{"title":"Empirical Study Evaluating Business Process Modeling on Multi-touch Devices","authors":"Hauke Wittern","doi":"10.1109/SWSTE.2012.16","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.16","url":null,"abstract":"During business process modeling sessions it is difficult to prevent misunderstandings due to different expertise of the participants. Computers are supporting single persons at their work in various scenarios for quite a while. However, computers could not support reaching consensus yet and were not well suited for collaborative enterprise modeling. But now multi-touch input enables computer supported co-located collaborative work. Particularly, multi-touch tables seem promising to be beneficial for collaborative modeling sessions as sitting around a table supports discussions which can uncover misunderstandings. In this paper a collaborative business process modeling application is presented and evaluated in an empirical study. The study was carried out in 4 different test environments, including a multi-touch table. Finally, it is argued whether multi-touch tables really keep what they promise and whether they are better suited for business process modeling than other work environments.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"878 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125164779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety Process Patterns: Demystifying Safety Standards","authors":"Johannes Koskinen, M. Vuori, Mika Katara","doi":"10.1109/SWSTE.2012.10","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.10","url":null,"abstract":"Development of safety critical embedded systems is regulated by legislation and related standards. However, at least for beginners in the field, the standards are relatively hard to understand hindering their practical applicability. In this paper, we propose using process patterns to document the requirements for different lifecycle phases set in the safety standards. Ideally, such patterns could make these standards accessible to a wider audience of potential users. Moreover, the companies using the standards could enhance their quality manuals with the help of the patterns. In addition to the requirements set in the standards, the patterns should capture best practices in implementing the requirements. Such best practices could be application domain specific or company specific, according to the purpose of use and availability of information. To demonstrate our approach, we present example patterns identified from the IEC 61508-3 ed2.0 standard.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements Reuse: The State of the Practice","authors":"Yuri Chernak","doi":"10.1109/SWSTE.2012.12","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.12","url":null,"abstract":"For several decades, software reuse has been a recognized solution to improving efficiency of software development. However, implementing reuse in practice remains challenging, and the IT community has little visibility into the state of the practice specifically as it pertains to reusing software requirements. This paper presents the results of a survey conducted in the global IT industry in 2010 and discusses the state of the practice for software requirements reuse. The survey studies reuse adoption in two different contexts, i.e., Software Product Lines and Software Maintenance. The analysis of the survey data focuses on the latter context as a more common case in practice and investigates the impact of various factors on reuse adoption and effectiveness.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131482033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Patentability of Software","authors":"A. Wilk","doi":"10.1109/SWSTE.2012.19","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.19","url":null,"abstract":"The inclusion of algorithms and software in the scope of patent able subject matter has resulted in many software patents and in an ongoing debate on the contribution of software patents to innovation and economic growth. This paper describes the basic concepts of patent law, emphasizing differences between the U.S. and European approaches to software patents. It demonstrates the difficulties in determining if a software invention is patent able. It describes relevant problems and challenges, and suggests directions. It is important for computer professionals to gain knowledge in the patents domain, and this paper provides a useful introduction.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130857777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource-Oriented Middleware Abstractions for Pervasive Computing","authors":"M. Caporuscio, Marco Funaro, C. Ghezzi","doi":"10.1109/SWSTE.2012.13","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.13","url":null,"abstract":"The pervasive computing vision of the future communication and computational infrastructure is that we will be everywhere virtually connected with invisible computers, embedded in the environment. In this context, the challenge is to provide a middleware support that allows applications to have minimal assumptions about the environment while being able to dynamically adapt to the surrounding context. Specifically, the middleware should (i) deal with the run-time growth of the application in terms of involved resources (flexibility), (ii) accommodate heterogeneous and unforeseen functionalities into the running application (genericity), and (iii) discover new functionality at run time and rearrange the application accordingly (dynamism). To this extent, we devised the P-REST (Pervasive REST) architectural style and built the P RIME (P-rest Runtime) middleware to support it. PRIME allows a quick and effective development and execution P-REST applications by leveraging functional programming and code mobility.