[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2593882.2593892acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

Software services: a research roadmap

Published: 31 May 2014 Publication History

Abstract

Software services companies offer software development, testing and maintenance as a “service” to other organizations. As a thriv- ing industry in its own right, software services offers certain unique research problems as well as different takes on research problems typically considered in software engineering research. In this paper, we highlight some of these research problems, drawing heavily upon our involvement with IBM Global Business Services organization over the past several years. We focus on four selected topics: how to organize people and the flow of work through people, how to manage knowledge at an organizational level, how to estimate and manage risk in a services engagement, and finally, testing services. These topics by no means cover all areas pertinent to soft- ware services; rather, they reflect ones in which we have personal perspectives to offer. We also share our experience in deployment of research innovations in a large service delivery organization.

References

[1]
EggPlant. http://www.testplant.com/products/ eggplant.
[2]
Perfecto Mobile ScriptOnce API. http://www. perfectomobile.com/articles/scriptonce-api’ s-page.
[3]
APQC Process Classification Framework. http://www.apqc. org/process-classification-framework.
[4]
SAP Solution Maps. http://www.sap.com/solution. html.
[5]
JBoss Drools. http://www.jboss.org/drools/.
[6]
Application Assembly Optimization. URL \url{http://www.ibm.com/services/ us/gbs/application-management/ application-assembly-optimization/}.
[7]
HP QuickTest Professional. http://www8.hp.com/us/ en/software-solutions/software.html?compURI= 1172122&jumpid=reg_r1002_usen#.T-amcRfB-Gc.
[8]
IBM Rational Functional Tester. http://www-01.ibm.com/ software/awdtools/tester/functional.
[9]
ILog BRMS. http://www-01.ibm.com/software/ websphere/ilog/.
[10]
Selenium. http://seleniumhq.org.
[11]
T. Addison and S. Vallabh. Controlling software project risks: an empirical study of methods used by experienced project managers. In Proceedings of SAICSIT, 2002.
[12]
M. Alavi and D. Leidner. Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. In Proceedings of JSTOR, 2001.
[13]
M. Amram and N. Kulatilaka. Real Options: Managing Strategic Investment in an Uncertain World. Harvard Business School, 2000.
[14]
B. Ashok, J. Joy, H. Liang, S. K. Rajamani, G. Srinivasa, and V. Vangala. Debugadvisor: A recommender system for debugging. In Proceedings of FSE, 2009.
[15]
K. Balog, L. Azzopardi, and M. de Rijke. Formal models for expert finding in enterprise corpora. In Proceedings of SIGIR, 2006.
[16]
K. M. Bartol and A. Srivastava. Encouraging knowledge sharing: the role of organizational reward systems. Journal of Leadership & Organizational Studies, 9(1), 2002.
[17]
A. Begel, Y. P. Khoo, and T. Zimmermann. Codebook: Discovering and exploiting relationships in software repositories. In Proceedings of ICSE. ACM, 2010.
[18]
C. M. Beise. It project management and virtual teams. In Proceedings SIGMIS conference on Computer personnel research, 2004.
[19]
P. Berkhin. A survey of clustering data mining techniques. In Grouping Multidimensional Data, pages 25–71. 2006.
[20]
C. M. Bishop and N. M. Nasrabadi. Pattern recognition and machine learning, volume 1. Springer, New York, 2006.
[21]
D. M. Blei. Probabilistic topic models. Communications of the ACM, 55(4), 2012.
[22]
B. W. Boehm. Tutorial: Software Risk Management. IEEE Computer Society Press, 1989.
[23]
A. S. Bollinger and R. D. Smith. Managing organizational knowledge as a strategic asset. Journal of Knowledge Management, 5(1): 8–18, 2001.
[24]
G. Booch and A. Brown. Collaborative development environments. Advances in Computers, 59, 2003.
[25]
T.-H. Chang, T. Yeh, and R. C. Miller. GUI testing using computer vision. In Proceedings of CHI, pages 1535–1544, 2010.
[26]
R. N. Charette. Software Engineering Risk Analysis and Management. New York: McGraw-Hill, 1989.
[27]
L. Chen, O. Sheng, D. Goreham, and J. Watanabe. A real option analysis approach to evaluating digital government investment. In Proceedings of National conference on Digital government research, pages 157–166, 2005.
[28]
L. Cheng and C. DeSouza. Building collaboration into ides. ACM Queue, 9, 2004.
[29]
S. R. Choudhary, H. Versee, and A. Orso. WEBDIFF: Automated identification of cross-browser issues in web applications. In Proceedings of ICSM, pages 1–10, 2010.
[30]
S. R. Choudhary, D. Zhao, H. Versee, and A. Orso. WATER: Web Application TEst Repair. In Proceedings of ETSE, pages 24–29, 2011.
