Software product quality control Dr. Stefan Wagner Dr. Florian Deißenböck Technische Universität München
|
|
- Eustacia Warren
- 6 years ago
- Views:
Transcription
1 Tool-supported Software product quality control Dr. Stefan Wagner Dr. Florian Deißenböck Technische Universität München Google Developer Day Munich November 9, 2010
2 Continuous Quality Control Quality Model Quality Dashboards F. Deißenböck, Continuous Quality Control of Long-Lived Software Systems, 2009
3 Challenges Customizability, Extensibility Allow tailoring to project-specific needs for precision and relevance Aggregation and Visualization Minimize Time for result comprehension Trend Analysis Capture development over time and make improvements tangible Diversity of analyzed artifacts Allow analysis of relevant artifacts beyond code (Models, DB, ) Autonomous operation, Performance, Scalability Allow regular, automated execution for timely result data
4 ConQAT Graphical DSL to specify analysis configuration Processors perform analysis operations Edges describe data flow between processors Blocks make configuration fragments reusable
5 ConQAT ConQAT Engine Executes analysis configurations cq.edit arch.edit Clone Inspector Clone Detective for VS.NET Performs Type Checking Performs Caching (Files, ConQAT Engine Tokens, Ast Fragments, ) Runs in Batch mode Clone Detection Arch. Analysis Html Presentation ConQAT Bundles (=Plugins) Implement actual analyses as libraries of processors and blocks Can be developed and deployed independently of ConQAT
6 Architecture Conformance Analysis Goal: Discover Architecture violations Gaps in Arch. Doc. Motivation Program Comprehension Impact-Analysis Approach Documentation as development artifact Automated Conformance analysis F. Deißenböck et al., Flexible Architecture Conformance Assessment with ConQAT, 2010
7 Feilkas et al. Loss of Architectural Knowledge during System Evolution, ICPC 2009
8 Tailorable Clone Detection Java, C#, C/C++, VB, Cobol, PL/I, Words or Lines Shapers Ungapped Clones Gapped Clones Filtering, Blacklisting Metric Computation XML Report Trends Dashboard (+Visualizations)
9 Jürgens et al. CloneDetective A Workbench for Clone Detection Research, ICSE 2009
10 Clone Detection Storage load visualize tokenize & normalize extract clones find duplicates
11 Index-Based Clone Detection Google MapReduce Google BigTable Google MapReduce Source Code create/update Clone Index retrieve clones B. Hummel et al., Index-Based Code Clone Detection: Incremental, Distributed, Scalable, 2010
12 Distributed Dection Google Infrastructure: MapReduce for distributing computing tasks Bigtable for storing index 73.2 MLOC of Open Source code (C/C++/Java)* Procedure: Determine running time on 10, 20, 50, 80, 100 machines *All figures about source code in this talk refer to open source code and not to Google s code base.
13
14 Ultra-large Scale Clone Detection Code base 120 million C/C++ files 2,915,947,163 Lines of code Open source code from the index of Google Code Search Relevant use case: copyright infringement analysis Reporting all clones is useless Only the index creation was evaluated Index creation on 1000 machines took less than 7 hours real scalability
15 Visualization
16 ConQAT in Industry Development support: output integrated into project dashboards. Monitoring of SW developed by subcontractors. Quality control of software developed at multiple globally distributed sites. Clone Detection on Matlab/Simulink. Part of quality assurance criteria at quality gates. Used during one-shot quality assessments. Applied for continuous control of C++ & PL/SQL Code
17 Summary ConQAT is about integration of diverse analyses, allowing tailoring to project specific questions for continuous quality assessment ConQAT has been released under Apache License Commercial support for ConQAT: Contact:
Flexible Architecture Conformance Assessment with ConQAT
Flexible Architecture Conformance Assessment with ConQAT Florian Deissenboeck, Lars Heinemann, Benjamin Hummel, Elmar Juergens Technische Universität München ICSE 2010 Cape Town Software Architecture Software
More informationManagement. Software Quality. Dr. Stefan Wagner Technische Universität München. Garching 28 May 2010
Technische Universität München Software Quality Management Dr. Stefan Wagner Technische Universität München Garching 28 May 2010 Some of these slides were adapted from the tutorial "Clone Detection in
More informationNatural Language Processing Is No Free Lunch
Natural Language Processing Is No Free Lunch STEFAN WAGNER UNIVERSITY OF STUTTGART, STUTTGART, GERMANY ntroduction o Impressive progress in NLP: OS with personal assistants like Siri or Cortan o Brief
More informationDemystifying Maintainability
1 Manfred Broy, Florian Deißenböck, Markus Pizka Demystifying Maintainability May 21 st 2006 WoSQ 06 Shanghai 2 Outline Relevance Maintainability Metrics, Conventions, Models Quality Matrix Incremental
More informationAbstractness, Specificity, and Complexity in Software Design
Abstractness, Specificity, and Complexity in Software Design Stefan Wagner and Florian Deißenböck Technische Universität München, Germany Florian Deißenböck ROA, 11.05.2008 Fakultät für Informatik Lehrstuhl
More informationThe Loss of Architectural Knowledge during System Evolution: An Industrial Case Study
The Loss of Architectural Knowledge during System Evolution: An Industrial Case Study Martin Feilkas and Daniel Ratiu and Elmar Jürgens Institut für Informatik Technische Universität München Boltzmannstr.
