1435. ; , s. 246-256
  • Conference paper (peer-reviewed)abstract
    • Software inspection is an effective method to detect faults in software artefacts. Several empirical studies have been performed on reading techniques, which are used in the individual preparation phase of software inspections. Besides new experiments, replications are needed to increase the body of knowledge in software inspections. This paper presents a replication of an experiment, which compares usage-based and checklist-based reading. The results of the original experiment show that reviewers applying usage-based reading are more efficient and effective in detecting the most critical faults from a user's point of view than reviewers using checklist-based reading. This paper presents the data of the replication together with the original experiment and compares the experiments. The main result of the replication is that it confirms the result of the original experiment. This replication strengthens the evidence that usage-based reading is an efficient reading technique. © 2004 IEEE.
  •  
6.
  • Petersson, Håkan, et al. (author)
  • Capture-Recapture in Software Inspections after 10 Years Research : Theory, Evaluation and Application.
  • 2004
  • In: Journal of Systems and Software. - 0164-1212 .- 1873-1228. ; 72:2, s. 249-264
  • Journal article (peer-reviewed)abstract
    • Software inspection is a method to detect faults in the early phases of the software life cycle. In order to estimate the number of faults not found, capture-recapture was introduced for software inspections in 1992 to estimate remaining faults after an inspection. Since then, several papers have been written in the area, concerning the basic theory, evaluation of models and application of the method. This paper summarizes the work made in capture-recapture for software inspections during these years. Furthermore, and more importantly, the contribution of the papers are classified as theory, evaluation or application, in order to analyse the performed research as well as to highlight the areas of research that need further work. It is concluded that (1) most of the basic theory is investigated within biostatistics, (2) most software engineering research is performed on evaluation, a majority ending up in recommendation of the Mh-JK model, and (3) there is a need for application experiences. In order to support the application, an inspection process is presented with decision points based on capture-recapture estimates.
  •  
7.
  • Linåker, Johan, et al. (author)
  • Sustaining Open Data as a Digital Common - Design principles for Common Pool Resources applied to Open Data Ecosystems
  • 2022
  • In: ACM International Conference Proceeding Series. 7 September 2022, Article number 10. - New York, NY, USA : Association for Computing Machinery. - 9781450398459
  • Conference paper (peer-reviewed)abstract
    • Motivation. Digital commons is an emerging phenomenon and of increasing importance, as we enter a digital society. Open data is one example that makes up a pivotal input and foundation for many of today's digital services and applications. Ensuring sustainable provisioning and maintenance of the data, therefore, becomes even more important. Aim. We aim to investigate how such provisioning and maintenance can be collaboratively performed in the community surrounding a common. Specifically, we look at Open Data Ecosystems (ODEs), a type of community of actors, openly sharing and evolving data on a technological platform. Method. We use Elinor Ostrom's design principles for Common Pool Resources as a lens to systematically analyze the governance of earlier reported cases of ODEs using a theory-oriented software engineering framework. Results. We find that, while natural commons must regulate consumption, digital commons such as open data maintained by an ODE must stimulate both use and data provisioning. Governance needs to enable such stimulus while also ensuring that the collective action can still be coordinated and managed within the frame of available maintenance resources of a community. Subtractability is, in this sense, a concern regarding the resources required to maintain the quality and value of the data, rather than the availability of data. Further, we derive empirically-based recommended practices for ODEs based on the design principles by Ostrom for how to design a governance structure in a way that enables a sustainable and collaborative provisioning and maintenance of the data. Conclusion. ODEs are expected to play a role in data provisioning which democratize the digital society and enables innovation from smaller commercial actors. Our empirically based guidelines intend to support this development. 
  •  
8.
  • Borg, Markus, et al. (author)
  • Recovering from a Decade: A Systematic Mapping of Information Retrieval Approaches to Software Traceability
  • 2014
  • In: Empirical Software Engineering. - : Springer Science and Business Media LLC. - 1573-7616 .- 1382-3256. ; 19:6, s. 1565-1616
  • Journal article (peer-reviewed)abstract
    • Engineers in large-scale software development have to manage large amounts of information, spread across many artifacts. Several researchers have proposed expressing retrieval of trace links among artifacts, i.e. trace recovery, as an Information Retrieval (IR) problem. The objective of this study is to produce a map of work on IR-based trace recovery, with a particular focus on previous evaluations and strength of evidence. We conducted a systematic mapping of IR-based trace recovery. Of the 79 publications classified, a majority applied algebraic IR models. While a set of studies on students indicate that IR-based trace recovery tools support certain work tasks, most previous studies do not go beyond reporting precision and recall of candidate trace links from evaluations using datasets containing less than 500 artifacts. Our review identified a need of industrial case studies. Furthermore, we conclude that the overall quality of reporting should be improved regarding both context and tool details, measures reported, and use of IR terminology. Finally, based on our empirical findings, we present suggestions on how to advance research on IR-based trace recovery.
  •  
9.
