首页 > 最新文献

2012 IEEE International Conference on Software Science, Technology and Engineering最新文献

英文 中文
Empirical Study Evaluating Business Process Modeling on Multi-touch Devices 多点触控设备业务流程建模的实证研究
Hauke Wittern
During business process modeling sessions it is difficult to prevent misunderstandings due to different expertise of the participants. Computers are supporting single persons at their work in various scenarios for quite a while. However, computers could not support reaching consensus yet and were not well suited for collaborative enterprise modeling. But now multi-touch input enables computer supported co-located collaborative work. Particularly, multi-touch tables seem promising to be beneficial for collaborative modeling sessions as sitting around a table supports discussions which can uncover misunderstandings. In this paper a collaborative business process modeling application is presented and evaluated in an empirical study. The study was carried out in 4 different test environments, including a multi-touch table. Finally, it is argued whether multi-touch tables really keep what they promise and whether they are better suited for business process modeling than other work environments.
在业务流程建模会议期间,很难避免由于参与者的专业知识不同而产生的误解。很长一段时间以来,计算机一直在各种情况下支持单身人士的工作。然而,计算机还不能支持达成共识,也不适合协作企业建模。但现在多点触控输入使计算机支持协同工作。特别是,多点触控表似乎有利于协作建模会议,因为围坐在桌子旁支持讨论,可以发现误解。本文提出了一个协作式业务流程建模应用,并对其进行了实证研究。该研究在4种不同的测试环境中进行,包括一个多点触控表。最后,本文讨论了多点触控表是否真的信守承诺,以及它们是否比其他工作环境更适合业务流程建模。
{"title":"Empirical Study Evaluating Business Process Modeling on Multi-touch Devices","authors":"Hauke Wittern","doi":"10.1109/SWSTE.2012.16","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.16","url":null,"abstract":"During business process modeling sessions it is difficult to prevent misunderstandings due to different expertise of the participants. Computers are supporting single persons at their work in various scenarios for quite a while. However, computers could not support reaching consensus yet and were not well suited for collaborative enterprise modeling. But now multi-touch input enables computer supported co-located collaborative work. Particularly, multi-touch tables seem promising to be beneficial for collaborative modeling sessions as sitting around a table supports discussions which can uncover misunderstandings. In this paper a collaborative business process modeling application is presented and evaluated in an empirical study. The study was carried out in 4 different test environments, including a multi-touch table. Finally, it is argued whether multi-touch tables really keep what they promise and whether they are better suited for business process modeling than other work environments.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"878 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125164779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Safety Process Patterns: Demystifying Safety Standards 安全过程模式:揭秘安全标准
Johannes Koskinen, M. Vuori, Mika Katara
Development of safety critical embedded systems is regulated by legislation and related standards. However, at least for beginners in the field, the standards are relatively hard to understand hindering their practical applicability. In this paper, we propose using process patterns to document the requirements for different lifecycle phases set in the safety standards. Ideally, such patterns could make these standards accessible to a wider audience of potential users. Moreover, the companies using the standards could enhance their quality manuals with the help of the patterns. In addition to the requirements set in the standards, the patterns should capture best practices in implementing the requirements. Such best practices could be application domain specific or company specific, according to the purpose of use and availability of information. To demonstrate our approach, we present example patterns identified from the IEC 61508-3 ed2.0 standard.
安全关键嵌入式系统的开发受到立法和相关标准的规范。然而,至少对于该领域的初学者来说,这些标准相对难以理解,阻碍了它们的实际适用性。在本文中,我们建议使用流程模式来记录安全标准中设置的不同生命周期阶段的需求。理想情况下,这样的模式可以使更多的潜在用户可以访问这些标准。此外,使用这些标准的公司可以借助这些模式来提高他们的质量手册。除了标准中的需求集之外,模式还应该捕获实现需求的最佳实践。根据使用目的和信息的可用性,这些最佳实践可以是特定于应用程序领域的,也可以是特定于公司的。为了演示我们的方法,我们给出了从IEC 61508-3 ed2.0标准中确定的示例模式。
{"title":"Safety Process Patterns: Demystifying Safety Standards","authors":"Johannes Koskinen, M. Vuori, Mika Katara","doi":"10.1109/SWSTE.2012.10","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.10","url":null,"abstract":"Development of safety critical embedded systems is regulated by legislation and related standards. However, at least for beginners in the field, the standards are relatively hard to understand hindering their practical applicability. In this paper, we propose using process patterns to document the requirements for different lifecycle phases set in the safety standards. Ideally, such patterns could make these standards accessible to a wider audience of potential users. Moreover, the companies using the standards could enhance their quality manuals with the help of the patterns. In addition to the requirements set in the standards, the patterns should capture best practices in implementing the requirements. Such best practices could be application domain specific or company specific, according to the purpose of use and availability of information. To demonstrate our approach, we present example patterns identified from the IEC 61508-3 ed2.0 standard.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Requirements Reuse: The State of the Practice 需求重用:实践的状态
Yuri Chernak
For several decades, software reuse has been a recognized solution to improving efficiency of software development. However, implementing reuse in practice remains challenging, and the IT community has little visibility into the state of the practice specifically as it pertains to reusing software requirements. This paper presents the results of a survey conducted in the global IT industry in 2010 and discusses the state of the practice for software requirements reuse. The survey studies reuse adoption in two different contexts, i.e., Software Product Lines and Software Maintenance. The analysis of the survey data focuses on the latter context as a more common case in practice and investigates the impact of various factors on reuse adoption and effectiveness.
几十年来,软件重用一直是公认的提高软件开发效率的解决方案。然而,在实践中实现重用仍然具有挑战性,并且IT社区对实践的具体状态几乎没有可视性,因为它与重用软件需求有关。本文介绍了2010年在全球IT行业进行的一项调查的结果,并讨论了软件需求重用的实践状态。该调查研究了两种不同环境下的重用采用,即软件产品线和软件维护。对调查数据的分析侧重于后一种情况,将其作为实践中更常见的情况,并调查各种因素对重用采用和有效性的影响。
{"title":"Requirements Reuse: The State of the Practice","authors":"Yuri Chernak","doi":"10.1109/SWSTE.2012.12","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.12","url":null,"abstract":"For several decades, software reuse has been a recognized solution to improving efficiency of software development. However, implementing reuse in practice remains challenging, and the IT community has little visibility into the state of the practice specifically as it pertains to reusing software requirements. This paper presents the results of a survey conducted in the global IT industry in 2010 and discusses the state of the practice for software requirements reuse. The survey studies reuse adoption in two different contexts, i.e., Software Product Lines and Software Maintenance. The analysis of the survey data focuses on the latter context as a more common case in practice and investigates the impact of various factors on reuse adoption and effectiveness.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131482033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Patentability of Software 软件可专利性
A. Wilk
The inclusion of algorithms and software in the scope of patent able subject matter has resulted in many software patents and in an ongoing debate on the contribution of software patents to innovation and economic growth. This paper describes the basic concepts of patent law, emphasizing differences between the U.S. and European approaches to software patents. It demonstrates the difficulties in determining if a software invention is patent able. It describes relevant problems and challenges, and suggests directions. It is important for computer professionals to gain knowledge in the patents domain, and this paper provides a useful introduction.
将算法和软件纳入可获得专利的主题范围,导致了许多软件专利,并引发了关于软件专利对创新和经济增长的贡献的持续辩论。本文描述了专利法的基本概念,强调了美国和欧洲在软件专利方面的差异。它展示了确定软件发明是否具有专利能力的困难。它描述了相关的问题和挑战,并提出了方向。对于计算机专业人员来说,获得专利领域的知识是非常重要的,本文提供了一个有用的介绍。
{"title":"Patentability of Software","authors":"A. Wilk","doi":"10.1109/SWSTE.2012.19","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.19","url":null,"abstract":"The inclusion of algorithms and software in the scope of patent able subject matter has resulted in many software patents and in an ongoing debate on the contribution of software patents to innovation and economic growth. This paper describes the basic concepts of patent law, emphasizing differences between the U.S. and European approaches to software patents. It demonstrates the difficulties in determining if a software invention is patent able. It describes relevant problems and challenges, and suggests directions. It is important for computer professionals to gain knowledge in the patents domain, and this paper provides a useful introduction.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130857777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resource-Oriented Middleware Abstractions for Pervasive Computing 面向资源的普适计算中间件抽象
M. Caporuscio, Marco Funaro, C. Ghezzi
The pervasive computing vision of the future communication and computational infrastructure is that we will be everywhere virtually connected with invisible computers, embedded in the environment. In this context, the challenge is to provide a middleware support that allows applications to have minimal assumptions about the environment while being able to dynamically adapt to the surrounding context. Specifically, the middleware should (i) deal with the run-time growth of the application in terms of involved resources (flexibility), (ii) accommodate heterogeneous and unforeseen functionalities into the running application (genericity), and (iii) discover new functionality at run time and rearrange the application accordingly (dynamism). To this extent, we devised the P-REST (Pervasive REST) architectural style and built the P RIME (P-rest Runtime) middleware to support it. PRIME allows a quick and effective development and execution P-REST applications by leveraging functional programming and code mobility.
未来通信和计算基础设施的普适计算愿景是,我们将无处不在地与嵌入环境中的隐形计算机虚拟连接。在这种上下文中,挑战在于提供一种中间件支持,允许应用程序对环境有最小的假设,同时能够动态地适应周围的上下文。具体来说,中间件应该(i)根据涉及的资源(灵活性)处理应用程序的运行时增长,(ii)在运行的应用程序中容纳异构和不可预见的功能(通用性),以及(iii)在运行时发现新功能并相应地重新安排应用程序(动态性)。在这种程度上,我们设计了P-REST(普世性REST)架构风格,并构建了P-REST运行时中间件来支持它。PRIME通过利用函数式编程和代码可移动性,允许快速有效地开发和执行P-REST应用程序。
{"title":"Resource-Oriented Middleware Abstractions for Pervasive Computing","authors":"M. Caporuscio, Marco Funaro, C. Ghezzi","doi":"10.1109/SWSTE.2012.13","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.13","url":null,"abstract":"The pervasive computing vision of the future communication and computational infrastructure is that we will be everywhere virtually connected with invisible computers, embedded in the environment. In this context, the challenge is to provide a middleware support that allows applications to have minimal assumptions about the environment while being able to dynamically adapt to the surrounding context. Specifically, the middleware should (i) deal with the run-time growth of the application in terms of involved resources (flexibility), (ii) accommodate heterogeneous and unforeseen functionalities into the running application (genericity), and (iii) discover new functionality at run time and rearrange the application accordingly (dynamism). To this extent, we devised the P-REST (Pervasive REST) architectural style and built the P RIME (P-rest Runtime) middleware to support it. PRIME allows a quick and effective development and execution P-REST applications by leveraging functional programming and code mobility.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124926883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Explaining Embedded Software Modelling Decisions 解释嵌入式软件建模决策
Jelena Marincic, A. Mader, R. Wieringa
As today's devices, gadgets and machines become more intelligent, the complexity of embedded software controlling them grows enormously. To deal with this complexity, embedded software is designed using model-based paradigms. The process of modelling is a combination of formal and creative, design steps. Because of the partially non-formal character of modelling, the relation between a model and the system cannot be expressed mathematically. Therefore, the modeller's justification that the model represents the system adequately can only be non-formal. In this paper we discuss the nature of non-formal modelling steps and pin-point those that create a 'link' between the model and the system. We propose steps to structure the explanation and justification of non-formal modelling decisions. This in turn should enhance confidence that the non-formal, physical world surrounding the embedded system is adequately represented in the model.
