This document summarizes a seminar presentation about using a seismology-inspired approach to study change propagation in software. The approach models software changes as "earthquakes" that propagate through relationships between classes. It identifies important classes, class levels based on dependencies, and impacted classes based on historical co-changes. Important classes are identified using metrics like PageRank. Change propagation is then modeled based on these class dependencies and co-changes.
This document presents an exploratory study of macro co-changes in software projects. The study examines changes to source code files over time to identify files that frequently change together, even if not always changed by the same developer or in the same commit. It introduces the concept of "macro co-changes" to capture files changed together across different change periods. The study also presents an approach called Macocha that mines version control systems to detect change periods, construct file change profiles, analyze file stability, and identify files with similar macro co-change patterns.
FIWARE provides an open source platform for building smart applications and solutions. Their profile on SlideShare contains information about FIWARE and what it offers users who want to learn more. Visitors to the profile page at www.slideshare.net/FI-WARE can access details on how FIWARE enables the development of smart applications and solutions.
SVM Global_A Detailed Look At Our Services.PPTXWendy Imisson
This document provides an overview of SVM Global, a leading provider of corporate gift cards, e-codes, and gift vouchers. It summarizes their history and growth, portfolio of 500+ brands, quality accreditations, and suite of fulfillment solutions including bulk fulfillment, individual fulfillment, and voluntary benefits. It highlights key features such as secure ordering and delivery, dedicated support, and the ability to customize solutions. The document also discusses personalization options, considerations around lost or stolen cards, and their Bravo rewards platform for managing redemption programs.
1. The document discusses a Synchronal Matrix program where members can earn $5 monthly residuals for every personal sale they make to infinity, as well as when those sales renew their monthly subscriptions.
2. Members also earn ongoing residuals from the first two upgraded members of everyone in their first two coded legs, which can grow unlimitedly with $5 coded bonuses to infinity.
3. Any time a personally sponsored member earns a $5 coded bonus, the sponsor receives a 100% matching coded bonus.
This document advertises a luxurious home for sale in the center of Jakarta, Indonesia. The home is located in the heart of Jakarta near many business and lifestyle centers, providing an ideal location. It offers amenities like a barbecue area, pond, garden, jogging track, and restaurants on site. Floor plans show options for studio, one bedroom, and two bedroom units, some with additional studies. The property is described as a sanctuary and escape from busy life, reimagined living in the heart of Jakarta.
This document describes a compensation plan for selling a product that provides ringless voice mail drops directly to prospects without ringing their phones. The plan pays $15-$20 per month residually for each product sold, with income increasing based on additional sales and referrals made. Selling the third product starts an additional "coded bonus leg" that pays $20 per month, and the first two referrals from additional legs pay $20 per month as well.
Biology - Chp 10 - Cell Growth And Reproduction - PowerPointMel Anthony Pepito
This document discusses cell growth and reproduction, explaining that cells divide through the cell cycle of interphase and mitosis in order to replace old or damaged cells. It describes the stages of the cell cycle and mitosis, including how chromosomes are replicated and separated, as well as factors that regulate the cell cycle such as cyclins and growth factors. The document also covers cell division, cancer, and efforts to understand and potentially cure cancer by repairing defects in genes that control the normal cell cycle, such as the p53 gene.
The document discusses the history and current state of software engineering and its application to IoT systems. It notes that 50 years after the earliest software projects, issues still include cost overruns, property damage, risks to life and death, and challenges ensuring quality. For IoT, fragmentation across hardware, software, APIs and standards poses significant problems. The document proposes that research into IoT software engineering could help address these issues through approaches like developing software to run across diverse IoT platforms, and automatically miniaturizing software through techniques like multi-objective optimization to suit different IoT device capabilities.
This document presents an exploratory study of macro co-changes in software projects. The study examines changes to source code files over time to identify files that frequently change together, even if not always changed by the same developer or in the same commit. It introduces the concept of "macro co-changes" to capture files changed together across different change periods. The study also presents an approach called Macocha that mines version control systems to detect change periods, construct file change profiles, analyze file stability, and identify files with similar macro co-change patterns.
FIWARE provides an open source platform for building smart applications and solutions. Their profile on SlideShare contains information about FIWARE and what it offers users who want to learn more. Visitors to the profile page at www.slideshare.net/FI-WARE can access details on how FIWARE enables the development of smart applications and solutions.
