首页 > 最新文献

2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)最新文献

英文 中文
Comparing Input Prioritization Techniques for Testing Deep Learning Algorithms 比较测试深度学习算法的输入优先级技术
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00020
V. Mosin, M. Staron, Darko Durisic, F. D. O. Neto, Sushant Kumar Pandey, Ashok Chaitanya Koppisetty
Deep learning (DL) systems are becoming an essential part of software systems, so it is necessary to test them thoroughly. This is a challenging task since the test sets can grow over time as the new data is being acquired, and it becomes time-consuming. Input prioritization is necessary to reduce the testing time since prioritized test inputs are more likely to reveal the erroneous behavior of a DL system earlier during test execution. Input prioritization approaches have been rudimentary analyzed against each other, this study compares different input prioritization techniques regarding their effectiveness and efficiency. This work considers surprise adequacy, autoencoder-based, and similarity-based input prioritization approaches in the example of testing a DL image classification algorithms applied on MNIST, Fashion-MNIST, CIFAR-10, and STL-10 datasets. To measure effectiveness and efficiency, we use a modified APFD (Average Percentage of Fault Detected), and set up & execution time, respectively. We observe that the surprise adequacy is the most effective (0.785 to 0.914 APFD). The autoencoder-based and similarity-based techniques are less effective, with the performance from 0.532 to 0.744 APFD and 0.579 to 0.709 APFD, respectively. In contrast, the similarity-based and surprise adequacy-based approaches are the most and least efficient, respectively. The findings in this work demonstrate the trade-off between the considered input prioritization techniques to understanding their practical applicability for testing DL algorithms.
深度学习(DL)系统正在成为软件系统的重要组成部分,因此有必要对其进行彻底的测试。这是一项具有挑战性的任务,因为随着新数据的获取,测试集可能会随着时间的推移而增长,这将变得非常耗时。输入优先级对于减少测试时间是必要的,因为优先级的测试输入更有可能在测试执行期间早期揭示DL系统的错误行为。输入优先排序方法已经初步分析了彼此,本研究比较了不同的输入优先排序技术的有效性和效率。在测试应用于MNIST、Fashion-MNIST、CIFAR-10和STL-10数据集的DL图像分类算法的示例中,本工作考虑了惊喜充分性、基于自动编码器和基于相似性的输入优先级方法。为了衡量有效性和效率,我们分别使用改进的APFD(平均故障检测百分比)和设置和执行时间。我们观察到意外充足性是最有效的(0.785至0.914 APFD)。基于自编码器和基于相似度的技术效果较差,性能分别为0.532 ~ 0.744 APFD和0.579 ~ 0.709 APFD。相比之下,基于相似性和基于惊喜充足性的方法分别是效率最高和最低的。这项工作的发现证明了考虑的输入优先级技术之间的权衡,以理解它们在测试DL算法中的实际适用性。
{"title":"Comparing Input Prioritization Techniques for Testing Deep Learning Algorithms","authors":"V. Mosin, M. Staron, Darko Durisic, F. D. O. Neto, Sushant Kumar Pandey, Ashok Chaitanya Koppisetty","doi":"10.1109/SEAA56994.2022.00020","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00020","url":null,"abstract":"Deep learning (DL) systems are becoming an essential part of software systems, so it is necessary to test them thoroughly. This is a challenging task since the test sets can grow over time as the new data is being acquired, and it becomes time-consuming. Input prioritization is necessary to reduce the testing time since prioritized test inputs are more likely to reveal the erroneous behavior of a DL system earlier during test execution. Input prioritization approaches have been rudimentary analyzed against each other, this study compares different input prioritization techniques regarding their effectiveness and efficiency. This work considers surprise adequacy, autoencoder-based, and similarity-based input prioritization approaches in the example of testing a DL image classification algorithms applied on MNIST, Fashion-MNIST, CIFAR-10, and STL-10 datasets. To measure effectiveness and efficiency, we use a modified APFD (Average Percentage of Fault Detected), and set up & execution time, respectively. We observe that the surprise adequacy is the most effective (0.785 to 0.914 APFD). The autoencoder-based and similarity-based techniques are less effective, with the performance from 0.532 to 0.744 APFD and 0.579 to 0.709 APFD, respectively. In contrast, the similarity-based and surprise adequacy-based approaches are the most and least efficient, respectively. The findings in this work demonstrate the trade-off between the considered input prioritization techniques to understanding their practical applicability for testing DL algorithms.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Change-Aware Regression Test Prioritization using Genetic Algorithms 使用遗传算法的变化感知回归测试优先级
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00028
F. Altiero, Giovanni Colella, A. Corazza, S. Martino, A. Peron, L. L. L. Starace
