首页 > 最新文献

2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)最新文献

英文 中文
Automated Support for Searching and Selecting Evidence in Software Engineering: A Cross-domain Systematic Mapping 软件工程中证据搜索与选择的自动化支持:一个跨领域的系统映射
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00015
B. Napoleão, Fábio Petrillo, Sylvain Hallé
Context: Searching and selecting relevant evidence is crucial to answer research questions from secondary studies in Software Engineering (SE). The activities of search and selection of studies are labour-intensive, time-consuming and demand automation support. Objective: Our goal is to identify and summarize the state-of-the-art on automation support for searching and selecting evidence for secondary studies in SE. Method: We performed a systematic mapping on existing automating support to search and select evidence for secondary studies in SE, expanding our investigation in a cross-domain study addressing advancements from the medical field. Results: Our results show that the SE field has a variety of tools and Text Classification (TC) approaches to automate the search and selection activities. However, medicine has more well-established tools with a larger adoption than SE. Cross-validation and experiment are the most adopted methods to assess TC approaches. Furthermore, recall and precision are the most adopted assessment metrics. Conclusion: Automated approaches for searching and selecting studies in SE have not been applied in practice by SE researchers. Integrated and easy-to-use automated approaches addressing consolidated TC techniques can bring relevant advantages on workload and time saving for SE researchers who conduct secondary studies.
背景:搜索和选择相关证据对于回答软件工程(SE)中学研究中的研究问题至关重要。搜索和选择研究的活动是劳动密集型的,费时的,需要自动化支持。目的:我们的目标是识别和总结最先进的自动化支持搜索和选择二级研究的证据。方法:我们对现有的自动化支持进行了系统的映射,以搜索和选择SE二级研究的证据,扩大了我们在跨领域研究中的调查,解决了医学领域的进展。结果:我们的研究结果表明,SE领域有多种工具和文本分类(TC)方法来自动化搜索和选择活动。然而,医学上有比SE更成熟的工具和更广泛的采用。交叉验证和实验是最常用的评估方法。此外,召回率和精度是最常用的评估指标。结论:SE研究人员尚未在实践中应用自动检索和选择SE研究的方法。集成和易于使用的自动化方法解决综合TC技术可以为进行二次研究的SE研究人员带来相关的工作量和节省时间的优势。
{"title":"Automated Support for Searching and Selecting Evidence in Software Engineering: A Cross-domain Systematic Mapping","authors":"B. Napoleão, Fábio Petrillo, Sylvain Hallé","doi":"10.1109/SEAA53835.2021.00015","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00015","url":null,"abstract":"Context: Searching and selecting relevant evidence is crucial to answer research questions from secondary studies in Software Engineering (SE). The activities of search and selection of studies are labour-intensive, time-consuming and demand automation support. Objective: Our goal is to identify and summarize the state-of-the-art on automation support for searching and selecting evidence for secondary studies in SE. Method: We performed a systematic mapping on existing automating support to search and select evidence for secondary studies in SE, expanding our investigation in a cross-domain study addressing advancements from the medical field. Results: Our results show that the SE field has a variety of tools and Text Classification (TC) approaches to automate the search and selection activities. However, medicine has more well-established tools with a larger adoption than SE. Cross-validation and experiment are the most adopted methods to assess TC approaches. Furthermore, recall and precision are the most adopted assessment metrics. Conclusion: Automated approaches for searching and selecting studies in SE have not been applied in practice by SE researchers. Integrated and easy-to-use automated approaches addressing consolidated TC techniques can bring relevant advantages on workload and time saving for SE researchers who conduct secondary studies.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards MLOps: A Framework and Maturity Model 迈向MLOps:一个框架和成熟度模型
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00050
Meenu Mary John, H. H. Olsson, J. Bosch
The adoption of continuous software engineering practices such as DevOps (Development and Operations) in business operations has contributed to significantly shorter software development and deployment cycles. Recently, the term MLOps (Machine Learning Operations) has gained increasing interest as a practice that brings together data scientists and operations teams. However, the adoption of MLOps in practice is still in its infancy and there are few common guidelines on how to effectively integrate it into existing software development practices. In this paper, we conduct a systematic literature review and a grey literature review to derive a framework that identifies the activities involved in the adoption of MLOps and the stages in which companies evolve as they become more mature and advanced. We validate this framework in three case companies and show how they have managed to adopt and integrate MLOps in their large-scale software development companies. The contribution of this paper is threefold. First, we review contemporary literature to provide an overview of the state-of-the-art in MLOps. Based on this review, we derive an MLOps framework that details the activities involved in the continuous development of machine learning models. Second, we present a maturity model in which we outline the different stages that companies go through in evolving their MLOps practices. Third, we validate our framework in three embedded systems case companies and map the companies to the stages in the maturity model.
