SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Steghöfer Jan Philipp 1983) "

Sökning: WFRF:(Steghöfer Jan Philipp 1983)

  • Resultat 1-10 av 62
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • David, I., et al. (författare)
  • Blended modeling in commercial and open-source model-driven software engineering tools: A systematic study
  • 2023
  • Ingår i: Software and Systems Modeling. - : Springer Science and Business Media LLC. - 1619-1366 .- 1619-1374. ; 22, s. 415-447
  • Tidskriftsartikel (refereegranskat)abstract
    • Blended modeling aims to improve the user experience of modeling activities by prioritizing the seamless interaction with models through multiple notations over the consistency of the models. Inconsistency tolerance, thus, becomes an important aspect in such settings. To understand the potential of current commercial and open-source modeling tools to support blended modeling, we have designed and carried out a systematic study. We identify challenges and opportunities in the tooling aspect of blended modeling. Specifically, we investigate the user-facing and implementation-related characteristics of existing modeling tools that already support multiple types of notations and map their support for other blended aspects, such as inconsistency tolerance, and elevated user experience. For the sake of completeness, we have conducted a multivocal study, encompassing an academic review, and grey literature review. We have reviewed nearly 5000 academic papers and nearly 1500 entries of grey literature. We have identified 133 candidate tools, and eventually selected 26 of them to represent the current spectrum of modeling tools.
  •  
2.
  • Scheuner, Joel, 1991, et al. (författare)
  • CrossFit: Fine-grained Benchmarking of Serverless Application Performance across Cloud Providers
  • 2022
  • Ingår i: Proceedings - 2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing, UCC 2022. ; , s. 51-60
  • Konferensbidrag (refereegranskat)abstract
    • Serverless computing emerged as a promising cloud computing paradigm for deploying cloud-native applications but raises new performance challenges. Existing performance evaluation studies focus on micro-benchmarking to measure an individual aspect of serverless functions, such as CPU speed, but lack an in-depth analysis of differences in application performance across cloud providers. This paper presents CrossFit, an approach for detailed and fair cross-provider performance benchmarking of serverless applications based on a providerindependent tracing model. Our case study demonstrates how detailed distributed tracing enables drill-down analysis to explain performance differences between two leading cloud providers, AWS and Azure. The results for an asynchronous application show that trigger time contributes most delay to the end-to-end latency and explains the main performance difference between cloud providers. Our results further reveal how increasing and bursty workloads affect performance stability, median latency, and tail latency.
  •  
3.
  • Scheuner, Joel, 1991, et al. (författare)
  • TriggerBench: A Performance Benchmark for Serverless Function Triggers
  • 2022
  • Ingår i: Proceedings - 2022 IEEE International Conference on Cloud Engineering, IC2E 2022. ; , s. 96-103
  • Konferensbidrag (refereegranskat)abstract
    • Serverless computing offers a scalable event-based paradigm for deploying managed cloud-native applications. Function triggers are essential building blocks in serverless, as they initiate any function execution. However, function triggering is insufficiently studied and inherently hard to measure given the distributed, ephemeral, and asynchronous nature of event-based function coordination. To address this gap, we present TriggerBench, a cross-provider benchmark for evaluating serverless function triggers based on distributed tracing. We evaluate the trigger latency (i.e., time to transition between two functions) of eight types of triggers in Microsoft Azure and three in AWS. Our results show that all triggers suffer from long tail latency, storage triggers introduce variable multi-second delays, and HTTP triggers are most suitable for interactive applications. Our insights can guide developers in choosing optimal event or messaging triggers for latency-sensitive applications. Researchers can extend TriggerBench to study the latency, scalability, and reliability of further trigger types and cloud providers.
  •  
4.
  • Steghöfer, Jan-Philipp, 1983, et al. (författare)
  • Design Decisions in the Construction of Traceability Information Models for Safe Automotive Systems
  • 2021
  • Ingår i: Proceedings of the IEEE International Conference on Requirements Engineering. - 2332-6441 .- 1090-705X. ; , s. 185-196
  • Konferensbidrag (refereegranskat)abstract
    • Traceability management relies on a supporting model, the traceability information model (TIM), that defines which types of relationships exist between which artifacts and contains additional constraints such as multiplicities. Constructing a TIM that is fit for purpose is crucial to ensure that a traceability strategy yields the desired benefits. However, which design decisions are critical in the construction of TIMs and which impact they have on the usefulness and applicability of traceability is still an open question. In this paper, we use two cases of TIMs constructed for safety-critical, automotive systems with industrial safety experts, to identify key design decisions. We also propose a comparison scheme for TIMs based on a systematic literature review and evaluate the two cases as well as TIMs from the literature according to the scheme. Based on our analyses, we thus derive key insights into TIM construction and the design decisions that ensure that a TIM is fit for purpose.