Regression testing is a practice aimed at providing confidence that, within software maintenance, the changes in the code base have introduced no faults in previously validated functionalities. With the software industry shifting towards iterative and incremental development with shorter release cycles, the straightforward approach of re-executing the entire test suite on each new version of the software is often unfeasible due to time and resource constraints. In such scenarios, Test Case Prioritization (TCP) strategies aim at providing an effective ordering of the test suite, so that the tests that are more likely to expose faults are executed earlier and fault detection is maximised even when test execution needs to be abruptly terminated due to external constraints. In this work, we propose Genetic-Diff, a TCP strategy based on a genetic algorithm featuring a specifically-designed crossover operator and a novel objective function that combines code coverage metrics with an analysis of changes in the code base. We empirically evaluate the proposed algorithm on several releases of three heterogeneous real-world, open source Java projects, in which we artificially injected faults, and compare the results with other state-of-the-art TCP techniques using fault-detection rate metrics. Findings show that the proposed technique performs generally better than the baselines, especially when there is a limited amount of code changes, which is a common scenario in modern development practices.
回归测试是一种旨在提供信心的实践,在软件维护中,代码库中的更改没有在先前验证的功能中引入错误。随着软件行业转向迭代式和增量式开发,使用更短的发布周期,由于时间和资源的限制,在软件的每个新版本上重新执行整个测试套件的直接方法通常是不可行的。在这样的场景中,测试用例优先级(TCP)策略旨在提供测试套件的有效排序,以便更有可能暴露错误的测试被更早地执行,并且即使在测试执行由于外部约束而需要突然终止时也能最大限度地检测故障。在这项工作中,我们提出了一种基于遗传算法的TCP策略genetic - diff,该策略具有专门设计的交叉算子和一种新的目标函数,该目标函数将代码覆盖度量与代码库变化分析相结合。我们在三个异构的真实世界的开源Java项目的几个版本上对所提出的算法进行了经验评估,其中人为地注入了错误,并使用错误检测率度量将结果与其他最先进的TCP技术进行了比较。结果表明,所建议的技术通常比基线执行得更好,特别是当代码更改数量有限时,这是现代开发实践中的常见场景。
{"title":"Change-Aware Regression Test Prioritization using Genetic Algorithms","authors":"F. Altiero, Giovanni Colella, A. Corazza, S. Martino, A. Peron, L. L. L. Starace","doi":"10.1109/SEAA56994.2022.00028","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00028","url":null,"abstract":"Regression testing is a practice aimed at providing confidence that, within software maintenance, the changes in the code base have introduced no faults in previously validated functionalities. With the software industry shifting towards iterative and incremental development with shorter release cycles, the straightforward approach of re-executing the entire test suite on each new version of the software is often unfeasible due to time and resource constraints. In such scenarios, Test Case Prioritization (TCP) strategies aim at providing an effective ordering of the test suite, so that the tests that are more likely to expose faults are executed earlier and fault detection is maximised even when test execution needs to be abruptly terminated due to external constraints. In this work, we propose Genetic-Diff, a TCP strategy based on a genetic algorithm featuring a specifically-designed crossover operator and a novel objective function that combines code coverage metrics with an analysis of changes in the code base. We empirically evaluate the proposed algorithm on several releases of three heterogeneous real-world, open source Java projects, in which we artificially injected faults, and compare the results with other state-of-the-art TCP techniques using fault-detection rate metrics. Findings show that the proposed technique performs generally better than the baselines, especially when there is a limited amount of code changes, which is a common scenario in modern development practices.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116329214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How are software datasets constructed in Empirical Software Engineering studies? A systematic mapping study 在实证软件工程研究中如何构建软件数据集?系统的制图研究
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00075
J. A. Carruthers, J. A. D. Pace, E. Irrazábal
Context: Software projects are common inputs in Empirical Software Engineering (ESE) studies, although they are often selected with ad-hoc strategies that reduce the generalizability of the results. An alternative is the usage of available datasets of software projects, which should be current and follow explicit rules for ensuring their validity over time. Goal: In this context, it is important to assess the general state of software datasets in terms of purpose, last update, project characterization, source code metrics, and tools to extract source-code-related artifacts. Method: We conducted a systematic mapping study retrieving software datasets used in ESE studies published from January 2013 to December 2021. Results: We selected 74 datasets created mainly for software defects, software estimation, and software maintainability studies. The majority of these datasets (64%) explicitly stated the characteristics to select the projects, and the most common programming languages were Java and C. Conclusions: Our study identified scarce efforts to keep datasets updated over time and also provides recommendations to support their construction and consumption for ESE studies.
