SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Extended search

Träfflista för sökning "hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) ;mspu:(conferencepaper);pers:(Runeson Per)"

Search: hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) > Conference paper > Runeson Per

  • Result 1-10 of 111
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Borg, Markus, et al. (author)
  • Software Engineers' Information Seeking Behavior in Change Impact Analysis : An Interview Study
  • 2017
  • In: IEEE International Conference on Program Comprehension. - : IEEE Computer Society. - 9781538605356 ; , s. 12-22, s. 12-22
  • Conference paper (peer-reviewed)abstract
    • Software engineers working in large projects must navigate complex information landscapes. Change Impact Analysis (CIA) is a task that relies on engineers' successful information seeking in databases storing, e.g., source code, requirements, design descriptions, and test case specifications. Several previous approaches to support information seeking are task-specific, thus understanding engineers' seeking behavior in specific tasks is fundamental. We present an industrial case study on how engineers seek information in CIA, with a particular focus on traceability and development artifacts that are not source code. We show that engineers have different information seeking behavior, and that some do not consider traceability particularly useful when conducting CIA. Furthermore, we observe a tendency for engineers to prefer less rigid types of support rather than formal approaches, i.e., engineers value support that allows flexibility in how to practically conduct CIA. Finally, due to diverse information seeking behavior, we argue that future CIA support should embrace individual preferences to identify change impact by empowering several seeking alternatives, including searching, browsing, and tracing. © 2017 IEEE.
  •  
2.
  • Linåker, Johan, et al. (author)
  • Sustaining Open Data as a Digital Common - Design principles for Common Pool Resources applied to Open Data Ecosystems
  • 2022
  • In: ACM International Conference Proceeding Series. 7 September 2022, Article number 10. - New York, NY, USA : Association for Computing Machinery. - 9781450398459
  • Conference paper (peer-reviewed)abstract
    • Motivation. Digital commons is an emerging phenomenon and of increasing importance, as we enter a digital society. Open data is one example that makes up a pivotal input and foundation for many of today's digital services and applications. Ensuring sustainable provisioning and maintenance of the data, therefore, becomes even more important. Aim. We aim to investigate how such provisioning and maintenance can be collaboratively performed in the community surrounding a common. Specifically, we look at Open Data Ecosystems (ODEs), a type of community of actors, openly sharing and evolving data on a technological platform. Method. We use Elinor Ostrom's design principles for Common Pool Resources as a lens to systematically analyze the governance of earlier reported cases of ODEs using a theory-oriented software engineering framework. Results. We find that, while natural commons must regulate consumption, digital commons such as open data maintained by an ODE must stimulate both use and data provisioning. Governance needs to enable such stimulus while also ensuring that the collective action can still be coordinated and managed within the frame of available maintenance resources of a community. Subtractability is, in this sense, a concern regarding the resources required to maintain the quality and value of the data, rather than the availability of data. Further, we derive empirically-based recommended practices for ODEs based on the design principles by Ostrom for how to design a governance structure in a way that enables a sustainable and collaborative provisioning and maintenance of the data. Conclusion. ODEs are expected to play a role in data provisioning which democratize the digital society and enables innovation from smaller commercial actors. Our empirically based guidelines intend to support this development. 
  •  
3.
  • Skoglund, Mats, et al. (author)
  • A case study of the class firewall regression test selection technique on a large scale distributed software system
  • 2005
  • In: 2005 International Symposium on Empirical Software Engineering (ISESE), Proceedings. - NEW YORK : IEEE. - 9780780395084 - 0780395077 ; , s. 74-83
  • Conference paper (peer-reviewed)abstract
    • Regression testing is expensive and may consume much of organizations' software development budgets. Thus, it is of interest to reduce the total time devoted to test execution by using test selection techniques. Many techniques have been proposed but few have been evaluated on real-world, large scale systems. In this paper we report on an empirical evaluation of using the class firewall regression test selection technique, in combination with scenario testing, on a large scale industrial software system using the Java byte code in the analysis. The study was performed on a large complex distributed software system in one of Sweden's largest banks. Effects of using scenario testing together with regression test selection are reported. The results are that not all test cases were selected by the class firewall selection technique. Using scenario testing, where test cases are dependent,. affects the number of test cases selected, as do the location and number of changes in the system.
  •  
4.