SVM Global_A Detailed Look At Our Services.PPTXWendy Imisson
This document provides an overview of SVM Global, a leading provider of corporate gift cards, e-codes, and gift vouchers. It summarizes their history and growth, portfolio of 500+ brands, quality accreditations, and suite of fulfillment solutions including bulk fulfillment, individual fulfillment, and voluntary benefits. It highlights key features such as secure ordering and delivery, dedicated support, and the ability to customize solutions. The document also discusses personalization options, considerations around lost or stolen cards, and their Bravo rewards platform for managing redemption programs.
1. The document discusses a Synchronal Matrix program where members can earn $5 monthly residuals for every personal sale they make to infinity, as well as when those sales renew their monthly subscriptions.
2. Members also earn ongoing residuals from the first two upgraded members of everyone in their first two coded legs, which can grow unlimitedly with $5 coded bonuses to infinity.
3. Any time a personally sponsored member earns a $5 coded bonus, the sponsor receives a 100% matching coded bonus.
This document advertises a luxurious home for sale in the center of Jakarta, Indonesia. The home is located in the heart of Jakarta near many business and lifestyle centers, providing an ideal location. It offers amenities like a barbecue area, pond, garden, jogging track, and restaurants on site. Floor plans show options for studio, one bedroom, and two bedroom units, some with additional studies. The property is described as a sanctuary and escape from busy life, reimagined living in the heart of Jakarta.
This document describes a compensation plan for selling a product that provides ringless voice mail drops directly to prospects without ringing their phones. The plan pays $15-$20 per month residually for each product sold, with income increasing based on additional sales and referrals made. Selling the third product starts an additional "coded bonus leg" that pays $20 per month, and the first two referrals from additional legs pay $20 per month as well.
Biology - Chp 10 - Cell Growth And Reproduction - PowerPointMel Anthony Pepito
This document discusses cell growth and reproduction, explaining that cells divide through the cell cycle of interphase and mitosis in order to replace old or damaged cells. It describes the stages of the cell cycle and mitosis, including how chromosomes are replicated and separated, as well as factors that regulate the cell cycle such as cyclins and growth factors. The document also covers cell division, cancer, and efforts to understand and potentially cure cancer by repairing defects in genes that control the normal cell cycle, such as the p53 gene.
The document discusses the history and current state of software engineering and its application to IoT systems. It notes that 50 years after the earliest software projects, issues still include cost overruns, property damage, risks to life and death, and challenges ensuring quality. For IoT, fragmentation across hardware, software, APIs and standards poses significant problems. The document proposes that research into IoT software engineering could help address these issues through approaches like developing software to run across diverse IoT platforms, and automatically miniaturizing software through techniques like multi-objective optimization to suit different IoT device capabilities.
1) Issue trackers are often used to track more than just bugs, including features, enhancements, and refactoring work.
2) A manual analysis found that nearly half of issues labeled as "bugs" in issue trackers were actually not bugs.
3) Relying on issue tracker labels alone can introduce significant errors into datasets used for tasks like bug prediction and severity estimation. More work is needed to clean noisy and unreliable data.
The document discusses how to derive dependency structures for legacy J2EE applications. It proposes analyzing all application tiers together using a language-independent model and parsing various artifacts. Configuration files and limited data flow analysis are used to understand dependencies. Container dependencies are explicitly codified by studying technology specifications and codifying dependency rules to apply when certain code patterns are detected in applications. This allows completing an application's dependency graph.
The document discusses the state of practices of service identification in the industry for migrating legacy systems to service-oriented architectures (SOA). It finds that while service identification is seen as important, it remains primarily a manual process focused on identifying coarse-grained business services from source code and business processes. Wrapping and clustering functionalities are common techniques. Fully automating service identification is still challenging due to the need to understand complex legacy system dependencies. The document recommends service identification be business-driven and follow proven methodologies.
This document discusses techniques for testing advanced driver assistance systems (ADAS) through physics-based simulation. It faces challenges due to the large, complex, and multidimensional test input space as well as the computational expense of simulation. The document proposes using a genetic algorithm guided by decision trees to more efficiently search for critical test cases. Classification trees are built to partition the input space into homogeneous regions in order to better guide the selection and generation of test inputs toward more critical areas.
The document reports on the findings of a survey of 45 industrial practitioners on their experiences with legacy-to-SOA migrations. The key findings include: 1) Practitioners migrate legacy systems implemented in Cobol and Java to reduce maintenance costs and improve flexibility/interoperability; 2) Identifying services is an important step but is mostly manual and business-driven; 3) The most used techniques are functionality clustering and wrapping; 4) Desired service qualities are reusability, granularity and loose coupling; 5) Identified services prioritize domain-specific over technical services; 6) RESTful services are most targeted technology.
