SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:9789897586477 "

Search: L773:9789897586477

  • Result 1-4 of 4
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Nast, B., et al. (author)
  • Methods for Model-Driven Development of IoT Applications : Requirements from Industrial Practice
  • 2023
  • In: Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering. - : Science and Technology Publications, Lda. - 9789897586477 ; , s. 170-181
  • Conference paper (peer-reviewed)abstract
    • The Internet of Things (IoT) has become a crucial topic in research and industry over recent years. Enterprises often fail to create business value from IoT technology because they have difficulties defining organizational integration. Model-driven Development (MDD) is considered an effective technique for IoT application development. We argue that methods for MDD should comprise the organizational as well as the system development and integration. This paper aims to provide an overview of the current state of research on MDD of IoT applications. For this purpose, we conducted a structured literature review (SLR). A research gap was identified as no specific research could be found on MDD of IoT applications with a focus on organizational and system aspects. We also derived requirements from an industrial use case. The main contributions of this paper are (a) requirements from medium-sized enterprises (SMEs) to methodical and technical IoT development support derived from a use case, (b) the results of a systematic literature analysis in this field, and (c) an initial structure for the methodical support and initial architecture for the accompanying tool support. 
  •  
2.
  • Saeeda, Hina, et al. (author)
  • Multivocal Literature Review on Non-Technical Debt in Software Development : An Exploratory Study
  • 2023
  • In: Proceedings of the International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE. - : SciTePress. - 9789897586477 ; , s. 89-101
  • Conference paper (peer-reviewed)abstract
    • Earlier research has focused on technical debt (TD). While numerous issues connected to non-technical aspects of software development (SD) that are equally worthy of”debt” status are neglected. Simultaneously, these types of debts regularly develop significant challenges to be addressed, demonstrating that the debt metaphor may be used to reason about elements other than technical ones. It motivates us to create the new umbrella term”Non-Technical Debt” (NTD) to investigate people, processes, culture, social, and organizational concerns under its cover. All types of debt are similar in some ways, and they are often caused by making risky decisions. Therefore, ignoring any one dimension of debt can have severe consequences on the successful completion of SD projects. This study investigates recent literature on the current state of knowledge about NTD, its causes, and mitigation strategies. By using a thematic analysis approach, we found five NTD types (i.e., people, process, culture, social, and organizational). We further identified their accumulation causes and discussed remedies for mitigation. 
  •  
3.
  • Simon, Ivan, et al. (author)
  • A step to achieve personalized human centric privacy policy summary
  • 2023
  • In: Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering. - : Science and Technology Publications. - 9789897586477 ; , s. 381-395
  • Conference paper (peer-reviewed)abstract
    • Online users continuously come across privacy policies for the service they use. Due to the complexity and verbosity of policies, majority of the users skip the tedious task of reading the policy and accept it. Without reading and evaluating the document users risk giving up all kinds of rights to their personal data and for the most part, are unaware of the data sharing and handling process. Efforts have been made to address the complex and lengthy structure of privacy policies by creating a standardized machine-readable format of privacy policies for the web browsers to process it automatically, a repository of crowdsourced summarized versions of some privacy policies, or by using natural language processing to summarize the policies. PirvacyInterpreter is one unique tool that acknowledges human-centric factors while summarising the policy. Thus, it generates a personalised summary of the privacy policy for the user providing relevant information to appease their privacy concerns. This paper presents the conceptualization of PrivacyInterpreter and implements a proof-of-concept model using configured RoBERTa(base) model to classify a privacy policy and produce a summary based on privacy aspects that reflect users' privacy concerns.
  •  
4.
  • Zafar, Muhammad Nouman, et al. (author)
  • An Empirical Evaluation of System-Level Test Effectiveness for Safety-Critical Software
  • 2023
  • In: International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings. - : Science and Technology Publications, Lda. - 9789897586477 ; , s. 293-305
  • Conference paper (peer-reviewed)abstract
    • Combinatorial Testing (CT) and Model-Based Testing (MBT) are two recognized test generation techniques. The evidence of their fault detection effectiveness and comparison with industrial state-of-the-practice is still scarce, more so at the system level for safety-critical systems, such as those found in trains. We use mutation analysis to perform a comparative evaluation of CT, MBT, and industrial manual testing in terms of their fault detection effectiveness using an industrial case study of the safety-critical train control management system. We examine the fault detection rate per mutant and relationship between the mutation scores and structural coverage using Modified Condition Decision Coverage (MC/DC). Our results show that CT 3-ways, CT 4-ways, and MBT provide higher mutation scores. MBT did not perform better in detecting 'Logic Replacement Operator-Improved' mutants when compared with the other techniques, while manual testing struggled to find 'Logic Block Replacement Operator' mutants. None of the test suites were able to find 'Time Block Replacement Operator' mutants. CT 2-ways was found to be the least effective test technique. MBT-generated test suite achieved the highest MC/DC coverage. We also found a generally consistent positive relationship between MC/DC coverage and mutation scores for all test suites.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-4 of 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view