Digitala Vetenskapliga Arkivet

Change search
Refine search result
55565758596061 2851 - 2900 of 6263
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 2851.
    Johansson, Ronnie
    et al.
    Swedish Defence Research Agency, Sweden.
    Karlsson, Alexander
    University of Skövde, Sweden.
    Andler, Sten
    University of Skövde, Sweden.
    Brohede, Marcus
    University of Skövde, Sweden.
    van Laere, Joeri
    University of Skövde, Sweden.
    Klingegård, Maria
    Folksam, Sweden.
    Ziemke, Tom
    Linköping University, Department of Computer and Information Science, Human-Centered systems. Linköping University, Faculty of Science & Engineering.
    On the Definition and Scope of Information Fusion as a Field of Research2022In: Perspectives on Information Fusion, ISSN 2831-4824, Vol. 5, no 1, p. 3-12Article in journal (Refereed)
    Abstract [en]

    A definition of information fusion (IF) as a field of research can benefit researcherswithin the field, who may use such a definition when motivating their own work and evaluatingthe contributions of others. Moreover, it can enable researchers and practitioners outside thefield to more easily relate their own work to the field and more easily understand the scope of IFtechniques and methods. Based on strengths and weaknesses of existing definitions, a definitionis proposed that is argued to effectively fulfill the requirements that can be put on a definitionof IF as a field of research. Although the proposed definition aims to be precise, it does not fullycapture the richness and versatility of the IF field. To address that limitation, we highlight sometopics to explore the scope of IF, covering the systems perspective of IF and its relation to ma-chine learning, optimization, robot behavior, opinion aggregation, and databases.

  • 2852.
    Johansson, Sonny
    Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
    “Bring your own device” i svenska företag och organisationer2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Most companies and organizations today depend on technology connected to the Internet. Schools and offices have therefore been providing computers, phones and other technology to the employees. The recent technological development and decline in prices for technology have contributed to making these products a part of everyday life for most people. This has made it very common for employees and students to bring their own devices into school and workplaces.

    The aim of this study is to define what "Bring your own device" means for Swedish companies and organizations and how it has been implemented in those. The aim is not mainly to generalize to all Swedish companies but create an understanding how the trend is used to provide a basis for continued research in this area. The questions this thesis aims to answer is:

    1. What does the term "Bring your own device" mean in the Swedish organizations and companies in which it is implemented?
    2. How is "Bring your own device" implemented in Swedish organizations and companies?
    3. What are the policies and guidelines for the Swedish organizations and companies that have implemented "Bring your own device", and how is compliance?

    A pragmatic approach has been used to incorporate previous studies while keeping the interview questions open to new approaches. The structure has been small-N studies that go deep into a number of cases, in order to more profoundly explain a phenomenon. Mail interviews have been used to collect data from the persons responsible for "Bring your own device" in the different organisations.

    The result shows that companies see "Bring your own device" as a trend where employees bring their own devices rather than firms providing employees with devices that they use privately. Respondents have not measured or examined how the introduction of BYOD has affected productivity. It seems, like in foreign studies, to be a lack of clear policies and guidelines regarding the phenomenon.

    Download full text (pdf)
    byodiswcoaor2014
  • 2853.
    John, Meenu Mary
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Design Methods and Processes for ML/DL models2021Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Context: With the advent of Machine Learning (ML) and especially Deep Learning (DL) technology, companies are increasingly using Artificial Intelligence (AI) in systems, along with electronics and software. Nevertheless, the end-to-end process of developing, deploying and evolving ML and DL models in companies brings some challenges related to the design and scaling of these models. For example, access to and availability of data is often challenging, and activities such as collecting, cleaning, preprocessing, and storing data, as well as training, deploying and monitoring the model(s) are complex. Regardless of the level of expertise and/or access to data scientists, companies in all embedded systems domain struggle to build high-performing models due to a lack of established and systematic design methods and processes.

    Objective: The overall objective is to establish systematic and structured design methods and processes for the end-to-end process of developing, deploying and successfully evolving ML/DL models.

    Method: To achieve the objective, we conducted our research in close collaboration with companies in the embedded systems domain using different empirical research methods such as case study, action research and literature review.

    Results and Conclusions: This research provides six main results: First, it identifies the activities that companies undertake in parallel to develop, deploy and evolve ML/DL models, and the challenges associated with them. Second, it presents a conceptual framework for the continuous delivery of ML/DL models to accelerate AI-driven business in companies. Third, it presents a framework based on current literature to accelerate the end-to-end deployment process and advance knowledge on how to integrate, deploy and operationalize ML/DL models. Fourth, it develops a generic framework with five architectural alternatives for deploying ML/DL models at the edge. These architectural alternatives range from a centralized architecture that prioritizes (re)training in the cloud to a decentralized architecture that prioritizes (re)training at the edge. Fifth, it identifies key factors to help companies decide which architecture to choose for deploying ML/DL models. Finally, it explores how MLOps, as a practice that brings together data scientist teams and operations, ensures the continuous delivery and evolution of models. 

    Download full text (pdf)
    Comprehensive summary
    Download (jpg)
    presentationsbild
  • 2854.
    John, Meenu Mary
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Olsson, Helena Holmström
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Bosch, Jan
    Chalmers University of Technology.
    Architecting AI Deployment: A Systematic Review of State-of-the-art and State-of-practice Literature2020In: Software Business: 11th International Conference, ICSOB 2020, Karlskrona, Sweden, November 16–18, 2020, Proceedings / [ed] Eriks Klotins; Krzysztof Wnuk, Springer, 2020, p. 14-29Conference paper (Refereed)
    Abstract [en]

    Companies across domains are rapidly engaged in shifting computational power and intelligence from centralized cloud to fully decentralized edges to maximize value delivery, strengthen security and reduce latency. However, most companies have only recently started pursuing this opportunity and are therefore at the early stage of the cloud-to-edge transition. To provide an overview of AI deployment in the context of edge/cloud/hybrid architectures, we conduct a systematic literature review and a grey literature review. To advance understanding of how to integrate, deploy, operationalize and evolve AI models, we derive a framework from existing literature to accelerate the end-to-end deployment process. The framework is organized into five phases: Design, Integration, Deployment, Operation and Evolution. We make an attempt to analyze the extracted results by comparing and contrasting them to derive insights. The contribution of the paper is threefold. First, we conduct a systematic literature review in which we review the contemporary scientific literature and provide a detailed overview of the state-of-the-art of AI deployment. Second, we review the grey literature and present the state-of-practice and experience of practitioners while deploying AI models. Third, we present a framework derived from existing literature for the end-to-end deployment process and attempt to compare and contrast SLR and GLR results.

    Download full text (pdf)
    fulltext
  • 2855.
    Johnsen, Andreas
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Dodig-Crnkovic, Gordana
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lundqvist, Kristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hänninen, Kaj
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Risk-based decision-making fallacies: Why present functional safety standards are not enough2017In: Proceedings - 2017 IEEE International Conference on Software Architecture Workshops, ICSAW 2017: Side Track Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2017, p. 153-160Conference paper (Refereed)
    Abstract [en]

    Functional safety of a system is the part of its overall safety that depends on the system operating correctly in response to its inputs. Safety is defined as the absence of unacceptable/unreasonable risk by functional safety standards, which enforce safety requirements in each phase of the development process of safety-critical software and hardware systems. Acceptability of risks is judged within a framework of analysis with contextual and cultural aspects by individuals who may introduce subjectivity and misconceptions in the assessment. While functional safety standards elaborate much on the avoidance of unreasonable risk in the development of safety-critical software and hardware systems, little is addressed on the issue of avoiding unreasonable judgments of risk. Through the studies of common fallacies in risk perception and ethics, we present a moral-psychological analysis of functional safety standards and propose plausible improvements of the involved risk-related decision making processes, with a focus on the notion of an acceptable residual risk. As a functional safety reference model, we use the functional safety standard ISO 26262, which addresses potential hazards caused by malfunctions of software and hardware systems within road vehicles and defines safety measures that are required to achieve an acceptable level of safety. The analysis points out the critical importance of a robust safety culture with developed countermeasures to the common fallacies in risk perception, which are not addressed by contemporary functional safety standards. We argue that functional safety standards should be complemented with the analysis of potential hazards caused by fallacies in risk perception, their countermeasures, and the requirement that residual risks must be explicated, motivated, and accompanied by a plan for their continuous reduction. This approach becomes especially important in contemporary developed autonomous vehicles with increasing computational control by increasingly intelligent software applications.

