71 results on '"Ralf Reussner"'
Search Results
2. Dynamic Access Control in Industry 4.0 Systems
- Author
-
Robert Heinrich, Stephan Seifermann, Maximilian Walter, Sebastian Hahner, Ralf Reussner, Tomáš Bureš, Petr Hnětynka, and Jan Pacovský
- Published
- 2023
3. Preserving Consistency of Interrelated Models during View-Based Evolution of Variable Systems
- Author
-
Sofia Ananieva, Thomas Kühn, and Ralf Reussner
- Published
- 2022
4. Towards an integrated approach for managing the variability and evolution of both software and hardware components
- Author
-
Jan Willem Wittler, Thomas Kühn, and Ralf Reussner
- Published
- 2022
5. Design-time Performability Optimization of Runtime Adaptation Strategies
- Author
-
Martina Rapp, Max Scheerer, and Ralf Reussner
- Published
- 2022
6. A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis
- Author
-
Misha Strittmatter, Robert Heinrich, and Ralf Reussner
- Subjects
Correctness ,Computer science ,business.industry ,Maintainability ,020207 software engineering ,02 engineering and technology ,Reuse ,computer.software_genre ,Extensibility ,Metamodeling ,Code refactoring ,Application domain ,0202 electrical engineering, electronic engineering, information engineering ,Systems architecture ,Reference architecture ,Architecture ,Software engineering ,business ,computer ,Software - Abstract
Nearly all facets of our everyday life strongly depend on software-intensive systems. Besides correctness, highly relevant quality properties of these systems include performance, as directly perceived by the user, and maintainability, as an important decision factor for evolution. These quality properties strongly depend on architectural design decisions. Hence, to ensure high quality, research and practice is interested in approaches to analyze the system architecture for quality properties. Therefore, models of the system architecture are created and used for analysis. Many different languages (often defined by metamodels) exist to model the systems and reason on their quality. Such languages are mostly specific to quality properties, tools or development paradigms. Unfortunately, the creation of a specific model for any quality property of interest and any different tool used is simply infeasible. Current metamodels for quality modeling and analysis are often not designed to be extensible and reusable. Experience from generalizing and extending metamodels result in hard to evolve and overly complex metamodels. A systematic way of creating, extending and reusing metamodels for quality modeling and analysis, or parts of them, does not exist yet. When comparing metamodels for different quality properties, however, substantial parts show quite similar language features. This leads to our approach to define the first reference architecture for metamodels for quality modeling and analysis. A reference architecture in software engineering provides a general architecture for a given application domain. In this paper, we investigate the applicability of modularization concepts from object-oriented design and the idea of a reference architecture to metamodels for quality modeling and analysis to systematically create, extend and reuse metamodel parts. Thus, the reference architecture allows to tailor metamodels. Requirements on the reference architecture are gathered from a historically grown metamodel. We specify modularization concepts as a foundation of the reference architecture. Detailed application guidelines are described. We argue the reference architecture supports instance compatibility and non-intrusive, independent extension of metamodels. In four case studies, we refactor historically grown metamodels and compare them to the original metamodels. The study results show the reference architecture significantly improves evolvability as well as need-specific use and reuse of metamodels.
- Published
- 2021
7. Replication Package of 'Evaluation Methods and Replicability of Software Architecture Research Objects'
- Author
-
Marco Konersmann, Angelika Kaplan, Thomas Kuhn, Robert Heinrich, Anne Koziolek, Ralf Reussner, Jan Jurjens, Mahmood Al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchs, Katharina Groser, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, and Jan-Philipp Toberg
- Published
- 2022
8. Software Engineering und Software-Engineering-Forschung im Zeitalter der Digitalisierung
- Author
-
Michael Felderer, Ralf Reussner, and Bernhard Rumpe
- Subjects
Engineering ,business.industry ,020204 information systems ,05 social sciences ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,02 engineering and technology ,ddc:004 ,business ,050107 human factors ,Computer Science Applications ,Information Systems - Abstract
Informatik-Spektrum 44(2), 82-94 (2020). doi:10.1007/s00287-020-01322-y, Published by Springer, New York
- Published
- 2020
9. Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
- Author
-
Maximilian Walter, Robert Heinrich, and Ralf Reussner
- Subjects
DATA processing & computer science ,ddc:004 - Abstract
Exchanging data between different systems enables us to build new smart services and digitise various areas of our daily life. This digitalisation leads to more efficient usage of resources, and an increased monetary value. However, the connection of different systems also increases the number of potential vulnerabilities. The vulnerabilities on their own might be harmless, but attackers could build attack paths based on the combination of different vulnerabilities. Additionally, attackers might exploit existing access control policies to further propagate through the system. For analysing this dependency between vulnerabilities and access control policies, we extended an architecture description language (ADL) to model access control policies and specify vulnerabilities. We developed an attack propagation analysis operating on the extended ADL, which can help to determine confidentiality violations in a system. We evaluated our approach by analysing the accuracy and the effort compared to a manual analysis using different scenarios in three case studies. The results indicate that our analysis is capable of identifying attack paths and reducing the effort compared to manual detection.
- Published
- 2022
- Full Text
- View/download PDF
10. Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
- Author
-
Maximilian Walter, Robert Heinrich, and Ralf Reussner
- Subjects
DATA processing & computer science ,ddc:004 - Published
- 2022
11. Ernst Denert Software Engineering Award 2020
- Author
-
Michael Felderer, Wilhelm Hasselbring, Heiko Koziolek, Florian Matthes, Lutz Prechelt, Ralf Reussner, Bernhard Rumpe, and Ina Schaefer
- Abstract
This is the introductory chapter of the book on the Ernst Denert Software Engineering Award 2020. It provides an overview of the 11 nominated PhD theses, the work of the award winner, and the structure of the book.