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124926883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Explaining Embedded Software Modelling Decisions","authors":"Jelena Marincic, A. Mader, R. Wieringa","doi":"10.1109/SWSTE.2012.18","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.18","url":null,"abstract":"As today's devices, gadgets and machines become more intelligent, the complexity of embedded software controlling them grows enormously. To deal with this complexity, embedded software is designed using model-based paradigms. The process of modelling is a combination of formal and creative, design steps. Because of the partially non-formal character of modelling, the relation between a model and the system cannot be expressed mathematically. Therefore, the modeller's justification that the model represents the system adequately can only be non-formal. In this paper we discuss the nature of non-formal modelling steps and pin-point those that create a 'link' between the model and the system. We propose steps to structure the explanation and justification of non-formal modelling decisions. This in turn should enhance confidence that the non-formal, physical world surrounding the embedded system is adequately represented in the model.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements for a Comprehensive and Automated Web Reputation Monitoring System: First Iteration","authors":"Luisa Mich","doi":"10.1109/SWSTE.2012.15","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.15","url":null,"abstract":"Web reputation plays a critical role for companies and organizations, impacting their competitive positions and ultimately their success and survival on the market. User-generated content published on a variety of so-called Web 2.0 Websites are dramatically changing power relationships in business. Customers use more and more other customers' judgments, comments, and reviews in their decision-making processes. Companies needed to change their online communication strategies accordingly. However, a systematic approach to Web reputation monitoring, and in turn to the analysis of supporting systems is still lacking. Existing tools only partially support the complex process of Web reputation monitoring, usually applying natural language technology at different stages of maturity. This paper thoroughly investigates the high-level requirements for a general-purpose Web reputation monitoring system. Requirements are classified according to three main steps covering the tasks necessary to a comprehensive Web reputation monitoring strategy. To identify and illustrate the requirements, the paper refers to cases and examples in the tourism sector, whose complexity helps to realize a wide-ranging analysis, thus mitigating the risk of oversimplification.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Modeling from Life-Cycle Perspective","authors":"A. Tomer","doi":"10.1109/SWSTE.2012.17","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.17","url":null,"abstract":"Modeling of software systems often focus mainly on the operational system during its operational stage, with less attention to various other life-cycle stages and other contexts of operation, such as testing, training, maintenance, and others. Introducing new model-oriented definitions for the terms \"architecture\" and \"configuration\" this work proposes an approach to model system/software architecture and all its associated configurations under one set of interrelated models. The approach is applicable both to structural and behavioral architectures, at all levels of software/system decomposition. The concepts of the approach are demonstrated through a case study, using the UML modeling language.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114794529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Governance Using Retrospectives: A Case Study","authors":"Y. Dubinsky, O. Hazzan","doi":"10.1109/SWSTE.2012.11","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.11","url":null,"abstract":"In this paper we present our study on the implementation of the retrospective practice in software development projects. Specifically, we describe the retrospective practice and present its impact on the development process of a specific large-scale project. Our study shows that a team can steer its process evolution systematically by retrospectives, identifying process issues, discussing their nature, and deciding on mechanisms for their improvement. For the purpose of our research, we use five process elements: work procedures, policies, metrics, roles, and decision rights. Based on the data analysis of the retrospectives conducted in our case study, we illustrate each category and demonstrate how it is refined along the project timeline. We suggest using the retrospective practice as a qualitative data gathering tool that assists the governance process of a development project.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Efrat Manisterski, Esther David, Sarit Kraus, N. Jennings
{"title":"Efficient Allocation of Agent Groups for Complex Tasks in Real Cost Environments","authors":"Efrat Manisterski, Esther David, Sarit Kraus, N. Jennings","doi":"10.1109/SWSTE.2012.14","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.14","url":null,"abstract":"In this paper we analyze and propose solutions for complex task allocation problems that have predetermined and known overall payments for any given task. Here a particular task is considered to be complete if all its relevant subtasks are assigned to agents with the necessary capabilities, and the total costs of all the agents falls within a preset limit. In previous work we prove that the problem is NP-hard and that for the general case of the non-cooperative setting, no protocol achieving the efficient solution can exist that is individually rational and budget balanced. Moreover, we show that although efficient protocols may exist in some settings, these will inevitably besetting-specific. Therefore, in this paper we analyze more specific, but nevertheless important, settings for which we develop protocols with the following main advantages. First, we prove these protocols to be individually rational, budget balanced and in equilibrium. Second, the performance of the protocols are evaluated via extensive experiments that show that they outperform previous solutions in this area in terms of efficiency and stability. Third, these protocols are proved to be polynomial in the number of subtasks and agents. Finally, as all proposed protocols are strategy proof or Bayesian Nash incentive compatible, the equilibrium agents' strategies are simply to declare their real costs and capabilities.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133114125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}