样式: 排序: IF: - GO 导出 标记为已读
-
Knowledge and research mapping of the data and database forensics domains: A bibliometric analysis Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-04-12 Georgios Chorozidis, Konstantinos Georgiou, Nikolaos Mittas, Lefteris Angelis
The field of digital forensics has undergone rapid development alongside the technological advancements of the latest century. This study focuses in two of its subdomains, namely database forensics and data forensics. Though the concept of a database is relatively old, there is an academic void when it comes to its research compared to different domains in digital forensics. Data forensics has a myriad
-
Not yet another BPM lifecycle: A synthesis of existing approaches using BPMN Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-04-09 Nikolaos Nousias, George Tsakalidis, Kostas Vergidis
Business Process Management (BPM) is considered an important management approach that encompasses a set of methods for managing the business processes of an organization. To maximize the benefits of BPM, scholars have conceptualized its steps in schematic diagrams with interrelated phases called BPM lifecycles. As this approach has been established, the phenomenon of perpetual proposition of BPM lifecycles
-
Guiding the way: A systematic literature review on mentoring practices in open source software projects Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-04-09 Zixuan Feng, Katie Kimura, Bianca Trinkenreich, Anita Sarma, Igor Steinmacher
-
Effective test generation using pre-trained Large Language Models and mutation testing Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-04-06 Arghavan Moradi Dakhel, Amin Nikanjam, Vahid Majdinasab, Foutse Khomh, Michel C. Desmarais
One of the critical phases in the software development life cycle is software testing. Testing helps with identifying potential bugs and reducing maintenance costs. The goal of automated test generation tools is to ease the development of tests by suggesting efficient bug-revealing tests. Recently, researchers have leveraged Large Language Models (LLMs) of code to generate unit tests. While the code
-
Search-based co-creation of software models: The case of particle systems for video games Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-04-06 Jorge Chueca, Carlos Cetina, Oscar Pastor, Jaime Font
The video game industry is one of the fastest-growing industries in the world. However, the creation of content is the bottleneck of the industry nowadays. In this paper, we propose a new approach for co-creating content by means of combining an evolutionary algorithm Map-Elites, and software models. Our approach involves generating a large number of software models and selecting the best ones based
-
The need for more informative defect prediction: A systematic literature review Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-30 Natalie Grattan, Daniel Alencar da Costa, Nigel Stanger
Software defect prediction is crucial for prioritising quality assurance tasks, however, there are still limitations to the use of defect models. For example, the outputs often do not provide the defect type, severity, or the cause of the defect. Current models are also often complex in implementation (they use low transparency classifiers such as random forest or support vector machines) and primarily
-
Quantum aided efficient resource control for connected support in IRS assisted networks Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-28 Ashu Taneja, Shalli Rani, Meshal Alharbi, Muhammad Zohaib
To achieve the vision of all connected world with uninterrupted communication support, 6G technology plays an important role. But the scarce radio spectrum and limited network resources is the main challenge in delivering its promised performance. This paper presents an IRS-aided cell free NOMA network model that aims to provide uniform network coverage. The future 6G technology envisions for serving
-
Architecting for sustainability of and in the cloud: A systematic literature review Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-28 Sahar Ahmadisakha, Vasilios Andrikopoulos
-
Making vulnerability prediction more practical: Prediction, categorization, and localization Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-28 Chongyang Liu, Xiang Chen, Xiangwei Li, Yinxing Xue
Due to the prevalence of software vulnerabilities, vulnerability detection becomes a fundamental problem in system security. To solve this problem, academics and industries have made great efforts to propose deep-learning-based (DL-based) approaches but these attempts have three main limitations: (1) perform poorly on real-world projects (e.g., Accuracy below 74.33% and F1 below 73.55%); (2) perform
-
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-27 Jinfu Chen, Weijia Wang, Bo Liu, Saihua Cai, Dave Towey, Shengran Wang