[31]
S. R. Choudhary, M. R. Prasad, and A. Orso. CrossCheck: Combining crawling and differencing to better detect cross-browser incompatibilities in web applications. In Proceedings of ICST, pages 171–180, 2012.
[32]
S. R. Choudhary, M. R. Prasad, and A. Orso. X-PERT: Accurate identification of cross-browser issues in web applications. In Proceedings of ICSE, pages 702–711, 2013.
[33]
E. Clemons and B. Weber. Strategic information technology investments: guidelines for decision making. Journal of Management Information Systems, 7(2):9–28, Fall 1990.
[34]
D. M. Cohen, S. R. Dalal, J. Parelius, and G. C. Patton. The combinatorial design approach to automatic test generation. IEEE Softw., 13(5):83–88, Sept. 1996.
[35]
D. M. Cohen, S. R. Dalal, M. L. Fredman, and G. C. Patton. The AETG System: An Approach to Testing Based on Combinatorial Design. IEEE Trans. Softw. Eng., 23(7):437–444, July 1997.
[36]
M. B. Cohen, P. B. Gibbons, W. B. Mugridge, and C. J. Colbourn. Constructing test suites for interaction testing. In Proceedings of ICSE, pages 38–48, 2003.
[37]
IBM. Communications. Making markets through services. IBM Annual Investor’s Briefing, page 10, 2012.
[38]
D. Cubranic and G. Murphy. Hipikat: Recommending pertinent software development artifacts. Proceedings of ICSE, pages 403–418, 2003.
[39]
D. Cubranic, G. C. Murphy, J. Singer, and K. S. Booth. Hipikat: A project memory for software development. IEEE Transactions on Software Engineering, 2005.
[40]
B. Daniel, V. Jagannath, D. Dig, and D. Marinov. ReAssert: Suggesting repairs for broken unit tests. In Proceedings of ASE, pages 433–444, 2009.
[41]
B. Daniel, T. Gvero, and D. Marinov. On test repair using symbolic execution. In Proceedings of ISSTA, pages 207–218, 2010.
[42]
B. Daniel, Q. Luo, M. Mirzaaghaei, D. Dig, D. Marinov, and M. Pezzè. Automated GUI refactoring and test script repair. In Proceedings of ETSE, pages 38–41, 2011.
[43]
T. H. Davenport and L. Pruzak. Working knowledge: How organizations manage what they know. Harvard Business Press, 2000.
[44]
K. Desouza, T. Dingsoyr, and Y. Awazu. Experiences with conducting project postmortems: Reports vs. stories and practitioner perspective. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005.
[45]
K. C. Desouza, Y. Awazu, and P. Baloh. Managing knowledge in global software development efforts: Issues and practices. IEEE Software, 23:30–37, 2006.
[46]
P. Devaki, S. Thummalapenta, N. Singhania, and S. Sinha. Efficient and flexible GUI test execution via test merging. In Proceedings of ISSTA, pages 34–44, 2013.
[47]
T. G. Dietterich. Ensemble methods in machine learning. In Proceedings of the First International Workshop on Multiple Classifier Systems, 2000.
[48]
M. Emmi, R. Majumdar, and K. Sen. Dynamic test input generation for database applications. In Proceedings of ISSTA, 2007.
[49]
J. R. Evaristo, R. Scudder, K. Desouza, and O. Sato. A dimensional analysis of geographically distributed project teams: A case study. Journal of Engineering and Technology Management, 21:175–189, 2004.
[50]
E. Farchi, I. Segall, and R. Tzoref-Brill. Using projections to debug large combinatorial models. In Proceedings of ICST Workshops, pages 311–320, 2013.
[51]
S. Feldman and C. Sherman. The high cost of not finding information. IDC Whitepaper.
[52]
R. G. Fichman. Real options and it platform adoption: Implications for theory and practice. Information Systems Research, 15(2):132– 154, 2004.
[53]
B. Freimut, S. Hartkopf, P. Kaiser, J. Kontio, and W. Kobitzsch. An industrial case study of implementing software risk management. In Proceedings of FSE, pages 277–287, 2001. ISBN 1-58113-390-1.
[54]
D. G. Gilovich and D. Kahneman. Heuristics and Biases: The Psychology of Intuitive Judgement. Cambridge University Press, Cambridge, U.K., 2002.
[55]
R. Goodwin, S. Goh, P. Mazzolen, V. Sinha, D. Mukherjee, and S. Mani. Effective content reuse for business consulting practices. Annual SRII Global Conference, 2012.
[56]
M. Grechanik, Q. Xie, and C. Fu. Maintaining and evolving GUIdirected test scripts. In Proceedings of ICSE, pages 408–418, 2009.
[57]
M. Grechanik, C. Csallner, C. Fu, and Q. Xie. Is data privacy always good for software testing? In Proceedings of ISSRE, pages 368–377, 2010.
[58]
R. Guha, R. McCool, and E. Miller. Semantic search. In Proceedings of WWW, 2003.
[59]
S. Gulwani. Dimensions in program synthesis. In Proceedings of SPPDP, pages 13–24, 2010.
[60]
M. Gupta, D. Mukherjee, S. Mani, V. Singhal Sinha, and S. Sinha. Serving information needs in business process consulting. In Business Process Management, Lecture Notes in Computer Science, 2011.
[61]
M. Hansen, N. Nohria, and T. Tierney. Whatâ ˘ A ´ Zs your strategy for managing knowledge. The knowledge management yearbook, 2001: 55–69, 2000.
[62]
D. Hao, T. Lan, H. Zhang, C. Guo, and L. Zhang. Is this a bug or an obsolete test? In Proceedings of ECOOP, pages 602–628, 2013.
[63]
P. Hendriks. Why share knowledge? the influence of ict on the motivation for knowledge sharing. Knowledge and process management, 6(2), 1999.
[64]
S. Henss, M. Monperrus, and M. Mezini. Semi-automatically extracting faqs to improve accessibility of software development knowledge. In Proceedings of ICSE, 2012.
[65]
J. D. Herbsleb and D. Moitra. Global Software Development. IEEE Software, March-April, 2001.
[66]
R. Holmes and R. J. Walker. Systematizing pragmatic software reuse. ACM Trans. Softw. Eng. Methodol., 21(4), Feb. 2013.
[67]
M. Host and C. Lindholm. Different conceptions in software project risk assessment. In Proceedings of SAC, pages 1422–1426, 2007.
[68]
Y. Hu, J. Huang, J. Chen, M. Liu, and K. Xie. Software project risk management modeling with neural network and support vector machine approaches. In Proceedings of ICNC, volume 3, pages 358– 362, 24–27 Aug. 2007.
[69]
G. Jianyi, Z. Li, L. Xusheng, H. Yuejuan, and Y. Zhengtao. Implementing a quantitative-based methodology for project risk assessment dss. In Proceedings of CCC, pages 730–734, 2008.
[70]
V. Kacholia, S. Pandit, S. Chakrabarti, S. Sudarshan, R. Desai, and H. Karambelkar. Bidirectional expansion for keyword search on graph databases. In Proceedings of VLDB, 2005.
[71]
S. Kagan and M. Rolek. IBM Next Generation Testing. http://public.dhe.ibm.com/common/ssi/ecm/ en/gbw03121usen/GBW03121USEN.PDF, 2010.
[72]
D. Kasap and M. Kaymak. Risk identification step of the project risk management. In Proc. Portland International Center for Management of Engineering and Technology, pages 2116–2120, 5–9 Aug. 2007.
[73]
M. Keil, J. Mann, and R. Arun. Why software projects escalate: An empirical analysis and test of four theoretical models. MIS Quarterly, 24(4):631–664, 2000.
[74]
R. Kraft, F. Maghoul, and C. C. Chang. Y! q: contextual search at the point of inspiration. In Proceedings of CIKM. ACM, 2005.
[75]
R. Kumar. A note on project risk and option values of investments in information technologies. Journal of Management Information Systems, pages 187–193, 1996.
[76]
V. Le, S. Gulwani, and Z. Su. SmartSynth: Synthesizing smartphone automation scripts from natural language. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, pages 193–206, 2013.
[77]
C. Li and C. Csallner. Dynamic symbolic database application testing. In Proceedings of the 3rd International Workshop on Testing Database Systems, 2010.
[78]
Q. Li and B. Boehm. Improving scenario testing process by adding value-based prioritization: An industrial case study. In Proceedings of ICSSP, pages 78–87, 2013.
[79]
J. Mahmud and T. Lau. Lowering the barriers to website testing with cotester. In Proceedings of IUI, pages 169–178, 2010.
[80]
D. Majumdar, R. Catherine, S. Ikbal, and K. Visweswariah. Privacy protected knowledge management in services with emphasis on quality data. In Proceedings of CIKM, 2011.
[81]
Y. Malhotra. Why knowledge management systems fail: enablers and constraints of knowledge management in human enterprises. In Handbook on Knowledge Management 1. Springer, 2004.
[82]
S. Mani, K. Sankaranarayanan, V. S. Sinha, and P. Devanbu. Panning requirement nuggets in stream of software maintenance tickets. In Technical Report RI14006, IBM Research.
[83]
S. Mani, R. Catherine, V. S. Sinha, and A. Dubey. AUSUM: Approach for unsupervised bug report summarization. In Proceedings of FSE, 2012.
[84]
C. D. Manning, P. Raghavan, and H. Schütze. Introduction to information retrieval, volume 1. Cambridge University Press Cambridge, 2008.
[85]
B. Manville. A complex adaptive approach to KM: reflections on the case of McKinsey & Company, Inc. In Knowledge Management Review.
[86]
M. Marcozzi, W. Vanhoof, and J.-L. Hainaut. Test input generation for database programs using relational constraints. In Proceedings of the 5th International Workshop on Testing Database Systems, 2012.
[87]
E. Maytorena, G. M. Winch, J. Freeman, and T. Kiely. The influence of experience and information search styles on project risk identification performance. IEEE Transactions on Engineering Management, 54(2):315–326, 2007.
[88]
R. McDermott. Why information technology inspired but cannot deliver knowledge management. Knowledge and communities, 41 (4):21–35, 2000.
[89]
A. M. Memon. Automatically repairing event sequence-based GUI test suites for regression testing. ACM Transaction Software Engineering and Methodology, 18:1–36, November 2008.
[90]