  • 2856.
    Johnsen, Andreas
    et al.
    Mälardalen University, School of Innovation, Design and Engineering. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Kristina, Lundqvist
    Mälardalen University, School of Innovation, Design and Engineering. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hänninen, Kaj
    Mälardalen University, School of Innovation, Design and Engineering. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Regression verification of AADL models through slicing of system dependence graphs2014In: QoSA 2014 - Proceedings of the 10th International ACM SIGSOFT Conference on Quality of Software Architectures (Part of CompArch 2014), 2014, p. 103-112Conference paper (Refereed)
    Abstract [en]

    Design artifacts of embedded systems are subjected to a number of modifications during the development process. Verified artifacts that subsequently are modified must nec- essarily be re-Verified to ensure that no faults have been introduced in response to the modification. We collectively call this type of verification as regression verification. In this paper, we contribute with a technique for selective regression verification of embedded systems modeled in the Architec- ture Analysis and Design Language (AADL). The technique can be used with any AADL-based verification technique to eficiently perform regression verification by only selecting verification sequences that cover parts that are afiected by the modification for re-execution. This allows for the avoid- ance of unnecessary re-verification, and thereby unnecessary costs. The selection is based on the concept of specification slicing through system dependence graphs (SDGs) such that the efiect of a modification can be identified.

  • 2857.
    Johnsen, Andreas
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lundqvist, Kristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hänninen, Kaj
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    AQAT: The Architecture Quality Assurance Tool for Critical Embedded Systems2017In: Proceedings - International Symposium on Software Reliability Engineering, ISSRE, Volume 2017, 2017, p. 260-270, article id 8109092Conference paper (Refereed)
    Abstract [en]

    Architectural engineering of embedded systems comprehensively affects both the development processes and the abilities of the systems. Verification of architectural engineering is consequently essential in the development of safety- and mission-critical embedded system to avoid costly and hazardous faults. In this paper, we present the Architecture Quality Assurance Tool (AQAT), an application program developed to provide a holistic, formal, and automatic verification process for architectural engineering of critical embedded systems. AQAT includes architectural model checking, model-based testing, and selective regression verification features to effectively and efficiently detect design faults, implementation faults, and faults created by maintenance modifications. Furthermore, the tool includes a feature that analyzes architectural dependencies, which in addition to providing essential information for impact analyzes of architectural design changes may be used for hazard analysis, such as the identification of potential error propagations, common cause failures, and single point failures. Overviews of both the graphical user interface and the back-end processes of AQAT are presented with a sensor-to-actuator system example.

  • 2858.
    Johnsen, Andreas
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lundqvist, Kristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hänninen, Kaj
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Torelm, M.
    Bombardier Transportation Sweden AB, Västerås, Sweden.
    AQAF: An architecture quality assurance framework for systems modeled in AADL2016In: Proceedings - 2016 12th International ACM SIGSOFT Conference on Quality of Software Architectures, QoSA 2016, 2016, p. 31-40Conference paper (Refereed)
    Abstract [en]

    Architecture engineering is essential to achieve dependability of critical embedded systems and affects large parts of the system life cycle. There is consequently little room for faults, which may cause substantial costs and devastating harm. Verification in architecture engineering should therefore be holistically and systematically managed in the development of critical embedded systems, from requirements analysis and design to implementation and maintenance. In this paper, we address this problem by presenting AQAF: an Architecture Quality Assurance Framework for critical embedded systems modeled in the Architecture Analysis and Design Language (AADL). The framework provides a holistic set of verification techniques with a common formalism and semantic domain, architecture flow graphs and timed automata, enabling completely formal and automated verification processes covering virtually the entire life cycle. The effectiveness and efficiency of the framework are validated in a case study comprising a safety-critical train control system. 

  • 2859.
    Johnsen, Andreas
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lundqvist, Kristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hänninen, Kaj
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Torelm, Martin
    Bombardier Transp., Sweden .
    Experience Report: Evaluating Fault Detection Effectiveness and Resource Efficiency of the Architecture Quality Assurance Framework and Tool2017In: Proceedings - International Symposium on Software Reliability Engineering, ISSRE. Volume 2017, 2017, p. 271-281, article id 8109093Conference paper (Refereed)
    Abstract [en]

    The Architecture Quality Assurance Framework (AQAF) is a theory developed to provide a holistic and formal verification process for architectural engineering of critical embedded systems. AQAF encompasses integrated architectural model checking, model-based testing, and selective regression verification techniques to achieve this goal. The Architecture Quality Assurance Tool (AQAT) implements the theory of AQAF and enables automated application of the framework. In this paper, we present an evaluation of AQAT and the underlying AQAF theory by means of an industrial case study, where resource efficiency and fault detection effectiveness are the targeted properties of evaluation. The method of fault injection is utilized to guarantee coverage of fault types and to generate a data sample size adequate for statistical analysis. We discovered important areas of improvement in this study, which required further development of the framework before satisfactory results could be achieved. The final results present a 100% fault detection rate at the design level, a 98.5% fault detection rate at the implementation level, and an average increased efficiency of 6.4% with the aid of the selective regression verification technique.

  • 2860.
    Johnson, Ludwig
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Mårtensson, Lukas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Assessing HTTP Security Header implementations: A study of Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks2021Independent thesis Basic level (degree of Bachelor), 12 credits / 18 HE creditsStudent thesis
    Abstract [en]

    Background. Security on the web is a fundamental requirement as it becomes a bigger part of society and more information than ever is shared over it. However, as recent incidents have shown, even Swedish government agencies have had issues with their website security. One such example is when a client-side supply chain for several governmental websites was hacked and malicious javascript was subsequently found on several governmental websites. Hence this study is aimed at assessing the security of Swedish government agencies’ first line of defense against attacks like XSS and client-side supply chain.

    Objectives. The main objective of the thesis is to assess the first line of defense, namely HTTP security headers, of Swedish government agency websites. In addition, collecting statistics of what HTTP security headers are actually used by Swedish government agencies today were gathered for comparison with similar studies.

    Methods. To fulfill the objectives of the thesis, a scan of all Swedish government agency websites, found on Myndighetsregistret, was completed and an algorithm was developed to assess the implementation of the security features. In order to facilitate tunable assessments for different types of websites, the algorithm has granular weights that can be assigned to each test to make the algorithm more generalized.

    Results. The results show a low overall implementation rate of the various HTTP security headers among the Swedish government agency websites. However, when compared to similar studies, the adoption of all security features are higher among the Swedish government agency websites tested in this thesis.

    Conclusions. Previous tools/studies mostly checked if a header was implemented or not. With our algorithm, the strength of the security header implementation is also assessed. According to our results, there is a significant difference between if a security header has been implemented, and if it has been implemented well, and provides adequate security. Therefore, traditional tools for testing HTTP security headers may be inefficient and misleading.

    Download full text (pdf)
    Assessing HTTP Security Header implementations: A study of Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks
  • 2861.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Predicting the effort of program language comprehension: The case of HLL vs. Assembly2005Report (Other academic)
    Abstract [en]

    One important aspect of the quality of programming languages is the effort required by a programmer to understand code written in the language. A historical case where this issue was at the forefront was in the debate between the proponents of high-level languages (HLL) and Assembly languages, where the main argument for HLLs were that they were easier for people to understand.