- Published
- 2022
12. Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams
- Author
-
Dominik Werle, Ralf Reussner, Robert Heinrich, and Stephan Seifermann
- Subjects
Syntax (programming languages) ,business.industry ,Modeling language ,Computer science ,Semantics (computer science) ,DATA processing & computer science ,Access control ,Data flow diagram ,Hardware and Architecture ,Confidentiality ,Information flow (information theory) ,State (computer science) ,ddc:004 ,Software engineering ,business ,Software ,Information Systems - Abstract
The security of software-intensive systems is frequently attacked. High fines or loss in reputation are potential consequences of not maintaining confidentiality, which is an important security objective. Detecting confidentiality issues in early software designs enables cost-efficient fixes. A Data Flow Diagram (DFD) is a modeling notation, which focuses on essential, functional aspects of such early software designs. Existing confidentiality analyses on DFDs support either information flow control or access control, which are the most common confidentiality mechanisms. Combining both mechanisms can be beneficial but existing DFD analyses do not support this. This lack of expressiveness requires designers to switch modeling languages to consider both mechanisms, which can lead to inconsistencies. In this article, we present an extended DFD syntax that supports modeling both, information flow and access control, in the same language. This improves expressiveness compared to related work and avoids inconsistencies. We define the semantics of extended DFDs by clauses in first-order logic. A logic program made of these clauses enables the automated detection of confidentiality violations by querying it. We evaluate the expressiveness of the syntax in a case study. We attempt to model nine information flow cases and six access control cases. We successfully modeled fourteen out of these fifteen cases, which indicates good expressiveness. We evaluate the reusability of models when switching confidentiality mechanisms by comparing the cases that share the same system design, which are three pairs of cases. We successfully show improved reusability compared to the state of the art. We evaluated the accuracy of confidentiality analyses by executing them for the fourteen cases that we could model. We experienced good accuracy.
- Published
- 2022
- Full Text
- View/download PDF
13. Uncertainty in coupled models of cyber-physical systems
- Author
-
Maribel Acosta, Sebastian Hahner, Anne Koziolek, Thomas Kühn, Raffaela Mirandola, and Ralf Reussner
- Subjects
DATA processing & computer science ,ddc:004 - Abstract
The development of cyber-physical systems typically involves the association between multiple coupled models that capture different aspects of the system and the environment where it operates. Due to the dynamic aspect of the environment, unexpected conditions and uncertainty may impact the system. In this work, we tackle this problem and propose a taxonomy for characterizing uncertainty in coupled models. Our taxonomy extends existing proposals to cope with the particularities of coupled models in cyber-physical systems. In addition, our taxonomy discusses the notion of uncertainty propagation to other parts of the system. This allows for studying and (in some cases) quantifying the effects of uncertainty on other models in a system even at design time. We show the applicability of our uncertainty taxonomy in real use cases motivated by our envisioned scenario of automotive development.
- Published
- 2022
14. A conceptual model for unifying variability in space and time: Rationale, validation, and illustrative applications
- Author
-
Sofia Ananieva, Sandra Greiner, Timo Kehrer, Jacob Krüger, Thomas Kühn, Lukas Linsbauer, Sten Grüner, Anne Koziolek, Henrik Lönn, S. Ramesh, Ralf Reussner, and Engineering of Software-Intensive Systems
- Subjects
Revision management ,DATA processing & computer science ,Product lines ,Version control ,ddc:004 ,Variability ,Software - Abstract
With the increasing demand for customized systems and rapidly evolving technology, software engineering faces many challenges. A particular challenge is the development and maintenance of systems that are highly variable both in space (concurrent variations of the system at one point in time) and time (sequential variations of the system, due to its evolution). Recent research aims to address this challenge by managing variability in space and time simultaneously. However, this research originates from two different areas, software product line engineering and software configuration management, resulting in non-uniform terminologies and a varying understanding of concepts. These problems hamper the communication and understanding of involved concepts, as well as the development of techniques that unify variability in space and time. To tackle these problems, we performed an iterative, expert-driven analysis of existing tools from both research areas to derive a conceptual model that integrates and unifies concepts of both dimensions of variability. In this article, we first explain the construction process and present the resulting conceptual model. We validate the model and discuss its coverage and granularity with respect to established concepts of variability in space and time. Furthermore, we perform a formal concept analysis to discuss the commonalities and differences among the tools we considered. Finally, we show illustrative applications to explain how the conceptual model can be used in practice to derive conforming tools. The conceptual model unifies concepts and relations used in software product line engineering and software configuration management, provides a unified terminology and common ground for researchers and developers for comparing their works, clarifies communication, and prevents redundant developments.
- Published
- 2022
- Full Text
- View/download PDF
15. An extensible approach to implicit incremental model analyses
- Author
-
Robert Heinrich, Georg Hinkel, and Ralf Reussner
- Subjects
Theoretical computer science ,Correctness ,Computer science ,Computation ,DATA processing & computer science ,Maintainability ,020207 software engineering ,02 engineering and technology ,Extensibility ,Task (computing) ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Incremental build model ,ddc:004 ,Category theory ,Software - Abstract
As systems evolve, analysis results based on models of the system must be updated, in many cases as fast as possible. Since usually only small parts of the model change, large parts of the analysis’ intermediate results could be reused in an incremental fashion. Manually invalidating these intermediate results at the right places in the analysis is a non-trivial and error-prone task that conceals the codes intention. A possible solution for this problem is implicit incrementality, i.e., an incremental algorithm is derived from the batch specification, aiming for an increased performance without the cost of degraded maintainability. Current approaches are either specialized to a subset of analyses or require explicit state management. In this paper, we propose an approach to implicit incremental model analysis capable of integrating custom dynamic algorithms. For this, we formalize incremental derivation using category theory, gaining type-safety and correctness properties. We implement an extensible implicit incremental computation system and validate its applicability by integrating incremental queries. We evaluate the performance using a micro-benchmark and a community benchmark where the integration of explicit query incrementalization was multiple orders of magnitude faster than rerunning the analysis after every change.
- Published
- 2019
16. Architecture-based change impact analysis in cross-disciplinary automated production systems
- Author
-
Birgit Vogel-Heuser, Kiana Busch, Robert Heinrich, Ralf Reussner, Sandro Koch, and Suhyun Cha
- Subjects
0209 industrial biotechnology ,Cross disciplinary ,Computer science ,Distributed computing ,DATA processing & computer science ,020207 software engineering ,02 engineering and technology ,Change impact analysis ,Task (project management) ,Metamodeling ,020901 industrial engineering & automation ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Production (economics) ,ddc:004 ,Architecture ,Software ,Information Systems - Abstract
Maintaining an automated production system is a challenging task as it comprises artifacts from multiple disciplines – namely mechanical, electrical, and software engineering. As the artifacts mutually affect each other, even small modifications may cause extensive side effects. Consequently, estimating the maintenance effort for modifications in an automated production system precisely is time consuming and often nearly as complicated as implementing the modifications. In this paper, we present the KAMP4aPS approach for architecture-based change impact analysis in production automation. We propose metamodels to specify the various artifacts of the system and modifications to them, as well as algorithms and rules for change propagation analysis based on the models. We evaluate KAMP4aPS for three different change scenarios based on the established xPPU community case study on production automation. In the case study, we investigate different configurations of metamodels and change propagation rules. Evaluation results indicate the accuracy of change propagation for applying KAMP4aPS to the specific metamodel and rules.