Desirable characteristics in vulnerability-detection (VD) systems (VDSs) include both good detection capability (high accuracy, low false positive rate, low false negative rate, etc.) and low time overheads. The widely used VDSs based on models such as Recurrent Neural Networks (RNNs) have some problems, such as low time efficiency, failing to learn the vulnerability features better, and insufficient
-
A declarative approach to detecting design patterns from Java execution traces and source code Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-26 Aswathy Mohan, Swaminathan Jayaraman, Bharat Jayaraman
Design patterns are invaluable for software engineers because they help obtain well-structured and reusable object-oriented software components and contribute towards ease of software comprehension, maintenance, and modification. However, identifying design patterns from an inspection of the source code is not easy because, in most cases, there are no syntactic cues that signal their presence. This
-
Case study identification with GPT-4 and implications for mapping studies Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-24 Kai Petersen
Rainer and Wohlin showed that case studies are not well understood by reviewers and authors and thus they say that a given research is a case study when it is not. Rainer and Wohlin proposed a smell indicator (inspired by code smells) to identify case studies based on the frequency of occurrences of words, which performed better than human classifiers. With the emergence of ChatGPT, we evaluate ChatGPT
-
Technical risk model of machine learning based software project development - A multinational empirical study using modified Delphi-AHP method Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-24 Ching-Te Lin, Sun-Jen Huang
The development of machine learning (ML) based software projects has increased significantly over the past decade, introducing new technical risks that rarely or never appear in traditional software development projects. This research aims to identify and prioritize the technical risk factors that may lead to the failure of ML-based software development projects. First, a literature review was conducted
-
Role of quantum computing in shaping the future of 6 G technology Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-23 Muhammad Azeem Akbar, Arif Ali Khan, Sami Hyrynsalmi
The emergence of 6 G technology heralds a groundbreaking era in digital connectivity, envisaging universal and seamless links. To address the intricate computational and security requirements of this revolution, the integration of quantum computing (QC) into these networks is perceived as a promising solution. The objective this study presents a comprehensive investigation into the potential roles
-
Studying logging practice in machine learning-based applications Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-21 Patrick Loic Foalem, Foutse Khomh, Heng Li
Logging is a common practice in traditional software development. There have been multiple studies on the characteristics of logging in traditional software systems such as C/C++, Java, and Android applications. However, logging practices in Machine Learning-based (ML-based) applications are still not well understood. The size and complexity of data and models used in ML-based applications present
-
Understanding and evaluating software reuse costs and benefits from industrial cases—A systematic literature review Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-20 Xingru Chen, Muhammad Usman, Deepika Badampudi
Software reuse costs and benefits have been investigated in several primary studies, which have been aggregated in multiple secondary studies as well. However, existing secondary studies on software reuse have not critically appraised the evidence in primary studies. Moreover, there has been relatively less focus on how software reuse costs and benefits were measured in the primary studies, and the
-
Ensemble effort estimation for novice agile teams Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-19 Bashaer Alsaadi, Kawther Saeedi
To establish a reliable development plan, developers should investigate the software being developed. One main challenge for developers is estimating the effort required to develop the software. Agile teams deliver the software in a set of iterations, with each iteration containing user stories. Therefore, unlike traditional development, software development effort estimation (SDEE) in agile should
-
Prioritisation of code clones using a genetic algorithm Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-19 Umberto Azadi, Bartosz Walter, Francesca Arcelli Fontana
Code clones are prevalent, and due to their diverse impact on projects’ quality they require a proper management strategy. Develop GA-based Refactoring-Aware Detection (RAD) approach for prioritisation of code clones. A genetic algorithm (GA) that balances estimated gain and cost/risk of refactoring to select the optimal clone candidate to refactor. GA converges on a solution, with diverse variance
-
VALIDATE: A deep dive into vulnerability prediction datasets Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-19 Matteo Esposito, Davide Falessi
-
