70 results on '"Mottok, A"'
Search Results
2. Semantic Mapping of Component Framework Interface Ontologies for Interoperability of Vehicle Applications
- Author
-
Juergen Mottok, Michael Niklas, Sangita De, Premek Brada, and Rooney Brian
- Subjects
Information retrieval ,Computer science ,Interoperability ,020206 networking & telecommunications ,Ontology merging ,02 engineering and technology ,computer.file_format ,Ontology (information science) ,Reuse ,Semantic data model ,Data modeling ,Semantic mapping ,Semantic equivalence ,Schema (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,Ontology ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,XML schema ,RDF ,computer ,General Environmental Science ,computer.programming_language - Abstract
Over the past few years, ontology merging, and ontology semantic alignment has gained significant interest as research topics in automotive application domain for finding solutions to semantic data heterogeneity. To accomplish the complex and novel vehicle service requirements such as autonomous driving, V2X (Vehicle-to-Vehicle communication), etc. the automotive applications involve collaborations of several platform-specific data from heterogeneous enterprises component frameworks and consequently there has been increase in data interoperability issues. At the application component level, data interoperability relies on the semantic alignment or mapping between the various component framework interfaces data models represented as XML schemas (XSD). With the XML schemas being the preferred standard for the interface description exchange between most of the automotive application domain components, however, the data interoperability between the semantically equivalent but structurally different data constructs of multiple heterogeneous XSDs stands as a challenge in the absence of an ontology-based approach. To confront this crucial requirement for data interoperability and to increase in effect the reuse of existing components through their interfaces, we propose an approach to semantically map the various component framework interface data models when expressed as ontology schemas, based on the exploration of semantic synergies. The transformation between XSD and RDF (Resource Description Framework) schema representations and the use of queries over the ontology schemas for semantic mapping are demonstrated including a real-world case study.
- Published
- 2020
3. Response Time Analysis of Parallel Real-Time DAG Tasks Scheduled by Thread Pools
- Author
-
Michael Schmid and Juergen Mottok
- Subjects
Task (computing) ,Speedup ,Computer science ,Process (engineering) ,Thread pool ,Multiprocessing ,Compiler ,Parallel computing ,Thread (computing) ,computer.software_genre ,computer ,Scheduling (computing) - Abstract
Modern high-end embedded systems nowadays have to process enormous amounts of data. In order to speed up the computations and fully exploit the resources of the underlying hardware architectures, software developers can avail parallelism frameworks such as Intel Threading Building Blocks or compiler extensions as OpenMP. They ease the development of parallel applications by providing interfaces for common parallel design patterns and by internally distributing the work among the workers of a thread pool. However, such frameworks and compiler extensions do not yet support the stringent timing requirements of real-time systems and therefore, an adaption of their computation model to the sector of real-time systems needs to be conducted. In this paper, we address the problem of scheduling parallel real-time directed acyclic graphs tasks on multiprocessor architectures where the subtasks are dispatched among and executed by the workers of a thread pool. In contrast to existing work in the state-of-the-art, we limit the maximum parallelism of real-time tasks not by the number of processors in the system, but by the number of worker threads used in the thread pool of each real-time application. For this model, we derive a worst-case response time analysis for task sets scheduled by a preemptive global fixed-priority scheduler. In order to evaluate the performance of our response time analysis, we further perform schedulability tests on generated task sets and compare the results to existing feasibility analyses in the current state-of-the-art.
- Published
- 2021
4. Design Approach to Platform Agnostic Service API Modeling for Interoperability of Cross-enterprise Vehicle Applications
- Author
-
Sangita De, Juergen Mottok, Premek Brada, and Pinker, Jiří
- Subjects
Computer science ,Interoperability ,domain ,Service discovery ,RESTful ,synergy ,interoperability ,Semantic data model ,synergie ,základy ,service ,ontology ,Semantic Web ,syntax ,ontologie ,Service (business) ,sémantický ,Application programming interface ,business.industry ,Service provider ,Semantic interoperability ,grounding ,provoz ,doména ,interoperabilita ,API ,semantic ,RPC ,Software engineering ,business - Abstract
In the last few years, the collaboration of services between the service-oriented, cross-enterprise vehicle application frameworks has gradually increased to generate novel and more complicated vehicle services for the automotive industry. In these service collaboration scenarios, where heterogeneous application frameworks participate to realize complex vehicle services, a source of discord that emerges is that the service providers must always check, before the service deployment, whether the clients or service consumers on the other side of the communication link are compatible with a given service’s API (Application Program Interface). While using standardized templates like ontologies for API’s semantic specifications are crucial for a service discovery and semantic interoperability, nevertheless, accessing these service APIs’ semantic data using a standardized and understandable syntactical specification template is also equally substantial to ease services interoperability. In fact, such complex service collaboration scenarios motivate this research work which proposes a design approach towards standardized, domain specific, platform-agnostic semantic and syntactic specification of vehicle services API models. This paper also uses a typical vehicle domain case study to illustrate the design approach and a reference mapping between the platform-agnostic semantics specifications of a vehicle service API ontological model and its corresponding language-neutral, syntactic representation using the OpenAPI standard.
- Published
- 2021
5. Empirické vyhodnocení metrik kvality semantické podobnosti pro ontologie komponentových rámců v automobilovém software
- Author
-
Premek Brada, Juergen Mottok, Michael Niklas, and Sangita De
- Subjects
business.industry ,Computer science ,Interoperability ,sémantika rozhraní ,softwarová komponenta ,Semantic reasoner ,Ontology (information science) ,Semantic interoperability ,Application software ,computer.software_genre ,Domain (software engineering) ,metriky ,kompatibilita ,Component (UML) ,Component-based software engineering ,software component, interface semantics, compatibility, ontology, metric ,Software engineering ,business ,computer ,ontologie - Abstract
Semantic alignment of application software components’ ontologies represents a great interest in vehicle application domains that manipulate heterogeneous overlapping knowledge application frameworks. In the past few years, with the growth in the novel vehicle service requirements such as autonomous driving, V2X (Vehicle-to-Vehicle communication) and many others, automotive application software component models are becoming increasingly collaborative with other qualified cross-enterprise industrial partners to accomplish these complex service requirements. The most daunting impediment to this cross-enterprise collaboration is semantic interoperability. For efficient services collaboration through cross-enterprise semantic interoperability between the vehicle application frameworks’ software components, aligning the interface ontologies of these components by identifying the depth of semantic alignment relationships between the concepts of the interface ontologies is the major focus of this paper. In contrast to several existing ontology structural metrics, this work defines, evaluates and validates ontology metrics to measure the depth of semantic alignment between the vehicle domain software component frameworks’ interface ontological models. To emphasize the substantial role of semantic alignment of software component frameworks’ interface ontologies in semantic interoperability, a typical vehicle domain case study involving vehicle applications is considered for demonstration.