    Being one out of a series of articles arguing for a unified theory for software engineering, this article proposes the use of a specific theoretical model from the discipline of cognitive psychology as a tool for predicting language comprehension effort. Describing human problem solving faculties, the ACT-R model [Anderson and Lebiere 1998] predicts that the effort of understanding a program written in C is only 36,5% of the effort of understanding a comparable program written in Assembly.

    In order to validate the theory, an experiment was performed where a number of engineering students were exposed to tasks of program comprehension. This empirical assessment demonstrated that the effort of understanding a program written in C is 32,5% of the effort of understanding a comparable program written in Assembly. Comparing the results of the theoretical predictions and the empirical assessments of program comprehension effort, we find that the theoretical model performs surprisingly well. The prediction error for the execution of an Assembly program was 5,1% while the error for C was 6,8%. The prediction error for the ratio between the two program languages amounted to 12,6%. 

    Download full text (pdf)
    JohnsonEkstedt2005
  • 2862.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Iacob, Maria Eugenia
    Välja, Margus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    van Sinderen, Marten
    Magnusson, Christer
    Ladhe, Tobias
    A method for predicting the probability of business network profitability2014In: Information Systems and E-Business Management, ISSN 1617-9846, E-ISSN 1617-9854, Vol. 12, no 4, p. 567-593Article in journal (Refereed)
    Abstract [en]

    In the design phase of business collaboration, it is desirable to be able to predict the profitability of the business-to-be. Therefore, techniques to assess qualities such as costs, revenues, risks, and profitability have been previously proposed. However, they do not allow the modeler to properly manage uncertainty with respect to the design of the considered business collaboration. In many real collaboration projects today, uncertainty regarding the business' present or future characteristics is so significant that ignoring it becomes problematic. In this paper, we propose an approach based on the predictive, probabilistic architecture modeling framework (P2AMF), capable of advanced and probabilistically sound reasoning about profitability risks. The P2AMF-based approach for profitability risk prediction is also based on the e3-value modeling language and on the object constraint language. The paper introduces the prediction and modeling approach, and a supporting software tool. The use of the approach is illustrated by means of a case study originated from the Stockholm Royal Seaport smart city project.

  • 2863.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johansson, Erik
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Assessment of Business Process Information Security2007In: International Journal of Business Process Integration and Management, ISSN 1741-8763, Vol. 3, no 2, p. 118-130Article in journal (Refereed)
    Abstract [en]

    Business processes are increasingly dependent on their supporting information systems. With this dependence comes an increased security risk with respect to the information flowing through the processes. This paper presents a method for assessment of the level of information security within business processes in the form of a percentage number, where a high score indicates good information security and a low score indicates a poor level of information security. The method also provides a numerical estimate of the credibility of the information security score, so that an assessment based on few and uncertain pieces of evidence is associated with low credibility and an assessment based on a large set of trustworthy evidence is associated with high credibility. A common problem with information security assessments is the cost related to collecting the required evidence. The paper proposes an evidence collection strategy designed to minimize the effort spent on gathering assessment data while maintaining the desired credibility of the results. A case study is presented, demonstrating the use of the method.

  • 2864.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Franke, Ulrik
    SICS.
    Can the Common Vulnerability Scoring System be Trusted?: A Bayesian Analysis2018In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 15, no 6, p. 1002-1015, article id 7797152Article in journal (Refereed)
    Abstract [en]

    The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for assessing software vulnerabilities. However, it has been criticized for lack of validity and practitioner relevance. In this paper, the credibility of the CVSS scoring data found in five leading databases – NVD, X-Force, OSVDB, CERT-VN, and Cisco – is assessed. A Bayesian method is used to infer the most probable true values underlying the imperfect assessments of the databases, thus circumventing the problem that ground truth is not known. It is concluded that with the exception of a few dimensions, the CVSS is quite trustworthy. The databases are relatively consistent, but some are better than others. The expected accuracy of each database for a given dimension can be found by marginalizing confusion matrices. By this measure, NVD is the best and OSVDB is the worst of the assessed databases.

  • 2865.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Franke, U.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Modeling and analyzing systems-of-systems in the Multi-Attribute Prediction Language (MAPL)2016In: Proceedings - 4th International Workshop on Software Engineering for Systems-of-Systems, SESoS 2016, Association for Computing Machinery (ACM), 2016, p. 1-7Conference paper (Refereed)
    Abstract [en]

    The Multi-Attribute Prediction Language (MAPL), an analysis metamodel for non-functional qualities of systems-ofsystems, is introduced. MAPL features analysis in five nonfunctional areas: service cost, service availability, data accuracy, application coupling, and application size. In addition, MAPL explicitly includes utility modeling to make tradeoffs between the qualities. The paper introduces how each of the five non-functional qualities is modeled and quantitatively analyzed based on the ArchiMate standard for enterprise architecture modeling and the previously published Predictive, Probabilistic Architecture Modeling Framework, building on the well-known UML and OCL formalisms. The main contribution of MAPL lies in combining all five nonfunctional analyses into a single unified framework.

  • 2866.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Buschle, Markus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Franke, Ulrik
    FOI - Swedish Defence Research Agency, Sweden.
    Shahzad, Khurram
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    An architecture modeling framework for probabilistic prediction2014In: Information Systems and E-Business Management, ISSN 1617-9846, E-ISSN 1617-9854, Vol. 12, no 4, p. 595-622Article in journal (Refereed)
    Abstract [en]

    In the design phase of business and IT system development, it is desirable to predict the properties of the system-to-be. A number of formalisms to assess qualities such as performance, reliability and security have therefore previously been proposed. However, existing prediction systems do not allow the modeler to express uncertainty with respect to the design of the considered system. Yet, in contemporary business, the high rate of change in the environment leads to uncertainties about present and future characteristics of the system, so significant that ignoring them becomes problematic. In this paper, we propose a formalism, the Predictive, Probabilistic Architecture Modeling Framework (P(2)AMF), capable of advanced and probabilistically sound reasoning about business and IT architecture models, given in the form of Unified Modeling Language class and object diagrams. The proposed formalism is based on the Object Constraint Language (OCL). To OCL, P(2)AMF adds a probabilistic inference mechanism. The paper introduces P(2)AMF, describes its use for system property prediction and assessment and proposes an algorithm for probabilistic inference.

  • 2867.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Vernotte, Alexandre
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach2016In: Availability, Reliability and Security (ARES), 2016 11th International Conference on, IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    In this paper we introduce pwnPr3d, a probabilistic threat modeling approach for automatic attack graph generation based on network modeling. The aim is to provide stakeholders in organizations with a holistic approach that both provides high-level overview and technical details. Unlike many other threat modeling and attack graph approaches that rely heavily on manual work and security expertise, our language comes with built-in security analysis capabilities. pwnPr3d generates probability distributions over the time to compromise assets.

  • 2868.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Vernotte, Alexandre
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Gorton, Dan
    Foreseeti AB, Sweden.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Quantitative Information Security Risk Estimation using Probabilistic Attack Graphs2016In: RISK: International Workshop on Risk Assessment and Risk-driven Testing: 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, Springer, 2016, Vol. 10224, p. 37-52Conference paper (Refereed)
    Abstract [en]

    This paper proposes an approach, called pwnPr3d, for quantitatively estimating information security risk in ICT systems. Unlike many other risk analysis approaches that rely heavily on manual work and security expertise, this approach comes with built-in security risk analysis capabilities. pwnPr3d combines a network architecture modeling language and a probabilistic inference engine to automatically generate an attack graph, making it possible to identify threats along with the likelihood of these threats exploiting a vulnerability. After defining the value of information assets to their organization with regards to confidentiality, integrity and availability breaches, pwnPr3d allows users to automatically quantify information security risk over time, depending on the possible progression of the attacker. As a result, pwnPr3d provides stakeholders in organizations with a holistic approach that both allows high-level overview and technical details.

