software systems enabling large-scale data analysis workflows (DAWs) are a key technology for many scientific disciplines, as they allow extracting new insights from experimental results. DAWs are (non-)linear pipelin...
详细信息
the growing configurability of smart-manufacturing software systems (SMSS) introduces a variety of security concerns. Although there is an ever-increasing risk for exploiting configuring-caused issues, there is curren...
详细信息
More than 30 years ago feature models were invented. Nowadays they play a major role in software Product Line engineering. Although there have been several attempts to establish a standard approach (e.g., OVM, CVL, TV...
详细信息
ISBN:
(纸本)9798400705939
More than 30 years ago feature models were invented. Nowadays they play a major role in software Product Line engineering. Although there have been several attempts to establish a standard approach (e.g., OVM, CVL, TVL,..) there is still no consensus on a simple feature modelling language. However, such a language would improve information sharing among researchers and tool developers. Following the spirit of the previous six editions, this workshop is an interactive event where all participants share knowledge, ongoing realizations, and improvements concerning the Universal Variability Language (UVL) to further increase its outreach.
As Autonomous driving systems (ADS) have transformed our daily life, safety of ADS is of growing significance. While various testing approaches have emerged to enhance the ADS reliability, a crucial gap remains in und...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
As Autonomous driving systems (ADS) have transformed our daily life, safety of ADS is of growing significance. While various testing approaches have emerged to enhance the ADS reliability, a crucial gap remains in understanding the accidents causes. Such post-accident analysis is paramount and beneficial for enhancing ADS safety and reliability. Existing cyber-physical system (CPS) root cause analysis techniques are mainly designed for drones and cannot handle the unique challenges introduced by more complex physical environments and deep learning models deployed in ADS. In this paper, we address the gap by offering a formal definition of ADS root cause analysis problem and introducing ROCAS, a novel ADS root cause analysis framework featuring cyber-physical co-mutation. Our technique uniquely leverages both physical and cyber mutation that can precisely identify the accident-trigger entity and pinpoint the misconfiguration of the target ADS responsible for an accident. We further design a differential analysis to identify the responsible module to reduce search space for the misconfiguration. We study 12 categories of ADS accidents and demonstrate the effectiveness and efficiency of ROCAS in narrowing down search space and pinpointing the misconfiguration. We also show detailed case studies on how the identified misconfiguration helps understand rationale behind accidents.
this study explores the field of software reverse engineeringthrough the lens of code summarization, which involves generating informative and concise summaries of code functionality. A significant aspect of this res...
详细信息
the development of comprehensive use case descriptions is a critical task in softwareengineering, providing essential insights for requirement analysis and system design. the advent of advanced natural language proce...
详细信息
ISBN:
(纸本)9798400706226
the development of comprehensive use case descriptions is a critical task in softwareengineering, providing essential insights for requirement analysis and system design. the advent of advanced natural language processing models, such as ChatGPT, has sparked interest in their potential to automate tasks traditionally performed by humans, including the generation of use case descriptions in softwareengineering. Understanding the capabilities and limitations of ChatGPT in generating use case descriptions is crucial for software engineers. Without a clear understanding of its performance, practitioners may either overestimate its utility, leading to reliance on suboptimal drafts, or underestimate its capabilities, missing opportunities to streamline the drafting process. this paper addresses how well ChatGPT performs in generating use case descriptions, evaluating their quality compared to human-written descriptions. To do so, we employ a structured approach using established quality guidelines and the concept of "bad smells" for use case descriptions. Our study presents the first attempt to bridge the knowledge gap by offering a comparative analysis of ChatGPT-generated and human-written use case descriptions. By providing an approach to objectively assess ChatGPT's performance, we highlight its potential and limitations, offering software engineers insights to effectively integrate AI tools into their workflows.
this study presents an in-depth geotechnical analysis of lunar regolith simulants, with focus on particle breakage behavior—an essential factor for future lunar exploration and colonization. Twelve NASA-provided simu...
详细信息
Nowadays, machine learning (ML) is being used in software systems with multiple application fields, from medicine to softwareengineering (SE). On the one hand, the popularity of ML in the industry can be seen in the ...
详细信息
ISBN:
(纸本)9798350322637
Nowadays, machine learning (ML) is being used in software systems with multiple application fields, from medicine to softwareengineering (SE). On the one hand, the popularity of ML in the industry can be seen in the statistics showing its growth and adoption. On the other hand, its popularity can also be seen in research, particularly in SE, where multiple studies related to the use of Machine Learning in softwareengineering have been published in conferences and journals. At the same time, researchers and practitioners have shown that machine learning has some particular challenges and pitfalls. In particular, research has shown that ML-enabled systems have a different development process than traditional software, which also describes some of the challenges of ML applications. In order to mitigate some of the identified challenges and pitfalls, white and gray literature has proposed a set of recommendations based on their own experiences and focused on their domain (e.g., biomechanics), but for the best of our knowledge, there is no guideline focused on the SE community. this thesis aims to reduce the gap of not having clear guidelines in the SE community by using possible sources of practices such as question-and-answer communities and also previous research studies. As a result, we will present a set of practices with an SE perspective, for researchers and practitioners, including a tool for searching them.
the core of design lies in the acquisition and application of knowledge. knowledge push technology can effectively improve the utilization efficiency of knowledge by designers, thus enabling more efficient task comple...
详细信息
Background: the UK cyber skills gap/shortage amplifies the broader impact of cyber-attacks, which inflict harms such as privacy and economic loss on wider society. the demand is greatest (and growing fastest) in cyber...
详细信息
ISBN:
(纸本)9798400700446
Background: the UK cyber skills gap/shortage amplifies the broader impact of cyber-attacks, which inflict harms such as privacy and economic loss on wider society. the demand is greatest (and growing fastest) in cyber-enabled disciplines, such as softwareengineering. Objectives: In this paper, we create a term frequency-inverse document frequency representation of the Cyber Security Body of knowledge (CyBOK). We then evaluate the potential of this representation by using it to automatically map job descriptions to the different areas of the CyBOK. Method: We generate two representations of the CyBOK. the representations are mapped to a corpus of 454 job descriptions using TF-IDF. Comparing the similarity scores across these mappings allows us to identify relevant knowledge areas/groups. Results: the results are preliminary, but suggest that the approach warrants further investigation. Certain job descriptions are mapped to certain knowledge areas/groups in a way that makes intuitive sense to the authors. However, there is a degree homogeneity to the scores returned for certain knowledge areas/groups. there are several threats to validity, most notably the low number of job descriptions that have been studied. Conclusions: Our work shows that it is possible to automatically map job descriptions to the CyBOK in a meaningful way. Further research is required to address threats and to explore alternative mapping approaches. the authors intend to undertake this research culminating with a Grey Literature Informed Model of Practice in Secure softwareengineering.
暂无评论