Learning to detect representative data for large scale instance selection
The ReDD (Representative Data Detection) approach is introduced for large scale instance selection.In ReDD, a detector learns the patterns of (un)representative data after performing instance selection.Then, the detector is used to detect the newly ...
Engineering Future Internet applications
We define a new architectural style called P-REST as refinement of the REST one.We provide a modeling framework allowing for the design of P-RESTful applications.We provide the PRIME approach supporting the development of P-RESTful applications.We ...
Information infrastructure risk prediction through platform vulnerability analysis
A risk prediction methodology based on SCAP specifications is proposed.The methodology is demonstrated with an example from the e-banking sector.Distribution fitting and Kolmogorov-Smirnov test are utilized.A BBN topology to perform predictions on risk ...
Safe evolution templates for software product lines
We extend our investigation of compositional product lines with more subjectsWe also investigate annotative product lines, and propose templates for this contextWe contribute to the body of evidence on safe evolution of product linesWe bring additional ...
A large-scale study on the usage of Java's concurrent programming constructs
An analysis of 2227 Java projects, comprising more than 650 million lines of code.Seventy seven percent of the projects create threads or employ a concurrency control mechanism.Concurrent programming constructs are used both frequently and ...
An exploratory study on exception handling bugs in Java programs
We study exception handling bugs from two real systems.We survey developers to understand their thoughts about exception handling bugs.Analysis of bug repositories shows small percentages of exception handling bugs.Exception handling bugs seems to be as ...
Automated analysis of security requirements through risk-based argumentation
Included definition of premises.Adjusted the metamodel according to the Toulmin-style arguments.Revised the examples according to the changed metamodel.Added descriptions to Figs. 7 and 8.Fixed typos and improved the language. Computer-based systems are ...
The discourse on tool integration beyond technology, a literature survey
Research strands beyond technology with regard to tool integration were studied.We find that research on a larger set of stakeholders and contexts is needed.We identify important suggestions for changes to a well-known classification scheme.We propose ...
Feature extraction approaches from natural language requirements for reuse in software product lines
Hybrid NLP approaches were more common for extracting textual requirements.There is a mixture of automated and semi-automated approaches from IR and data mining.Support tools were not made available to the public.Not all studies use software metrics in ...
Toward the tools selection in model based system engineering for embedded systems-A systematic literature review
Recent model based system engineering (MBSE) approaches pertaining to embedded systems were identified.Systematic literature review (SLR) was used to identify the emerging trends.39 tools were identified for various MBSE activities.Evaluation of ...