A. Mesbah and M. R. Prasad. Automated cross-browser compatibility testing. In Proceedings of ICSE, pages 561–570, 2011.
[91]
M. Mirzaaghaei, F. Pastore, and M. Pezzé. Supporting test suite evolution through test case adaptation. In Proceedings of ICST, pages 231–240, 2012.
[92]
A. Mockus and J. Herbsleb. Expertise browser. a quantitative approach to identifying expertise. Proceedings of ICSE, pages 503– 512, 2002.
[93]
A. Mockus and J. D. Herbsleb. Expertise browser: A quantitative approach to identifying expertise. In Proceedings of ICSE, 2002.
[94]
D. Mukherjee, S. Mani, V. S. Sinha, R. Ananthanarayanan, B. Srivastava, P. Dhoolia, and P. Chowdhury. AHA: Asset harvester assistant. In Proceedings of SCC, 2010.
[95]
N. Nagappan and T. Ball. Use of relative code churn measures to predict system defect density. In Proceedings of ICSE, 2005.
[96]
L. T. Nowell, R. K. France, D. Hix, L. S. Heath, and E. A. Fox. Visualizing search results: Some alternatives to query-document similarity. In Proceedings of SIGIR, 1996.
[97]
K. Pan, X. Wu, and T. Xie. Generating program inputs for database application testing. In Proceedings of ASE, 2011.
[98]
D. Perelman, S. Gulwani, T. Ball, and D. Grossman. Type-directed completion of partial expressions. In Proceedings of PLDI, pages 275–286, 2012.
[99]
L. S. Pinto, S. Sinha, and A. Orso. Understanding myths and realities of test-suite evolution. In Proceedings of FSE, 2012.
[100]
G. V. Ranade and L. R. Varshney. To crowdsource or not to crowdsource? Proceedings of the 4th Human Computation Workshop, 2012.
[101]
S. Rastkar, G. C. Murphy, and G. Murray. Summarizing software artifacts: A case study of bug reports. In Proceedings of ICSE, 2010.
[102]
S. P. Reiss. Semantics-based code search. In Proceedings of ICSE, 2009.
[103]
I. Segall and R. Tzoref-Brill. Interactive refinement of combinatorial test plans. In Proceedings of ICSE, pages 1371–1374, 2012.
[104]
I. Segall, R. Tzoref-Brill, and A. Zlotnick. Simplified modeling of combinatorial test spaces. In Proceedings of ICST, pages 573–579, 2012.
[105]
B. Sengupta, S. Chandra, and S. V. A research agenda for distributed software development. Proceedings of ICSE, 2006.
[106]
B. Shneiderman, D. Feldman, A. Rose, and X. F. Grau. Visualizing digital library search results with categorical and hierarchical axes. In Proceedings of the Fifth ACM Conference on Digital Libraries, 2000.
[107]
V. S. Sinha, S. Mani, and D. Mukherjee. Is text search an effective approach for fault localization: A practitioners perspective. In Proceedings of SPLASH, Wavefront track, 2012.
[108]
G. Spanoudakis and A. Zisman. Software traceability: a roadmap. Handbook of Software Engineering and Knowledge Engineering, 3: 395–428, 2005.
[109]
A. Sun and C. Li. Research on project risk evaluation method based on markov process. In Proceedings of WiCOM, pages 5293–5296, 2007.
[110]
C. Sun, D. Lo, X. Wang, J. Jiang, and S.-C. Khoo. A discriminative model approach for accurate duplicate bug report retrieval. In Proceedings of ICSE, 2010.
[111]
K. Taneja, M. Grechanik, R. Ghani, and T. Xie. Testing software in age of data privacy: A balancing act. In Proceedings of ESEC/FSE, pages 201–211, 2011.
[112]
S. Thummalapenta, N. Singhania, P. Devaki, S. Sinha, S. Chandra, A. K. Das, and S. Mangipudi. Efficiently scripting change-resilient tests. In Proceedings of FSE, Tool Demonstrations Track, 2012.
[113]
S. Thummalapenta, S. Sinha, N. Singhania, and S. Chandra. Automating test automation. In Proceedings of ICSE, 2012.
[114]
S. Thummalapenta, P. Devaki, S. Sinha, S. Chandra, S. Gnanasundaram, D. D. Nagaraj, and S. Sathishkumar. Efficient and changeresilient test automation: An industrial case study. In Proceedings of ICSE, SE in Practice Track, pages 1002–1011, 2013.
[115]
S. Thummalapenta, K. V. Lakshmi, S. Sinha, N. Sinha, and S. Chandra. Guided test generation for web applications. In Proceedings of ICSE, pages 162–171, 2013.
[116]
X. Wang, L. Zhang, T. Xie, J. Anvik, and J. Sun. An approach to detecting duplicate bug reports using natural language and execution information. In Proceedings of ICSE, 2008.
[117]
J.-R. Wen, N. Lao, and W.-Y. Ma. Probabilistic model for contextual retrieval. In Proceedings of SIGIR, 2004.
[118]
D. Willmor and S. M. Embury. Testing the implementation of business rules using intensional database tests. In Proceedings of TAIC– PART, pages 115–126, 2006.
[119]
M. Wing. On the economics of software. SIGSOFT Softw. Eng. Notes, 32(6):8–9, 2007.
[120]
T. Yeh, T.-H. Chang, and R. C. Miller. Sikuli: Using GUI screenshots for search and automation. In Proceedings of UIST, 2009.
[121]
S. Zhang, H. Lü, and M. D. Ernst. Automatically repairing broken workflows for evolving GUI applications. In Proceedings of ISSTA, 2013.