The document investigates the impact of linguistic anti-patterns (LAs) on program comprehension. It defines LAs as bad naming, documentation, and implementation practices. A study was conducted involving 92 students assessing programs with and without LAs. The study found that LAs negatively impact understandability by increasing time and reducing correctness. Certain LAs like A2, B4, and D1 had a stronger negative effect than others like E1. The study also found that providing knowledge about LAs can help mitigate their impact by making programs easier and faster to comprehend.
The document discusses research on identifying and analyzing the impact of patterns on the quality of multi-language systems. The objectives are to collect and categorize sets of programming languages used together, detect patterns in multi-language programs to track bugs and provide best practices, and study how patterns impact quality. The contributions will be a catalog of multi-language patterns and defects, a detection tool, and analysis of patterns' effects on quality attributes. Current work includes reviewing literature on language combinations and patterns to provide recommendations for high-quality multi-language development.
This document discusses research on change impact analysis in multi-language systems. It begins by outlining recommendations for best practices when using JNI, such as passing primitive types, minimizing calls between native and Java code, and properly handling strings. It then describes a qualitative analysis of JNI usage that identified common practices and issues. Finally, it proposes future work to survey developers on applying recommendations to facilitate change impact analysis in multi-language systems.
The document summarizes a recommendation system that suggests software processes for video game projects based on similarities to past projects. The system analyzes over 100 postmortems from previous games to build a database of development processes and project contexts. It uses principal component analysis to identify similar past projects and recommends a process by combining elements from similar projects' processes. The system was evaluated both quantitatively based on correctness and coverage metrics and qualitatively through surveys and a case study with a developer team.
Will io t trigger the next software crisisPtidej Team
This document discusses how the rise of the Internet of Things (IoT) could trigger a new software crisis due to issues like fragmentation, complexity, and lack of standards. It provides a brief history of software engineering challenges over the past 50 years such as cost overruns, safety issues, and prioritizing productivity over quality. The document then examines how these same problems are emerging in the IoT context today. It argues that IoT software engineering practices need to address issues like device software, cloud/app development, and privacy in order to avoid a major crisis.
This document discusses theories related to software design patterns. It notes that while design patterns are commonly used, there is a need for more research on how they impact software quality. The document proposes several areas for developing theories, including systematically categorizing existing patterns based on underlying principles, combining principles to identify new patterns, and developing theories of patterns from developer behavior and for building software systems. Formalizing patterns and identifying their relationships could help teaching and understanding of patterns.
Laleh M. Eshkevari defended her Ph.D dissertation on developing techniques for the automatic detection and classification of identifier renamings in software projects. Her dissertation outlined a taxonomy of renamings, described approaches for renaming detection based on line mapping, entity mapping and data flow analysis, and discussed methods for classifying renamings based on their form and semantic changes. Evaluation of the approaches on several open source projects showed high precision and recall for renaming detection and identified trends in how renamings are used in practice.
1) The document analyzes the co-occurrence of code smells like anti-patterns and clones in software systems and their impact on fault-proneness.
2) It finds that over 50% of classes with anti-patterns also have clones, and 59-78% of classes with clones also participate in anti-patterns.
3) Classes with both anti-patterns and clones are significantly more fault-prone than other classes, with the risk of faults being at least 7 times higher in one system studied.
Trustrace is an approach that uses software repository links like SVN commits to improve the trust in automatically recovered traceability links between requirements and code. It calculates an initial trust value for links based on IR techniques like VSM, and then reweights the links based on additional information from the software repository. An evaluation on two case studies found Trustrace improved precision over VSM alone and showed no significant difference in recall, supporting the hypothesis that Trustrace can improve link recovery accuracy over IR-only approaches.
The document presents a taxonomy called ProMeTA for classifying program metamodels used in program reverse engineering. ProMeTA defines characteristics such as target language, abstraction level, meta-language, and more to classify popular metamodels like AST, KDM, FAMIX. The taxonomy aims to provide a comprehensive guide for researchers and practitioners to select, design, and communicate metamodels. The paper also analyzes existing metamodels according to the ProMeTA taxonomy and identifies gaps to guide future metamodel development.
This document describes a controlled, multiple case study of software evolution and defects from industrial projects. It details the data sources used, including source code repositories, issue tracking databases, and interviews. Metrics such as code smells, size, effort, and defects were collected. Programming skills of developers were also measured. Code smell detection tools and custom scripts to analyze code changes were used to extract metrics on a variety of code issues and evolution over time. The data is available online for further analysis.
