| || ||
About the Seminar
In this seminar, we investigate recommendation systems that are designed to assist in the process of software development and to make it less error prone, faster and cheaper.
Place and Time
- Regular sessions: Tuesday 16:00 - 18:00, Building E 1.3, room 328.
- First session: April 15, 2008
Requirements for successful participation
- Prerequisites: This seminar is suitable for all students, bachelor's or master's, who are interested in software
engineering and its applications. You don't need to have any prior knowledge regarding the subject, but participation in any other courses offered by the "Software Engineering" group could be helpful.
- Regular attendance: Attendance are mandatory. An official written note of absence is required if you are unable to
- Seminar discussions: Each seminar session will consist of a discussion of two research papers. These papers will be
announced in advance and all the seminar participants will
be obliged to read at least one of them and take part in the discussion during the next session.
- Summaries: Weekly, a summary of the assigned and discussed during the previous session paper has
- Talk: In the last few sessions of the seminar, each participant will have to present a paper, that has the same or
similar research topic to some of the papers discussed during the semester. Each presentation should last 20 to 25 minutes, allowing
further 5 minutes for questions/discussions.
The language for the seminar is english. Bachelor students may choose between german and english for their presentation, but discussions will be in english for all participants.
Sample paper: T. Zimmermann, P. Weissgerber, S. Diehl and A. Zeller. Mining Version Histories
Guide Software Changes. IEEE Trannsactions on Software Engineering, Vol. 31(6),
429-445, June 2005.
Session on 15.04.08: Defect Localization
- R. Abreu, P. Zoeteweij, and A.J.C. van Gemund. On the Accuracy of
Spectrum-based Fault Localization. In Proceedings of the Testing: Academia and Industry Conference -
Research Techniques (TAIC PART'07), pages 89--98, Windsor, United Kingdom, September 2007.
- H. Cleve and A. Zeller. Locating Causes of Program Failures. In
of the International
the Foundations of Software Engineering, pages 342--351, May 2005.
- J. Jones and M.J. Harrold. Empirical Evaluation of the Tarantula Automatic
Fault-Localization Technique. In
Proceedings of the International Conference on Automated Software Engineering, pages 273--282, November
Session on 22.04.08: Statistical Debugging
Session on 29.04.08: Bug Detection
- Group 1: B. Liblit, M. Naik, A.X. Zheng, A. Aiken, and M.I. Jordan. Scalable
Proceedings of the Conference on Programming Language Design and Implementation,
Chicago, Illinois, June 2005.
- Group 2: P.A. Nainar, T. Chen, J. Rosin and B. Liblit. Statistical Debugging Using
Boolean Predicates. In International Symposium on Software Testing and Analysis
London, United Kingdom, July 2007.
Session on 06.05.08: Defect Prediction
- Group 1: S. Fink, E. Yahav, N. Dor and G. Ramalingam. Effective
Typestate Verification in the Presence of Aliasing. In International Symposium on
Software Testing and Analysis
(ISSTA), Portland, Maine, July 2006.
- Group 2: Z. Li and Y. Zhou. PR-Miner: Automatically Extracting
Rules and Detecting Violations in Large Software Code. In European Software Engineering Conference/
International Symposium on Foundations of Software Engineering (ESEC/FSE), Lisbon, Portugal, 2005.
Session on 13.05.08: Code Clones
- Group 1: N. Nagappan, T. Ball and A. Zeller. Mining Metrics to Predict
Component Failures. In Proceedings of the 28th International Conference on Software Engineering (ICSE 2006),
- Group 2: S. Kim, T. Zimmermann, E.J. Whitehead Jr. and A. Zeller. Predicting Faults from Cached History. In Proceedings of the 29th International Conference on Software Engineering
2007), Minneapolis, MN, USA, May 2007.
Session on 20.05.08: Guided Software Development
- Group 1: E. Duala-Ekoko and M.P. Robillard. Tracking
Code Clones in Evolving Software. In Proceedings of the 29th International Conference on Software
Engineering, pages 158-167, May 2007.
- Group 2: M. Kim, V. Sazawal, D. Notkin, and G.C. Murphy. An Empirical Study of Code Clone
Genealogies. In Proceedings of the Joint European Software Engineering Conference and ACM SIGSOFT
on the Foundations of Software Engineering, pages 187-196, 2005.
Session on 27.05.08: Expertise Location
- Group 1: D. Čubranić, G.C. Murphy, J. Singer, and K.S. Booth. Learning From Project History: A
Case Study for Software Development. Proc. ACM Conf. Computer Supported Cooperative Work (CSCW '04), pp. 82-91, 2004.
- Group 2: R. Holmes and R.J. Walker. Supporting the Investigation and Planning of
Tasks. In Proceedings of the International Conference on Software Engineering (Minneapolis, MN, USA. May 25, 2007). ICSE 07. ACM
Press, New York, NY, 447-457.
Session on 03.06.08: Issues in Empirical Studies
- Group 1: A. Mockus and J.D. Herbsleb. Expertise Browser: A
Quantitative Approach to Identifying
Expertise. In ICSE'02 Workshop on Open Source Software Engineering, Orlando, FL, USA, 2002.
- Group 2: J. Anvik and G.C. Murphy. Determining Implementation Expertise
from Bug Reports. MSR 2007.
Session on 10.06.08:
- Group 1: J. Singer and N. Vinson. Ethical issues in empirical studies of software engineering. IEEE Transactions on
Engineering, 28(12):1171 - 1180, December 2002.
- Group 2: B.A. Kitchenham, S.L. Pfleeger, L.M. Pickard, P.W. Jones,
D.C. Hoaglin, K.E. Emam, and J. Rosenberg. Preliminary guidelines for empirical research
in software engineering. IEEE Trans. Software Eng., 28 (8):721-734, 2002.
- Group 1: J. H. Andrews, L. C. Briand and Y. Labiche. Is mutation an appropriate tool for testing
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), pages 402-411. ACM, 2005.
- Group 2: R. A. DeMillo, R. J. Lipton, and F. G. Sayward. Hints on test data selection: Help
for the practicing programmer.
Computer, 11(4):34-41, 1978.
To each student there is a partner assigned. The partners are supposed to discuss their presentations among each other and to correct the slides and the structure of the
presentations, if needed. If the slides are bad, the partner will be held responsible. The partner will also be the chair for the presentation.
Session on 17.06.08:
Session on 24.06.08:
- Kevin Streit (Partner Yecheng): Y. Brun and M.D. Ernst. Finding latent code errors via
executions. In ICSE'04, Proceedings of the 26th International Conference on Software Engineering,
Scotland), May 26-28, 2004, pp. 480-490.
- E. Irem Arikan (Partner Avishek): C.B. Seaman. Qualitative Methods in Empirical
Studies of Software
Transactions on Software Engineering, 25, 4 (1999), 557-572.
Session on 01.07.08:
- Avishek Anand (Partner Malte): C. Liu, X. Yan, L. Fei, J. Han, and S. P. Midkiff. SOBER:
bug localization. In ESEC/FSE-13: Proceedings of the 10th European Software Engineering Conference held
jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 286-295,
New York, NY, USA, 2005. ACM Press.
- Sascha Just (Partner Björn): M. Stoerzer, B.G. Ryder, X. Ren and F. Tip. Finding Failure-Inducing Changes in
Java Programs using
Classification. In 14th ACM Symposium on Foundations of Software Engineering (Nov 2006).
- Yecheng Gu (Partner Kevin): X. Zhang, N. Gupta, and R. Gupta. Locating faults through
In Proc. of the 28th Int. Conf. on Software engineering (May 2006), pp. 272-281.
- Clemens Hammacher (Partner Matthias): K. R. Walcott, M. L. Soffa, G. M. Kapfhammer and R.S. Ross. Time-aware test
prioritization. In ISSTA '06: Proceedings of the 2006 international symposium on Software testing and analysis, pages 1-12, New York,
NY, USA, 2006. ACM Press.
Session on 08.07.08:
- Malte Skoruppa (Partner Irem): M. P. Robillard. Automatic generation of suggestions
investigation. In Proceedings of the Joint European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of
Software Engineering, pages 11-20, 2005.
- Sadia Masood (Partner Christian): M. Kim, L. Bergman, T. Lau, and D. Notkin. An Ethnographic Study of Copy and Paste
OOPL. International Symposium on Empirical Software Engineering, August, 2004 (ISESE 2004).
- Kurnia Hendrawan (Partner David): V. Dallmeier, C. Lindig, A. Zeller. Lightweight Defect
Localization for Java. In Proceedings of 19th European Conference on Object-Oriented Programming, ECOOP 2005, number 3586 in
Lecture Notes in Computer Science, pages 528-550. Springer, July 2005.
Session on 15.07.08:
- Yulia Patenko (Partner Jonathan): D. Čubranić, G.C. Murphy. Hipikat: recommending pertinent software
artifacts. In Proceedings, International Conference on Software Engineering, pages 408418, Portland, OR, May 2003.
Additional Paper: D. Čubranić, G.C. Murphy, J. Singer and K.S. Booth. Hipikat: A
project memory for
- Björn Kunz (Partner Sascha): N. Nagappan and T. Ball. Use of Relative Code Churn Measures to Predict System
Proc. of 2005
Int'l Conference on Software Engineering (ICSE 2005), Saint Louis, Missouri, USA, 2005, pp. 284-292.
- David Rudi (Partner Kurnia): A. Wasylkowski, A. Zeller and C. Lindig. Detecting
object usage anomalies. In Proceedings of the 11th European Software Engineering Conference held jointly with 15th ACM SIGSOFT Interna-
tional Symposium on Foundations of Software Engineering, pages 3544, September 2007.
- Matthias Loskyll (Partner Clemens): M. Kersten, G.C. Murphy. Using task
context to improve programmer
productivity. In Proc. of the 14th Int'l Symposium on FSE, pages 1-11, 2006.
- Jonathan Driedger (Partner Yulia): S. Neuhaus, T. Zimmermann, C. Holler and A. Zeller. Predicting Vulnerable Software
14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA, October 2007, pp. 529-540.
- Christian Holler (Partner Sadia): A.S. Namin, J.H. Andrews and D.J. Murdoch. Sufficient Mutation Operators
Registration for the seminar can be done only through the on-line
registration form that will be announced on this web-page. The registration will be available from
March 25, 2008 till April 06, 2008.
Please note that the places for the seminar are limited to 15 students and they will be distributed based on the "first-come, first-served" policy.
Impressum ● Datenschutzerklärung
<firstname.lastname@example.org> · http://www.st.cs.uni-saarland.de/edu/recommendation-systems/ · Stand: 2018-04-05 13:40