- Published
- 2018
17. Reliability Prediction of Self-Adaptive Systems Managing Uncertain AI Black-Box Components
- Author
-
Ralf Reussner and Max Scheerer
- Subjects
Point (typography) ,Computer science ,business.industry ,Reliability (computer networking) ,Control reconfiguration ,Self adaptive ,Transparency (human–computer interaction) ,Machine learning ,computer.software_genre ,Software quality ,Black box ,Artificial intelligence ,business ,computer - Abstract
Advances in Artificial Intelligence (AI) are associated with a growing complexity of AI models, at the expense of transparency and comprehensibility. The black-box nature of AI components is of particular concern in safety-critical applications, as it can not be guaranteed whether a prediction is correct or not. Incorrect predictions, however, can have serious consequences, e.g., fatal collisions in autonomous driving. Therefore, we propose a novel method for safeguarding AI black-box components based on monitoring input data by using Self-Adaptive Systems (SAS). The presented concepts serve not only as a starting point for runtime approaches (e.g., models at runtime), but also for design-time approaches. As second contribution, we propose an approach for the validation of reconfiguration strategies of SAS's managing uncertain AI black-box components w.r.t. reliability objectives at design-time. We demonstrate the applicability of our approach by a proof-of-concept.
- Published
- 2021
18. Enabling consistency in view-based system development - The Vitruvius approach
- Author
-
Erik Burger, Michael Langhammer, Heiko Klare, Max E. Kramer, Ralf Reussner, and Dominik Werle
- Subjects
Modeling language ,business.industry ,Process (engineering) ,Computer science ,media_common.quotation_subject ,05 social sciences ,DATA processing & computer science ,020207 software engineering ,02 engineering and technology ,Market fragmentation ,Consistency (database systems) ,Hardware and Architecture ,Component (UML) ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Quality (business) ,ddc:004 ,Software engineering ,business ,050203 business & management ,Software ,Information Systems ,Eclipse ,media_common - Abstract
During the development of large software-intensive systems, developers use several modeling languages and tools to describe a system from different viewpoints. Model-driven and view-based technologies have made it easier to define domain-specific languages and transformations. Nevertheless, using several languages leads to fragmentation of information, to redundancies in the system description, and eventually to inconsistencies. Inconsistencies have negative impacts on the system’s quality and are costly to fix. Often, there is no support for consistency management across multiple languages. Using a single language is no practicable solution either, as it is overly complex to define, use, and evolve such a language. View-based development is a suitable approach to deal with complex systems, and is widely used in other engineering disciplines. Still, we need to cope with the problems of fragmentation and consistency. In this paper, we present the Vitruvius approach for consistency in view-based modeling. We describe the approach by formalizing the notion of consistency, presenting languages for consistency preservation, and defining a model-driven development process. Furthermore, we show how existing models can be integrated. We have evaluated our approach at two case studies from component-based and embedded automotive software development, using our prototypical implementation based on the Eclipse Modeling Framework.
- Published
- 2021
- Full Text
- View/download PDF
19. A Hitchhiker's Guide to Model-Driven Engineering for Data-Centric Systems
- Author
-
Mojtaba Bagherzadeh, Jordi Cabot, Jörg Kienzle, Betty H. C. Cheng, Gunter Mussbacher, Manuel Wimmer, Rijul Saini, Ralf Reussner, Benoit Combemale, Benjamin Benni, Daniel Amyot, Robert Heinrich, Edouard Batot, Gregor Engels, Jean-Michel Bruel, Nelly Bencomo, Houari Sahraoui, June Sallou, Hyacinth Ali, Jean-Marc Jézéquel, Anne Koziolek, Eugene Syriani, Philippe Collet, Sébastien Mosser, Serge Stinckwich, Diversity-centric Software Engineering (DiverSe), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Smart Modeling for softw@re Research and Technology (IRIT-SM@RT), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Toulouse Mind & Brain Institut (TMBI), Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), McGill University = Université McGill [Montréal, Canada], University of Ottawa [Ottawa], Queen's University [Kingston, Canada], Département d'Informatique et de Recherche Opérationnelle [Montreal] (DIRO), Université de Montréal (UdeM), Aston University [Birmingham], COMUE Université Côte d'Azur (2015-2019) (COMUE UCA), Institució Catalana de Recerca i Estudis Avançats (ICREA), Michigan State University [East Lansing], Michigan State University System, Laboratoire d'Informatique, Signaux, et Systèmes de Sophia-Antipolis (I3S) / Equipe MODALIS, Scalable and Pervasive softwARe and Knowledge Systems (Laboratoire I3S - SPARKS), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), University of Paderborn, Karlsruhe Institute of Technology (KIT), Université du Québec à Montréal = University of Québec in Montréal (UQAM), United Nations University (UNU), Johannes Kepler Universität Linz - Johannes Kepler University Linz [Autriche] (JKU), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS), Johannes Kepler University Linz [Linz] (JKU), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1)
- Subjects
Sociotechnical system ,Computer science ,business.industry ,Group method of data handling ,DATA processing & computer science ,Software development ,020207 software engineering ,02 engineering and technology ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,Database-centric architecture ,Data modeling ,Software ,Unified Modeling Language ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,ddc:004 ,Model-driven architecture ,business ,Software engineering ,computer ,ComputingMilieux_MISCELLANEOUS ,computer.programming_language - Abstract
The models and data framework demystifies the different roles that models and data play in software development and operation and clarifies where machine learning and artificial intelligence techniques could be used.
