Publications
129 results found
Cook JE, Wolf AL, 1998, Discovering models of software processes from event-based data, ACM Transactions on Software Engineering and Methodology, Vol: 7, Pages: 215-249, ISSN: 1049-331X
<jats:p> Many software process methods and tools presuppose the existence of a formal model of a process. Unfortunately, developing a formal model for an on-going, complex process can be difficult, costly, and error prone. This presents a practical barrier to the adoption of process technologies, which would be lowered by automated assistance in creating formal models. To this end, we have developed a data analysis technique that we term <jats:italic>process discovery.</jats:italic> Under this technique, data describing process events are first captured from an on-going process and then used to generate a formal model of the behavior of that process. In this article we describe a Markov method that we developed specifically for process discovery, as well as describe two additional methods that we adopted from other domains and augmented for our purposes. The three methods range from the purely algorithmic to the purely statistical. We compare the methods and discuss their application in an industrial case study. </jats:p>
Cook JE, Wolf AL, 1998, Balboa: A Framework for Event-Based Process Data Analysis, Fifth International Conference on the Software Process, Pages: 99-110
van der Hoek A, Heimbigner D, Wolf AL, 1998, Versioned software architecture, International Software Architecture Workshop, Proceedings, ISAW, Pages: 73-76
In this position paper we introduce a novel use of software architecture. Rather than following the traditional focus on design, we propose to use the notion of versioned software architecture to support other activities in the software life cycle. In particular, we are investigating how the activities of configuration management and software deployment can benefit from the availability of an explicit architectural representation that is enhanced with versioning capabilities. Below, we present some of the initial results of this investigation. We motivate our research into versioned software architecture, present some usage scenarios in the context of configuration management and software deployment, and conclude with an outlook at the future work that remains to be done.
Van Der Hoek A, Heimbigner D, Wolf AL, 1998, System modeling resurrected, Pages: 140-145, ISSN: 0302-9743
Over the past few years, research into system modeling has dwindled in favor of other interests in the field of configuration management. Outside influence, in the form of the emergence of the discipline of software architecture, demands that renewed attention is paid to system modeling because it places new requirements on, and offers new opportunities to, system modeling. In this paper we investigate these requirements and opportunities in more detail.
Carzaniga A, Di Nitto E, Rosenblum DS, et al., 1998, Issues in supporting event-based architectural styles, International Software Architecture Workshop, Proceedings, ISAW, Pages: 17-20
Architectural styles are a set of design rules that identify the kinds of components and connectors that may be used to compose a system or a subsystem, together with local or global constraints on the way to composition. Prevalent for large-scale distributed applications is the event-based style where components communicate by generating and receiving event notifications. Several infrastructures make assumptions on the structure of notifications, on the mechanism that allows components to declare interest in some event, and on the way scalability of architectures is supported. These event-based style variations introduced by a number of event-based middleware infrastructures are presented including their advantages and drawbacks.
Hall RS, Heimbigner D, Wolf AL, 1998, Requirements for software deployment languages and schema, Pages: 198-203, ISSN: 0302-9743
Software distribution via networks provides timeliness and continual evolution that is not possible with physical media distribution methods. Organizations such as Microsoft, Marimba, and the Desktop Management Task Force are strengthening their efforts to package software systems in ways that are conducive to network distribution. The result of these efforts has led to the creation of software description languages and schema, but they do not address deployment issues in a complete, systematic fashion. The contribution of this paper is to define and explore the requirements for software deployment languages and schema.
Stafford JA, Wolf AL, 1998, Architecture-level dependence analysis in support of software maintenance, International Software Architecture Workshop, Proceedings, ISAW, Pages: 129-132
Dependence relationships that are appropriate to the concerns of architectures and their attention to component interactions are investigated. In particular, both the structural and the behavioral relationships among components expressed in current-day formal architecture description languages (ADL) are considered. An architecture-level dependence analysis technique, called port-to-port chaining is developed and implemented in a tool called Aladdin.