- Published
- 2021
6. Transport Layer Scanning for Attack Surface Detection in Vehicular Networks
- Author
-
Jürgen Mottok, Sebastian Renner, Nils Weiss, and Václav Matoušek
- Subjects
Protocol (science) ,Security analysis ,Vehicular ad hoc network ,business.industry ,Computer science ,Transport layer ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Attack surface ,business ,Communications protocol ,Automation ,Application layer ,Computer network - Abstract
In the beginning of every security analysis or penetration test of a system, information about the target has to be gathered. On IT-Systems a port scan is usually performed as a first step of an investigation. Since the communication protocols differ in automotive systems, generic port scanning tools can’t be used for a security analysis of CANs. More complex protocols have a higher likelihood of implementation errors and bugs. On CAN networks, such payloads are transferred through International Standard Transport Protocol (ISO-TP) communication. We designed a new methodology to identify ISO-TP endpoints in automotive networks. Every of these endpoints can provide exploitable application layer protocols and therefor has to be considered during penetration testing and security analysis. We contribute a new scan approach for the automated evaluation of possible attack surfaces in automotive CAN networks which has a higher coverage and multiple advantages than state of the art approaches.
- Published
- 2020
7. Tutorial on Software Engineering Education in Co-Located Multi-User Eye-Tracking-Environments
- Author
-
Jürgen Mottok, Florian Hauser, Alexander Bazo, Hans Gruber, Christian Wolff, and Stefan Schreistetter
- Subjects
Focus (computing) ,Workflow ,Traditional learning ,business.industry ,Computer science ,Informatics ,Eye tracking ,Multi-user ,Software engineering ,business ,Programming profession ,Gaze - Abstract
We briefly describe a tutorial on the application of Eye-Tracking technology for Software Engineering Education. We will showcase our setup of a large-scale Eye-Tracking-Classroom and its usage for real-time improvement of traditional learning scenarios in Software Engineering Education. We will focus on the integration of gaze data into modern integrated development environments (IDEs) and demonstrate a complete workflow for its usage in co-located multi-user Eye-Tracking-Environments.
- Published
- 2020
8. Deliberate Practice in Programming
- Author
-
Jürgen Mottok, Hans Gruber, Florian Hauser, Rebecca Reuter, and Theresa Stark
- Subjects
Basic skills ,Code review ,Computer science ,Mathematics education ,Context (language use) ,Sample (statistics) ,Work in process ,Informal learning ,computer.software_genre ,computer ,Social relation ,Test (assessment) - Abstract
This work in progress study examines through which activities programmers perform deliberate practice to improve their own skills in coding and programming. For this reason, a qualitative questionnaire was developed and conducted with a sample of 22 participants. The results indicate that programmers perform formal and informal forms of training and learning. Typically, a classical programming training in the context of a university course or for work-related reasons is a first step in the acquisition of expertise. Building on these basic skills, non-formal and informal learning activities are carried out by the learners. Especially the social interaction and the collaborative work with other programmers is of great importance in this context. The activities mentioned by the test persons fulfil the characteristics of deliberate practice and will be examined more closely in a further study.
- Published
- 2020
9. Totally Different and yet so Alike
- Author
-
Jorg Abke, Sabrina Jahn, Rebecca Reuter, Marco Klopp, Jürgen Mottok, Kai Borgeest, Yvonne Sedelmaier, Alexander Lehmann, Carolin Gold-Veerkamp, and Dieter Landes
- Subjects
Process modeling ,Higher education ,Management science ,business.industry ,Process (engineering) ,Computer science ,media_common.quotation_subject ,Scrum ,Presentation ,Software ,Mediation ,business ,Agile software development ,media_common - Abstract
Software process models are important in software projects in order to give the work of a project guidelines or a framework. However, teaching process models in higher education seems to be quite challenging. This has to do with the fact that undergraduates have no experience with projects in which process models are used. The theoretical mediation of process models is initially on a very abstract level. For this reason, we chose to combine two didactic approaches, namely problem-based learning and project work. Various traditional plan-driven process models have been expanded in courses in Software Engineering with agile process models. The Scrum Framework is the focus of consideration of this paper. Three Universities of Applied Sciences which cooperate in the EVELIN project focused on Scrum as a process model and integrated it into their teaching. Since the respective concepts of implementation differ, they should be presented and compared in this article to presents some practice approaches. The goal of this presentation of is a uniform evaluation in order to obtain insights from different perspectives. This comparison can draw conclusions for possible necessary improvements of the respective concepts.
- Published
- 2020
10. Code Reviews in C++
- Author
-
Kenneth Holmqvist, Hans Gruber, Jürgen Mottok, Florian Hauser, Stefan Schreistter, Nick Schorr, and Rebecca Reuter
- Subjects
Cued speech ,Data collection ,Code review ,Computer science ,business.industry ,Eye movement ,Sample (statistics) ,computer.software_genre ,Software ,Human–computer interaction ,Eye tracking ,Error detection and correction ,business ,computer - Abstract
Code reviews are an essential part of quality assurance in modern software projects. But despite their great importance, they are still carried out in a way that relies on human skills and decisions. During the last decade, there have been several publications on code reviews using eye tracking as a method, but only a few studies have focused on the performance differences between experts and novices. To get a deeper understanding of these differences, the following experiment was developed: This study surveys expertise-related differences in experts’, advanced programmers’, and novices’ eye movements during the review of eight short C++ code examples, including correct and erroneous codes. A sample of 35 participants (21 novices, 14 advanced and expert programmers) were recruited. A Tobii Spectrum 600 was used for the data collection. Measures included participants’ eye movements during the code review, demographic background data, and cued retrospective verbal comments on replays of their own eye movement recordings. Preliminary results give proof for experience-related differences between participants. Advanced and expert programmers performed significantly better in case of error detection and the eye tracking data implies a more efficient reviewing strategy.
- Published
- 2020
11. Learning from Escape Rooms? A Study Design Concept Measuring the Effect of a Cryptography Educational Escape Room
- Author
-
Jürgen Mottok, Stefan Seebauer, and Sabrina Jahn
- Subjects
Multimedia ,Higher education ,business.industry ,Computer science ,Debriefing ,Hash function ,Information technology ,Cryptography ,computer.software_genre ,Popularity ,Variety (cybernetics) ,Test (assessment) ,business ,computer - Abstract
Experts predict that more IT-Security specialists will be needed in the coming years, but in current higher education in engineering disciplines, this topic is hardly addressed. Newer learning methods such as game-based learning (GBL) are enjoying an increasing popularity as their improvement in the education of subject specific topics can be proven by a variety of studies. We chose Educational Escape Rooms (EduER) as a GBL-tool to impart IT-Security in higher education of engineers. In our Escape Room (ER), the students try to solve puzzles and riddles with learned knowledge on the emphasis of cryptography. This paper first deals with a brief introduction to GBL and EduERs, followed by the design of our ER concept, containing different tasks with focus on the topic of cryptography. The tasks cover different cryptographic methods and hash algorithms, e.g. AES, RSA, SHA3. Afterwards the experimental study is presented. The study of the EduER was carried out with students from the bachelor’s program in Electrical Engineering and Information Technology at the OTH Regensburg. The participants were divided into three groups of 5 to 8 persons each. They received a briefing with important information, followed by the ER execution, a debriefing afterwards and an exam-like evaluation sheet to test their learned knowledge. Finally, first basic results are presented.