  • 2869.
    Johnsson, Arvid
    Linköping University, Department of Computer and Information Science, Human-Centered systems. Linköping University, Faculty of Science & Engineering.
    Extending a framework for a play and learn game with drag and drop, a subgame and visual feedback2015Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [en]

    This report documents and describes the process of the extension of a JavaScript frameworkfor the math game Magical Island and implementation of one of its subgames. Moreover itdetails the implementation of visual feedback within this subgame based on literature aboutfeedback within games. The method details the implementation process one system at a time,starting with a study of the code and ending with the implementation of the visual feedback.The results show that a systematic approach where an understanding of the existing code isthe most important thing when extending and implementing new features in a framework.They also show that to properly design a system for visual feedback knowledge of theresearch within this field is needed.

    Download full text (pdf)
    fulltext
  • 2870.
    Joigneau, Axel
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Utterances classifier for chatbots’ intents2018Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Chatbots are the next big improvement in the era of conversational services. A chatbot is a virtual person who can carry out a conversation with a human about a certain subject, using interactive textual skills. Currently, there are many cloud-based chatbots services that are being developed and improved such as IBM Watson, well known for winning the quiz show “Jeopardy!” in 2011.

    Chatbots are based on a large amount of structured data. They contains many examples of questions that are associated to a specific intent which represents what the user wants to say. Those associations are currently being done by hand, and this project focuses on improving this data structuring using both supervised and unsupervised algorithms.

    A supervised reclassification using an improved Barycenter method reached 85% in precision and 75% in recall for a data set containing 2005 questions. Questions that did not match any intent were then clustered in an unsupervised way using a K-means algorithm that reached a purity of 0.5 for the optimal K chosen.

    Download full text (pdf)
    report Axel Joigneau
  • 2871.
    Jokimäki, Per Hannes
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Integration mot databas: Sitebase2022Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Industriella projekt inom områden som exempelvis pappers-, massa-, kemisk-, gruv-, och energiindustri är mycket omfattande när det gäller ingenjörsarbete som så småningom mynnar i ett montagearbete. Dels är anläggningskonstruktionsarbete tidskrävande, dels är det fråga om stora montage med mycket omfattande kostnader i material och arbetstimmar.

    En annan mycket viktig faktor är tidsaspekten. Traditionellt utfördes tidigare efter genomförd förstudie, konstruktionsarbete till stora delar manuellt trots att datorstöd användes i viss omfattning både för materielspecifikaton och upprättande av ritningsunderlag för montage. Både förstudie- och projekteringstiden minskar hela tiden, dels mycket på grund av ekonomiska skäl i investeringsfasen, dels vill företagen komma i produktion så fort som möjligt efter det att investeringsbeslut är fattat.Av den anledningen måste man med alla medel och med hjälp av modern teknik utveckla rationella metoder för att krympa den tid som behövs för att en investering ska bli så kostnadseffektiv som möjligt.

    SiteBase® är ett verktyg för att effektivisera och säkra information så som ritningar och dokument för anläggningsägare, leverantörer eller konsulter. Alla arbetar mot samma nav men anpassning, beroende på vad man har för syfte, görs mot strukturer och standarder. 

    Eftersom all nödvändig information för det specifika projektet ska hanteras, så gäller det att importera och exportera information men hjälp av en säker kommunikationskälla i form av exempelvis SiteBaseWEBApi. Det är en integrationslänk som även ger möjligheten för externa program att kommunicera mot SiteBase®. 

    Download full text (pdf)
    fulltext
  • 2872.
    Jolak, Rodi
    et al.
    University of Gothenburg, Sweden; Chalmers University of Technology, Sweden; Volvo Car Corporation, Sweden.
    Rosenstatter, Thomas
    Chalmers University of Technology, Sweden.
    Mohamad, Mazen
    University of Gothenburg, Sweden; Chalmers University of Technology, Sweden.
    Strandberg, Kim
    Chalmers University of Technology, Sweden; Volvo Car Corporation, Sweden.
    Sangchoolie, Behrooz
    RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.
    Nowdehi, Nasser
    Volvo Car Corporation, Sweden.
    Scandariato, Ricardo
    Hamburg University of Technology, Germany.
    CONSERVE: A framework for the selection of techniques for monitoring containers security2022In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 186, article id 111158Article in journal (Refereed)
    Abstract [en]

    Context: Container-based virtualization is gaining popularity in different domains, as it supports continuous development and improves the efficiency and reliability of run-time environments. Problem: Different techniques are proposed for monitoring the security of containers. However, there are no guidelines supporting the selection of suitable techniques for the tasks at hand. Objective: We aim to support the selection and design of techniques for monitoring container-based virtualization environments. Approach:: First, we review the literature and identify techniques for monitoring containerized environments. Second, we classify these techniques according to a set of categories, such as technical characteristic, applicability, effectiveness, and evaluation. We further detail the pros and cons that are associated with each of the identified techniques. Result: As a result, we present CONSERVE, a multi-dimensional decision support framework for an informed and optimal selection of a suitable set of container monitoring techniques to be implemented in different application domains. Evaluation: A mix of eighteen researchers and practitioners evaluated the ease of use, understandability, usefulness, efficiency, applicability, and completeness of the framework. The evaluation shows a high level of interest, and points out to potential benefits. © 2021 The Authors

  • 2873.
    Jonas, Traub
    KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS. KTH.
    Rich window discretization techniques in distributed stream processing2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 2874.
    Jonell, Patrik
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Scalable Methods for Developing Interlocutor-aware Embodied Conversational Agents: Data Collection, Behavior Modeling, and Evaluation Methods2022Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    This work presents several methods, tools, and experiments that contribute to the development of interlocutor-aware Embodied Conversational Agents (ECAs). Interlocutor-aware ECAs take the interlocutor's behavior into consideration when generating their own non-verbal behaviors. This thesis targets the development of such adaptive ECAs by identifying and contributing to three important and related topics:

    1) Data collection methods are presented, both for large scale crowdsourced data collection and in-lab data collection with a large number of sensors in a clinical setting. Experiments show that experts deemed dialog data collected using a crowdsourcing method to be better for dialog generation purposes than dialog data from other commonly used sources. 2) Methods for behavior modeling are presented, where machine learning models are used to generate facial gestures for ECAs. Both methods for single speaker and interlocutor-aware generation are presented. 3) Evaluation methods are explored and both third-party evaluation of generated gestures and interaction experiments of interlocutor-aware gestures generation are being discussed. For example, an experiment is carried out investigating the social influence of a mimicking social robot. Furthermore, a method for more efficient perceptual experiments is presented. This method is validated by replicating a previously conducted perceptual experiment on virtual agents, and shows that the results obtained using this new method provide similar insights (in fact, it provided more insights) into the data, simultaneously being more efficient in terms of time evaluators needed to spend participating in the experiment. A second study compared the difference between performing subjective evaluations of generated gestures in the lab vs. using crowdsourcing, and showed no difference between the two settings. A special focus in this thesis is given to using scalable methods, which allows for being able to efficiently and rapidly collect interaction data from a broad range of people and efficiently evaluate results produced by the machine learning methods. This in turn allows for fast iteration when developing interlocutor-aware ECAs behaviors.

    Download full text (pdf)
    fulltext
  • 2875.
    Jonell, Patrik
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Deichler, Anna
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Torre, Ilaria
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Robotics, Perception and Learning, RPL.
    Leite, Iolanda
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Robotics, Perception and Learning, RPL.
    Beskow, Jonas
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Mechanical Chameleons: Evaluating the effects of a social robot’snon-verbal behavior on social influence2021In: Proceedings of SCRITA 2021, a workshop at IEEE RO-MAN 2021, 2021Conference paper (Refereed)
    Abstract [en]

    In this paper we present a pilot study which investigates how non-verbal behavior affects social influence in social robots. We also present a modular system which is capable of controlling the non-verbal behavior based on the interlocutor's facial gestures (head movements and facial expressions) in real time, and a study investigating whether three different strategies for facial gestures ("still", "natural movement", i.e. movements recorded from another conversation, and "copy", i.e. mimicking the user with a four second delay) has any affect on social influence and decision making in a "survival task". Our preliminary results show there was no significant difference between the three conditions, but this might be due to among other things a low number of study participants (12). 

