SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Extended search

Träfflista för sökning "hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) ;mspu:(conferencepaper);pers:(Höst Martin)"

Search: hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) > Conference paper > Höst Martin

  • Result 1-10 of 83
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Höst, Martin, et al. (author)
  • Industrial Practices in Security Vulnerability Management for IoTSystems – an Interview Study
  • 2018
  • In: Proceedings of the 2018 International Conference on Software Engineering Research & Practice. - 1601324898 ; , s. 61-67
  • Conference paper (peer-reviewed)abstract
    • The area of Internet of Things (IoT) is growingand it affects a large amount of users, which means thatsecurity is important. Many parts of IoT systems are builtwith Open Source Software, for which security vulnerabilitiesare available. It is important to update the softwarewhen vulnerabilities are detected, but it is unclear to whatextent this is done in industry today. This study presentsan investigation of industrial companies in the area ofIoT to understand current procedures and challenges withrespect to security updates. The research is conducted asan interview study with qualitative data analysis. It is foundthat few companies have formalized processes for this typeof security updates, and there is a need to support bothproducers and integrators of IoT components
  •  
2.
  • Feldt, Robert, et al. (author)
  • Generic Skills in Software Engineering Master Thesis Projects : Towards Rubric-Based Evaluation
  • 2009
  • In: Proceedings - 22nd Conference on Software Engineering Education and Training, CSEET 2009. - Hyderabad : IEEE Computer Society. - 9780769535395 ; , s. 12-15
  • Conference paper (peer-reviewed)abstract
    • There has been much recent interest in how to help students in higher education develop their generic skills, especially since this is a focus of the Bologna process that aims to standardize European higher education. However, even though the Master thesis is the final and often crucial part of a graduate degree and requires many generic skills very little research has directly focused on them. In particular, there is a lack of such knowledge for engineering education programs. In this paper we present results from a survey where we asked 23 students from three different Swedish universities about which generic skills are needed and developed in a Master thesis project in Software Engineering. One outcome of our analysis is that there is a lack of understanding on how to define, and thus examine, generic skills in software engineering thesis projects.
  •  
3.
  • Höst, Martin, et al. (author)
  • Experimental context classification: incentives and experience of subjects
  • 2005
  • In: 27th International Conference on Software Engineering. ; , s. 470-478
  • Conference paper (peer-reviewed)abstract
    • There is a need to identify factors that affect the result of empirical studies in software engineering research. It is still the case that seemingly identical replications of controlled experiments result in different conclusions due to the fact that all factors describing the experiment context are not clearly defined and hence controlled. In this article, a scheme for describing the participants of controlled experiments is proposed and evaluated. It consists of two main factors, the incentives for participants in the experiment and the experience of the participants. The scheme has been evaluated by classifying a set of previously conducted experiments from literature. It can be concluded that the scheme was easy to use and understand. It is also found that experiments that are classified in the same way to a large extent point at the same results, which indicates that the scheme addresses relevant factors
  •  
4.
  • Sulaman, Sardar Muhammad, et al. (author)
  • Risk Analysis and Management of IT Systems: Practice and Challenges
  • 2018
  • In: 15th International Conference on Information Systems for Crisis Response and Management (ISCRAM). - 9780692127605 ; , s. 831-840
  • Conference paper (peer-reviewed)abstract
    • Risk analysis is important for safety-critical IT systems and services, both in public and private organizations. However, the actual practices and the challenges of risk analysis in these contexts have not been fully explored. This paper investigates the current practices of risk analysis by an interview-based investigation. This study investigates several factors of the risk analysis process, e.g., its importance, identification of critical resources, definitions of roles, involvement of different stakeholders, used methods, and follow-up analysis. Further more, this study also investigates existing challenges in the current practices of risk analysis. A number of challenges are identified,e.g., that risk analysis requires competence both about the risk analysis procedures and the analyzed system,which is challenging to identify, and that it is challenging to follow-up and repeat a risk-analysis that is conducted. The identified challenges can be useful when new risk analysis methods are defined.
  •  
5.
  • Svensson, Harald, et al. (author)
  • Introducing an agile process in a software maintenance and evolution organization
  • 2005
  • In: Ninth European Conference on Software Maintenance and Reengineering, Proceedings. - 0769523048 ; , s. 256-264
  • Conference paper (peer-reviewed)abstract
    • The purpose of this paper is to present results of introducing art agile process based on extreme programming, XP, in an evolutionary and maintenance software development environment. The agile process was introduced to a large software development organization. The process was applied by a team during eight months. The conclusions indicate that it in this case is more difficult to introduce XP, in its original appearance, to the case environment than to less complex environments. The complexity of the organization made it necessary to redesign many of the practices in order for them to fit the needs of the software development team.