  • Bjarnason, Elizabeth, et al. (author)
  • Challenges and practices in aligning requirements with verification and validation : a case study of six companies
  • 2014
  • In: Empirical Software Engineering. - : Springer. - 1382-3256 .- 1573-7616. ; 19:6, s. 1809-1855
  • Journal article (peer-reviewed)abstract
    • Weak alignment of requirements engineering (RE) with verification and validation (VV) may lead to problems in delivering the required products in time with the right quality. For example, weak communication of requirements changes to testers may result in lack of verification of new requirements and incorrect verification of old invalid requirements, leading to software quality problems, wasted effort and delays. However, despite the serious implications of weak alignment research and practice both tend to focus on one or the other of RE or VV rather than on the alignment of the two. We have performed a multi-unit case study to gain insight into issues around aligning RE and VV by interviewing 30 practitioners from 6 software developing companies, involving 10 researchers in a flexible research process for case studies. The results describe current industry challenges and practices in aligning RE with VV, ranging from quality of the individual RE and VV activities, through tracing and tools, to change control and sharing a common understanding at strategy, goal and design level. The study identified that human aspects are central, i.e. cooperation and communication, and that requirements engineering practices are a critical basis for alignment. Further, the size of an organisation and its motivation for applying alignment practices, e.g. external enforcement of traceability, are variation factors that play a key role in achieving alignment. Our results provide a strategic roadmap for practitioners improvement work to address alignment challenges. Furthermore, the study provides a foundation for continued research to improve the alignment of RE with VV.
  •  
10.
  • Blom, Martin, 1973- (author)
  • Empirical Evaluations of Semantic Aspects in Software Development
  • 2006
  • Doctoral thesis (other academic/artistic)abstract
    • This thesis presents empirical research in the field of software development with a focus on handling semantic aspects. There is a general lack of empirical data in the field of software development. This makes it difficult for industry to choose an appropriate method for their particular needs. The lack of empirical data also makes it difficult to convey academic results to the industrial world.This thesis tries to remedy this problem by presenting a number of empirical evaluations that have been conducted to evaluate some common approaches in the field of semantics handling. The evaluations have produced some interesting results, but their main contribution is the addition to the body of knowledge on how to perform empirical evaluations in software development. The evaluations presented in this thesis include a between-groups controlled experiment, industrial case studies and a full factorial design controlled experiment. The factorial design seems like the most promising approach to use when the number of factors that need to be controlled is high and the number of available test subjects is low. A factorial design has the power to evaluate more than one factor at a time and hence to gauge the effects from different factors on the output.Another contribution of the thesis is the development of a method for handling semantic aspects in an industrial setting. A background investigation performed concludes that there seems to be a gap between what academia proposes and how industry handles semantics in the development process. The proposed method aims at bridging this gap. It is based on academic results but has reduced formalism to better suit industrial needs. The method is applicable in an industrial setting without interfering too much with the normal way of working, yet providing important benefits. This method is evaluated in the empirical studies along with other methods for handling semantics. In the area of semantic handling, further contributions of the thesis include a taxonomy for semantic handling methods as well as an improved understanding of the relation between semantic errors and the concept of contracts as a means of avoiding and handling these errors.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 219
Type of publication
conference paper (111)
journal article (82)
book chapter (8)
book (7)
reports (6)
doctoral thesis (3)
show more...
other publication (1)
research review (1)
show less...
Type of content
peer-reviewed (181)
other academic/artistic (34)
pop. science, debate, etc. (4)
Author/Editor
Wohlin, Claes (30)
Höst, Martin (29)
Engström, Emelie (27)
Regnell, Björn (22)
Thelin, Thomas (21)
show more...
Borg, Markus (13)
Andersson, Carina (12)
Bjarnason, Elizabeth (10)
Skoglund, Mats (10)
Olsson, Thomas (8)
Ros, Rasmus (7)
Wnuk, Krzysztof (6)
Wnuk, Krzysztof, 198 ... (4)
Baldassarre, Maria T ... (4)
Andrews, Anneliese (4)
Berling, Tomas (4)
Sabaliauskaite, Gied ... (4)
Petersen, Kai (3)
Helgesson, Daniel (3)
Andrews, A (3)
Pfahl, Dietmar (3)
Petersson, Håkan (3)
Loconsole, Annabella (3)
Zimmermann, Thomas (3)
Weyns, Kim (3)
Söderberg, Emma (3)
Munir, Hussan, Assis ... (3)
Unterkalmsteiner, Mi ... (2)
Feldt, Robert (2)
Feldt, Robert, 1972 (2)
Ahrefors, Håkan (2)
Nyström, Staffan (2)
Mäntylä, Mika (2)
Rathsman, Karin (2)
Ardö, Anders (2)
Taibi, Davide (2)
Mendes, Emilia (2)
Gorschek, Tony (2)
Smolander, Kari (2)
Persson, Stefan (2)
Holmén Notander, Jes ... (2)
Piattini, Mario (2)
Bratthall, Lars (2)
Sjöberg, Dag (2)
Tan, Kaige (2)
Yoo, Shin (2)
da Mota Silveira Net ... (2)
Abrahamsson, Pekka (2)
Oivo, M . (2)
show less...
University
Lund University (202)
Blekinge Institute of Technology (30)
Malmö University (9)
RISE (9)
Royal Institute of Technology (6)
Stockholm University (4)
show more...
Chalmers University of Technology (2)
Mälardalen University (1)
Linköping University (1)
Jönköping University (1)
Karlstad University (1)
show less...
Language
English (211)
Swedish (7)
Chinese (1)
Research subject (UKÄ/SCB)
Natural sciences (219)
Engineering and Technology (6)
Social Sciences (4)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view