Editorial Board
The social smart grid
HighlightsWe highlight the motivation and applicable use cases for a social overlay network for the smart grid.The social overlay network model dealing with formation and SLA negotiation and monitoring, is implemented using open standards only.We ...
Workload-aware anomaly detection for Web applications
We online train and recognize workload patterns with incremental clustering.We detect anomalies in a recognized workload pattern to improve detection accuracy.We employ LOF to detect anomalies and t-test to locate anomalous metrics.We validate our ...
Software trustworthiness 2.0-A semantic web enabled global source code analysis approach
Introduction of a Semantic Web enabled global source code analysis infrastructure.Novel source code analysis approach combining crowdsourcing and linked-data.Novel proactive approach to improve trustworthiness of software systems.Case studies ...
Slice-based statistical fault localization
HighlightsWe propose a novel slice-based statistical fault localization approach to improve fault localization effectiveness.We present an approximate dynamic backward slicing approach to balance the size and accuracy of a slice.An experimental study on ...
An evaluation model for dependability of Internet-scale software on basis of Bayesian Networks and trustworthiness
An evaluation model of dependability for Internet-scale software is proposed.Static metrics, dynamic metrics, prior metrics and correction metrics are included.Subjective and objective factors which impact on system quality are integrated.A Bayesian ...
GUI testing assisted by human knowledge
HighlightsAn empirical study was conducted to compare manual random testing and manual functional testing.The complementary of random testing and functional testing is studied.The influence of test case length on the effectiveness of testing is ...
A formal methodology for integral security design and verification of network protocols
HighlightsAn iterative methodology for verifying communication protocols, combining formal and informal analysis, is presented.When security flaws are detected, it provides feedback for easing their resolution.Three case studies with real protocols are ...
Demand-based schedulability analysis for real-time multi-core scheduling
HighlightsWe propose the first demand-based schedulability analysis for two dynamic job-priority scheduling algorithms.We derive demand bound functions of EDZL (Earliest Deadline first until Zero-Laxity) and LLF (Least Laxity First).We combine the ...
A reliability model for Service Component Architectures
Graphical abstractDisplay Omitted HighlightsIt is proposed a reliability model for Service Component Architectures described in the lightweight formal language SCA-ASM.SCA-ASM is based on the OASIS standard Service Component Architecture (SCA) and on ...
Sustainability of Open Source software communities beyond a fork
First comprehensive analysis of Open Source projects involving a fork.The LibreOffice project, which was forked from the OpenOffice.org project, shows no sign of long-term decline.LibreOffice has attracted the long-term and most active committers in ...
Reviewing the quality of awareness support in collaborative applications
We propose a set of design elements that correspond to important awareness functions.We built a checklist for developers to review awareness in collaborative software.The checklist was applied to software, providing insight about missing features. ...
Process fragmentation, distribution and execution using an event-based interaction scheme
HighlightsA deployment and execution architecture is presented that can automatically partition and execute a given process model, according to a predefined process distribution.The resulting partitions achieve a natural autonomous task ...
A model view controller based Self-Adjusting Clustering Framework
SACF keeps all the cluster members consistent all the time.SACF allows auto provisioning of new versions, new applications and new cluster members.SACF generates notifications that allow inconsistent members to recover automatically.SACF allows to ...