I was an editor on ISO/IEC JTC1 SC7 Software Engineering and was sometimes Head of Delagation to ISO/IEC JTC1 SC7 meetings.
In the Japanese Committee, Mr. Tomoo Matsubara who was an editor of the jarnal, IEEE zsoftware.
He was an engineer on the software factory in Hitachi Group early days.
Before we make a brief paper on software factory, We start to summarize the papers on "Software Factory" in arXiv.
view points
Software quality
In Japan, Software factory was a concept based on software quality like a inductrial factory.
Automation
Arganization/Management
Reference
arXiv papers
1 SWE-Factory: Your Automated Factory for Issue Resolution Training Data and Evaluation Benchmarks
Lianghong Guo, Yanlin Wang,∗, Caihua Li, Pengyu Yang, Jiachi Chen, Wei Tao, Yingtian Zou, Duyu Tang, Zibin Zheng
https://arxiv.org/pdf/2506.10954
References
[1] Exit status. https://en.wikipedia.org/wiki/Exit_status, 2024. Accessed: 2025-06-
11.
[2] Reem Aleithan, Haoran Xue, Mohammad Mahdi Mohajer, Elijah Nnorom, Gias Uddin,
and Song Wang. Swe-bench+: Enhanced coding benchmark for llms. arXiv preprint
arXiv:2410.06992, 2024.
[3] Daman Arora, Atharv Sonwane, Nalin Wadhwa, Abhav Mehrotra, Saiteja Utpala, Ramakrishna
Bairi, Aditya Kanade, and Nagarajan Natarajan. Masai: Modular architecture for software-
engineering ai agents. arXiv preprint arXiv:2406.11638, 2024.
[4] Tegawendé F. Bissyandé, David Lo, Lingxiao Jiang, Laurent Réveillère, Jacques Klein, and
Yves Le Traon. Got issues? who cares about it? A large scale investigation of issue trackers
from github. In ISSRE, pages 188–197. IEEE Computer Society, 2013.
[5] Islem Bouzenia and Michael Pradel. You name it, i run it: An llm agent to execute tests of
arbitrary projects. arXiv preprint arXiv:2412.10133, 2024.
[6] Dong Chen, Shaoxin Lin, Muhan Zeng, Daoguang Zan, Jian-Gang Wang, Anton Cheshkov, Jun
Sun, Hao Yu, Guoliang Dong, Artem Aliev, et al. Coder: Issue resolving with multi-agent and
task graphs. arXiv preprint arXiv:2406.01304, 2024.
[7] Aleksandra Eliseeva, Alexander Kovrigin, Ilia Kholkin, Egor Bogomolov, and Yaroslav Zharov.
Envbench: A benchmark for automated environment setup. arXiv preprint arXiv:2503.14443,
2025.
[8] Lianghong Guo, Wei Tao, Runhan Jiang, Yanlin Wang, Jiachi Chen, Xilin Liu, Yuchi Ma,
Mingzhi Mao, Hongyu Zhang, and Zibin Zheng. Omnigirl: A multilingual and multimodal
benchmark for github issue resolution. arXiv preprint arXiv:2505.04606, 2025.
[9] Naman Jain, Jaskirat Singh, Manish Shetty, Liang Zheng, Koushik Sen, and Ion Stoica. R2e-
gym: Procedural environments and hybrid verifiers for scaling open-weights swe agents. arXiv
preprint arXiv:2504.07164, 2025.
[10] Carlos E Jimenez, John Yang, Alexander Wettig, Shunyu Yao, Kexin Pei, Ofir Press, and Karthik
Narasimhan. Swe-bench: Can language models resolve real-world github issues? arXiv preprint
arXiv:2310.06770, 2023.
[11] JUnit. User guide: Launcher api exit codes. https://junit.org/junit5/docs/current/
user-guide/#launcher-api-exit-codes, 2024. Accessed: 2025-06-11.
[12] Yizhou Liu, Pengfei Gao, Xinchen Wang, Chao Peng, and Zhao Zhang. Marscode agent:
Ai-native automated bug fixing. arXiv preprint arXiv:2409.00899, 2024.
[13] Yingwei Ma, Qingping Yang, Rongyu Cao, Binhua Li, Fei Huang, and Yongbin Li. How to
understand whole software repository? arXiv preprint arXiv:2406.01422, 2024.
[14] Mocha. Mocha exit code. https://mochajs.org/#mocha-exit-code, 2024. Accessed:
2025-06-11.
[15] OpenAI. Swe-bench verified: A human-validated subset for ai model evaluation. https:
//openai.com/index/introducing-swe-bench-verified, 2024. Accessed: 2024-10-
21.
[16] Jiayi Pan, Xingyao Wang, Graham Neubig, Navdeep Jaitly, Heng Ji, Alane Suhr, and Yizhe
Zhang. Training software engineering agents and verifiers with swe-gym. arXiv preprint
arXiv:2412.21139, 2024.
[17] pytest. pytest exit codes. https://docs.pytest.org/en/latest/reference/
exit-codes.html, 2024. Accessed: 2025-06-11.
[18] Wei Tao, Yucheng Zhou, Yanlin Wang, Hongyu Zhang, Haofen Wang, and Wenqiang Zhang.
KADEL: knowledge-aware denoising learning for commit message generation. ACM Trans.
Softw. Eng. Methodol., 33(5):133:1–133:32, 2024.
[19] Wei Tao, Yucheng Zhou, Yanlin Wang, Wenqiang Zhang, Hongyu Zhang, and Yu Cheng.
MAGIS: LLM-based multi-agent framework for github issue resolution. arXiv preprint
arXiv:2403.17927, 2024.
[20] Konstantinos Vergopoulos, Mark Niklas Müller, and Martin Vechev. Automated benchmark
generation for repository-level coding tasks. arXiv preprint arXiv:2503.07701, 2025.
[21] Xingyao Wang, Boxuan Li, Yufan Song, Frank F Xu, Xiangru Tang, Mingchen Zhuge, Jiayi
Pan, Yueqi Song, Bowen Li, Jaskirat Singh, et al. Opendevin: An open platform for ai software
developers as generalist agents. arXiv preprint arXiv:2407.16741, 2024.
[22] Chunqiu Steven Xia, Yinlin Deng, Soren Dunn, and Lingming Zhang. Agentless: Demystifying
llm-based software engineering agents. arXiv preprint arXiv:2407.01489, 2024.
[23] John Yang, Carlos E Jimenez, Alexander Wettig, Kilian Lieret, Shunyu Yao, Karthik
Narasimhan, and Ofir Press. Swe-agent: Agent-computer interfaces enable automated software
engineering. arXiv preprint arXiv:2405.15793, 2024.