The document describes a study on detecting linguistic (anti)patterns in RESTful APIs. It presents an approach called DOLAR (Detection Of Linguistic Antipatterns in REST) that analyzes REST API URIs and detects antipatterns using heuristics-based algorithms. Experiments were conducted on 309 methods from 15 public REST APIs to test DOLAR's accuracy, the extensibility of the underlying SOFA framework, and the performance of detection algorithms. The results showed that 42% of methods exhibited contextualized resource names (a pattern) while 14% had contextless resource names (an antipattern), with detection taking under a second on average.
The document describes ACRE, an automated tool for testing C++ applications using aspects. It discusses aspect-oriented programming and AspectC++. It also covers background topics like memory management issues in C++, invariant testing, and interference bugs. The key points are that ACRE uses a domain-specific language to describe tests as aspects without modifying the source code, and can generate aspects for counting, checking, logging, and injecting delays.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
1) Issue trackers are often used to track more than just bugs, including features, enhancements, and refactoring work.
2) A manual analysis found that nearly half of issues labeled as "bugs" in issue trackers were actually not bugs.
3) Relying on issue tracker labels alone can introduce significant errors into datasets used for tasks like bug prediction and severity estimation. More work is needed to clean noisy and unreliable data.
The document discusses how to derive dependency structures for legacy J2EE applications. It proposes analyzing all application tiers together using a language-independent model and parsing various artifacts. Configuration files and limited data flow analysis are used to understand dependencies. Container dependencies are explicitly codified by studying technology specifications and codifying dependency rules to apply when certain code patterns are detected in applications. This allows completing an application's dependency graph.
The document discusses the state of practices of service identification in the industry for migrating legacy systems to service-oriented architectures (SOA). It finds that while service identification is seen as important, it remains primarily a manual process focused on identifying coarse-grained business services from source code and business processes. Wrapping and clustering functionalities are common techniques. Fully automating service identification is still challenging due to the need to understand complex legacy system dependencies. The document recommends service identification be business-driven and follow proven methodologies.
This document discusses techniques for testing advanced driver assistance systems (ADAS) through physics-based simulation. It faces challenges due to the large, complex, and multidimensional test input space as well as the computational expense of simulation. The document proposes using a genetic algorithm guided by decision trees to more efficiently search for critical test cases. Classification trees are built to partition the input space into homogeneous regions in order to better guide the selection and generation of test inputs toward more critical areas.
The document reports on the findings of a survey of 45 industrial practitioners on their experiences with legacy-to-SOA migrations. The key findings include: 1) Practitioners migrate legacy systems implemented in Cobol and Java to reduce maintenance costs and improve flexibility/interoperability; 2) Identifying services is an important step but is mostly manual and business-driven; 3) The most used techniques are functionality clustering and wrapping; 4) Desired service qualities are reusability, granularity and loose coupling; 5) Identified services prioritize domain-specific over technical services; 6) RESTful services are most targeted technology.
The document investigates the impact of linguistic anti-patterns (LAs) on program comprehension. It defines LAs as bad naming, documentation, and implementation practices. A study was conducted involving 92 students assessing programs with and without LAs. The study found that LAs negatively impact understandability by increasing time and reducing correctness. Certain LAs like A2, B4, and D1 had a stronger negative effect than others like E1. The study also found that providing knowledge about LAs can help mitigate their impact by making programs easier and faster to comprehend.
The document discusses research on identifying and analyzing the impact of patterns on the quality of multi-language systems. The objectives are to collect and categorize sets of programming languages used together, detect patterns in multi-language programs to track bugs and provide best practices, and study how patterns impact quality. The contributions will be a catalog of multi-language patterns and defects, a detection tool, and analysis of patterns' effects on quality attributes. Current work includes reviewing literature on language combinations and patterns to provide recommendations for high-quality multi-language development.
This document discusses research on change impact analysis in multi-language systems. It begins by outlining recommendations for best practices when using JNI, such as passing primitive types, minimizing calls between native and Java code, and properly handling strings. It then describes a qualitative analysis of JNI usage that identified common practices and issues. Finally, it proposes future work to survey developers on applying recommendations to facilitate change impact analysis in multi-language systems.
The document summarizes a recommendation system that suggests software processes for video game projects based on similarities to past projects. The system analyzes over 100 postmortems from previous games to build a database of development processes and project contexts. It uses principal component analysis to identify similar past projects and recommends a process by combining elements from similar projects' processes. The system was evaluated both quantitatively based on correctness and coverage metrics and qualitatively through surveys and a case study with a developer team.
Will io t trigger the next software crisisPtidej Team
This document discusses how the rise of the Internet of Things (IoT) could trigger a new software crisis due to issues like fragmentation, complexity, and lack of standards. It provides a brief history of software engineering challenges over the past 50 years such as cost overruns, safety issues, and prioritizing productivity over quality. The document then examines how these same problems are emerging in the IoT context today. It argues that IoT software engineering practices need to address issues like device software, cloud/app development, and privacy in order to avoid a major crisis.
This document discusses theories related to software design patterns. It notes that while design patterns are commonly used, there is a need for more research on how they impact software quality. The document proposes several areas for developing theories, including systematically categorizing existing patterns based on underlying principles, combining principles to identify new patterns, and developing theories of patterns from developer behavior and for building software systems. Formalizing patterns and identifying their relationships could help teaching and understanding of patterns.
Laleh M. Eshkevari defended her Ph.D dissertation on developing techniques for the automatic detection and classification of identifier renamings in software projects. Her dissertation outlined a taxonomy of renamings, described approaches for renaming detection based on line mapping, entity mapping and data flow analysis, and discussed methods for classifying renamings based on their form and semantic changes. Evaluation of the approaches on several open source projects showed high precision and recall for renaming detection and identified trends in how renamings are used in practice.
1) The document analyzes the co-occurrence of code smells like anti-patterns and clones in software systems and their impact on fault-proneness.
2) It finds that over 50% of classes with anti-patterns also have clones, and 59-78% of classes with clones also participate in anti-patterns.
3) Classes with both anti-patterns and clones are significantly more fault-prone than other classes, with the risk of faults being at least 7 times higher in one system studied.
Trustrace is an approach that uses software repository links like SVN commits to improve the trust in automatically recovered traceability links between requirements and code. It calculates an initial trust value for links based on IR techniques like VSM, and then reweights the links based on additional information from the software repository. An evaluation on two case studies found Trustrace improved precision over VSM alone and showed no significant difference in recall, supporting the hypothesis that Trustrace can improve link recovery accuracy over IR-only approaches.
The document presents a taxonomy called ProMeTA for classifying program metamodels used in program reverse engineering. ProMeTA defines characteristics such as target language, abstraction level, meta-language, and more to classify popular metamodels like AST, KDM, FAMIX. The taxonomy aims to provide a comprehensive guide for researchers and practitioners to select, design, and communicate metamodels. The paper also analyzes existing metamodels according to the ProMeTA taxonomy and identifies gaps to guide future metamodel development.
This document describes a controlled, multiple case study of software evolution and defects from industrial projects. It details the data sources used, including source code repositories, issue tracking databases, and interviews. Metrics such as code smells, size, effort, and defects were collected. Programming skills of developers were also measured. Code smell detection tools and custom scripts to analyze code changes were used to extract metrics on a variety of code issues and evolution over time. The data is available online for further analysis.
The document describes a study on detecting linguistic (anti)patterns in RESTful APIs. It presents an approach called DOLAR (Detection Of Linguistic Antipatterns in REST) that analyzes REST API URIs and detects antipatterns using heuristics-based algorithms. Experiments were conducted on 309 methods from 15 public REST APIs to test DOLAR's accuracy, the extensibility of the underlying SOFA framework, and the performance of detection algorithms. The results showed that 42% of methods exhibited contextualized resource names (a pattern) while 14% had contextless resource names (an antipattern), with detection taking under a second on average.
The document describes ACRE, an automated tool for testing C++ applications using aspects. It discusses aspect-oriented programming and AspectC++. It also covers background topics like memory management issues in C++, invariant testing, and interference bugs. The key points are that ACRE uses a domain-specific language to describe tests as aspects without modifying the source code, and can generate aspects for counting, checking, logging, and injecting delays.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
How to Get CNIC Information System with Paksim Ga.pptx
ICSM11b.ppt
1. Soccerlab and
Ptidej team
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
A Seismology-inspired Approach
Antoniol
to Study Change Propagation
Introduction
The Earthquake
Metaphor
Salima Hassaine, Ferdaous Boughanmi, Yann-Ga¨le
Approach
Empirical Study
Gu´h´neuc, Sylvie Hamel, Giuliano Antoniol
e e
Study Results
´
SOCCER Lab. and Ptidej Team – DGIGL, Ecole Polytechnique de
Conclusion
Montr´al, Qu´bec, Canada
e e
September 27, 2011
Pattern Trace Identification, Detection, and Enhancement in Java
SOftware Cost-effective Change and Evolution Research Lab
2. Soccerlab and
Ptidej team Context and Motivation
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol Software evolves continuously, requiring continuous
Introduction maintenance and development
The Earthquake
Metaphor
Software maintenance is the most costly and difficult
Approach
phase in software life cycle
Empirical Study
Study Results
Making changes without understanding their
Conclusion
effects can lead to poor effort estimation and delays
in release schedules, because of their consequences
(e.g., the introduction of bugs, etc.)