  • Linåker, Johan, et al. (author)
  • A Survey on the Perception of Innovation in a Large Product-focused Software Organization
  • 2015
  • In: Lecture Notes in Business Information Processing (LNBIP). - Cham : Springer International Publishing. - 1865-1348. ; 210, s. 66-80, s. 66-80
  • Conference paper (peer-reviewed)abstract
    • Context.Innovation is promoted in companies to help them stay competitive. Four types of innovation are defined: product, process, business, and organizational. Objective. We want to understand the perception of the innovation concept in industry, and particularly how the innovation types relate to each other. Method. We launched a survey at a branch of a multi-national corporation. Results. From a qualitative analysis of the 229 responses, we see that the understanding of the innovation concept is somewhat narrow, and mostly related to product innovation. A majority of respondents indicate that product innovation triggers process, business, and organizational innovation, rather than vice versa. However, there is a complex interdependency between the types. We also identify challenges related to each of the types. Conclusion. Increasing awareness and knowledge of different types of innovation, may improve the innovation. Further, they cannot be handled one by one, but in their interdependent relations.
  •  
5.
  • Sabaliauskaité, Giedré, et al. (author)
  • Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context
  • 2010
  • In: Requirements Engineering: Foundation for Software Quality /Lecture Notes in Computer Science. - Essen : Springer Berlin Heidelberg. - 1611-3349 .- 0302-9743. - 9783642141911 ; 6182, s. 128-142
  • Conference paper (peer-reviewed)abstract
    • [Context and motivation] When developing software, coordination between different organizational units is essential in order to develop a good quality product, on time and within budget. Particularly, the synchronization between requirements and verification processes is crucial in order to assure that the developed software product satisfies customer requirements. [Question/problem] Our research question is: what are the current challenges in aligning the requirements and verification processes? [Principal ideas/results] We conducted an interview study at a large software development company. This paper presents preliminary findings of these interviews that identify key challenges in aligning requirements and verification processes. [Contribution] The result of this study includes a range of challenges faced by the studied organization grouped into the categories: organization and processes, people, tools, requirements process, testing process, change management, traceability, and measurement. The findings of this study can be used by practitioners as a basis for investigating alignment in their organizations, and by scientists in developing approaches for more efficient and effective management of the alignment between requirements and verification.
  •  
6.
  • Skoglund, Mikael, et al. (author)
  • A case study on regression test suite maintenance in system evolution
  • 2004
  • In: 20TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS. - 0769522130 ; , s. 438-442
  • Conference paper (peer-reviewed)abstract
    • When a system is maintained, its automated test suites must also be maintained to keep the tests up to date. Even though practice indicates that test suite maintenance can be very costly we have seen few studies considering the actual efforts for maintenance of test-ware. We conducted a case study on an evolving system with three updated versions, changed with three different change strategies. Test suites for automated unit and functional tests were used for regression testing the extended applications. With one change strategy more changes were made in the tests code than in the system that was tested, and with another strategy no changes were needed for the unit tests to work.
  •  
7.
  • Thelin, Thomas, et al. (author)
  • A replicated experiment of usage-based and checklist-based reading
  • 2004
  • In: Proceedings - International Software Metrics Symposium. - 1530-1435. ; , s. 246-256
  • Conference paper (peer-reviewed)abstract
    • Software inspection is an effective method to detect faults in software artefacts. Several empirical studies have been performed on reading techniques, which are used in the individual preparation phase of software inspections. Besides new experiments, replications are needed to increase the body of knowledge in software inspections. This paper presents a replication of an experiment, which compares usage-based and checklist-based reading. The results of the original experiment show that reviewers applying usage-based reading are more efficient and effective in detecting the most critical faults from a user's point of view than reviewers using checklist-based reading. This paper presents the data of the replication together with the original experiment and compares the experiments. The main result of the replication is that it confirms the result of the original experiment. This replication strengthens the evidence that usage-based reading is an efficient reading technique. © 2004 IEEE.
  •  
8.
  • Thelin, Thomas, et al. (author)
  • How much information is needed for usage-based reading? A series of experiments
  • 2002
  • In: 2002 International Symposium on Empirical Software Engineering Proceedings. - Nara (Japan) : IEEE Comput. Soc.. - 076951796X ; , s. 127-138
  • Conference paper (peer-reviewed)abstract
    • Software inspections are regarded as an important technique to detect faults throughout the software development process. The individual preparation phase of software inspections has enlarged its focus from only comprehension to also include fault searching. Hence, reading techniques to support the reviewers on fault detection are needed. Usage-based reading (UBR) is a reading technique, which focuses on the important parts of a software document by using prioritized use cases. This paper presents a series of three UBR experiments on design specifications, with focus on the third. The first experiment evaluates the prioritization of UBR and the second compares UBR against checklist-based reading. The third experiment investigates the amount of information needed in the use cases and whether a more active approach helps the reviewers to detect more faults. The third study was conducted at two different places with a total of 82 subjects. The general result from the experiments is that UBR works as intended and is efficient as well as effective in guiding reviewers during the preparation phase of software inspections. Furthermore, the results indicate that use cases developed in advance are preferable compared to developing them as part of the preparation phase of the inspection
  •  
9.
