This research aims to develop a structured approach for implementing Artificial Intelligence (AI) in municipal governance. The study addresses three key questions: (1) What principles can be derived from existing AI i...
This research aims to develop a structured approach for implementing Artificial Intelligence (AI) in municipal governance. The study addresses three key questions: (1) What principles can be derived from existing AI implementation frameworks? (2) How should an approach for municipal AI projects be designed? (3) What are the main risks at each implementation stage? The research methodology combined three components: (1) a literature review of AI and software implementation approaches and municipal challenges, (2) analysis of findings from long-term collaborations with German municipalities and two specific AI implementation projects, and (3) low-threshold validation through two webinars with municipal representatives. The study produced an eight-phase implementation framework emphasizing iterative experimentation and risk awareness, while highlighting the distinct challenges of AI compared to traditional software implementation. Key phases include task identification, AI suitability assessment, data evaluation, solution development/procurement, MVP creation, testing, operational transition, and continuous monitoring. Each phase incorporates AI-specific steps and risk factors tailored to municipal contexts. While the framework provides practical guidance for municipal AI implementation, positioning cities for the gradual transition toward post-smart cities with AI-enabled governance, its current foundation primarily reflects German municipal experiences. Further research and case studies are needed to validate and adapt the framework for diverse global contexts.
The article focuses on the commonality and variability extraction (CAVE) approach for product line scoping. The CAVE approach elicits information from user documentation of existing systems by reducing the experts'...
详细信息
The article focuses on the commonality and variability extraction (CAVE) approach for product line scoping. The CAVE approach elicits information from user documentation of existing systems by reducing the experts' time, letting the production line introduction occur much faster. The approach helps in identifying variability and commonality for the product line and identifies suitable product line artifacts in different situations. CAVE can be considered a reengineering approach for shifting legacy knowledge to the product line engineering system.
In this paper, we reflect on our experiences of delivering professional softwareengineering (SE) education and training over the course of the last eight years. We begin the paper with a summary of current developmen...
详细信息
ISBN:
(纸本)0769525571
In this paper, we reflect on our experiences of delivering professional softwareengineering (SE) education and training over the course of the last eight years. We begin the paper with a summary of current developments in SE education and training, followed by a brief description of the educational framework that has guided our work in this domain. We then move on to describe four case studies of SE education and training delivery together with a set of lessons learnt. We end the paper with a summary of the wider lessons learnt gained from our experiences in the domain - these consider how SE education should be delivered and facilitated -, as well as other considerations such as changes to organizational roles and responsibilities brought about by the introduction of technology-based learning.
The importance of software grows in all sectors of industry and all aspects of life. Given this high dependability on software. the status of softwareengineering is less than satisfactory. Accidents, recall actions, ...
详细信息
ISBN:
(纸本)9783540852780
The importance of software grows in all sectors of industry and all aspects of life. Given this high dependability on software. the status of softwareengineering is less than satisfactory. Accidents, recall actions, and late projects still make the news every day. Many of the softwareengineering research results do not make it into practice, and thereby the gap between research and practice widens constantly. The reasons for not making it into practice range from isufficient commitment for professionalization of software development on the industrial side, to insufficient consideration for practical scale-up issues on the research side, and a tremendous lack of empirical evidence regarding the benefits and limitations of new softwareengineering methods and tools on both sides. The major focus of this paper is to motivate the creation of credible evidence which in turn will allow for less risky introduction of new softwareengineering approaches into practice. In order to overcome this progress hindering lack of evidence, both research and practice have to change their paradigms. Research needs to complement each promising new softwareengineering approach with credible empirical evidence from in vitro controlled experiments and case studies;industry needs to baseline its current;state of the practice quantitatively, and needs to conduct in vitro studies of new approaches in order to identify their benefits and limitations in certain industrial contexts.
This paper presents guidelines to develop secure applications in the form of "Do's and Don'ts" applying mostly to the software design level, but also to the implementation level. It builds on two col...
详细信息
ISBN:
(纸本)9780769531021
This paper presents guidelines to develop secure applications in the form of "Do's and Don'ts" applying mostly to the software design level, but also to the implementation level. It builds on two collections of similar rules published in two seminal books in the area of secure software development, criticizes and improves those earlier rules and extends them by several new ones. The paper does not cover how to apply such rules in general. The main direction of improvement is making the rules more constructive, less ambiguous, and removing aspects not related to security.
Thorough and continuous architecting is the key to overall success in softwareengineering, and architecture evaluation is a crucial part of it. This book presents a pragmatic architecture evaluation approach and insi...
ISBN:
(数字)9783319341774
ISBN:
(纸本)9783319341767
Thorough and continuous architecting is the key to overall success in softwareengineering, and architecture evaluation is a crucial part of it. This book presents a pragmatic architecture evaluation approach and insights gained from its application in more than 75 projects with industrial customers in the past decade. It presents context factors, empirical data, and example cases, as well as lessons learned on mitigating the risk of change through architecture evaluation. By providing comprehensive answers to more than 100 typical questions and discussing more than 60 frequent mistakes and lessons learned, the book allows readers to not only learn how to conduct architecture evaluations and interpret its results, but also to become aware of risks such as false conclusions, manipulating data, and unsound lines of argument. It equips readers to become confident in assessing quantitative measurement results and recognize when it is better to rely on qualitative expertise. The target readership includes both practitioners and researchers. By demonstrating its impact and providing clear guidelines, data, and examples, it encourages practitioners to conduct architecture evaluations. At the same time, it offers researchers insights into industrial architecture evaluations, which serve as the basis for guiding research in this area and will inspire future research directions.
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that tracks the security implications of related...
详细信息
ISBN:
(纸本)0769520413
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that tracks the security implications of related configuration directives that may be scattered all over the router configuration, instead of analyzing only isolated configuration clauses like other tools do. Our tool offers several novel evaluation capabilities and presents its findings as a collection of multi-view displays, enabling the user to focus on selected aspects, and to navigate deeper and deeper into specific details. We demonstrate the practical use of CROCODILE, and a comparison with the well-known RAT tool illustrates CROCODILE remarkable capabilities.
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the systematic analysis and detection of securi...
ISBN:
(纸本)9781424435722
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the systematic analysis and detection of security problems, especially during early development phases. Based on well-known and established inspection techniques, we investigated traditional reading support, which did not fit exactly what we needed to ensure security goals. Therefore, we developed a new kind of checklist which we call guided checklist. This kind of checklist focuses the inspector much more on how to check security goals and provides the inspector with more fine-grained support than traditional reading support. To derive such checklists, we developed a model for security goals. A continuous example shows what the security goal model looks like and how to apply the guided checklist.
Product line engineering has become an important and widely used approach for efficiently developing portfolios of software products. The idea is to develop a set of products as a single, coherent development task fro...
详细信息
Product line engineering has become an important and widely used approach for efficiently developing portfolios of software products. The idea is to develop a set of products as a single, coherent development task from a core asset base, a collection of artifacts specifically designed for use across a portfolio. This approach produces order-of-magnitude economic improvements compared to one-at-a-time software system development. Because the product line approach isn't limited to specific technical properties of the planned software but rather focuses on economic characteristics, high return on investment has become the anthem of the approach's protagonists. Despite this focus on ROl, most of the economic arguments for the product line community are based on singular data points derived from case studies or on reasonableness and simplistic cost curves. A manager must describe the situations in which the model can be applied. Almost all product line adoption scenarios involve fielding a set of existing or planned products as one or more product lines.
暂无评论