背景:软件项目是经验软件工程(ESE)研究中的常见输入,尽管它们通常是用减少结果的普遍性的特殊策略来选择的。另一种选择是使用软件项目的可用数据集,这些数据集应该是最新的,并遵循明确的规则,以确保它们随着时间的推移而有效。目标:在这种情况下,根据目的、最近的更新、项目特征、源代码度量和提取源代码相关工件的工具来评估软件数据集的一般状态是很重要的。方法:我们进行了系统的制图研究,检索了2013年1月至2021年12月发表的ESE研究中使用的软件数据集。结果:我们选择了74个主要用于软件缺陷、软件评估和软件可维护性研究的数据集。这些数据集中的大多数(64%)明确地说明了选择项目的特征,最常见的编程语言是Java和c。结论:我们的研究发现,随着时间的推移,保持数据集更新的努力很少,并且还提供了支持ESE研究的数据集构建和使用的建议。
{"title":"How are software datasets constructed in Empirical Software Engineering studies? A systematic mapping study","authors":"J. A. Carruthers, J. A. D. Pace, E. Irrazábal","doi":"10.1109/SEAA56994.2022.00075","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00075","url":null,"abstract":"Context: Software projects are common inputs in Empirical Software Engineering (ESE) studies, although they are often selected with ad-hoc strategies that reduce the generalizability of the results. An alternative is the usage of available datasets of software projects, which should be current and follow explicit rules for ensuring their validity over time. Goal: In this context, it is important to assess the general state of software datasets in terms of purpose, last update, project characterization, source code metrics, and tools to extract source-code-related artifacts. Method: We conducted a systematic mapping study retrieving software datasets used in ESE studies published from January 2013 to December 2021. Results: We selected 74 datasets created mainly for software defects, software estimation, and software maintainability studies. The majority of these datasets (64%) explicitly stated the characteristics to select the projects, and the most common programming languages were Java and C. Conclusions: Our study identified scarce efforts to keep datasets updated over time and also provides recommendations to support their construction and consumption for ESE studies.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114592910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel Instance Filtering for Malware Detection 并行实例过滤恶意软件检测
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00012
M. Jureček, Olha Jurecková
Machine learning algorithms are widely used in the area of malware detection. With the growth of sample amounts, training of classification algorithms becomes more and more expensive. In addition, training data sets may contain redundant or noisy instances. The problem to be solved is how to select representative instances from large training data sets without reducing the accuracy. This work presents a new parallel instance selection algorithm called Parallel Instance Filtering (PIF). The main idea of the algorithm is to split the data set into non-overlapping subsets of instances covering the whole data set and apply a filtering process for each subset. Each subset consists of instances that have the same nearest enemy. As a result, the PIF algorithm is fast since subsets are processed independently of each other using parallel computation. We compare the PIF algorithm with several state-of-the-art instance selection algorithms on a large data set of 500,000 malicious and benign samples. The feature set was extracted using static analysis, and it includes metadata from the portable executable file format. Our experimental results demonstrate that the proposed instance selection algorithm reduces the size of a training data set significantly with the only slightly decreased accuracy. The PIF algorithm outperforms existing instance selection methods used in the experiments in terms of the ratio between average classification accuracy and storage percentage.
