Integrating research and practice in software engineering / Stan Jarzabek, Aneta Poniszewska-Marańda, Lech Madeyski, editors.

In this book, the authors highlight recent findings that hold the potential to improve software products or development processes; in addition, they help readers understand new concepts and technologies, and to see what it takes to migrate from old to new platforms. Some of the authors have spent mo...

Full description

Saved in:
Bibliographic Details
Other Authors: Jarzabek, Stan (Editor), Poniszewska-Marańda, Aneta (Editor), Madeyski, Lech (Editor)
Format: eBook
Language:English
Published: Cham, Switzerland : Springer, [2020]
Series:Studies in computational intelligence ; v. 851.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Intro; Preface; Contents; Creating Evolving Project Data Sets in Software Engineering; 1 Introduction; 2 Related Work; 3 Research Setup; 4 Results; 4.1 RQ: How Efficient Is Our Algorithm Is Finding Industry-Relevant Projects?; 5 Discussion; 6 Threats to Validity; 6.1 Construct Validity; 6.2 Internal Validity; 6.3 External Validity; 7 Future Work; 8 Conclusions; References; Semantic Categorization of Software Bug Repositories for Severity Assignment Automation; 1 Introduction; 1.1 Aims and Contributions; 2 Related Work; 2.1 Difference from Previous Work; 3 Proposed Methodology
  • 3.1 Pre-processing3.2 Term-Document Matrix Construction; 3.3 Feature Selection; 3.4 Topic Modeller; 3.5 Bug Report Categorization; 3.6 Neighbours Retrieval and Severity Assignment; 4 Experiments; 4.1 Datasets; 4.2 Evaluation Metrics; 4.3 Experimental Setup; 4.4 Results; 5 Conclusion and Future Work; References; Scalable and Accurate Detection of Function Clones in Software Using Multithreading; 1 Introduction; 2 Motivation; 3 Related Works; 4 Background; 5 Proposed Methodology; 5.1 Code Pre-processing; 5.2 Metric Calculation; 5.3 Detection; 6 Implementation and Results; 7 Conclusions
  • 4.1 Heater Control System Analysis4.2 Industrial Automation System Analysis; 5 Conclusion; References; A Software Analysis Based Vulnerability Detection System For Smart Contracts; 1 Introduction; 2 Background; 2.1 Overview of Ethereum and Smart Contract; 2.2 Related Research; 2.3 Towards a General Smart Contract Detection System; 3 Introduction of Existing Tools and Vulnerabilities; 3.1 Survey on Famous Smart Contract Vulnerabilities; 3.2 Survey on Existing Tools; 3.3 Existing Tools Detection Capability; 4 Clone Based Detection System; 5 Survey on EVM Bytecode; 5.1 Structure of Bytecode
  • 5.2 Clone Detection on Bytecode6 Preliminary Experiment; 6.1 Environment Set up; 6.2 Evaluations; 7 Conclusion; References; Securing Connection and Data Transfer Between Devices and IoT Cloud Service; 1 Introduction; 2 Finding Main Issues in Securing the Car Networks; 2.1 Security Concept for Single IoT Device; 3 Proposed Prototype of Security Mechanism; 3.1 Results of Testing the Proposed Security Mechanism; 4 Conclusions; References; A Data-Driven Conceptual Modeling; 1 Introduction; 2 Basic Definitions; 3 Related Works; 4 Data Preparation; 5 Algorithm of Disclosing a Data Conceptual Model