Software and Systems Modeling最新文献

筛选
英文 中文
Modeling more software performance antipatterns in cyber-physical systems 为网络物理系统中的更多软件性能反模式建模
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-12-20 DOI: 10.1007/s10270-023-01137-x
Riccardo Pinciroli, Connie U. Smith, Catia Trubiani
{"title":"Modeling more software performance antipatterns in cyber-physical systems","authors":"Riccardo Pinciroli, Connie U. Smith, Catia Trubiani","doi":"10.1007/s10270-023-01137-x","DOIUrl":"https://doi.org/10.1007/s10270-023-01137-x","url":null,"abstract":"<p>The design of cyber-physical systems (CPS) is challenging due to the heterogeneity of software and hardware components that operate in uncertain environments (e.g., fluctuating workloads), hence they are prone to performance issues. Software performance antipatterns could be a key means to tackle this challenge since they recognize design problems that may lead to unacceptable system performance. This manuscript focuses on modeling and analyzing a variegate set of software performance antipatterns with the goal of quantifying their performance impact on CPS. Starting from the specification of eight software performance antipatterns, we build a baseline queuing network performance model that is properly extended to account for the corresponding bad practices. The approach is applied to a CPS consisting of a network of sensors and experimental results show that performance degradation can be traced back to software performance antipatterns. Sensitivity analysis investigates the peculiar characteristics of antipatterns, such as the frequency of checking the status of resources, that provides quantitative information to software designers to help them identify potential performance problems and their root causes. Quantifying the performance impact of antipatterns on CPS paves the way for future work enabling the automated refactoring of systems to remove these bad practices.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"33 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138821235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special section of BPMDS’2021 business process improvement BPMDS'2021 业务流程改进专栏
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-12-18 DOI: 10.1007/s10270-023-01139-9
{"title":"Special section of BPMDS’2021 business process improvement","authors":"","doi":"10.1007/s10270-023-01139-9","DOIUrl":"https://doi.org/10.1007/s10270-023-01139-9","url":null,"abstract":"<h3>Abstract</h3> <p>The Business Process Modeling, Development and Support (BPMDS) working conference series, held in conjunction with CAiSE conferences, serve as a meeting place for researchers and practitioners in Business Process Modeling, Development, and Support. Business process analysis, design, and support, addressed by the BPMDS series, have been recognized as a central issue in information systems (IS) engineering. In 2011, BPMDS became a two-day working conference held in conjunction with CAiSE (Conference on Advanced Information Systems Engineering). The goals, format, and history of BPMDS can be found on the website http://www.bpmds.org/.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"300 1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138714339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest editorial for EMMSAD’2022 special section 为 EMMSAD 的 2022 专刊撰写客座社论
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-12-08 DOI: 10.1007/s10270-023-01130-4
Iris Reinhartz-Berger, Dominik Bork
{"title":"Guest editorial for EMMSAD’2022 special section","authors":"Iris Reinhartz-Berger, Dominik Bork","doi":"10.1007/s10270-023-01130-4","DOIUrl":"https://doi.org/10.1007/s10270-023-01130-4","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"58 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138587099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adopting the concept of a function as an underlying semantic paradigm for modeling languages 采用函数的概念作为建模语言的底层语义范式
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-11-30 DOI: 10.1007/s10270-023-01140-2
Benoit Combemale, Jeff Gray, Bernhard Rumpe
{"title":"Adopting the concept of a function as an underlying semantic paradigm for modeling languages","authors":"Benoit Combemale, Jeff Gray, Bernhard Rumpe","doi":"10.1007/s10270-023-01140-2","DOIUrl":"https://doi.org/10.1007/s10270-023-01140-2","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"16 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138519073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A theme section on the central role of modeling in designing and explaining data-driven systems and software 关于建模在设计和解释数据驱动型系统和软件中的核心作用的主题部分
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-11-22 DOI: 10.1007/s10270-023-01133-1
Christian Attiogbé, Sadok Ben Yahia, Ladjel Bellatreche
{"title":"A theme section on the central role of modeling in designing and explaining data-driven systems and software","authors":"Christian Attiogbé, Sadok Ben Yahia, Ladjel Bellatreche","doi":"10.1007/s10270-023-01133-1","DOIUrl":"https://doi.org/10.1007/s10270-023-01133-1","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"719 ","pages":"1945-1947"},"PeriodicalIF":2.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139248793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and enforcing access control policies in conversational user interfaces 在会话用户界面中建模和实施访问控制策略
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-11-22 DOI: 10.1007/s10270-023-01131-3
Elena Planas, Salvador Martínez, Marco Brambilla, Jordi Cabot
{"title":"Modeling and enforcing access control policies in conversational user interfaces","authors":"Elena Planas, Salvador Martínez, Marco Brambilla, Jordi Cabot","doi":"10.1007/s10270-023-01131-3","DOIUrl":"https://doi.org/10.1007/s10270-023-01131-3","url":null,"abstract":"<p>Conversational user interfaces (CUIs), such as chatbots, are becoming a common component of many software systems. Although they are evolving in many directions (such as advanced language processing features, thanks to new AI-based developments), less attention has been paid to access control and other security concerns associated with CUIs, which may pose a clear risk to the systems they interface with. In this paper, we apply model-driven techniques to model and enforce access-control policies in CUIs. In particular, we present a fully fledged framework to integrate the role-based access-control (RBAC) protocol into CUIs by: (1) modeling a set of access-control rules to specify permissions over the bot resources using a domain-specific language that tailors core RBAC concepts to the CUI domain; and (2) describing a mechanism to show the feasibility of automatically generating the infrastructure to evaluate and enforce the modeled access control policies at runtime.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"16 5","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138519071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What makes life for process mining analysts difficult? A reflection of challenges 是什么让过程挖掘分析师的生活变得困难?挑战的反映