Doppke JC, Heimbigner D, Wolf AL, 1998, Software process modeling and execution within virtual environments, ACM Transactions on Software Engineering and Methodology, Vol: 7, Pages: 1-40, ISSN: 1049-331X
<jats:p>In the past, multiuser virtual environments have been developed as venues for entertainment and social interaction. Recent research focuses instead on their utility in carrying out work in the real world. This research has identified the importance of a mapping between the real and the virtual that permits the representation of real tasks in the virtual environment. We investigate the use of virtual environments—in particular, MUDs (Multi-User Dimensions)—in the domain of software process. In so doing, we define a mapping, or<jats:italic>metaphor</jats:italic>, that permits the representation of software processes within a MUD. The system resulting from this mapping, called<jats:italic>Promo</jats:italic>, permits the modeling and execution of software processes by geographically dispersed agents.</jats:p>
Hall RS, Heimbigner DM, Wolf AL, 1998, Evaluating software deployment languages and schema - An experience report, International Conference on Software Maintenance, Publisher: IEEE COMPUTER SOC, Pages: 177-185, ISSN: 1063-6773
- Author Web Link
- Cite
- Citations: 6
Turner CR, Fuggetta A, Lavazza L, et al., 1998, Feature engineering, 9th International Workshop on Software Specification and Design, Publisher: IEEE COMPUTER SOC, Pages: 162-164
- Author Web Link
- Cite
- Citations: 22
van der Hoek A, Hall RS, Heimbigner D, et al., 1997, Software release management, Joint Meeting of the 6th European Software Engineering Conference / 5th ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 97), Publisher: SPRINGER-VERLAG BERLIN, Pages: 159-175, ISSN: 0302-9743
- Author Web Link
- Cite
- Citations: 14
Inverardi P, Wolf AL, Yankelevich D, 1997, Checking Assumptions in Component Dynamics at the Architectural Level, Berlin, Second International Conference on Coordination Models and Languages, Publisher: Springer Verlag, Pages: 46-63
Rosenblum DS, Wolf AL, 1997, A design framework for Internet-scale event observation and notification, Joint Meeting of the 6th European Software Engineering Conference / 5th ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 97), Publisher: SPRINGER-VERLAG BERLIN, Pages: 344-360, ISSN: 0302-9743
- Author Web Link
- Cite
- Citations: 38
Hall RS, Heimbigner D, vanderHoek A, et al., 1997, An architecture for post-development configuration management in a wide-area network, 17th International Conference on Distributed Computing Systems, Publisher: I E E E, COMPUTER SOC PRESS, Pages: 269-278, ISSN: 1063-6927
- Author Web Link
- Cite
- Citations: 15
Heimbigner D, Wolf AL, 1996, Software in the field needs process too, Pages: 71-73
A software system spends its life in two, very different worlds: development and operations. Traditional software process technology has focused on supporting the activities associated only with development. We believe that there are significant benefits to be gained by also supporting processes in the field. Furthermore, once support is in place for operation processes, we can begin to consider how to profitably integrate development and operations.
Cook JE, Klauser A, Wolf AL, et al., 1996, Semi-automatic, Self-adaptive Control of Garbage Collection Rates in Object Databases, SIGMOD International Conference on Management of Data, Pages: 377-388
Devanbu PT, Rosenblum DS, Wolf AL, 1996, Generating testing and analysis tools with Aria, ACM Transactions on Software Engineering and Methodology, Vol: 5, Pages: 42-62, ISSN: 1049-331X
Many software testing and analysis tools manipulate graph representations of programs, such as abstract syntax trees or abstract semantics graphs. Handcrafting such tools in conventional programming languages can be difficult, error prone, and time consuming. Our approach is to use application generators targeted for the domain of graph-representation-based testing and analysis tools. Moreover, we generate the generators themselves, so that the development of tools based on different languages and/or representations can also be supported better. In this article we report on our experiences in developing and using a system called Aria that generates testing and analysis tools based on an abstract semantics graph representation for C and C++ called Reprise. Aria itself was generated by the Genoa system. We demonstrate the utility of Aria and, thereby, the power of our approach, by showing Aria's use in the development of a number of useful testing and analysis tools. © 1996 ACM.