[24] John Yang, Kilian Leret, Carlos E Jimenez, Alexander Wettig, Kabir Khandpur, Yanzhe Zhang,
Binyuan Hui, Ofir Press, Ludwig Schmidt, and Diyi Yang. Swe-smith: Scaling data for software
engineering agents. arXiv preprint arXiv:2504.21798, 2025.
[25] Daoguang Zan, Zhirong Huang, Wei Liu, Hanwu Chen, Linhao Zhang, Shulin Xin, Lu Chen,
Qi Liu, Xiaojian Zhong, Aoyan Li, et al. Multi-swe-bench: A multilingual benchmark for issue
resolving. arXiv preprint arXiv:2504.02605, 2025.
[26] Daoguang Zan, Zhirong Huang, Ailun Yu, Shaoxin Lin, Yifan Shi, Wei Liu, Dong Chen,
Zongshuai Qi, Hao Yu, Lei Yu, et al. Swe-bench-java: A github issue resolving benchmark for
java. arXiv preprint arXiv:2408.14354, 2024.
[27] Linghao Zhang, Shilin He, Chaoyun Zhang, Yu Kang, Bowen Li, Chengxing Xie, Junhao
Wang, Maoquan Wang, Yufan Huang, Shengyu Fu, et al. Swe-bench goes live! arXiv preprint
arXiv:2505.23419, 2025.
[28] Yuntong Zhang, Haifeng Ruan, Zhiyu Fan, and Abhik Roychoudhury. Autocoderover: Au-
tonomous program improvement. In Proceedings of the 33rd ACM SIGSOFT International
Symposium on Software Testing and Analysis, pages 1592–1604, 2024.
2 Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem
Kaspar Hageman, Álvaro Feal, Julien Gamba, Aniketh Girish, Jakob Bleier, Martina Lindorfer, Juan Tapiador, Narseo Vallina-Rodriguez
https://arxiv.org/pdf/2211.13104
REFERENCES
[1] M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratan-
tonio, V. Van Der Veen, and C. Platzer, “Andrubis–1,000,000
apps later: A view on current android malware behaviors,” in
2014 third international workshop on building analysis datasets and
gathering experience returns for security (BADGERS). IEEE, 2014.
[2] S. Alrabaee, P. Shirani, M. Debbabi, and L. Wang, “On the
feasibility of malware authorship attribution,” in International
Symposium on Foundations and Practice of Security. Springer, 2016.
[3] L. B. Platon Kotzias, Juan Caballero, “How did that get in my
phone? unwanted app distribution on android device,” in IEEE
Symposium on Security and Privacy (SP), 2020.
[4] “Chapter 3 – rights of the data subject,” https://gdpr-info.eu/
chapter-3/, 2018, "Accessed May 2021".
[5] H. Wang, Z. Liu, Y. Guo, X. Chen, M. Zhang, G. Xu, and
J. Hong, “An explorative study of the mobile app ecosystem from
app developers’ perspective,” in Proceedings of the International
Conference on World Wide Web (WWW), 2017.
[6] H. Wang, Z. Liu, J. Liang, N. Vallina-Rodriguez, Y. Guo, L. Li,
J. Tapiador, J. Cao, and G. Xu, “Beyond google play: A large-
scale comparative study of chinese android app markets,” in
Proceedings of the Internet Measurement Conference (IMC), 2018.
[7] H. Wang, H. Li, and Y. Guo, “Understanding the evolution of
mobile app ecosystems: A longitudinal measurement study of
google play,” in Proceedings of the International Conference on World
Wide Web (WWW), 2019.
[8] M. Ali, M. E. Joorabchi, and A. Mesbah, “Same app, different app
stores: A comparative study,” in Proceedings of the 4th International
Conference on Mobile Software Engineering and Systems, 2017.
[9] N. Zhong and F. Michahelles, “Google play is not a long tail
market: An empirical analysis of app adoption on the google play
app market,” in Proceedings of the 28th Annual ACM Symposium on
Applied Computing, 2013.
[10] N. Viennot, E. Garcia, and J. Nieh, “A measurement study of
google play,” in The 2014 ACM international conference on Mea-
surement and modeling of computer systems, 2014.
[11] A. Holzer and J. Ondrus, “Mobile application market: A devel-
oper’s perspective,” Telemat. Inf., 2011.
[12] N. d’Heureuse, F. Huici, M. Arumaithurai, M. Ahmed, K. Pa-
pagiannaki, and S. Niccolini, “What’s app? a wide-scale mea-
surement study of smart phone markets,” Proceedings of the
SIGMOBILE Mobile Computing and Communications Review, 2012.
[13] B. Kaliski, “Pkcs# 7: Cryptographic message syntax version 1.5,”
1998.
[14] D. Kim, B. J. Kwon, and T. Dumitra¸s, “Certified malware:
Measuring breaches of trust in the windows code-signing pki,”
in Proceedings of the ACM SIGSAC Conference on Computer and
Communications Security, 2017.
[15] B. VanderSloot, J. Amann, M. Bernhard, Z. Durumeric, M. Bailey,
and J. A. Halderman, “Towards a complete view of the certifi-
cate ecosystem,” in Proceedings of the 2016 Internet Measurement
Conference, 2016.
[16] “Apple Developer Program: What You Need To Enroll,” https:
//developer.apple.com/programs/enroll/, 2021.
[17] “Identity Verification,” https://developer.apple.com/support/identity-verification/, 2021.
[18] “Google Play Policy Center,” https://support.google.com/googleplay/android-developer/answer/9898842, 2021.
[19] “Sign your app,” https://developer.android.com/studio/publish/app-signing, 2021.
[20] M. Lindorfer, S. Volanis, A. Sisto, M. Neugschwandtner,
E. Athanasopoulos, F. Maggi, C. Platzer, S. Zanero, and S. Ioan-
nidis, “Andradar: fast discovery of android applications in al-
ternative markets,” in Proceedings of the International conference
on detection of intrusions and malware, and vulnerability assessment
(DIMVA), 2014.
[21] E. Okoyomon, N. Samarin, P. Wijesekera, A. Elazari Bar On,
N. Vallina-Rodriguez, I. Reyes, Á. Feal, and S. Egelman, “On
the ridiculousness of notice and consent: Contradictions in app
privacy policies,” Workshop on Technology and Consumer Protection
(ConPro), 2019.
[22] J. Crussell, C. Gibler, and H. Chen, “Attack of the clones: Detect-
ing cloned applications on android markets,” in Proceedings of the
European Symposium on Research in Computer Security (ESORICS),
2012.
[23] B. Kim, K. Lim, S.-J. Cho, and M. Park, “Romadroid: A robust
and efficient technique for detecting android app clones using a
tree structure and components of each app’s manifest file,” IEEE
Access, 2019.
