71 research outputs found

    Developing an agent-based simulation model of software evolution

    Get PDF
    Context In attempt to simulate the factors that affect the software evolution behaviour and possibly predict it, several simulation models have been developed recently. The current system dynamic (SD) simulation model of software evolution process was built based on actor-network theory (ANT) of software evolution by using system dynamic environment, which is not a suitable environment to reflect the complexity of ANT theory. In addition the SD model has not been investigated for its ability to represent the real-world process of software evolution. Objectives This paper aims to re-implements the current SD model to an agent-based simulation environment ‘Repast’ and checks the behaviour of the new model compared to the existing SD model. It also aims to investigate the ability of the new Repast model to represent the real-world process of software evolution. Methods a new agent-based simulation model is developed based on the current SD model's specifications and then tests similar to the previous model tests are conducted in order to perform a comparative evaluation between of these two results. In addition an investigation is carried out through an interview with an expert in software development area to investigate the model's ability to represent real-world process of software evolution. Results The Repast model shows more stable behaviour compared with the SD model. Results also found that the evolution health of the software can be calibrated quantitatively and that the new Repast model does have the ability to represent real-world processes of software evolution. Conclusion It is concluded that by applying a more suitable simulation environment (agent-based) to represent ANT theory of software evolution, that this new simulation model will show more stable bahaviour compared with the previous SD model; And it will also shows the ability to represent (at least quantatively) the real-world aspect of software evolution.Peer reviewedFinal Accepted Versio

    Simulating Perceptions of Security

    Get PDF
    This document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambridge International Workshop on Security Protocols 2017. Under embargo until 29 November 2018. The final publication is available at Springer via: https://doi.org/10.1007/978-3-319-71075-4_7Systems complicated enough to have ongoing security issues are difficult to understand, and hard to model. The models are hard to understand, even when they are right (another reason they are usually wrong), and too complicated to use to make decisions. Instead attackers, developers, and users make security decisions based on their {\em perceptions} of the system, and not on properties that the system actually has. These perceptions differ between communities, causing decisions made by one community to appear irrational to another. Attempting to predict such irrational behaviour by basing a model of perception on a model of the system is even more complicated than the original modelling problem we can't solve. Ockham's razor says to model the perceptions directly, since these will be simpler than the system itself.Final Accepted Versio

    Modelling the Political Context in Requirements Engineering. The System is made for Man, not Man for the System

    Full text link
    This paper describes the authors point of view on reaching a stage at which it is necessary to understand customer organizations better to identify their problems and how to address them. To resolve this issue we need a mechanism to capture and model how that organization actually operates by mapping organizations against the system to be developed, by including power and politics in their "too human" and even emotional dimension. We then describe here a notation by which to recognize and document power, politics and the emotional aspects of software requirements-related decision-making in customer organizations. We conclude by outlining that our suggested graphical notation would maybe not solve the problem: but even if it just raises awareness, this would make us closer to solving the problem. Given the sensibility of the political issue, it is assumed that the generated diagram using the above mentioned notations is only for the requirements engineer and his/her team, thus remaining strictly private.Comment: 7 pages, includes figures, contact details, reference

    Using Program Slicing to Identify Faults in Software

    Get PDF
    This study explores the relationship between program slices and faults. The aim is to investigate whether the characteristics of program slices can be used to identify fault-prone software components. Slicing metrics and dependence clusters are used to characterise the slicing profile of a software component, then the relationship between the slicing profile of the component and the faults in that component are then analysed. Faults can increase the likelihood of a system becoming unstable causing problems for the development and evolution of the system. Identifying faultprone components is difficult and reliable predictors of faultproneness not easily identifiable. Program slicing is an established software engineering technique for the detection and correction of specific faults. An investigation is carried out into whether the use of program slicing can be extended as a reliable tool to predict fault-prone software components. Preliminary results are promising suggesting that slicing may offer valuable insights into fault-proneness

    Towards a Capability Maturity Framework: Adopting the universal elements of Digital Capability Maturity as an Organisational Strategy

    Get PDF
    As technology continues to evolve, there is a need for organisations to develop the ability to assess themselves and find ways to not only survive but also flourish in the dynamic economy. This paper reports part of the findings from a more extensive research work that aims to develop a Digital Capability Maturity (DCM) Framework for Higher Education Institutions (HEIs). Such a framework would allow organisations to leverage their capabilities for differential value. A systematic review was undertaken to uncover the key elements contributing to DCM, to stand as a baseline for the Maturity Framework. The objective of this paper is to report on the proposed standardisation for elements of DCM. A universal taxonomy is proposed suggesting these themes should be present in any organisational attempts to formalise digital initiatives. Furthermore, to maximise the impact of DCM on quality of output, the proposed framework must adopt the ecological systems perspective

    The impact of marketisation on postgraduate career preparedness in a high skills economy

    Get PDF
    This study focuses on the consequences for high skills development of the erosion of the once clear demarcation between higher education and business. It contributes to the broader debate about the relevance of higher education for thewell-being of the society of the future. The research explores the effects of marketisation on the postgraduate curriculum and students’ preparedness for careers in public relations and marketing communications. Interviews with lecturers and students in two universities in the UK and Australia indicate that a tension exists between academic rigour and corporate relevancy. The consequences are a diminution of academic attachment to critique and wider social/cultural engagement, with a resulting impoverishment of students’ creative abilities and critical consciences. Subsequently, graduates of public relations and marketing communications, and to some extent those from other profession-related disciplines, are insufficiently prepared for careers as knowledge workers in a future high-skills economy

    Proceedings of Abstracts Engineering and Computer Science Research Conference 2019

    Get PDF
    © 2019 The Author(s). This is an open-access work distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. For further details please see https://creativecommons.org/licenses/by/4.0/. Note: Keynote: Fluorescence visualisation to evaluate effectiveness of personal protective equipment for infection control is © 2019 Crown copyright and so is licensed under the Open Government Licence v3.0. Under this licence users are permitted to copy, publish, distribute and transmit the Information; adapt the Information; exploit the Information commercially and non-commercially for example, by combining it with other Information, or by including it in your own product or application. Where you do any of the above you must acknowledge the source of the Information in your product or application by including or linking to any attribution statement specified by the Information Provider(s) and, where possible, provide a link to this licence: http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/This book is the record of abstracts submitted and accepted for presentation at the Inaugural Engineering and Computer Science Research Conference held 17th April 2019 at the University of Hertfordshire, Hatfield, UK. This conference is a local event aiming at bringing together the research students, staff and eminent external guests to celebrate Engineering and Computer Science Research at the University of Hertfordshire. The ECS Research Conference aims to showcase the broad landscape of research taking place in the School of Engineering and Computer Science. The 2019 conference was articulated around three topical cross-disciplinary themes: Make and Preserve the Future; Connect the People and Cities; and Protect and Care
    • 

    corecore