More informationIBM Software IBM InfoSphere Information Server for Data Quality
IBM InfoSphere Information Server for Data Quality A component index Table of contents 3 6 9 9 InfoSphere QualityStage 10 InfoSphere Information Analyzer 12 InfoSphere Discovery 13 14 2 Do you have confidence
More informationSourcererCC -- Scaling Code Clone Detection to Big-Code
SourcererCC -- Scaling Code Clone Detection to Big-Code What did this paper do? SourcererCC a token-based clone detector, that can detect both exact and near-miss clones from large inter project repositories
More informationMagento Marketplace's New Extension Quality Program
Magento Marketplace's New Extension Quality Program Erika Talbott Product Manager - Marketplace J Ravi Menon Architect - Marketplace Tom Erskine Lead Engineer - MFTF Overview Erika Talbott Marketplace
More informationAPIs Economy for Mainframe Customers: A new approach for modernizing and reusing mainframe assets
Contact us: ZIO@hcl.com APIs Economy for Mainframe Customers: A new approach for modernizing and reusing mainframe assets www.zio-community.com Meet Our Experts and Learn the Latest News Copyright 2018
More informationApplication Discovery and Enterprise Metadata Repository solution Questions PRIEVIEW COPY ONLY 1-1
Application Discovery and Enterprise Metadata Repository solution Questions 1-1 Table of Contents SECTION 1 ENTERPRISE METADATA ENVIRONMENT...1-1 1.1 TECHNICAL ENVIRONMENT...1-1 1.2 METADATA CAPTURE...1-1
More informationDCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code Junaid Akram (Member, IEEE), Zhendong Shi, Majid Mumtaz and Luo Ping State Key Laboratory of Information Security,
More informationPlatform Architecture Overview
Platform Architecture Overview Platform overview How-to example Platform components detailed Mediation infrastructure VAS USER container Architecture: overall Backend platform Container Persistence External
More informationMigrating massive monitoring to Bigtable without downtime. Martin Parm, Infrastructure Engineer for Monitoring
Migrating massive monitoring to Bigtable without downtime Martin Parm, Infrastructure Engineer for Monitoring This is a big deal. -- Nicholas Harteau/VP, Engineering & Infrastructure https://news.spotify.com/dk/2016/02/23/announcing-spotify-infrastructures-googley-future/
More informationE : Web Application Servers. Architecture and Design
E6998-04: Web Application Servers Dr. Donald F. Ferguson, IBM Fellow Chief Architect, IBM Software Group dff@us.ibm.com, or donff2@aol.com BLOG: http://www.ibm.com/developerworks/blogs/page/donferguson
More informationAn Exploratory Study on Interface Similarities in Code Clones
1 st WETSoDA, December 4, 2017 - Nanjing, China An Exploratory Study on Interface Similarities in Code Clones Md Rakib Hossain Misu, Abdus Satter, Kazi Sakib Institute of Information Technology University
More informationJ2EE Application Development with WebSphere Studio
. J2EE Application Development with WebSphere Studio page 2 IBM Application Development Vision Delivering a rapid and efficient response to business needs through a powerful development and deployment
More informationSOCCI Training. SOCCI: Science Operations Configuration Control Infrastructure. Vicente Navarro Fernando Perez Kaarel Hanson Kaarel Lumi
SOCCI: Science Operations Configuration Control Infrastructure SOCCI Training Vicente Navarro Fernando Perez Kaarel Hanson Kaarel Lumi 18&19 January 2018 SOCCI ADVANCED Topics and Schedule 1. Requirement
More informationwebmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse
December 2008 webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse By Chris Pottinger, Sr. Manager Product Development, and Juergen Lind, Sr. Product
More informationSOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE
SOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE Tomas Cerny, Software Engineering, FEE, CTU in Prague, 2014 1 ARCHITECTURES SW Architectures usually complex Often we reduce the abstraction
More information1. Which programming language is used in approximately 80 percent of legacy mainframe applications?