  •  
5.
  • Steghöfer, Jan-Philipp, 1983, et al. (författare)
  • The MobSTr Dataset - An Exemplar for Traceability and Model-based Safety Assessment
  • 2021
  • Ingår i: Proceedings of the IEEE International Conference on Requirements Engineering. - 2332-6441 .- 1090-705X. ; RE 2021, s. 444-445
  • Konferensbidrag (refereegranskat)abstract
    • The MobSTr dataset contains a number of artifacts for an autonomous driver assistance system, ranging from textual requirements to models for system design and models relevant to safety assurance. The artifacts provided are connected with traceability links created and managed with Eclipse Capra, an open source traceability management tool. The dataset builds upon a custom traceability information model that provides type safety and semantics for the trace links.MobSTr is intended for researchers that work on software and systems traceability as well as on model-based safety assurance. It is already being used in a number of studies, including research on trace link consistency, change impact analysis, and automated analysis of safety and timing requirements.
  •  
6.
  • Agrawal, Ankit, et al. (författare)
  • Model-Driven Requirements for Humans-on-The-Loop Multi-UAV Missions
  • 2020
  • Ingår i: Proceedings - 10th International Model-Driven Requirements Engineering Workshop, MoDRE 2020. - : IEEE.
  • Konferensbidrag (refereegranskat)abstract
    • The use of semi-Autonomous Unmanned Aerial Vehicles (UAVs or drones) to support emergency response scenarios, such as fire surveillance and search-And-rescue, has the potential for huge societal benefits. Onboard sensors and artificial intelligence (AI) allow these UAVs to operate autonomously in the environment. However, human intelligence and domain expertise are crucial in planning and guiding UAVs to accomplish the mission. Therefore, humans and multiple UAVs need to collaborate as a team to conduct a time-critical mission successfully. We propose a meta-model to describe interactions among the human operators and the autonomous swarm of UAVs. The meta-model also provides a language to describe the roles of UAVs and humans and the autonomous decisions. We complement the meta-model with a template of requirements elicitation questions to derive models for specific missions. We also identify common scenarios where humans should collaborate with UAVs to augment the autonomy of the UAVs. We introduce the meta-model and the requirements elicitation process with examples drawn from a search-And-rescue mission in which multiple UAVs collaborate with humans to respond to the emergency. We then apply it to a second scenario in which UAVs support first responders in fighting a structural fire. Our results show that the meta-model and the template of questions support the modeling of the human-on-The-loop human interactions for these complex missions, suggesting that it is a useful tool for modeling the human-on-The-loop interactions for multi-UAVs missions.
  •  
7.
  • Alégroth, Emil, 1984, et al. (författare)
  • Teaching scrum – what we did, what we will do and what impedes us
  • 2015
  • Ingår i: Lecture Notes in Business Information Processing. - 1865-1348 .- 1865-1356. - 9783319186115 ; 212, s. 361-362
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • This paper analyses the way we teach Scrum. We reflect on our intended learning outcomes, which challenges we find in teaching Scrum and which lessons we have learned during the last four years. We also give an outlook on the way we want to introduce and apply Scrum in our teaching and how we intend to improve the curriculum.
  •  
8.
  • Anders, G., et al. (författare)
  • Cooperative Resource Allocation in Open Systems of Systems
  • 2015
  • Ingår i: Acm Transactions on Autonomous and Adaptive Systems. - : Association for Computing Machinery (ACM). - 1556-4665 .- 1556-4703. ; 10:2
  • Tidskriftsartikel (refereegranskat)abstract
    • Resource allocation is a common problem in many technical systems. In multi-agent systems, the decentralized or regionalized solution of this problem usually requires the agents to cooperate due to their limited resources and knowledge. At the same time, if these systems are of large scale, scalability issues can be addressed by a self-organizing hierarchical system structure that enables problem decomposition and compartmentalization. In open systems, various uncertainties-introduced by the environment as well as the agents' possibly self-interested or even malicious behavior-have to be taken into account to be able to allocate the resources according to the actual demand. In this article, we present a trust-and cooperation-based algorithm that solves a dynamic resource allocation problem in open systems of systems. To measure and deal with uncertainties imposed by the environment and the agents at runtime, the algorithm uses the social concept of trust. In a hierarchical setting, we additionally show how agents create constraint models by learning the capabilities of subordinate agents if these are not able or willing to disclose this information. Throughout the article, the creation of power plant schedules in decentralized autonomous power management systems serves as a running example.
  •  
9.