2 / 25
3. Soccerlab and
Ptidej team Change Impact Analysis
Seminar
Salima Hassaine,
Ferdaous
Boughanmi, Change impact analysis is defined by Bohner and
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Arnold [1] as “identifying the potential consequences of
Hamel, Giuliano
Antoniol
a change, or estimating what needs to be modified to
accomplish a change”.
Introduction
The Earthquake
Metaphor
Approach
Empirical Study
Study Results
Conclusion
[1] S. A. Bohner and R. S. Arnold, Software Change Impact Analysis. IEEE
Computer Society Press, 1996.
3 / 25
4. Soccerlab and
Ptidej team Existing approaches
Seminar
Salima Hassaine,
Ferdaous Structure-based Analysis
Boughanmi,
Yann-Ga¨l
e Dependency analysis of source code is performed using
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
static or dynamic program analyses
Antoniol The relationships between classes make change impact
Introduction
difficult to anticipate (e.g., hidden propagation)
The Earthquake
History-based Analysis
Metaphor Mining software repositories to identify co-changes of
Approach software artefacts within a change-set
Empirical Study It is often able to capture change couplings that cannot
Study Results be captured by static and dynamic analyses.
Conclusion They lack to capture how changes are spread over space
(e.g., class diagram) They could not help developers
prioritise their changes according to the forecast scope
of changes
Probabilistic Approaches
Building change propagation models to predict future
change couplings using probabilistic tools (e.g.,
Bayesian Networks, Time Series Analysis, etc.)
4 / 25
5. Soccerlab and
Ptidej team Motivating example
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Introduction
Bug ID200551 reports a bug in Rhino, that was
The Earthquake
introduced by a developer when he implemented a
Metaphor change to class Kit and missed a required change to
Approach
class DefiningClassLoader.
Empirical Study
Study Results
Information passes from class Kit to class
Conclusion
DefiningClassLoader through an intermediary class
ContextFactory that remains unchanged.
5 / 25
6. Soccerlab and
Ptidej team Our goal
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Propose an approach to study the scope of change
propagation based on a seismology metaphore
Introduction
The Earthquake
Metaphor Our approach considers changes to a class as an
Approach earthquake that propagates through a long chain of
Empirical Study relationships
Study Results
Conclusion Our approach combines static dependencies
between classes and historical co-change relations
to study how far a change propagation will proceed
from a given class to the others.
6 / 25
7. Soccerlab and
Ptidej team The Earthquake Metaphor
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Introduction
The Earthquake
Metaphor
Approach
Empirical Study
Study Results
Conclusion
Active seismic areas “Important” classes
Earthquake Software change
Epicenter “Important” changed class
Seismic wave propagation Change propagation
Damaged sites “Impacted” classes
Distance from an epicenter Class level
7 / 25
8. Soccerlab and
Ptidej team Approach
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Step 1: Identifying the most important classes
Introduction
Using PageRank-based metric, History-based metric,
The Earthquake
Metaphor and Combination of the both metrics.
Approach Step 2: Identifying class levels
Empirical Study Using static dependencies between classes
Study Results
Step 3: Identifying impacted classes
Conclusion
Using historical co-change relations extracted from
software repositories
8 / 25
9. Soccerlab and
Ptidej team Step 1: Identifying the most important classes
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Introduction
The Earthquake
Metaphor
Approach
Empirical Study
Study Results
Conclusion
9 / 25
10. Soccerlab and
Ptidej team Step 2: Identifying class levels (1/2)
Seminar
Salima Hassaine,
Ferdaous A
ag
F
as
G
Boughanmi,
Yann-Ga¨l
e A
ag
F
as
G
in
Gu´h´neuc, Sylvie
e e B
Hamel, Giuliano in
cr cr cr
Antoniol B dm
cr cr cr
in in in
Introduction co
C D E
in in in
The Earthquake dm dm dm dm
Metaphor C D E co
Approach
(a) UML-like model (b) Eulerian model
Empirical Study
Study Results
Conclusion (c) String representation of the Eulerian model
Figure: The conversion of a class diagram into string (from [2]).