    Download full text (pdf)
    fulltext
  • 2876.
    Jonell, Patrik
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Kucherenko, Taras
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Robotics, Perception and Learning, RPL.
    Ekstedt, Erik
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Beskow, Jonas
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Learning Non-verbal Behavior for a Social Robot from YouTube Videos2019Conference paper (Refereed)
    Abstract [en]

    Non-verbal behavior is crucial for positive perception of humanoid robots. If modeled well it can improve the interaction and leave the user with a positive experience, on the other hand, if it is modelled poorly it may impede the interaction and become a source of distraction. Most of the existing work on modeling non-verbal behavior show limited variability due to the fact that the models employed are deterministic and the generated motion can be perceived as repetitive and predictable. In this paper, we present a novel method for generation of a limited set of facial expressions and head movements, based on a probabilistic generative deep learning architecture called Glow. We have implemented a workflow which takes videos directly from YouTube, extracts relevant features, and trains a model that generates gestures that can be realized in a robot without any post processing. A user study was conducted and illustrated the importance of having any kind of non-verbal behavior while most differences between the ground truth, the proposed method, and a random control were not significant (however, the differences that were significant were in favor of the proposed method).

    Download full text (pdf)
    fulltext
  • 2877.
    Jonell, Patrik
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH.
    Yoon, Youngwoo
    Electronics and Telecommunications Research Institute (ETRI) and Korea Advanced Institute of Science and Technology (KAIST), Korea,.
    Wolfert, Pieter
    IDLAB, Ghent University - imec.
    Kucherenko, Taras
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Robotics, Perception and Learning, RPL.
    Henter, Gustav Eje
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Speech, Music and Hearing, TMH. KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Robotics, Perception and Learning, RPL.
    HEMVIP: Human Evaluation of Multiple Videos in Parallel2021In: ICMI '21: Proceedings of the 2021 International Conference on Multimodal Interaction, New York, NY, United States: Association for Computing Machinery (ACM) , 2021, p. 707-711Conference paper (Refereed)
    Abstract [en]

    In many research areas, for example motion and gesture generation, objective measures alone do not provide an accurate impression of key stimulus traits such as perceived quality or appropriateness. The gold standard is instead to evaluate these aspects through user studies, especially subjective evaluations of video stimuli. Common evaluation paradigms either present individual stimuli to be scored on Likert-type scales, or ask users to compare and rate videos in a pairwise fashion. However, the time and resources required for such evaluations scale poorly as the number of conditions to be compared increases. Building on standards used for evaluating the quality of multimedia codecs, this paper instead introduces a framework for granular rating of multiple comparable videos in parallel. This methodology essentially analyses all condition pairs at once. Our contributions are 1) a proposed framework, called HEMVIP, for parallel and granular evaluation of multiple video stimuli and 2) a validation study confirming that results obtained using the tool are in close agreement with results of prior studies using conventional multiple pairwise comparisons.

    Download full text (pdf)
    fulltext
  • 2878.
    Jongeling, Robbert
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Considerations about consistency management for industrial model-based development2019In: CEUR Workshop Proceedings, vol 2510, CEUR-WS , 2019, Vol. 2510Conference paper (Refereed)
    Abstract [en]

    Model-based development of complex embedded systems commonly leverages multiple models to describe systems at different levels of abstraction and from different viewpoints. Inconsistencies between these models may cause delays or late changes throughout system design, development and maintenance. Therefore, an efficient model-based development practice requires support for managing consistency between different models. This is complicated in practice because these models are possibly created in several different modelling languages and modelling tools. Furthermore, in order to be suitable for industrial adoption, consistency checking support must fit within current development processes and environments. This extended abstract describes a model-based development scenario from which a need for consistency checking emerges, followed by a discussion of requirements for consistency checking from a development process point of view. We also include a brief summary of early work on a prototype tool addressing these requirements. Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).

  • 2879.
    Jongeling, Robbert
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    How to Live with Inconsistencies in Industrial Model-Based Development Practice2019In: Doctoral Symposium at ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems. DS@MODELS, 2019, p. 642-647, article id 8904865Conference paper (Refereed)
    Abstract [en]

    Modern development of complex embedded systems utilizes models to describe multiple different views on the same system. Consistency between these models is essential to successful development but ensuring it is in current practice often a manual effort. In this research project, we aim to develop a methodology that helps developers to maintain consistency in industrial model-based development projects by identifying inconsistencies throughout the development and maintenance of the system. For such support to be applicable in industrial practice, it should fit in with current development, i.e., should be able to identify inconsistencies between models expressed in different modeling languages and created in different modeling tools. Furthermore, the required user interaction to defining consistency checks should be minimal. This paper sketches an approach meeting these requirements, initial results towards it and discusses future research plans towards a doctoral dissertation.

  • 2880.
    Jongeling, Robbert
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bhatambrekar, S.
    Tetra Pak, Lund, Sweden.
    Lofberg, A.
    Tetra Pak, Lund, Sweden.
    Cicchetti, Antonio
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ciccozzi, Federico
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Carlson, Jan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Identifying manual changes to generated code: Experiences from the industrial automation domain2021In: Proceedings - 24th International Conference on Model-Driven Engineering Languages and Systems, MODELS 2021, Institute of Electrical and Electronics Engineers Inc. , 2021, p. 35-45Conference paper (Refereed)
    Abstract [en]

    In this paper, we report on a case study in an industrial setting where code is generated from models, and, for various reasons, that generated code is then manually modified. To enhance the maintainability of both models and code, consistency between them is imperative. A first step towards establishing that consistency is to identify the manual changes that were made to the code after it was generated and deployed. Identifying the delta is not straightforward and requires pre-processing of the artifacts. The main mechanics driving our solution are higher-order transformations, which make the implementation scalable and robust to small changes in the modeling language. We describe the specific industrial setting of the problem, as well as the experiences and lessons learned from developing, implementing, and validating our solution together with our industrial partner. 

  • 2881.
    Jongeling, Robbert
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Carlson, Jan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Cicchetti, Antonio
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Impediments to Introducing Continuous Integration for Model-Based Development in Industry2019In: Euromicro Conference on Software Engineering and Advanced Applications SEAA 2019, Institute of Electrical and Electronics Engineers Inc. , 2019, p. 434-441, article id 8906729Conference paper (Refereed)
    Abstract [en]

    Model-based development and continuous integration each separately are methods to improve the productivity of development of complex modern software systems. We investigate industrial adoption of these two phenomena in combination, i.e., applying continuous integration practices in model-based development projects. Through semi-structured interviews, eleven engineers at three companies with different modelling practices share their views on perceived and experienced impediments to this adoption. We find some cases in which this introduction is undesired and expected to not be beneficial. For other cases, we find and categorize several impediments and discuss how they are dealt with in industrial practice. Model synchronization and tool interoperability are found the most challenging to overcome and the ways in which they are circumvented in g to overcome and the ways in which they are circumvented in practice are detrimental for introducing continuous integration.

    Download full text (pdf)
    fulltext
  • 2882.
    Jongeling, Robbert
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Cicchetti, Antonio
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ciccozzi, Federico
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Carlson, Jan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Co-evolution of Simulink Models in a Model-Based Product Line2020In: MODELS '20: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2020, p. 263-273Conference paper (Refereed)
    Abstract [en]

    Co-evolution of metamodels and conforming models is a known challenge in model-driven engineering. A variation of co-evolution occurs in model-based software product line engineering, where it is needed to efficiently co-evolve various products together with the single common platform from which they are derived. In this paper, we aim to alleviate manual efforts during this co-evolution process in an industrial setting where Simulink models are partially reused across various products. We propose and implement an approach providing support for the co-evolution of reusable model fragments. A demonstration on a realistic example model shows that our approach yields a correct co-evolution result and is feasible in practice, although practical application challenges remain. Furthermore, we discuss insights from applying the approach within the studied industrial setting.

