SC Harvester Papers Database Interface

Sustainable Capacity Building in Software Engineering Research in Africa

Engineer Bainomugisha, R. Hebig, M. Chaudron. In: ACM SIGSOFT Software Engineering Notes. 2020

Abstract: The software industry is a key engine of economic growth in Africa, which calls for sustainable and innovative approaches to build capacities in software engineering research and education for the continent. This paper presents the BRIGHT project as an example for a collaboration that aims to build such capacity. The collaboration includes institutions in Sweden and Uganda. The goal of the collabo...

Sustainable Capacity Building in Software Engineering Research in Africa

Engineer Bainomugisha, R. Hebig, M. Chaudron. In: ACM SIGSOFT Software Engineering Notes. 2020

Abstract: The software industry is a key engine of economic growth in Africa, which calls for sustainable and innovative approaches to build capacities in software engineering research and education for the continent. This paper presents the BRIGHT project as an example for a collaboration that aims to build such capacity. The collaboration includes institutions in Sweden and Uganda. The goal of the collabo...

Summary of the 2nd Workshop on Gender Equality in Software Engineering (GE 2019)

I. Crnkovic, Karina Kohl Silveira, Sara Sprenkle. In: ACM SIGSOFT Software Engineering Notes. 2020

Abstract: The 2nd Workshop on Gender Equality in Software Engineering was a continuation of the first workshop with a goal to increase awareness of gender-related challenges in Software Engineering community. Further the workshop's goals were to illuminate the problem in a variety of contexts, evaluate proposed solutions, discuss approaches to move towards gender equality, and to develop a community to supp...

Verification of Cyberphysical Systems

M. Sirjani, Edward A. Lee, Ehsan Khamespanah. In: . 2020

Abstract: The value of verification of cyberphysical systems depends on the relationship between the state of the software and the state of the physical system. This relationship can be complex because of the real-time nature and different timelines of the physical plant, the sensors and actuators, and the software that is almost always concurrent and distributed. In this paper, we study different ways to c...

The FORA Fog Computing Platform for Industrial IoT

P. Pop, Bahram Zarrin, M. Barzegaran, Stefan Schulte, S. Punnekkat et al. In: Inf. Syst.. 2020

Abstract: Industry 4.0 will only become a reality through the convergence of Operational and Information Technologies (OT & IT), which use different computation and communication technologies. Cloud Computing cannot be used for OT involving industrial applications, since it cannot guar-antee stringent non-functional requirements, e.g., dependability, trustworthiness and timeliness. Instead, a new computing ...

Ensuring the Observability of Structural Test Obligations

Ying Meng, Gregory Gay, M. Whalen. In: IEEE Transactions on Software Engineering. 2020

Abstract: Test adequacy criteria are widely used to guide test creation. However, many of these criteria are sensitive to statement structure or the choice of test oracle. This is because such criteria ensure that execution reaches the element of interest, but impose no constraints on the execution path after this point. We are not guaranteed to observe a failure just because a fault is triggered. To addres...

Model Checking Software in Cyberphysical Systems

M. Sirjani, Ehsan Khamespanah, Edward A. Lee. In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). 2020

Abstract: Model checking a software system is about verifying that the state trajectory of every execution of the software satisfies formally specified properties. The set of possible executions is modeled as a transition system. Each "state" in the transition system represents an assignment of values to variables, and a state trajectory (a path through the transition system) is a sequence of such assignmen...

Developing Safe Smart Contracts

Sajjad Rezaei, Ehsan Khamespanah, M. Sirjani, Ali Sedaghatbaf, S. Mohammadi. In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). 2020

Abstract: Blockchain is a shared, distributed ledger on which transactions are digitally recorded and linked together. Smart Contracts are programs running on Blockchain and are used to perform transactions in a distributed environment without need for any trusted third party. Since smart contracts are used to transfer assets between contractual parties, their safety and security are crucial and badly writt...

Large-scale machine learning systems in real-world industrial settings: A review of challenges and solutions

Lucy Ellen Lwakatare, Aiswarya Raj, I. Crnkovic, J. Bosch, H. Olsson. In: Inf. Softw. Technol.. 2020

Abstract: Abstract Background: Developing and maintaining large scale machine learning (ML) based software systems in an industrial setting is challenging. There are no well-established development guidelines, but the literature contains reports on how companies develop and maintain deployed ML-based software systems. Objective: This study aims to survey the literature related to development and maintenance...

Deep learning model for end-to-end approximation of COSMIC functional size based on use-case names

Mirosław Ochodek, Sylwia Kopczyńska, M. Staron. In: Inf. Softw. Technol.. 2020

Abstract: Abstract Context COSMIC is a widely used functional size measurement (FSM) method that supports software development effort estimation. The FSM methods measure functional product size based on functional requirements. Unfortunately, when the description of the product’s functionality is often abstract or incomplete, the size of the product can only be approximated since the object to be measured i...

VeriVANca framework: verification of VANETs by property-based message passing of actors in Rebeca with inheritance

Farnaz Yousefi, Ehsan Khamespanah, Mohammed Gharib, M. Sirjani, A. Movaghar. In: International Journal on Software Tools for Technology Transfer. 2020

VeriVANca framework: verification of VANETs by property-based message passing of actors in Rebeca with inheritance

Farnaz Yousefi, Ehsan Khamespanah, Mohammed Gharib, M. Sirjani, A. Movaghar. In: International Journal on Software Tools for Technology Transfer. 2020

Towards Engineering Future Gameful Applications

A. Bucchiarone, A. Cicchetti, A. Marconi. In: 2020 IEEE/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). 2020

Abstract: Gamification is the exploitation of game mechanisms for serious applications. In general they target societal challenges by engaging people in game-like scenarios. These mechanisms are so successful that there exists a growing interest in exploiting gamification in other scenarios where in general the fundamental need is enhancing people self-motivation. Notably, a major engagement could be necess...

Sharing at Scale: An Open-Source-Software-based License Compliance Ecosystem

Aran Azhakesan, Frances Paulisch. In: 2020 IEEE/ACM 42nd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 2020

Abstract: The amount of open-source-software (OSS) used in the global software engineering community is already enormous and still growing. This includes both the products we develop and the development tools we use to create them. It is meanwhile rare to find examples of products that do not contain open source components. Although, using open source components in products does have many advantages, it is ...

Primers or Reminders? The Effects of Existing Review Comments on Code Review

D. Spadini, G. Çalıklı, Alberto Bacchelli. In: 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE). 2020

Abstract: In contemporary code review, the comments put by reviewers on a specific code change are immediately visible to the other reviewers involved. Could this visibility prime new reviewers' attention (due to the human's proneness to availability bias), thus biasing the code review outcome? In this study, we investigate this topic by conducting a controlled experiment with 85 developers who perform a co...