{"title":"TIRT: A Traceability Information Retrieval Tool for Software Product Lines Projects","authors":"W. Santos, E. Almeida, S. Meira","doi":"10.1109/SEAA.2012.40","DOIUrl":"https://doi.org/10.1109/SEAA.2012.40","url":null,"abstract":"Software Product Line has proven to be an effective methodology for developing a diversity of software products at lower costs, in shorter time, and with higher quality. However, the adoption and maintenance of traceability in the context of product lines is considered a difficult task, due to the large number and heterogeneity of assets developed during product line engineering. Furthermore, the manual creation and management of traceability relations is difficult, error-prone, time consuming and complex. In this sense, Traceability Information Retrieval Tool (TIRT) was proposed in order to mitigate the maintenance traceability problem. An experimental study was performed in order to identify the viability of the proposed tool and traceability scenarios.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116455643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bee-Inpired Road Traffic Control as an Example of Swarm Intelligence in Cyber-Physical Systems","authors":"Sebastian Senge, H. Wedde","doi":"10.1109/SEAA.2012.75","DOIUrl":"https://doi.org/10.1109/SEAA.2012.75","url":null,"abstract":"Physical parts of a system to interacting software components. In many cyber-physical systems considered nowadays, the system's parts form a network structure with concurrent entities and the need of seamless scaling and fault-tolerant information dissemination and decentralized methods. In this contribution we point out that swarm intelligence approaches may be well suited for CPS with networked components. As an example, we present our self-adaptive and distributed vehicle route guidance approach, termed BeeJamA, which provides drivers safely with routing directions well before each intersection. Our approach is based on a multi-agent system which is inspired by the honey bee behavior and relies on a decentralized vehicle-to-infrastructure architecture.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Markus Nöbauer, N. Seyff, Iris Groher, Deepak Dhungana
{"title":"A Lightweight Approach for Product Line Scoping","authors":"Markus Nöbauer, N. Seyff, Iris Groher, Deepak Dhungana","doi":"10.1109/SEAA.2012.81","DOIUrl":"https://doi.org/10.1109/SEAA.2012.81","url":null,"abstract":"Many organizations providing products with common features wish to take advantage of that similarity in order to reduce development and maintenance efforts. Their goal is to move from a single-system development paradigm towards a product line approach. However, this transition is not trivial and requires a systematic scoping phase to decide how the product line should be defined, i.e. what products and features should be included and thus developed for reuse. Currently available product line scoping approaches require huge upfront investments in the scoping phase, consuming a lot of time and resources. Our experience has shown that small and medium enterprises require a lightweight approach to decide how the existing products are related to each other so that their potential for reuse can be estimated more easily. In this paper we present a conceptual solution and early tool support enabling companies to semi-automatically identify similarity within existing product configurations.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thiago Fernandes Lins de Medeiros, E. Almeida, S. Meira
{"title":"CodeScoping: A Source Code Based Tool to Software Product Lines Scoping","authors":"Thiago Fernandes Lins de Medeiros, E. Almeida, S. Meira","doi":"10.1109/SEAA.2012.70","DOIUrl":"https://doi.org/10.1109/SEAA.2012.70","url":null,"abstract":"Software Product Lines Engineering focuses on identifying and managing the commonalities and variabilities of a set of software products where core assets can be developed and (re)used to derive individual product variants with reduced costs. In this context, software product line scoping is the process responsible for identifying and delimiting products, features, sub-domains and existing assets of the product line where there are economical benefits to invest in reuse. Typically, product line engineers elicit scoping information from the available documentation of existing products and based on knowledge from domain experts. This is an effort-intensive task because much time is invested in workshops and interviews with the domain and system experts. Thus, in order to reduce costs and time in the scoping process, this paper proposes an approach to support the scoping process based on the existing products source code.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring Component Application Consistency on Small Devices: A Repository-Based Approach","authors":"Přemek Brada, Kamil Jezek","doi":"10.1109/SEAA.2012.48","DOIUrl":"https://doi.org/10.1109/SEAA.2012.48","url":null,"abstract":"Deployment of component-based applications may involve complex issues of maintaining their consistency, both when composing a complete application and updating a small subset of its components. Evaluating consistency may be a computationally-intensive problem, especially if it involves behavioural compatibility or extra-functional property assessment. This poses serious challenge to its application on resource-constrained devices which represent an important future computing platform. This work describes an approach that aims to address this challenge by separating the tasks of obtaining the results of component consistency evaluation and using them in deployment and update processes. The first task is in our approach performed by a repository with sufficient computational resources. The results are transformed into rich, remotely accessible meta-data which are easily checked by the component frameworks and application management agents on the devices. Experiences with a prototype implementation called CRCE as well as initial measurements suggest that the approach can make application consistency evaluation feasible in resource-constrained scenarios.