[24] H. Wang, Y. Guo, Z. Ma, and X. Chen, “Wukong: A scalable and
accurate two-phase approach to android app clone detection,” in
Proceedings of the International Symposium on Software Testing and
Analysis, 2015.
[25] K. Chen, P. Liu, and Y. Zhang, “Achieving accuracy and scala-
bility simultaneously in detecting application clones on android
markets,” in Proceedings of the International Conference on Software
Engineering, 2014.
[26] M. Sun, M. Li, and J. C. S. Lui, “DroidEagle: Seamless detection
of visually similar Android apps,” in Proceedings of the 8th ACM
Conference on Security & Privacy in Wireless and Mobile Networks,
2015.
[27] D. Barrera, J. Clark, D. McCarney, and P. C. van Oorschot, “Un-
derstanding and improving app installation security mechanisms
through empirical analysis of android,” in Proceedings of the
Second ACM Workshop on Security and Privacy in Smartphones and
Mobile Devices, 2012.
[28] L. Wu, M. Grace, Y. Zhou, C. Wu, and X. Jiang, “The impact
of vendor customizations on android security,” in Proceedings
of the ACM SIGSAC Conference on Computer and Communications
Security, 2013.
[29] K. Chen, P. Wang, Y. Lee, X. Wang, N. Zhang, H. Huang, W. Zou,
and P. Liu, “Finding unknown malice in 10 seconds: Mass vetting
for new threats at the google-play scale,” in Proceedings of the
USENIX Security Symposium, 2015.
[30] H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, “Authorship
attribution of android apps,” in Proceedings of the ACM Conference
on Data and Application Security and Privacy (CODASPY), 2018.
[31] V. Kalgutkar, N. Stakhanova, P. Cook, and A. Matyukhina, “An-
droid authorship attribution through string analysis,” in Proceed-
ings of the 13th International Conference on Availability, Reliability
and Security, 2018.
[32] M. Oltrogge, E. Derr, C. Stransky, Y. Acar, S. Fahl, C. Rossow,
G. Pellegrino, S. Bugiel, and M. Backes, “The rise of the citizen
developer: Assessing the security impact of online app genera-
tors,” in IEEE Symposium on Security and Privacy (SP), 2018.
[33] L. Li, T. F. Bissyandé, and J. Klein, “Rebooting research on detect-
ing repackaged android apps: Literature review and benchmark,”
IEEE Transactions on Software Engineering, 2019.
[34] P. Liu, L. Li, Y. Zhao, X. Sun, and J. Grundy, “Androzooopen:
Collecting large-scale open source android apps for the research
community,” in Proceedings of the International Conference on Min-
ing Software Repositories (MSR), 2020.
[35] J. Gamba, M. Rashed, A. Razaghpanah, J. Tapiador, and
N. Vallina-Rodriguez, “An analysis of pre-installed android soft-
ware,” in IEEE Symposium on Security and Privacy (SP), 2020.
[36] S. Sebastian and J. Caballero, “Towards attribution in mobile
markets: Identifying developer account polymorphism,” in Pro-
ceedings of the ACM SIGSAC Conference on Computer and Commu-
nications Security, 2020.
[37] G. Xu, C. Zhang, B. Sun, X. Yang, Y. Guo, C. Li, and H. Wang,
“Appauth: Authorship attribution for android app clones,” IEEE
Access, 2019.
[38] S. Aonzo, A. Merlo, G. Tavella, and Y. Fratantonio, “Phishing
attacks on modern android,” in Proceedings of the ACM SIGSAC
Conference on Computer and Communications Security, 2018.
[39] T. Petsas, A. Papadogiannakis, M. Polychronakis, E. P. Markatos,
and T. Karagiannis, “Rise of the planet of the apps: A systematic
study of the mobile app ecosystem,” in Proceedings of the Internet
Measurement Conference (IMC), 2013.
[40] S. Farooqi, A. Feal, T. Lauinger, D. McCoy, Z. Shafiq, and
N. Vallina-Rodriguez, “Understanding incentivized mobile app
installs on google play store,” in Proceedings of the Internet Mea-
surement Conference (IMC), 2020.
[41] “Dataset sharing | DropBox,” https://www.dropbox.com/sh/
dc8aa5qggto7z82/AADY7oyzt9Z7RP-c2pNQ98eXa?dl=0, 2021.
[42] “App Signing Considerations,” https://developer.android.com/
studio/publish/app-signing#considerations, 2021.
[43] “Signing Mac Software with Developer ID,” https://developer.
apple.com/developer-id/, 2021.
[44] “Recent Android App Bundle improvements
and timeline for new apps on Google Play,”
https://android-developers.googleblog.com/2020/08/
recent-android-app-bundle-improvements.html, 2020,
"Accessed May 2021".
[45] “Code Transparency for App Bundles,” https://developer.
android.com/guide/app-bundle/code-transparency, 2021.
[46] “Submit android apps,” https://www.apkmonk.com/
submit-app/, 2021.
[47] “Baidu Mobile Application Platform - Application Submission,”
https://app.baidu.com/newapp/docs/%E5%BA%94%E7%94%
A8%E5%88%86%E5%8F%91/%E5%BA%94%E7%94%A8%E5%
8F%91%E5%B8%83/%E5%BA%94%E7%94%A8%E6%8F%90%
E4%BA%A4, 2021.
[48] “APK Upload - APKMirror,” https://www.apkmirror.com/
apk-upload/, 2021.
[49] “Google Play Policy Center,” https://support.google.com/
googleplay/android-developer#topic=3450769, 2021.
[50] “Apkmonk - market policy,” https://www.apkmonk.com/
submit-app/, 2021, "Accessed May 2021 archived at http://
archive.today/2GVPl".
[51] “Tencet - market policy,” https://open.qq.com/eng/reg, 2021,
"Accessed May 2021 archived at http://archive.today/Nbusz".
[52] “Apkmirror - market policy,” https://www.apkmirror.com/
faq/, 2021, "Accessed May 2021 archived at http://archive.
today/mXflW".
[53] “Android Developers — manifest element,” https://developer.
android.com/guide/topics/manifest/manifest-element.html#
package, 2021.
[54] “Google Play Policy Center,” https://support.google.com/
googleplay/android-developer/topic/9858052, 2021, archived at
http://archive.today/gBMYU.
[55] “Google Play Policy Center,” https://support.google.com/
googleplay/android-developer/answer/9888689, 2021.
[56] “Google Play Policy Center,” https://support.google.com/
googleplay/android-developer/answer/9888374, 2021.
[57] 2018 reform of eu data protection rules. European Commission.
