465,094 research outputs found
Crosscutting, what is and what is not? A Formal definition based on a Crosscutting Pattern
Crosscutting is usually described in terms of scattering and tangling. However, the distinction between these concepts is vague, which could lead to ambiguous statements. Sometimes, precise definitions are required, e.g. for the formal identification of crosscutting concerns. We propose a conceptual framework for formalizing these concepts based on a crosscutting pattern that shows the mapping between elements at two levels, e.g. concerns and representations of concerns. The definitions of the concepts are formalized in terms of linear algebra, and visualized with matrices and matrix operations. In this way, crosscutting can be clearly distinguished from scattering and tangling. Using linear algebra, we demonstrate that our definition generalizes other definitions of crosscutting as described by Masuhara & Kiczales [21] and Tonella and Ceccato [28]. The framework can be applied across several refinement levels assuring traceability of crosscutting concerns. Usability of the framework is illustrated by means of applying it to several areas such as change impact analysis, identification of crosscutting at early phases of software development and in the area of model driven software development
Animating the development of Social Networks over time using a dynamic extension of multidimensional scaling
The animation of network visualizations poses technical and theoretical
challenges. Rather stable patterns are required before the mental map enables a
user to make inferences over time. In order to enhance stability, we developed
an extension of stress-minimization with developments over time. This dynamic
layouter is no longer based on linear interpolation between independent static
visualizations, but change over time is used as a parameter in the
optimization. Because of our focus on structural change versus stability the
attention is shifted from the relational graph to the latent eigenvectors of
matrices. The approach is illustrated with animations for the journal citation
environments of Social Networks, the (co-)author networks in the carrying
community of this journal, and the topical development using relations among
its title words. Our results are also compared with animations based on
PajekToSVGAnim and SoNIA
Software Engineers' Information Seeking Behavior in Change Impact Analysis - An Interview Study
Software engineers working in large projects must navigate complex
information landscapes. Change Impact Analysis (CIA) is a task that relies on
engineers' successful information seeking in databases storing, e.g., source
code, requirements, design descriptions, and test case specifications. Several
previous approaches to support information seeking are task-specific, thus
understanding engineers' seeking behavior in specific tasks is fundamental. We
present an industrial case study on how engineers seek information in CIA, with
a particular focus on traceability and development artifacts that are not
source code. We show that engineers have different information seeking
behavior, and that some do not consider traceability particularly useful when
conducting CIA. Furthermore, we observe a tendency for engineers to prefer less
rigid types of support rather than formal approaches, i.e., engineers value
support that allows flexibility in how to practically conduct CIA. Finally, due
to diverse information seeking behavior, we argue that future CIA support
should embrace individual preferences to identify change impact by empowering
several seeking alternatives, including searching, browsing, and tracing.Comment: Accepted for publication in the proceedings of the 25th International
Conference on Program Comprehensio
Sensitivity Analysis for a Scenario-Based Reliability Prediction Model
As a popular means for capturing behavioural requirements, scenariosshow how components interact to provide system-level functionality.If component reliability information is available, scenarioscan be used to perform early system reliability assessment. Inprevious work we presented an automated approach for predictingsoftware system reliability that extends a scenario specificationto model (1) the probability of component failure, and (2) scenariotransition probabilities. Probabilistic behaviour models ofthe system are then synthesized from the extended scenario specification.From the system behaviour model, reliability predictioncan be computed. This paper complements our previous work andpresents a sensitivity analysis that supports reasoning about howcomponent reliability and usage profiles impact on the overall systemreliability. For this purpose, we present how the system reliabilityvaries as a function of the components reliabilities and thescenario transition probabilities. Taking into account the concurrentnature of component-based software systems, we also analysethe effect of implied scenarios prevention into the sensitivity analysisof our reliability prediction technique
Influence of Interfacial Dynamics and Multi-Dimensional Coupling from Isolator Brackets on Exhaust Isolation System Performance