Source code expert identification: Models and application Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-16 Otávio Cury, Guilherme Avelino, Pedro Santos Neto, Marco Túlio Valente, Ricardo Britto
Identifying source code expertise is useful in several situations. Activities like bug fixing and helping newcomers are best performed by knowledgeable developers. Some studies have proposed repository-mining techniques to identify source code experts. However, there is a gap in understanding which variables are most related to code knowledge and how they can be used for identifying expertise. This
-
MSGVUL: Multi-semantic integration vulnerability detection based on relational graph convolutional neural networks Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-16 Wei Xiao, Zhengzhang Hou, Tao Wang, Chengxian Zhou, Chao Pan
Software security has drawn extensive attention as software projects have grown increasingly large and complex. Since the traditional manual or equipment vulnerability detection technology cannot meet today's software development needs, there is a recognized need to create more effective techniques to address security issues. Although various vulnerability detection systems have been proposed, most
-
Search-based approaches to optimizing software product line architectures: A systematic literature review Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-15 Sedigheh Khoshnevis, Omid Ardestani
-
UX Research practices related to Long-Term UX: A Systematic Literature Review Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-11 Suéllen Martinelli, Larissa Lopes, Luciana Zaina
-
Agile software development projects–Unveiling the human-related critical success factors Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-10 Leonor Barros, Carlos Tam, João Varajão
-
Objectivity by design: The impact of AI-driven approach on employees' soft skills evaluation Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-07 Ruti Gafni, Itzhak Aviv, Boris Kantsepolsky, Sofia Sherman, Havana Rika, Yariv Itzkovich, Artem Barger
Engineers’ team collaboration skills are among software development's most important success factors. Existing Artificial Intelligence practices for the engineers' soft skills assessment mainly rely on evaluations of subjective data gathered through surveys, interviews, or observations. As a result, the insights gained by these methods are biased because of the subjective data people report. To overcome
-
Behaviour-driven development and metrics framework for enhanced agile practices in scrum teams Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-05 Thamizhiniyan Natarajan, Shanmugavadivu Pichai
Agile methodologies highlight collaborative efforts among software engineering groups for iterative, high-quality product delivery within short timeframes. However, Scrum teams face persistent challenges in achieving these objectives, stemming from difficulties in seamless collaboration and effective communication among various roles, such as developers and testers. To address these issues, Scrum teams
-
Multi-objective optimization and integrated indicator-driven two-stage project recommendation in time-dependent software ecosystem Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-05 Xin Shen, Xiangjuan Yao, Dunwei Gong, Huijie Tu
Time-dependent software ecosystem is a complex system, where there are many projects and developers. Recommending projects to developers in a time-dependent software ecosystem can improve their quality and development speeds. However, the time-dependence of projects and developers results in an increased difficulty of project recommendation. To better recommend projects to developers in a time-dependent
-
Inclusion of individuals with autism spectrum disorder in Software Engineering Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-05 Gastón Márquez, Michelle Pacheco, Hernán Astudillo, Carla Taramasco, Esteban Calvo
-
Evaluating the effectiveness of a security flaws prevention tool Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-02 Itzhak Gershfeld, Arnon Sturm
Securing code is crucial for all software stakeholders. Nevertheless, state-of-the-art tools are imperfect and tend to miss critical errors, resulting in zero-day vulnerabilities. Thus, there is a need for alternatives to mitigate such issues. We aim to facilitate an effective identification mechanism of security flaws in the early stages of development. Following our analysis of the root causes of
-
Prevalence and severity of design anti-patterns in open source programs—A large-scale study Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-03-01 Alan Liu, Jason Lefever, Yi Han, Yuanfang Cai
Design anti-patterns can be symptoms of problems that lead to long-term maintenance difficulty. How should development teams prioritize their treatment? Which ones are more severe and deserve more attention? Does the impact of anti-patterns and general maintenance efforts differ with different programming languages? In this study, we assess the prevalence and severity of anti-patterns in different