Volume: 59 Questions 1. Which programming language is used in approximately 80 percent of legacy mainframe applications? A. Visual Basic B. C/C++ C. COBOL D. Java Answer: C 2. An enterprise customer's
More informationWhat s a BA to do with Data? Discover and define standard data elements in business terms
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data
More informationLotus Exam IBM Websphere Portal 6.1 Application Development Version: 5.0 [ Total Questions: 150 ]
s@lm@n Lotus Exam 190-959 IBM Websphere Portal 6.1 Application Development Version: 5.0 [ Total Questions: 150 ] Topic 0, A A Question No : 1 - (Topic 0) A large motorcycle manufacturer has an internet
More informationA Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique
A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique 1 Syed MohdFazalulHaque, 2 Dr. V Srikanth, 3 Dr. E. Sreenivasa Reddy 1 Maulana Azad National Urdu University, 2 Professor,
More informationCisco Unified Service Statistics Manager 8.7
Deployment Guide Cisco Unified Service Statistics Manager 8.7 Deployment Best Practices For further information, questions and comments please contact ask-ucms@cisco.com 2012 Cisco and/or its affiliates.
More informationChristoph Doblander. Joint work with: Christoph Goebel, Hans-Arno Jacobsen
Smart Grid Simulation 3rd Colloquium of the Munich School of Engineering: Research Towards Innovative Energy Systems and Materials Garching, 04.07.2013 Christoph Doblander Joint work with: Christoph Goebel,
More informationCompositional Model Based Software Development
Compositional Model Based Software Development Prof. Dr. Bernhard Rumpe http://www.se-rwth.de/ Seite 2 Our Working Groups and Topics Automotive / Robotics Autonomous driving Functional architecture Variability
More informationImproving Security in the Application Development Life-cycle
Improving Security in the Application Development Life-cycle Migchiel de Jong Software Security Engineer mdejong@fortifysoftware.com March 9, 2006 General contact: Jurgen Teulings, 06-30072736 jteulings@fortifysoftware.com
More informationToad for Oracle Suite 2017 Functional Matrix
Toad for Oracle Suite 2017 Functional Matrix Essential Functionality Base Xpert Module (add-on) Developer DBA Runs directly on Windows OS Browse and navigate through objects Create and manipulate database
More informationCustom Code Rules Deep Dive
Custom Code Rules Deep Dive IDz/RDz Software Analyzer Jon Gellin, Senior Software Engineer 24 October 2017 What we will not be talking about What is IDz/RDz? What are code rules? Why would I want to use
More informationUnifying Big Data Workloads in Apache Spark
Unifying Big Data Workloads in Apache Spark Hossein Falaki @mhfalaki Outline What s Apache Spark Why Unification Evolution of Unification Apache Spark + Databricks Q & A What s Apache Spark What is Apache
More informationCOMP9321 Web Application Engineering
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 12 (Wrap-up) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411
More informationLeveraging the Social Web for Situational Application Development and Business Mashups
Leveraging the Social Web for Situational Application Development and Business Mashups Stefan Tai stefan.tai@kit.edu www.kit.edu About the Speaker: Stefan Tai Professor, KIT (Karlsruhe Institute of Technology)
More informationCOMP9321 Web Application Engineering
COMP9321 Web Application Engineering Semester 1, 2017 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 12 (Wrap-up) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2457
More informationEuropeana DSI 2 Access to Digital Resources of European Heritage
Europeana DSI 2 Access to Digital Resources of European Heritage MILESTONE Revision 1.0 Date of submission 28.04.2017 Author(s) Krystian Adamski, Tarek Alkhaeir, Marcin Heliński, Aleksandra Nowak, Marcin
More informationInternational Journal of Scientific & Engineering Research, Volume 8, Issue 2, February ISSN
International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February-2017 164 DETECTION OF SOFTWARE REFACTORABILITY THROUGH SOFTWARE CLONES WITH DIFFRENT ALGORITHMS Ritika Rani 1,Pooja
More informationMicrosoft Azure Databricks for data engineering. Building production data pipelines with Apache Spark in the cloud
Microsoft Azure Databricks for data engineering Building production data pipelines with Apache Spark in the cloud Azure Databricks As companies continue to set their sights on making data-driven decisions
More informationSoftware Quality Understanding by Analysis of Abundant Data (SQUAAD)
Software Quality Understanding by Analysis of Abundant Data (SQUAAD) By Pooyan Behnamghader Advisor: Barry Boehm ARR 2018 March 13, 2018 1 Outline Motivation Software Quality Evolution Challenges SQUAAD
More informationIntroduction to Eclipse
Introduction to Eclipse Getting started with Eclipse 05/02/2010 Prepared by Chris Panayiotou for EPL 233 1 What is Eclipse? o Eclipse is an open source project http://www.eclipse.org Consortium of companies,
More informationOverview of Cisco Prime Collaboration Assurance and Analytics Business
Overview of Cisco Prime Collaboration Assurance and Analytics Business Cisco Prime Collaboration Assurance and Analytics Business is a monitoring and data analytics management application system that allows
More informationTowards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley
Towards Practical Differential Privacy for SQL Queries Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Outline 1. Discovering real-world requirements 2. Elastic sensitivity & calculating sensitivity
More informationHow to choose the right approach to analytics and reporting
SOLUTION OVERVIEW How to choose the right approach to analytics and reporting A comprehensive comparison of the open source and commercial versions of the OpenText Analytics Suite In today s digital world,
More informationWeb Engineering. Introduction. Husni
Web Engineering Introduction Husni Husni@trunojoyo.ac.id Outline What is Web Engineering? Evolution of the Web Challenges of Web Engineering In the early days of the Web, we built systems using informality,
More informationCS 6V Using Reverse Engineering Practices to Improve Systems-of-Systems Understanding. Tom Hill
CS 6V81-05 Using Reverse Engineering Practices to Improve Systems-of-Systems Understanding Tom Hill Department of Computer Science The University of Texas at Dallas November 11 th, 2011 Outline Research
More informationOutline. Problem statement
Outline CS 6V81-05 Using Reverse Engineering Practices to Improve Systems-of-Systems Understanding Tom Hill Department of Computer Science The University of Texas at Dallas November 11 th, 2011 Research
More informationCIS-CAT Pro Dashboard Documentation
CIS-CAT Pro Dashboard Documentation Release 1.0.0 Center for Internet Security February 03, 2017 Contents 1 CIS-CAT Pro Dashboard User s Guide 1 1.1 Introduction...............................................
More informationA Weighted Layered Approach for Code Clone Detection
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationData Breach Risk Scanning and Reporting
Data Breach Risk Scanning and Reporting 2017. SolarWinds. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document
More informationRAMCloud. Scalable High-Performance Storage Entirely in DRAM. by John Ousterhout et al. Stanford University. presented by Slavik Derevyanko
RAMCloud Scalable High-Performance Storage Entirely in DRAM 2009 by John Ousterhout et al. Stanford University presented by Slavik Derevyanko Outline RAMCloud project overview Motivation for RAMCloud storage:
More informationMARKETO CHECKLIST. All users are setup within Marketo with the appropriate roles and permissions.