- Published
- 2020
12. Security Improvements by Separating the Cryptographic Protocol from the Network Stack onto a Multi-MCU Architecture
- Author
-
Jürgen Mottok, Tobias Frauenschläger, and Sebastian Renner
- Subjects
Protocol stack ,Smart grid ,SCADA ,business.industry ,Computer science ,Network security ,Embedded system ,Mission critical ,Industrial control system ,Network interface ,Cryptographic protocol ,business - Abstract
The number of IoT devices in SCADA and ICS systems is rising quickly, especially in the domain of critical infrastructures. But these kinds of systems are performing mission critical tasks like controlling devices in industrial facilities or substations in the smart grid. Therefore, they are subject to a lot of regulatory standards. Yet, to provide remote access over the internet, special architectures are developed to integrate a network interface into these devices without inferring with the actual functionality. However, these architectures either lack security measures against cyber-attacks or do not offer the necessary performance for time-critical communication interfaces. To solve that, an architecture consisting of three units is introduced in this paper to provide a network interface with extensive security measures and a high performance. The main feature is the isolation of the cryptographic functionality onto an additional MCU. After proposing the basic concept, the paper presents many implementation details. Based on the current state of implementation, a concept validation of the realized architecture is described.
- Published
- 2020
13. Equally Distributed Bus-Communication Access Rights for Inter MCU Communication Using Multimaster SPI
- Author
-
Jürgen Mottok, Sebastian Renner, and Manuel Dentgen
- Subjects
Ethernet ,Flow control (data) ,Data processing ,Microcontroller ,business.industry ,Computer science ,Proof of concept ,Network interface ,business ,Communications protocol ,Bottleneck ,Computer network - Abstract
With the rising complexity and processing power of modern computer systems, the amount of MCU on a single PCB also rises. These microcontrollers often need to communicate with each other to exchange payload and control information in a bidirectional manner. Today’s well-established communication protocols in MCUs either do not fit modern transmission speed requirements or do have an inappropriate master-slave attribute, which does not allow the communication partners to have equal bus access rights. Therefore, this paper introduces an extension of the Serial Peripheral Interface (SPI) to allow an equally distributed access right for the communication interface between two microcontrollers. It simultaneously does fit modern transmission speed requirements of a common network interface, so that the message transmission does not constitute a bottleneck in data processing. Besides the protocol design, we do also provide a first prototype implementation, which constitutes a proof of concept.
- Published
- 2020
14. Accelerating Real-Time Applications with Predictable Work-Stealing
- Author
-
Jürgen Mottok, Florian Fritz, and Michael Schmid
- Subjects
Multi-core processor ,Software ,business.industry ,Work stealing ,Computer science ,Embedded system ,Limit (music) ,Modular design ,business ,Domain (software engineering) - Abstract
Modern compute architectures often consist of multiple CPU cores to achieve their performance, as physical properties put a limit on the execution speed of a single processor. This trend is also visible in the embedded and real-time domain, where programmers are forced to parallelize their software to keep deadlines. Additionally, embedded systems rely increasingly on modular applications, that can easily be adapted to different system loads and hardware configurations.
- Published
- 2020
15. Insights in Students��� Problems during UML Modeling
- Author
-
Yvonne Sedelmaier, Jürgen Mottok, Rebecca Reuter, Theresa Stark, Christian Wolff, and Dieter Landes
- Subjects
De facto ,Higher education ,Computer science ,business.industry ,GRASP ,Software development ,Notation ,004 Informatik ,UML, UML problems, software engineering, visual notation, higher education ,Unified Modeling Language ,Software system ,business ,Software engineering ,computer ,Curriculum ,computer.programming_language - Abstract
UML (Unified Modeling Language) is the current de facto as well as de jure standard (ISO/IEC 19505:2012) notation to visualize models in software development. UML provides essential guidelines and rules to visualize and understand complex software systems. This is the reason why it has become part of curricula for software engineering courses at many universities worldwide. It is well known, however, that UML is hard to grasp for novices, mainly due to its complexity. In order to tackle the problem of teaching UML to novice students appropriately, it is inevitable to understand their needs and problems much better than we do now. This paper presents empirical insights into students��� problems when developing common UML diagrams. Identified problems are generalized, giving rise to a problem catalogue that is derived from our empirical findings, thus establishing a basis for addressing these problems through focused learning arrangements.
- Published
- 2020
- Full Text
- View/download PDF
16. A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers
- Author
-
Jürgen Mottok, Enrico Pozzobon, and Sebastian Renner
- Subjects
Standardization ,Computer science ,business.industry ,Hardware-in-the-loop simulation ,02 engineering and technology ,Benchmarking ,020202 computer hardware & architecture ,Test case ,Software ,Computer engineering ,Design rationale ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,NIST ,020201 artificial intelligence & image processing ,business - Abstract
The National Institute of Standards and Technology (NIST) started the standardization process for lightweight cryptography algorithms in 2018. By the end of the first round, 32 submissions have been selected as 2nd round candidates. NIST allowed designers of 2nd round submissions to provide small updates on both their specifications and implementation packages. In this work, we introduce a benchmarking framework for evaluating the performance of NIST Lightweight Cryptography (LWC) candidates on embedded platforms. We show the features and application of the framework and explain its design rationale. Moreover, we provide information on how we aim to present up-to-date performance figures throughout the NIST LWC competition. In this paper, we present an excerpt of our software benchmarking results regarding speed and memory requirements of selected ciphers. All up-to-date results, including benchmarking different test cases for multiple variants of each 2nd round algorithm on five different microcontrollers, are periodically published to a public website. While initially only the reference implementations were available, the ability of automatically testing the performance of the candidate algorithms on multiple platforms becomes especially relevant as more optimized implementations are developed. Finally, we show how the framework can be extended in different directions: support for more target platforms can be easily added, different kinds of algorithms can be tested, and other test metrics can be acquired. The focus of this paper should rather lay on the framework design and testing methodology than on the current results, especially for reference code.