在业务操作中采用持续的软件工程实践,例如DevOps(开发和操作),大大缩短了软件开发和部署周期。最近,术语MLOps(机器学习操作)作为一种将数据科学家和运营团队聚集在一起的实践,越来越受到人们的关注。然而,在实践中采用mlop仍然处于起步阶段,并且关于如何有效地将其集成到现有软件开发实践中几乎没有通用的指导方针。在本文中,我们进行了系统的文献回顾和灰色文献回顾,以得出一个框架,该框架确定了采用MLOps所涉及的活动,以及公司随着其变得更加成熟和先进而发展的阶段。我们在三个案例公司中验证了这个框架,并展示了他们如何设法在他们的大型软件开发公司中采用和集成mlop。本文的贡献有三个方面。首先,我们回顾了当代文献,概述了MLOps的最新进展。基于这一综述,我们得出了一个MLOps框架,详细介绍了机器学习模型持续开发所涉及的活动。其次,我们提出了一个成熟度模型,其中我们概述了公司在发展其MLOps实践过程中所经历的不同阶段。第三,我们在三个嵌入式系统案例公司中验证了我们的框架,并将这些公司映射到成熟度模型中的各个阶段。
{"title":"Towards MLOps: A Framework and Maturity Model","authors":"Meenu Mary John, H. H. Olsson, J. Bosch","doi":"10.1109/SEAA53835.2021.00050","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00050","url":null,"abstract":"The adoption of continuous software engineering practices such as DevOps (Development and Operations) in business operations has contributed to significantly shorter software development and deployment cycles. Recently, the term MLOps (Machine Learning Operations) has gained increasing interest as a practice that brings together data scientists and operations teams. However, the adoption of MLOps in practice is still in its infancy and there are few common guidelines on how to effectively integrate it into existing software development practices. In this paper, we conduct a systematic literature review and a grey literature review to derive a framework that identifies the activities involved in the adoption of MLOps and the stages in which companies evolve as they become more mature and advanced. We validate this framework in three case companies and show how they have managed to adopt and integrate MLOps in their large-scale software development companies. The contribution of this paper is threefold. First, we review contemporary literature to provide an overview of the state-of-the-art in MLOps. Based on this review, we derive an MLOps framework that details the activities involved in the continuous development of machine learning models. Second, we present a maturity model in which we outline the different stages that companies go through in evolving their MLOps practices. Third, we validate our framework in three embedded systems case companies and map the companies to the stages in the maturity model.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Reliability in Software-intensive Systems: Challenges, Solutions, and Future Perspectives 软件密集型系统的可靠性:挑战、解决方案和未来展望
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00016
F. Ferreira, E. Nakagawa, R. Santos
Large software-intensive systems have emerged in several application domains, such as healthcare, transportation, smart environments, and Industry 4.0. Sometimes referred to as Systems-of-Systems (SoS) and resulted from the integration of various heterogeneous and independent software systems, such large systems lead to high dynamism and often operate in critical and uncertain environments. Hence, the reliability of these systems must be a concern, but traditional reliability approaches fail to cope with such high dynamism and uncertainty. Thus, new solutions are required to ensure the reliability of SoS. Moreover, there is a lack of studies that investigate the reliability of SoS. This paper presents the state of the art of the way that the reliability of SoS has been addressed. After investigating the literature, we selected 27 studies to perform a detailed analysis regarding factors that affect the reliability of SoS and approaches and metrics to improve it. We found an area still gaining maturity with researchers working in isolation and mainly developing solutions for domain-specific problems. There are still various critical open issues, while SoS have been increasingly adopted as a suitable and integrated solution in critical domains.