Setup Users & Roles All users are setup within Marketo with the appropriate roles and permissions. Smart Campaign Settings Limit set to abort smart campaigns if number of qualified leads exceeds this limit
More informationCross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes
Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes 1 K. Vidhya, 2 N. Sumathi, 3 D. Ramya, 1, 2 Assistant Professor 3 PG Student, Dept.
More informationIBM WebSphere Studio Asset Analyzer, Version 5.1
Helping you quickly understand, enhance and maintain enterprise applications IBM, Version 5.1 Highlights n Provides interactive textual n Helps shorten the learning curve and graphic reports that help
More informationIBM Rational Developer for System z Version 7.5
Providing System z developers with tools for building traditional and composite applications in an SOA and Web 2.0 environment IBM Rational Developer for System z Version 7.5 Highlights Helps developers
More informationASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS
ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ABSTRACT Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may
More informationChapter 1 GETTING STARTED. SYS-ED/ Computer Education Techniques, Inc.
Chapter 1 GETTING STARTED SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: WSAD. J2EE business topologies. Workbench. Project. Workbench components. Java development tools. Java projects
More informationUtilizing Web Search Engines for Program Analysis
Utilizing Web Search Engines for Program Analysis Daniel Ratiu, Lars Heinemann Technische Universität München ICPC 2010, Braga Object-Oriented Software Construction [B. Meyer] Many objects are there just
More informationComputation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):
viii Preface The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information
More informationFREQUENTLY ASKED QUESTIONS
Borland Together FREQUENTLY ASKED QUESTIONS GENERAL QUESTIONS What is Borland Together? Borland Together is a visual modeling platform that enables software teams to consistently deliver on-time, high
More informationA Measurement of Similarity to Identify Identical Code Clones
The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 735 A Measurement of Similarity to Identify Identical Code Clones Mythili ShanmughaSundaram and Sarala Subramani Department
More informationJetBrains TeamCity Comparison
JetBrains TeamCity Comparison TeamCity is a continuous integration and continuous delivery server developed by JetBrains. It provides out-of-the-box continuous unit testing, code quality analysis, and
More informationFundamentals of Stream Processing with Apache Beam (incubating)
Google Docs version of slides (including animations): https://goo.gl/yzvlxe Fundamentals of Stream Processing with Apache Beam (incubating) Frances Perry & Tyler Akidau @francesjperry, @takidau Apache
More informationDatameer for Data Preparation:
Datameer for Data Preparation: Explore, Profile, Blend, Cleanse, Enrich, Share, Operationalize DATAMEER FOR DATA PREPARATION: EXPLORE, PROFILE, BLEND, CLEANSE, ENRICH, SHARE, OPERATIONALIZE Datameer Datameer
More informationEnterprise Manager: Scalable Oracle Management
Session id:xxxxx Enterprise Manager: Scalable Oracle John Kennedy System Products, Server Technologies, Oracle Corporation Enterprise Manager 10G Database Oracle World 2003 Agenda Enterprise Manager 10G
More informationRochester Institute of Technology. Making personalized education scalable using Sequence Alignment Algorithm
Rochester Institute of Technology Making personalized education scalable using Sequence Alignment Algorithm Submitted by: Lakhan Bhojwani Advisor: Dr. Carlos Rivero 1 1. Abstract There are many ways proposed
More informationCisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
More informationSoftware Clone Detection and Refactoring
Software Clone Detection and Refactoring Francesca Arcelli Fontana *, Marco Zanoni *, Andrea Ranchetti * and Davide Ranchetti * * University of Milano-Bicocca, Viale Sarca, 336, 20126 Milano, Italy, {arcelli,marco.zanoni}@disco.unimib.it,
More informationJ2EE Application Development : Conversion and Beyond Osmond Ng
IBM Software Group J2EE Application Development : Conversion and Beyond Osmond Ng IBM Software Group Practitioner View Point IBM Rational Application Developer J2EE/EJB Tooling J2EE construction tools