  • Berger, Thorsten, 1981, et al. (författare)
  • The state of adoption and the challenges of systematic variability management in industry
  • 2020
  • Ingår i: Empirical Software Engineering. - : Springer Science and Business Media LLC. - 1382-3256 .- 1573-7616. ; :25, s. 1755-1797
  • Tidskriftsartikel (refereegranskat)abstract
    • Handling large-scale software variability is still a challenge for many organizations. After decades of research on variability management concepts, many industrial organizations have introduced techniques known from research, but still lament that pure textbook approaches are not applicable or efficient. For instance, software product line engineering-an approach to systematically develop portfolios of products-is difficult to adopt given the high upfront investments; and even when adopted, organizations are challenged by evolving their complex product lines. Consequently, the research community now mainly focuses on re-engineering and evolution techniques for product lines; yet, understanding the current state of adoption and the industrial challenges for organizations is necessary to conceive effective techniques. In this multiple-case study, we analyze the current adoption of variability management techniques in twelve medium- to large-scale industrial cases in domains such as automotive, aerospace or railway systems. We identify the current state of variability management, emphasizing the techniques and concepts they adopted. We elicit the needs and challenges expressed for these cases, triangulated with results from a literature review. We believe our results help to understand the current state of adoption and shed light on gaps to address in industrial practice.
  •  
10.
  • Billawa, Priyanka, et al. (författare)
  • SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices
  • 2022
  • Ingår i: ACM International Conference Proceeding Series. - New York, NY, USA : ACM.
  • Konferensbidrag (refereegranskat)abstract
    • Cloud-based application deployment is becoming increasingly popular among businesses, thanks to the emergence of microservices. However, securing such architectures is a challenging task since traditional security concepts cannot be directly applied to microservice architectures due to their distributed nature. The situation is exacerbated by the scattered nature of guidelines and best practices advocated by practitioners and organizations in this field. In this research paper we aim to shay light over the current microservice security discussions hidden within Grey Literature (GL) sources. Particularly, we identify the challenges that arise when securing microservice architectures, as well as solutions recommended by practitioners to address these issues. For this, we conducted a systematic GL study on the challenges and best practices of microservice security present in the Internet with the goal of capturing relevant discussions in blogs, white papers, and standards. We collected 312 GL sources from which 57 were rigorously classified and analyzed. This analysis on the one hand validated past academic literature studies in the area of microservice security, but it also identified improvements to existing methodologies pointing towards future research directions.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 62
Typ av publikation
konferensbidrag (38)
tidskriftsartikel (19)
proceedings (redaktörskap) (2)
bokkapitel (2)
rapport (1)
Typ av innehåll
refereegranskat (55)
övrigt vetenskapligt/konstnärligt (7)
Författare/redaktör
Steghöfer, Jan-Phili ... (62)
Knauss, Eric, 1977 (11)
Horkoff, Jennifer, 1 ... (7)
Wohlrab, Rebekka, 19 ... (7)
Scandariato, Riccard ... (6)
Berger, Thorsten, 19 ... (5)
visa fler...
Burden, Håkan, 1976 (5)
Anjorin, Anthony, 19 ... (4)
Staron, Miroslaw, 19 ... (3)
Burden, Håkan (3)
Hebig, Regina (3)
Hebig, Regina, 1984 (2)
Strüber, Daniel, 198 ... (2)
Alégroth, Emil, 1984 ... (2)
Ericsson, Morgan, 19 ... (2)
Heldal, Rogardt, 196 ... (2)
Mukelabai, Mukelabai ... (2)
Anders, G. (1)
Hammouda, Imed (1)
Lönn, Henrik (1)
al., et (1)
Ciccozzi, Federico, ... (1)
Chaudron, Michel, 19 ... (1)
Sadovykh, Andrey (1)
Agrawal, Ankit (1)
Martínez, J. (1)
Feldt, Robert, 1972 (1)
Askerdal, Örjan, 197 ... (1)
Robin, J. (1)
Tichy, Matthias, 197 ... (1)
Calikli, Gul, 1978 (1)
Alahyari, Hiva, 1979 (1)
Alexandersson, R (1)
Pelliccione, Patrizi ... (1)
Muccini, H. (1)
Schiendorfer, A. (1)
Siefert, F. (1)
Reif, W. (1)
Latifaj, Malvina (1)
Brink, C (1)
Bagnato, Alessandra (1)
Hammouda, Imed, 1974 (1)
Deng, Rui (1)
Ziadi, T. (1)
Jolak, Rodi, 1985 (1)
Bertilsson, Marcus (1)
Jolak, Rodi (1)
Rath, M (1)
Billawa, Priyanka (1)
Bambhore Tukaram, An ... (1)
visa färre...
Lärosäte
Göteborgs universitet (51)
Chalmers tekniska högskola (46)
RISE (7)
Kungliga Tekniska Högskolan (1)
Mälardalens universitet (1)
Linnéuniversitetet (1)
Språk
Engelska (61)
Odefinierat språk (1)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (57)
Teknik (21)
Samhällsvetenskap (13)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy