Searched for: department%3A%22Software%255C%252BTechnology%22
(21 - 40 of 48)

Pages

document
Aniche, Maurício (author), Bavota, Gabriele (author), Treude, Christoph (author), Gerosa, Marco Aurélio (author), van Deursen, A. (author)
Previous studies have shown the negative effects that low-quality code can have on maintainability proxies, such as code change- and defect-proneness. One of the symptoms for low-quality code are code smells, defined as sub-optimal implementation choices. While this definition is quite general and seems to suggest a wide spectrum of smells that...
journal article 2018
document
Huijgens, H.K.M. (author), van Deursen, A. (author), van Solingen, D.M. (author)
Context: In this paper we present a multiple case study on the insights of software organizations into stakeholder satisfaction and (perceived) value of their software projects. Our study is based on the notion that quantifying and qualifying project size, cost, duration, defects, and estimation accuracy needs to be done in relation with...
journal article 2017
document
De Souza Coelho, R. (author), Almeida, Lucas (author), Gousios, G. (author), van Deursen, A. (author), Treude, Christoph (author)
Adequate handling of exceptions has proven difficult for many software engineers. Mobile app developers in particular, have to cope with compatibility, middleware, memory constraints, and battery restrictions. The goal of this paper is to obtain a thorough understanding of common exception handling bug hazards that app developers face. To...
journal article 2017
document
Dintzner, N.J.R. (author), van Deursen, A. (author), Pinzger, M. (author)
Evolving a large scale, highly variable system is a challenging task. For such a system, evolution operations often require to update consistently both their implementation and its feature model. In this context, the evolution of the feature model closely follows the evolution of the system. The purpose of this work is to show that fine...
journal article 2017
document
Raemaekers, S.B.A. (author), van Deursen, A. (author), Visser, Joost (author)
Systems that depend on third-party libraries may have to be updated when updates to these libraries become available in order to benefit from new functionality, security patches, bug fixes, or API improvements. However, often such changes come with changes to the existing interfaces of these libraries, possibly causing rework on the client...
journal article 2017
document
Visser, Eelco (author)
In this essay, I argue that linguistic abstraction should be used systematically as a tool to capture our emerging understanding of domains of computation. Moreover, to enable that systematic application, we need to capture our understanding of the domain of linguistic abstraction itself in higher-level meta languages. The argument is...
journal article 2015
document
Hartman, C. (author), Heule, M.J.H. (author), Kwekkeboom, K. (author), Noels, A. (author)
Conway's Game of Life has inspired enthusiasts to search for a wide range of patterns for this classic cellular automaton. One important challenge in this context is finding the smallest Garden of Eden (GoE), a state without a predecessor. We take up this challenge by applying two techniques. First, we focus on GoEs that contain a symmetry. This...
journal article 2013
document
Van der Tak, P. (author), Ramos, A. (author), Heule, M. (author)
We present the solver RestartSAT which includes a novel technique to reduce the cost to perform a restart in CDCL SAT solvers. This technique, called ReusedTrail, exploits the observation that CDCL solvers often reassign the same variables to the same truth values after a restart. It computes a partial restart level for which it is guaranteed...
journal article 2011
document
Babar, M.A. (author), Lago, P. (author), Van Deursen, A. (author)
journal article 2011
document
Houben, G.J. (author), Koch, N. (author), Rossi, G. (author), Vallecillo, A. (author)
journal article 2011
document
Lesaja, G. (author), Roos, C. (author)
We present an interior-point method for the P?(?)-linear complementarity problem (LCP) that is based on barrier functions which are defined by a large class of univariate functions called eligible kernel functions. This class is fairly general and includes the classical logarithmic function and the self-regular functions, as well as many non...
journal article 2010
document
Dolstra, E. (author), Löh, A. (author), Pierron, N. (author)
Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as package upgrades or changes to system configuration files are stateful: they destructively update the state of the system. This leads to many problems, such as the inability to roll back changes easily, to...
journal article 2010
document
Bielecki, M. (author), Hidders, J. (author), Paredaens, J. (author), Spielmann, M. (author), Tyszkiewicz, J. (author), Van den Bussche, J. (author)
We investigate the computational capabilities of Web browsers, when equipped with a standard finite automaton. We observe that Web browsers are Turingcomplete. We introduce the notion of a navigational problem, and investigate the complexity of solving Web queries and navigational problems by Web browsers, where complexity is measured by the...
journal article 2010
document
Groenewegen, D.M. (author), Visser, E. (author)
Data validation rules constitute the constraints that data input and processing must adhere to in addition to the structural constraints imposed by a data model. Web modeling tools do not make all types of data validation explicit in their models, hampering full code generation and model expressivity. Web application frameworks do not offer a...
journal article 2010
document
Gu, G. (author), Roos, C. (author)
In [SIAM J. Optim., 16 (2006), pp. 1110–1136], Roos proved that the devised full-step infeasible algorithm has $O(n)$ worst-case iteration complexity. This complexity bound depends linearly on a parameter $\bar{\kappa}(\zeta)$, which is proved to be less than $\sqrt{2n}$. Based on extensive computational evidence (hundreds of thousands of...
journal article 2010
document
Parker, T. (author), Halkes, G. (author), Bezemer, M. (author), Langendoen, K. (author)
Most current WSN MAC protocol implementations have multiple tasks to perform—deciding on correct timing, sending of packets, sending of acknowledgements, etc. However, as much of this is common to all MAC protocols, there is duplication of functionality, which leads to larger MAC protocol code size and therefore increasing numbers of bugs....
journal article 2010
document
Halkes, G.P. (author), Langendoen, K.G. (author)
The evaluation ofMAC protocols forWireless Sensor Networks (WSNs) is often performed through simulation. These simulations necessarily abstract away from reality inmany ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have...
journal article 2010
document
Hemel, Z. (author), Kats, L.C.L. (author), Groenewegen, D.M. (author), Viser, E. (author)
The realization of model-driven software development requires effective techniques for implementing code generators for domain-specific languages. This paper identifies techniques for improving separation of concerns in the implementation of generators. The core technique is code generation by model transformation, that is, the generation of a...
journal article 2009
document
Gu, G. (author), Mansouri, H. (author), Zangiabadi, M. (author), Bai, Y.Q. (author), Roos, C. (author)
We present several improvements of the full-Newton step infeasible interior-point method for linear optimization introduced by Roos (SIAM J. Optim. 16(4):1110–1136, 2006). Each main step of the method consists of a feasibility step and several centering steps. We use a more natural feasibility step, which targets the ?+-center of the next pair...
journal article 2009
document
Van Solingen, D.M. (author)
Our discipline must shift toward value-based software engineering, because we're obliged to prove our contributions to the financial bottom line. In the May/June 2004 IEEE Software special issue on return on investment (ROI), the author presented measurement results for the ROI of software process improvement (SPI). This article made three main...
journal article 2009
Searched for: department%3A%22Software%255C%252BTechnology%22
(21 - 40 of 48)

Pages