大型软件密集型系统已经出现在多个应用领域,如医疗保健、交通、智能环境和工业4.0。有时被称为系统的系统(SoS),由各种异构和独立的软件系统的集成产生,这种大型系统导致高动态性,并且经常在关键和不确定的环境中运行。因此,这些系统的可靠性必须受到关注,但传统的可靠性方法无法应对如此高的动态性和不确定性。因此,需要新的解决方案来确保SoS的可靠性。此外,缺乏对SoS可靠性的研究。本文介绍了解决SoS可靠性问题的最新方法。在调查了文献之后,我们选择了27项研究,对影响SoS可靠性的因素以及改善可靠性的方法和指标进行了详细的分析。我们发现,研究人员在独立工作,主要为特定领域的问题开发解决方案,这一领域仍在不断成熟。仍然存在各种关键的开放问题,而SoS已越来越多地作为关键领域的合适和集成解决方案被采用。
{"title":"Reliability in Software-intensive Systems: Challenges, Solutions, and Future Perspectives","authors":"F. Ferreira, E. Nakagawa, R. Santos","doi":"10.1109/SEAA53835.2021.00016","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00016","url":null,"abstract":"Large software-intensive systems have emerged in several application domains, such as healthcare, transportation, smart environments, and Industry 4.0. Sometimes referred to as Systems-of-Systems (SoS) and resulted from the integration of various heterogeneous and independent software systems, such large systems lead to high dynamism and often operate in critical and uncertain environments. Hence, the reliability of these systems must be a concern, but traditional reliability approaches fail to cope with such high dynamism and uncertainty. Thus, new solutions are required to ensure the reliability of SoS. Moreover, there is a lack of studies that investigate the reliability of SoS. This paper presents the state of the art of the way that the reliability of SoS has been addressed. After investigating the literature, we selected 27 studies to perform a detailed analysis regarding factors that affect the reliability of SoS and approaches and metrics to improve it. We found an area still gaining maturity with researchers working in isolation and mainly developing solutions for domain-specific problems. There are still various critical open issues, while SoS have been increasingly adopted as a suitable and integrated solution in critical domains.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Assessing the Suitability of Semi-Supervised Learning Datasets using Item Response Theory 用项目反应理论评估半监督学习数据集的适宜性
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00049
Teodor Fredriksson, D. I. Mattos, J. Bosch, H. H. Olsson
In practice, supervised learning algorithms require fully labeled datasets to achieve the high accuracy demanded by current modern applications. However, in industrial settings supervised learning algorithms can perform poorly because of few labeled instances. Semi-supervised learning (SSL) is an automatic labeling approach that utilizes complete labels to infer missing labels in partially complete datasets. The high number of available SSL algorithms and the lack of systematic comparison between them leaves practitioners without guidelines to select the appropriate one for their application. Moreover, each SSL algorithm is often validated and evaluated in a small number of common datasets. However, there is no research that examines what datasets are suitable for comparing different SSL algorihtms. The purpose of this paper is to empirically evaluate the suitability of the datasets commonly used to evaluate and compare different SSL algorithms. We performed a simulation study using twelve datasets of three different datatypes (numerical, text, image) on thirteen different SSL algorithms. The contributions of this paper are two-fold. First, we propose the use of Bayesian congeneric item response theory model to assess the suitability of commonly used datasets. Second, we compare the different SSL algorithms using these datasets. The results show that with except of three datasets, the others have very low discrimination factors and are easily solved by the current algorithms. Additionally, the SSL algorithms have overlapping 90% credible intervals, indicating uncertainty in the difference between the accuracy of these SSL models. The paper concludes suggesting that researchers and practitioners should better consider the choice of datasets used for comparing SSL algorithms.
