default search action
SPLST 2015: Tampere, Finland
- Jyrki Nummenmaa, Outi Sievi-Korte, Erkki Mäkinen:
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), Tampere, Finland, October 9-10, 2015. CEUR Workshop Proceedings 1525, CEUR-WS.org 2015
Session 1: Metrics
- Anna Börjesson Sandberg, Miroslaw Staron, Vard Antinyan:
Towards proactive management of technical debt by software metrics. 1-15 - Timo Lehtonen, Sampo Suonsyrjä, Terhi Kilamo, Tommi Mikkonen:
Defining metrics for continuous delivery and deployment pipeline. 16-30 - Samuel Lehtonen, Timo Poranen:
Metrics for Gerrit code review. 31-45
Session 2: Metrics and testing
- Ferenc Horváth, Béla Vancsics, László Vidács, Árpád Beszédes, Dávid Tengeri, Tamás Gergely, Tibor Gyimóthy:
Test suite evaluation using code coverage based metrics. 46-60 - Jurka Rahikkala, Sami Hyrynsalmi, Ville Leppänen:
Accounting testing in software cost estimation: A case study of the current practice and impacts. 61-75
Session 3: Tools
- Farshad Ahmadighohandizi, Kari Systä:
ICDO: Integrated cloud-based development tool for DevOps. 76-90 - Antti Valmari:
A state space tool for concurrent system models expressed in C++. 91-105 - Mikko Teuho, Esko Pekkarinen, Timo Hämäläinen:
Semantics analyzing expression editors in IP-XACT design tool Kactus2. 106-118
Session 4: Products, models, and requirements
- Maria Ripatti, Terhi Kilamo, Karri-Tuomas Salli, Tommi Mikkonen:
Internal marketplace as a mechanism for promoting software reuse. 119-133 - Henri Terho, Sampo Suonsyrjä, Ari Jaaksi, Tommi Mikkonen, Rick Kazman, Hong-Mei Chen:
Lean startup meets software product lines: Survival of the fittest or letting products bloom? 134-148 - Enn Tyugu, Jaan Penjam:
Model-based technology of software development in large. 149-163 - Risto Salo, Timo Poranen, Zheying Zhang:
Requirements management in GitHub with a lean approach. 164-178
Session 5: Data types and structures
- Matti Rintala, Antti Valmari:
Priority queue classes with priority update. 179-193 - Niccolò Veltri:
Two set-based implementations of quotients in type theory. 194-205
Session 6: Security
- Joni Uitto, Sampsa Rauti, Jari-Matti Mäkelä, Ville Leppänen:
Preventing malicious attacks by diversifying Linux shell commands. 206-220 - Linfeng Li, Timo Nummenmaa, Eleni Berki, Marko Helenius:
Phishing knowledge based user modelling in software design. 221-235 - Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen:
Securing Scrum for VAHTI. 236-250
Session 7: Data collection and analysis
- Otto Hylli, Anna-Liisa Mattila, Kari Systä:
Collecting issue management data for analysis with a unified model and API descriptions. 251-265 - Esa Heikkinen, Timo D. Hämäläinen:
LOGDIG log file analyzer for mining expected behavior from log files. 266-280 - Tomi 'bgt' Suovuo, Johannes Holvitie, Jouni Smed, Ville Leppänen:
Mining knowledge on technical debt propagation. 281-295 - François Christophe, Tommi Mikkonen, Vafa Andalibi, Kai Koskimies, Teemu Laukkarinen:
Pattern recognition with spiking neural networks: a simple training method. 296-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.