  • Magnusson, Boris, et al. (author)
  • PalCom MIST: a Metaprotocol for Internet Systems of Things
  • 2018
  • In: 5th Int Conference on Internet of Things, Systems, Management & Security (IOTSMS 2018). - 9781538695869 - 9781538695852
  • Conference paper (peer-reviewed)abstract
    • Future applications of internet of things (IoT) will go far beyond connecting sensors to the internet. The real challenge lies in how to easily build well working systems of things: well integrated distributed applications that support users, yet built from a variety of devices running on a variety of networks and protocols, and including services that were not designed to interoperate.Based on our experiences from more than a decade of experimentation with heterogeneous, distributed systems, we identify a number of key requirements for building such systems of IoT: transparent communication and routing over heterogeneous networks, interoperability across standards, scalable evolvable architecture, and high-level development.We present a scenario from healthcare, instantiating these general requirements, and we explain how they are supported by our middleware PalCom which is an implementation of the MIST architecture, a Metaprotocol for Internet Systems of Things. We discuss how the constituents of the MIST architecture contribute to each of the identified requirements.
  •  
10.
  • Olsson, Thomas, et al. (author)
  • Open Data Collaborations - A snapshot of an emerging practice
  • 2019
  • In: Proceedings of the 15th International Symposium on Open Collaboration, OpenSym 2019. - New York, NY, USA : ACM. - 9781450363198
  • Conference paper (peer-reviewed)abstract
    • Data defined software is becoming more and more prevalent, especially with the advent of machine learning and artificial intelligence. With data defined systems come both challenges - to continue to collect and maintain quality data - and opportunities - open innovation by sharing with others. We propose Open Data Collaboration (ODC) to describe pecuniary and non-pecuniary sharing of open data, similar to Open Source Software. To understand challenges and opportunities with ODC, we ran focus groups with 22 companies and organizations. We observed an interest in the subject, but we conclude that the overall maturity is low and ODC is rare.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 111
Type of publication
Type of content
peer-reviewed (103)
other academic/artistic (8)
Author/Editor
Engström, Emelie (15)
Höst, Martin (10)
Andersson, Carina (7)
Thelin, Thomas (7)
Borg, Markus (7)
show more...
Wohlin, Claes (6)
Regnell, Björn (6)
Olsson, Thomas (5)
Bjarnason, Elizabeth (5)
Skoglund, Mats (5)
Ros, Rasmus (4)
Helgesson, Daniel (3)
Sabaliauskaite, Gied ... (3)
Baldassarre, Maria T ... (2)
Feldt, Robert (2)
Andrews, Anneliese (2)
Mäntylä, Mika (2)
Pfahl, Dietmar (2)
Taibi, Davide (2)
Gorschek, Tony (2)
Wnuk, Krzysztof (2)
Smolander, Kari (2)
Loconsole, Annabella (2)
Holmén Notander, Jes ... (2)
Vierimaa, M (1)
Unterkalmsteiner, Mi ... (1)
Wnuk, Krzysztof, 198 ... (1)
Persson, S (1)
Bosch, Jan (1)
Wikstrand, Greger (1)
Magnusson, Boris (1)
Alégroth, Emil (1)
Petre, Marian (1)
Johansson, Jens (1)
Dzamashvili, N (1)
Skoglund, Mikael (1)
Ardö, Anders (1)
Andrews, A (1)
France, Robert (1)
Petersson, Håkan (1)
Mendes, Emilia (1)
Babar, M. A. (1)
Hedin, Görel (1)
Berling, Tomas (1)
Persson, Stefan (1)
Brodén, Lina (1)
Baldassarre, Teresa (1)
Genero, Marcela (1)
Piattini, Mario (1)
show less...
University
Lund University (109)
Blekinge Institute of Technology (8)
Malmö University (4)
RISE (4)
Royal Institute of Technology (3)
Jönköping University (1)
Language
English (111)
Research subject (UKÄ/SCB)
Natural sciences (111)
Engineering and Technology (3)
Social Sciences (2)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view