在实践中,监督学习算法需要完全标记的数据集才能达到当前现代应用所要求的高精度。然而,在工业环境中,监督学习算法由于很少有标记实例而表现不佳。半监督学习(SSL)是一种自动标记方法,它利用完整标签来推断部分完整数据集中缺失的标签。可用的SSL算法数量众多,而且缺乏对它们之间的系统比较,这使得从业者在为其应用程序选择合适的算法时缺乏指导方针。此外,每个SSL算法通常在少量公共数据集中进行验证和评估。然而,没有研究检查哪些数据集适合比较不同的SSL算法。本文的目的是根据经验评估通常用于评估和比较不同SSL算法的数据集的适用性。我们在13种不同的SSL算法上使用3种不同数据类型(数字、文本、图像)的12个数据集进行了模拟研究。本文的贡献是双重的。首先,我们提出使用贝叶斯同属项目反应理论模型来评估常用数据集的适用性。其次,我们使用这些数据集比较不同的SSL算法。结果表明,除3个数据集外,其余数据集的判别因子都很低,用现有算法很容易求解。此外,SSL算法具有重叠的90%可信区间,这表明这些SSL模型的准确性差异存在不确定性。本文的结论建议,研究人员和从业人员应该更好地考虑用于比较SSL算法的数据集的选择。
{"title":"Assessing the Suitability of Semi-Supervised Learning Datasets using Item Response Theory","authors":"Teodor Fredriksson, D. I. Mattos, J. Bosch, H. H. Olsson","doi":"10.1109/SEAA53835.2021.00049","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00049","url":null,"abstract":"In practice, supervised learning algorithms require fully labeled datasets to achieve the high accuracy demanded by current modern applications. However, in industrial settings supervised learning algorithms can perform poorly because of few labeled instances. Semi-supervised learning (SSL) is an automatic labeling approach that utilizes complete labels to infer missing labels in partially complete datasets. The high number of available SSL algorithms and the lack of systematic comparison between them leaves practitioners without guidelines to select the appropriate one for their application. Moreover, each SSL algorithm is often validated and evaluated in a small number of common datasets. However, there is no research that examines what datasets are suitable for comparing different SSL algorihtms. The purpose of this paper is to empirically evaluate the suitability of the datasets commonly used to evaluate and compare different SSL algorithms. We performed a simulation study using twelve datasets of three different datatypes (numerical, text, image) on thirteen different SSL algorithms. The contributions of this paper are two-fold. First, we propose the use of Bayesian congeneric item response theory model to assess the suitability of commonly used datasets. Second, we compare the different SSL algorithms using these datasets. The results show that with except of three datasets, the others have very low discrimination factors and are easily solved by the current algorithms. Additionally, the SSL algorithms have overlapping 90% credible intervals, indicating uncertainty in the difference between the accuracy of these SSL models. The paper concludes suggesting that researchers and practitioners should better consider the choice of datasets used for comparing SSL algorithms.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129235624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Systematic Mapping Study on the Use of Software Engineering Practices to Develop MVPs 使用软件工程实践开发mvp的系统映射研究
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00017
S. Alonso, Marcos Kalinowski, Marx L. Viana, B. Ferreira, Simone D. J. Barbosa
[Background] Many startup environments and even traditional software companies have embraced the use of MVPs (Minimum Viable Products) to allow quickly experimenting solution options. The MVP concept has influenced the way in which development teams apply Software Engineering (SE) practices. However, the overall understanding of this influence of MVPs on SE practices is still poor. [Objective] Our goal is to characterize the publication landscape on practices that have been used in the context of software MVPs. [Method] We conducted a systematic mapping study using a hybrid search strategy that consists of a database search and parallel forward and backward snowballing. [Results] We identified 33 papers, published between 2013 and 2020. We observed some trends related to MVP ideation and evaluation practices. For instance, regarding ideation, we found six different approaches (e.g., Design Thinking, Lean Inception) and mainly informal end-user involvement practices (e.g., workshops, interviews). For evaluation there is an emphasis on end-user validations based on practices such as usability tests, A/B testing, and usage data analysis. However, there is still limited research related to MVP technical feasibility assessment and effort estimation. We also observed a lack of scientific rigor in many of the identified studies. [Conclusion] Our analysis suggests that there are opportunities for solution proposals to address gaps concerning technical feasibility assessment and effort estimation. Also, more effort needs to be invested into empirically evaluating the existing MVP-related practices.
