The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To increase the success in computer programming courses, it is important to understand the learning process and common difficulties faced by students. Although several studies have investigated possible relationships between students performance and self-regulated learning characteristics in computer programming courses, little attention has been given to the source code produced by students in this...
Program understanding plays a pivotal role in software maintenance and evolution: a deep understanding of code is the stepping stone for most software-related activities, such as bug fixing or testing. Being able to measure the understandability of a piece of code might help in estimating the effort required for a maintenance activity, in comparing the quality of alternative implementations, or even...
In the process of software testing, correlated defects raise researchers' attention worldwide. Some potential defects are hard to be detected in the test. To address these potential defects, this paper adopts an error propagation model to describe the process of defect evolution and applies fault injection method to introduce known seed-defects. Subsequently, seed-defects are activated and related...
Software metrics play an important role in Software Development Life Cycle (SDLC). In this paper we have tried to find the correlation between different software metrics. The research is done using PROMISE data repository of NASA. The positive correlation is found to exist between various software metrics. Large number of metrics available in the software industry raises the need of finding the most...
Agile software development describes those methods with iterative and incremental development. This development method came into view to overcome the drawbacks of traditional development methods. Although agile development methods have become very popular since the introduction of the Agile Manifesto in 2001, however, there is an ongoing debate about the strengths and weakness of these methods in...
SATD (Sum of Absolute Transformed Difference) based cost function is adopted to reduce the complexity of HEVC (High Efficiency video coding) codec by selecting up to 8 intra modes for RDO (Rate Distortion Optimization) process. However, transform of all 35 modes, and RDO of 8 modes is bottleneck in intra mode complexity reduction. In this paper, a hybrid approach for reducing intra coding complexity...
In this paper, we propose a method that skips the complex encoding processes of coding unit (CU) for HEVC intra frame coding. To speed-up the encoding process that recursively explore all sizes of CUs, most researchers have exploited spatial information thus far. On the other hand, the temporal correlation among frames has not been thoroughly investigated. We exploited the temporal correlation as...
The Maintainability Index (MI) metric was proposed in the early nineties to gauge ease of code maintenance. A high value of MI indicates well-constructed code which is easy to maintain and a low MI, the opposite. The metric has been criticized in the past and more recently for its applicability to code and validity more generally. Very few studies however have explored whether the MI correlates strongly...
Software quality is one of the important aspects of the reliable software. For this reason, software practitioners are interested in the methods that enable to predict defect with software metrics. Most studies focus on what kind of techniques would be fit for the prediction model; however, the research about what is the appropriate number of software metrics for building effective defect prediction...
Previous studies have reported that the performance of a developer can greatly impact the quality of the software he/she has worked on. Such performance can be measured using two developer risk metrics during a particular development period. One is the ratio of the number of bug-introduce commits to the total number of commits made by a developer (i.e., the DQ metric). The other is the proportion...
Background. Slice-based cohesion metrics leverage program slices with respect to the output variables of a module to quantify the strength of functional relatedness of the elements within the module. Although slice-based cohesion metrics have been proposed for many years, few empirical studies have been conducted to examine their actual usefulness in predicting fault-proneness. Objective. We aim to...
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These new algorithms have raised questions with regards to side-channel leakage and analysis attacks of MAC-Keccak. So far there exists prior work on attacks of software implementations of MAC-Keccak, but there has been no comprehensive...
Simple Function Point is a functional size measurement method that can be used in place of IFPUG Function Point, but requires a much simpler - hence less time and effort consuming - measurement process. Simple Function Point was designed to be equivalent to IFPUG Function Point in terms of numerical results. This paper reports an empirical study aiming at verifying the effectiveness of Simple Function...
We conduct an extensive analysis on the developers of Open Source Software (OSS) projects. Our goal is to discover trends that govern the developers' behavior in contributing to OSS projects. To achieve our goal, we define and analyze a set of developer and OSS project features. Moreover, we study the behavior of the developers on selecting OSS projects to participate in by analyzing the project features...
Measuring the internal quality of source code is one of the traditional goals of making software development into an engineering discipline. Cyclomatic Complexity (CC) is an often used source code quality metric, next to Source Lines of Code (SLOC). However, the use of the CC metric is challenged by the repeated claim that CC is redundant with respect to SLOC due to strong linear correlation. We test...
[Background:] Software effort prediction methods and models typically assume positive correlation between software product complexity and development effort. However, conflicting observations, i.e. negative correlation between product complexity and actual effort, have been witnessed from our experience with the COCOMO81 dataset. [Aim:] Given our doubt about whether the observed phenomenon is a coincidence,...
Modern software development relies on incremental delivery to facilitate quick response to customers' requests. In this dynamic environment the continuous modifications of software code can cause risks for software developers; when developing a new feature increment, the added or modified code may contain fault-prone or difficult-to-maintain elements. The outcome of these risks can be defective software...
This case study combines known software structure and revision history analysis techniques, in known and new ways, to predict bug-related change frequency, and uncover architecture-related risks in an agile industrial software development project. We applied a suite of structure and history measures and statistically analyzed the correlations between them. We detected architecture issues by identifying...
Network attack path analysis is an important method for analyzing the security status of computer network, which can automatically analyze the correlation between network vulnerabilities and potential threats resulting from vulnerabilities. It plays a guiding role in establishing network security policy. This paper chooses NVD and Bugtraq as vulnerability data sources, and extracts key properties...
During the software development lifecycle, studies have shown that over 75% of project costs originate from the maintenance phase. Analysis of the processes within the maintenance phase could prove beneficial since most maintenance activities revolve around source code. Accurate estimations of the maintenance effort spent on code changes would enable cost effective management of resources. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.