Time filter

Source Type

Telikicherla K.C.,Infosys | Choppella V.,Software Engineering Research Center
1st International Workshop on Inclusive Web Programming - Programming on the Web with Open Data for Societal Applications, IWP 2014 - Proceedings | Year: 2014

The last decade has seen the evolution of web APIs (Application Programming Interfaces) and open data initiatives promoted by governments. This has encouraged developers to build Mashups, web applications that integrate data from multiple servers. ProgrammableWeb.com reports an astounding 11,152 APIs and 7384 Mashups, as of March 2014. The browser security model designed for static web pages, however, was insufficient to mitigate the security concerns in mashups. Recent efforts by researchers have enhanced the security model of browsers and provided newer APIs to meet the security requirements of mashups. However, these low-level APIs require significant skill by developers to use them effectively, to avoid creating possibly unsafe applications. In this paper, we start with a survey of security concerns in the insecure usage of HTML5 APIs, particularly relevant to the security of mashups. We then present a high-level library called "SafeMash", which helps developers build safe mashups over the current low-level security APIs in HTML5. SafeMash allows the mashup developer to configure the degree of interaction and communication of a widget. It warns developers in case of any misconfiguration. Our initial empirical analysis shows that an interactive mashup that does not leverage state-of-the-art browser security features can be rebuilt with SafeMash, without any loss in functionality. Copyright 2014 ACM. Source

Reddy Y.R.,Software Engineering Research Center
Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014 | Year: 2014

Refactoring tools suffer from usability in the areas of automating mundane tasks, providing user customization, and providing strategies for error recovery. The automation of refactoring tools can be a risky undertaking since user intervention is required in many scenarios to maintain the internal quality of the system. Any type of design level refactoring requires complex changes to the code, the validation of preconditions, and could potentially harm the system. Smaller refactorings that handle code-smells can be carried out automatically with considerably lower risk. This paper discusses the current state of automated refactoring tools, and the development of an automated refactoring tool to extract and propagate Java literal expressions in IntelliJ IDEA. © 2014 IEEE. Source

Maheshwari Y.,Software Engineering Research Center | Reddy Y.R.,Software Engineering Research Center
ACM International Conference Proceeding Series | Year: 2015

Adobe Flash is a popular platform frequently used for creation of advertisements, videos and interactive contents on web pages. However its utility is lost with the decreasing support of Flash players on some platforms, where open standards like HTML5 and JavaScript are widely supported. This paper describes a transformation process for converting Flash files into HTML5 and Javascript to give a human readable output. This will lend users the same resourcefulness of Flash in open standards without relying on the former. © 2015 ACM. Source

Karre S.A.,Software Engineering Research Center | Reddy Y.R.,Software Engineering Research Center
CEUR Workshop Proceedings | Year: 2015

Product based organizations have diverse product offerings that meet various business needs. The products are in turn integrated to create integrated product suites. Rigorous product engineering is a must for creation of high quality integrated software products. Adequate measures must be taken to improve quality of the integrated product before every release of its module or sub-product. It is hard to imagine upgrading an integrated software product with unidentified defects prior to its release. In this paper, we share our observations on implementing a defect dependency metric to identify the dependency of a defect over a real-time industry defect dataset of an integrated software product. This defect dependency metric was captured and analyzed during release cycle(s) to avoid surprise issues post product launch. © 2015 for the individual papers by the papers' authors. Source

Cherukupalli P.,Software Engineering Research Center | Raghu Reddy Y.,Software Engineering Research Center
ACM International Conference Proceeding Series | Year: 2015

Financial services sector typically known as BFSI (Banking Financial Services and Insurance) invest substantial amount of their developmental and maintenance budget in Information Technology (IT). Client servicing, regulatory/compliance requirements, effective risk monitoring among others necessitate such expenditure. A large amount of time and IT expenditure in BFSI sector is spent in reengineering the legacy systems. Successful execution of these reengineering programs is critical to the firm as well as the financial markets and regulators. In this paper, we present a report of the study done on reengineering three legacy systems in BFSI sector. The focus of the paper is on challenges and issues faced, practices followed, actual data collected by Mercury Quality Center during reengineering of these systems. Our study uses key metrics, client feedback, usage of these systems, document, process repository artifacts and discussion results from the interaction with key stakeholders involved in the reengineering of the three systems. We compile the best practices, lessons learnt and provide insights that can potentially avoid some of the issues encountered in large-scale reengineering programs in BFSI sector. Copyright 2015 ACM. Source

Discover hidden collaborations