  • 2883.
    Jongeling, Robbert
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Innovation and Product Realisation.
    Ciccozzi, Federico
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Towards supporting malleable architecture models2023In: Proc. - IEEE Int. Conf. Softw. Archit. Companion, ICSA-C, Institute of Electrical and Electronics Engineers Inc. , 2023, p. 272-275Conference paper (Refereed)
    Abstract [en]

    Engineers commonly use informal diagrams for sketching, brainstorming, and communicating initial system designs. Diagramming is accessible, new concepts can be added freely, and diagrams can be specifically adjusted to communicate at the exact right level of abstraction depending on the audience. However, the information carried by informal diagrams is most often not precise enough for automation purposes, e.g. analysis. Consequently, there is a risk that these diagrams and the knowledge carried by them are lost in slide decks or buried somewhere in a documentation space. Diagrammatic models, which, unlike informal diagrams, have well-defined syntax and semantics, can be used for automatic analysis of consistency, architectural conformance, change impact, and others. Given the preference for informal diagramming, complete adoption of modeling for architectures seems unlikely in industrial settings that we have studied so far. Therefore, we propose to support engineers to benefit from both these seemingly opposites, as well as to ensure that diagrams convey the right amount of information for the particular task at hand. We envision more malleable models, in which engineers can freely navigate along two orthogonal spectra: (1) horizontal, from informal diagramming to modeling and (2) vertical, from less to more details exposed by a diagram. This paper describes our vision for working with such malleable models, use cases for it, and research needed to make it possible.

  • 2884.
    Jongeling, Robbert
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Innovation and Product Realisation.
    Ciccozzi, Federico
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Cicchetti, Antonio
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Carlson, Jan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    From Informal Architecture Diagrams to Flexible Blended Models2022In: SOFTWARE ARCHITECTURE, ECSA 2022 / [ed] Gerostathopoulos, I Lewis, G Batista, T Bures, T, SPRINGER INTERNATIONAL PUBLISHING AG , 2022, Vol. 13444, p. 143-158Conference paper (Refereed)
    Abstract [en]

    For the early design and communication of software systems, architects commonly use informal diagrams. Due to their notational freedom and effectiveness for communication, informal diagrams are often preferred over models with a fixed syntax and semantics as defined by a modeling language. However, precisely because of this lack of established semantics, informal diagrams are of limited use in later development stages for analysis tasks such as consistency checking or change impact analysis. In this paper, we present an approach to reconciling informal diagramming and modeling such that architects can benefit from analysis based on the informal diagrams they are already creating. Our approach supports migrating from existing informal architecture diagrams to flexible models, i.e., partially treating diagrams as models while maintaining the freedom of free-form drawing. Moreover, to enhance the ease of interacting with the flexible models, we provide support for their blended textual and graphical editing. We validate our approach in a lab setting and perform an evaluative case study in an industrial setting. We show how the approach allows architects to continue informal diagramming, while also benefiting from flexible models for consistency checking between the intended architecture and the implementation.

  • 2885.
    Jongeling, Robbert
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fredriksson, Johan
    Saab AB, Järfälla, Sweden.
    Ciccozzi, Federico
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Cicchetti, Antonio
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Carlson, Jan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Towards Consistency Checking Between a System Model and its Implementation2020In: International Conference on Systems Modelling and Management ICSMM, Springer Science and Business Media Deutschland GmbH , 2020, Vol. 1262, p. 30-39Conference paper (Refereed)
    Abstract [en]

    In model-based systems engineering, a system model is the central development artifact containing architectural and design descriptions of core parts of the system. This abstract representation of the system is then partly realized in code. Throughout development, both system model and code evolve independently, incurring the risk of them drifting apart. Inconsistency between model and code can lead to errors in development, resulting in delayed or erroneous implementation. We present a work in progress towards automated mechanisms for checking consistency between a system model and code, within an industrial model-based systems engineering setting. In particular, we focus on automatically establishing traceability links between elements of the system model and parts of the code. The paper describes the challenges in achieving this in industrial practices and outlines our envisioned approach to overcome those challenges.

  • 2886.
    Jongeling, Robbert
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Innovation and Product Realisation.
    Vallecillo, A.
    ITIS Software. Universidad de Malaga, Malaga, Spain .
    Uncertainty-Aware consistency checking in industrial settings2023In: Proceedings - ACM/IEEE 26th International Conference on Model Driven Engineering Languages and Systems, MODELS 2023, Institute of Electrical and Electronics Engineers Inc. , 2023, p. 73-83Conference paper (Refereed)
    Abstract [en]

    In this work, we explore how we can assist engineers in managing, in a lightweight way, both consistency and design uncertainty during the creation and maintenance of models and other development artifacts. We propose annotating degrees of doubt to indicate design uncertainties on elements of development artifacts. To combine multiple opinions, we use the fusion operators of subjective logic. We show how these annotations can be used to identify, prioritize, and resolve uncertainty and inconsistency. To do so, we identify the types of design uncertainty and inconsistency to be addressed in two concrete industrial settings and show a prototype implementation of our approach to calculating the uncertainty and inconsistency in these cases. We show how making design uncertainty explicit could be used to tolerate inconsistencies with high uncertainty, prioritize inconsistencies with low associated uncertainty, and uncover previously hidden potential inconsistencies. 

  • 2887.
    Jonsson, Bengt
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Computer Systems.
    Lång, Magnus
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Computer Systems.
    Sagonas, Konstantinos
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science. NTUA, Athens, Greece.
    Awaiting for Godot: Stateless Model Checking that Avoids Executions where Nothing Happens2022In: 2022 Formal Methods in Computer-Aided Design (FMCAD) / [ed] A. Griggio; N. Rungta, TU Wien Academic Press , 2022, p. 284-293Conference paper (Refereed)
    Abstract [en]

    Stateless Model Checking (SMC) is a verification technique for concurrent programs that checks for safety violations by exploring all possible thread schedulings. It is highly effective when coupled with Dynamic Partial Order Reduction (DPOR), which introduces an equivalence on schedulings and need explore only one in each equivalence class. Even with DPOR, SMC often spends unnecessary effort in exploring loop iterations that are pure, i.e., have no effect on the program state. We present techniques for making SMC with DPOR more effective on programs with pure loop iterations. The first is a static program analysis to detect loop purity and an associated program transformation, called Partial Loop Purity Elimination, that inserts assume statements to block pure loop iterations. Subsequently, some of these assumes are turned into await statements that completely remove many assume-blocked executions. Finally, we present an extension of the standard DPOR equivalence, obtained by weakening the conflict relation between events. All these techniques are incorporated into a new DPOR algorithm, OPTIMAL-DPOR-AWAIT, which can handle both awaits and the weaker conflict relation, is optimal in the sense that it explores exactly one execution in each equivalence class, and can also diagnose livelocks. Our implementation in NIDHUGG shows that these techniques can significantly speed up the analysis of concurrent programs that are currently challenging for SMC tools, both for exploring their complete set of interleavings, but even for detecting concurrency errors in them.

    Download full text (pdf)
    fulltext
  • 2888.
    Jonsson, Kristoffer
    et al.
    Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Engineering Sciences.
    Lundberg, David
    Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Engineering Sciences.
    Digital Interface for Intelligent Sensors2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digital Interface for Intelligent Sensors was a project whose goal was to create a digital network interface that enabled easy distribution of data from different types of digital sensors to a central computer. The purpose was to replace the already existing analogue data collection system, in order to benefit from the advantages of digital communication. This demanded a software protocol that satisfyingly would be implementable on a microcontroller. Along with software implementation the specific objective was to design, construct and build an intelligent hardware sensor device. This device was supposed to measure temperature, humidity, wind direction and wind speed by collecting information from adequate digital transducers.

