CM homepage Computer Science LTH

During the course each group will have to present a paper. Below is a schedule for these presentations. ?-? indicates that I am still looking for a group to do that presentation. For each paper is also indicated which groups are opponents. There are also some guidelines for how to do the presentation.

Presentations are done by the following groups:

Lecture 2b (Thursday 1/11):

  • I-d (opponents I-b and II-f): Ulf Asklund: Configuration Management for Distributed Development - Practice and Needs, Dissertation 10, Lund Institute of Technology, 1999. (chapter 2 and 5)
  • I-g (opponents II-d and LBx): Brian A. White: Software Configuration Management Strategies and Rational ClearCase - A Practical Introduction, Addison-Wesley Publishing Company, Inc., 2000. (chapter 10: Geographically distributed development)

    Lecture 3b (Thursday 8/11):

  • II-a (opponents I-g and II-d): Peter H. Feiler: Configuration Management Models in Commercial Environments, Technical Report SEI-91-TR-7, Software Engineering Institute, 1991. (chapter 2 and 4: Checkout/checkin + Long transaction models)
  • I-f (opponents II-f and I-e): Peter H. Feiler: Configuration Management Models in Commercial Environments, Technical Report SEI-91-TR-7, Software Engineering Institute, 1991. (chapter 3 and 5: Composition + Change set models)

    Lecture 4b (Thursday 15/11):

  • I-e (opponents I-a and I-b): Brad Appleton, Stephen P. Berczuk, Ralph Cabrera, Robert Orenstein: Streamed Lines - Branching Patterns for Parallel Software Development, http://www.enteract.com/~bradapp/acme/branching/, 1998. (Introduction and overview)
  • II-b (opponents II-e and I-f): Brad Appleton, Stephen P. Berczuk, Ralph Cabrera, Robert Orenstein: Streamed Lines - Branching Patterns for Parallel Software Development, http://www.enteract.com/~bradapp/acme/branching/, 1998. (selected patterns)

    Lecture 5a (Monday 19/11):

  • I-a (opponents II-c and LBx): M. A. Daniels: Principles of Configuration Management, Advanced Applications Consultants, Inc., 1985. (chapter 2 and 3: Configuration Control + Configuration Identification)
  • I-b (opponents I-d and I-c): Bohner and Arnold: An Introduction to Software Change Impact Analysis.

    Lecture 5b (Thursday 22/11):

  • I-c (opponents I-f and II-b): M. A. Daniels: Principles of Configuration Management, Advanced Applications Consultants, Inc., 1985. (chapter 4 and 5: Configuration Status Accounting + Configuration Audit)
  • II-f (opponents I-g and I-e): Alexis Leon: A Guide to Software Configuration Management, Artech House, Inc., 2000. (chapter 11: Software Configuration Management Plans) Stephen B. Compton, Guy R. Conner: Configuration Management for Software, Van Nostrand Reinhold, 1994. (chapter 3: The Software Configuration Manager)

    Lecture 6a (Monday 26/11):

  • II-c (opponents I-c and II-e): Ulf Asklund, Lars Bendix: A Study of Configuration Management for Open Source Software, Lund Institute of Technology, 2001.
  • II-d (opponents I-a and II-a): Lars Bendix, Torbjörn Ekman: Software Configuration Management in Agile Development, in the book Agile Software Development Quality Assurance, February 2007.

    Lecture 6b (Thursday 29/11):

  • U-A (opponents I-d and II-a): Ivica Crnkovic, Ulf Asklund, Annita Persson Dahlquist: Implementing and Integrating Product Data Management and Software Configuration Management. (chapter 2 and 4)
  • II-e (opponents II-b and II-c): Axel Mahler: Variants: Keeping Things Together and Telling Them Apart.



    Updated November 19, 2007