To deal with problems related to Information Security (IS) and to support requirements activities and architectural design, a full conceptualisation of the IS domain is essential. Several works proposed IS ontologies ...
详细信息
ISBN:
(纸本)9789897586477
To deal with problems related to Information Security (IS) and to support requirements activities and architectural design, a full conceptualisation of the IS domain is essential. Several works proposed IS ontologies capturing partial views of the IS domain. these ontologies suffer from incompleteness of concepts, lack of readability, portability, and dependability to a specific IS sub-domain. Following a rigorous and repeatable process, we systematically developed a comprehensive IS ontology. this process includes four steps: concept extraction, XML generation, OWL generation and dimensional view extraction. the obtained ontology is multidimensional, portable and supports ontology modularization. It is presented under XML format and OWL format. It comprises 2660 security concepts and 331 security dimensions.
As soon as Artificial Intelligence (AI) projects grow from small feasibility studies to mature projects, developers and data scientists face new challenges, such as collaboration with other developers, versioning data...
详细信息
ISBN:
(纸本)9789897586477
As soon as Artificial Intelligence (AI) projects grow from small feasibility studies to mature projects, developers and data scientists face new challenges, such as collaboration with other developers, versioning data, or traceability of model metrics and other resulting artifacts. this paper suggests a data-centric AI project with an Active Learning (AL) loop from a developer perspective and presents "Git Workflow for AL": A methodology proposal to guide teams on how to structure a project and solve implementation challenges. We introduce principles for data, code, as well as automation, and present a new branching workflow. the evaluation shows that the proposed method is an enabler for fulfilling established best practices.
the vast majority of the automation of driving functions within automotive vehicles is currently not exceeding the sole assistance of a driver. Assistance means, that in the event of a malfunction, the human driver ha...
详细信息
ISBN:
(纸本)9798350358810;9798350358803
the vast majority of the automation of driving functions within automotive vehicles is currently not exceeding the sole assistance of a driver. Assistance means, that in the event of a malfunction, the human driver has to take over the driving task manually again. While for most of the existing driver assistant systems this fail over has to take place immediately, even recently launched highly automated driving systems, such as the drive pilot of Mercedes-Benz in 2018, still require the human driver to take over within a couple of seconds in the event of a fault. therefore, the human driver is used as fall-back for a system up to Level 3 according to the SAE J3016 standard, which is not possible for vehicles where there is no driver anymore. Accordingly, Autonomous Vehicles (AVs) as described in Level4 and Level5 in the standard need both, high reliability by minimizing the amount of faults and high availability by still being operational, even in the event of a fault. the same requirement is relevant in the avionic industry, and it is solved with a high amount of redundancy of the safety critical systems. While this works for big airplanes, automobiles are restricted regarding geometric limitation, power consumption limitation and cost limitation. this work contains an early indication of the realization of a fail-operational E/E-Architecture with a minimal amount of redundant components. this is possible by the usage of a modern service-oriented Architecture (SOA) in combination with modern ECUs.
Data privacy and protection are essential in today's digital land-scape, withsoftware developers' playing a critical role in addressing these challenges. this paper presents a comprehensive study of the chall...
详细信息
ISBN:
(纸本)9798400707728
Data privacy and protection are essential in today's digital land-scape, withsoftware developers' playing a critical role in addressing these challenges. this paper presents a comprehensive study of the challenges and issues faced by software developers' in the con-text of data privacy and protection. Our analysis is based on a dataset of questions posted on popular online platforms, such as Stack Overflow, Information Security Stack Exchange, and softwareengineering Stack Exchange. Our findings reveal a range of challenges, including the design and generation of privacy policies, compliance with legal frame-works, and implementation of privacy-preserving features in soft-ware systems. We also observed interest in policy-related questions and confusion between data privacy concepts and programming language access control mechanisms. Based on our findings, we provide recommendations to address these challenges and promote privacy-by-design principles in software development.
this paper introduces an image encryption scheme that combines a style transfer model with chaotic encryption, offering the adaptability of deep learning encryption and the randomness of chaos. During style transfer, ...
详细信息
Due to the difficulty of performing repairs during flight, spacecraft is operated according to operational scenarios tested before launch. Operational models, a type of SysML activity diagram, can be used to depict th...
