210 results on '"Jane Cleland-Huang"'
Search Results
2. Hierarchically Organized Computer Vision in Support of Multi-Faceted Search for Missing Persons
- Author
-
Arturo Miguel Russell Bernal and Jane Cleland-Huang
- Published
- 2023
- Full Text
- View/download PDF
3. GRuM — A flexible model-driven runtime monitoring framework and its application to automated aerial and ground vehicles
- Author
-
Michael Vierhauser, Antonio Garmendia, Marco Stadler, Manuel Wimmer, and Jane Cleland-Huang
- Subjects
Hardware and Architecture ,Software ,Information Systems - Published
- 2023
- Full Text
- View/download PDF
4. SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems
- Author
-
Alberto D. Rodriguez, Timothy Newman, Katherine R. Dearstyne, and Jane Cleland-Huang
- Published
- 2022
- Full Text
- View/download PDF
5. ProCon: An automated process-centric quality constraints checking framework
- Author
-
Christoph Mayr-Dorn, Michael Vierhauser, Stefan Bichler, Felix Keplinger, Jane Cleland-Huang, Alexander Egyed, and Thomas Mehofer
- Subjects
History ,Polymers and Plastics ,Hardware and Architecture ,Business and International Management ,Industrial and Manufacturing Engineering ,Software ,Information Systems - Published
- 2023
- Full Text
- View/download PDF
6. Visualizing Change in Agile Safety-Critical Systems
- Author
-
Michael Vierhauser, Jane Cleland-Huang, Ankit Agrawal, and Christoph Mayr-Dorn
- Subjects
Traceability ,business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,Software quality ,Data visualization ,Software ,Life-critical system ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,Software system ,business ,Software engineering ,Agile software development - Abstract
High dependability software systems must be developed and maintained using rigorous safety-assurance practices. By leveraging traceability, we can visualize and analyze changes as they occur, mitigate potential hazards, and support greater agility.
- Published
- 2021
- Full Text
- View/download PDF
7. Interlocking Safety Cases for Unmanned Autonomous Systems in Shared Airspaces
- Author
-
Joshua Huseman, Jane Wyngaard, Jinghui Cheng, Wandi Xiong, Michael Vierhauser, Jane Cleland-Huang, Robyn R. Lutz, and Sean Bayley
- Subjects
Software ,business.industry ,Computer science ,Safety assurance ,Environmental monitoring ,Systems engineering ,Controlled airspace ,Safety case ,business ,Airspace class ,Interlocking ,Intersection (aeronautics) - Abstract
The growing adoption of unmanned aerial vehicles (UAVs) for tasks such as eCommerce, aerial surveillance, and environmental monitoring introduces the need for new safety mechanisms in an increasingly cluttered airspace. In our work we thus emphasize safety issues that emerge at the intersection of infrastructures responsible for controlling the airspace, and the diverse UAVs operating in their space. We build on safety assurance cases (SAC) – a state-of-the-art solution for reasoning about safety – and propose a novel approach based on interlocking SACs. The infrastructure safety case (ISAC) specifies assumptions upon UAV behavior, while each UAV demonstrates compliance to the ISAC by presenting its own (pluggable) safety case (pSAC) which connects to the ISAC through a set of interlock points. To collect information on each UAV we enforce a “trust but monitor” policy, supported by runtime monitoring and an underlying reputation model. We evaluate our approach in three ways: first by developing ISACs for two UAV infrastructures, second by running simulations to evaluate end-to-end effectiveness, and finally via an outdoor field-study with physical UAVs. The results show that interlocking SACs can be effective for identifying, specifying, and monitoring safety-related constraints upon UAVs flying in a controlled airspace.
- Published
- 2021
- Full Text
- View/download PDF
8. Towards Real-Time Safety Analysis of Small Unmanned Aerial Systems in the National Airspace
- Author
-
Jane Cleland-Huang, Nitesh Chawla, Myra Cohen, Md Nafee Al Islam, Urjoshi Sinha, Lilly Spirkovska, Yihong Ma, Sulil Purandare, and Muhammed Tawfiq Chowdhury
- Published
- 2022
- Full Text
- View/download PDF
9. Flexible model-driven runtime monitoring support for cyber-physical systems
- Author
-
Marco Stadler, Michael Vierhauser, Antonio Garmendia, Manuel Wimmer, and Jane Cleland-Huang
- Published
- 2022
- Full Text
- View/download PDF
10. Towards flexible runtime monitoring support for ROS-based applications
- Author
-
Marco Stadler, Michael Vierhauser, and Jane Cleland-Huang
- Published
- 2022
- Full Text
- View/download PDF
11. Configuring mission-specific behavior in a product line of collaborating Small Unmanned Aerial Systems
- Author
-
Md Nafee Al Islam, Muhammed Tawfiq Chowdhury, Ankit Agrawal, Michael Murphy, Raj Mehta, Daria Kudriavtseva, Jane Cleland-Huang, Michael Vierhauser, and Marsha Chechik
- Subjects
Hardware and Architecture ,Software ,Information Systems - Published
- 2023
- Full Text
- View/download PDF
12. Amon: A Domain-Specific Language and Framework for Adaptive Monitoring of Cyber-Physical Systems
- Author
-
Michael Vierhauser, Rebekka Wohlrab, Marco Stadler, and Jane Cleland-Huang
- Published
- 2022
- Full Text
- View/download PDF
13. RESAM: Requirements Elicitation and Specification for Deep-Learning Anomaly Models with Applications to UAV Flight Controllers
- Author
-
Md Nafee Al Islam, Yihong Ma, Pedro Alarcon, Nitesh Chawla, and Jane Cleland-Huang
- Subjects
Software Engineering (cs.SE) ,FOS: Computer and information sciences ,Computer Science - Software Engineering ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence ,Computer Science - Multiagent Systems ,Multiagent Systems (cs.MA) - Abstract
CyberPhysical systems (CPS) must be closely monitored to identify and potentially mitigate emergent problems that arise during their routine operations. However, the multivariate time-series data which they typically produce can be complex to understand and analyze. While formal product documentation often provides example data plots with diagnostic suggestions, the sheer diversity of attributes, critical thresholds, and data interactions can be overwhelming to non-experts who subsequently seek help from discussion forums to interpret their data logs. Deep learning models, such as Long Short-term memory (LSTM) networks can be used to automate these tasks and to provide clear explanations of diverse anomalies detected in real-time multivariate data-streams. In this paper we present RESAM, a requirements process that integrates knowledge from domain experts, discussion forums, and formal product documentation, to discover and specify requirements and design definitions in the form of time-series attributes that contribute to the construction of effective deep learning anomaly detectors. We present a case-study based on a flight control system for small Uncrewed Aerial Systems and demonstrate that its use guides the construction of effective anomaly detection models whilst also providing underlying support for explainability. RESAM is relevant to domains in which open or closed online forums provide discussion support for log analysis.
- Published
- 2022
- Full Text
- View/download PDF
14. AMon: A domain-specific language and framework for adaptive monitoring of Cyber–Physical Systems
- Author
-
Michael Vierhauser, Rebekka Wohlrab, Marco Stadler, and Jane Cleland-Huang
- Subjects
Hardware and Architecture ,Software ,Information Systems - Published
- 2023
- Full Text
- View/download PDF
15. Information retrieval versus deep learning approaches for generating traceability links in bilingual projects
- Author
-
Jinfeng Lin, Yalin Liu, and Jane Cleland-Huang
- Subjects
Software - Published
- 2021
- Full Text
- View/download PDF
16. Leveraging Intermediate Artifacts to improve Automated Trace Link Retrieval
- Author
-
Falessi Davide, Jane Cleland-Huang, and Alberto Rodriguez
- Published
- 2021
- Full Text
- View/download PDF
17. Explaining Autonomous Decisions in Swarms of Human-on-the-Loop Small Unmanned Aerial Systems
- Author
-
Ankit Agrawal and Jane Cleland-Huang
- Subjects
FOS: Computer and information sciences ,Computer Science - Robotics ,Computer Science - Human-Computer Interaction ,Robotics (cs.RO) ,Human-Computer Interaction (cs.HC) - Abstract
Rapid advancements in Artificial Intelligence have shifted the focus from traditional human-directed robots to fully autonomous ones that do not require explicit human control. These are commonly referred to as Human-on-the-Loop (HotL) systems. Transparency of HotL systems necessitates clear explanations of autonomous behavior so that humans are aware of what is happening in the environment and can understand why robots behave in a certain way. However, in complex multi-robot environments, especially those in which the robots are autonomous, mobile, and require intermittent interventions, humans may struggle to maintain situational awareness. Presenting humans with rich explanations of autonomous behavior tends to overload them with too much information and negatively affect their understanding of the situation. Therefore, explaining the autonomous behavior or autonomy of multiple robots creates a design tension that demands careful investigation. This paper examines the User Interface (UI) design trade-offs associated with providing timely and detailed explanations of autonomous behavior for swarms of small Unmanned Aerial Systems (sUAS) or drones. We analyze the impact of UI design choices on human awareness of the situation. We conducted multiple user studies with both inexperienced and expert sUAS operators to present our design solution and provide initial guidelines for designing the HotL multi-sUAS interface., 10+2 pages; 6 Figures; 3 Tables; Accepted for publication at HCOMP'21
- Published
- 2021
18. Leveraging Intermediate Artifacts to Improve Automated Trace Link Retrieval
- Author
-
Alberto D. Rodriguez, Jane Cleland-Huang, and Davide Falessi
- Subjects
Trace (semiology) ,Computer science ,Data mining ,Link (knot theory) ,computer.software_genre ,computer - Published
- 2021
- Full Text
- View/download PDF
19. Hazard analysis for human-on-the-loop interactions in sUAS systems
- Author
-
Michael Vierhauser, Ankit Agrawal, Jane Cleland-Huang, James Mason, and Nafee Al Islam
- Subjects
Risk analysis (engineering) ,Human interaction ,Critical system ,Process (engineering) ,Computer science ,Hazard analysis ,Construct (philosophy) ,Hazard ,Domain (software engineering) ,Variety (cybernetics) - Abstract
With the rise of new AI technologies, autonomous systems are moving towards a paradigm in which increasing levels of responsibility are shifted from the human to the system, creating a transition from human-in-the-loop systems to human-on-the-loop (HoTL) systems. This has a significant impact on the safety analysis of such systems, as new types of errors occurring at the boundaries of human-machine interactions need to be taken into consideration. Traditional safety analysis typically focuses on system-level hazards with little focus on user-related or user-induced hazards that can cause critical system failures. To address this issue, we construct domain-level safety analysis assets for sUAS (small unmanned aerial systems) applications and describe the process we followed to explicitly, and systematically identify Human Interaction Points (HiPs), Hazard Factors and Mitigations from system hazards. We evaluate our approach by first investigating the extent to which recent sUAS incidents are covered by our hazard trees, and second by performing a study with six domain experts using our hazard trees to identify and document hazards for sUAS usage scenarios. Our study showed that our hazard trees provided effective coverage for a wide variety of sUAS application scenarios and were useful for stimulating safety thinking and helping users to identify and potentially mitigate human-interaction hazards.