    The project involved researches about bus-protocols as well as practically design and build circuits. A lot of software programming was made during the project, to get the device to work as expected. During research the Modbus-protocol was found to be the best option for our specific software needs. As for the hardware part, the core of the sensor device was based on an ATmega328 microcontroller. The ATmega328 proved to be a suitable hardware platform for implementing both the Modbus-protocol and the necessary code required to extract information from the transducers. By linking a computer to the system, working as a master, weather data from the device were able to be logged.

    The device was successfully installed on the roof at Ångströmslaboratoriet, house 2. The complete system enables other digital, Modbus implemented, devices to connect in order to communicate with the central computer. Having many devices can lead to rather complex systems. The system created in this project keeps track on all the installed devices using addresses, making a complex system easy to manage.

    The project also involved a brief collaboration with another group constructing a different digital measuring device. This device was able to connect to the system using the same Modbus-protocol and thereby communicating with the central computer.

    Download full text (pdf)
    fulltext
  • 2889.
    Jonsson, Lars
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    3D modeling of mineshaft using autonomous quad rotor2017Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In this master's thesis a multirotor with the ability to scan its surroundingswas built. To be able to produce these scans the multirotor will be equippedwith a custom built 3D LIDAR. In the future, the scans will be used togenerate a 3D map to visualize mineshafts in a well suited way for inspections.This multirotor is designed with the purpose to map mineshafts that areinaccessible to humans, due to safety reasons. To produce a 3D map of themultirotor surroundings the absolute position is needed. Since the multirotorwill be used in an environment where GPS is unavailable, the positioning issolved by utilizing an IMU and Computer Vision technology with a Rangingdevice.The functionality has been tested in a lab environment resembling real lifeoperational conditions, and conrms that it is possible to use this approachto scan an environment where it is possible to have the multirotor in line-ofsightfor the camera.The 3D scanning is relaying on a stable Wi-Fi connection and absolute positionand as long as this is established it is possible to use this point cloudfor inspection.The positioning of the multirotor is tested up to a range of 40 m, with amaximum measured accuracy of 5 cm, which is well within the range ofthe requirements of the application.

    Download full text (pdf)
    fulltext
  • 2890.
    Jonsson Lindahl, Nils
    Linköping University, Department of Computer and Information Science, Human-Centered systems.
    Utveckling av system förkommunikation med chattbottar2017Independent thesis Basic level (university diploma), 10,5 credits / 16 HE creditsStudent thesis
    Abstract [sv]

    Chattbottar har den senaste tiden, genom snabbmeddelandetjänsternas stora tillväxt, blivitallt populärare. Chattbottar används idag till allt från automatisk kundtjänst tillnöjesinriktade ändamål. Numera finns flera olika ramverk för att skapa chattbottar med olikaegenskaper.Syftet med detta arbete var att undersöka hur chattbottar kan integreras i existerandesnabbmeddelandetjänster på ett underhållbart och flexibelt sätt.

    En prototyplösning förmeddelandetjänsten Briteback skapades med opensource-ramverken React, Node.js och Deepstream. Rapporten beskriver för- och nackdelar med den valda lösningen specielltavseende flexibilitet och underhåll.

    Download full text (pdf)
    fulltext
  • 2891.
    Jonsson, Lisa
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Using machine learning to analyse EEG brain signals for inner speech detection2022Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Research on brain-computer interfaces (BCIs) has been around for decades and recently the inner speech paradigm was picked up in the area. The realization of a functioning BCI could improve the life quality of many people, especially persons affected by Locked-In-Syndrome or similar illnesses. Although implementing a working BCI is too large of a commitment for a master's thesis, this thesis will focus on investigating machine learning methods to decode inner speech using data collected from the non-invasive and portable method electroencephalography (EEG). Among the methods investigated are three CNN architectures and transfer learning. The results show that the EEGNet architecture consistently reaches high classification accuracies, with the best model achieving an accuracy of 29.05%.

    Download full text (pdf)
    fulltext
  • 2892.
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Why real-time communication matters2011Conference paper (Refereed)
    Abstract [en]

    Embedded systems normally need to react to external events in time if the application requirements are to be met. Moreover, as embedded systems more and more often consist of distributed sub-systems and nodes, they must rely on communication networks. Real-time communication methods and protocols are essential for such systems and must be chosen and developed carefully. Not only real-time demands must be supported, but also high throughput, low energy consumption, high reliability and cost-efficiency, depending on the specific application. Another challenge to consider comes from the dynamics in systems properties and application requirements in some applications. Novel cooperative embedded systems might even rely on wireless connectivity where mobility and the erroneous nature of the communication medium bring new challenges. In this paper, we give examples of challenges, applications and solutions to give an understanding of the importance and possibilities of real-time communication. The aim is also to give a brief overview of research on real-time communication performed at Halmstad University, and in what contexts the results can be useful. Both systems relying on wired and wireless communication are covered.

    Download full text (pdf)
    fulltext
  • 2893.
    Jonsson, Patrik
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Dobslaw, Felix
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media.
    Decision support system for variable speed regulation2012Conference paper (Refereed)
    Abstract [en]

    The problem of recommending a suitable speed limit for roads is important for road authorities in order to increase traffic safety. Nowadays, these speed limits can be given more dynamically, with digital speed regulation signs. The challenge here is input from the environment, in combination with probabilities for certain events. Here we present a decision support model based on a dynamic Bayesian network. The purpose of this model is to predict the appropriate speed on the basis of weather data, traffic density and road maintenance activities. The dynamic Bayesian network principle of using uncertainty for the involved variables gives a possibility to model the real conditions. This model shows that it is possible to develop automated decision support systems for variable speed regulation.

  • 2894.
    Jonsson, Robin
    et al.
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    Blixt, Simon
    Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
    High Orbit Ion Cannon: Går det att skydda sig?2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Download full text (pdf)
    High Orbit Ion Cannon - Går det att skydda sig?
  • 2895.
    Jonsson, Simon
    Linköping University, Department of Electrical Engineering, Computer Engineering.
    Designing a Scheduler for Cloud-Based FPGAs2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The primary focus of this thesis has been to design a network packet scheduler for the 5G (fifth generation) network at Ericsson in Linköping, Sweden. Network packet scheduler manages in which sequences the packages in a network will be transmitted, and will put them in a queue accordingly. Depending on the requirement for the system different packet schedulers will work in different ways. The scheduler that is designed in this thesis has a timing wheel as its core. The packages will be placed in the timing wheel depending on its final transmission time and will be outputted accordingly. The algorithm will be implemented on an FPGA (Field Programmable gate arrays). The FPGA itself is located in a cloud environment. The platform in which the FPGA is located on is called "Amazon EC2 F1", this platform can be rented with a Linux instance which comes with everything that is necessary to develop a synthesized file for the FPGA. Part of the thesis will discuss the design of the algorithm and how it was customized for a hardware implementation and part of the thesis will describe using the instance environment for development.

    Download full text (pdf)
    fulltext
  • 2896.
    Jordao, Rodolfo
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electronics and Embedded systems.
    Becker, Matthias
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electronics and Embedded systems.
    Sander, Ingo
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electronics and Embedded systems.
    Söderquist, Ingemar
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electronics and Embedded systems. Saab AB, Linköping, Sweden.
    Design space exploration for safe and optimal mapping of avionics functionality on IMA platforms2023In: AIAA/IEEE Digital Avionics Systems Conference: Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2023Conference paper (Refereed)
    Abstract [en]

        Future avionic systems will be increasingly automated. The size and complexity of the avionics functions in these systems will increase likewise. The degree of attainable automation directly depends on the avionics system's computing power and the efficiency of available tools that map the overall functionality onto the target heterogeneous platform architecture. In safety-critical scenarios, these automation tools must also provide safety guarantees that aid or drive the certification processes.