- Published
- 2021
20. A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures
- Author
-
Robert Heinrich, Stephan Seifermann, Ralf Reussner, and Dominik Werle
- Subjects
Software ,business.industry ,Computer science ,Distributed computing ,DATA processing & computer science ,Access control ,Unified Model ,Information flow (information theory) ,ddc:004 ,business - Published
- 2021
21. Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
- Author
-
Robert Heinrich, Stephan Seifermann, Roman Pilipchuk, and Ralf Reussner
- Subjects
Process management ,Enterprise application ,Business process ,Computer science ,business.industry ,DATA processing & computer science ,Access control ,ddc:004 ,business - Published
- 2021
22. Challenges in the Evolution of Palladio—Refactoring Design Smells in a Historically-Grown Approach to Software Architecture Analysis
- Author
-
Robert Heinrich, Jörg Henss, Sandro Koch, and Ralf Reussner
- Published
- 2021
23. A Conceptual Model for Unifying Variability in Space and Time
- Author
-
Thomas Kühn, Sofia Ananieva, Christoph Seidl, Jacob Krüger, Ralf Reussner, Anne Koziolek, Timo Kehrer, Sten Grüner, Bernhard Westfechtel, Sebastian Krieter, Henrik Lönn, S. Ramesh, Lukas Linsbauer, Heiko Klare, and Sandra Greiner
- Subjects
Variable (computer science) ,Software ,Development (topology) ,Spacetime ,business.industry ,Computer science ,Conceptual model (computer science) ,Space (commercial competition) ,business ,Data science ,Software configuration management ,Terminology - Abstract
Software engineering faces the challenge of developing and maintaining systems that are highly variable in space (concurrent variations of the system at a single point in time) and time (sequential variations of the system due to its evolution). Recent research aims to address this need by managing variability in space and time simultaneously. However, such research often relies on nonuniform terminologies and a varying understanding of concepts, as it originates from different communities: software product-line engineering and software configuration management. These issues complicate the communication and comprehension of the concepts involved, impeding the development of techniques to unify variability in space and time. To tackle this problem, we performed an iterative, expert-driven analysis of existing tools to derive the first conceptual model that integrates and unifies terminologies and concepts of both dimensions of variability. In this paper, we present the unification process of concepts for variability in space and time, and the resulting conceptual model itself. We show that the conceptual model achieves high coverage and that its concepts are of appropriate granularity with respect to the tools for managing variability in space, time, or both that we considered. The conceptual model provides a well-defined, uniform terminology that empowers researchers and developers to compare their work, clarifies communication, and prevents redundant developments.
- Published
- 2020
24. Design-Time Validation of Runtime Reconfiguration Strategies: An Environmental-Driven Approach
- Author
-
Martina Rapp, Max Scheerer, and Ralf Reussner
- Subjects
Software ,Correctness ,Operating environment ,Computer science ,business.industry ,Probabilistic logic ,Control reconfiguration ,State space ,Software architecture ,Adaptation (computer science) ,business ,Reliability engineering - Abstract
Validating the effectiveness of reconfiguration strategies of Self-Adaptive Systems (SAS) regarding their impact on runtime quality properties is a challenging problem at design time. Since quality properties, such as performance or reliability, are effectively observable at runtime, it is inherently difficult to validate reconfiguration strategies at design-time during their design (e.g., during the definition of the software architecture). Furthermore, engineering and validating SAS at design-time involves uncertainties that are difficult to manage due to a dynamic operating environment. Therefore, we propose a novel model-based analysis approach that is driven by a temporal probabilistic model which captures the stochastic nature of the operating environment. The sampled trajectories through the state space serve as a basis for validation. Software engineers benefit from the framework by validating their reconfiguration strategy regarding quality objectives before implementation. The validated strategy serves as starting point for further model-based analyses such as correctness verification of adaptation logic or scenario-based analysis for local optimization.
- Published
- 2020
25. Towards classes of architectural dependability assurance for machine-learning-based systems
- Author
-
Ralf Reussner, Bernhard Beckert, Jonas Klamroth, and Max Scheerer
- Subjects
Class (computer programming) ,Computer science ,business.industry ,Reliability (computer networking) ,Probabilistic logic ,020207 software engineering ,02 engineering and technology ,Transparency (human–computer interaction) ,Machine learning ,computer.software_genre ,Software quality ,Safeguard ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Drawback - Abstract
Advances in Machine Learning (ML) have brought previously hard to handle problems within arm's reach. However, this power comes at the cost of unassured reliability and lacking transparency. Overcoming this drawback is very hard due to the probabilistic nature of ML. Current approaches mainly tackle this problem by developing more robust learning procedures. Such algorithmic approaches, however, are limited to certain types of uncertainties and cannot deal with all of them, e.g., hardware failure. This paper discusses how this problem can be addressed at architectural rather than algorithmic level to assess systems dependability properties in early development stages. Moreover, we argue that Self-Adaptive Systems (SAS) are more suited to safeguard ML w.r.t. various uncertainties. As a step towards this we propose classes of dependability in which ML-based systems may be categorized and discuss which and how assurances can be made for each class.
- Published
- 2020
26. Ernst Denert Software Engineering Awards 2019
- Author
-
Wilhelm Hasselbring, Heiko Koziolek, Lutz Prechelt, Florian Matthes, Michael Felderer, Ralf Reussner, Bernhard Rumpe, and Ina Schaefer
- Subjects
Engineering ,Work (electrical) ,business.industry ,Process (engineering) ,Software development ,Software system ,business ,Software engineering - Abstract
The need to improve software engineering practices is continuously rising and software development practitioners are highly interested in improving their software systems and the methods to build them. And well, software engineering research has numerous success stories. The Ernst Denert Software Engineering Award specifically rewards researchers that value the practical impact of their work and aim to improve current software engineering practices. This chapter summarizes the awards history as well as the current reward process and criteria.
- Published
- 2020
27. Ernst Denert Award for Software Engineering 2019
- Author
-
Heiko Koziolek, Florian Matthes, Bernhard Rumpe, Ina Schaefer, Ralf Reussner, Lutz Prechelt, Michael Felderer, Wilhelm Hasselbring, Felderer, Michael, Hasselbring, Wilhelm, Matthes, Florian, Prechelt, Lutz, Reussner, Ralf, Rumpe, Bernhard, and Schaefer, Ina
- Subjects
Engineering ,Software research ,Requirements engineering ,business.industry ,Modeling language ,Information architecture ,Software development ,Information technology operations ,business ,Software engineering - Published
- 2020
28. Classifying Approaches for Constructing Single Underlying Models
- Author
-
Johannes Meier, Erik Burger, Heiko Klare, Uwe Aßmann, Christian Tunjic, Colin Atkinson, Christopher Werner, Andreas Winter, and Ralf Reussner
- Subjects
Cover (telecommunications) ,business.industry ,Computer science ,Software development ,020207 software engineering ,02 engineering and technology ,Machine learning ,computer.software_genre ,Metamodeling ,Consistency (database systems) ,View based ,On demand ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Software system ,Artificial intelligence ,business ,Construct (philosophy) ,computer - Abstract
Multi-view environments for software development allow different views of a software system to be defined to cover the requirements of different stakeholders. One way of ensuring consistency of overlapping information often contained in such views is to project them “on demand” from a Single Underlying Model (SUM). However, there are several ways to construct and adapt such SUMs. This paper presents four archetypal approaches and analyses their advantages and disadvantages based on several new criteria. In addition, guidelines are presented for selecting a suitable SUM construction approach for a specific project.
- Published
- 2020
29. Ernst Denert Award for Software Engineering 2020 : Practice Meets Foundations
- Author
-
Michael Felderer, Wilhelm Hasselbring, Heiko Koziolek, Florian Matthes, Lutz Prechelt, Ralf Reussner, Bernhard Rumpe, Ina Schaefer, Michael Felderer, Wilhelm Hasselbring, Heiko Koziolek, Florian Matthes, Lutz Prechelt, Ralf Reussner, Bernhard Rumpe, and Ina Schaefer
- Subjects
- Software engineering, Software engineering--Awards
- Abstract
This open access book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering in 2020. The prize, kindly sponsored by the Gerlind & Ernst Denert Stiftung, is awarded for excellent work within the discipline of Software Engineering, which includes methods, tools and procedures for better and efficient development of high quality software. An essential requirement for the nominated work is its applicability and usability in industrial practice.The book contains eleven papers that describe the works by Jonathan Brachthäuser (EPFL Lausanne) entitled What You See Is What You Get: Practical Effect Handlers in Capability-Passing Style, Mojdeh Golagha's (Fortiss, Munich) thesis How to Effectively Reduce Failure Analysis Time?, Nikolay Harutyunyan's (FAU Erlangen-Nürnberg) work on Open Source Software Governance, Dominic Henze's (TU Munich) research about Dynamically Scalable Fog Architectures, Anne Hess's (Fraunhofer IESE, Kaiserslautern) work on Crossing Disciplinary Borders to Improve Requirements Communication, Istvan Koren's (RWTH Aachen U) thesis DevOpsUse: A Community-Oriented Methodology for Societal Software Engineering, Yannic Noller's (NU Singapore) work on Hybrid Differential Software Testing, Dominic Steinhofel's (TU Darmstadt) thesis entitled Ever Change a Running System: Structured Software Reengineering Using Automatically Proven-Correct Transformation Rules, Peter Wägemann's (FAU Erlangen-Nürnberg) work Static Worst-Case Analyses and Their Validation Techniques for Safety-Critical Systems, Michael von Wenckstern's (RWTH Aachen U) research on Improving the Model-Based Systems Engineering Process, and Franz Zieris's (FU Berlin) thesis on Understanding How Pair Programming Actually Works in Industry: Mechanisms, Patterns, and Dynamics – which actually won the award. The chapters describe key findings of the respective works, show their relevance and applicability to practice and industrial software engineering projects, and provide additional information and findings that have only been discovered afterwards, e.g. when applying the results in industry. This way, the book is not only interesting to other researchers, but also to industrial software professionals who would like to learn about the application of state-of-the-art methods in their daily work.
- Published
- 2022
30. Maintenance effort estimation with KAMP4aPS for cross-disciplinary automated PLC-based Production Systems - a collaborative approach
- Author
-
Simon Ziegltrum, Ralf Reussner, Kiana Rostami, Birgit Vogel-Heuser, Suhyun Cha, Sandro Koch, Felix Ocker, and Robert Heinrich
- Subjects
Engineering ,Cost estimate ,business.industry ,Maintainability ,020207 software engineering ,02 engineering and technology ,030204 cardiovascular system & hematology ,Automation ,Domain (software engineering) ,Metamodeling ,03 medical and health sciences ,0302 clinical medicine ,Control and Systems Engineering ,Multidisciplinary approach ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,Information system ,business ,Fieldbus - Abstract
Automated production systems (aPSs) are often in operation for several decades. Due to a multiplicity of reasons, these assets have to be maintained and modified over the time multiple times and with respect to multiple engineering domains. An increased economic pressure demands to perform these tasks in an optimized way. Therefore, it is necessary to estimate change effects with respect to multidisciplinary interdependences, required surrounding non-functional tasks and the effort and costs included in each step. This paper outlines available cost estimation methods for PLC-based automation and Information Systems (ISs). We introduce Karlsruhe Architectural Maintainability Prediction for aPS (KAMP4aPS), an approach to estimate the necessary maintenance tasks to be performed and their related costs for the domain of aPSs by extending KAMP, which is limited to change propagation analysis on ISs. KAMP requires a metamodel to derive these tasks automatically. Unfortunately, a domain spanning metamodel is missing for aPSs. Hence, we need to develop a part of the metamodel derived from an AutomationML description for the chosen demonstrator at first. Finally, we apply and compare different estimation methods and KAMP4aPS to analyze the exchange of a fieldbus system as exemplary change scenario on a lab size plant to demonstrate the benefits of our discipline-spanning approach.
- Published
- 2017
31. Using internal domain-specific languages to inherit tool support and modularity for model transformations
- Author
-
Thomas Goldschmidt, Georg Hinkel, Erik Burger, and Ralf Reussner
- Subjects
Domain-specific language ,Computer science ,business.industry ,Programming language ,Model transformation ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Modularity ,Transformation language ,Domain (software engineering) ,020204 information systems ,Modeling and Simulation ,Modular programming ,0202 electrical engineering, electronic engineering, information engineering ,Software system ,Model-driven architecture ,Software engineering ,business ,computer ,Software ,computer.programming_language - Abstract
Model-driven engineering (MDE) has proved to be a useful approach to cope with today’s ever-growing complexity in the development of software systems; nevertheless, it is not widely applied in industry. As suggested by multiple studies, tool support is a major factor for this lack of adoption. In particular, the development of model transformations lacks good tool support. Additionally, modularization techniques are inevitable for the development of larger model transformations to keep them maintainable. Existing tools for MDE, in particular model transformation approaches, are often developed by small teams and cannot keep up with advanced tool support for mainstream general-purpose programming languages, such as IntelliJ or Visual Studio. Internal DSLs are a promising solution to these problems. In this paper, we investigate the impact of design decisions of an internal DSL to the reuse of tool support and modularization concepts from the host language. We validate our findings in terms of understandability, applicability, tool support, and extensibility using three case studies from academia, a model-driven engineering platform, and the industrial automation domain where we apply an implementation of an internal model transformation language on the .NET platform. The results confirm the value of inherited modularity and tool support while conciseness and understandability are still competitive.
