[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Creating Process-Agents incrementally by mining process asset library

Published: 01 June 2013 Publication History

Abstract

Software process trustworthiness is the degree of confidence that a software process produces expected trustworthy work products that satisfy requirements. Software processes are dynamic and highly people-dependent. The performance of software processes relies not only on the process itself, but also on the personnel's capabilities. Therefore, management of human resources and evaluation of a company's work force capabilities are crucial and will affect software process trustworthiness. Our software process modeling method OEC-SPM (Organization-Entity Capability based Software Process Modeling) has been shown to take into account personnel's capabilities and groups software developers with certain capabilities into a Process-Agent, which is a way of organizing human resources and process asset libraries in software organizations, and will help to improve trustworthiness of software processes. This paper proposes a novel method for incrementally mining Process-Agents from process asset libraries to support OEC-SPM. The method can automatically and incrementally create Process-Agents under three scenarios with high efficiency. Furthermore, we assess the method with the data from real industry setting. The results show that the utilization of human resources in an organization can be optimized when personnel's capabilities are taken into account. Additionally, reasonable resource scheduling making use of Process-Agents will result in higher trustworthiness.

References

[1]
van der Aalst, W.M.P. and Weijters, A.J.M.M., Process mining: a research agenda. Computers in Industry. 231-244.
[2]
Acuña, S.T., Juristo, N. and Moreno, A.M., Emphasizing human capabilities in software development. IEEE Software. v23. 94-101.
[3]
E. Amoroso, C. Taylor, J. Watson, J. Weiss, A process-oriented methodology for assessing and improving software trustworthiness, in: Proceedings of the 2nd ACM Conference on Computer and Communications Security, Virginia, USA, 1994, pp. 39-50.
[4]
Boogerd, C. and Moonen, L., Evaluating the relation between coding standard violations and faults within and across software versions. In: Proc. 6th Int'l Working Conf. on Mining Software Repositories, IEEE. pp. 41-50.
[5]
Buyukozkan, G. and Ruan, D., Choquet integral based aggregation approach to software development risk assessment. Information Sciences. v180. 441-451.
[6]
Catal, C. and Diri, B., Investigating the effect of dataset size metrics sets and feature selection techniques on software fault prediction problem. Information Sciences. v179 i8. 1040-1058.
[7]
CMU, CMMI¿ for development, version 1.2, CMU/SEI-2006-TR-008, ESC-TR-2006-008, 2006.
[8]
Davies, D.L. and Bouldin, D.W., Cluster separation measure. IEEE Transactions on Pattern Analysis and Machine Intelligence. v1 i2. 95-104.
[9]
Delugach S. Harry, An evaluation of the pragmatics of web-based bug tracking tools, in: ACM International Conference Proceeding Series, vol. 280, 2007, pp. 49-55.
[10]
J. Du, T. Tan, M. He, et al., Technical Report: A Process-Centric Approach to Assure Software Trustworthiness, ISCAS/iTechs Technical Report #106, September 2008.
[11]
Well separated clusters and optimal fuzzy partitions. Journal of Cybernetica. v4. 95-104.
[12]
Falk, H., New tools help exterminate software bugs. Computer Design. v26 i18. 52-61.
[13]
Fleiss, J.L. and Cohen, J., The equivalence of weighted kappa and the intraclass correlation coefficient as measures of reliability. Educational and Psychological Measurement. v33. 613-619.
[14]
Fleiss, J.L., Measuring nominal scale agreement among many raters. Psychological Bulletin. v76 i5. 378-382.
[15]
Michaud, Frédéric and Painchaud, Frédéric, Source code verification tools for software security bugs. In: New Trends in Software Methodologies, Tools and Techniques, IOS Press. pp. 231-241.
[16]
M. Godfrey, X. Dong, C. Kapser, L. Zou, Four interesting ways in which history can teach us about software, in: MSR' 04 25th May 2004, Edinburgh, Scotland, UK, 2004.
[17]
G. Gousios, E. Kalliamvakou, D. Spinellis, Measuring developer contribution from software repository data, in: MSR'08, Leipzig, Germany, 2008, pp. 129-132.
[18]
Halkidi, M., Batistakis, Y. and Vazirgiannis, M., Cluster validity checking methods: Part II. SIGMOD Record. v31 i3. 19-27.
[19]
Humphrey, W.S., Introduction to the Personal Software Process. 1997. Addison-Wesley.
[20]
M. Huo, H. Zhang, R. Jeffery, Detection of consistent patterns from process enactment data, in: ICSP 2008, LNCS 5007, 2008, pp. 173-185.
[21]
David, Jacobs and Chris, Marlin, Software process representation to support multiple views. International Journal of Software Engineering and Knowledge Engineering. v5 i4. 585-597.
[22]
Jain, A.K. and Dubes, R.C., . 1988. Prentice-Hall Advanced Reference Series, 1988.Prentice-Hall Inc., Upper Saddle River, NJ.
[23]
Jain, A.K., Murty, M.N. and Flynn, P.J., Data clustering: a review. ACM Computing Surveys. v31 i3.
[24]
C. Jensen, W. Scacchi, Data mining for software process discovery in open source software development communities, in: Proceedings of International Workshop on Mining Software Repositories (MSR2004), 2004, pp. 96-99.
[25]
T. Katayama, A hierarchical and functional software process description and its enaction, in: Proceedings of the 11th International Conference on Software Engineering, 1989.
[26]
Khoshgoftaar, T.M., Software quality assessment using a multi-strategy classifier. Information Sciences.
[27]
Larson Eric, An undergraduate course on software bug detection tools and techniques, in: SIGCSE'06, March 1-5, 2006, Houston, Texas, USA, 2006.
[28]
J.L. Lawall, J. Brunel, R.R. Hansen, H. Stuart, G. Muller, WYSIWIB, A declarative approach to finding protocols and bugs in Linux code, in: IEEE/IFIP International Conference on Dependable Systems & Networks, 2009 (DSN '09), 2009, pp. 43-52.
[29]
Y. Liu, E. Stroulia, K. Wong, D. German, Using CVS historical information to understand how students develop software, in: Proceedings of International Workshop on Mining Software Repositories (MSR2004), 2004, pp. 32-36.