-
Mashup-oriented API recommendation via pre-trained heterogeneous information networks Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-28 Mingdong Tang, Fenfang Xie, Sixian Lian, Jiajin Mai, Shuangyin Li
Combining different Web APIs to create Mashups has become very popular nowadays. Choosing suitable ones from massive Web APIs is of vital importance for efficient Mashup creations. A number of Mashup-oriented API recommendation methods have been proposed to address this issue, but they have limitations in their ability to exploit the rich attributes and connection data of Web APIs, which impedes their
-
A method of multidimensional software aging prediction based on ensemble learning: A case of Android OS Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-23 Yuge Nie, Yulei Chen, Yujia Jiang, Huayao Wu, Beibei Yin, Kai-Yuan Cai
-
Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-23 Affan Yasin, Rubia Fatima, Zheng JiangBin, Wasif Afzal, Shahid Raza
In the digital age, there is a notable increase in fraudulent activities perpetrated by social engineers who exploit individuals’ limited knowledge of digital devices. These actors strategically manipulate human psychology, targeting IT devices to gain unauthorized access to sensitive data. Our study is centered around two distinct objectives to be accomplished through the utilization of a serious
-
An exploratory study of software artifacts on GitHub from the lens of documentation Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-17 Akhila Sri Manasa Venigalla, Sridhar Chimalakonda
The abundance of software artifacts in open-source repositories has been analyzed by researchers from many perspectives, to address challenges in downstream tasks such as bug localization, code clone detection and so on. However, there is limited exploration of artifacts such as pull-requests and issues from a documentation perspective. We aim to explore the presence of information useful for documentation
-
Model driven engineering for machine learning components: A systematic literature review Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-15 Hira Naveed, Chetan Arora, Hourieh Khalajzadeh, John Grundy, Omar Haggag
Machine Learning (ML) has become widely adopted as a component in many modern software applications. Due to the large volumes of data available, organizations want to increasingly leverage their data to extract meaningful insights and enhance business profitability. ML components enable predictive capabilities, anomaly detection, recommendation, accurate image and text processing, and informed decision-making
-
Stakeholders collaborations, challenges and emerging concepts in digital twin ecosystems Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-14 Nirnaya Tripathi, Heidi Hietala, Yueqiang Xu, Reshani Liyanage
Digital twin (DT) ecosystems are rapidly evolving, connecting many stakeholders, such as manufacturers, customers, and application platform providers. These ecosystems require collaboration and interaction between diverse actors to create value. This study delves into the collaboration of such stakeholders within DT-focused ecosystems. This research aims to understand stakeholder collaboration within
-
Investigating the relationship between personalities and agile team climate: A replicated study Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-09 Gleyser Guimarães, Icaro Costa, Mirko Perkusich, Emilia Mendes, Danilo Santos, Hyggo Almeida, Angelo Perkusich
A study in 2020 (S1) explored the relationship between personality traits and team climate perceptions of software professionals working in agile teams. S1 surveyed 43 software professionals from a large telecom company in Sweden and found that a person's ability to get along with team members () influences significantly and positively the perceived level of team climate. Further, they observed that
-
-
Introduction to the special issue on dependable systems and applications Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-07 W. Eric Wong
-
A random forest model for early-stage software effort estimation for the SEERA dataset Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-03 Emtinan I. Mustafa, Rasha Osman
Publicly available software cost estimation datasets are outdated and may not represent current industrial environments. Thus most research has concentrated on the development and evaluation of estimation models with limited evidence of their applicability to industrial practice. Moreover, these datasets and models may not be applicable in (under-represented) technically and economically constrained
-
Co-evolving scenarios and simulated players to locate bugs that arise from the interaction of software models of video games Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-03 Isis Roca, Óscar Pastor, Carlos Cetina, Lorena Arcega
Game Software Engineering (GSE) is a field that focuses on developing and maintaining the software part of video games. A key component of video game development is the utilization of game engines, with many engines using software models to capture various aspects of the game. A challenge that GSE faces is the localization of bugs, mainly when working with large and intricated software models. Additionally