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123925237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structuring Modular Safety Software Certification by Using Common Criteria Concepts","authors":"C. Preschern, Kurt Dietrich","doi":"10.1109/SEAA.2012.9","DOIUrl":"https://doi.org/10.1109/SEAA.2012.9","url":null,"abstract":"Safety and security certification are time and money consuming tasks. Changes to certified systems usually require re-certification of the whole product. Modular certification approaches applied to the safety and security domain aim at reducing these costs. In this paper, modular certification concepts with focus on IEC 61508 safety certification are analyzed and an approach for structuring the modular certification process by providing detailed requirements is suggested. We gather requirements from the security domain in order to fulfill objectives which have to be reached to enable modular safety certification. Functional requirements are taken from the Common Criteria Separation Kernel Protection Profile and assurance requirements are taken from a Common Criteria class responsible for compositional security certification.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Degree of Separation Does Not Guarantee Easy Coordination","authors":"Zane Galvina, Darja Šmite","doi":"10.1109/SEAA.2012.79","DOIUrl":"https://doi.org/10.1109/SEAA.2012.79","url":null,"abstract":"In the times of increased global competition, software companies are forced to search for more effective development practices and often team up with onshore and offshore partners to develop faster and better products. In this paper we empirically explore a highly distributed onshore development project with a complex coordination structure. Our findings demonstrate that onshore development projects are not protected from coordination and communication challenges and task allocation complexities. Previously reported qualitative findings regarding organizational problems in this paper are supplemented with quantitative measurements of the true coordination delays and additional analysis of coordination patterns and their evolution.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124648291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Virtual Machine Security to Reinforce Components Constraints","authors":"A. A. M. Matsui, Straus Michalsky, M. Gerosa","doi":"10.1109/SEAA.2012.72","DOIUrl":"https://doi.org/10.1109/SEAA.2012.72","url":null,"abstract":"A key problem in component-based frameworks is controlling what each component can access. This problem is particularly complex in cases in which a system is specified by non-programmers who describe systems as a set of component instances and connections between these instances. An effective way to implement such control is by translating component constraints into security constraints that a virtual machine can administer. Our contribution is to use injection of security logic not only to control end-user access to functions, but also to control component to component interactions. We have found that injection of constraint verification points can be elegantly done using AOP.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Max-Plus Algebraic Throughput Analysis of Synchronous Dataflow Graphs","authors":"R. D. Groote, J. Kuper, H. Broersma, G. Smit","doi":"10.1109/SEAA.2012.20","DOIUrl":"https://doi.org/10.1109/SEAA.2012.20","url":null,"abstract":"In this paper we present a novel approach to throughput analysis of synchronous dataflow (SDF) graphs. Our approach is based on describing the evolution of actor firing times as a linear time-invariant system in max-plus algebra. Experimental results indicate that our approach is faster than state-of-the-art approaches to throughput analysis of SDF graphs. The efficiency of our approach is due to an exploitation of the regular structure of the max-plus system's graphical representation, the properties of which we thoroughly prove.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pocket Estimator -- A Commercial Solution to Provide Free Parametric Software Estimation Combining an Expert and a Learning Algorithm","authors":"Florian Schnitzhofer, Peter Schnitzhofer","doi":"10.1109/SEAA.2012.31","DOIUrl":"https://doi.org/10.1109/SEAA.2012.31","url":null,"abstract":"Pocket Estimator is a cloud-based framework to combine an expert weighted estimation algorithm with several learning algorithms for high level, parametric software effort estimation. Main goal of our framework is to create a huge estimation dataset of software implementation projects. This database will be built over the next 2 years and should be used for further scientific research in learning and adjusted effort estimation. We have implemented a k-nearest-neighbor and an expert weighted estimation algorithm. This paper presents our framework and describes the interaction of the parametric software estimation algorithms.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121754585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}