Page 50 of 313
Abstract: Continuous Deployment (CD) advocates for quick and frequent deployments of software to production. The goal is to bring new functionality as early as possible to users while learning from their usage. CD has emerged from web-based applications where it has been gaining traction over the past years. While CD is appealing for many software development organizations, empirical evidence on perceived b...
Abstract: The lack of labeled data is a major problem in both research and industrial settings since obtaining labels is often an expensive and time-consuming activity. In the past years, several machine learning algorithms were developed to assist and perform automated labeling in partially labeled datasets. While many of these algorithms are available in open-source packages, there is a lack of research t...
Abstract: A/B experimentation is a known technique for data-driven product development and has demonstrated its value in web-facing businesses. With the digitalisation of the automotive industry, the focus in the industry is shifting towards software. For automotive embedded software to continuously improve, A/B experimentation is considered an important technique. However, the adoption of such a technique ...
Abstract: Test automation is common in software development; often one tests repeatedly to identify regressions. If the amount of test cases is large, one may select a subset and only use the most important test cases. The regression test selection (RTS) could be automated and enhanced with Artificial Intelligence (AI-RTS). This however could introduce ethical challenges. While such challenges in AI are in ...
Abstract: In this paper, we develop and compare the performance of different controllers for balancing an autonomous bicycle. The evaluation is carried out both in simulation, using two different models, and experimentally, on a bicycle instrumented with only lightweight components, and leaving the bicycle structure practically unchanged. Two PID controllers, a Linear Quadratic Regulator (LQR), and a fuzzy ...
Abstract: Heterogeneous networks (hetnets) is an interconnection of distinctive networking paradigms to enable wider reachability and greater collaborations. In large Internet-of-Things (IoT) applications, many wireless networks are spatially co-located and intertwined forming hetnets; for instance, health monitoring devices utilising ZigBee or IEEE 802.15.4 co-exist in 2.4 GHz spectrum alongside Wi-Fi devi...
Abstract: Routing Protocol for Low-Power and Lossy Networks (RPL) as the most widely used routing protocol for constrained Internet of Things (IoT) devices optimizes the number of routing states that nodes maintain to minimize resource consumption. Given that the routes are optimized for data collection, this leads to selecting sub-optimal routes, particularly in case of east-west or ”transversal” traffic. ...
Abstract: Accurate and timely mobility support in Internet of Things (IoT) applications is a challenging issue, considering the inherent scarce resources of IoT devices. However, the computational, memory and communication burden may be pushed into more ”muscled” Software Defined Network (SDN) controllers. A centralised controller can exploit its global view of the network and predict the handovers and upda...
Abstract: Several operations, ranging from regular code updates to compiling, building, testing, and distribution to customers, are consolidated in continuous integration and delivery. Pro-fessionals seek additional information to complete the mission at hand during these tasks. Developers who devote a large amount of time and effort to finding such information may become distracted from their work. We will...
Abstract: Abstract A safety case is a hierarchical argument supported by evidence, whose scope is defined by contextual information. The goal is to show that the conclusion of such argument, typically “the system is acceptably safe”, is true. However, because the knowledge about systems is always imperfect, the value true cannot be assigned with absolute certainty. Instead, researchers have proposed to asse...
Abstract: Security Assurance Cases (SAC) are structured arguments and evidence bodies used to reason about security of a certain system. SACs are gaining focus in the automotive domain as the needs for security assurance are growing. In this study, we present an approach for creating SAC. The approach is inspired by the upcoming security standards ISO/SAE-21434 as well as the internal needs of automotive Or...
Abstract: Switched networks following the time-triggered paradigm rely on static schedules that determine the communication pattern over each link. In order to tolerate link failures, methods based on spatial redundancy and based on resynthesis and replacement of schedules have been proposed. These methods, however, do not scale to larger networks, which may be needed e.g. for future large-scale cyberphysic...
Page 50 of 313