[30]
Marchewka Jack, T., Information Technology Project Management. 2009. third ed. Wiley.
[31]
K. Mierle, K. Laven, S. Roweis, G. Wilson, Mining student CVS repositories for performance indicators, in: Proceedings of International Workshop on Mining Software Repositories (MSR2005), 2005, pp. 41-45.
[32]
S. Morisaki, A. Monden, T. Matsumura, H. Tamada, K. Matsumoto, Defect data analysis based on extended association rule mining, in: Proceedings of the 4th International Workshop on Mining Software Repositories (MSR 07), May 2007, p. 3.
[33]
Mostafa, H.C., Rahgozar, M., Lucas, C. and Morteza, H.C., A heuristic algorithm for clustering rooted ordered trees. Intelligent Data Analysis. v11. 355-376.
[34]
Oliveira, T.C., Alencar, P.S., Filho, I.M., de Lucena, C.J. and Cowan, D.D., Software process representation and analysis for framework instantiation. IEEE Transactions on Software Engineering. v30 i3. 145-159.
[35]
Osamu Mizuno, Shiro Ikami, Shuya Nakaichi, Tohru Kikuno, Spam filter based approach for finding fault-prone software modules, in: Proceedings of the Fourth International Workshop on Mining Software Repositories, May 20-26, 2007, p. 4.
[36]
L. Osterweil, Software processes are software too, in: ACM 0270-5257/87/0300/0002, 1987.
[37]
Park, B.J., The design of polynomial function-based neural network predictors for detection of software defects. Information Sciences. v229. 40-57.
[38]
Peng, Y., Kou, G., Wang, G., Wang, H. and Ko, F., Empirical evaluation of classifiers for software risk management. International Journal of Information Technology and Decision Making. v8 i4. 749-768.
[39]
Wang, Y.PengG. and Wang, H., User Preferences based software defect detection algorithms selection using MCDM. Information Sciences. v191. 3-13.
[40]
A.J. Rember, C. Ellis, An initial approach to mining multiple perspectives of a business process, in: Tapia '09 April 1-4, 2009, Portland, 2009.
[41]
Rodriguez, D., Searching for rules to detect defective modules: a subgroup discovery approach. Information Sciences. v191. 14-30.
[42]
N. Rutar, C. Almazan, J.S. Foster, A comparison of bug finding tools for Java, in: Proceedings of the 15th IEEE International Symposium on Software Reliability Engineering, Saint-Malo, France, November 2004.
[43]
Seliya, N. and Khoshgoftaar, T.M., Software quality estimation with limited fault data: a semi-supervised learning perspective. Software Quality Journal. v15 i3. 327-344.
[44]
Cormen Thomas, H., Leiserson Charles, E., Rivest Ronald, L. and Clifford, Stein, Introduction to Algorithms. 2001. second ed. The MIT Press.
[45]
L.I. Vanek, M.N. Culp, Static analysis of program source code using EDSA, in: Proceedings of the International Conference on Software Maintenance, Miami, 1989, pp. 192-199.
[46]
M. VanHilst, P.K. Garg, C. Lo, Repository mining and six sigma for process improvement, in: Proceedings of International Workshop on Mining Software Repositories (MSR2005), 2005, pp. 80-83.
[47]
Q. Wang, M. Li, Software process management: practices in China, in: Software Process Workshop 2005, Beijing, China, 2005, pp. 317-331.
[48]
Q. Wang, Y. Yang, Technical Report: A Process-Centric Methodology to Software Trustworthiness Assurance, ISCAS/iTechs Technical Report #105, June 2008.
[49]
Q. Wang, N. Jiang, L. Gou, X. Liu, M. Li, Y.J. Wang, BSR: a statistic-based approach for establishing and refine software process performance baseline, in: ICSE'06, May 20-28, 2006, Shanghai, China, 2006. ACM 1-59593-085-X/06/0005.
[50]
Q. Wang, J. Xiao, M. Li, M.W. Nisar, R. Yuan, L. Zhang, A Process-Agent construction method for software process modeling in SoftPM, in: SPW/ProSim 2006, Shanghai China, 2006, pp. 204-213.
[51]
Wen, L. and van der Aalst, Wil M.P., Mining process models with non-free-choice constructs. Data Mining and Knowledge Discovery. v15. 145-180.
[52]
Applying Little-JIL to describe Process-Agent knowledge and support project planning in SoftPM. Journal of Software Process: Improvement and Practice. v12. 437-448.
[53]
Y. Yang, Q. Wang, M. Li, Process trustworthiness as a capability indicator for measuring and improving software trustworthiness, in: ICSP 2009, 2009, pp. 389-401.
[54]
K. Yasumoto, T. Higashino, K. Taniguchi, Software process description using LOTOS and its enaction, in: Proc. of 16th IEEE Int'l Conf. on Software Engineering (ICSE16), 1994, pp. 169-179.
[55]
L. Yu, S. Ramaswamy, Mining CVS repositories to understand open-source Project developer roles, in: Proceedings of 29th International Conference on Software Engineering Workshops (ICSEW'07), 2007.
[56]
Zamli, K.Z., Design and implementation of a t-way test data generation strategy with automated execution tool support. Information Sciences. v181 i9. 1741-1758.
[57]
Zhang, K. and Shasha, D., Simple fast algorithms for the editing distance between trees and related problems. SIAM Journal of Computing. v18 i6. 1245-1262.
[58]
L. Zhang, Q. Wang, J. Xiao, L. Ruan, L. Xie, M. Li, A tool to create process-agents for OEC-SPM from historical project data, in: Proceedings of the 1st International Conference on Software Process (ICSP' 07), 2007, pp. 84-95.
[59]
Zhang, S., Tong, J., Wang, Y., Zhou, J. and Ruan, L., Evaluation of project quality: a DEA-based approach. In: Wang, Q., Pfahl, D., Raffo, D.M., Wernick, P. (Eds.), LNCS, vol. 3966. Springer, Heidelberg. pp. 88-96.
[60]
S. Zhang, Y. Wang, J. Xiao, Mining individual performance indicators in collaborative development using software repositories, in: Proceedings of 15th Asia-Pacific Software Engineering Conference (APSEC2008), 2008.
[61]
Zhang, S., Wang, Y., Yang, Y. and Xiao, J., Capability assessment of individual software development processes using software repositories and DEA. In: Wang, Q., Pfahl, D., Raffo, D.M. (Eds.), LNCS, vol. 5007. Springer. pp. 147-159.
[62]
S. Zhang, Y. Wang, F. Yuan, L. Ruan, Mining software repositories to understand the performance of individual developers, in: Proceedings of COMPSAC, 2007.
[63]
X. Zhao, K. Chan, M. Li, Applying agent technology to software process modeling and process-centered software engineering environment, in: The 20th Annual ACM Symposium on Applied Computing(SAC'05), Santa Fe, New Mexico, USA, 2005, pp. 1529-1533.