随着今天的设备、小工具和机器变得越来越智能,控制它们的嵌入式软件的复杂性也大大增加。为了处理这种复杂性,嵌入式软件使用基于模型的范例进行设计。造型的过程是正式和创造性的结合,设计步骤。由于建模的部分非形式化特征,模型与系统之间的关系无法用数学方法表示。因此,建模者认为模型充分地代表了系统的理由只能是非正式的。在本文中,我们讨论了非形式化建模步骤的本质,并指出了那些在模型和系统之间创建“链接”的步骤。我们提出了结构化解释和证明非正式建模决策的步骤。这反过来应该增强对模型中充分表示嵌入式系统周围的非正式物理世界的信心。
{"title":"Explaining Embedded Software Modelling Decisions","authors":"Jelena Marincic, A. Mader, R. Wieringa","doi":"10.1109/SWSTE.2012.18","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.18","url":null,"abstract":"As today's devices, gadgets and machines become more intelligent, the complexity of embedded software controlling them grows enormously. To deal with this complexity, embedded software is designed using model-based paradigms. The process of modelling is a combination of formal and creative, design steps. Because of the partially non-formal character of modelling, the relation between a model and the system cannot be expressed mathematically. Therefore, the modeller's justification that the model represents the system adequately can only be non-formal. In this paper we discuss the nature of non-formal modelling steps and pin-point those that create a 'link' between the model and the system. We propose steps to structure the explanation and justification of non-formal modelling decisions. This in turn should enhance confidence that the non-formal, physical world surrounding the embedded system is adequately represented in the model.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirements for a Comprehensive and Automated Web Reputation Monitoring System: First Iteration 全面自动化网络信誉监控系统的需求:第一次迭代
Luisa Mich
Web reputation plays a critical role for companies and organizations, impacting their competitive positions and ultimately their success and survival on the market. User-generated content published on a variety of so-called Web 2.0 Websites are dramatically changing power relationships in business. Customers use more and more other customers' judgments, comments, and reviews in their decision-making processes. Companies needed to change their online communication strategies accordingly. However, a systematic approach to Web reputation monitoring, and in turn to the analysis of supporting systems is still lacking. Existing tools only partially support the complex process of Web reputation monitoring, usually applying natural language technology at different stages of maturity. This paper thoroughly investigates the high-level requirements for a general-purpose Web reputation monitoring system. Requirements are classified according to three main steps covering the tasks necessary to a comprehensive Web reputation monitoring strategy. To identify and illustrate the requirements, the paper refers to cases and examples in the tourism sector, whose complexity helps to realize a wide-ranging analysis, thus mitigating the risk of oversimplification.
网络声誉对公司和组织起着至关重要的作用,影响他们的竞争地位,最终影响他们在市场上的成功和生存。在各种所谓的Web 2.0网站上发布的用户生成内容正在戏剧性地改变商业中的权力关系。客户在决策过程中越来越多地使用其他客户的判断、评论和评论。公司需要相应地改变他们的在线沟通策略。然而,目前仍然缺乏一种系统的Web信誉监控方法,以及对支持系统的分析。现有工具仅部分支持复杂的Web信誉监控过程,通常应用不同成熟阶段的自然语言技术。本文深入研究了通用Web信誉监控系统的高级需求。需求根据三个主要步骤进行分类,这些步骤涵盖了全面的Web信誉监视策略所需的任务。为了识别和说明需求,本文引用了旅游部门的案例和例子,其复杂性有助于实现广泛的分析,从而减少过度简化的风险。
{"title":"Requirements for a Comprehensive and Automated Web Reputation Monitoring System: First Iteration","authors":"Luisa Mich","doi":"10.1109/SWSTE.2012.15","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.15","url":null,"abstract":"Web reputation plays a critical role for companies and organizations, impacting their competitive positions and ultimately their success and survival on the market. User-generated content published on a variety of so-called Web 2.0 Websites are dramatically changing power relationships in business. Customers use more and more other customers' judgments, comments, and reviews in their decision-making processes. Companies needed to change their online communication strategies accordingly. However, a systematic approach to Web reputation monitoring, and in turn to the analysis of supporting systems is still lacking. Existing tools only partially support the complex process of Web reputation monitoring, usually applying natural language technology at different stages of maturity. This paper thoroughly investigates the high-level requirements for a general-purpose Web reputation monitoring system. Requirements are classified according to three main steps covering the tasks necessary to a comprehensive Web reputation monitoring strategy. To identify and illustrate the requirements, the paper refers to cases and examples in the tourism sector, whose complexity helps to realize a wide-ranging analysis, thus mitigating the risk of oversimplification.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Modeling from Life-Cycle Perspective 生命周期视角下的软件建模
A. Tomer
Modeling of software systems often focus mainly on the operational system during its operational stage, with less attention to various other life-cycle stages and other contexts of operation, such as testing, training, maintenance, and others. Introducing new model-oriented definitions for the terms "architecture" and "configuration" this work proposes an approach to model system/software architecture and all its associated configurations under one set of interrelated models. The approach is applicable both to structural and behavioral architectures, at all levels of software/system decomposition. The concepts of the approach are demonstrated through a case study, using the UML modeling language.