Cited By

View all
  • (2020)The role of blockchain for increase trust on software components and services2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)10.1109/AICT50176.2020.9368582(1-4)Online publication date: 7-Oct-2020
  • (2019)Systematic Mapping on Quality in Web Application Testing2019 1st International Informatics and Software Engineering Conference (UBMYK)10.1109/UBMYK48245.2019.8965472(1-5)Online publication date: Nov-2019
  • (2016)A retrospective analysis of SAC requirementsACM SIGAPP Applied Computing Review10.1145/2993231.299323416:2(26-41)Online publication date: 29-Aug-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
FOSE 2014: Future of Software Engineering Proceedings
May 2014
224 pages
ISBN:9781450328654
DOI:10.1145/2593882
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • TCSE: IEEE Computer Society's Tech. Council on Software Engin.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 May 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Software services
  2. distributed development
  3. knowledge management
  4. risk management
  5. testing

Qualifiers

  • Article

Conference

ICSE '14
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)The role of blockchain for increase trust on software components and services2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)10.1109/AICT50176.2020.9368582(1-4)Online publication date: 7-Oct-2020
  • (2019)Systematic Mapping on Quality in Web Application Testing2019 1st International Informatics and Software Engineering Conference (UBMYK)10.1109/UBMYK48245.2019.8965472(1-5)Online publication date: Nov-2019
  • (2016)A retrospective analysis of SAC requirementsACM SIGAPP Applied Computing Review10.1145/2993231.299323416:2(26-41)Online publication date: 29-Aug-2016
  • (2016)Retrospective, relevance, and trends of SAC requirements engineering trackProceedings of the 31st Annual ACM Symposium on Applied Computing10.1145/2851613.2851757(1264-1269)Online publication date: 4-Apr-2016
  • (2014)Taming the interoperability challenges of complex IoT systemsProceedings of the 1st ACM Workshop on Middleware for Context-Aware Applications in the IoT10.1145/2676743.2676744(1-6)Online publication date: 9-Dec-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media