Page 11 of 313
Abstract: The article discusses emerging non-von Neumann computer architectures and their integration in the computing continuum for supporting modern distributed applications, including artificial intelligence, big data, and scientific computing. It provides a detailed summary of available and emerging non-von Neumann architectures, which range from power-efficient single-board accelerators to quantum and ...
Abstract: How are requirements managed in agile software development? While practitioners are widely adopting industry-pushed innovations to cope with requirements in agile settings, research at this intersection is still too limited. Based on first-hand experience, we review some core aspects of this industry-academia gap (e.g., user stories vs. requirements, management tools like JIRA, requirements-as-cod...
Abstract: Software modelling and model-driven engineering (MDE) is traditionally studied from a technical perspective. However, one of the core motivations behind the use of software models is inherently human-centred. Models aim to enable practitioners to communicate about software designs, make software understandable, or make software easier to write through domain-specific modelling languages. Several r...
Abstract: Networks such as the Internet are essential for our connected world. Quantum computing threatens its fundamental security mechanisms. Therefore, a migration to post-quantum-cryptography (PQC) is necessary for networks and their components. Currently, there is little knowledge on how such migrations should be structured and implemented in practice. Our systematic literature review addresses migrati...
Abstract: The emergence of powerful automated design tools in many domains is changing the nature of design, as human-intensive activities can be increasingly off-loaded to those tools. Rather than having a human consider only handful of options, as has been done historically, such tools now enable the generation of a large space of potential designs, exhibiting different tradeoffs among competing qualities...
Abstract: Requirements elicitation has since long been recognized as critical to the success of requirements engineering, hence also to the success of systems engineering. Achieving sufficient scope and quality in the requirements elicitation process poses a great challenge, given the limited slices of budget and time available for this relatively sizeable activity. Among all predominant requirements elicit...
Abstract: Small and medium enterprises (SMEs) that build individualized software require lightweight solutions to trace cybersecurity concerns across the codebase. This includes tracking where potentially vulnerable assets are handled in the codebase. The solution that provides this tracking should be fully integrated into the developers' workflow and should be usable by developers who are not cybersecurity...
Abstract: Continuous integration and delivery encompass a variety of activities, including regular code changes, compilation, building, testing, and distribution to clients. In order to accomplish the assigned tasks, practitioners tend to pursue additional information. Software practitioners who allocate a significant portion of their time and energy towards seeking out required information may experience a...
Abstract: With the increasing prevalence of open and connected products, cybersecurity has become a serious issue in safety-critical domains such as the automotive industry. As a result, regulatory bodies have become more stringent in their requirements for cybersecurity, necessitating security assurance for products developed in these domains. In response, companies have implemented new or modified process...
Abstract: RPL—Routing Protocol for Low-Power and Lossy Networks (usually pronounced “ripple”)—is the de facto standard for IoT networks. However, it neglects to exploit IoT devices’ full capacity to optimize their transmission power, mainly because it is quite challenging to do so in parallel with the routing strategy, given the dynamic nature of wireless links and the typically constrained resources of IoT...
Abstract: : SiO 2 structures show great promise for increasing the energy density of anodes for next-generation lithium-ion batteries (LIBs). However, high control of the area, porosity, and morphology of SiO 2 particles is critical to optimize anodes electrochemical performance, and the lack of sustainable methods for producing SiO 2 particles with tailored properties at the nano-and microscale represents ...
Abstract: Increasing shortages and costs of common bedding materials have led dairy farmers in Sweden to consider using recycled manure solids (RMS), which are readily available and low-cost, as an alternative bedding material. The main risks are effects on udder health and milk quality, but RMS could also affect animal welfare and claw health. The advantages and disadvantages of using RMS bedding have not ...
Abstract: Scientists without specific software programming skills are increasingly required to express their problems in terms of software to exploit the computational power of heterogeneous parallel hardware. Producing software for this hardware is very cumbersome for the experienced programmer; for the novice, it is just impracticable. We aim to grant scientists across disciplines access to heterogeneous ...
Page 11 of 313