        In line with this automation goal, We propose a novel design space exploration technique for the mapping functionality on IMA platforms.    The design space exploration technique returns mappings of the functionality onto the platform that are safe and increasingly resource-efficient.    A safe mapping is one where the functional and extra-functional requirements are met.    A resource-efficient mapping is one where fewer processing elements are used to achieve a safe mapping.    More importantly, the proposed technique can return computational proof that no safe mapping is likely possible. This proof is key for safety-critical contexts.

        To demonstrate the suitability of our technique for avionics systems design scenarios, we investigate its use with an industrial avionics case based on the ones from the PANORAMA ITEA3 project. The case study includes two avionics functionalities,    one control functionality, and one streaming-like functionality. The platform is hierarchical and heterogeneous, with elements oriented for higher safety and elements oriented for higher performance.    The avionics case-study evaluation shows that our novel design space exploration technique's abstractions and assumptions adequately represent avionics design scenarios directly or through a systematic overestimation.

        The technique is openly available within the design space exploration tool IDeSyDe. Therefore, designers can immediately benefit from the optimality and safety guarantees given by our novel design space exploration technique in their avionics design process.

    Download full text (pdf)
    fulltext
  • 2897.
    Jormer, Jack
    et al.
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Arveteg, Fredrik
    University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
    Prestandajämförelse mellan en Cisco router och en DIY-router2021Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    This study aims to compare a specifically developed router with one built from leftover hardware in terms of performance loss at large routing tables. The goal is to see when the units reach their maximum capacity and if the maximum differs between them. This study is a further development of a study done in 2014 [1], where it was established that a Cisco 2901 can handle 115,000 routes before the memory is full. Our study implements a routing protocol to find out if it has any effect on the result.

    The result is that the two units are equivalent when it comes to forwarding packets, with only an average difference of just under 30 µs per packet in the given topology. The Cisco unit is maxed out on 198,496 routes and can still forward traffic. At 250 000 routes, the measurements on the DIY router were stopped

  • 2898.
    Jose Gomez-Hernandez, Eduardo
    et al.
    Univ Murcia, Dept Comp Engn, Murcia, Spain..
    Cebrian, Juan M.
    Univ Murcia, Dept Comp Engn, Murcia, Spain..
    Titos-Gil, Ruben
    Univ Murcia, Dept Comp Engn, Murcia, Spain..
    Kaxiras, Stefanos
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Computer Systems. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Ros, Alberto
    Univ Murcia, Dept Comp Engn, Murcia, Spain..
    Efficient, Distributed, and Non-Speculative Multi-Address Atomic Operations2021In: Proceedings of 54th Annual IEEE/ACM International Symposium on Microarchitecture, Micro 2021, Association for Computing Machinery (ACM), 2021, p. 337-349Conference paper (Refereed)
    Abstract [en]

    Critical sections that read, modify, and write (RMW) a small set of addresses are common in parallel applications and concurrent data structures. However, to escape from the intricacies of finegrained locks, which require reasoning about all possible thread interleavings, programmers often resort to coarse-grained locks to ensure atomicity. This results in atomic protection of a much larger set of potentially conflicting addresses, and, consequently, increased lock contention and unneeded serialization. As many before us have observed, these problems would be solved if only general RMW multi-address atomic operations were available, but current proposals are impractical because of deadlock scenarios that appear due to resource limitations. Alternatively, transactional memory can detect conflicts at run-time aiming to maximize concurrency, but it has significant overheads in highly-contended critical sections. In this work, we propose multi-address atomic operations (MAD atomics). MADatomics achieve complexity-effective, non-speculative, non-deadlocking, fine-grained locking for multiple addresses, relying solely on the coherence protocol and a predetermined locking order. Unlike prior works, MAD atomics address the challenge of enabling atomic modification over a set of cachelines with arbitrary addresses, simultaneously locking all of them while sidestepping deadlock. MAD atomics only require a small storage per core (around 68 bytes), while significantly outperforming typical lock implementations. Indeed, our evaluation using gem5-20 shows that MAD atomics can improve performance by up to 18x (3.4x, on average, for the applications and concurrent data structures evaluated in this work) over a baseline implemented with locks running on 16 cores. More importantly, the improvement still reaches 2.7x, on average, compared to an Intel hardware transactional memory implementation running on 16 cores.

  • 2899.
    Joshi, Sanjay. L.
    et al.
    Persistent Systems Limited, Bhaskar-Charak, Goa, India.
    Deshpande, Bharat
    BITS-Pilani Goa Campus, India.
    Punnekkat, Sasikumar
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    An Industrial Survey on the Influence of Process and Product Attributes on Software Product Reliability2017In: International Conference on Networks & Advances in Computational Technologies NetACT2017, Thiruvananthapuram, India: IEEE , 2017, p. 44-51Conference paper (Refereed)
    Abstract [en]

    Software reliability is a major attribute for software product and can be considered as one of the major performance parameters. Software Reliability unlike hardware reliability cannot be considered merely as function of time, although researchers have come up with models relating the two. In literature, numerous models on software reliability have been proposed but they seem to have limitations in being used to predict reliability in software industry. As on today, we do not have good quantitative methods developed to represent Software Reliability without excessive limitations. Various approaches can be used to improve the reliability of software, however, it is hard to balance the development time and the budget with required levels of software reliability. This paper quantitatively and qualitatively analyzes the data from an industrial survey, with focus on current practices and their dependency on the estimation of reliability in software product development environment. Analysis focuses on perception of predicting software reliability in different categories of respondents. Categorization of respondent is based on phase of development, their profile (as user, developer etc.), and application domain. While confirming some commonly known facts, our findings also show discrepancies between our perception and actual facts in some cases. The objective of this is exercise is to find out input parameters making impact on reliability. Though it is field perception, we have identified them from practitioners and taken as reference for conducting future experiments and literature survey. We believe that continued research efforts are essential to provide guidelines for reliability estimation process to take care of important but hitherto ignored factors, thus improving relevance and accuracy of reliability predictions.

  • 2900.
    Joshi, Sanjay. L.
    et al.
    Persistent Systems Limited, Bhaskar-Charak, Goa India.
    Deshpande, Bharat
    BITS-Pilani Goa Campus, India.
    Punnekkat, Sasikumar
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Do Software Reliability Prediction Models Meet Industrial Perceptions?2017In: Proceedings of the 10th Innovations in Software Engineering Conference ISEC-2017, ACM , 2017, p. 66-73Conference paper (Refereed)
    Abstract [en]

    Reliability is one of the key characteristics inherent in the concept "software quality". Understanding software reliability has been vital for both the software managers and software engineers, especially while developing critical systems. In the past several decades, an extensive body of knowledge has been developed and to a certain extent practical knowledge has been gathered by applying them to large scale mission- or safety-critical projects. However, software reliability models are falling short of gaining confidence in industrial community. From the software developer's perspective, software reliability has been primarily associated with defects, which represent a major cost factor in software development. This is called developer oriented approach. As software orientation has become ubiquitous, and software intensive systems have been proliferating, software quality assurance has been embracing more customer oriented perspectives. In this context, we will need richer, realistic and more accurate measures for software reliability. A recent empirical study by the authors highlighted many factors, which the practitioners perceived to be influential in the context of reliability prediction. This paper focuses on different reliability prediction models proposed in the literature, specifically examining whether the influential factors perceived to be contributing to the reliability are addressed or not in these models. We evaluated the assumptions made in each of the considered reliability models and checked their applicability in software product development. This paper concludes with a comparative presentation of a large set of well-known reliability models with respect to the set of factors identified by the industry as influential in software reliability.

55565758596061 2851 - 2900 of 6263
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf