23,375 research outputs found
Boundary Objects and their Use in Agile Systems Engineering
Agile methods are increasingly introduced in automotive companies in the
attempt to become more efficient and flexible in the system development. The
adoption of agile practices influences communication between stakeholders, but
also makes companies rethink the management of artifacts and documentation like
requirements, safety compliance documents, and architecture models.
Practitioners aim to reduce irrelevant documentation, but face a lack of
guidance to determine what artifacts are needed and how they should be managed.
This paper presents artifacts, challenges, guidelines, and practices for the
continuous management of systems engineering artifacts in automotive based on a
theoretical and empirical understanding of the topic. In collaboration with 53
practitioners from six automotive companies, we conducted a design-science
study involving interviews, a questionnaire, focus groups, and practical data
analysis of a systems engineering tool. The guidelines suggest the distinction
between artifacts that are shared among different actors in a company (boundary
objects) and those that are used within a team (locally relevant artifacts). We
propose an analysis approach to identify boundary objects and three practices
to manage systems engineering artifacts in industry
M3: An Open Model for Measuring Code Artifacts
This document details design considerations of M3: a meta model for source
code artifact
Reachability Analysis of Communicating Pushdown Systems
The reachability analysis of recursive programs that communicate
asynchronously over reliable FIFO channels calls for restrictions to ensure
decidability. Our first result characterizes communication topologies with a
decidable reachability problem restricted to eager runs (i.e., runs where
messages are either received immediately after being sent, or never received).
The problem is EXPTIME-complete in the decidable case. The second result is a
doubly exponential time algorithm for bounded context analysis in this setting,
together with a matching lower bound. Both results extend and improve previous
work from La Torre et al
Recommended from our members
Oath formulas in the Poetic Edda
This study examines oaths in the ON Poetic Edda primarily from a linguistic and rhetorical standpoint with the aim of deducing syntactic-rhetorical formulas for oath swearing. As J. Grimm (1816) said and Hibbitts (1992) reiterated, poetic formulations in oral performance cultures may have had mnemonic functions and likely closely resembled real performance, which lends further validity and benefit to this project. This report begins with an examination of the relevant scholarly literature on oaths from Indo-European through ON. Four examples of oaths from the Poetic Edda are then presented, compared, and read with rhetorical and syntactic strategies to discover the formulas. A discussion section presents three evident conclusions on the structure of oath formulas: oaths are indeed formulaic, formula pieces can be optional but ordering does not change, and certain morpho-syntactic choices are intricately tied to the setting of oaths. Finally, directions for future research are suggested.Germanic Studie
- …