[Online]. Available: https://ec.europa.eu/commission/sites/
beta-political/files/data-protection-factsheet-changes_en.pdf
[58] E. Commission. Directive 2000/31/ec of the european parliament
and of the council of 8 june 2000 on certain legal aspects of
information society services, in particular electronic commerce,
in the internal market (’directive on electronic commerce’).
[Online]. Available: https://eur-lex.europa.eu/legal-content/
EN/TXT/HTML/?uri=CELEX:32000L0031&from=EN
[59] S. of California Department of Justice, “California consumer pri-
vacy act (ccpa),” https://www.oag.ca.gov/privacy/ccpa, 2018.
[60] E. Blázquez, S. Pastrana, Á. Feal, J. Gamba, P. Kotizias, N. Vallina-
Rodriguez, and J. Tapiador, “Trouble over-the-air: An analysis
of fota apps in the android ecosystem,” in IEEE Symposium on
Security and Privacy (SP), 2021.
[61] N. Marastoni, A. Continella, D. Quarta, S. Zanero, and M. D.
Preda, “Groupdroid: Automatically grouping mobile malware
by extracting code similarities,” in Proceedings of the 7th Software
Security, Protection, and Reverse Engineering / Software Security and
Protection Workshop, 2017.
[62] V. Rastogi, Y. Chen, and W. Enck, “Appsplayground: Automatic
security analysis of smartphone applications,” in Proceedings of
the ACM Conference on Data and Application Security and Privacy
(CODASPY), 2013.
[63] J. Ren, M. Lindorfer, D. J. Dubois, A. Rao, D. Choffnes, and
N. Vallina-Rodriguez, “Bug fixes, improvements,... and privacy
leaks: A longitudinal study of pii leaks across android app
versions,” in Proceedings of the Network and Distributed System
Security Symposium (NDSS), 2018.
[64] T. T. Nguyen, M. Backes, N. Marnau, and B. Stock, “Share First,
Ask Later (or Never?) - Studying Violations of GDPR’s Explicit
Consent in Android Apps,” in Proceedings of the USENIX Security
Symposium, 2021.
[65] R. Li, W. Diao, Z. Li, J. Du, and S. Guo, “Android custom
permissions demystified: From privilege escalation to design
shortcomings,” 2021.
[66] J. Reardon, Á. Feal, P. Wijesekera, A. E. B. On, N. Vallina-
Rodriguez, and S. Egelman, “50 ways to leak your data: An
exploration of apps’ circumvention of the android permissions
system,” in 28th {USENIX} Security Symposium ({USENIX} Secu-
rity 19), 2019.
[67] G. S. Tuncay, S. Demetriou, K. Ganju, and C. Gunter, “Resolving
the predicament of android custom permissions,” 2018.
[68] “Scrapy | A Fast and Powerful Scraping and Web Crawling
Framework,” https://scrapy.org/, 2021.
[69] “APKMonk,” https://www.apkmonk.com/, 2021.
[70] “APKMirror,” https://www.apkmirror.com/, 2021.
[71] “Baidu App Store,” https://shouji.baidu.com/, 2021.
[72] “Tencent App Store,” https://android.myapp.com/, 2021.
[73] K. Allix, T. F. Bissyandé, J. Klein, and Y. Le Traon, “AndroZoo:
Collecting Millions of Android Apps for the Research Com-
munity,” in Proceedings of the International Conference on Mining
Software Repositories (MSR), 2016.
[74] M. Ikram, N. Vallina-Rodriguez, S. Seneviratne, M. A. Kaafar,
and V. Paxson, “An analysis of the privacy and security risks of
android vpn permission-enabled apps,” in Proceedings of the 2016
internet measurement conference, 2016, pp. 349–364.
[75] “Number of available applications in the google
playstore,” https://www.statista.com/statistics/266210/
number-of-available-applications-in-the-google-play-store/,
2021, "Accessed November 2021".
[76] P. Calciati, K. Kuznetsov, X. Bai, and A. Gorla, “What did really
change with the new release of the app?” in Proceedings of the 15th
International Conference on Mining Software Repositories, 2018.
[77] Y. Hu, H. Wang, R. He, L. Li, G. Tyson, I. Castro, Y. Guo,
L. Wu, and G. Xu, “Mobile app squatting,” in Proceedings of the
International Conference on World Wide Web (WWW), 2020.
[78] Z. Chen, “Thousands of HiddenAds Trojan Apps Masquerade
as Google Play Apps,” https://www.mcafee.com/blogs/
other-blogs/mcafee-labs/multi-tricks-hiddenads-malware/,
2020.
[79] “Android users looking for Elon Musk on Clubhouse caused an
identically named app to pull itse,” https://9to5google.com/
2021/02/01/clubhouse-android-app-elon-musk/, 2021, "Ac-
cessed April 2021".
[80] H. Wang, H. Li, L. Li, Y. Guo, and G. Xu, “Why are Android apps
removed from Google Play?: A large-scale empirical study,” in
Proceedings of the 15th International Conference on Mining Software
Repositories, 2018.
[81] A. Marzal and E. Vidal, “Computation of normalized edit dis-
tance and applications,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 15, no. 9, 1993.
[82] “Andromo - Mobile App builder for Android. No coding,” https:
//www.andromo.com/, 2021.
[83] “Appypie - homepage,” https://www.appypie.com/, 2021, "Ac-
cessed May 2021".
[84] S. Zimmeck, Z. Wang, L. Zou, R. Iyengar, B. Liu, F. Schaub,
S. Wilson, N. Sadeh, S. Bellovin, and J. Reidenberg, “Automated
analysis of privacy requirements for mobile apps,” in 2016 AAAI
Fall Symposium Series, 2016.
[85] H. Harkous, K. Fawaz, R. Lebret, F. Schaub, K. G. Shin, and
K. Aberer, “Polisis: Automated analysis and presentation of pri-
vacy policies using deep learning,” in Proceedings of the USENIX
Security Symposium, 2018.
[86] B. Andow, S. Y. Mahmud, W. Wang, J. Whitaker, W. Enck,
B. Reaves, K. Singh, and T. Xie, “Policylint: investigating internal
privacy policy contradictions on google play,” in 28th {USENIX}
Security Symposium ({USENIX} Security 19), 2019, pp. 585–602.
[87] “Use Play App Signing,” https://support.google.com/
googleplay/android-developer/answer/9842756?visit_id=
637574359279602919-373176865, 2021.
[88] “A look at the android market (aka google play) on its
10th anniversary,” https://techcrunch.com/2018/10/22/
a-look-at-the-android-market-aka-google-play-on-its-10th-anniversary/,
2018, "Accessed May 2021".
[89] https://developers.google.com/android/play-protect/
cloud-based-protections, 2021.
[90] “Open sudoku,” https://play.google.com/store/apps/details?
id=org.moire.opensudoku, "Accessed Jan 2022".
[91] “Signal,” https://play.google.com/store/apps/details?id=org.
thoughtcrime.securesms, "Accessed Jan 2022".
[92] “Average number of new android app releases via
google play per month from march 2019 to february
2021,” https://www.statista.com/statistics/1020956/
android-app-releases-worldwide/, 2021, "Accessed May 2021".
[93] “Number of available applications in the google
play store from december 2009 to december
2020,” https://www.statista.com/statistics/266210/
number-of-available-applications-in-the-google-play-store/,
2020, "Accessed May 2021".
[94] “Google Play Policy Center — Impersonation,” https://support.
google.com/googleplay/android-developer/topic/9969539,
2021.
[95] L. C. Freeman, “A set of measures of centrality based on
betweenness,” Sociometry, vol. 40, no. 1, 1977. [Online]. Available:
http://www.jstor.org/stable/3033543
[96] “Terms and Conditions - Andromo,” https://www.andromo.
com/en/terms/, 2021.
[97] “How to put your app in Google Play | An-
dromo Support,” https://support.andromo.com/
i47-how-to-put-your-app-in-google-play, 2020.
[98] “AppsGeyser: Free App Creator & App Maker. Create Android
Apps No Code,” https://appsgeyser.com/, 2021.
[99] App privacy policy generator. [Online]. Available: https:
//app-privacy-policy-generator.firebaseapp.com/#
[100] Privacy policy. [Online]. Available: https:
//web.archive.org/web/20210613192231/http://myappterms.
com/reader.php?lang=en
[101] “Permissions on android,” https://developer.android.com/
guide/topics/permissions/overview, "Accessed Jan 2022".
[102] H. Wang, J. Si, H. Li, and Y. Guo, “Rmvdroid: Towards a reliable
android malware dataset with app metadata,” in Proceedings of
the 16th International Conference on Mining Software Repositories,
2019.
[103] “Shared User Id,” https://developer.android.com/guide/
topics/manifest/manifest-element#uid, 2021.
[104] “Verify Android App Links,” https://developer.android.com/
training/app-links/verify-site-associations, 2021.
[105] “Is your app installed? getInstalledRelatedApps() will tell you!”
https://web.dev/get-installed-related-apps/, 2021.
[106] “Enable automatic sign-in across apps and websites,”
https://developers.google.com/identity/smartlock-passwords/
android/associate-apps-and-sites, 2021.
[107] P. Kotzias, S. Matic, R. Rivera, and J. Caballero, “Certified pup:
abuse in authenticode code signing,” in Proceedings of the ACM
SIGSAC Conference on Computer and Communications Security,
2015.
3 Strategic Issues on Implementing a Software Process Improvement Program
Rogerio Rossi, Kechi Hirama
https://arxiv.org/pdf/2201.08679
References
Acuña, S. T. & Juristo, N. (2005). Software Process Modeling. New York, USA: Springer Sci-
ence+Business Media, Inc.
Caputo, K. (1998). CMM Implementation Guide – Choreographing Software Process Improvement. Read-
ing, Massachusetts: Addison-Wesley.
Chrissis, M. B., Konrad, M. & Shrum, S. (2004). CMMI: Guidelines for process integration and product
improvement. Boston, MA: Pearson Education.
Fitzpatrick, R. (1996). Software Quality: definitions and strategic issues. Reports of Dublin Institute of
Technology, Paper 1. Retrieved October 12, 2014 from http://arrow.dit.ie/scschcomrep/1/
Garvin, D. A. (1992). Managing quality: the strategic and competitive vision, Rio de Janeiro, Brazil: Quali-
tymark Ed.
Godbole, N. S. (2005). Software Quality Assurance: Principles and Practice. Oxford, UK: Alpha Science
International Ltd.
Humprhey, W. S. (1989). Managing the software process. Pittsburgh, USA: Addison-Wesley.
IEEE (Institute of Electrical and Electronics Engineers). (1990). Standard Glossary of Software Engineer-
ing Terminology, IEEE Standard STD-601.12-1990.
ISO (International Organization for Standardization). (1995). ISO/IEC 12207 Information Technology –
Software Life Cycle Processes. ISO.
ISO (International Organization for Standardization). (2002). ISO/IEC 12207 Information Technology –
Software Life Cycle Processes – Amendment 1. ISO.
ISO (International Organization for Standardization). (2004). ISO/IEC 12207 Information Technology –
Software Life Cycle Processes –Amendment 2. ISO.
ISO (International Organization for Standardization). (2008). ISO/IEC 12207 System and Software Engi-
neering – Software Life Cycle Processes. ISO.
Paladini, E. P. (2005). Perspectiva Estratégica da Qualidade [Strategic Perspective of Quality]. In:
Carvallo, F.M. & Paladini, E. P. (Eds.) Gestão da Qualidade: Teoria e Casos [Quality Management:
theory and cases]. Rio de Janeiro, RJ: Elsevier.
Pressman, R. S. (2011). Engenharia de Software: uma abordagem professional [Software Engineering: A
Professional Approach]. Porto Alegre, Brazil: AMGH Editora Ltda.
Schulmeyer, G. G. & McManus, J. I. (1999). Handbook of Software Quality Assurance. New Jersey, USA:
Prentice Hall PTR.
Slaughter, S. A., Levine, L., Ramesh, B., Pries-Heje, J. & Baskerville, R. (2006). Aligning Software Pro-
cesses and Strategy. Journal MIS Quaterly, 30(4), 891-918.
SEI (Software Engineering Institute). (2010). CMMI for Development, version 1.3., CMU/SEI-2010-TR-
033. Retrieved October 11, 2014 from http://resources.sei.cmu.edu/library/asset-
view.cfm?AssetID=9661
SOFTEX (Association for Promotion of Brazilian Software Excellence). (2012). MPS.BR – Melhoria de
Processo de Software Brasileiro – Guia Geral MPS de Software [MPS.BR Brazilian Software Process
Improvement - MPS General Guide for Software]. Retrieved October 11, 2014 from
http://www.softex.br/wp-content/uploads/2013/07/MPS.BR_Guia_Geral_Software_2012.pdf
Xu, L. & Brinkkemper, S. (2007). Concepts of Product Software: Paving the Road for Urgently Needed
Research. European Journal of Information Systems, 16, 531–541.
Zahran, S. (1998). Software process improvement: practical guidelines for business success. London, UK:
Pearson Education Limited.
4 A Model using agile methodologies for defining metrics to be used by the Public Sector in Brazil to set remuneration for outsourced software development
Washington Almeida
https://arxiv.org/pdf/2104.05881
Reference
[1] W. H. C. Almeida and F. Furtado, Analysis of metrics in software
factory contracts within the federal public administration, vol. 1, Rio
de Janeiro: Albatroz, 2019.
