SC Harvester Papers Database Interface

Preventing Omission of Key Evidence Fallacy in Process-Based Argumentations

Faiz ul Muram, B. Gallina, Laura Gomez Rodriguez. In: 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC). 2018

Abstract: Process-based argumentations argue that a safety-critical system has been developed in compliance with the development process defined in the standards and provide the evidence for certification of compliance. However, the process-based argumentations cannot ensure that the evidences are sufficient to support the claim. If the argumentations are insufficient (i.e., fallacious) they may result in a...

A Systematic Process for Applying the CHESS Methodology in the Creation of Certifiable Evidence

L. Bressan, A. L. Oliveira, Leonardo Montecchi, B. Gallina. In: 2018 14th European Dependable Computing Conference (EDCC). 2018

Abstract: CHESS is an open source methodology and toolset for the development of safety-critical systems. More specifically, CHESS is a model-based methodology, which supports the design, dependability analysis, and code generation for critical systems. Despite its rather mature level in terms of technology readiness, systematic guidance needs to be developed to promote its usage for certification purposes....

False Beliefs and Confabulation Can Lead to Lasting Changes in Political Attitudes

Thomas Strandberg, David Sivén, Lars Hall, Petter Johansson, P. Pärnamets. In: Journal of Experimental Psychology: General. 2018

Abstract: In times of increasing polarization and political acrimony, fueled by distrust of government and media disinformation, it is ever more important to understand the cognitive mechanisms behind political attitude change. In two experiments, we present evidence that false beliefs about one’s own prior attitudes and confabulatory reasoning can lead to lasting changes in political attitudes. In Experime...

Coordinated actor model of self-adaptive track-based traffic control systems

Maryam Bagheri, M. Sirjani, Ehsan Khamespanah, Narges Khakpour, Ilge Akkaya et al. In: J. Syst. Softw.. 2018

Abstract: Abstract Self-adaptation is a well-known technique to handle growing complexities of software systems, where a system autonomously adapts itself in response to changes in a dynamic and unpredictable environment. With the increasing need for developing self-adaptive systems, providing a model and an implementation platform to facilitate integration of adaptation mechanisms into the systems and assu...

Static Flow Analysis of the Action Language for Foundational UML

Jean Malm, Federico Ciccozzi, J. Gustafsson, B. Lisper, Jonas Skoog. In: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA). 2018

Abstract: One of the major advantages of Model-Driven Engineering is the possibility to early assess crucial system properties, in order to identify issues that are easier and cheaper to solve at design level than at code level. An example of such a property is the timing behaviour of a real-time application, where an early indication that the timing constraints might not be met can help avoiding costly re-...

A Role-Based Approach for Orchestrating Emergent Configurations in the Internet of Things

R. Mihailescu, Romina Spalazzese, Clint Heyer, P. Davidsson. In: ArXiv. 2018

Abstract: The Internet of Things (IoT) is envisioned as a global network of connected things enabling ubiquitous machine-to-machine (M2M) communication. With estimations of billions of sensors and devices to be connected in the coming years, the IoT has been advocated as having a great potential to impact the way we live, but also how we work. However, the connectivity aspect in itself only accounts for the...

Enforcing Quality of Service Through Hardware Resource Aware Process Scheduling

Marcus Jägemar, Andreas Ermedahl, Sigrid Eldh, M. Behnam, B. Lisper. In: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA). 2018

Abstract: Hardware manufacturers are forced to improve system performance continuously due to advanced and computationally demanding system functions. Unfortunately - more powerful hardware leads to increased costs. Instead, companies attempt to improve performance by consolidating multiple functions to share the same hardware to exploit existing performance instead. In legacy systems, each function had ind...

Adaptive Autonomy in a Search and Rescue Scenario

Mirgita Frasheri, Baran Çürüklü, Mikael Esktröm, A. Papadopoulos. In: 2018 IEEE 12th International Conference on Self-Adaptive and Self-Organizing Systems (SASO). 2018

Abstract: Adaptive autonomy plays a major role in the design of multi-robots and multi-agent systems, where the need of collaboration for achieving a common goal is of primary importance. In particular, adaptation becomes necessary to deal with dynamic environments, and scarce available resources. In this paper, a mathematical framework for modelling the agents' willingness to interact and collaborate, and ...

Work-in-Progress: Fog Computing for Adaptive Human-Robot Collaboration

Václav Struhár, A. Papadopoulos, M. Behnam. In: 2018 International Conference on Embedded Software (EMSOFT). 2018

Abstract: Fog computing is an emerging technology that enables the design of novel time sensitive industrial applications. This new computing paradigm also opens several new research challenges in different scientific domains, ranging from computer architectures to networks, from robotics to real-time systems. In this paper, we present a use case in the human-robot collaboration domain, and we identify some...

Tackling Combinatorial Explosion: A Study of Industrial Needs and Practices for Analyzing Highly Configurable Systems

M. Mukelabai, Damir Nešić, Salome Maro, T. Berger, J. Steghöfer. In: 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). 2018

Abstract: Highly configurable systems are complex pieces of software. To tackle this complexity, hundreds of dedicated analysis techniques have been conceived, many of which able to analyze system properties for all possible system configurations, as opposed to traditional, single-system analyses. Unfortunately, it is largely unknown whether these techniques are adopted in practice, whether they address act...

Inadequate Risk Analysis Might Jeopardize The Functional Safety of Modern Systems

Kaj Hänninen, H. Hansson, Henrik Thane, Mehrdad Saadatmand. In: ArXiv. 2018

Abstract: In the early 90s, researchers began to focus on security as an important property to address in combination with safety. Over the years, researchers have proposed approaches to harmonize activities ......

Preface to the English translation

Daniel Ståhl. In: Hunt for Nazis. 2018

Message from the WASA 2018 Organizing Committee

Darko Durisic, Yaping Luo, M. Staron, Y. Dajsuren. In: 2018 IEEE International Conference on Software Architecture Companion (ICSA-C). 2018

Mobile Applications as Carriers of Institutional Pressures: A Case of the Finnish Taxi Industry

Karin Väyrynen, Arto Lanamäki, Juho Lindman. In: . 2018

Using Self-Healing to Increase Robustness of Handling In-Browser Third-Party Content

Sarah Nadi, Jimmy Hedstrom, M. Staron. In: 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). 2018

Abstract: Monitoring of third-party content, such as ads, in web applications is one of the growing business areas in the web industry. In order to increase the impact of the ads and optimize the content on the web-page, companies measure which ads are displayed and how long they stay on the visible part of the screen. However, the challenge is that the third-party content can be of varying type, come from ...