SC Harvester Papers Database Interface

Fog Computing for Augmented Reality: Trends, Challenges and Opportunities

S. Salman, T. Sitompul, A. Papadopoulos, T. Nolte. In: 2020 IEEE International Conference on Fog Computing (ICFC). 2020

Abstract: Augmented reality applications are computationally intensive and have latency requirements in the range of 15- 20 milliseconds. Fog computing addresses these requirements by providing on-demand computing capacity and lower latency by bringing the computational resources closer to the augmented reality devices. In this paper, we reviewed papers providing custom solutions for augmented reality using...

SHiLA: Synthesizing High-Level Assertions for High-Speed Validation of High-Level Designs

M. Riazati, M. Daneshtalab, Mikael Sjödin, B. Lisper. In: 2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS). 2020

Abstract: In the past, assertions were mostly used to validate the system through the design and simulation process. Later, a new method known as assertion synthesis was introduced, which enabled the designers to use the assertions for high-speed hardware emulation and safety and reliability insurance after tape-out. Although the synthesis of the assertions at the register transfer level is proposed and imp...

Cross-project Classification of Security-related Requirements

Mazen Mohamad, J. Steghöfer, R. Scandariato. In: ArXiv. 2020

Abstract: We investigate the feasibility of using a classifier for security-related requirements trained on requirement specifications available online. This is helpful in case different requirement types are not differentiated in a large existing requirement specification. Our work is motivated by the need to identify security requirements for the creation of security assurance cases that become a necessit...

Security assurance cases—state of the art of an emerging approach

Mazen Mohamad, J. Steghöfer, R. Scandariato. In: Empirical Software Engineering. 2020

Abstract: Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regula...

TAMAA

Rong Gu, Eduard Paul Enoiu, C. Seceleanu. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing. 2020

On the measurement of software complexity for plc industrial control systems using TIQVA

Adnan Muslija, Eduard Paul Enoiu. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing. 2020

Abstract: In the safety-critical domain (e.g. transportation, nuclear, aerospace and automotive), large-scale embedded systems implemented using Programmable Logic Controllers (PLCs) are widely used to provide supervisory control. Software complexity metrics, such as code size and cyclomatic complexity, have been used in the software engineering community for predicting quality metrics such as maintainabili...

TAMAA: UPPAAL-based mission planning for autonomous agents

Rong Gu, Eduard Paul Enoiu, C. Seceleanu. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing. 2020

Abstract: Autonomous vehicles, such as construction machines, operate in hazardous environments, while being required to function at high productivity. To meet both safety and productivity, planning obstacle-avoiding routes in an efficient and effective manner is of primary importance, especially when relying on autonomous vehicles to safely perform their missions. This work explores the use of model checki...

Evaluating the Effects of Different Requirements Representations on Writing Test Cases

F. D. O. Neto, J. Horkoff, Richard Berntsson-Svensson, D. I. Mattos, Alessia Knauss. In: . 2020

Continuous Experimentation and the Cyber-Physical Systems challenge. An overview in literature and the industrial perspective

F. Giaimo, H. Andrade, C. Berger. In: J. Syst. Softw.. 2020

Abstract: Context: New software development patterns are emerging aiming at accelerating the process of delivering value. One is Continuous Experimentation, which allows to systematically deploy and run instrumented software variants during development phase in order to collect data from the field of application. While currently this practice is used on a daily basis on web-based systems, technical difficul...

The scenario coevolution paradigm: adaptive quality assurance for adaptive systems

Thomas Gabor, Andreas Sedlmeier, Thomy Phan, Fabian Ritz, Marie Kiermeier et al. In: International Journal on Software Tools for Technology Transfer. 2020

The scenario coevolution paradigm: adaptive quality assurance for adaptive systems

Thomas Gabor, Andreas Sedlmeier, Thomy Phan, Fabian Ritz, Marie Kiermeier et al. In: International Journal on Software Tools for Technology Transfer. 2020

Abstract: Systems are becoming increasingly more adaptive, using techniques like machine learning to enhance their behavior on their own rather than only through human developers programming them. We analyze the impact the advent of these new techniques has on the discipline of rigorous software engineering, especially on the issue of quality assurance. To this end, we provide a general description of the p...

Replication package to An Empirical Study of Bots in Software Development – Characteristics and Challenges from a Practitioner's Perspective

Linda Erlenhov, F. D. O. Neto, P. Leitner. In: . 2020

Emerging Perspectives of Application Programming Interface Strategy: A Framework to Respond to Business Concerns

Juho Lindman, J. Horkoff, I. Hammouda, E. Knauss. In: IEEE Software. 2020

Abstract: Software specialists increasingly find themselves in situations where their application programming interface (API)-related decisions have implications on software business. We present a strategic API framework to aid in consideration of business concerns when designing, updating, or maintaining APIs....

Preference reversals during risk elicitation.

P. Kusev, P. van Schaik, R. Martin, Lars Hall, Petter Johansson. In: Journal of experimental psychology. General. 2020

Abstract: Understanding human behavior from the perspective of normative and descriptive theories depends on human agents having stable and coherent decision-making preferences. Both utility theory (expected rational behavior; von Neumann & Morgenstern, 1947) and prospect theory, with its certainty equivalent (CE) method (expected irrational behavior; Tversky & Kahneman, 1992), assume stable behavioral patt...

Facilitating Organisational Fluidity with Computational Social Matching

Jukka Huhtamäki, Thomas Olsson, Salla-Maaria Laaksonen. In: . 2020