More informationOracle Fusion Middleware 11g: Build Applications with ADF Accel
Oracle University Contact Us: +352.4911.3329 Oracle Fusion Middleware 11g: Build Applications with ADF Accel Duration: 5 Days What you will learn This is a bundled course comprising of Oracle Fusion Middleware
More informationCisco Configuration Engine 2.0
Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes
More informationArchitecture-driven development of Climate Control Software LMS Imagine.Lab Embedded Software Designer Siemens DF PL
Architecture-driven development of Climate Control Software LMS Imagine.Lab Embedded Software Designer Siemens DF PL Restricted Siemens AG 2017 Realize innovation. Content 1 Overview 3 2 LMS Imagine.Lab
More informationMining Ultra-Large-Scale Software Repositories with. Boa
Mining Ultra-Large-Scale Software Repositories with Boa Robert Dyer, Hoan Nguyen, Hridesh Rajan, and Tien Nguyen {rdyer,hoan,hridesh,tien}@iastate.edu Iowa State University The research and educational
More informationIBM Software Configuration Library Manager Advanced Edition for z/os, Version 1.2
Streamlining z/os application development processes and package approvals IBM Software Configuration Library Manager Advanced Edition for z/os, Version 1.2 Highlights Provides a cost-effective and fully
More informationicp Overview icp V3.5 November, 2009
icp Overview icp V3.5 November, 2009 Part No. J00-0-315-01 Copyright ebaotech 2009. All Rights Reserved. Disclaimer No part of this document may be reproduced in any form without the written permission
More informationA Model-Driven JSON Editor
A Model-Driven JSON Editor Lucas Köhler Master s Thesis Kickoff, 10.07.2017, Munich Advisors: Adrian Hernandez-Mendez, Dr. Jonas Helming Chair of Software Engineering for Business Information Systems (sebis)
More informationAEFP Meeting #9. September 10 th 2015
AEFP Meeting #9 September 10 th 2015 1 Agenda 2 Introduction (5 min) Review and acknowledge of approach (20 min) Questions (15 min) Next steps (20 minutes) Objective Effort on code modification Functional
More informationCombining Probabilistic Ranking and Latent Semantic Indexing for Feature Identification
Combining Probabilistic Ranking and Latent Semantic Indexing for Feature Identification Denys Poshyvanyk, Yann-Gaël Guéhéneuc, Andrian Marcus, Giuliano Antoniol, Václav Rajlich 14 th IEEE International
More informationCIB Session 12th NoSQL Databases Structures
CIB Session 12th NoSQL Databases Structures By: Shahab Safaee & Morteza Zahedi Software Engineering PhD Email: safaee.shx@gmail.com, morteza.zahedi.a@gmail.com cibtrc.ir cibtrc cibtrc 2 Agenda What is
More informationTHE API DEVELOPER EXPERIENCE ENABLING RAPID INTEGRATION
THE API DEVELOPER EXPERIENCE ENABLING RAPID INTEGRATION Ramchandar Loganathan IBS Solution Architect Banks require application programming interface (API) capabilities to realize the significant benefits
More informationTRAINING AGENDA. Session 1: Installation/Implementation/Setup. Conversion: Existing Specify 5 users New users conversion, wizard, WorkBench
SPECIFY 6 Session 1: Installation/Implementation/Setup Pre-installation decision-making process Conversion: Existing Specify 5 users New users conversion, wizard, WorkBench Installation TRAINING AGENDA
More informationUser Manual Version: 1.0.0
Template (Epic) Cloner for JIRA by Vilisoft Sp. z o.o. User Manual Version: 1.0.0 Index Release notes... 3 Introduction... 4 JIRA Administrator cases... 5 How to install... 5 How to configure... 5 New
More informationA Tree Kernel Based Approach for Clone Detection
A Tree Kernel Based Approach for Clone Detection Anna Corazza 1, Sergio Di Martino 1, Valerio Maggio 1, Giuseppe Scanniello 2 1) University of Naples Federico II 2) University of Basilicata Outline Background
More informationInternational Journal for Management Science And Technology (IJMST)
Volume 4; Issue 03 Manuscript- 1 ISSN: 2320-8848 (Online) ISSN: 2321-0362 (Print) International Journal for Management Science And Technology (IJMST) GENERATION OF SOURCE CODE SUMMARY BY AUTOMATIC IDENTIFICATION
More informationAnalyzing the Product Line Adequacy of Existing Components
Analyzing the Product Line Adequacy of Existing Components Jens Knodel and Dirk Muthig Fraunhofer Institute for Experimental Software Engineering (IESE), Fraunhofer-Platz 1, D-67663 Kaiserslautern, Germany
More informationCopyright 2014, Oracle and/or its affiliates. All rights reserved.