[2] O. Kaczor, Y.-G. Gu´h´neuc, and S. Hamel, Efficient identification of
e e
design patterns with bit-vector algorithm,pp. 175–184. IEEE Computer
Society Press, 2006.
10 / 25
11. Soccerlab and
Ptidej team Step 2: Identifying class levels (2/2)
Seminar
Salima Hassaine,
Ferdaous Bit-Vector Algorithm
Boughanmi,
Yann-Ga¨l
e
Input:
Gu´h´neuc, Sylvie
e e The Epicenter Class (e.g., class A)
Hamel, Giuliano
Antoniol The String Representation of the program
Output:
Introduction
Class levels (e.g., Level0 = {A}, Level1 = {B, F },
The Earthquake
Metaphor Level2 ={D, E , C }, Level3 = {G }, Level4 = {F })
Approach
Empirical Study
Study Results
Conclusion
11 / 25
12. Soccerlab and
Ptidej team Step 3: Identifying impacted classes
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
We define a time window T of observation as the
median of time between two subsequent changes to the
Introduction
epicenter class.
The Earthquake
Metaphor
Approach We extract all the commits that happened after any
Empirical Study change to the epicenter class and within the chosen
Study Results time window T.
Conclusion
We use our framework Ibdoos to implement queries for
collecting the set of classes that changed after any
change to the epicenter class and during T.
12 / 25
13. Soccerlab and
Ptidej team Empirical Study Design
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Goal: to show the applicability and usefulness of our
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
approach
Antoniol
Purpose: to gather interesting observations on the
Introduction scope of change propagation and confirming these
The Earthquake
Metaphor
observations statistically
Approach Quality focus: is the accuracy of the identified scope of
Empirical Study change propagation
Study Results
Perspective: researchers and practitioners who should
Conclusion
be aware of the scope of a change to estimate the effort
required for future maintenance tasks. The observed
phenomena can help for making decisions concerning
the process of future software projects.
Context: three open source systems: Pooka, Rhino, and
Xerces-J.
13 / 25
14. Soccerlab and
Ptidej team Research Questions (1/3)
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano RQ1: Does our metaphor allow us to observe the scope of
Antoniol
change impact?
Introduction We investigate whether it is possible to apply our
The Earthquake
Metaphor
approach to observe change propagation through class
Approach levels
Empirical Study We perform a qualitative study to confirm our
Study Results observations of change propagation, using external
Conclusion
information
Thus, we can show that, indeed, like in seismology,
certain levels are more impacted by a change than
others
14 / 25
15. Soccerlab and
Ptidej team Research Questions (2/3)
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
RQ2: What is the level most impacted by a change?
Introduction
We perform a quantitative study to confirm our
The Earthquake
Metaphor observations of change propagation, using statistical
Approach tests to investigate which level may be the most
Empirical Study impacted by a change, and classifying the levels having
Study Results similar impact
Conclusion
Thus, we can deduce all classes with a higher risk to be
impacted by any change to epicenter class
15 / 25
16. Soccerlab and
Ptidej team Research Questions (3/3)
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Introduction RQ3: What is the most reachable level by a change?
The Earthquake
Metaphor As in RQ2, we perform a quantitative study to confirm
Approach our observations of change propagation, using statistical
Empirical Study tests to investigate, for each level, the number of
Study Results earthquakes that propagate until a given level.
Conclusion
Thus, we can deduce the most reachable level.
16 / 25
17. Soccerlab and
Ptidej team Analysis Methods
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e RQ1: Using the R statistical system, we build the 3D
Hamel, Giuliano
Antoniol graph visualising the change propagation from the
Introduction
epicenter class to other classes.
The Earthquake
Metaphor RQ2: We compute, for each level, the number of
Approach classes that changed after any change to the considered
Empirical Study
epicenter class.
Study Results
Conclusion
RQ3: For each level, we create a subset that contains
the number of earthquakes that stop at this level.
We conduct Duncan’s multiple range test to classify the
subsets with respect to the differences between them.
17 / 25
18. Soccerlab and
Ptidej team Study Results (1/3)
Seminar
Salima Hassaine,
Ferdaous RQ1: Does our metaphor allow us to observe the scope of
Boughanmi,
Yann-Ga¨l
e
change impact?
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Introduction
The Earthquake
Metaphor
Approach
Empirical Study
Study Results
Conclusion
(a) class XMLEventImpl (b) class TypeValidator
Figure: Change propagation
Epicenter class XMLEntityScanner: we found the bug
ID1099 that relate the changes to the epicenter class
with changes to XMLParser (level 3).