机器学习算法被广泛应用于恶意软件检测领域。随着样本数量的增长,分类算法的训练成本越来越高。此外,训练数据集可能包含冗余或有噪声的实例。要解决的问题是如何在不降低准确率的情况下从大量的训练数据集中选择有代表性的实例。本文提出了一种新的并行实例选择算法,称为并行实例滤波(PIF)。该算法的主要思想是将数据集划分为覆盖整个数据集的实例的非重叠子集,并对每个子集应用过滤过程。每个子集由具有相同最近敌人的实例组成。因此,PIF算法是快速的,因为子集是通过并行计算相互独立处理的。我们将PIF算法与几种最先进的实例选择算法在500,000个恶意和良性样本的大型数据集上进行比较。特性集是使用静态分析提取的,它包括来自可移植可执行文件格式的元数据。我们的实验结果表明,所提出的实例选择算法显着减少了训练数据集的大小,仅略微降低了准确性。在平均分类准确率与存储百分比的比值方面,PIF算法优于实验中使用的现有实例选择方法。
{"title":"Parallel Instance Filtering for Malware Detection","authors":"M. Jureček, Olha Jurecková","doi":"10.1109/SEAA56994.2022.00012","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00012","url":null,"abstract":"Machine learning algorithms are widely used in the area of malware detection. With the growth of sample amounts, training of classification algorithms becomes more and more expensive. In addition, training data sets may contain redundant or noisy instances. The problem to be solved is how to select representative instances from large training data sets without reducing the accuracy. This work presents a new parallel instance selection algorithm called Parallel Instance Filtering (PIF). The main idea of the algorithm is to split the data set into non-overlapping subsets of instances covering the whole data set and apply a filtering process for each subset. Each subset consists of instances that have the same nearest enemy. As a result, the PIF algorithm is fast since subsets are processed independently of each other using parallel computation. We compare the PIF algorithm with several state-of-the-art instance selection algorithms on a large data set of 500,000 malicious and benign samples. The feature set was extracted using static analysis, and it includes metadata from the portable executable file format. Our experimental results demonstrate that the proposed instance selection algorithm reduces the size of a training data set significantly with the only slightly decreased accuracy. The PIF algorithm outperforms existing instance selection methods used in the experiments in terms of the ratio between average classification accuracy and storage percentage.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127380520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems UMLsec4Edge:扩展UMLsec来建模数据保护兼容的边缘计算系统
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00072
Sven Smolka, Jan Laufer, Z. Mann, K. Pohl
Edge computing enables the processing of data - frequently personal data - at the edge of the network. For personal data, legislation such as the European General Data Protection Regulation requires data protection by design. Hence, data protection has to be accounted for in the design of edge computing systems whenever personal data is involved. This leads to specific requirements for modeling the architecture of edge computing systems, e.g., representation of data and network properties. To the best of our knowledge, no existing modeling language fulfils all these requirements. In our previous work we showed that the commonly used UML profile UMLsec fulfils some of these requirements, and can thus serve as a starting point. The aim of this paper is to create a modeling language which meets all requirements concerning the design of the architecture of edge computing systems accounting for data protection. Thus, we extend UMLsec to satisfy all requirements. We call the resulting UML profile UMLsec4Edge. We follow a systematic approach to develop UMLsec4Edge. We app UMLsec4Edge to real-world use cases from different domains, and create appropriate deployment diagrams and class diagrams. These diagrams show UMLsec4Edge is capable of meeting the requirements.
边缘计算能够在网络边缘处理数据——通常是个人数据。对于个人数据,《欧洲通用数据保护条例》等立法要求通过设计保护数据。因此,每当涉及个人数据时,必须在边缘计算系统的设计中考虑数据保护。这导致了对边缘计算系统架构建模的特定需求,例如,数据和网络属性的表示。据我们所知,没有一种现有的建模语言能够满足所有这些需求。在我们之前的工作中,我们展示了常用的UML概要文件UMLsec满足了其中的一些需求,因此可以作为一个起点。本文的目的是创建一种建模语言,满足边缘计算系统架构设计的所有要求,并考虑数据保护。因此,我们扩展了UMLsec以满足所有需求。我们将生成的UML概要文件称为UMLsec4Edge。我们遵循系统的方法来开发UMLsec4Edge。我们将UMLsec4Edge应用于来自不同领域的实际用例,并创建适当的部署图和类图。这些图表显示UMLsec4Edge能够满足需求。
{"title":"UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems","authors":"Sven Smolka, Jan Laufer, Z. Mann, K. Pohl","doi":"10.1109/SEAA56994.2022.00072","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00072","url":null,"abstract":"Edge computing enables the processing of data - frequently personal data - at the edge of the network. For personal data, legislation such as the European General Data Protection Regulation requires data protection by design. Hence, data protection has to be accounted for in the design of edge computing systems whenever personal data is involved. This leads to specific requirements for modeling the architecture of edge computing systems, e.g., representation of data and network properties. To the best of our knowledge, no existing modeling language fulfils all these requirements. In our previous work we showed that the commonly used UML profile UMLsec fulfils some of these requirements, and can thus serve as a starting point. The aim of this paper is to create a modeling language which meets all requirements concerning the design of the architecture of edge computing systems accounting for data protection. Thus, we extend UMLsec to satisfy all requirements. We call the resulting UML profile UMLsec4Edge. We follow a systematic approach to develop UMLsec4Edge. We app UMLsec4Edge to real-world use cases from different domains, and create appropriate deployment diagrams and class diagrams. These diagrams show UMLsec4Edge is capable of meeting the requirements.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STORM: A Software Testing Onboarding Model STORM:软件测试入职模型
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00036
Tobias Lorey, Stefan Mohacsi, Armin Beer, M. Felderer
Recruiting and onboarding software testing professionals are complex and cost intensive activities. Whether onboarding is successful and sustainable depends on both the employee as well as the organization and is influenced by a number of often highly individual factors. Therefore, we propose the Software Testing Onboarding Model (STORM) for sustainably onboarding software testing professionals based on existing frameworks and models taking into account onboarding processes, sustainability, and test processes. In addition, we provide detailed instructions on how to apply the model to real-world onboarding processes.
招聘和培训软件测试专业人员是一项复杂且成本密集的活动。入职是否成功和可持续取决于员工和组织,并受到许多通常高度个人化的因素的影响。因此,我们提出软件测试入职模型(STORM),基于现有的框架和模型,考虑到入职过程、可持续性和测试过程,以可持续地入职软件测试专业人员。此外,我们提供了关于如何将模型应用于实际的入职过程的详细说明。
{"title":"STORM: A Software Testing Onboarding Model","authors":"Tobias Lorey, Stefan Mohacsi, Armin Beer, M. Felderer","doi":"10.1109/SEAA56994.2022.00036","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00036","url":null,"abstract":"Recruiting and onboarding software testing professionals are complex and cost intensive activities. Whether onboarding is successful and sustainable depends on both the employee as well as the organization and is influenced by a number of often highly individual factors. Therefore, we propose the Software Testing Onboarding Model (STORM) for sustainably onboarding software testing professionals based on existing frameworks and models taking into account onboarding processes, sustainability, and test processes. In addition, we provide detailed instructions on how to apply the model to real-world onboarding processes.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Aligning Platform Ecosystems Through Product Roadmapping: Systematic Mapping Study and Research Agenda 通过产品路线图调整平台生态系统:系统的地图研究和研究议程
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00074
Stefan Trieflinger, Dimitri Petrik, G. Herzwurm, Jürgen Münch
Providing a digital infrastructure, platform technologies foster interfirm collaboration between loosely coupled companies, enabling the formation of ecosystems and building the organizational structure for value co-creation. Despite the known potential, the development of platform ecosystems creates new sources of complexity and uncertainty due to the involvement of various independent actors. For a platform ecosystem to succeed, it is essential that the platform ecosystem participants are aligned, coordinated, and given a common direction. Traditionally, product roadmaps have served these purposes during product development. A systematic mapping study was conducted to better understand how product roadmapping could be used in the dynamic environment of platform ecosystems. One result of the study is that there are hardly any concrete approaches for product roadmapping in platform ecosystems so far. However, many challenges on the topic are described in the literature from different perspectives. Based on the results of the systematic mapping study, a research agenda for product roadmapping in platform ecosystems is derived and presented.