1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges
More informationAutomated testing in ERP using Rational Functional Tester
Automated testing in ERP using Rational Functional Tester A.Josephine Prapulla 1, Dr.L.Manjunatha Rao 2 1 Research Scholar, Bharathiar University. Coimbatore. 2 Professor and Director Dr. B. R. Ambedkar
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : C2090-305 Title : IBM InfoSphere Information Analyzer v9.1 Vendor : IBM Version : DEMO Get Latest & Valid C2090-305
More information2012 Enterprise Strategy Group. Enterprise Strategy Group Getting to the bigger truth. TM
2012 Enterprise Strategy Group Enterprise Strategy Group Getting to the bigger truth. TM Enterprise Strategy Group Getting to the bigger truth. TM Virtualization Evolution and Storage Requirements Kim
More informationWill My Tests Tell Me If I Break This Code?
2016 International Workshop on Continuous Software Evolution and Delivery Will My Tests Tell Me If I Break This Code? Rainer Niedermayr, Elmar Juergens CQSE GmbH Garching b. München, Germany {niedermayr,
More informationBuilding an Assurance Foundation for 21 st Century Information Systems and Networks
Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership
More informationIBM Business Process Management
Using the Process Center & Process Designer (Unit 7) IBM Business Process Manager V8.5 for z/os: 'ZBPM8' Workshop (Copies of this material in Techdoc PRS5204) Instructors: IBM Advanced Technical Skills
More informationChapter 3. Interactive Software Development Assistants Logic-based Software Representation. Logic-based Software Analysis
Advanced Logic Programming Summer semester 2012 R O O T S Chapter 3. Logic-based Analysis Interactive Development Assistants Logic-based Representation Logic-based Analysis Logic-based Transformation Motivation
More informationDATABASE DESIGN II - 1DL400
DATABASE DESIGN II - 1DL400 Fall 2016 A second course in database systems http://www.it.uu.se/research/group/udbl/kurser/dbii_ht16 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationInterstage Application and Service Management V10.0. Overview
Interstage Application and Service Management V10.0 Overview B1WD-2471-01ENZ0(00) October 2008 Trademarks Interstage and Enabler are trademarks of Fujitsu Limited in Japan and/or other countries. Java
More informationKnowledge Discovery: How to Reverse-Engineer Legacy Systems
Knowledge Discovery: How to Reverse-Engineer Legacy Systems Hugo Bruneliere, Frédéric Madiot INRIA & MIA-Software 1 Context of this work Knowledge Discovery: How To Reverse-Engineer Legacy Sytems The present
More informationIntegrate MATLAB Analytics into Enterprise Applications
Integrate Analytics into Enterprise Applications Dr. Roland Michaely 2015 The MathWorks, Inc. 1 Data Analytics Workflow Access and Explore Data Preprocess Data Develop Predictive Models Integrate Analytics
More informationColumn Stores and HBase. Rui LIU, Maksim Hrytsenia
Column Stores and HBase Rui LIU, Maksim Hrytsenia December 2017 Contents 1 Hadoop 2 1.1 Creation................................ 2 2 HBase 3 2.1 Column Store Database....................... 3 2.2 HBase
More informationBIG DATA TESTING: A UNIFIED VIEW
http://core.ecu.edu/strg BIG DATA TESTING: A UNIFIED VIEW BY NAM THAI ECU, Computer Science Department, March 16, 2016 2/30 PRESENTATION CONTENT 1. Overview of Big Data A. 5 V s of Big Data B. Data generation
More informationIBM Europe Announcement ZP , dated November 6, 2007
IBM Europe Announcement ZP07-0484, dated November 6, 2007 IBM WebSphere Front Office for Financial Markets V2.0 and IBM WebSphere MQ Low Latency Messaging V2.0 deliver high speed and high throughput market
More information<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g
Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Exadata Overview Oracle Exadata Database Machine Extreme ROI Platform Fast Predictable Performance Monitor
More information