- Published
- 2020
17. USING EYE TRACKING DATA TO ANALYZE STUDENTS' TASK SOLVING BEHAVIOR IN CLASSROOM CONTEXTS
- Author
-
Florian Hauser, Sabrina Jahn, Jürgen Mottok, Rebecca Reuter, and Stefan Schreistetter
- Subjects
Computer science ,Human–computer interaction ,Eye tracking ,Task (project management) - Published
- 2019
18. ESCAPE ROOMS FOR TEACHING IT-SECURITY
- Author
-
Sabrina Jahn, Jürgen Mottok, and Stefan Seebauer
- Subjects
Computer science ,Computer security ,computer.software_genre ,computer - Published
- 2019
19. EYE MOVEMENTS IN SOFTWARE MODELLING - WHAT DO THEY TELL US ABOUT HEURISTICS
- Author
-
Jürgen Mottok, Andreas Gegenfurtner, Rebecca Reuter, Florian Hauser, and Hans Gruber
- Subjects
Modeling language ,Computer science ,Human–computer interaction ,Eye movement ,Heuristics - Published
- 2019
20. Towards Translation of Semantics of Automotive Interface Description Models from Franca to AUTOSAR Frameworks : An Approach using Semantic Synergies
- Author
-
Brian Rooney, Sangita De, Premek Brada, Michael Niklas, Juergen Mottok, and Pinker, Jiří
- Subjects
Computer science ,Interface (Java) ,Interoperability ,Automotive industry ,synergy ,rozhraní ,02 engineering and technology ,component model ,01 natural sciences ,rámec ,Franca Interface Definition Language ,sémantika ,AUTOSAR ,synergie ,traits ,framework ,vozidlo ,ARXML ,component ,0202 electrical engineering, electronic engineering, information engineering ,Adaptation (computer science) ,semantics ,business.industry ,model komponenty ,020208 electrical & electronic engineering ,010401 analytical chemistry ,Franca IDL ,0104 chemical sciences ,Software deployment ,součástka ,vehicle ,Component-based software engineering ,interface ,zvláštnosti ,business ,Software engineering ,Automotive software - Abstract
The automotive industry is eventually evolving into a complex network of services. The heterogeneous and distributed nature of automotive software systems demands flexible software components which can operate in different environments. Because of heterogeneous automotive development environments, the domain experts, must cope with too many diversities, adaption layers, and incompatibilities to design applications for the current generation of autonomous driving vehicles. In this context, interface adaptation is a promising approach to achieve flexibility without directly changing the respective components. AUTOSAR, which is the de-facto standard for describing automotive system architecture and is a hugely comprehensive standard allowing designers full control from abstract system description to bare metal level deployment. However, the vehicle subsystems have still evolved to include multifarious high-level domains not covered by AUTOSAR e.g. Infotainment, Telematics etc. Therefore, it seems beneficial to bridge the semantic gaps between AUTOSAR applications and other standards of automotive application domains. The goal of this paper is to investigate interface semantic mapping and achieve transparent integration of domain-specific applications using the translation of semantics among the AUTOSAR platform software component models and other software components models of open source development platforms e.g. GENIVI. A key goal of such a modelling approach is the reuse of existing interface description languages and respective code generators. This will enhance future interoperability and decrease in incompatibility among these platforms.
- Published
- 2019
21. Supporting Abstraction Skills Using Augmented Reality?
- Author
-
Marco Knietzsch, Florian Hauser, Jürgen Mottok, and Rebecca Reuter
- Subjects
Human–computer interaction ,Computer science ,05 social sciences ,050301 education ,0501 psychology and cognitive sciences ,Augmented reality ,0503 education ,050104 developmental & child psychology ,Task (project management) ,Abstraction (linguistics) ,Visualization - Abstract
We investigated the potential of augmented reality (AR) to enable visualization of abstract concepts and present the first iteration of a teaching experiment that evaluates the use of AR as support for abstraction skills. Students were confronted with the task to present and explain information to different groups of stakeholders at the example of a coffee machine. Results show that students find it helpful to have a visual app-prototype and especially one that can be disassembled in different levels. The main goal was to sensitize students for the need to think about and to abstract information for certain roles and perspectives.
- Published
- 2019
22. Probabilistic cell type assignment of single-cell transcriptomic data reveals spatiotemporal microenvironment dynamics in human cancers
- Author
-
Brittany Hewitson, Lauren Chong, Aoki T, Chan T, Jamie L. P. Lim, Allen W. Zhang, Sohrab P. Shah, Jessica N. McAlpine, Anja Mottok, Ciara H. O'Flanagan, Matt Wiens, Andrew McPherson, Weng Ap, Elizabeth A. Chavez, Wang X, Daniel Lai, Pascale Walters, Kieran R Campbell, Samuel Aparicio, Clémentine Sarkozy, and Christian Steidl
- Subjects
0303 health sciences ,Cell type ,Computer science ,Cell ,Probabilistic logic ,Computational biology ,Phenotype ,Transcriptome ,03 medical and health sciences ,0302 clinical medicine ,medicine.anatomical_structure ,030220 oncology & carcinogenesis ,Cancer cell ,medicine ,Cluster analysis ,Gene ,030304 developmental biology - Abstract
Single-cell RNA sequencing (scRNA-seq) has transformed biomedical research, enabling decomposition of complex tissues into disaggregated, functionally distinct cell types. For many applications, investigators wish to identify cell types with known marker genes. Typically, such cell type assignments are performed through unsupervised clustering followed by manual annotation based on these marker genes, or via "mapping" procedures to existing data. However, the manual interpretation required in the former case scales poorly to large datasets, which are also often prone to batch effects, while existing data for purified cell types must be available for the latter. Furthermore, unsupervised clustering can be error-prone, leading to under- and over- clustering of the cell types of interest. To overcome these issues we present CellAssign, a probabilistic model that leverages prior knowledge of cell type marker genes to annotate scRNA-seq data into pre-defined and de novo cell types. CellAssign automates the process of assigning cells in a highly scalable manner across large datasets while simultaneously controlling for batch and patient effects. We demonstrate the analytical advantages of CellAssign through extensive simulations and exemplify real-world utility to profile the spatial dynamics of high-grade serous ovarian cancer and the temporal dynamics of follicular lymphoma. Our analysis reveals subclonal malignant phenotypes and points towards an evolutionary interplay between immune and cancer cell populations with cancer cells escaping immune recognition.
- Published
- 2019
23. Probabilistic cell-type assignment of single-cell RNA-seq for tumor microenvironment profiling
- Author
-
Kieran R Campbell, Nicholas Ceglia, Xuehai Wang, Samuel Aparicio, Anja Mottok, Lauren Chong, Jamie L. P. Lim, Clémentine Sarkozy, Christian Steidl, Sohrab P. Shah, Andrew McPherson, Allen W. Zhang, Daniel Lai, Andrew P Weng, Brittany Hewitson, Tim Chan, Elizabeth A. Chavez, Pascale Walters, Tomohiro Aoki, Ciara H. O'Flanagan, Matt Wiens, and Jessica N. McAlpine
- Subjects
Cell type ,Computer science ,Sequence analysis ,Cell ,RNA-Seq ,Computational biology ,Biochemistry ,Article ,03 medical and health sciences ,medicine ,Tumor Microenvironment ,Humans ,Molecular Biology ,Gene ,Lymphoma, Follicular ,030304 developmental biology ,Probability ,0303 health sciences ,Sequence Analysis, RNA ,Gene Expression Profiling ,Probabilistic logic ,RNA ,Cell Biology ,Gene expression profiling ,medicine.anatomical_structure ,Single-Cell Analysis ,Biotechnology - Abstract
Single-cell RNA sequencing (scRNA-seq) has enabled decomposition of complex tissues into functionally distinct cell types. Often, investigators wish to assign cells to cell types, performed through unsupervised clustering followed by manual annotation, or via “mapping” procedures to existing data. However, manual interpretation scales poorly to large datasets, mapping approaches require purified or pre-annotated data, and both are prone to batch effects. To overcome these issues we present CellAssign (www.github.com/irrationone/cellassign), a probabilistic model that leverages prior knowledge of cell type marker genes to annotate scRNA-seq data into pre-defined or de novo cell types. CellAssign automates the process of assigning cells in a highly scalable manner across large datasets while controlling for batch and sample effects. We demonstrate the advantages of CellAssign through extensive simulations and analysis of tumor microenvironment composition in high grade serous ovarian cancer and follicular lymphoma.