- Published
- 2017
32. Nachruf Professor em. Dr. Dr. h.c. Gerhard Goos
- Author
-
Bernhard Beckert, Andreas Oberweis, Ralf Reussner, Isabel Häuser, and Sebastian Schäfer
- Subjects
Philosophy ,Humanities ,Computer Science Applications ,Information Systems - Published
- 2020
33. Preface to the 1st Workshop on View-Oriented Software Engineering (VoSE)
- Author
-
Colin Atkinson, Ralf Reussner, Erik Burger, Andreas Winter, and Johannes Meier
- Subjects
Description format ,Software ,business.industry ,Computer science ,Software development ,Pairwise comparison ,Software system ,business ,Software engineering ,Coherence (linguistics) ,Variety (cybernetics) - Abstract
Modern software systems are often so complex that a comprehensive description of their functionality lies beyond the representative capabilities of a single paradigm or software description format (i.e. type of model). Therefore, a growing variety of heterogeneous representations (e.g. specifications, models, programs etc.) are typically used in the various phases of software development to describe different aspects of a system's behaviour. These essentially represent different conceptual views of a software system, and usually present overlapping information that needs to be kept consistent. Traditional software engineering environments have implicitly adopted a synthesis-based approach to views in which the different representations of software systems are treated as separate, sovereign artefacts. The properties of the system under development are then inferred by synthesising the information spread over the different views, and the overall coherence of the information is ensured by maintaining a large number of pairwise correspondences between the separate artefacts.
- Published
- 2019
34. Infrastructure for Modeling and Analyzing the Quality of Software Architectures
- Author
-
Ralf Reussner, Anne Koziolek, Robert Heinrich, and Steffen Becker
- Subjects
System quality ,Software ,Computer science ,business.industry ,media_common.quotation_subject ,Contrast (statistics) ,Quality (business) ,Software architecture ,Resilience (network) ,Software engineering ,business ,media_common - Abstract
In contrast to other engineering disciplines, software engineering lacks an understanding of the impact of design decisions on system quality properties as well as common standards and community case studies for comparing and evaluating research methods and results. In this paper, we address these shortcomings by offering infrastructure for modeling and analyzing system quality properties. A model-based software architecture simulator avoids costly changes of software after it has been delivered and a community case study enables collaboration between researches and allows for comparing research results.
- Published
- 2019
35. Overload Protection of Cloud-IoT Applications by Feedback Control of Smart Devices
- Author
-
Anne Koziolek, Ralf Reussner, Manuel Gotin, Dominik Werle, and Felix Lösch
- Subjects
business.industry ,Computer science ,Distributed computing ,Feedback control ,Provisioning ,Cloud computing ,02 engineering and technology ,Resource (project management) ,Coupling (computer programming) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Internet of Things ,business - Abstract
One of the most common usage scenarios for Cloud-IoT applications is Sensing-as-a-Service, which focuses on the processing of sensor data in order to make it available for other applications. Auto-scaling is a popular runtime management technique for cloud applications to cope with a varying resource demand by provisioning resources in an autonomous manner. However, if an auto-scaling system cannot provide the required resources, e.g., due to cost constraints, the cloud application is overloaded, which impacts its performance and availability. We present a feedback control mechanism to mitigate and recover from overload situations by adapting the send rate of smart devices in consideration of the current processing rate of the cloud application. This mechanism supports a coupling with the widely used threshold-based auto-scaling systems. In a case study, we demonstrate the capability of the approach to cope with overload scenarios in a realistic environment. Overall, we consider this approach as a novel tool for runtime managing cloud applications.
- Published
- 2019
36. Data-Driven Software Architecture for Analyzing Confidentiality
- Author
-
Stephan Seifermann, Ralf Reussner, and Robert Heinrich
- Subjects
Data processing ,business.industry ,Computer science ,media_common.quotation_subject ,DATA processing & computer science ,Data-driven ,Software ,Unified Modeling Language ,Quality (business) ,Confidentiality ,Software system ,ddc:004 ,Software engineering ,business ,Software architecture ,computer ,media_common ,computer.programming_language - Abstract
Preservation of confidentiality has become a crucial quality property of software systems that software vendors have to consider in each development phase. Especially, neglecting confidentiality constraints in the software architecture leads to severe issues in later phases that often are hard to correct. In contrast to the implementation phase, there is no support for systematically considering confidentiality in architectural design phases by means of data processing descriptions. To fill this gap, we introduce data flows in an architectural description language to enable simple definition of confidentiality constraints. Afterwards, we transform the software architecture specification to a logic program to find violated confidentiality constraints. In a case study-based evaluation, we apply the analysis to sixteen scenarios to show the accuracy of the approach.
- Published
- 2019
37. TCP-Inspired Congestion Avoidance for Cloud-IoT Applications
- Author
-
Ralf Reussner, Manuel Gotin, and Felix Lösch
- Subjects
Fair share ,Steady state (electronics) ,business.industry ,Computer science ,Cloud computing ,Throughput ,Internet of Things ,business ,Processing delay ,Computer network - Abstract
Cloud-loT Applications consist of thousands of smart devices sending sensor data to processing cloud applications. If the processing rate of the cloud application is limited it may be unable to cope with an increasing number of connected devices. If such a situation is not addressed, the cloud application is overloaded with messages, resulting in a high processing delay or loss of data. For this reason we propose a TCP-inspired congestion avoidance which reconfigures the send rate of devices at runtime aiming for a low processing delay and a high throughput. We show, that it is able to avoid congestions by adapting the send rate of devices to a fair share of the processing rate of the cloud application.
- Published
- 2019
38. The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling
- Author
-
Sascha Alpers, Ralf Reussner, Roman Pilipchuk, and Andreas Oberweis
- Subjects
Traceability ,Business process ,Computer science ,business.industry ,020207 software engineering ,02 engineering and technology ,Business model ,Data structure ,Software ,020204 information systems ,Business architecture ,0202 electrical engineering, electronic engineering, information engineering ,Architecture ,Software engineering ,business ,Software architecture - Abstract
Modelling is central for business process and software architecture documentation and analysis. However, business processes and software architectures are specified with their own highly developed languages, methods and tools. There are approaches in the literature for modelling privacy and security issues using existing business process or architecture modelling languages to express different requirements by enriching these languages with annotations. Nevertheless, there is a lack of formalization and therefore the potential use for tool-based analyses are limited. In addition, the continuity between business and software models is not granted, but when modelling compliance requirements like privacy, traceability is very important, e.g. for compliance checks. In this contribution, approaches for modelling security and privacy in business and software models are examined. One key finding is that there is currently no comprehensive modelling approach which covers the necessary aspects and perspectives. This could include processes as well as, for example, organizational and data structure questions. In conclusion, we suggest developing a new holistic modelling approach which includes the needed aspects and with a concept for the traceability of the requirements from business models to software architecture models.