平台技术提供了数字基础设施,促进了松散耦合公司之间的公司间协作,使生态系统的形成成为可能,并为共同创造价值建立了组织结构。尽管有已知的潜力,但由于各种独立参与者的参与,平台生态系统的发展创造了新的复杂性和不确定性来源。一个平台生态系统要想成功,至关重要的是,平台生态系统的参与者必须保持一致、协调一致,并有一个共同的方向。传统上,产品路线图在产品开发过程中起到了这些作用。为了更好地了解如何在平台生态系统的动态环境中使用产品路线图,我们进行了系统的测绘研究。这项研究的一个结果是,到目前为止,几乎没有任何具体的方法来绘制平台生态系统的产品路线图。然而,文献从不同的角度描述了这一主题的许多挑战。基于系统映射研究的结果,推导并提出了平台生态系统中产品路径映射的研究议程。
{"title":"Aligning Platform Ecosystems Through Product Roadmapping: Systematic Mapping Study and Research Agenda","authors":"Stefan Trieflinger, Dimitri Petrik, G. Herzwurm, Jürgen Münch","doi":"10.1109/SEAA56994.2022.00074","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00074","url":null,"abstract":"Providing a digital infrastructure, platform technologies foster interfirm collaboration between loosely coupled companies, enabling the formation of ecosystems and building the organizational structure for value co-creation. Despite the known potential, the development of platform ecosystems creates new sources of complexity and uncertainty due to the involvement of various independent actors. For a platform ecosystem to succeed, it is essential that the platform ecosystem participants are aligned, coordinated, and given a common direction. Traditionally, product roadmaps have served these purposes during product development. A systematic mapping study was conducted to better understand how product roadmapping could be used in the dynamic environment of platform ecosystems. One result of the study is that there are hardly any concrete approaches for product roadmapping in platform ecosystems so far. However, many challenges on the topic are described in the literature from different perspectives. Based on the results of the systematic mapping study, a research agenda for product roadmapping in platform ecosystems is derived and presented.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131176880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile Enterprise Transformations: Surveying the Many Facets of Agility for the Hybrid Era 敏捷企业转型:考察混合时代敏捷性的许多方面
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00032
Petri Kettunen, Tomas Gustavsson, M. Laanti, Andreas Tjernsten, T. Mikkonen, T. Männistö
Agile companies are not uniform. Consequently, agile transformations are conceived broadly, ranging from adopting agile methods and practices in software development teams or functions to building all-encompassing enterprise agility. Moreover, the targeted effects of agility may vary, and the success of transformations and the attainment of agility are measured in various ways. In this paper, based on a recent industrial survey study, we scrutinize holistically why companies want to transform, what types of agility they are aiming at, and how they gauge transformations. The survey data was collected during the COVID-19 pandemic in 2020. Most of the respondents were in large or very large companies in Finland and Sweden in diverse industry domains. The main findings indicate that there are many reasons for companies to transform both to improve external outcomes (fore mostly responsiveness) and to develop internal capabilities (adaptability, organizational learning). Companies seemed to have aims and goals with respect to all types of agility, including business agility. As the nature of transformations and the companies’ aims and goals vary, the transformations follow various means and measures. As a conclusion, for the hybrid era, we advise companies to consider how agility has benefited during the pandemic era, how hybrid work possibly affects the goals for agile transformations and the different facets of agility, and how to sustain agility in hybrid work.
敏捷公司不是统一的。因此,敏捷转换的概念非常广泛,从在软件开发团队或功能中采用敏捷方法和实践,到构建无所不包的企业敏捷性。此外,敏捷性的目标效果可能是不同的,并且转换的成功和敏捷性的实现是用不同的方式来衡量的。在本文中,基于最近的一项工业调查研究,我们全面地审视了公司为什么想要转型,他们的目标是什么类型的敏捷性,以及他们如何衡量转型。调查数据是在2020年COVID-19大流行期间收集的。大多数受访者就职于芬兰和瑞典不同行业领域的大型或超大型公司。主要研究结果表明,企业转型的原因有很多,既可以改善外部结果(最重要的是响应能力),也可以发展内部能力(适应性、组织学习)。公司似乎对所有类型的敏捷性(包括业务敏捷性)都有目的和目标。由于转换的性质和公司的目的和目标各不相同,转换采用不同的手段和措施。作为结论,对于混合时代,我们建议公司考虑在大流行时代敏捷性是如何受益的,混合工作如何可能影响敏捷转型的目标和敏捷性的不同方面,以及如何在混合工作中保持敏捷性。
{"title":"Agile Enterprise Transformations: Surveying the Many Facets of Agility for the Hybrid Era","authors":"Petri Kettunen, Tomas Gustavsson, M. Laanti, Andreas Tjernsten, T. Mikkonen, T. Männistö","doi":"10.1109/SEAA56994.2022.00032","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00032","url":null,"abstract":"Agile companies are not uniform. Consequently, agile transformations are conceived broadly, ranging from adopting agile methods and practices in software development teams or functions to building all-encompassing enterprise agility. Moreover, the targeted effects of agility may vary, and the success of transformations and the attainment of agility are measured in various ways. In this paper, based on a recent industrial survey study, we scrutinize holistically why companies want to transform, what types of agility they are aiming at, and how they gauge transformations. The survey data was collected during the COVID-19 pandemic in 2020. Most of the respondents were in large or very large companies in Finland and Sweden in diverse industry domains. The main findings indicate that there are many reasons for companies to transform both to improve external outcomes (fore mostly responsiveness) and to develop internal capabilities (adaptability, organizational learning). Companies seemed to have aims and goals with respect to all types of agility, including business agility. As the nature of transformations and the companies’ aims and goals vary, the transformations follow various means and measures. As a conclusion, for the hybrid era, we advise companies to consider how agility has benefited during the pandemic era, how hybrid work possibly affects the goals for agile transformations and the different facets of agility, and how to sustain agility in hybrid work.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132754935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multivocal Literature Review of MLOps Tools and Features MLOps工具和特征的多语种文献综述
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00021
Gilberto Recupito, Fabiano Pecorelli, Gemma Catolino, Sergio Moreschini, D. D. Nucci, Fabio Palomba, D. Tamburri
DevOps has become increasingly widespread, with companies employing its methods in different fields. In this context, MLOps automates Machine Learning pipelines by applying DevOps practices. Considering the high number of tools available and the high interest of the practitioners to be supported by tools to automate the steps of Machine Learning pipelines, little is known concerning MLOps tools and their functionalities. To this aim, we conducted a Multivocal Literature Review (MLR) to (i) extract tools that allow for and support the creation of MLOps pipelines and (ii) analyze their main characteristics and features to provide a comprehensive overview of their value. Overall, we investigate the functionalities of 13 MLOps Tools. Our results show that most MLOps Tools support the same features but apply different approaches that can bring different advantages, depending on user requirements.
DevOps已经变得越来越广泛,许多公司在不同的领域使用它的方法。在这种情况下,MLOps通过应用DevOps实践来自动化机器学习管道。考虑到大量可用的工具以及从业者对自动化机器学习管道步骤的工具的高度兴趣,关于MLOps工具及其功能的了解很少。为此,我们进行了多声文献综述(MLR),以(i)提取允许和支持创建MLOps管道的工具,(ii)分析其主要特征和特征,以提供对其价值的全面概述。总的来说,我们研究了13个MLOps工具的功能。我们的结果表明,大多数MLOps工具支持相同的功能,但根据用户需求,应用不同的方法可以带来不同的优势。
{"title":"A Multivocal Literature Review of MLOps Tools and Features","authors":"Gilberto Recupito, Fabiano Pecorelli, Gemma Catolino, Sergio Moreschini, D. D. Nucci, Fabio Palomba, D. Tamburri","doi":"10.1109/SEAA56994.2022.00021","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00021","url":null,"abstract":"DevOps has become increasingly widespread, with companies employing its methods in different fields. In this context, MLOps automates Machine Learning pipelines by applying DevOps practices. Considering the high number of tools available and the high interest of the practitioners to be supported by tools to automate the steps of Machine Learning pipelines, little is known concerning MLOps tools and their functionalities. To this aim, we conducted a Multivocal Literature Review (MLR) to (i) extract tools that allow for and support the creation of MLOps pipelines and (ii) analyze their main characteristics and features to provide a comprehensive overview of their value. Overall, we investigate the functionalities of 13 MLOps Tools. Our results show that most MLOps Tools support the same features but apply different approaches that can bring different advantages, depending on user requirements.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133655486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Secure Agile Software Development Process: A Practice-Based Model 迈向安全的敏捷软件开发过程:一个基于实践的模型
Pub Date : 2022-08-01 DOI: 10.1109/SEAA56994.2022.00031
Abdulhamid A. Ardo, J. Bass, T. Gaber
Agile methods are a well-established paradigm in the software development field. Agile adoption has contributed to improving software quality. However, software products are vulnerable to security challenges and susceptible to cyberattacks. This study aims to improve security of software products when using an agile software development process. A multi-methods qualitative research approach was adopted in this study. First, we conducted semi-structured interviews with 23 agile practitioners having varied years of cybersecurity experiences. An approach informed by grounded theory methodology was adopted for data analysis. Second, we developed a novel practice-based agile software development process model derived from the results of the data analysis conducted. Third, we validated the model through a focus group comprising five senior agile cybersecurity professionals to evaluate its relevancy and novelty. The study has identified 26 security practices, organized into the six - software development life-cycle phases: planning, requirements, design, implementation, testing, and deployment. We have mapped the practices onto four swim lanes each representing an agile role. The self-organizing team is exclusively involved in three security practices, the security specialist in nine, penetration tester in one and the DevOps team collaborates on one with the security specialist. There are also seven practices that are collaboratively performed by the self-organizing team and the security specialist. Each of the practices in the model was examined during the validation phase of the study. There are two contributions in this study. First, the paper proposes a novel practice-based model comprising of 26 security practices mapped to agile roles. Second, we propose a new practice, in response to an observed lack of collaborative ceremonies, to disseminate awareness of and hence compliance with security standards.