【背景】许多创业环境,甚至是传统的软件公司都开始使用mvp(最小可行产品)来快速试验解决方案。MVP概念影响了开发团队应用软件工程(SE)实践的方式。然而,对mvp对SE实践的影响的整体理解仍然很差。[目的]我们的目标是描述在软件mvp环境中使用的实践的出版景观。[方法]我们使用混合搜索策略进行了系统的映射研究,该策略由数据库搜索和并行向前和向后滚雪球组成。[结果]我们确定了33篇论文,发表于2013年至2020年之间。我们观察到一些与MVP构思和评估实践相关的趋势。例如,关于构思,我们发现了六种不同的方法(例如,设计思维,精益初始阶段)和主要是非正式的终端用户参与实践(例如,研讨会,访谈)。对于评估,强调基于实践的终端用户验证,如可用性测试、A/B测试和使用数据分析。然而,关于MVP技术可行性评估和工作量估算的研究仍然有限。我们还观察到,在许多已确定的研究中缺乏科学严谨性。[结论]我们的分析表明,解决方案提案有机会解决技术可行性评估和工作量估计方面的差距。此外,需要投入更多的精力对现有的mvp相关实践进行经验评估。
{"title":"A Systematic Mapping Study on the Use of Software Engineering Practices to Develop MVPs","authors":"S. Alonso, Marcos Kalinowski, Marx L. Viana, B. Ferreira, Simone D. J. Barbosa","doi":"10.1109/SEAA53835.2021.00017","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00017","url":null,"abstract":"[Background] Many startup environments and even traditional software companies have embraced the use of MVPs (Minimum Viable Products) to allow quickly experimenting solution options. The MVP concept has influenced the way in which development teams apply Software Engineering (SE) practices. However, the overall understanding of this influence of MVPs on SE practices is still poor. [Objective] Our goal is to characterize the publication landscape on practices that have been used in the context of software MVPs. [Method] We conducted a systematic mapping study using a hybrid search strategy that consists of a database search and parallel forward and backward snowballing. [Results] We identified 33 papers, published between 2013 and 2020. We observed some trends related to MVP ideation and evaluation practices. For instance, regarding ideation, we found six different approaches (e.g., Design Thinking, Lean Inception) and mainly informal end-user involvement practices (e.g., workshops, interviews). For evaluation there is an emphasis on end-user validations based on practices such as usability tests, A/B testing, and usage data analysis. However, there is still limited research related to MVP technical feasibility assessment and effort estimation. We also observed a lack of scientific rigor in many of the identified studies. [Conclusion] Our analysis suggests that there are opportunities for solution proposals to address gaps concerning technical feasibility assessment and effort estimation. Also, more effort needs to be invested into empirically evaluating the existing MVP-related practices.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131423376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICARUS - Incremental Design and Verification of Software Updates in Safety-Critical Product Lines ICARUS -安全关键产品线中软件更新的增量设计和验证
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00055
Houssem Guissouma, M. Schindewolf, E. Sax
The lifecycles of software updates for Cyber Physical Systems are significantly decreasing. Especially for safety-critical functions, these must be carefully tested for compatibility to target configurations. In order to formalize the requirements of the system and to validate software changes in a modular way, contract-based design can be used for formal verification. A contract is defined as a pair of an assumption describing the required conditions for the working environment of a component, and a guarantee, which specifies its expected behavior including timing properties and value ranges of interfaces. In this work, we present a concept for efficient verification of a software update in a contract-based development environment with consideration of several system variants. The concept is based on an incremental refinement verification methodology which uses deltas, i.e. differences between variants, to automatically propagate changes and retest only the incrementally relevant contracts. By applying the methodology in a case study for a network representing a variable Adaptive Cruise Control system, we could demonstrate its applicability and its advantages in reducing the total verification effort for product line evolution.
网络物理系统软件更新的生命周期正在显著缩短。特别是对于安全关键型功能,必须仔细测试它们与目标配置的兼容性。为了形式化系统的需求,并以模块化的方式验证软件变更,可以使用基于契约的设计进行形式化验证。契约被定义为一对:描述组件工作环境所需条件的假设,以及指定其预期行为(包括定时属性和接口的值范围)的保证。在这项工作中,我们提出了在基于契约的开发环境中有效验证软件更新的概念,并考虑了几个系统变体。该概念基于增量细化验证方法,该方法使用delta(即变量之间的差异)来自动传播更改并仅重新测试增量相关的契约。通过在一个代表可变自适应巡航控制系统的网络的案例研究中应用该方法,我们可以证明它的适用性和它在减少产品线演进的总验证工作方面的优势。
{"title":"ICARUS - Incremental Design and Verification of Software Updates in Safety-Critical Product Lines","authors":"Houssem Guissouma, M. Schindewolf, E. Sax","doi":"10.1109/SEAA53835.2021.00055","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00055","url":null,"abstract":"The lifecycles of software updates for Cyber Physical Systems are significantly decreasing. Especially for safety-critical functions, these must be carefully tested for compatibility to target configurations. In order to formalize the requirements of the system and to validate software changes in a modular way, contract-based design can be used for formal verification. A contract is defined as a pair of an assumption describing the required conditions for the working environment of a component, and a guarantee, which specifies its expected behavior including timing properties and value ranges of interfaces. In this work, we present a concept for efficient verification of a software update in a contract-based development environment with consideration of several system variants. The concept is based on an incremental refinement verification methodology which uses deltas, i.e. differences between variants, to automatically propagate changes and retest only the incrementally relevant contracts. By applying the methodology in a case study for a network representing a variable Adaptive Cruise Control system, we could demonstrate its applicability and its advantages in reducing the total verification effort for product line evolution.