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-11-17 DOI: 10.1007/s10270-023-01134-0
Lisa Zimmermann, Francesca Zerbato, Barbara Weber
{"title":"What makes life for process mining analysts difficult? A reflection of challenges","authors":"Lisa Zimmermann, Francesca Zerbato, Barbara Weber","doi":"10.1007/s10270-023-01134-0","DOIUrl":"https://doi.org/10.1007/s10270-023-01134-0","url":null,"abstract":"<p>Over the past few years, several software companies have emerged that offer process mining tools to assist enterprises in gaining insights into their process executions. However, the effective application of process mining technologies depends on analysts who need to be proficient in managing process mining projects and providing process insights and improvement opportunities. To contribute to a better understanding of the difficulties encountered by analysts and to pave the way for the development of enhanced and tailored support for them, this work reveals the challenges they perceive in practice. In particular, we identify 23 challenges based on interviews with 41 analysts, which we validate using a questionnaire survey. We provide insights into the relevancy of the process mining challenges and present mitigation strategies applied in practice to overcome them. While mitigation strategies exist, our findings imply the need for further research to provide support for analysts along all phases of process mining projects on the individual level, but also the technical, group, and organizational levels.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"16 3","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138519072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On applying residual reasoning within neural network verification 残差推理在神经网络验证中的应用
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-11-16 DOI: 10.1007/s10270-023-01138-w
Yizhak Yisrael Elboher, Elazar Cohen, Guy Katz
{"title":"On applying residual reasoning within neural network verification","authors":"Yizhak Yisrael Elboher, Elazar Cohen, Guy Katz","doi":"10.1007/s10270-023-01138-w","DOIUrl":"https://doi.org/10.1007/s10270-023-01138-w","url":null,"abstract":"<p>As neural networks are increasingly being integrated into mission-critical systems, it is becoming crucial to ensure that they meet various safety and liveness requirements. Toward, that end, numerous complete and sound verification techniques have been proposed in recent years, but these often suffer from severe scalability issues. One recently proposed approach for improving the scalability of verification techniques is to enhance them with abstraction/refinement capabilities: instead of verifying a complex and large network, abstraction allows the verifier to construct and then verify a much smaller network, and the correctness of the smaller network immediately implies the correctness of the original, larger network. One shortcoming of this scheme is that whenever the smaller network cannot be verified, the verifier must perform a refinement step, in which the size of the network being verified is increased. The verifier then starts verifying the new network from scratch—effectively “forgetting” its earlier work, in which the smaller network was verified. Here, we present an enhancement to abstraction-based neural network verification, which uses <i>residual reasoning</i>: a process where information acquired when verifying an abstract network is utilized in order to facilitate the verification of refined networks. At its core, the method enables the verifier to retain information about parts of the search space in which it was determined that the refined network behaves correctly, allowing the verifier to focus on areas of the search space where bugs might yet be discovered. For evaluation, we implemented our approach as an extension to the Marabou verifier and obtained highly promising results.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"64 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138542782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the persistent rumors of the programmer’s imminent demise 关于程序员即将死亡的谣言不断
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2023-11-15 DOI: 10.1007/s10270-023-01136-y
Hessam Mohammadi, Wided Ghardallou, Elijah Brick, Ali Mili
{"title":"On the persistent rumors of the programmer’s imminent demise","authors":"Hessam Mohammadi, Wided Ghardallou, Elijah Brick, Ali Mili","doi":"10.1007/s10270-023-01136-y","DOIUrl":"https://doi.org/10.1007/s10270-023-01136-y","url":null,"abstract":"<p>Since the dawn of programming, several developments in programming language design and programming methodology have been hailed as the end of the profession of programmer; they have all proven to be exaggerated rumors, to echo the words attributed to Mark Twain. In this short paper, we ponder the question of whether the emergence of large language models finally realizes these prophecies? Also, we discuss why even if this prophecy is finally realized, it does not change the job of the researcher in programming.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"192 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138542781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From network traffic data to business activities: a conceptualization and a recognition approach 从网络流量数据到商业活动:一种概念化和识别方法
3区 计算机科学
Software and Systems Modeling Pub Date : 2023-11-08 DOI: 10.1007/s10270-023-01135-z
Moshe Hadad, Gal Engelberg, Pnina Soffer
{"title":"From network traffic data to business activities: a conceptualization and a recognition approach","authors":"Moshe Hadad, Gal Engelberg, Pnina Soffer","doi":"10.1007/s10270-023-01135-z","DOIUrl":"https://doi.org/10.1007/s10270-023-01135-z","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"9 3‐4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135346033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信