Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2020
Runtime modeling and analysis of IoT systems
MODELS '20: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsArticle No.: 40, Pages 1–5https://doi.org/10.1145/3417990.3421397Internet-of-things systems are difficult to understand and debug due to their distributed nature and weak connectivity. We address this problem by using relational reference attribute grammars to model and analyze IoT systems with unreachable parts. A ...
- research-articleJanuary 2020
Fast Turnaround HLS Debugging Using Dependency Analysis and Debug Overlays
ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 13, Issue 1Article No.: 4, Pages 1–26https://doi.org/10.1145/3372490High-level synthesis (HLS) has gained considerable traction over recent years, as it allows for faster development and verification of hardware accelerators than traditional RTL design. While HLS allows for most bugs to be caught during software ...
- research-articleOctober 2019
Supporting feature model evolution by suggesting constraints from code-level dependency analyses
GPCE 2019: Proceedings of the 18th ACM SIGPLAN International Conference on Generative Programming: Concepts and ExperiencesPages 129–142https://doi.org/10.1145/3357765.3359525Feature models are a de facto standard for representing the commonalities and variability of product lines and configurable software systems. Requirements-level features are commonly implemented in multiple source code artifacts, which results in ...
- research-articleSeptember 2017
Software architecture reconstruction and compliance checking: a case study
ECSA '17: Proceedings of the 11th European Conference on Software Architecture: Companion ProceedingsPages 145–151https://doi.org/10.1145/3129790.3129809In cases where architectural documentation is outdated or missing, software architecture reconstruction (SAR) techniques may be used to create architectural views of a system. This paper describes a case study in which SAR techniques are applied to ...
- articleFebruary 2017
The accuracy of dependency analysis in static architecture compliance checking
Software—Practice & Experience (SPRE), Volume 47, Issue 2Pages 273–309https://doi.org/10.1002/spe.2421Architecture compliance checking ACC is an approach to verify conformance of implemented program code to high-level models of architectural design. Static ACC focuses on the modular software architecture and on the existence of rule violating ...
-
- research-articleNovember 2016
Dependency related parameters in the reconstruction of a layered software architecture
ECSAW '16: Proccedings of the 10th European Conference on Software Architecture WorkshopsArticle No.: 18, Pages 1–7https://doi.org/10.1145/2993412.3003394Software architecture reconstruction techniques may be used to understand and maintain software systems, especially in these cases where architectural documentation is outdated or missing. Reconstruction of layers is interesting, since the Layers ...
- research-articleOctober 2016
High Fidelity Data Reduction for Big Data Security Dependency Analyses
- Zhang Xu,
- Zhenyu Wu,
- Zhichun Li,
- Kangkook Jee,
- Junghwan Rhee,
- Xusheng Xiao,
- Fengyuan Xu,
- Haining Wang,
- Guofei Jiang
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 504–516https://doi.org/10.1145/2976749.2978378Intrusive multi-step attacks, such as Advanced Persistent Threat (APT) attacks, have plagued enterprises with significant financial losses and are the top reason for enterprises to increase their security budgets. Since these attacks are sophisticated ...
- ArticleAugust 2015
EyePhy: Detecting Dependencies in Cyber-Physical System Apps due to Human-in-the-Loop
MOBIQUITOUS'15: proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services on 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and ServicesPages 170–179https://doi.org/10.4108/eai.22-7-2015.2260045As app based paradigms are becoming popular, millions of
apps are developed from many domains including energy,
health, security, and entertainment. The US FDA expects
that there will be 500 million smart phone users downloading
healthcare related apps ...
- short-paperJuly 2015
Mining change history for test-plan generation (doctoral symposium)
ISSTA 2015: Proceedings of the 2015 International Symposium on Software Testing and AnalysisPages 444–447https://doi.org/10.1145/2771783.2784776Regression testing is an essential step in safeguarding the evolution of a system, yet there is often not enough time to exercise all available tests. Identifying the subset of tests that can reveal potential issues introduced by a change is a ...
- research-articleJune 2015
Static Analysis Techniques for Semiautomatic Synthesis of Message Passing Software Skeletons
ACM Transactions on Modeling and Computer Simulation (TOMACS), Volume 26, Issue 1Article No.: 4, Pages 1–24https://doi.org/10.1145/2778888The design of high-performance computing architectures requires performance analysis of large-scale parallel applications to derive various parameters concerning hardware design and software development. The process of performance analysis and ...
