Page 73 of 313
Abstract: Unlike other techniques for learning from customers, online controlled experiments (OCEs) establish an accurate and causal relationship between a change and the impact observed. We show that OCEs help optimize infrastructure needs and aid in project planning and measuring team efforts. We conclude that product development should fully integrate the experiment lifecycle to benefit from the OCEs....
Abstract: Internet of Things (IoT) systems are complex and multifaceted, and the design of their architectures needs to consider many aspects at a time. Design decisions concern, for instance, the modeling of software components and their interconnections, as well as where to deploy the components within the available hardware infrastructure in the Edge-Cloud continuum. A relevant and challenging task, in t...
Abstract: Engineering Internet of Things (IoT) systems is a challenging task partly due to the dynamicity and uncertainty of the environment including the involvement of the human in the loop. Users should be able to achieve their goals seamlessly in different environments, and IoT systems should be able to cope with dynamic changes. Several approaches have been proposed to enable the automated formation, e...
Abstract: Nowadays, embedded systems are increasingly complex, meaning that traditional testing methods are costly to use and infeasible to directly apply due to the complex interactions between hardware and software. Modern embedded systems are also demanded to function based on low-energy computing. Hence, testing the energy usage is increasingly important. Artifacts produced during the development of emb...
Abstract: Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. This work focuses on the selection type of hyper-heuristic, called the exponential Monte Carlo with counter (EMCQ). Current implementations rely on the memory-less selection that can be counterproductive as the selected search operator ma...
Abstract: Serendipity refers to uncontrolled circumstances that lead to unexpected yet fortunate discoveries. The phenomenon has been studied extensively in relation to information retrieval. However, serendipity in the context of social encounters has been the subject of few empirical studies. In professional life, social serendipity might result in benefits such as fruitful collaboration, successful recru...
Abstract: This article presents a novel method for determining the factual adoption of new processes in software R&D organizations. We use a DNA-inspired analysis (motifs) to categorize parts and find similarities between projects using defect-inflow profiles....
Abstract: American politics is becoming increasingly polarized, which biases decision-making and reduces open-minded debate. In two experiments, we demonstrate that despite this polarization, a simple manipulation can make people express and endorse less polarized views about competing political candidates. In Study 1, we approached 136 participants at the first 2016 presidential debate and on the streets o...
Abstract: Software branching and merging allows collaborative development and creating software variants, commonly referred to as clone & own. While simple and cheap, a trade-off is the need to merge code and to resolve merge conflicts, which frequently occur in practice. When resolving conflicts, a key challenge for developer is to understand the changes that led to the conflict. While merge conflicts and ...
Abstract: Advances in cloud computing make cloud services as an appealing solution for enabling services flexibility and availability on demand to accommodate users' needs. The terms and the guarantees of service provision are negotiated and then stated in a Service Level Agreement (SLA). To facilitate a wider acceptance of such services, beside the standard properties, security has to be taken into conside...
Abstract: System logs perform a critical function in software-intensive systems as logs record the state of the system and significant events in the system at important points in time. Unfortunately, log entries are typically created in an ad-hoc, unstructured and uncoordinated fashion, limiting their usefulness for analytics and machine learning. In this paper, we present the main challenges of contemporar...
Abstract: Future PSM systems will require diversity-enhancing yet contextually sensitive designs....
Page 73 of 313