敏捷方法是软件开发领域公认的范例。采用敏捷有助于提高软件质量。然而,软件产品容易受到安全挑战,容易受到网络攻击。本研究旨在利用敏捷软件开发过程来提高软件产品的安全性。本研究采用多方法定性研究方法。首先,我们对23名拥有不同网络安全经验的敏捷实践者进行了半结构化访谈。采用扎根理论方法进行数据分析。其次,根据数据分析的结果,建立了一种新的基于实践的敏捷软件开发过程模型。第三,我们通过一个由五名高级敏捷网络安全专业人员组成的焦点小组来验证该模型,以评估其相关性和新颖性。该研究确定了26种安全实践,并将其分为6个软件开发生命周期阶段:计划、需求、设计、实现、测试和部署。我们将实践映射到四条泳道上,每条泳道代表一个敏捷角色。自组织团队只参与三种安全实践,安全专家参与九种,渗透测试人员参与一种,DevOps团队与安全专家合作一种。还有7个实践是由自组织团队和安全专家协作执行的。在研究的验证阶段,对模型中的每个实践进行了检查。这项研究有两个贡献。首先,本文提出了一个新的基于实践的模型,该模型由26个映射到敏捷角色的安全实践组成。其次,我们提出了一个新的实践,作为对观察到的缺乏协作仪式的回应,以传播安全标准的意识并因此遵守安全标准。
{"title":"Towards Secure Agile Software Development Process: A Practice-Based Model","authors":"Abdulhamid A. Ardo, J. Bass, T. Gaber","doi":"10.1109/SEAA56994.2022.00031","DOIUrl":"https://doi.org/10.1109/SEAA56994.2022.00031","url":null,"abstract":"Agile methods are a well-established paradigm in the software development field. Agile adoption has contributed to improving software quality. However, software products are vulnerable to security challenges and susceptible to cyberattacks. This study aims to improve security of software products when using an agile software development process. A multi-methods qualitative research approach was adopted in this study. First, we conducted semi-structured interviews with 23 agile practitioners having varied years of cybersecurity experiences. An approach informed by grounded theory methodology was adopted for data analysis. Second, we developed a novel practice-based agile software development process model derived from the results of the data analysis conducted. Third, we validated the model through a focus group comprising five senior agile cybersecurity professionals to evaluate its relevancy and novelty. The study has identified 26 security practices, organized into the six - software development life-cycle phases: planning, requirements, design, implementation, testing, and deployment. We have mapped the practices onto four swim lanes each representing an agile role. The self-organizing team is exclusively involved in three security practices, the security specialist in nine, penetration tester in one and the DevOps team collaborates on one with the security specialist. There are also seven practices that are collaboratively performed by the self-organizing team and the security specialist. Each of the practices in the model was examined during the validation phase of the study. There are two contributions in this study. First, the paper proposes a novel practice-based model comprising of 26 security practices mapped to agile roles. Second, we propose a new practice, in response to an observed lack of collaborative ceremonies, to disseminate awareness of and hence compliance with security standards.","PeriodicalId":269970,"journal":{"name":"2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114694947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1