Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/776816.776828acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

End-user software engineering with assertions in the spreadsheet paradigm

Published: 03 May 2003 Publication History

Abstract

There has been little research on end-user program development beyond the activity of programming. Devising ways to address additional activities related to end-user program development may be critical, however, because research shows that a large proportion of the programs written by end users contain faults. Toward this end, we have been working on ways to provide formal "software engineering" methodologies to end-user programmers. This paper describes an approach we have developed for supporting assertions in end-user software, focusing on the spreadsheet paradigm. We also report the results of a controlled experiment, with 59 end-user subjects, to investigate the usefulness of this approach. Our results show that the end users were able to use the assertions to reason about their spreadsheets, and that doing so was tied to both greater correctness and greater efficiency.

References

[1]
Allwood, C. Error detection processes in statistical problem solving. Cognitive Science 8(4), 1984, 413--437.
[2]
Auguston, M., Banerjee, S., Mamnani, M., Nabi, G., Reinfelds, J., Sarkans, U., and Strnad, I. A debugger and assertion checker for the Awk programming language. Int. Conf. Soft. Eng., 1996.
[3]
Beckwith, L., Burnett, M., and Cook, C. Reasoning about many-to-many requirement relationships in spreadsheets, IEEE Symp. Human-Centric Lang. Environ. Arlington, VA, Sept. 2002, 149--157
[4]
Belkin, N. Helping people find what they don't know, Comm. ACM 41 (8), Aug. 2000, 58--61
[5]
Boehm, B. and Basili, V. Gaining intellectual control of software development, Computer 33(5), May 2000, 27--33.
[6]
Burnett, M., Atwood, J., Djang, R., Gottfried, H., Reichwein, J., and Yang, S. Forms/3: a first-order visual language to explore the boundaries of the spreadsheet paradigm, J. Functional Programming, Mar. 2001, 155--206.
[7]
Cook, C., Rothermel, K., Burnett, M., Adams, T., Rothermel, G., Sheretov, A., Cort, F., and Reichwein, J. Does a visual "testedness" methodology aid debugging? TR #99-60-07, Oregon State Univ., rev. March 2001.
[8]
Corritore, C., Kracher, B., and Wiedenbeck, S. Trust in the online environment, HCI International, Vol. 1, New Orleans, LA, Aug. 2001, 1548--1552.
[9]
Dwyer, M., Avrunin, G., and Corbett, J. Patterns in property specifications for finite-state verification, Int. Conf. Soft. Eng., Los Angeles, CA, May 1999, 411--420.
[10]
Ernst, M., Cockrell, J., Griswold, W., and Notkin, D. Dynamically discovering likely program invariants to support program evolution, Int. Conf. Soft. Eng., Los Angeles, CA, May 1999, 213--224.
[11]
Fisher, M., Cao, M., Rothermel, G., Cook, C., and Burnett, M. Automated test case generation for spreadsheets, Int. Conf. Soft. Eng., Orlando, FL, May 2002, 141--151.
[12]
Hangal, S. and Lam, M. Tracking down software bugs using automatic anomaly detection, Int. Conf. Soft. Eng., Orlando, FL, May 2002, 291--301.
[13]
Krishna, V., Cook, C., Keller, D., Cantrell, J., Wallace, C., Burnett, M., and Rothermel, G. Incorporating incremental validation and impact analysis into spreadsheet maintenance: an empirical study, IEEE Int. Conf. Soft. Maintenance, Florence, Italy, Nov. 2001,72--81.
[14]
Leventhal, L., Teasley, B., and Rohlman, D. Analyses of factors related to positive test bias in software testing. Int. J. Human-Computer Studies 41, 1994, 717--749.
[15]
Meyer, B. Applying "Design by Contract," Computer 25(10), October 1992, 40--51.
[16]
Michael, J., Ong, V., and Rowe, N. Natural-language processing support for developing policy-governed software systems, Int. Conf. Technology for Object-Oriented Languages and Systems, Santa Barbara, CA, 2001.
[17]
Miller, R. and Myers, B. Outlier finding: focusing user attention on possible errors, ACM Symp. User Interface Software and Technology, Nov. 2001.
[18]
Pane, J., Ratanamahatan, C., and Myers, B. Studying the language and structure in non-programmers' solutions to programming problems. Int. J. Human-Computer Studies 54(2), Feb. 2001, 237--264.
[19]
Panko, R. Finding spreadsheet errors: most spreadsheet models have design flaws that may lead to long-term miscalculation, Information Week, May 1995, 100--100.
[20]
Panko, R. What we know about spreadsheet errors. J. End User Computing, Spring 1998, 15--21.
[21]
Raz, O., Koopman, P., and Shaw, M. Semantic anomaly detection in online data sources, Int. Conf. Soft. Eng., Orlando, FL, May 2002, 302--312.
[22]
Rosenblum, D. A practical approach to programming with assertions, IEEE Trans. Soft. Eng., Jan. 1995, 19--31.
[23]
Rosenblum, D., Sankar, S. and Luckham, D. Concurrent runtime checking of Annotated Ada programs, Conf. Foundations Soft. Technology and Theoretical Comp. Science (LNCS 241). NY, Springer-Verlag, Dec. 1986, 10--35.
[24]
Rothermel, G., Burnett, M., Li, L., DuPuis, C., Sheretov, A. A methodology for testing spreadsheets, ACM Trans. Soft. Eng. and Methodology, Jan. 2001, 110--147.
[25]
Sankar, S., Mandal, M. Concurrent runtime monitoring of formally specified programs, Computer, Mar. 1993, 32--41.
[26]
Smith, R., Avrunin, G., Clarke, L., and Osterweil, L. Propel: an approach supporting property elucidation, Int. Conf. Soft. Eng., Orlando, FL, May 2002, 11--21.
[27]
Summet, J. and Burnett, M. End-user assertions: propagating their implications, TR 02-60-04, Oregon State Univ., 2002.
[28]
Wallace, C., Cook, C., Summet, J., and Burnett, M. Assertions in end-user software engineering: a think-aloud study (Tech Note), IEEE Symp. Human-Centric Lang. Environ., Arlington, VA, Sept. 2002, 63--65.
[29]
Welch, D., String, S. An exception-based assertion mechanism for C++. J. Obj. Oriented Prog. 11(4), 1998, 50--60.
[30]
Wilcox, E., Atwood, J., Burnett, M., Cadiz, J., and Cook, C. Does continuous visual feedback aid debugging in directmanipulation programming systems? ACM Conf. Human Factors in Computing Systems, Mar. 1997, 258--265.
[31]
Wilson, A., Burnett, M., Beckwith, L., Granatir, O., Casburn, L., Cook, C., Durham, M. and Rothermel, G. Harnessing curiosity to increase correctness in end-user programming, ACM Conf. Human Factors in Computing Systems, Ft. Lauderdale, FL, Apr. 2003 (to appear).