-
What does matter in the success of a decentralized application? From idea to development Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-02 Elvira-Maria Arvanitou, Dimitrios Gagoutis, Apostolos Ampatzoglou, Nikolaos Mittas, Ignatios Deligiannis, Alexander Chatzigeorgiou
With the rise of blockchain, various applications are running in a decentralized manner, covering the needs of various end-users. Decentralized Applications (DApps) are becoming popular in numerous application domains, ranging from finance to games, and from Non-Fungible Tokens to security mechanisms. The success of a DApp, from a financial perspective, can be perceived as the market fragment that
-
Towards sustainable software systems: A software sustainability analysis framework Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-02-01 Hira Noman, Naeem Mahoto, Sania Bhatti, Adel Rajab, Asadullah Shaikh
In today’s rapidly evolving technological landscape designing sustainable software systems requires considering the software impacts and its long-term viability. For professionals, a significant barrier lies in the need for practical guidelines and tangible frameworks for effectively incorporating sustainability considerations during software design and development. The study aims to help software
-
An empirical study on metamorphic testing for recommender systems Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-28 Chengying Mao, Jifu Chen, Xiaorong Yi, Linlin Wen
Recommender systems are widely used in various fields because they can provide decision-making guidance to users facing an overwhelming set of choices. In previous studies, the accuracy of recommendations has been the focus and has significantly improved. However, the quality issues of these systems have been overlooked. In practical applications, the reliability of recommender systems plays an important
-
A deep semantics-aware data augmentation method for fault localization Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-24 Jian Hu, Yan Lei
Context: Fault localization (FL) techniques are employed to identify the relationship between program statements and failures by analyzing runtime information. They rely on the statistics of input data to explore the underlying correlation rooted in it. Consequently, the quality of input data is of utmost importance for FL. However, in practice, passing tests significantly outnumber failing tests regarding
-
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-17 Daniela Quiñones, Claudia Ojeda, Rodrigo F. Herrera, Luis Felipe Rojas
Context Traditional building and infrastructure design methodologies are inflexible and inefficient, leading to high costs and environmental damage. Generative design, with an algorithm that provides multiple options, could be a potential solution. The challenge is creating an intuitive, user-friendly application that optimizes engineers’ time, reducing manual iterations and lead to a good user experience
-
Context-based statement-level vulnerability localization Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-19 Thu-Trang Nguyen, Hieu Dinh Vo
The number of attacks exploring software vulnerabilities has dramatically increased, which has caused various severe damages. Thus, early and accurately detecting vulnerabilities becomes essential to guarantee software quality and prevent the systems from malicious attacks. Multiple automated vulnerability detection approaches have been proposed and obtained promising results. However, most studies
-
A longitudinal study on the temporal validity of software samples Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-12 Juan Andrés Carruthers, Jorge Andrés Diaz-Pace, Emanuel Irrazábal
Context In Empirical Software Engineering, it is crucial to work with representative samples that reflect the current state of the software industry. An important consideration, especially in rapidly changing fields like software development, is that if we use a sample collected years ago, it should continue to represent the same population in the present day to produce generalizable results. However
-
Automatic smart contract comment generation via large language models and in-context learning Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-12 Junjie Zhao, Xiang Chen, Guang Yang, Yiheng Shen
Context: Designing effective automatic smart contract comment generation approaches can facilitate developers’ comprehension, boosting smart contract development and improving vulnerability detection. The previous approaches can be divided into two categories: fine-tuning paradigm-based approaches and information retrieval-based approaches. Objective: However, for the fine-tuning paradigm-based approaches
-
Test Code Flakiness in Mobile Apps: The Developer’s Perspective Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-06 Valeria Pontillo, Fabio Palomba, Filomena Ferrucci