  •  
6.
  • Andersson, Carina, et al. (author)
  • Understanding software processes through system dynamics simulation: a case study
  • 2002
  • In: Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems. - 0769515495 ; , s. 41-48
  • Conference paper (peer-reviewed)abstract
    • This paper presents a study with the intent to examine the opportunities provided by creating and using simulation models of software development processes. A model of one software development project was created through means of system dynamics, with data collected from documents, interviews and observations. The model was simulated in a commercial simulation tool. The simulation runs indicate that increasing the effort spent on the requirements phase, to a certain extent, will decrease the lead time and increase the quality in similar projects. The simulation model visualizes relations in the software process, and can be used by project managers when planning future projects. The study indicates that this type of simulation is a feasible way of modelling the process dynamically although the study calls for further investigations as to how project or process managers can benefit the most from using system dynamics simulations
  •  
7.
  • Andersson, Mikael, et al. (author)
  • Design and evaluation of an overload control system for crisis-related Web server systems
  • 2006
  • In: 2006 International Conference on Internet Surveillance and Protection. - 0769526497
  • Conference paper (peer-reviewed)abstract
    • During recent years we have seen several large-scale crises. The 9/11 terror attacks, tsunamis, storms, floods and bombings have all caused a great deal of damage. A common factor in these crises has been the need for information and one important source of information is usually Web sites. In this work we investigate and design an overload control system for Web sites that are vital in crises. The overload control system uses content adaption to dynamically control Web site performance
  •  
8.
  • Andersson, Per, et al. (author)
  • UML and SystemC - Comparison and Mapping Rules for Automatic Code Generation
  • 2007
  • In: Proceedings of the International Conference Forum on Specification and Design Languages (FDL) 2007.
  • Conference paper (peer-reviewed)abstract
    • Today embedded system development is a complex task. To aid the engineers new methodologies and languages are emerging. During the development the system is modelled using different tools and languages. Transformations between the models are traditionally done manually. We investigate the automation of this process, specifically we are looking at automatic UML to SystemC transformation. In this paper we compare UML and SystemC, focusing on communication modelling. We also present mapping rules for automatic SystemC code generation from UML. The mapping has been implemented in our UML to SystemC code generator.
  •  
9.
  •  
10.
  • Asklund, Ulf, et al. (author)
  • Experiences from Monitoring Effect of Architectural Changes
  • 2016
  • In: Software Quality.. - Cham : Springer International Publishing. - 9783319270333 ; 238, s. 97-108
  • Conference paper (peer-reviewed)abstract
    • A common situation is that an initial architecture has been sufficient in the initial phases of a project, but when the size and complexity of the product increases the architecture must be changed. In this paper experiences are presented from changing an architecture into independent units, providing basic reuse of main functionality although giving higher priority to independence than reuse. An objective was also to introduce metrics in order to monitor the architectural changes. The change was studied in a case-study through weekly meetings with the team, collected metrics, and questionnaires. The new architecture was well received by the development team, who found it to be less fragile. Concerning the metrics for monitoring it was concluded that a high abstraction level was useful for the purpose.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 83
Type of publication
Type of content
peer-reviewed (80)
other academic/artistic (3)
Author/Editor
Runeson, Per (10)
Regnell, Björn (8)
Nedstam, Josef (7)
Karlsson, Lena (4)
Olsson, Thomas (2)
show more...
Franch, Xavier (2)
Andersson, Per (2)
Wohlin, Claes (2)
Nyberg, Christian (2)
Niehorster, Diederic ... (2)
Engström, Emelie (2)
Andersson, Carina (2)
Thelin, Thomas (2)
Borg, Markus (2)
Cruzes, Daniela S. (2)
Nguyen, Anh Duc (2)
Conradi, Reidar (2)
Berling, Tomas (2)
Berntsson Svensson, ... (2)
Wnuk, Krzysztof (2)
Nilsson, J. (1)
Abbas, Taimoor (1)
Nilsson, Fredrik (1)
Wnuk, Krzysztof, 198 ... (1)
Johansson, Jonas (1)
Baldassarre, Maria T ... (1)
Bengtsson, Henrik (1)
Feldt, Robert (1)
Bohgard, Mats (1)
Kihl, Maria (1)
Andersson, Mikael (1)
Franke, Ulrik (1)
Bjarnason, Elizabeth (1)
Magnusson, Boris (1)
Möller, Peter (1)
Svensson, H (1)
Nilsson, Bertil (1)
Cao, Jianhua (1)
Asklund, Ulf (1)
Pfahl, Dietmar (1)
Petersson, Håkan (1)
Ayala, Claudia (1)
Babar, Muhammad Ali (1)
Juristo, Natalia (1)
Rassner, Fredrik (1)
Biffl, Stefan (1)
Winkler, Dietmar (1)
Felderer, Michael (1)
Trulsson, Martin (1)
show less...
University
Lund University (82)
Blekinge Institute of Technology (5)
RISE (2)
Royal Institute of Technology (1)
Mälardalen University (1)
Malmö University (1)
Language
English (82)
Swedish (1)
Research subject (UKÄ/SCB)
Natural sciences (83)
Engineering and Technology (7)
Social Sciences (3)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view