[2] N. Fenton and J. Bieman, Software metrics: a rigorous and practical
approach., vol. 1, Boca Raton: Chapman & Hall Book/CRC, 2014.
[3] R. S. Pressman and B. R. Maxim, Software Engineering: A
Professional Approach. n. 8, Porto Alegre: AMGH, 2016.
[4] W. H. C. Almeida, L. A. Monteiro and F. Furtado, "Metrics research
for improvement, mandatory and software evaluation"
, in Proceedings
of ENUCOMPI Electronic 2018 - Piauí Unified Computing Meeting.
ISBN: 978-85-8320-220-2, Floriano, 2018.
[5] B. Kitchenham, "Guidelines for performing Systematic Literature
Reviews in Software Engineering. Guideline 2.3," School of
Computer Science and Mathematics-Keele University. EBSE
Technical Report., Durham, 2007.
[6] W. H. C. Almeida, F. Furtado, L. A. Monteiro, F. Escobar and S. K.
G. Silva, "Systematic Review on the Use of Metrics for Estimating the
Effort and Cost of Software Applicable to the Brazilian Public Sector,"
ICSEA 2020, v. 1, n. 1, p. 11, 2020.
[7] D. Russo, G. Taccogna, P. Ciancarini, A. Messina and G. Succi,
"Contracting agile developments for mission critical systems in the
public sector," in Proceedings - International Conference on Software
Engineering: Software engineering in society. pp. 47–56, Gothenburg,
2018.
[8] R. E. Merwin, "Estimating software development schedules and
costs," in Proceedings - ninth design automation workshop on Design
automation - DAC ’72. pp. 1-4. doi: 10.1145/800153.804921., Dallas,
1972.
[9] B. Boehm, C. Abts and S. Chulani, "Software development cost
estimation approaches – A survey," in Procedings - Software
Engineering. v. 10, n. 1, p. 177-205. doi: 10.1023/A:1018991717352,
2000.
[10] W. Rosa, R. Madachy, B. Clark and B. Boehm, "Early Phase Cost
Models for Agile Software Processes in the US DoD," in 2017
ACM/IEEE International Symposium on Empirical Software
Engineering and Measurement (ESEM). pp. 30–37, doi:
10.1109/ESEM.2017.10, Toronto, 2017.
[11] V. Nguyen, L. Huang and B. Boehm, "An analysis of trends in
productivity and cost drivers over years," in Proceedings of the 7th
International Conference on Predictive Models in Software
Engineering - Promise ’11. pp. 1–10, doi: 10.1145/2020390.2020393,
Alberta, 2011.
[12] J. Dumas-Monette and S. Trudel, "Requirements Engineering Quality
Revealed through Functional Size Measurement: An Empirical Study
in an Agile Context," in 2014 Joint Conference of the International
Workshop on Software Measurement and the International
Conference on Software Process and Product Measurement. pp. 222–
232., Rotterdam, 2014.
[13] A. Kaur and K. Kaur, "A COSMIC function points based test effort
estimation model for mobile applications," Journal of King Saud
University - Computer and Information Sciences. ISSN 1319-1578.
Available: http://www.sciencedirect.com/science/article/pii/S131915
781831317X, 2019.
[14] A. A. Mohallel and J. M. Bass, "Agile software development practices
in Egypt SMEs: A grounded theory investigation," IFIP Advances in
Information and Communication Technology. vol. 551, p. 355–365,
2019.
[15] R. Popli and N. Chauhan, "A sprint-point based estimation technique
in Scrum," in 2013 International Conference on Information Systems
and Computer Networks. pp. 98–103, San Diego, 2013.
[16] J. Choudhari and U. Suman, "tory Points Based Effort Estimation
Model for Software Maintenance," Procedia Technology. ISSN 2212-
0173, vol. 4, p. 761–765, 2012.
[17] M. Daneva, E. v. d. Veen, C. Amrit, S. Ghaisas, K. Sikkel, R. Kumar,
N. Ajmeri, U. Ramteerthkar and R. Wieringa, "Agile requirements
prioritization in large-scale outsourced system projects: An empirical
study," Journal of Systems and Software. ISSN 0164-1212. Vol. 86. Issue 5, pp. 1333-1353, 2013.
[18] M. Arora, S. Verma, Kavita and S. Chopra, "A Systematic Literature Review of Machine Learning Estimation Approaches in Scrum Projects," Cognitive Informatics and Soft Computing. Advances in Intelligent Systems and Computing, vol. 1040, p. 573–586, 2020.
[19] F. Shull, J. Singer and D. I. K. Sjøberg, Guide to advanced empirical software engineering, London: Springer, 2008
5 Análise de Segurança Baseada em Roles para Fábricas de Software
Miguel Loureiro, Luísa Lourenço, Lúcio Ferrão, Carla Ferreira
https://arxiv.org/pdf/1909.03741
Referˆencias
- Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: PLDI (2014)
- Baier, C., Katoen, J.P.: Principles of model checking. MIT press (2008)
- Biere, A., Cimatti, A., Clarke, E.M., Strichman, O., Zhu, Y., et al.: Bounded model checking. Advances in computers 58(11) (2003)
- Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic model checking: 1020 states and beyond. Information and computation 98(2) (1992)
- Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement for symbolic model checking. Journal of the ACM (JACM) 50(5) (2003)
- Clarke Jr, E.M., Grumberg, O., Kroening, D., Peled, D., Veith, H.: Model checking. MIT press (2018)
- Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In: NDSS. vol. 5 (2005)
- Sandhu, R.S.: Role-based access control. In: Advances in computers, vol. 46 (1998)
- Tripp, O., Pistoia, M., Cousot, P., Cousot, R., Guarnieri, S.: Andromeda: Accurate and scalable security analysis of web applications. In: FASE (2013)
- Tripp, O., Pistoia, M., Fink, S.J., Sridharan, M., Weisman, O.: Taj: Effective taint analysis of web applications. SIGPLAN Not. 44(6) (2009)
6 Regularized Fuzzy Neural Networks to Aid Effort Forecasting in the Construction and Software Development
Paulo Vitor de Campos Souza, Augusto Junio Guimaraes, Vanessa Souza Araujo, Thiago Silva Rezende, Vinicius Jonathan Silva Araujo
https://arxiv.org/pdf/1812.01351
REFERENCES
[1] S. Krusche, B. Scharlau, ˚A. Cajander, J. Hughes, 50 years of software engi- neering: challenges,results, and opportunities in its education, in: Proceed- ings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, ACM, 2018, pp. 362–363.
[2] C. Ghezzi, M. Jazayeri, D. Mandrioli, Fundamentals of software engineer- ing, Prentice Hall PTR, 2002.