An automotive exhaust structure is a primary structure-borne noise path by which vibratory forces from the powertrain are transmitted to the vehicle body. The exhaust structure is typically connected to the vehicle body through a system of brackets containing elastomeric isolators, serving as the principal means of vibration isolation. In exhaust isolator system design, the isolator brackets are often modeled as simple springs. This approach neglects the effects of interfacial dynamics and multi-dimensional coupling, which result from distributed mass and stiffness throughout the isolator brackets. Accordingly, the objective of this research is to better understand how the interfacial dynamics and multi-dimensional coupling of the isolator brackets affect the exhaust isolation system performance in the 0-100 Hz range. Therefore, models with a proper representation of these interfacial dynamics and multi-dimensional coupling are created using finite element analysis (FEA) and then parameterized into multi-dimensional lumped parameter models through correlation of static and modal testing on the components and assembled system. The dynamic responses from the models for the exhaust structure and isolator brackets are then combined into a system-level model through a frequency-response-function-based substructuring method. A design study is conducted on the system-level model by systematically changing component parameters and evaluating the effect on the transmitted vertical body forces. The results show that the inclusion of these interfacial dynamics have nominal influence on isolation performance; however, the coupling terms show an observable influence, typically increasing the force transmitted to the vehicle body. In addition, the study identified additional design modifications that could improve isolation performance, such as an increase in isolator material loss factor and an increase in the isolator fore-aft stiffness. Although the results are specific to this isolation system design, the modeling procedure outlined has the potential to be used early in the vehicle design process to identify improvements to other baseline designs.NSF I/UCRC Smart Vehicle Concepts CenterTenneco, Inc.A three-year embargo was granted for this item.Academic Major: Mechanical Engineerin
Identification of key process areas in the production on an e-capability maturity model for UK construction organisations
Uptake of e-procurement by construction organisations has been slow (Martin, 2008). Positive e-business achievements in other industries, point towards the potential for the construction industry to accomplish similar results. Since the Modernising Government White paper set targets through best value indicator BV157 for implementation in the public sector, Government has supported many initiatives encouraging e-procurement. These are based on documented efficiency and cost savings (Knudsen, 2003; Minahan and Degan, 2001; McIntosh and Sloan, 2001; Martin, 2008). However, Martin (2003, 2008) demonstrates only a modest increase in the uptake of e-procurement in the UK construction industry.
Alshawi et al (2004) identified the significance of possessing a model to sustain the embedment of any business process within an organisation. Saleh and Alshawi (2005) describe a number of model types used to gauge maturity in an organisation. One of these models is the capability maturity model. Paulk et al (1993) released the Software Capability Maturity Model (CMM) in 1991. Since then many CMMâs have evolved. This paper reports on how a CMM based on Drivers and Barriers to e-procurement identified in Eadie et al (2009) can be developed to gauge the maturity of an organisation in relation to e-procurement.
This paper presents details of a research project which used factor analysis to produce a set of Key Process Areas (KPA) from the drivers and barriers identified in Eadie et al (2009). These KPAs were then subjected to a mapping process linking them to maturity levels to develop a CMM to analyse the e-procurement capability of construction organisations. The mapping will be reported in a later paper. This termed as e-readiness of organisations will indicate the current state of a construction organisation in terms of its readiness to carry out e-procurement. The paper describes in detail the identification of the KPAâs
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security
assurance are currently two major challenges of Cloud-based systems. GDPR compliance implies both privacy and security
mechanisms definition, enforcement and control, including evidence collection. This paper presents a novel DevOps
framework aimed at supporting Cloud consumers in designing, deploying and operating (multi)Cloud systems that include
the necessary privacy and security controls for ensuring transparency to end-users, third parties in service provision (if any)
and law enforcement authorities. The framework relies on the risk-driven specification at design time of privacy and security
level objectives in the system Service Level Agreement (SLA) and in their continuous monitoring and enforcement at runtime.The research leading to these results has received
funding from the European Unionâs Horizon 2020 research
and innovation programme under grant agreement No 644429
and No 780351, MUSA project and ENACT project,
respectively. We would also like to acknowledge all the
members of the MUSA Consortium and ENACT Consortium
for their valuable help
- âŠ