Auflistung Softwaretechnik-Trends 37(2) - 2017 nach Erscheinungsdatum
1 - 10 von 36
Treffer pro Seite
Sortieroptionen
- TextdokumentDeriving Categories of Semantic Clones from a Coding Contest(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Görg, TorstenThis paper establishes subcategories of semantic code clones, based on code from a coding contest. We provide these clone subcategories as a basis of a benchmark for semantic code clone detection algorithms.
- TextdokumentGood RE Artifacts? I Know It When I Use It!(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Femmer, Henning; Vogelsang, Andreas
- TextdokumentTransformation of Preprocessor Variance to Post-Build Variance(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Quante, Jochen; Thums, Andreas; Pikuleva, Olga
- TextdokumentMigration in die Cloud – ohne Regulatorik geht nichts(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Borchers, JensDie Nutzung von Cloud-Architekturen – ob nun unternehmensintern („private cloud“) oder zunehmend auch bei entsprechenden Service- Unternehmen („public cloud“) – wird immer mehr zu einer gängigen Methode, IT-Leistungen zu virtualisieren und bei externen Anbietern zu betreiben. Neben den technischen und fachlichen Aspekten spielen auch viele rechtliche Bedingungen eine wesentliche Rolle, gerade für Unternehmen im Finanzdienstleistungsbereich, also Banken und Versicherungen. Aber auch Unternehmen in anderen Bereichen unterliegen diversen Regularien, gerade bei geschäftskritischen Anwendungen. In diesem Beitrag wird aus Sicht eines Nicht-Juristen eine Übersicht der wichtigsten Regeln und Beteiligten gegeben.
- TextdokumentAgilität in der Prozessmodellierung - Ein Beitrag zu gutem Requirements Engineering?(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Kirchner, Kathrin; Reher, Felix; Weißbach, Rüdiger; Heinrich, Robert
- ZeitschriftenartikelWorkshop des Arbeitskreises Traceability / Evolution - Einladung zur Beitragseinreichung(Softwaretechnik-Trends: Vol. 37, No. 2, 2017)
- TextdokumentNature Inspired System Analysis(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Tenev, VasilThe process of cloning variants of a system to accommodate increasing customization is often state of the practice where code duplication is caused by the combination of maintenance problems, high customization, and time pressure. This particular situation motivates the research on similarity analysis of system variants. Similarity determination, variability information recovery, and evolu- tion history reconstruction are prime goals in this context. Analogous research problems appear in the bioinformatics. The growing amount of DNA/RNA sequence data requires efficient similarity analysis and proper visualizations. This branch of computer science faces the tasks of simultaneous aligning for multiple genome sequences, and estimating evolutionary correlations in a given set of taxa. Hence, we applied these techniques to analyze a group of related systems from the BSD Unix family as prove of concept towards model-based variant analysis of complex systems.
- TextdokumentJuggling with Data: On the Lack of Database Monitoring in Long-Living Software Systems(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Zirkelbach, ChristianLong-living software systems often challenge associated software engineers and operators with changing requirements or increasing workload. In addition, performance issues or customer requests may cause inevitable software updates or refactoring tasks. These legacy systems are often based on outdated technologies and are poorly documented. In combination with insufficient knowledge of the (actual) system, the necessary transformations can be difficult. While the described situation is discussed in the software engineering community, databases are rarely covered. As databases are an essential part in almost every soft- ware system, they are affected by evolutionary tasks as well and have to face the same challenges. In this paper, we (i) describe problems based on non-existing database monitoring in long-living software systems and (ii) propose an approach as a solution, which addresses the described problems, and supports developers and operators in performing evolutionary tasks alike. Finally, we conclude and delineate open questions concerning our envisioned approach.
- TextdokumentDefining a Security-Oriented Evolution Scenario for the CoCoME Case Study(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) Pilipchuk, Roman; Seifermann, Stephan; Taspolatoglu, EmreInformation systems are subject to continuous change. In order to conduct empirical research on methods for software evolution, CoCoME was developed as a community-driven case study system. It is, however, not suitable for the validation of security-related approaches, as neither security nor privacy have been addressed in any evolution scenario. We elicited 53 secu- rity requirements coming from law, security guidelines and known threats. In this paper, we present three out of twelve security requirement categories including one representative requirement and share our experience in building the foundation for a security-oriented evolution scenario. Researchers in the field of secure software evolution can validate their approaches using this future evolution scenario.
- TextdokumentWebbasiert und kollaborativ: Ein Requirements 18 Editor auf Basis von ReqIF(Softwaretechnik-Trends: Vol. 37, No. 2, 2017) van der Vlugt, Dennis; Kamsties, Erik; Terfloth, Axel