- Published
- 2019
24. Using Augmented Reality in Software Engineering Education? First insights to a Comparative Study of 2D and AR UML Modeling
- Author
-
Erika Antoni, Jürgen Mottok, Florian Hauser, Daniel Muckelbauer, Rebecca Reuter, Theresa Stark, and Christian Wolff
- Subjects
ddc:004 ,Unified Modeling Language ,business.industry ,Computer science ,Vision and Novel Delivery, Software Engineering Education and Training, Augmented Reality, Class diagram, Modeling, show 2 more ,Augmented reality ,Class diagram ,Software engineering ,business ,004 Informatik ,computer ,computer.programming_language - Abstract
Although there has been much speculation about the potential of Augmented Reality (AR) in teaching for learning material, there is a significant lack of empirical proof about its effectiveness and implementation in higher education. We describe a software to integrate AR using the Microsoft Hololens into UML (Unified Modeling Language) teaching. Its user interface is laid out to overcome problems of existing software. We discuss the design of the tool and report a first evaluation study. The study is based upon effectiveness as a metric for students performance and components of motivation. The study was designed as control group experiment with two groups. The experimental group had to solve tasks with the help of the AR modeling tool and the control group used a classic PC software. We identified tendencies that participants of the experimental group showed more motivation than the control group. Both groups performed equally well.
- Published
- 2019
- Full Text
- View/download PDF
25. S $$^{3}$$ DES - Scalable Software Support for Dependable Embedded Systems
- Author
-
Jürgen Mottok and Lukas Osinski
- Subjects
010302 applied physics ,Triple modular redundancy ,Multi-core processor ,Computer science ,business.industry ,Fault tolerance ,02 engineering and technology ,Fault injection ,01 natural sciences ,020202 computer hardware & architecture ,Arithmetic coding ,Software ,Embedded system ,0103 physical sciences ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Transient (computer programming) ,business - Abstract
Scalable Software Support for Dependable Embedded Systems (S\(^{3}\)DES) achieves fault tolerance by utilizing spatial software-based triple modular redundancy for computational and voter processes on application level. Due to the parallel execution of the replicas on distinct CPU cores it makes a step towards software-based fault tolerance against transient and permanent random hardware errors. Additionally, the compliance with real-time requirements in terms of response time is enhanced compared to similar approaches. The replicated voters, the introduced mutual voter monitoring and the optimized arithmetic encoding allow the detection and compensation of voter failures without the utilization of backward recovery. Fault injection experiments on real hardware reveal that S\(^{3}\)DES can detect and mask all injected data and program flow errors under a single fault assumption, whereas an uncoded voting scheme yields approx. 12% silent data corruptions in a similar experiment.
- Published
- 2019
26. Asynchronous Critical Sections in Real-Time Multiprocessor Systems
- Author
-
Jürgen Mottok and Michael Schmid
- Subjects
Critical section ,business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,Blocking (computing) ,Task (computing) ,Priority inheritance ,Asynchronous communication ,Server ,Synchronization (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Priority ceiling protocol ,business ,Computer network - Abstract
Sharing data across multiple tasks in multiprocessor systems has intensively been studied in the past decades. Various synchronization protocols, the most well-known being the Priority Inheritance Protocol or the Priority Ceiling Protocol, have been established and analyzed so that blocking times of tasks waiting to access a shared resource can be upper bounded. To the best of our knowledge, all of these protocols share one commonality: Tasks that want to enter a critical section, that is already being executed by another task, immediately get blocked. In this paper, we introduce the Asynchronous Priority Ceiling Protocol (A-PCP), which makes use of aperiodic servers to execute the critical sections asynchronously, while the calling task can continue its work on non-critical section code. For this protocol, we provide a worst-case response time analysis of the asynchronous computations, as well as necessary and sufficient conditions for a feasibility analysis of a set of periodic tasks using the proposed synchronization model on a system that preemptively schedules the tasks under the rate-monotonic priority assignment.
- Published
- 2019
27. A Semantic Analysis of Interface Description Models of Heterogeneous Vehicle Application Frameworks: An Approach Towards Synergy Exploration
- Author
-
Přemek Brada, Sangita De, Michael Niklas, and Jürgen Mottok
- Subjects
Service (systems architecture) ,Knowledge base ,Computer science ,business.industry ,Interface (Java) ,Semantic analysis (machine learning) ,Component (UML) ,Interoperability ,Automotive industry ,Systems engineering ,business ,Metamodeling - Abstract
As the world is getting more connected, the demands of services in automotive industry are increasing with the requirements such as IoT (Internet of Things) in cars, automated driving, etc. Eventually, the automotive industry has evolved to a complex network of services, where each organization depends on the other organizations, to satisfy its service requirements in different phases of the vehicle life cycle. Because of these heterogeneous and complex development environments, most of the vehicle component interface models need to be specified in various manifestations to satisfy the semantic and syntactic requirements, specific to different application development environments or frameworks. This paper describes an approach to semantic analysis of components interfaces description models of heterogeneous frameworks, that are used for vehicle applications. The proposed approach intends to ensure that interface description models of different service-based vehicle frameworks can be compared, correlated and re-used based on semantic synergies, across different vehicle platforms, development environments and organizations. The approach to semantic synergy exploration could further provide the knowledge base for the increase in interoperability, overall efficiency and development of an automotive domain specific general software solutions, by facilitating coexistence of components of heterogeneous frameworks in the same high-performance ECU for future vehicle software.
- Published
- 2019
28. Reliability of data processing and fault compensation in unreliable arithmetic processors
- Author
-
Stefan Krämer, Jürgen Mottok, and Peter Raab
- Subjects
Data processing ,Correctness ,Computer Networks and Communications ,business.industry ,Computer science ,020208 electrical & electronic engineering ,010401 analytical chemistry ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,Stuck-at fault ,Data flow diagram ,Software ,Artificial Intelligence ,Hardware and Architecture ,Software fault tolerance ,0202 electrical engineering, electronic engineering, information engineering ,Arithmetic ,business ,Reliability (statistics) ,Vulnerability (computing) - Abstract
In logical circuits, like arithmetic operations in a processor system, arbitrary faults become a more tremendous aspect in future. Modern manufacturing processes lead to less reliability and higher vulnerability of software execution to soft-errors. The correctness of certain results is important especially for safety-critical applications whose reliability depends on the fault-free execution of each single instruction and the dependencies between them. The more complex a software is the more unreliable the outcome is. But, there is a contrary effect. If the probability for multiple faults increases, there is also the chance that two faults compensate each other and the result is correct again. This paper presents the basic ideas for such a reliability evaluation of a software's data flow with arbitrary soft-errors and the effect of fault compensation. Further, this evaluation provides a possibility to compare different implementations of a data flow with respect to the reliability. This is shown by the comparison of two different error codes as alternatives for coded data processing.
- Published
- 2016
29. WILL THE NOUN/VERB ANALYSIS BE USED TO GENERATE CLASS DIAGRAMS? AN EYE TRACKING STUDY
- Author
-
Ivonne Hutzler, Rebecca Reuter, Florian Hauser, Jürgen Mottok, and Hans Gruber
- Subjects
Computer science ,business.industry ,Noun ,Eye tracking ,Class diagram ,Verb ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing - Published
- 2018
30. EYE MOVEMENTS IN SOFTWARE ENGINEERING - WHAT DIFFERS THE EXPERT FROM THE NOVICE?
- Author
-
Jürgen Mottok, Ivonne Hutzler, Hans Gruber, Florian Hauser, and Rebecca Reuter
- Subjects
Computer science ,business.industry ,Eye movement ,Software engineering ,business - Published
- 2018
31. EXPERIMENTAL VERIFICATION OF INDICATED BENEFITS OF INTEGRATING AUGMENTED REALITY INTO ACADEMIC SOFTWARE ENGINEERING CLASSES
- Author
-
Marco Knietzsch, Rebecca Reuter, Daniel Muckelbauer, and Jürgen Mottok
- Subjects
Computer science ,business.industry ,Augmented reality ,Software engineering ,business - Published
- 2018
32. A TASK DESIGN CONCEPT FOR A VIRTUAL CLASSROOM FOR REQUIREMENTS ENGINEERING EDUCATION
- Author
-
Rebecca Reuter, Sabrina Jahn, Leonie Müller, and Jürgen Mottok
- Subjects
Requirements engineering ,Computer science ,Human–computer interaction ,Job design ,Virtual classroom - Published
- 2018
33. A 'Laboratory' as an approach to foster writing skills at software engineering studies: Learning software engineering is easier when writing courses are directly applied to lecture's content and the problems and examples enrolled in
- Author
-
Matthias Kampmann and Jürgen Mottok
- Subjects
Structure (mathematical logic) ,Exploit ,business.industry ,Computer science ,media_common.quotation_subject ,05 social sciences ,Core competency ,050301 education ,Context (language use) ,Information engineering ,Expression (architecture) ,Reading (process) ,ComputingMilieux_COMPUTERSANDEDUCATION ,0501 psychology and cognitive sciences ,Software engineering ,business ,0503 education ,Curriculum ,050104 developmental & child psychology ,media_common - Abstract
Writing, with no doubt, is besides reading a core competency which allows us to "exploit" knowledge in general. It also makes possible the exploration of software engineering's core issues. Especially within this context it is necessary to master the reading of complex texts as well as to be able to write in an appropriate academic expression. With regard to studies in software engineering this seems to be obvious, but in fact the opposite is the reality. Therefore measures to improve these skills seemed to be necessarily applied. At the Ostbayerische Technische Hochschule (OTH, University of Applied Sciences, Regensburg) a new format, the so called c∗lab, was installed during the winter semester 2017. This was a course which followed the principle of "Writing Across the Curriculum" (WAC). Organized parallel to a lecture of learning how to program the language C, and addressing students of the first semester, the course was a complete voluntary offer in addition to the general standard courses and lectures of the faculty. Students who participated not only reflected on C and its principles, nor only on writing as a self purpose, but they also learned to express technical thoughts and ideas by the use of didactic methods. The idea to transfer also basic LTeX concepts to write a paper based on the IEEE bare_conf.tex-template were also planned. The course followed the idea of student's-centred learning. This paper presents the main structure, goals, and means of the c∗lab, and the theory behind. It also embeds the course within the horizon of experiences of teaching writing skills at the Laboratory for Safe and Secure Systems (LaS3) at the faculty of electronic and information engineering at the OTH Regensburg. First experiences have shown that participants increase writing skills and their idea of the importance of writing.
- Published
- 2018
34. Research competence: Modification of a questionnaire to measure research competence at universities of applied scienes
- Author
-
Florian Hauser, Hans Gruber, Rebecca Reuter, and Jürgen Mottok
- Subjects
German ,Medical education ,ta213 ,Ethical issues ,Demographics ,Research areas ,Computer science ,language ,ta516 ,Factor structure ,Competence model ,Competence (human resources) ,language.human_language - Abstract
This paper deals with the validation and modification of the German questionnaire "F-Komp". In its original version, it was intended to measure university students' research competences. In the beginning of this study, there were only a few tools available which were reliable. For the purposes of this study, they were not suitable. At the same time, there was no validated version of the F-Komp available, which made the whole validation process for further usage necessary. This questionnaire is based on a structure, which consist of different skills and knowledge and is focused on measuring research competence in general. The validation and modification of the F-Komp is therefore the aim of our contribution as well as a revised version of the questionnaire. We proceeded an explorative factor and a reliability analysis to do a general evaluation of the tool. Some modifications were done in the questionnaire to make it more suitable to the requirements of technical oriented universities of applied sciences [5]. Our revised version is slightly longer and contains several items to gather data about the participants demographics. The modified questionnaire is based on a more appropriate factor structure. This structure is more practically oriented and pays attention to ethical issues. In future cases, this questionnaire will be used in research oriented courses to measure students' progress in acquiring the knowledge and methods which are necessary to perform as a scientist in different research areas.
- Published
- 2018
35. Research Oriented Learning in a Research Association – Evaluated in a Maturity Model
- Author
-
Kerstin Haas and Jürgen Mottok
- Subjects
Capability Maturity Model ,Knowledge management ,Computer science ,business.industry ,020204 information systems ,Research environment ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,business ,Competence (human resources) - Abstract
Research-oriented learning provides students the opportunity to develop their research competences by experiencing research practice, this often happens in the surrounding of research associations with different universities and companies. This paper introduces a two-step approach to evaluate the research-oriented learning within a research association. First we conduct the evaluation of the research environment with the instrument of the adapted Collaboration Maturity Model (Col-MM) to see whether the collaboration network and the management is able to support the students in their learning process. Additionally, we take into account the evaluation of the students’ research competence. This approach targets the assessment of the starting conditions of the students and to compare their performance level until the end of the research association project phase. These two evaluation phases provide the potential to create an ideal research environment and consequently enable the students to develop and improve their research competence.
- Published
- 2017
36. A Two-Sided Approach of Applying Software Engineering Perspectives in Higher Education
- Author
-
Martina Kuhn, Jürgen Mottok, and Rebecca Reuter
- Subjects
Higher education ,Peer feedback ,Computer science ,business.industry ,media_common.quotation_subject ,Design pattern ,Perspective (graphical) ,Task (project management) ,Systems development life cycle ,Reading (process) ,Set (psychology) ,business ,Software engineering ,media_common - Abstract
Using the Perspective Based Reading technique opens doors to new and enriching opportunities to design new teaching/learning arrangements. We set up a new approach that implements a perspective based task and (additionally) perspective based feedback. Therefore we provide the theoretical basis and elaborate more on Perspective Based Reading and Peer Feedback as well as on the needed perspectives, which we extract from the software development life cycle phases. We also define a new type of task that we called perspective based task with a perspective based feedback. For a better understanding we present an example scenario for a design pattern unit in a software engineering course.
- Published
- 2017
37. Comparing trace recordings of automotive real-time software
- Author
-
Andreas Sailer, Gerald Lüttgen, Michael Deubzer, and Jürgen Mottok
- Subjects
Reverse engineering ,Process (engineering) ,Computer science ,business.industry ,05 social sciences ,Real-time computing ,02 engineering and technology ,Tracing ,computer.software_genre ,AUTOSAR ,Software ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Use case ,Legacy code ,business ,computer ,050203 business & management ,TRACE (psycholinguistics) - Abstract
The process of engineering models of existing real-time system components is often difficult and time consuming, especially when legacy code has to be re-used or information about the exact timing behaviour is needed. In order to tackle this reverse engineering problem, we have developed the tool CoreTAna. CoreTAna derives an AUTOSAR compliant model of a real-time system by conducting dynamic analysis using trace recordings.Motivated by the challenge of assessing the quality of reverse engineered models of real-time software, we present a novel mathematical measure for comparing trace recordings from embedded real-time systems regarding their temporal behaviour. We also introduce a benchmark framework based on this measure, for evaluating reverse engineering tools such as CoreTAna. This considers common system architectures and also includes randomly generated systems and three systems of industrial automotive projects. Finally, an industrial case study demonstrates other use cases of our measure, such as impact analysis.
- Published
- 2017
38. Estimation of Worst Case Response Time boundaries in multi-core real-time systems
- Author
-
Jurgen Mottok, Matthias Mucha, Stefan Krämer, and Pinker, Jiří
- Subjects
computational modeling ,program processors ,Process (engineering) ,Computer science ,Real-time computing ,neurčitost ,02 engineering and technology ,forma ,shape ,01 natural sciences ,time factors ,Task (project management) ,Set (abstract data type) ,programové procesory ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,uncertainty ,Semaphore ,Block (data storage) ,010302 applied physics ,časové faktory ,Multi-core processor ,Probabilistic logic ,systémy v reálném čase ,Response time ,020202 computer hardware & architecture ,real-time systems ,výpočetní modelování - Abstract
We address a novel probabilistic approach to estimate the Worst Case Response Time boundaries of tasks. Multi-core real-time systems process tasks in parallel on two or more cores. Tasks in our contribution may preempt other tasks, block tasks with semaphores to access global shared resources, or migrate to another core. The depicted task behavior is random. The shape of collected response times of a task within a processing time is multimodal. Extreme Value approaches need unimodal response time distributions to estimate the Worst Case Response Time of tasks. The new proposed method derives a set of three task set shapes from the source task set. It is used to minimize the uncertainty of random task behavior by maximizing the coverage of possible Worst Case Response Times. The case study evaluates the new proposed estimation method by the use of dynamically generated random tasks with varying task properties.
- Published
- 2017
39. CAPELLA: A conceptual framework for adaptive life-long learning
- Author
-
Miriam Iris Barak, Amir Tomer, Dorit Alt, Irit Hadar, Juergen Mottok, and Georg Hagel
- Subjects
Knowledge management ,business.industry ,Human–computer interaction ,Computer science ,Educational technology ,Collaborative learning ,Adaptive learning ,business ,Robot learning ,Experiential learning ,Action learning ,Learning sciences ,Synchronous learning - Abstract
In this paper we describe a proposed framework for Cooperative Adaptive Personalized Education for Life-long Learning and Activation (CAPELLA). CAPELLA comprises four models: A Knowledge Organization Model, a Learning Process Model, a Community Collaboration Model and a Gaming Model. The underlying pedagogical approach is based on the four pillars of learning: Learning to know, learning to do, learning to collaborate and learning to be. Based on these models and principles, CAPELLA provides a theoretical framework that may assist IT developers to develop state-of-the-art educational platforms and advanced learning applications. Using an example of a UML Diagramming Workshop we demonstrate how CAPELLA incorporates the principles of Adaptive Learning.
- Published
- 2017
40. TOWARDS A DEFINITION AND IDENTIFICATION OF LEARNING OBSTACLES IN HIGHER SOFTWARE ENGINEERING EDUCATION
- Author
-
Florian Hauser, Jürgen Mottok, Rebecca Reuter, Jorg Abke, and Carolin Gold-Veerkamp
- Subjects
Identification (information) ,business.industry ,Computer science ,Software engineering ,business - Published
- 2017
41. Eye tracking applied: Visual expertise in code reviews
- Author
-
Hans Gruber, Jürgen Mottok, Florian Hauser, Markus Reiß, and Markus Nivala
- Subjects
Code review ,Multimedia ,Computer science ,Eye tracking ,ta516 ,Visual expertise ,computer.software_genre ,computer - Published
- 2017
42. Pattern oriented card game development: SOFTTY - A card game for academic learning of software testing
- Author
-
Alexander Soska, Christian Wolff, and Jürgen Mottok
- Subjects
Game mechanics ,Serious Games ,Card Game ,Software Test ,Game Design Pattern ,Video game development ,Multimedia ,Computer science ,Game design document ,Game programming ,05 social sciences ,ComputingMilieux_PERSONALCOMPUTING ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,004 Informatik ,Game design ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,Game development tool ,Video game design ,Game Developer ,computer ,050107 human factors - Abstract
One of the biggest problems of educational games is the adequate integration of learning content into the game environment. Thereby the main challenge is to create a balance between gameplay and learning objectives and the correct transfer of learning principles into the game design. A useful approach is to identify game components and their specific learning constraints and the relationship between each other. By mapping learning elements to Game Design Pattern, we elaborate fundamentals for the concrete game design, focusing on card games. A shared description and an understanding of how the game design aligns with learning content facilitates the development of high quality educational games. A short illustration of our further developed implementation summarizes our experiences and shows an exemplary realization., erschienen in: Proceedings of 2017 IEEE Global Engineering Education Conference (EDUCON) : date and venue: 25-28 April 2017, Athens, Greece ISBN 978-1-5090-5467-1
- Published
- 2017
- Full Text
- View/download PDF
43. Technische Sicherheit und Informationssicherheit
- Author
-
Karl-Erwin Großpietsch, Jürgen Mottok, Isabel Münch, Hubert B. Keller, Rüdiger Grimm, Kai Rannenberg, Felix C. Freiling, and Francesca Saglietti
- Subjects
Computer science ,Operating system ,computer.software_genre ,computer ,Computer Science Applications ,Information Systems - Published
- 2013
44. An experimental card game for software testing: Development, design and evaluation of a physical card game to deepen the knowledge of students in academic software testing education
- Author
-
Alexander Soska, Jürgen Mottok, and Christian Wolff
- Subjects
software testing ,playful learning ,game-based learning ,card game ,Game testing ,Knowledge management ,Multimedia ,business.industry ,Computer science ,05 social sciences ,050301 education ,020207 software engineering ,02 engineering and technology ,Software walkthrough ,004 Informatik ,computer.software_genre ,Test (assessment) ,Software ,Active learning ,Personal software process ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,business ,Game Developer ,0503 education ,computer - Abstract
Teaching software testing is a challenging task. Especially if you want to impart more in-depth and practical knowledge to the students. Therefore, most lectures still teach in a classic lecture format despite the fact that this way of instruction is in any case the optimal way of instruction for today's requirements anymore. In this paper we present our implementation of an active learning method to deepen the knowledge in academic software test education. We describe a card game for advanced learning that promotes students' collaboration and knowledge exchange in a playful and competitive manner. The design of the game is based on constructive and cooperative theories. A subsequent evaluation shows that the use of this card game for teaching software testing is a suitable method.