软件系统的建模通常主要集中在操作阶段的操作系统上,很少关注其他生命周期阶段和操作的其他上下文,例如测试、培训、维护等。为术语“体系结构”和“配置”引入新的面向模型的定义,这项工作提出了一种在一组相互关联的模型下对系统/软件体系结构及其所有相关配置进行建模的方法。该方法适用于软件/系统分解的所有级别的结构和行为架构。使用UML建模语言,通过案例研究演示了该方法的概念。
{"title":"Software Modeling from Life-Cycle Perspective","authors":"A. Tomer","doi":"10.1109/SWSTE.2012.17","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.17","url":null,"abstract":"Modeling of software systems often focus mainly on the operational system during its operational stage, with less attention to various other life-cycle stages and other contexts of operation, such as testing, training, maintenance, and others. Introducing new model-oriented definitions for the terms \"architecture\" and \"configuration\" this work proposes an approach to model system/software architecture and all its associated configurations under one set of interrelated models. The approach is applicable both to structural and behavioral architectures, at all levels of software/system decomposition. The concepts of the approach are demonstrated through a case study, using the UML modeling language.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114794529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Governance Using Retrospectives: A Case Study 使用回顾的软件治理:一个案例研究
Y. Dubinsky, O. Hazzan
In this paper we present our study on the implementation of the retrospective practice in software development projects. Specifically, we describe the retrospective practice and present its impact on the development process of a specific large-scale project. Our study shows that a team can steer its process evolution systematically by retrospectives, identifying process issues, discussing their nature, and deciding on mechanisms for their improvement. For the purpose of our research, we use five process elements: work procedures, policies, metrics, roles, and decision rights. Based on the data analysis of the retrospectives conducted in our case study, we illustrate each category and demonstrate how it is refined along the project timeline. We suggest using the retrospective practice as a qualitative data gathering tool that assists the governance process of a development project.
在本文中,我们对软件开发项目中回溯实践的实施进行了研究。具体来说,我们描述了回顾性实践,并展示了它对特定大型项目开发过程的影响。我们的研究表明,一个团队可以通过回顾、识别过程问题、讨论它们的性质以及决定它们的改进机制来系统地引导其过程演变。为了我们研究的目的,我们使用了五个过程元素:工作程序、政策、度量、角色和决策权。基于在案例研究中进行的回顾的数据分析,我们说明了每个类别,并演示了如何沿着项目时间轴对其进行改进。我们建议使用回顾性实践作为定性数据收集工具,帮助开发项目的治理过程。
{"title":"Software Governance Using Retrospectives: A Case Study","authors":"Y. Dubinsky, O. Hazzan","doi":"10.1109/SWSTE.2012.11","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.11","url":null,"abstract":"In this paper we present our study on the implementation of the retrospective practice in software development projects. Specifically, we describe the retrospective practice and present its impact on the development process of a specific large-scale project. Our study shows that a team can steer its process evolution systematically by retrospectives, identifying process issues, discussing their nature, and deciding on mechanisms for their improvement. For the purpose of our research, we use five process elements: work procedures, policies, metrics, roles, and decision rights. Based on the data analysis of the retrospectives conducted in our case study, we illustrate each category and demonstrate how it is refined along the project timeline. We suggest using the retrospective practice as a qualitative data gathering tool that assists the governance process of a development project.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Allocation of Agent Groups for Complex Tasks in Real Cost Environments 真实成本环境下复杂任务Agent组的有效分配
Efrat Manisterski, Esther David, Sarit Kraus, N. Jennings