- Published
- 2019
39. Modeling and Simulation of Load Balancing Strategies for Computing in High Energy Physics
- Author
-
Maximilian Stemmer-Grabow, Patrick Firnkes, René Caspart, Günter Quast, Ralf Reussner, Anne Koziolek, and Manuel Giffels
- Subjects
020203 distributed computing ,Particle physics ,Physics ,QC1-999 ,Load balancing (electrical power) ,020207 software engineering ,02 engineering and technology ,Grid ,Scheduling (computing) ,Tier 1 network ,Modeling and simulation ,Model parameter ,Proof of concept ,0202 electrical engineering, electronic engineering, information engineering ,ddc:530 ,Computer Science::Distributed, Parallel, and Cluster Computing - Abstract
The amount of data to be processed by experiments in high energy physics (HEP) will increase tremendously in the coming years. To cope with this increasing load, most efficient usage of the resources is mandatory. Furthermore, the computing resources for user jobs in HEP will be increasingly distributed and heterogeneous, resulting in more difficult scheduling due to the increasing complexity of the system. We aim to create a simulation for the WLCG helping the HEP community to solve both challenges: a more efficient utilization of the grid and coping with the rising complexity of the system. There is currently no simulation in existence which helps the operators of the grid to make the correct decisions while optimizing the load balancing strategy. This paper presents a proof of concept in which the computing jobs at the Tier 1 center GridKa are modeled and simulated. To model the computing jobs we extended the Palladio simulator with a mechanism to simulate load balancing strategies. Furthermore, we implemented an automated model parameter analysis and model creation. Finally, the simulation results are validated using real-word performance data. Our results suggest that simulating larger parts of the grid is feasible and can help to optimize the utilization of the grid.
- Published
- 2019
40. Continuous Design Decision Support
- Author
-
Michael Goedicke, Barbara Paech, Anja Kleebaum, Marco Konersmann, Michael Langhammer, and Ralf Reussner
- Subjects
Intrusiveness ,Decision support system ,Consistency (negotiation) ,Documentation ,Continuous software engineering ,business.industry ,Computer science ,Software design pattern ,Program code ,Software engineering ,business ,Continuous design - Abstract
Managed Software Evolution; Springer 107-139 (2019). doi:10.1007/978-3-030-13499-0_6, Published by Springer
- Published
- 2019
- Full Text
- View/download PDF
41. Introducing Managed Software Evolution
- Author
-
Jan Keim, Wilhelm Hasselbring, Michael Goedicke, Birgit Vogel-Heuser, Lukas Märtin, and Ralf Reussner
- Subjects
Structure (mathematical logic) ,business.industry ,Computer science ,Software engineering ,business ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,Software evolution - Abstract
This chapter introduces the book and motivates managed software evolution. Moreover, the structure of the book is outlined.
- Published
- 2019
42. Maintaining Security in Software Evolution
- Author
-
Kurt Schneider, Daniel Strüber, Emre Taspolatoglu, Robert Heinrich, Michael Goedicke, Marco Konersmann, Christopher Haubeck, Jan Jürjens, Jens Bürger, Fabien Patrick Viertel, Winfried Lamersdorf, Alexander Fay, Ralf Reussner, and Jan Ladiges
- Subjects
Focus (computing) ,Software ,Architecture model ,Order (exchange) ,Computer science ,business.industry ,Suite ,Knowledge economy ,Software engineering ,business ,Automation ,Software evolution - Abstract
Managed Software Evolution; Springer 207-253 (2019). doi:10.1007/978-3-030-13499-0_9, Published by Springer
- Published
- 2019
- Full Text
- View/download PDF
43. Case Studies for the Community
- Author
-
André van Hoorn, Birgit Vogel-Heuser, Mina Fahimipirehgalin, Safa Bougouffa, Emre Taspolatoglu, Cyntia Vargas, Stephan Seifermann, Marco Konersmann, Ralf Reussner, Kiana Busch, Robert Heinrich, and Felix Ocker
- Subjects
business.industry ,Production automation ,Computer science ,Comparability ,Maintainability ,Software ,Unified Modeling Language ,Systems Modeling Language ,Architecture ,business ,Software engineering ,Enterprise resource planning ,computer ,computer.programming_language - Abstract
Managed Software Evolution; Springer International Publishing 335-374 (2019). doi:10.1007/978-3-030-13499-0_12, Published by Springer International Publishing
- Published
- 2019
44. Lessons Learned
- Author
-
Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, and Lukas Märtin
- Published
- 2019
45. Introduction to Case Studies
- Author
-
Kiana Busch, Robert Heinrich, Safa Bougouffa, Birgit Vogel-Heuser, Ralf Reussner, Suhyun Cha, and Christopher Haubeck
- Subjects
Joint research ,Context knowledge ,Empirical research ,Knowledge base ,Plant automation ,Order (exchange) ,Computer science ,business.industry ,Information system ,business ,Data science ,Replication (computing) - Abstract
In this chapter we provide an overview on the demonstrators of the SPP1593’s case studies. To study evolution, it is important to collaborate by a joint research that supports sharing of knowledge and resources. In order to support joint research, collaboration and replication in empirical studies based on common evolution scenarios and artefacts are required. These studies are rarely reusable as important artefacts (e.g. requirements, design decisions, architectural knowledge, or context knowledge) are often not provided to the community. To overcome these shortcomings in the SPP1593, two case studies are used: CoCoME, which represents a knowledge base for collaborative empirical research on information system evolution, and the xPPU, which represents a lab-size demonstrator for investigating research on evolution in machine and plant automation. Finally, to blur the boundaries between pure information systems and automated production systems, both case studies were integrated as Industry 4.0 demonstrator.