[3] M. Harman, The current state and future of search based software engi- neering, in: 2007 Future of Software Engineering, IEEE Computer Society, 2007, pp. 342–357.
[4] R. Silhavy, P. Silhavy, Z. Prokopova, Analysis and selection of a regression model for the use case points method using a stepwise approach, Journal of Systems and Software 125 (2017) 1–14.
[5]P. V. de Campos Souza, L. C. B. Torres, Regularized fuzzy neural network based on or neuron for time series forecasting, in: G. A. Barreto, R. Coelho (Eds.), Fuzzy Information Processing, Springer International Publishing, Cham, 2018, pp. 13–23.
[6] J.-S. Jang, Anfis: adaptive-network-based fuzzy inference system, IEEE transactions on systems, man, and cybernetics 23 (3) (1993) 665–685.
[7] T. Takagi, M. Sugeno, Derivation of fuzzy control rules from human oper- ator’s control actions, IFAC Proceedings Volumes 16 (13) (1983) 55–60.
[8] G.-B. Huang, Q.-Y. Zhu, C.-K. Siew, Extreme learning machine: theory and applications, Neurocomputing 70 (1-3) (2006) 489–501.
[9] G. Melnik, F. Maurer, Comparative analysis of job satisfaction in agile and non-agile software development teams, in: International Conference on Extreme Programming and Agile Processes in Software Engineering, Springer, 2006, pp. 32–42.
[10] K. El Emam, A. G. Koru, A replicated survey of it software project failures, IEEE software (5) (2008) 84–90.
[11] R. S. Pressman, Engenharia de software, Vol. 6, Makron books S˜ao Paulo, 1995.
[12] C. E. Vazquez, G. S. SIMO˜ ES, R. M. Albert, An´alise de pontos de fun¸c˜ao: medi¸c˜ao, estimativas e gerenciamento de projetos de software, EditoraE´rica, S˜ao Paulo 3.
[13] G. Karner, Resource estimation for objectory projects, Objective Systems SF AB 17.
[14] K. Iskandar, F. L. Gaol, B. Soewito, H. L. H. S. Warnars, R. Kosala, Software size measurement of knowledge management portal with use case point, in: Computer, Control, Informatics and its Applications (IC3INA), 2016 International Conference on, IEEE, 2016, pp. 42–47.
[15] G. R. Finnie, G. E. Wittig, J.-M. Desharnais, A comparison of software effort estimation techniques: using function points with neural networks, case-based reasoning and regression models, Journal of systems and soft- ware 39 (3) (1997) 281–289.
[16] H. Park, S. Baek, An empirical validation of a neural network model for software effort estimation, Expert Systems with Applications 35 (3) (2008) 929–937.
[17] S. Nageswaran, Test effort estimation using use case points, in: Quality Week, Vol. 6, 2001, pp. 1–6.
[18] G.-S. Liu, R.-Q. Wang, F. Yin, J.-M. Ogier, C.-L. Liu, Fast genre classi- fication of web images using global and local features, CAAI Transactions on Intelligence Technology 3 (3) (2018) 161–168.
[19] P. Shivakumara, M. Asadzadehkaljahi, D. Tang, T. Lu, U. Pal, M. H. Anisi, International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.6, November 2018 Cnn-rnn based method for license plate recognition, Caai Transactions on Intelligence Technology 3 (3) (2018) 169–175.
[20] T. Oyama, T. Yamanaka, Influence of image classification accuracy on saliency map estimation, arXiv preprint arXiv:1807.10657.
[21] Y. Zhou, Q. Sun, J. Liu, Robust optimisation algorithm for the measure- ment matrix in compressed sensing, CAAI Transactions on Intelligence Technology 3 (3) (2018) 133–139.
[22] Q. Deng, S. Wu, J. Wen, Y. Xu, Multi-level image representation for large- scale image-based instance retrieval, CAAI Transactions on Intelligence Technology 3 (1) (2018) 33–39.
[23] G. Qi, Q. Zhang, F. Zeng, J. Wang, Z. Zhu, Multi-focus image fusion via morphological similarity-based dictionary construction and sparse rep- resentation, CAAI Transactions on Intelligence Technology 3 (2) (2018) 83–94.
[24] A. K. Pujitha, J. Sivaswamy, Solution to overcome the sparsity issue of an- notated data in medical domain, CAAI Transactions on Intelligence Tech- nology 3 (3) (2018) 153–160.
[25] H. An, D. Wang, Z. Pan, M. Chen, X. Wang, Text segmentation of health examination item based on character statistics and information measure- ment, CAAI Transactions on Intelligence Technology 3 (1) (2018) 28–32.
[26] A. Lemos, W. Caminhas, F. Gomide, Multivariable gaussian evolving fuzzy modeling system, IEEE Transactions on Fuzzy Systems 19 (1) (2011) 91– 104.
[27] V. H. M. Garcia, E. R. Trujillo, J. I. R. Molano, Knowledge management model to support software development, in: International Conference on Data Mining and Big Data, Springer, 2018, pp. 533–543.
[28] F. A. Batarseh, A. J. Gonzalez, Predicting failures in agile software de- velopment through data analytics, Software Quality Journal 26 (1) (2018) 49–66.
[29] H. Gall, C. Alexandru, A. Ciurumelea, G. Grano, C. Laaber, S. Panichella, S. Proksch, G. Schermann, C. Vassallo, J. Zhao, Data-driven decisions and actions in todays software development, in: The Essence of Software Engineering, Springer, 2018, pp. 137–168.
[30] R. Kumar, K. Prasad, A. S. Rao, Defect Prediction in Software Develop- ment & Maintainence, Partridge Publishing, 2018.
[31] A. B. Nassif, L. F. Capretz, D. Ho, Estimating software effort based on use case point model using sugeno fuzzy inference system, in: Tools with Artificial Intelligence (ICTAI), 2011 23rd IEEE International Conference on, IEEE, 2011, pp. 393–398.
[32] A. B. Nassif, D. Ho, L. F. Capretz, Towards an early software estimation using log-linear regression and a multilayer perceptron model, Journal of Systems and Software 86 (1) (2013) 144–160.
[33] A. B. Nassif, L. F. Capretz, D. Ho, Software effort estimation in the early stages of the software life cycle using a cascade correlation neural net- work model, in: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD 2012), IEEE, 2012, pp. 589–594.
[34] M. Azzeh, A. B. Nassif, A hybrid model for estimating software project effort from use case points, Applied Soft Computing 49 (2016) 981–989.
[35] A. B. Nassif, M. Azzeh, L. F. Capretz, D. Ho, Neural network models for software development effort estimation: a comparative study, Neural Computing and Applications 27 (8) (2016) 2369–2381.