vanderHoek A, Heimbigner D, Wolf AL, 1996, A generic, peer-to-peer repository for distributed configuration management, 18th International Conference on Software Engineering, Publisher: I E E E, COMPUTER SOC PRESS, Pages: 308-317, ISSN: 0270-5257
- Author Web Link
- Cite
- Citations: 16
Gonzales RM, Wolf AL, 1996, A facilitator method for upstream design activities with diverse stakeholders, 2nd International Conference on Requirements Engineering, Publisher: I E E E, COMPUTER SOC PRESS, Pages: 190-197
- Author Web Link
- Cite
- Citations: 2
Heimbigner D, Wolf AL, 1996, Post-deployment configuration management, 6th International Workshop on Software Configuration Management, Publisher: SPRINGER-VERLAG BERLIN, Pages: 272-276, ISSN: 0302-9743
- Author Web Link
- Cite
- Citations: 9
INVERARDI P, WOLF AL, 1995, FORMAL SPECIFICATION AND ANALYSIS OF SOFTWARE ARCHITECTURES USING THE CHEMICAL ABSTRACT MACHINE MODEL, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol: 21, Pages: 373-386, ISSN: 0098-5589
- Author Web Link
- Cite
- Citations: 96
Van Der Hoek A, Heimbigner D, Wolf AL, 1995, Does configuration management research have a future?, Pages: 305-309, ISSN: 0302-9743
In this position paper we raise the question of whether Configuration Management (CM) research has a future. The new standard in CM systems—typified by commercial products such as Adele, ADC, ClearCase, Continuus/CM, and CCC/Haxvest—laxgely satisfies the CM functionality requirements posed by Dart. This implies that research in the area of CM is either unnecessary or that we must find new challenges in CM on which to focus. We believe that these challenges indeed exist. Here we present some areas that we feel axe good opportunities for new or continued CM research, and therefore conclude that CM research does have a future.
COOK JE, WOLF AL, 1995, LOWERING THE ENTRY BARRIER AND RAISING THE CONFIDENCE IN LARGE PROCESS MODELS, 9th International Software Process Workshop, Publisher: I E E E, COMPUTER SOC PRESS, Pages: 144-147
WOLF AL, PERRY DE, 1995, PEOPLE IN CONTEXT, 9th International Software Process Workshop, Publisher: I E E E, COMPUTER SOC PRESS, Pages: 5-8
COOK JE, WOLF AL, 1995, Automating process discovery through event-data analysis, 17th International Conference on Software Engineering, Publisher: ASSOC COMPUTING MACHINERY, Pages: 73-82, ISSN: 0270-5257
- Author Web Link
- Cite
- Citations: 88
Cook JE, Wolf AL, 1994, Toward metrics for process validation, Pages: 33-44
To a great extent, the usefulness of a formal model of a software process lies in its ability to accurately predict the behavior of the executing process. Similarly, the usefulness of an executing process lies largely in its ability to fulfill the requirements embodied in a formal model of the process. When process models and process executions diverge, something significant is happening. We are developing techniques for uncovering discrepancies between models and executions under the rubric of process validation. Further, we are developing metrics for process validation that give engineers a feel for the severity of the discrepancy. We view the metrics presented here as a first step toward a suite of useful metrics for process validation.
Cook JE, Wolf AL, 1994, Toward Metrics for Process Validation, Third International Conference on the Software Process, Pages: 331-44
Cook JE, Wolf AL, Zorn BG, 1994, Partition Selection Policies in Object Database Garbage Collection, SIGMOD International Conference on Management of Data, Pages: 371-382
Devanbu PT, Rosenblum DS, Wolf AL, 1994, Automated Construction of Testing and Analysis Tools, 16th International Conference on Software Engineering, Pages: 241-250
Wolf AL, Rosenblum DS, 1993, A study in software process data capture and analysis, Pages: 115-124
Process data capture is the activity of obtaining information about an existing software process. Process analysis is the manipulation of that information for purposes of problem identification. Capture and analysis are key elements in any strategy for software process improvement. We have developed a model of the software process that is based on a notion of events characterizing identifiable, instantaneous milestones in a process. We have also developed capture and analysis techniques suited to that model. This paper reports on a study that was undertaken to gain experience with both the model and the capture and analysis techniques. In that study, we captured event data on several actual enactments of the build process of a large, complex software project within AT&T. We entered the captured event data into a database and ran several queries against the data. The queries implement a variety of analyses on the event data by examining relationships among events, such as dependencies and time intervals. The output of the queries are statistical data that can be used to guide the design of process improvements. While the data we collected in the study are incomplete, our initial results demonstrate the viability of this approach to capture and analysis.
This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.