Global Software Engineering Laboratory, Waseda University (Head: Hironori Washizaki) organized miniPLoP@Taipei jointly with Software Systems Lab, Taipei Tech on May 29th 2014. Hironori Washizaki gave keynote ( “Introduction to Patterns” ) and invited talk ( “PLoP, AsianPLoP, and Patterns Community in Japan” ).
カテゴリー別アーカイブ: 未分類
Verification of Implementing Security Design Patterns Using a Test Template, accepted at ARES2014 (CORE Rank B) as short paper.
Masatoshi Yoshizawa, Takanori Kobashi, Hiroyoshi Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya and Nobukazu Yoshioka, “Verification of Implementing Security Design Patterns Using a Test Template,” Proceedings of 9th International Conference on Availability, Reliability and Security (ARES2014), pp.XX-YY, Fribourg, Switzerland, 8th-12th September 2014. (to appear) (Verification of Implementing Security Design Patterns Using a Test Template.pdf)
Although security patterns contain security expert knowledge to support software developers, these patterns may be inappropriately applied because most developers are not security specialists, leading to threats and vulnerabilities. Here we propose a validation method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, which consists of the “aspect test template” to observe the internal processing and the “test case template”. Providing design information creates a test from the test template. Because a test template is recyclable, it can create easily a test, which can validate the security design patterns. As a case study, we applied our method to a web system. The result shows that our method can test repetition in the early stage of implementation, verify pattern applications, and assess whether vulnerabilities are resolved.
日経ITPro連載「残念なシステムのなくしかた」 第1回「正しく」できても「正しいことをやる」のができない理由
鷲崎 弘宜、平林 大典(早稲田大学ゴール指向経営研究会)、「残念なシステム」のなくしかた、第1回 「正しく」できても「正しいことをやる」のができない理由、日経情報ストラテジー、日経ITPro、2014/05/14 http://itpro.nikkeibp.co.jp/article/COLUMN/20140430/553946/
Predicting the Release Time Based on a Generalized Software Reliability Model (GSRM), accepted at COMPSAC 2014 (CORE Rank B) Fast Abstract Track.
Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa, “Predicting the Release Time Based on a Generalized Software Reliability Model (GSRM),” Proceedings of the 38th Annual IEEE International Computers, Software, and Applications Conference (COMPSAC), Fast Abstract, pp.XX-YY, Västerås, Sweden 21–25 July, 2014. (to appear) (compsac2014_submission_494.pdf)
Development environments have changed drastically, development periods are shorter than ever and the number of team members has increased. Especially in open source software (OSS), a large number of developers contribute to OSS. OSS have difficulties in predicting or deciding when it will release. In order to assess recent software developments, we proposed a generalized software reliability model (GSRM) based on a
stochastic process, and compared GSRM with other models. In this paper, we focus on the release dates of OSS and the growth of faults (issues).
RefactoringScript: A Script and Its Processor for Composite Refactoring, accepted at SEKE 2014 (CORE Rank B).
Linchao Yang, Tomoyuki Kamiya, Kazunori Sakamoto, Hironori Washizaki and Yoshiaki Fukazawa, “RefactoringScript: A Script and Its Processor for Composite Refactoring,” Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (SEKE 2014), pp.XX-YY, Vancouver, Canada, July 1-3, 2014. (to appear) (seke2014_submission_191.pdf)
Abstract—Refactoring is widely recognized as a method to improve the internal qualities of source code. However, manual refactoring is time-consuming and error prone. Consequently, many tools to support automated refactoring have been suggested, but most support only unit and simple refactoring, making it difficult to perform composite refactoring (e.g., introducing a design pattern) where a refactoring set is applied at one position or the same refactoring operation is applied at multiple positions. In this paper, we propose a novel script language and its processor to describe how and where to refactor by a model expressing source code*1. Evaluations indicate that our language and processor allow refactoring steps to be described as scripts, which can be easily replayed and reused for multiple projects.
2014年度 3年生プロジェクト研究A 履修希望受付
3年生の2014年度プロジェクト研究希望者を受け入れます。上級生との混成チームによるETロボコンへの参戦、プログラミングコンテストの開発・運営、もしくは、再利用・品質保証を中心としたソフトウェアエンジニアリング研究の先取りとなります。希望者は washizaki _at_ waseda.jp へ事前に相談してください。学科連絡事務室への申請締切は4月9日17:00です。
Seven undergraduates joined our lab.
Today, 7 undergraduates (M0/B4) joined our lab. Welcome!
鷲崎研より13名が卒業・修了。伊永君・角谷君が専攻賞(本賞)受賞、津村君が学部長賞受賞。
Network Analysis for Software Patterns including Organizational Patterns in Portland Pattern Repository accepted at Agile 2014 as short paper and research lightning talk.
Hironori Washizaki, Masashi Kadoya, Yoshiaki Fukazawa and Takeshi Kawamura, “Network Analysis for Software Patterns including Organizational Patterns in Portland Pattern Repository,” Proceedings of the Agile 2014 Conference, pp.XX-YY, Orlando, USA, July 28 – August 1, 2014. (to appear) (Agile2014-Pattern-Network-Analysis-camera-ready.pdf)
Software pattern is a general reusable solution to a commonly occurring problem within a given context while software development and management. Among various software patterns, organizational patterns are known as the basis for Agile software development movement, especially for Scrum and Extreme Programming. Patterns usually form a network having relationships among them to support users understand and utilize patterns efficiently and effectively. However little is known about the nature of such pattern networks, such as how are organizational patterns different from other patterns from the viewpoint of centrality. To clarify such characteristics of pattern networks and organizational patterns, we mine a network consisting 285 patterns from an existing world-largest online pattern repository called Portland Pattern Repository (PPR). By applying network analysis techniques to the mined network and careful review of the result, we revealed several interesting characteristics of the pattern network and organizational patterns.
Security Requirements Analysis using Knowledge in CAPEC accepted at WISSE 2014 (CAiSE Workshop).
Haruhiko Kaiya, Sho Kouno, Shinpei Ogata, Takuo Okubo, Nobukazu Yoshioka, Hironori Washizaki and Kenji Kaijiri, “Security Requirements Analysis using Knowledge in CAPEC,” Proceedings of the 4th International Workshop on Information Systems Security Engineering (WISSE 2014), pp.XX-YY, Thessaloniki, Greece, June 17, 2014. (to appear)