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Migrating Monoliths to Microservices-based Customizable Multi-tenant Cloud-native Apps 将单体迁移到基于微服务的可定制多租户云原生应用
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00030
Sindre Grønstøl Haugeland, P. Nguyen, Hui Song, Franck Chauvel
It was common that software vendors sell licenses to their clients to use software products, such as Enterprise Resource Planning, which are deployed as a monolithic entity on clients’ premises. Moreover, many clients, especially big organizations, often require software products to be customized for their specific needs before deployment on premises. While software vendors are trying to migrate their monolithic software products to Cloud-native Software-as-a-Service (SaaS), they face two big challenges that this paper aims at addressing: 1) How to migrate their exclusive monoliths to multi-tenant Cloud-native SaaS; and 2) How to enable tenant-specific customization for multi-tenant Cloud-native SaaS. This paper suggests an approach for migrating monoliths to microservice-based Cloud-native SaaS, providing customers with a flexible customization opportunity, while taking advantage of the economies of scale that the Cloud and multi-tenancy provide. Our approach shows not only the migration to microservices but also how to introduce the necessary infrastructure to support the new services and enable tenant-specific customization. We illustrate the application of our approach on migrating a reference application of Microsoft called SportStore.
软件供应商向他们的客户出售使用软件产品的许可证是很常见的,比如企业资源规划,它作为一个整体实体部署在客户的前提下。此外,许多客户,特别是大型组织,经常要求软件产品在部署到本地之前针对他们的特定需求进行定制。当软件供应商试图将他们的单片软件产品迁移到云原生软件即服务(SaaS)时,他们面临着本文旨在解决的两大挑战:1)如何将他们的独家单片软件迁移到多租户云原生SaaS;2)如何为多租户云原生SaaS启用特定于租户的定制。本文提出了一种将大型企业迁移到基于微服务的云原生SaaS的方法,为客户提供灵活的定制机会,同时利用云和多租户提供的规模经济。我们的方法不仅展示了向微服务的迁移,还展示了如何引入必要的基础设施来支持新服务和实现特定于租户的定制。我们将演示我们的方法在迁移Microsoft的一个名为SportStore的参考应用程序中的应用程序。
{"title":"Migrating Monoliths to Microservices-based Customizable Multi-tenant Cloud-native Apps","authors":"Sindre Grønstøl Haugeland, P. Nguyen, Hui Song, Franck Chauvel","doi":"10.1109/SEAA53835.2021.00030","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00030","url":null,"abstract":"It was common that software vendors sell licenses to their clients to use software products, such as Enterprise Resource Planning, which are deployed as a monolithic entity on clients’ premises. Moreover, many clients, especially big organizations, often require software products to be customized for their specific needs before deployment on premises. While software vendors are trying to migrate their monolithic software products to Cloud-native Software-as-a-Service (SaaS), they face two big challenges that this paper aims at addressing: 1) How to migrate their exclusive monoliths to multi-tenant Cloud-native SaaS; and 2) How to enable tenant-specific customization for multi-tenant Cloud-native SaaS. This paper suggests an approach for migrating monoliths to microservice-based Cloud-native SaaS, providing customers with a flexible customization opportunity, while taking advantage of the economies of scale that the Cloud and multi-tenancy provide. Our approach shows not only the migration to microservices but also how to introduce the necessary infrastructure to support the new services and enable tenant-specific customization. We illustrate the application of our approach on migrating a reference application of Microsoft called SportStore.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Probabilistic Program Performance Analysis 概率程序性能分析
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00027
Ioannis Stefanakos, R. Calinescu, Simos Gerasimou
We introduce a tool-supported method for the formal analysis of timing, resource use, cost and other quality aspects of computer programs. The new method synthesises a Markov-chain model of the analysed code, computes this quantitative model’s transition probabilities using information from program logs, and employs probabilistic model checking to evaluate the performance properties of interest. Unlike existing solutions, our method can reuse the probabilistic model to accurately predict how the program performance would change if the code ran on a different hardware platform, used a new function library, or had a different usage profile. We show the effectiveness of our method by using it to analyse the performance of Java code from the Apache Commons Math library, the Android messaging app Telegram, and an implementation of the knapsack algorithm.
