Journal of Software: Evolution and Process

Cover image for Vol. 28 Issue 2

Early View (Online Version of Record published before inclusion in an issue)

Edited By: Gerardo Canfora, Darren Dalcher and David Raffo

Impact Factor: 0.624

ISI Journal Citation Reports © Ranking: 2014: 80/104 (Computer Science Software Engineering)

Online ISSN: 2047-7481

Associated Title(s): Concurrency and Computation: Practice and Experience, Software Focus, Software Process: Improvement and Practice, Software Testing, Verification and Reliability, Software: Practice and Experience

VIEW

  1. 1 - 8
  1. Research Articles

    1. Workflow temporal verification for monitoring parallel business processes

      Xiao Liu, Dingxian Wang, Dong Yuan, Futian Wang and Yun Yang

      Article first published online: 8 JAN 2016 | DOI: 10.1002/smr.1761

      Thumbnail image of graphical abstract

      Current response-time based checkpoint selection and temporal verification strategies for a single scientific workflow cannot be applied directly to the monitoring of a large batch of parallel processes. To address such an issue, we have investigated the measurement of workflow throughput and proposed a QoS-aware throughput-based temporal checkpoint selection and verification strategy. Experimental results demonstrated that our strategy can achieve the best efficiency and effectiveness compared with the state-of-the-art and other representative response-time based checkpoint selection strategies.

  2. Special Issue Papers

    1. How does code obfuscation impact energy usage?

      Cagri Sahin, Mian Wan, Philip Tornquist, Ryan McKenna, Zachary Pearson, William G. J. Halfond and James Clause

      Article first published online: 6 JAN 2016 | DOI: 10.1002/smr.1762

      Thumbnail image of graphical abstract

      Because both software piracy and battery life are important concerns, mobile application developers must balance protecting their applications and preserving the battery lives of their users' devices. To help them make such choices, we conducted an empirical study of the effects of 18 code obfuscations on the energy consumption of 11 Android applications on four different mobile phone platforms. The results of the study indicate that, while obfuscations tend to increase energy usage, the magnitudes of such impacts are unlikely to be meaningful to mobile application users.

    2. Empirical analysis of the relationship between CC and SLOC in a large corpus of Java methods and C functions

      Davy Landman, Alexander Serebrenik, Eric Bouwers and Jurgen J. Vinju

      Article first published online: 9 DEC 2015 | DOI: 10.1002/smr.1760

      Thumbnail image of graphical abstract

      We analyzed the relationship between cyclomatic complexity (CC) and lines of code (SLOC) for two large corpora of Java and C software. Contradicting earlier claims from literature, we observed that the linear correlation between CC and SLOC is not strong enough to conclude that CC is redundant to SLOC. This is caused by increasingly high variance and concurs with the widely accepted practice of measuring of CC next to SLOC.

  3. Editorials

    1. You have free access to this content
      Guest editors' introduction

      LiGuo Huang, He Zhang and Ita Richardson

      Article first published online: 6 DEC 2015 | DOI: 10.1002/smr.1763

  4. Special Issue - ICSSP 2014

    1. When to automate software testing? A decision-support approach based on process simulation

      Vahid Garousi and Dietmar Pfahl

      Article first published online: 25 NOV 2015 | DOI: 10.1002/smr.1758

      Thumbnail image of graphical abstract

      Software test processes are complex and costly. To reduce testing effort without compromising effectiveness and product quality, automation of test activities has been adopted as a popular approach in software industry. Using a simulation model, we were able to evaluate the performance of test process implementations with varying degrees of automation and help testers choose the best variant. In this article, we present further details of the simulation model, its usage scenarios, and examples of simulation experiments.

  5. Special Issue – ICSSP 2014

    1. Software processes for a changing world

      Kevin T. Ryan

      Article first published online: 19 NOV 2015 | DOI: 10.1002/smr.1756

      Thumbnail image of graphical abstract

      Software is changing the world, but it is not easy to change software. We need new software development processes that support flexibility while meeting the stringent standards of regulated industries. This work has begun.

    2. A model for analyzing performance problems and root causes in the personal software process

      M. Raza and J. P. Faria

      Article first published online: 19 NOV 2015 | DOI: 10.1002/smr.1759

      Thumbnail image of graphical abstract

      This paper proposed a comprehensive performance model, addressing time estimation accuracy, quality, and productivity, to enable the automated (tool based) analysis of performance data produced by Personal Software Process (PSP) developers, namely, identify and rank performance problems and their root causes. A PSP data set referring to more than 30 000 projects was used to validate and calibrate the model.

    3. On the use of variability operations in the V-Modell XT software process line

      Marco Kuhrmann, Daniel Méndez Fernández and Thomas Ternité

      Article first published online: 30 SEP 2015 | DOI: 10.1002/smr.1751

      Thumbnail image of graphical abstract

      Variability operations are an instrument to realize flexibility in software process lines by explicitly declaring required modifications, which are applied to create a procedurally generated company-specific process. We present a study on the feasibility of variability operations in the context of the V-Modell XT. Our findings show that 69 variability operation types are defined across several metamodel versions, which allow for systematically modifying process content and structure and help process engineers to compensate process metamodel evolution.

VIEW

  1. 1 - 8

SEARCH

SEARCH BY CITATION