详细信息
ISBN:
(纸本)9789897586477
Due to the difficulty of performing repairs during flight, spacecraft is operated according to operational scenarios tested before launch. Operational models, a type of SysML activity diagram, can be used to depict these scenarios. Although it aids in communication between engineers and stakeholders, the activity diagram can rapidly grow rather large. Due to the extensive operational model, it is therefore challenging to review the activity diagram, which could result in serious issues. therefore, to make operational models easier to evaluate, they should be made concise. this study offers a metamodel that offers stereotypes that can succinctly characterize spacecraft operational scenarios. First, a mind map was used to depict the domain knowledge of spacecraft operations. Second, stereotype metamodel was created by extracting common knowledge from the mind map. Utilizing stereotypes, operational models' size can be decreased;however, crucial review-related data could be lost. therefore, shrinking stereotypes assures that crucial information would not be lost. Several trials were conducted and showed that the number of elements of operational models with stereotypes, as well as their size, reduced by almost half, compared withthe original ones, allowing for a simplified review process and boosting trust in the accuracy of the operational scenarios.
the swift development of Artificial Intelligence (AI), namely the introduction of Large Language Models (LLMs), is drastically altering various industries and necessitating a major change in the way software engineeri...
详细信息
ISBN:
(纸本)9798350378986;9798350378979
the swift development of Artificial Intelligence (AI), namely the introduction of Large Language Models (LLMs), is drastically altering various industries and necessitating a major change in the way softwareengineering is taught. To equip upcoming software engineers withthe knowledge and abilities to function in this AI-powered environment, curriculum and pedagogical techniques must be critically reevaluated. To better understand the integration of AI and LLMs into softwareengineering education, this study gives a thorough and critical analysis of the literature, looking at existing models, pedagogical frameworks, and enduring issues. We explore various approaches utilized by educational establishments, including as specialized AI and LLM courses, incorporating modules into pre-existing curricula, and utilizing open-source LLM materials. Our analysis, which is based on case studies and research data, thoroughly assesses how well these strategies enable software engineers to comprehend, make use of, and ethically create AI and LLMs. Key obstacles to the successful integration of AI and LLM are also identified by our analysis, including the inexperienced status of LLM educators, resource limitations, potential biases in AI and LLM algorithms, and insufficient instructor knowledge. Building on these discoveries, we provide solid answers to these problems and suggest interesting avenues for further study to improve the integration of AI and LLM. In the end, this study advocates for a multimodal strategy to get future software engineers ready for the impending AI and LLM future and secure their place in this quickly changing field.
Modeling and evaluating the behavior of the medium access control (MAC) protocols of wireless body area networks (WBANs) through the model-checker toolset UPPAAL-SMC necessitate a certain level of expertise. the thing...
详细信息
ISBN:
(纸本)9789897586477
Modeling and evaluating the behavior of the medium access control (MAC) protocols of wireless body area networks (WBANs) through the model-checker toolset UPPAAL-SMC necessitate a certain level of expertise. the thing that is not available for many MAC protocol designers. To facilitate the use of UPPAAL-SMC, we propose to define a model-driven engineering (MDE) approach that uses a modeling method (MM) as a start and the UPPAAL-SMC as a target and back. In this paper, we use the ADOxx platform to define the domain-specific modeling language (DSML) of WBAN that is presented through the name WBAN modeling language (WBAN-ML) to model the behavior of the WBANs MAC protocols. the prototype implementation result of the WBAN-ML is presented in this paper.
Although studies emphasized the effectiveness of analyzing data-flow coverage as opposed to branch coverage in the area of testing, there is still a lack of appropriate tools. We propose an approach to visualize data ...
详细信息
ISBN:
(纸本)9789897586477
Although studies emphasized the effectiveness of analyzing data-flow coverage as opposed to branch coverage in the area of testing, there is still a lack of appropriate tools. We propose an approach to visualize data flows of programs within code editors based on the Language Server Protocol (LSP). For this purpose, we define extensions of the LSP to increase usability in the given application. Furthermore, we present a prototype with implementations of a language server as well as the two language clients IntelliJ IDEA and Visual Studio Code. Moreover, we outline how the different components can interact effectively based on the LSP to enable the analysis and visualization of data-flows. We evaluate our prototype based on various benchmarks.
Personas have been widely used during requirements engineering-related tasks. However, the presentation, composition, level of details and other characteristics varies greatly by domain of use. To better understand th...
详细信息
ISBN:
(纸本)9789897586477
Personas have been widely used during requirements engineering-related tasks. However, the presentation, composition, level of details and other characteristics varies greatly by domain of use. To better understand these, we formed a curated set of nearly 100 personas from 41 academic papers and analysed their similarities and differences. We then used our analysis to formulate a preliminary taxonomy of personas used for Requirements engineering-related tasks. We describe our key findings from our analysis with examples, our preliminary taxonomy, and discuss ways the taxonomy can be used and further improved.
暂无评论