[36] W. Pedrycz, F. Gomide, Fuzzy systems engineering: toward human-centric computing, John Wiley & Sons, 2007.
[37] W. M. Caminhas, H. Tavares, F. A. Gomide, W. Pedrycz, Fuzzy set based neural networks: Structure, learning and application., JACIII 3 (3) (1999) 151–157.
[38] P. V. C. Souza, Regularized fuzzy neural networks for pattern classification problems, International Journal of Applied Engineering Research 13 (5) (2018) 2985–2991.
[39] A. L. Maas, A. Y. Hannun, A. Y. Ng, Rectifier nonlinearities improve neural network acoustic models, in: Proc. icml, Vol. 30, 2013, p. 3.
[40] V. Nair, G. E. Hinton, Rectified linear units improve restricted boltzmann machines, in: Proceedings of the 27th international conference on machine learning (ICML-10), 2010, pp. 807–814.
[41] W. Pedrycz, Neurocomputations in relational systems, IEEE Transactions on Pattern Analysis & Machine Intelligence (3) (1991) 289–297. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.6, November 2018
[42] F. R. Bach, Bolasso: model consistent lasso estimation through the boot- strap, in: Proceedings of the 25th international conference on Machine learning, ACM, 2008, pp. 33–40.
[43] P. V. de Campos Souza, G. R. L. Silva, L. C. B. Torres, Uninorm based regularized fuzzy neural networks, in: 2018 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS), 2018, pp.1–8. doi:10.1109/ EAIS.2018.8397176.
7 A Platform for Teaching Applied Distributed Software Development: The Ongoing Journey of the Helsinki Software Factory
Fabian Fagerholm, Nilay Oza, Jürgen Münch
https://arxiv.org/pdf/1312.5058
REFERENCES
[1] P. Abrahamsson, P. Kettunen, and F. Fagerholm, “The set-up of a software
engineering research infrastructure of the 2010s,” in Proceedings of the
11th International Conference on Product Focused Software. New York,
NY, USA: ACM, 2010, pp. 112–114.
[2] D. Rombach, J. M¨ unch, A. Ocampo, W. S. Humphrey, and D. Burton,
“Teaching disciplined software development,” Journal of Systems and
Software, vol. 81, no. 5, pp. 747–763, 2008.
[3] M. Kuhrmann, D. M´ endez Fern´ andez, and J. M¨ unch, “Teaching Software
Process Modeling,” in Proceedings of the 35th International Conference
on Software Engineering (ICSE), 2013.
[4] N. Mullick, M. Bass, Z. El Houda, D. Paulish, M. Cataldo, J. Herbsleb,
K. Bass, and R. Sangwan, “Siemens Global Studio Project: Experiences
Adopting an Integrated GSD Infrastructure,” in Proceedings of the
International Conference on Global Software Engineering, ICGSE, 2006,
pp. 203–212.
[5] M. Nordio, C. Ghezzi, B. Meyer, E. Di Nitto, G. Tamburrelli, J. Tschan-
nen, N. Aguirre, and V. Kulkarni, “Teaching software engineering
using globally distributed projects: the DOSE course,” in Collaborative
Teaching of Globally Distributed Software Development-Community
Building Workshop (CTGDSD), 2011.
[6] D. Damian, C. Lassenius, M. Paasivaara, A. Borici, and A. Schroter,
“Teaching a globally distributed project course using Scrum practices,”
in Collaborative Teaching of Globally Distributed Software Development
Workshop (CTGDSD), 2012, pp. 30–34.
[7] L. Fortaleza, T. Conte, S. Marczak, and R. Prikladnicki, “Towards a GSE
international teaching network: Mapping Global Software Engineering
courses,” in Collaborative Teaching of Globally Distributed Software
Development Workshop (CTGDSD), 2012, pp. 1–5.
[8] J. Feljan, I. Crnkovic, I. Bosnic, M. Orlic, and M. Zagar, “Distributed
Software Development course: Students’ and teachers’ perspectives,” in
Collaborative Teaching of Globally Distributed Software Development
Workshop (CTGDSD), 2012, pp. 16–20.
[9] A. Vihavainen, M. Paksula, M. Luukkainen, and J. Kurhila, “Extreme
apprenticeship method: key practices and upward scalability,” in Proceed-
ings of the 16th Annual Joint Conference on Innovation and Technology
in Computer Science Education. New York, NY, USA: ACM, 2011,
pp. 273–277.
[10] M. Ikonen, E. Pirinen, F. Fagerholm, P. Kettunen, and P. Abrahamsson,
“On the Impact of Kanban on Software Project Work: An Empirical
Case Study Investigation,” in 16th IEEE International Conference on
Engineering of Complex Computer Systems (ICECCS), 2011, pp. 305–
314.
[11] H. Kniberg and M. Skarin, Kanban and Scrum: making the most of both.
USA: C4Media Inc, 2010.
[12] H. Karhatsu, M. Ikonen, P. Kettunen, F. Fagerholm, and P. Abrahamsson,
“Building blocks for self-organizing software development teams: A
framework model and empirical pilot study,” in 2nd International
Conference on Software Technology and Engineering (ICSTE), vol. 1,
2010, pp. V1–297–V1–304.
8 Rapid Application Development Using Software Factories
Toni Stojanovski, Tomislav Dzekov
REFERENCES
- Jack Greenfield, Keith Short et al., “Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools”, John Wiley & Sons, 2004.
- Krzysztof Czarnecki, “Generative Programming”, PhD thesis, 1998.
- Kathleen Dollard, “Code Generation in Microsoft .NET”, Apress, 2004.
- Jack Herrington, “Code Generation in Action”, Manning, 2003.
- Robert C. Martin, “Agile Software Development, Principles, Patterns, and Practices”, Prentice Hall; 2002.
- Ken Schwaber, “Agile Project Management with Scrum”, ISBN:073561993x, Microsoft Press, 2004.
- Kent Beck, “Extreme Programming Explained: Embrace Change”, Addison- Wesley, 1999.
- Stephen R. Schach, “Object-Oriented and Classical Software Engineering”, Fifth Edition, WCB/McGraw-Hill, 2002.
- Anneke Kleppe, Jos Warmer, Wim Bast, “MDA Explained: The Model Driven Architecture: Practice and Promise”, Addison Wesley, 2003.
- Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, “Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Pub Co; First edition, 1995.
- http://www.w3schools.com/Schema/default.asp
- Eric van der Vlist, “XML Schema: The W3C's Object-Oriented Descriptions for XML”, O'Reilly Media, June 2002.
- Michael Kay, “XSLT Programmer's Reference”, Wrox Press, 2000.
Reference
Strategy to some summary and propose.
https://qiita.com/kaizen_nagoya/items/d36a9eba629022276918