Cited By

View all
  • (2022)Comparative effects of knowledge-based antecedents in different realms of CMMI-based software process improvement successComputer Standards & Interfaces10.1016/j.csi.2021.10359981:COnline publication date: 1-Apr-2022
  • (2017)Dynamic behavioral assessment model based on Hebb learning ruleNeural Computing and Applications10.1007/s00521-016-2341-528:1(245-257)Online publication date: 1-Jan-2017
  • (2016)Process mining with token carried dataInformation Sciences: an International Journal10.1016/j.ins.2015.08.050328:C(558-576)Online publication date: 20-Jan-2016
  1. Creating Process-Agents incrementally by mining process asset library

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Information Sciences: an International Journal
    Information Sciences: an International Journal  Volume 233, Issue
    June, 2013
    321 pages

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 01 June 2013

    Author Tags

    1. Clustering
    2. Human resource
    3. Process-Agent
    4. Software process
    5. Trustworthiness

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Comparative effects of knowledge-based antecedents in different realms of CMMI-based software process improvement successComputer Standards & Interfaces10.1016/j.csi.2021.10359981:COnline publication date: 1-Apr-2022
    • (2017)Dynamic behavioral assessment model based on Hebb learning ruleNeural Computing and Applications10.1007/s00521-016-2341-528:1(245-257)Online publication date: 1-Jan-2017
    • (2016)Process mining with token carried dataInformation Sciences: an International Journal10.1016/j.ins.2015.08.050328:C(558-576)Online publication date: 20-Jan-2016

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media