我们介绍了一种工具支持的方法,用于对计算机程序的时间、资源使用、成本和其他质量方面进行形式化分析。新方法综合了被分析代码的马尔可夫链模型,利用程序日志信息计算该定量模型的转移概率,并采用概率模型检查来评估感兴趣的性能特性。与现有的解决方案不同,我们的方法可以重用概率模型来准确地预测如果代码在不同的硬件平台上运行、使用新的函数库或具有不同的使用配置文件,程序性能将如何变化。我们通过分析Apache Commons Math库、Android消息应用Telegram和一个背包算法的实现中的Java代码的性能来展示我们方法的有效性。
{"title":"Probabilistic Program Performance Analysis","authors":"Ioannis Stefanakos, R. Calinescu, Simos Gerasimou","doi":"10.1109/SEAA53835.2021.00027","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00027","url":null,"abstract":"We introduce a tool-supported method for the formal analysis of timing, resource use, cost and other quality aspects of computer programs. The new method synthesises a Markov-chain model of the analysed code, computes this quantitative model’s transition probabilities using information from program logs, and employs probabilistic model checking to evaluate the performance properties of interest. Unlike existing solutions, our method can reuse the probabilistic model to accurately predict how the program performance would change if the code ran on a different hardware platform, used a new function library, or had a different usage profile. We show the effectiveness of our method by using it to analyse the performance of Java code from the Apache Commons Math library, the Android messaging app Telegram, and an implementation of the knapsack algorithm.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Approach for Ranking Feature-based Clustering Methods and its Application in Multi-System Infrastructure Monitoring 基于特征的聚类排序方法及其在多系统基础设施监控中的应用
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00031
Andreas Schörgenhumer, T. Natschläger, P. Grünbacher, Mario Kahlhofer, Peter Chalupar, H. Mössenböck
Companies need to collect and analyze time series data to continuously monitor the behavior of software systems during operation, which can in turn be used for performance monitoring, anomaly detection or identifying problems after system crashes. However, gaining insights into common data patterns in time series is challenging, in particular, when analyzing data concerning different properties and from multiple systems. Clustering approaches have been hardly studied in the context of monitoring data, despite their possible benefits. In this paper, we present a feature-based approach to identify clusters in unlabeled infrastructure monitoring data collected from multiple independent software systems. We introduce time series properties which are grouped into feature sets and combine them with various unsupervised machine learning models to find the methods best suited for our clustering goal. We thoroughly evaluate our approach using two large-scale, industrial monitoring datasets. Finally, we apply one of the top-ranked methods to thousands of time series from hundreds of software systems, thereby showing the usefulness of our approach.
公司需要收集和分析时间序列数据,以持续监控软件系统在运行期间的行为,这些数据反过来可用于性能监控、异常检测或系统崩溃后识别问题。然而,深入了解时间序列中的常见数据模式是具有挑战性的,特别是在分析涉及不同属性和来自多个系统的数据时。尽管聚类方法可能有好处,但它们在监测数据的背景下几乎没有研究过。在本文中,我们提出了一种基于特征的方法来识别从多个独立软件系统收集的未标记基础设施监控数据中的集群。我们引入时间序列属性,将其分组为特征集,并将其与各种无监督机器学习模型相结合,以找到最适合我们聚类目标的方法。我们使用两个大规模的工业监测数据集彻底评估了我们的方法。最后,我们将排名靠前的方法之一应用于来自数百个软件系统的数千个时间序列,从而显示了我们方法的有用性。
{"title":"An Approach for Ranking Feature-based Clustering Methods and its Application in Multi-System Infrastructure Monitoring","authors":"Andreas Schörgenhumer, T. Natschläger, P. Grünbacher, Mario Kahlhofer, Peter Chalupar, H. Mössenböck","doi":"10.1109/SEAA53835.2021.00031","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00031","url":null,"abstract":"Companies need to collect and analyze time series data to continuously monitor the behavior of software systems during operation, which can in turn be used for performance monitoring, anomaly detection or identifying problems after system crashes. However, gaining insights into common data patterns in time series is challenging, in particular, when analyzing data concerning different properties and from multiple systems. Clustering approaches have been hardly studied in the context of monitoring data, despite their possible benefits. In this paper, we present a feature-based approach to identify clusters in unlabeled infrastructure monitoring data collected from multiple independent software systems. We introduce time series properties which are grouped into feature sets and combine them with various unsupervised machine learning models to find the methods best suited for our clustering goal. We thoroughly evaluate our approach using two large-scale, industrial monitoring datasets. Finally, we apply one of the top-ranked methods to thousands of time series from hundreds of software systems, thereby showing the usefulness of our approach.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method for Modeling Data Anomalies in Practice 一种数据异常建模方法