- Published
- 2019
46. Ernst Denert Award for Software Engineering 2019 : Practice Meets Foundations
- Author
-
Michael Felderer, Wilhelm Hasselbring, Heiko Koziolek, Florian Matthes, Lutz Prechelt, Ralf Reussner, Bernhard Rumpe, Ina Schaefer, Michael Felderer, Wilhelm Hasselbring, Heiko Koziolek, Florian Matthes, Lutz Prechelt, Ralf Reussner, Bernhard Rumpe, and Ina Schaefer
- Subjects
- Management information systems, Software engineering, Computer science
- Abstract
This open access book provides an overview of the dissertations of the five nominees for the Ernst Denert Award for Software Engineering in 2019. The prize, kindly sponsored by the Gerlind & Ernst Denert Stiftung, is awarded for excellent work within the discipline of Software Engineering, which includes methods, tools and procedures for better and efficient development of high quality software. An essential requirement for the nominated work is its applicability and usability in industrial practice. The book contains five papers describing the works by Sebastian Baltes (U Trier) on Software Developers'Work Habits and Expertise, Timo Greifenberg's thesis on Artefaktbasierte Analyse modellgetriebener Softwareentwicklungsprojekte, Marco Konersmann's (U Duisburg-Essen) work on Explicitly Integrated Architecture, Marija Selakovic's (TU Darmstadt) research about Actionable Program Analyses for Improving Software Performance, and Johannes Späth's (Paderborn U)thesis on Synchronized Pushdown Systems for Pointer and Data-Flow Analysis – which actually won the award. The chapters describe key findings of the respective works, show their relevance and applicability to practice and industrial software engineering projects, and provide additional information and findings that have only been discovered afterwards, e.g. when applying the results in industry. This way, the book is not only interesting to other researchers, but also to industrial software professionals who would like to learn about the application of state-of-the-art methods in their daily work.
- Published
- 2020
47. Managed Software Evolution
- Author
-
Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin, Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, and Lukas Märtin
- Subjects
- Computer software--Development
- Abstract
This open access book presents the outcomes of the “Design for Future – Managed Software Evolution” priority program 1593, which was launched by the German Research Foundation (“Deutsche Forschungsgemeinschaft (DFG)”) to develop new approaches to software engineering with a specific focus on long-lived software systems. The different lifecycles of software and hardware platforms lead to interoperability problems in such systems. Instead of separating the development, adaptation and evolution of software and its platforms, as well as aspects like operation, monitoring and maintenance, they should all be integrated into one overarching process.Accordingly, the book is split into three major parts, the first of which includes an introduction to the nature of software evolution, followed by an overview of the specific challenges and a general introduction to the case studies used in the project. The second part of the book consists of the main chapters on knowledge carrying software, and cover tacit knowledge in software evolution, continuous design decision support, model-based round-trip engineering for software product lines, performance analysis strategies, maintaining security in software evolution, learning from evolution for evolution, and formal verification of evolutionary changes. In turn, the last part of the book presents key findings and spin-offs. The individual chapters there describe various case studies, along with their benefits, deliverables and the respective lessons learned. An overview of future research topics rounds out the coverage.The book was mainly written for scientific researchers and advanced professionals with an academic background. They will benefit from its comprehensive treatment of various topics related to problems that are now gaining in importance, given the higher costs for maintenance and evolution in comparison to the initial development, and the fact that today, most software is not developed from scratch, but as part of a continuum of former and future releases.
- Published
- 2019
48. A Model-Based Approach to Calculate Maintainability Task Lists of PLC Programs for Factory Automation
- Author
-
Ralf Reussner, Kiana Busch, Robert Heinrich, Birgit Vogel-Heuser, Sandro Koch, Matthias Seitz, Jannis Ratz, and Suhyun Cha
- Subjects
0209 industrial biotechnology ,business.industry ,Computer science ,Programmable logic controller ,Maintainability ,020207 software engineering ,02 engineering and technology ,Change impact analysis ,Automation ,Task (project management) ,020901 industrial engineering & automation ,Software ,Component-based software engineering ,0202 electrical engineering, electronic engineering, information engineering ,Task analysis ,business ,Software engineering - Abstract
As long-living systems, automated Production Systems (aPS) have to be adapted due to optimization and inclusion of new features in their life cycle over decades. aPS consist of electrical, mechanical, and software components, which have a complex interaction and mutual dependencies. Consequently, these heterogeneous components have to be maintained together. Thus, the change propagation analysis in aPS is a challenging task. Existing approaches to change impact analysis lack tool-support and require expert knowledge in the aPS, as well as in the machine under study and its environment. This paper presents a tool-supported approach to change propagation analysis in aPS based on initial change requests. Our approach calculates a list of maintainability tasks to implement change requests in control programs deployed on Programmable Logic Controllers (PLC). To evaluate the quality and coverage of the generated task lists, we applied our approach to a community case study.
- Published
- 2018
49. The palladio-bench for modeling and simulating software architectures
- Author
-
Dominik Werle, Max E. Kramer, Steffen Becker, Klaus Krogmann, Heiko Koziolek, Ralf Reussner, Robert Heinrich, Heiko Klare, and Jens Happe
- Subjects
Software ,business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Software architecture ,Software engineering ,business - Abstract
Software designers often lack an understanding of the effects of design decisions on quality properties of their software. This results in costly and time-consuming trial-and-error testing, delayed and complicated rollouts of the software. In this tool demonstration paper we present an integrated tool environment - the Palladio-Bench - for modeling and analyzing software architectures. The analysis results provided by Palladio support making design decisions by identifying the best-suited design from a set of given alternatives. The demonstration video for the Palladio-Bench can be found at the URL https://youtu.be/vG7WQPcp-uI.
- Published
- 2018
50. Investigating Performance Metrics for Scaling Microservices in CloudIoT-Environments
- Author
-
Manuel Gotin, Felix Lösch, Ralf Reussner, and Robert Heinrich
- Subjects
business.industry ,Computer science ,Reliability (computer networking) ,CPU time ,020206 networking & telecommunications ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Microservices ,0202 electrical engineering, electronic engineering, information engineering ,Unavailability ,business ,Queue ,Message queue ,Vulnerability (computing) ,Computer network - Abstract
A CloudIoT solution typically connects thousands of IoT things with cloud applications in order to store or process sensor data. In this environment, the cloud applications often consist of microservices which are connected to each other via message queues and must reliably handle a large number of messages produced by the IoT things. The state of a message queue in such a system can be a challenge if the rate of incoming messages continuously exceeds the rate of outgoing messages. This can lead to performance and reliability degradations due to overloaded queues and result in the unavailability of the cloud application. In this paper we present a case study to investigate which performance metrics to be used by a threshold-based auto-scaler for scaling consuming microservices of a message queue in order to prevent overloaded queues and to avoid SLA violations. We evaluate the suitability of each metric for scaling I/O-intensive and compute-intensive microservices with constant and varying characteristics, such as service time. We show, that scaling decisions based on message queue metrics are much more resilient to microservice characteristics variations. In this case, relying on the CPU utilization may result in massive overprovisioning or no scaling decision at all which could lead to an overloaded queue and SLA violations. We underline the benefits of using message queue metrics for scaling decisions instead of the more traditional CPU utilization particularly for I/O-intensive microservices due to the vulnerability to variations in the microservice characteristics.
- Published
- 2018
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.