Results 1 - 10
of
1,943
Automated Detection of Likely Design Flaws in Layered Architectures
"... Layered architecture prescribes a good principle for sep-arating concerns to make systems more maintainable. One example of such layered architectures is the separation of classes into three groups: Boundary, Control, and Entity, which are referred to as the three analysis class stereo-types in UML. ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
of classes are often missing, thus detection of design flaws becomes non-trivial. In this paper, we provide a framework that automatically labels classes as Boundary, Control, or Entity, and detects design flaws of the rules associated with each stereotype. Our evaluation with programs developed by both
Detection strategies: Metrics-based rules for detecting design flaws
- In Proc. IEEE International Conference on Software Maintenance
, 2004
"... In order to support the maintenance of an objectoriented software system, the quality of its design must be evaluated using adequate quantification means. In spite of the current extensive use of metrics, if used in isolation metrics are oftentimes too fine grained to quantify comprehensively an inv ..."
Abstract
-
Cited by 105 (6 self)
- Add to MetaCart
principles and heuristics. Using detection strategies an engineer can directly localize classes or methods affected by a particular design flaw (e.g., God Class), rather than having to infer the real design problem from a large set of abnormal metric values. We have defined such detection strategies
Using History Information to Improve Design Flaws Detection
- CSMR 2004: 8TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING
, 2004
"... As systems evolve and their structure decays, maintainers need accurate and automatic identification of the design problems. Current approaches for automatic detection of design problems are not accurate enough because they analyze only a single version of a system and consequently they miss essenti ..."
Abstract
-
Cited by 43 (9 self)
- Add to MetaCart
essential information as design problems appear and evolve over time. Our approach is to use the historical information of the suspected flawed structure to increase the accuracy of the automatic problem detection. Our means is to define measurements which summarize how persistent the problem was and how
Detecting Design Flaws via Metrics in Object-Oriented Systems
- In Proceedings of TOOLS
, 2001
"... The industry is nowadays confronted with large-scale monolithic and inflexible object-oriented software. Because of their high business value, these legacy systems must be reengineered. One of the important issues in reengineering is the detection and location of the design flaws, which prevent an e ..."
Abstract
-
Cited by 33 (5 self)
- Add to MetaCart
The industry is nowadays confronted with large-scale monolithic and inflexible object-oriented software. Because of their high business value, these legacy systems must be reengineered. One of the important issues in reengineering is the detection and location of the design flaws, which prevent
Analyzing Websites for User-Visible Security Design Flaws ABSTRACT
"... An increasing number of people rely on secure websites to carry out their daily business. A survey conducted by Pew Internet states 42 % of all internet users bank online. Considering the types of secure transactions being conducted, businesses are rigorously testing their sites for security flaws. ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
. In spite of this testing, some design flaws still remain that prevent secure usage. In this paper, we examine the prevalence of user-visible security design flaws by looking at sites from 214 U.S. financial institutions. We specifically chose financial websites because of their high security requirements
Strategy Based Elimination of Design Flaws in Object-Oriented Systems
"... Due to frequent requirements changes, extensions of functionality, as well as continuous adaptation to changing environments, the designs of large software systems continually degrade. In the context of object--oriented software restructuring, we show that there is still an important gap between ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
the design flaw detection and correction phases, as well as an acute lack of rigorously defined correction methodologies and appropriate tools. In this paper, we state a number of important criteria that have to be fulfilled by any such approach. The novel notion of "correction strategy
Shielding against Design Flaws with Field Repairable Control Logic
- Control Logic”, Proc. Design Automation Conference (DAC
, 2006
"... Correctness is a paramount attribute of any microprocessor design; however, without novel technologies to tame the increasing complexity of design verification, the amount of bugs that escape into silicon will only grow in the future. In this paper, we propose a novel hardware patching mechanism tha ..."
Abstract
-
Cited by 21 (7 self)
- Add to MetaCart
-verified degraded performance mode, once a ”match ” occurs. When the instructions exposing the design flaw are committed, the processor is switched back to normal mode. We show that our approach can detect and correct infrequently-occurring errors with almost no performance impact and has approximately 2 % area
Applying Frequent Sequence Mining to Identify Design Flaws in Enterprise Software Systems
- In Proceedings 5th International Conference on Machine Learning and Data Mining (poster track
, 2007
"... Abstract. In this paper we show how frequent sequence mining (FSM) can be applied to data produced by monitoring distributed enterprise applications. In particular we show how we applied FSM to run-time paths to highlight repeating sequences of interest by using alternative support counting techniqu ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
techniques. We show how the patterns identified, can be used to highlight design flaws in enterprise applications. We also discuss some algorithm scalability problems related to applying FSM to run-time paths and give solutions to these issues. 1
Results 1 - 10
of
1,943