-
-
Towards a taxonomy of privacy requirements based on the LGPD and ISO/IEC 29100 Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-06 Sâmmara Éllen Renner Ferrão, Geovana Ramos Sousa Silva, Edna Dias Canedo, Fabiana Freitas Mendes
Context: Ensuring compliance with current data privacy legislation poses a significant challenge for software development teams, demanding adaptations to processes in order to align with legal requirements. Objective: This study proposes a comprehensive taxonomy of privacy requirements, drawing from the Brazilian General Data Protection Law (LGPD) and ISO/IEC 29100. The aim is to assist software development
-
Skills development for software engineers: Systematic literature review Inf. Softw. Technol. (IF 3.9) Pub Date : 2024-01-04 Giovana Giardini Borges, Rogéria Cristiane Gratão de Souza
Context A good software professional must have technical and non-technical skills, that is, hard and soft skills, to deal with the diverse challenges they will encounter throughout their career. To make this possible, such professional must develop these abilities from the undergraduate. Objective This research aims to identify the necessary soft skills for future Software Engineers and the teaching
-
Process mining software engineering practices: A case study for deployment pipelines Inf. Softw. Technol. (IF 3.9) Pub Date : 2023-12-29 Ana Filipa Nogueira, Mário Zenha-Rela
Context: In mature software development organizations the ci/cd pipeline is the only route to deploy software into production. While the workflow of this process seems straightforward, the reality is different since exceptions and deviations are the norm in actual industry practice. In this context, Process Mining appears as a promising technique to uncover deviations and check compliance with standardized
-
Multi-grained contextual code representation learning for commit message generation Inf. Softw. Technol. (IF 3.9) Pub Date : 2023-12-19 Chuangwei Wang, Li Zhang, Xiaofang Zhang
Commit messages, precisely describing the code changes for each commit in natural language, makes it possible for developers and succeeding reviewers to understand the code changes without digging into implementation details. However, the semantic and structural gap between code and natural language poses a significant challenge for commit message generation. Several researchers have proposed automated
-
License recommendation for open source projects in the power industry Inf. Softw. Technol. (IF 3.9) Pub Date : 2023-12-14 Ximing Zhang, Huan Xu, Qiuling Yu, Shipei Zeng, Shan Dai, Haowen Yang, Shuhan Wu
Context: Establishing secure and appropriate licensing procedures for open-source software is essential in the development of a decentralized renewable energy system within the smart grid industry. Nonetheless, software developers in the power industry encounter obstacles in comprehending and electing licenses on account of factors such as resemblances in terms, intricacies of the law, compatibility
-
Towards automating self-admitted technical debt repayment Inf. Softw. Technol. (IF 3.9) Pub Date : 2023-12-14 Abdulaziz Alhefdhi, Hoa Khanh Dam, Aditya Ghose
Context: Self-Admitted Technical Debt (SATD) refers to the technical debt in software that is explicitly flagged, typically by the source code comment. The SATD literature has mainly focused on comprehending, describing, detecting, and recommending SATD. Most recently, there have been efforts to study the state of the code before and after removing the SATD comment. While these efforts serve as a preliminary
-
Diversity-aware fairness testing of machine learning classifiers through hashing-based sampling Inf. Softw. Technol. (IF 3.9) Pub Date : 2023-12-09 Zhenjiang Zhao, Takahisa Toda, Takashi Kitamura
Context: There are growing concerns about algorithmic fairness, as some machine learning (ML)-based algorithms have been found to exhibit biases against protected attributes such as gender, race, age and so on. Individual fairness requires an ML classifier to produce similar outputs for similar individuals. Verification Based Testing (Vbt) is a state-of-the-art black-box testing algorithm for individual
-
Unraveling quantum computing system architectures: An extensive survey of cutting-edge paradigms Inf. Softw. Technol. (IF 3.9) Pub Date : 2023-12-05 Xudong Zhao, Xiaolong Xu, Lianyong Qi, Xiaoyu Xia, Muhammad Bilal, Wenwen Gong, Huaizhen Kou
Context: The convergence of physics and computer science in the realm of quantum computing systems has sparked a profound revolution within the computer industry. However, despite such promise, the existing focus on quantum software systems primarily centers on the generation of quantum source code, inadvertently overlooking the pivotal role of the overall software architecture. Objectives: In order
-
Technical debt management automation: State of the art and future perspectives Inf. Softw. Technol. (IF 3.9) Pub Date : 2023-12-02 João Paulo Biazotto, Daniel Feitosa, Paris Avgeriou, Elisa Yumi Nakagawa