In this paper we analyze and propose solutions for complex task allocation problems that have predetermined and known overall payments for any given task. Here a particular task is considered to be complete if all its relevant subtasks are assigned to agents with the necessary capabilities, and the total costs of all the agents falls within a preset limit. In previous work we prove that the problem is NP-hard and that for the general case of the non-cooperative setting, no protocol achieving the efficient solution can exist that is individually rational and budget balanced. Moreover, we show that although efficient protocols may exist in some settings, these will inevitably besetting-specific. Therefore, in this paper we analyze more specific, but nevertheless important, settings for which we develop protocols with the following main advantages. First, we prove these protocols to be individually rational, budget balanced and in equilibrium. Second, the performance of the protocols are evaluated via extensive experiments that show that they outperform previous solutions in this area in terms of efficiency and stability. Third, these protocols are proved to be polynomial in the number of subtasks and agents. Finally, as all proposed protocols are strategy proof or Bayesian Nash incentive compatible, the equilibrium agents' strategies are simply to declare their real costs and capabilities.
在本文中,我们分析并提出了复杂任务分配问题的解决方案,这些问题对任何给定的任务都有预定和已知的总支付。在这里,如果将特定任务的所有相关子任务分配给具有必要功能的代理,并且所有代理的总成本落在预设的限制内,则认为该任务已经完成。在之前的工作中,我们证明了该问题是np困难的,并且对于非合作设置的一般情况,不存在个体理性且预算平衡的有效解。此外,我们表明,尽管在某些情况下可能存在有效的协议,但这些协议将不可避免地受到特定环境的困扰。因此,在本文中,我们分析了更具体但仍然重要的设置,我们为此开发了具有以下主要优势的协议。首先,我们证明了这些协议是个体理性的、预算平衡的和均衡的。其次,通过广泛的实验来评估协议的性能,这些实验表明它们在效率和稳定性方面优于该领域以前的解决方案。第三,证明了这些协议在子任务和代理的数量上是多项式的。最后,由于所有提议的协议都是策略证明或贝叶斯纳什激励相容的,均衡代理的策略只是简单地声明他们的实际成本和能力。
{"title":"Efficient Allocation of Agent Groups for Complex Tasks in Real Cost Environments","authors":"Efrat Manisterski, Esther David, Sarit Kraus, N. Jennings","doi":"10.1109/SWSTE.2012.14","DOIUrl":"https://doi.org/10.1109/SWSTE.2012.14","url":null,"abstract":"In this paper we analyze and propose solutions for complex task allocation problems that have predetermined and known overall payments for any given task. Here a particular task is considered to be complete if all its relevant subtasks are assigned to agents with the necessary capabilities, and the total costs of all the agents falls within a preset limit. In previous work we prove that the problem is NP-hard and that for the general case of the non-cooperative setting, no protocol achieving the efficient solution can exist that is individually rational and budget balanced. Moreover, we show that although efficient protocols may exist in some settings, these will inevitably besetting-specific. Therefore, in this paper we analyze more specific, but nevertheless important, settings for which we develop protocols with the following main advantages. First, we prove these protocols to be individually rational, budget balanced and in equilibrium. Second, the performance of the protocols are evaluated via extensive experiments that show that they outperform previous solutions in this area in terms of efficiency and stability. Third, these protocols are proved to be polynomial in the number of subtasks and agents. Finally, as all proposed protocols are strategy proof or Bayesian Nash incentive compatible, the equilibrium agents' strategies are simply to declare their real costs and capabilities.","PeriodicalId":190562,"journal":{"name":"2012 IEEE International Conference on Software Science, Technology and Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133114125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 IEEE International Conference on Software Science, Technology and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1