ACM DL

Software Engineering and Methodology (TOSEM)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Software Engineering and Methodology (TOSEM) - Special Issue International Conference on Software Engineering (ICSE 2012) and Regular Papers, Volume 23 Issue 4, August 2014

Editorial
David S. Rosenblum
Article No.: 27
DOI: 10.1145/2656368

Introduction to the Special Issue International Conference on Software Engineering (ICSE 2012)
Gail C. Murphy, Mauro Pezzé
Article No.: 28
DOI: 10.1145/2658849

Automated Detection of Client-State Manipulation Vulnerabilities
Anders Møller, Mathias Schwarz
Article No.: 29
DOI: 10.1145/2531921

Web application programmers must be aware of a wide range of potential security risks. Although the most common pitfalls are well described and categorized in the literature, it remains a challenging task to ensure that all guidelines are...

DIG: A Dynamic Invariant Generator for Polynomial and Array Invariants
Thanhvu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest
Article No.: 30
DOI: 10.1145/2556782

This article describes and evaluates DIG, a dynamic invariant generator that infers invariants from observed program traces, focusing on numerical and array variables. For numerical invariants, DIG supports both nonlinear equalities and...

On the Comprehension of Program Comprehension
Walid Maalej, Rebecca Tiarks, Tobias Roehm, Rainer Koschke
Article No.: 31
DOI: 10.1145/2622669

Research in program comprehension has evolved considerably over the past decades. However, only little is known about how developers practice program comprehension in their daily work. This article reports on qualitative and quantitative research...

Amplifying Tests to Validate Exception Handling Code: An Extended Study in the Mobile Application Domain
Pingyu Zhang, Sebastian Elbaum
Article No.: 32
DOI: 10.1145/2652483

Validating code handling exceptional behavior is difficult, particularly when dealing with external resources that may be noisy and unreliable, as it requires (1) systematic exploration of the space of exceptions that may be thrown by the external...

Section: 1 - Regular Papers

Some Code Smells Have a Significant but Small Effect on Faults
Tracy Hall, Min Zhang, David Bowes, Yi Sun
Article No.: 33
DOI: 10.1145/2629648

We investigate the relationship between faults and five of Fowler et al.'s least-studied smells in code: Data Clumps, Switch Statements, Speculative Generality, Message Chains, and Middle Man. We developed a tool to detect these five smells in...

Scaling Up Symbolic Analysis by Removing Z-Equivalent States
Yueqi Li, S. C. Cheung, Xiangyu Zhang, Yepang Liu
Article No.: 34
DOI: 10.1145/2652484

Path explosion is a major issue in applying path-sensitive symbolic analysis to large programs. We observe that many symbolic states generated by the symbolic analysis of a procedure are indistinguishable to its callers. It is, therefore, possible...

Peer Review on Open-Source Software Projects: Parameters, Statistical Models, and Theory
Peter C. Rigby, Daniel M. German, Laura Cowen, Margaret-Anne Storey
Article No.: 35
DOI: 10.1145/2594458

Peer review is seen as an important quality-assurance mechanism in both industrial development and the open-source software (OSS) community. The techniques for performing inspections have been well studied in industry; in OSS development, software...