Cited By

View all
  • (2019)Empowering End Users in Debugging Trigger-Action RulesProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300618(1-13)Online publication date: 2-May-2019
  • (2019)IoT end user programming modelsProceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things10.1109/SERP4IoT.2019.00008(1-8)Online publication date: 27-May-2019
  • (2017)Gender-based behavioral analysis for end-user development and the `RULES' attributesEducation and Information Technologies10.5555/3123587.312359522:4(1853-1894)Online publication date: 1-Jul-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '03: Proceedings of the 25th International Conference on Software Engineering
May 2003
841 pages
ISBN:076951877X

Sponsors

Publisher

IEEE Computer Society

United States

Publication History

Published: 03 May 2003

Check for updates

Qualifiers

  • Article

Conference

ICSE03
Sponsor:

Acceptance Rates

ICSE '03 Paper Acceptance Rate 42 of 324 submissions, 13%;
Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Empowering End Users in Debugging Trigger-Action RulesProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300618(1-13)Online publication date: 2-May-2019
  • (2019)IoT end user programming modelsProceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things10.1109/SERP4IoT.2019.00008(1-8)Online publication date: 27-May-2019
  • (2017)Gender-based behavioral analysis for end-user development and the `RULES' attributesEducation and Information Technologies10.5555/3123587.312359522:4(1853-1894)Online publication date: 1-Jul-2017
  • (2017)Financial information description language and visualization/analysis toolsComputer Languages, Systems and Structures10.1016/j.cl.2017.05.00550:C(31-52)Online publication date: 1-Dec-2017
  • (2016)SS-BDDProceedings of the 1st Brazilian Symposium on Systematic and Automated Software Testing10.1145/2993288.2993296(1-10)Online publication date: 19-Sep-2016
  • (2016)Crossed WiresProceedings of the 2016 CHI Conference on Human Factors in Computing Systems10.1145/2858036.2858533(3485-3497)Online publication date: 7-May-2016
  • (2016)Maximizing Correctness with Minimal User Effort to Learn Data TransformationsProceedings of the 21st International Conference on Intelligent User Interfaces10.1145/2856767.2856791(375-384)Online publication date: 7-Mar-2016
  • (2015)An empirical study of end-user programmers in the computer music communityProceedings of the 12th Working Conference on Mining Software Repositories10.5555/2820518.2820554(292-302)Online publication date: 16-May-2015
  • (2014)Future of end-user software engineering: beyond the silosFuture of Software Engineering Proceedings10.1145/2593882.2593896(201-211)Online publication date: 31-May-2014
  • (2013)Lost while searchingProceedings of the 76th ASIS&T Annual Meeting: Beyond the Cloud: Rethinking Information Boundaries10.5555/2655780.2655801(1-11)Online publication date: 1-Nov-2013
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media