Pub Date : 2021-09-01 DOI: 10.1109/SEAA53835.2021.00024
Jennifer Horkoff, M. Staron, Wilhelm Meding
As technology has allowed us to collect large amounts of industrial data, it has become critical to analyze and understand the data collected, in particular to find data anomalies. Anomaly analysis allows a company to detect, analyze and understand anomalous or unusual data patterns. This is an important activity to understand, for example, deviations in service which may indicate potential problems, or differing customer behavior which may reveal new business opportunities. Much previous work has focused on anomaly detection, in particular using machine learning. Such approaches allow clustering of data patterns by common attributes, and, although useful, clusters often do not correspond to the root causes of anomalies, meaning that more manual analysis is needed. In this paper we report on a design science study with two different teams, in a partner company which focuses on modeling and understanding the attributes and root causes of data anomalies. After iteration, for each team, we have created general and anomaly-specific UML class diagrams and goal models to capture anomaly details. We use our experiences to create an example taxonomy, classifying anomalies by their root causes, and to create a general method for modeling and understanding data anomalies. This work paves the way for a better understanding of anomalies and their root causes, leading towards creating a training set which may be used for machine learning approaches.
随着技术的发展,我们可以收集大量的工业数据,分析和理解收集到的数据变得至关重要,尤其是发现数据异常。异常分析允许公司检测、分析和理解异常或不寻常的数据模式。这是一个重要的活动,以了解,例如,服务偏差可能表明潜在的问题,或不同的客户行为,可能揭示新的商业机会。以前的许多工作都集中在异常检测上,特别是使用机器学习。这种方法允许按公共属性对数据模式进行聚类,尽管有用,但聚类通常不对应异常的根本原因,这意味着需要更多的手工分析。在本文中,我们报告了一个设计科学研究与两个不同的团队,在一个合作伙伴公司的重点建模和理解的属性和数据异常的根本原因。在迭代之后,对于每个团队,我们已经创建了通用的和特定于异常的UML类图和目标模型来获取异常细节。我们使用我们的经验来创建一个示例分类法,根据其根本原因对异常进行分类,并创建一个用于建模和理解数据异常的通用方法。这项工作为更好地理解异常及其根本原因铺平了道路,从而创建了一个可用于机器学习方法的训练集。
{"title":"A Method for Modeling Data Anomalies in Practice","authors":"Jennifer Horkoff, M. Staron, Wilhelm Meding","doi":"10.1109/SEAA53835.2021.00024","DOIUrl":"https://doi.org/10.1109/SEAA53835.2021.00024","url":null,"abstract":"As technology has allowed us to collect large amounts of industrial data, it has become critical to analyze and understand the data collected, in particular to find data anomalies. Anomaly analysis allows a company to detect, analyze and understand anomalous or unusual data patterns. This is an important activity to understand, for example, deviations in service which may indicate potential problems, or differing customer behavior which may reveal new business opportunities. Much previous work has focused on anomaly detection, in particular using machine learning. Such approaches allow clustering of data patterns by common attributes, and, although useful, clusters often do not correspond to the root causes of anomalies, meaning that more manual analysis is needed. In this paper we report on a design science study with two different teams, in a partner company which focuses on modeling and understanding the attributes and root causes of data anomalies. After iteration, for each team, we have created general and anomaly-specific UML class diagrams and goal models to capture anomaly details. We use our experiences to create an example taxonomy, classifying anomalies by their root causes, and to create a general method for modeling and understanding data anomalies. This work paves the way for a better understanding of anomalies and their root causes, leading towards creating a training set which may be used for machine learning approaches.","PeriodicalId":435977,"journal":{"name":"2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1