Open Source software development includes many peculiarities, which may not be apparent at first sight. Committing to Open Source projects may be a difficult task without a prior knowledge. this paper describes the ex...
详细信息
ISBN:
(纸本)9783031124297;9783031124280
Open Source software development includes many peculiarities, which may not be apparent at first sight. Committing to Open Source projects may be a difficult task without a prior knowledge. this paper describes the experience of a student that took a course on Open Source software. Much attention was paid to mistakes that were made during the course, and a reflection on decisions was conducted.
software modeling, as used in Model-Driven engineering (MDE), is the process of abstracting software systems using formal or informal notations to help with communication, analysis, and design. this study looks into t...
详细信息
Nowadays, as software-Defined Networking (SDN) gains prominence, Load Balancing (LB) for SDN assumes significant importance. By allocating network traffic among resources efficiently, LB ensures that no individual res...
详细信息
the quality requirements of modern systems - such as data-intensive systems - call for the design of distributed systems, facilitation of asynchronous processing, and, correspondingly, eventual consistency. In consequ...
详细信息
ISBN:
(纸本)9781665494939
the quality requirements of modern systems - such as data-intensive systems - call for the design of distributed systems, facilitation of asynchronous processing, and, correspondingly, eventual consistency. In consequence, consistency of application data is no longer achieved with serializability - a technique commonly applied in relational database management systems. Rather, developers need to handle concurrency- and consistency-related design challenges in the application layer and the domain layer, which previously were in the responsibility of the infrastructure layer. However, even though concurrency control is already challenging in monolithic systems, the problem is even more demanding in distributed systems. Alas, only little systematic engineering guidance is provided by the software architecture community regarding this issue, and practitioners commonly use a trial-and-error approach. In this tutorial, we will present our consolidated lessons learned from three case studies with industry customers. We will also share novel design guidelines that transfer the latest research results from related research communities into practicable design patterns and best practices. Our design guidelines are based on the foundations of Domain-Driven Design. Participants will learn how to use them in practice in order to design safe eventually consistent systems.
the primary focus of the recruitment division in every company is to fill vacant positions as quickly as possible. However, they fail to recognize the long-term consequences of this approach. On one hand, the staffing...
详细信息
the success of software development projects is significantly impacted by various risk factors, both predictable and unpredictable. this literature review aims to explore and evaluate innovative risk assessment and ma...
详细信息
the proceedings contain 156 papers. the topics discussed include: space system modeling approach for exploring of the iced-covered Ganymede moon subsurface oceans;M2AR: a web-based modeling environment for the augment...
ISBN:
(纸本)9798400706226
the proceedings contain 156 papers. the topics discussed include: space system modeling approach for exploring of the iced-covered Ganymede moon subsurface oceans;M2AR: a web-based modeling environment for the augmented reality workflow 1–5 modeling language;Nautilus: implementation of an evolution approach for graph databases;Cross-IDE remote debugging of model management programs through the debug adapter protocol;enhancing model management with automated REST API generation;keeping clients' models up-to-date with Edelta;IMP-Logics: a metamodel for analysis and transformations of datalog programs;modelling tool extension for vulnerability management;concretize: a model-driven tool for scenario-based autonomous vehicle testing;and CertGraph: towards a comprehensive knowledge graph for cloud security certifications.
[Context and motivation] Withthe advent of agile development, requirements are increasingly stored and managed within issue tracking systems (ITSs). these systems provide a single point of access to the product and s...
详细信息
ISBN:
(纸本)9783031573262;9783031573279
[Context and motivation] Withthe advent of agile development, requirements are increasingly stored and managed within issue tracking systems (ITSs). these systems provide a single point of access to the product and sprint backlogs, bugs, ideas, and also tasks for the development team to complete. [Question/problem] ITSs combine two perspectives: representing requirements knowledge and allocating work items to team members. We tackle a knowledge problem, addressing questions such as: How are requirements formulated in ITSs? Which types of requirements are represented? At which granularity level? We also explore whether a distinction exists between open source projects and proprietary ones. [Principal ideas/results] through quantitative content analysis, we analyze 1,636 product backlog items sampled from fourteen projects. Among the main findings, we learned that the labeling of backlog items is largely inconsistent, and that user-oriented functional requirements are the prevalent category. We also find that a single backlog item can contain multiple requirements with different levels of granularity. [Contribution] We reveal knowledge and patterns about requirements documentation in ITSs. these outcomes can be used to gain a better empirical understanding of Agile RE, and as a basis for the development of automated tools that identify and analyze requirements in product and sprint backlogs.
Background: In recent years, a discourse on how to systematically consider and report threats to validity started to gain momentum within the empirical softwareengineering community. Aims: Withthis study, we aim to ...
详细信息
Mission-critical embedded software is critical to our society's infrastructure but can be subject to new security vulnerabilities as technology advances. When security issues arise, Reverse Engineers (REs) use Sof...
详细信息
ISBN:
(纸本)9798350300376
Mission-critical embedded software is critical to our society's infrastructure but can be subject to new security vulnerabilities as technology advances. When security issues arise, Reverse Engineers (REs) use software Reverse engineering (SRE) tools to analyze vulnerable binaries. However, existing tools have limited support, and REs undergo a time-consuming, costly, and error-prone process that requires experience and expertise to understand the behaviors of software and vulnerabilities. To improve these tools, we propose cfg2vec, a Hierarchical Graph Neural Network (GNN) based approach. To represent binary, we propose a novel Graph-of-Graph (GoG) representation, combining the information of control-flow and function-call graphs. Our cfg2vec learns how to represent each binary function compiled from various CPU architectures, utilizing hierarchical GNN and the siamese network-based supervised learning architecture. We evaluate cfg2vec's capability of predicting function names from stripped binaries. Our results show that cfg2vec outperforms the state-of-the-art by 24.54% in predicting function names and can even achieve 51.84% better given more training data. Additionally, cfg2vec consistently outperforms the state-of-the-art for all CPU architectures, while the baseline requires multiple training to achieve similar performance. More importantly, our results demonstrate that our cfg2vec could tackle binaries built from unseen CPU architectures, thus indicating that our approach can generalize the learned knowledge. Lastly, we demonstrate its practicability by implementing it as a Ghidra plugin used during resolving DARPA Assured MicroPatching (AMP) challenges.
暂无评论