18 / 25
19. Soccerlab and
Ptidej team Study Results (2/3)
Seminar
Salima Hassaine,
Ferdaous RQ2: What is the level most impacted by a change?
Boughanmi,
Yann-Ga¨l
e Homogenous subsets for alpha = 0.1
Gu´h´neuc, Sylvie
e e Levels Range 1 Range 2 Range 3
Hamel, Giuliano
Antoniol 5 107.5410
4 147.7778
Introduction 3 150.0000
The Earthquake 2 202.0408
Metaphor 1 354.4828
Approach
Table: Rhino: Duncan’s test applied on “number of changes”
Empirical Study
Study Results
Conclusion
Homogenous subsets for alpha = 0.1
Levels Range 1 Range 2 Range 3
6 6.4015
5 10.8485
4 24.8333
3 50.2789
2 83.7273
1 895.2652
Table: Xerces-J: Duncan’s test applied on “number of changes”
19 / 25
20. Soccerlab and
Ptidej team Study Results (3/3)
Seminar
Salima Hassaine,
Ferdaous RQ3: What is the most reachable level by a change?
Boughanmi,
Yann-Ga¨l
e Homogenous subsets for alpha = 0.1
Gu´h´neuc, Sylvie
e e Max Level Range 1 Range 2 Range 3
Hamel, Giuliano
Antoniol 5 .5833
4 1.3712
Introduction 3 1.7500
The Earthquake 2 4.6136
Metaphor 1 11.7121
Approach
Table: Rhino: Duncan’s test applied on “number of earthquakes”
Empirical Study
Study Results
Conclusion
Homogenous subsets for alpha = 0.1
Max Level Range 1 Range 2 Range 3
6 10.5333
5 16.3333
4 21.6667
3 30.0033
2 43.2000
1 54.8667
Table: Xerces-J: Duncan’s test applied on “number of earthquakes”
20 / 25
21. Soccerlab and
Ptidej team Threats to Validity (1/2)
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Construct validity concerns the relation between
Introduction theory and observations. In this study, they could be
The Earthquake
Metaphor
due to the chosen time windows which may affect our
Approach
observations.
Empirical Study Internal Validity of a study is the extent to which a
Study Results treatment impacts the dependent variable. The
Conclusion internal validity of our study is not threatened because
we have not manipulated the independent variable,
extent of the change propagation.
21 / 25
22. Soccerlab and
Ptidej team Threats to Validity (2/2)
Seminar
Salima Hassaine,
Ferdaous
Boughanmi, External Validity of a study relates to the extent to
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e which we can generalise its results. The main threat
Hamel, Giuliano
Antoniol to the external validity of our study that could affect
Introduction
the generalisation of the presented results relates to the
The Earthquake
analysed programs. Future work includes replicating this
Metaphor
study on other programs to confirm our results.
Approach
Conclusion validity threats deals with the relation
Empirical Study
Study Results
between the treatment and the outcome. We paid
Conclusion
attention not to violate assumptions of the performed
statistical tests. Thus, we improved our conclusion
validity by increasing the risk of making a Type I error
(increase the chance that we will find a relationship
when in fact there is not), we can do that statistically
by raising the alpha level. For instance, instead of using
0.05 significance level, we use 0.1 as our cutoff point.
22 / 25
23. Soccerlab and
Ptidej team Conclusion (1/2)
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol We proposed an approach to study how far a change
Introduction propagation will proceed from a given class to the
The Earthquake others.
Metaphor
Approach
We performed a qualitative and two quantitative
Empirical Study
studies. We showed that our intuition, about the
Study Results
impacted classes by a change must be near to the
Conclusion
changed class, is incorrect in some cases. However,
there are some change propagations that reach the 5th
level in Rhino (and 6th in Xerces-J).
23 / 25
24. Soccerlab and
Ptidej team Conclusion (2/2)
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Identifying the scope of change propagation could help,
Introduction
both developers and managers. Developers could locate
The Earthquake
Metaphor easily the change impact. Managers could estimate the
Approach efforts required to perform changes more accurately.
Empirical Study
Study Results Future work: Apply our metaphor and our approach to
Conclusion other programs to confirm our observations. We will
also adapt seismology models to predict changes to
classes.
24 / 25
25. Soccerlab and
Ptidej team Questions?
Seminar
Salima Hassaine,
Ferdaous
Boughanmi,
Yann-Ga¨l
e
Gu´h´neuc, Sylvie
e e
Hamel, Giuliano
Antoniol
Introduction
The Earthquake
Metaphor
Approach
Empirical Study
Study Results
Conclusion
25 / 25