- research-articleMay 2015
Exploiting Matrix Dependency for Efficient Distributed Matrix Computation
SIGMOD '15: Proceedings of the 2015 ACM SIGMOD International Conference on Management of DataPages 93–105https://doi.org/10.1145/2723372.2723712Distributed matrix computation is a popular approach for many large-scale data analysis and machine learning tasks. However existing distributed matrix computation systems generally incur heavy communication cost during the runtime, which degrades the ...
- research-articleFebruary 2015
Analyzing Dependencies in an Industrial Automation Engineering System
ISEC '15: Proceedings of the 8th India Software Engineering ConferencePages 60–69https://doi.org/10.1145/2723742.2723748This paper presents an approach to compute and visualize dependencies between elements of an industrial automation system. The various system elements are represented by a network of vertices and edges in a graph, which in turn is used for computing ...
- ArticleOctober 2014
Extracting Dependencies from Software Changes: An Industry Experience Report
IWSM-MENSURA '14: Proceedings of the 2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product MeasurementPages 163–168https://doi.org/10.1109/IWSM.Mensura.2014.12Retrieving and analyzing information from software repositories and detecting dependencies are important tasks supporting software evolution. Dependency information is used for change impact analysis, defect prediction as well as cohesion and coupling ...
- ArticleSeptember 2014
maintaineR: A Web-Based Dashboard for Maintainers of CRAN Packages
ICSME '14: Proceedings of the 2014 IEEE International Conference on Software Maintenance and EvolutionPages 597–600https://doi.org/10.1109/ICSME.2014.104The R development community maintains thousands of packages through its Comprehensive R Archive Network CRAN. The growth and evolution of this archive makes it more and more difficult to maintain packages and their interdependencies, and the existing ...
- ArticleMay 2014
Architectural dependency analysis to understand rework costs for safety-critical systems
ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software EngineeringPages 185–194https://doi.org/10.1145/2591062.2591185To minimize testing and technology upgrade costs for safety-critical systems, a thorough understanding and analysis of architectural dependencies is essential. Unmanaged dependencies create cost overruns and degraded qualities in systems. Architecture ...
- articleMay 2014
Incorporating appraisal expression patterns into topic modeling for aspect and sentiment word identification
Knowledge-Based Systems (KNBS), Volume 61, Issue 1Pages 29–47https://doi.org/10.1016/j.knosys.2014.02.003With the considerable growth of user-generated content, online reviews are becoming extremely valuable sources for mining customers' opinions on products and services. However, most of the traditional opinion mining methods are coarse-grained and cannot ...
- ArticleJanuary 2014
Ordering Upgrade Changes for Highly Available Component Based Systems
HASE '14: Proceedings of the 2014 IEEE 15th International Symposium on High-Assurance Systems EngineeringPages 259–260https://doi.org/10.1109/HASE.2014.48Highly available systems undergo upgrades like any other systems but with a more stringent requirement of no or very limited service outage. Unforeseen violations of software dependencies are the main causes of service outage during upgrade. We ...
- ArticleOctober 2013
Extending the Dependency Taxonomy of Agile Software Development
Proceedings of the 19th International Conference on Collaboration and Technology - Volume 8224Pages 274–289https://doi.org/10.1007/978-3-642-41347-6_20Systems and software development is a collaborative activity and agile software development epitomises collaboration by formalising how teams and their customers work together to develop a software product. Collaboration is achieved, in part, using ...
- research-articleSeptember 2013
Maintaining verified software
Haskell '13: Proceedings of the 2013 ACM SIGPLAN symposium on HaskellPages 71–80https://doi.org/10.1145/2503778.2503787Maintaining software in the face of evolving dependencies is a challenging problem, and in addition to good release practices there is a need for automatic dependency analysis tools to avoid errors creeping in. Verified software reveals more semantic ...
Also Published in:
ACM SIGPLAN Notices: Volume 48 Issue 12 - ArticleSeptember 2013
Variations on Using Propagation Cost to Measure Architecture Modifiability Properties
ICSM '13: Proceedings of the 2013 IEEE International Conference on Software MaintenancePages 400–403https://doi.org/10.1109/ICSM.2013.57Tools available for measuring the modifiability or impact of change of a system through its architecture typically use structural metrics. These metrics take into account dependencies among the different elements of a system. However, they fail to ...