SC Harvester Papers Database Interface

Beyond Von Neumann in the Computing Continuum: Architectures, Applications, and Future Directions

Dragi Kimovski, Nishant Saurabh, Matthijs Jansen, Atakan Aral, Auday Al-Dulaimy et al. In: IEEE Internet Computing. 2024

Abstract: The article discusses emerging non-von Neumann computer architectures and their integration in the computing continuum for supporting modern distributed applications, including artificial intelligence, big data, and scientific computing. It provides a detailed summary of available and emerging non-von Neumann architectures, which range from power-efficient single-board accelerators to quantum and ...

Where Requirements and Agility Meet: No-Man’s-Land or a Land of Opportunity?

Fabiano Dalpiaz, J. Steghöfer, Markus Borg. In: IEEE Software. 2024

Abstract: How are requirements managed in agile software development? While practitioners are widely adopting industry-pushed innovations to cope with requirements in agile settings, research at this intersection is still too limited. Based on first-hand experience, we review some core aspects of this industry-academia gap (e.g., user stories vs. requirements, management tools like JIRA, requirements-as-cod...

Human factors in model-driven engineering: future research goals and initiatives for MDE

Grischa Liebel, J. Klünder, Regina Hebig, Christopher Lazik, Inês Nunes et al. In: Software and Systems Modeling. 2024

Abstract: Software modelling and model-driven engineering (MDE) is traditionally studied from a technical perspective. However, one of the core motivations behind the use of software models is inherently human-centred. Models aim to enable practitioners to communicate about software designs, make software understandable, or make software easier to write through domain-specific modelling languages. Several r...

Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review

Christian Näther, Daniel Herzinger, S. Gazdag, J. Steghöfer, S. Daum et al. In: IEEE Access. 2024

Abstract: Networks such as the Internet are essential for our connected world. Quantum computing threatens its fundamental security mechanisms. Therefore, a migration to post-quantum-cryptography (PQC) is necessary for networks and their components. Currently, there is little knowledge on how such migrations should be structured and implemented in practice. Our systematic literature review addresses migrati...

Challenges in Creating Effective Automated Design Environments: An experience report from the domain of generative manufacturing

David Garlan, B. Schmerl, Rebekka Wohlrab, Javier Cámara. In: 2024 IEEE/ACM International Workshop on Designing Software (Designing). 2024

Abstract: The emergence of powerful automated design tools in many domains is changing the nature of design, as human-intensive activities can be increasingly off-loaded to those tools. Rather than having a human consider only handful of options, as has been done historically, such tools now enable the generation of a large space of potential designs, exhibiting different tradeoffs among competing qualities...

Success Factors in the Specification of Operational Scenarios - An Industrial Perspective

Henrik Gustavsson, Damir Bilić, Jan Carlson, Eduard Paul Enoiu. In: 2024 IEEE International Systems Conference (SysCon). 2024

Abstract: Requirements elicitation has since long been recognized as critical to the success of requirements engineering, hence also to the success of systems engineering. Achieving sufficient scope and quality in the requirements elicitation process poses a great challenge, given the limited slices of budget and time available for this relatively sizeable activity. Among all predominant requirements elicit...

Tracking Assets in Source Code with Security Annotations

Daniel Haak, Raphael Mayr, J. Steghöfer, Alexandra Teynor, Phillip Heidegger. In: 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion). 2024

Abstract: Small and medium enterprises (SMEs) that build individualized software require lightweight solutions to trace cybersecurity concerns across the codebase. This includes tracking where potentially vulnerable assets are handled in the codebase. The solution that provides this tracking should be fully integrated into the developers' workflow and should be usable by developers who are not cybersecurity...

Information Needs in Continuous Integration and Delivery in Large Scale Organizations: An Observational Study

Azeem Ahmad, Kristian Sandahl, Daniel Hasselqvist, Pontus Sandberg. In: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. 2024

Abstract: Continuous integration and delivery encompass a variety of activities, including regular code changes, compilation, building, testing, and distribution to clients. In order to accomplish the assigned tasks, practitioners tend to pursue additional information. Software practitioners who allocate a significant portion of their time and energy towards seeking out required information may experience a...

Managing Security Evidence in Safety-Critical Organizations

Mazen Mohamad, J. Steghöfer, Eric Knauss, Riccardo Scandariato. In: ArXiv. 2024

Abstract: With the increasing prevalence of open and connected products, cybersecurity has become a serious issue in safety-critical domains such as the automotive industry. As a result, regulatory bodies have become more stringent in their requirements for cybersecurity, necessitating security assurance for products developed in these domains. In response, companies have implemented new or modified process...

Supporting meta-model-based language evolution and rapid prototyping with automated grammar transformation

Weixing Zhang, Jörg Holtmann, Daniel Strüber, Regina Hebig, J. Steghöfer. In: J. Syst. Softw.. 2024

ACTOR: Adaptive Control of Transmission Power in RPL

Iliar Rabet, H. Fotouhi, Mário Alves, M. Vahabi, Mats Björkman. In: Sensors (Basel, Switzerland). 2024

Abstract: RPL—Routing Protocol for Low-Power and Lossy Networks (usually pronounced “ripple”)—is the de facto standard for IoT networks. However, it neglects to exploit IoT devices’ full capacity to optimize their transmission power, mainly because it is quite challenging to do so in parallel with the routing strategy, given the dynamic nature of wireless links and the typically constrained resources of IoT...

Species-Dependent Nanostructured Diatom-SiO2 Anodes: A Sustainable Option for Optimizing Electrode Performance

Kesavan Thangaian, Weicheng Hua, Jon Tobias Aga Karlsen, Inger‐Emma Nylund, S. Nilsson et al. In: ACS Sustainable Resource Management. 2024

Abstract: : SiO 2 structures show great promise for increasing the energy density of anodes for next-generation lithium-ion batteries (LIBs). However, high control of the area, porosity, and morphology of SiO 2 particles is critical to optimize anodes electrochemical performance, and the lack of sustainable methods for producing SiO 2 particles with tailored properties at the nano-and microscale represents ...

Comparisons of recycled manure solids and wood shavings/sawdust as bedding material -implications for animal welfare, herd health, milk quality and bedding costs in Swedish dairy herds.

K. Jeppsson, M. Magnusson, S. Nilsson, L. Ekman, L. Winblad von Walter et al. In: Journal of dairy science. 2024

Abstract: Increasing shortages and costs of common bedding materials have led dairy farmers in Sweden to consider using recycled manure solids (RMS), which are readily available and low-cost, as an alternative bedding material. The main risks are effects on udder health and milk quality, but RMS could also affect animal welfare and claw health. The advantages and disadvantages of using RMS bedding have not ...

CRYSTAL framework: Cybersecurity assurance for cyber-physical systems

Fereidoun Moradi, Sara Abbaspour Asadollah, Bahman Pourvatan, Zahra Moezkarimi, Marjan Sirjani. In: J. Log. Algebraic Methods Program.. 2024

Towards accessible software engineering for heterogeneous hardware

Federico Ciccozzi. In: 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA). 2024

Abstract: Scientists without specific software programming skills are increasingly required to express their problems in terms of software to exploit the computational power of heterogeneous parallel hardware. Producing software for this hardware is very cumbersome for the experienced programmer; for the novice, it is just impracticable. We aim to grant scientists across disciplines access to heterogeneous ...