- Published
- 2016
45. Developing visual expertise in software engineering: An eye tracking study
- Author
-
Florian Hauser, Markus Nivala, Jürgen Mottok, and Hans Gruber
- Subjects
Computer science ,business.industry ,Process (engineering) ,media_common.quotation_subject ,Program comprehension ,05 social sciences ,GRASP ,020207 software engineering ,02 engineering and technology ,050105 experimental psychology ,Task (project management) ,Human–computer interaction ,Reading (process) ,Saccade ,Chunking (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,Eye tracking ,ta516 ,0501 psychology and cognitive sciences ,Software engineering ,business ,media_common - Abstract
Program comprehension and the ability to find program errors are key skills of software engineering. The aim of this pilot study was to examine the visual processes of novice and advanced programmers in authentic tasks. Fifteen novices and eight advanced programmers were given eight short pieces of code. Their task was to either identify an error or give the output of the code. Eye movements and keyboard activity were recorded. On average, the novices spent more time reading the code than composing the response, whereas the more advanced programmers started composing the response sooner and spent more time on it. In general, the advanced programmers had shorter fixations and saccades. The results suggest that the advanced programmers are quicker to grasp the essence of the code and able to see more details in it. The advanced programmers had shorter fixations and saccade lengths during the second phase which might indicate the process of chunking.
- Published
- 2016
46. Ranking task activity in teaching software engineering
- Author
-
Rudi Hackenberg, Jürgen Mottok, Georg Hagel, Guozhu Liu, and Ye Tao
- Subjects
Social software engineering ,Software Engineering Process Group ,business.industry ,Computer science ,05 social sciences ,Software development ,050301 education ,01 natural sciences ,Software quality ,Ranking (information retrieval) ,Software analytics ,0103 physical sciences ,Software construction ,Personal software process ,010306 general physics ,Software engineering ,business ,0503 education - Abstract
In this research, we investigate the possibility of applying ranking task activity in teaching and learning software engineering courses. We introduce three types of ranking tasks, conceptual-, contextual- and sequential ranking questions, which cover most core topics such as requirement analysis, architecture design and quality validation in the course. We have also done experiments on a group of students to see if ranking tasks could increase their conceptual knowledge in specific areas. Assessments were given in order to evaluate the effectiveness of this activity, showing an obvious increase in complex conceptual understanding.
- Published
- 2016
47. CoreTAna: A Trace Analyzer for Reverse Engineering Real-Time Software
- Author
-
Andreas Sailer, Jürgen Mottok, Gerald Lüttgen, and Michael Deubzer
- Subjects
Reverse engineering ,Profiling (computer programming) ,Computer science ,business.industry ,Process (engineering) ,020208 electrical & electronic engineering ,Real-time computing ,02 engineering and technology ,Tracing ,computer.software_genre ,Domain (software engineering) ,AUTOSAR ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Legacy code ,computer ,TRACE (psycholinguistics) - Abstract
With the availability of the AUTOSAR standard, model-driven methodologies are becoming established in theautomotive domain. However, the process of creating models ofexisting system components is often difficult and time consuming, especially when legacy code has to be re-used or informationabout the exact timing behavior is needed. In order to tackle thisreverse engineering problem, we present CoreTAna, a novel toolthat derives an AUTOSAR compliant model of a real-time systemfrom a dynamic analysis of its trace recordings. This paper givesan overview of CoreTAna's current features and discusses itsbenefits for reverse engineering.
- Published
- 2016
48. Alternative Massnahme für Sicherheitsgerichtete Software
- Author
-
Jürgen Mottok, Jürgen Braun, and Dirk Geyer
- Subjects
Computer science ,Ocean Engineering ,Manufacturing engineering - Published
- 2012
49. Alternative Measure for Safety-Related Software
- Author
-
Jürgen Braun, Jürgen Mottok, and Dirk Geyer
- Subjects
Software ,Computer science ,business.industry ,Measure (physics) ,General Earth and Planetary Sciences ,business ,Software metric ,General Environmental Science ,Reliability engineering - Published
- 2012
50. The Myths of Coded Processing
- Author
-
Juergen Braun and Juergen Mottok
- Subjects
Microcontroller ,Software ,Computer science ,business.industry ,Distributed computing ,Redundancy (engineering) ,Fault tolerance ,Hamming distance ,business ,Computer security ,computer.software_genre ,computer - Abstract
Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like electromobility. In series production fail-safe systems as well as fault-tolerant systems are realized with redundant hardware concepts like dual core microcontrollers running in lock-step-mode to reach highest safety requirements given by standards, like ISO 26262 or IEC 61508. In contrast to the hardware redundancy approach, there are also approaches available with information-, time-and/or software-redundancy since several years. One of them is known as coded processing or AN-codes. Coded processing is capable of reducing redundancy in hardware by adding diverse redundancy in software. But the breakthrough of coded processing never took place. One reason for this seem to be the myths which are widely propagated on this subject and the hereby associated uncertainties. In this paper some myths are busted, like the usage of prime numbers as transformation factor A, the myth that greater transformation factors are better or the myth about the residual error probability defined as 1/A. Some of them have been propagated since 1989. The aim of this paper is to provide more clarity and understanding for this technique, perhaps to pave the way for further functional safety concepts based on coded processing approaches.
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.