Page 72 of 313
Abstract: Augmented reality applications are computationally intensive and have latency requirements in the range of 15- 20 milliseconds. Fog computing addresses these requirements by providing on-demand computing capacity and lower latency by bringing the computational resources closer to the augmented reality devices. In this paper, we reviewed papers providing custom solutions for augmented reality using...
Abstract: In the past, assertions were mostly used to validate the system through the design and simulation process. Later, a new method known as assertion synthesis was introduced, which enabled the designers to use the assertions for high-speed hardware emulation and safety and reliability insurance after tape-out. Although the synthesis of the assertions at the register transfer level is proposed and imp...
Abstract: We investigate the feasibility of using a classifier for security-related requirements trained on requirement specifications available online. This is helpful in case different requirement types are not differentiated in a large existing requirement specification. Our work is motivated by the need to identify security requirements for the creation of security assurance cases that become a necessit...
Abstract: Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regula...
Abstract: In the safety-critical domain (e.g. transportation, nuclear, aerospace and automotive), large-scale embedded systems implemented using Programmable Logic Controllers (PLCs) are widely used to provide supervisory control. Software complexity metrics, such as code size and cyclomatic complexity, have been used in the software engineering community for predicting quality metrics such as maintainabili...
Abstract: Autonomous vehicles, such as construction machines, operate in hazardous environments, while being required to function at high productivity. To meet both safety and productivity, planning obstacle-avoiding routes in an efficient and effective manner is of primary importance, especially when relying on autonomous vehicles to safely perform their missions. This work explores the use of model checki...
Abstract: Context: New software development patterns are emerging aiming at accelerating the process of delivering value. One is Continuous Experimentation, which allows to systematically deploy and run instrumented software variants during development phase in order to collect data from the field of application. While currently this practice is used on a daily basis on web-based systems, technical difficul...
Abstract: Systems are becoming increasingly more adaptive, using techniques like machine learning to enhance their behavior on their own rather than only through human developers programming them. We analyze the impact the advent of these new techniques has on the discipline of rigorous software engineering, especially on the issue of quality assurance. To this end, we provide a general description of the p...
Abstract: Software specialists increasingly find themselves in situations where their application programming interface (API)-related decisions have implications on software business. We present a strategic API framework to aid in consideration of business concerns when designing, updating, or maintaining APIs....
Abstract: Understanding human behavior from the perspective of normative and descriptive theories depends on human agents having stable and coherent decision-making preferences. Both utility theory (expected rational behavior; von Neumann & Morgenstern, 1947) and prospect theory, with its certainty equivalent (CE) method (expected irrational behavior; Tversky & Kahneman, 1992), assume stable behavioral patt...
Page 72 of 313