- Published
- 2021
- Full Text
- View/download PDF
20. Towards a Model-Integrated Runtime Monitoring Infrastructure for Cyber-Physical Systems
- Author
-
Hussein M. Marah, Manuel Wimmer, Antonio Garmendia, Jane Cleland-Huang, and Michael Vierhauser
- Subjects
Data collection ,System change ,Safe operation ,Computer science ,Systems engineering ,Cyber-physical system ,Instrumentation (computer programming) ,Maintenance engineering - Abstract
Runtime monitoring is essential for ensuring the safe operation and enabling self-adaptive behavior of Cyber-Physical Systems (CPS). It requires the creation of system monitors, instrumentation for data collection, and the definition of constraints. All of these aspects need to evolve to accommodate changes in the system. However, most existing approaches lack support for the automated generation and setup of monitors and constraints for diverse technologies and do not provide adequate support for evolving the monitoring infrastructure. Without this support, constraints and monitors can become stale and become less effective in long-running, rapidly changing CPS. In this "new and emerging results" paper we propose a novel framework for model-integrated runtime monitoring. We combine model-driven techniques and runtime monitoring to automatically generate large parts of the monitoring framework and to reduce the maintenance effort necessary when parts of the monitored system change. We build a prototype and evaluate our approach against a system for controlling the flights of unmanned aerial vehicles.
- Published
- 2021
- Full Text
- View/download PDF
21. Supporting Quality Assurance with Automated Process-Centric Quality Constraints Checking
- Author
-
Felix Keplinger, Christoph Mayr-Dorn, Stefan Bichler, Jane Cleland-Huang, Alexander Egyed, Thomas Mehofer, and Michael Vierhauser
- Subjects
Traceability ,Computer science ,business.industry ,Process (engineering) ,media_common.quotation_subject ,Rework ,020207 software engineering ,02 engineering and technology ,computer.file_format ,Domain (software engineering) ,Software development process ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Quality (business) ,Executable ,Software engineering ,business ,Quality assurance ,computer ,media_common - Abstract
Regulations, standards, and guidelines for safety-critical systems stipulate stringent traceability but do not prescribe the corresponding, detailed software engineering process. Given the industrial practice of using only semi-formal notations to describe engineering processes, processes are rarely "executable" and developers have to spend significant manual effort in ensuring that they follow the steps mandated by quality assurance. The size and complexity of systems and regulations makes manual, timely feedback from Quality Assurance (QA) engineers infeasible. In this paper we propose a novel framework for tracking processes in the background, automatically checking QA constraints depending on process progress, and informing the developer of unfulfilled QA constraints. We evaluate our approach by applying it to two different case studies; one open source community system and a safety-critical system in the air-traffic control domain. Results from the analysis show that trace links are often corrected or completed after the fact and thus timely and automated constraint checking support has significant potential on reducing rework.
- Published
- 2021
- Full Text
- View/download PDF
22. Adaptive Autonomy in Human-on-the-Loop Vision-Based Robotics Systems
- Author
-
Sreya Banerjee, Ankit Agrawal, Sophia Abraham, Zachariah Carmichael, Jane Cleland-Huang, Nafee Al Islam, Walter J. Scheirer, and Rosaura G. VidalMata
- Subjects
FOS: Computer and information sciences ,business.industry ,Process (engineering) ,Computer science ,Operating environment ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,Robotics ,Software quality ,Data modeling ,Software Engineering (cs.SE) ,Computer Science - Software Engineering ,Software deployment ,Human–computer interaction ,Adaptive system ,Artificial intelligence ,business ,Adaptation (computer science) - Abstract
Computer vision approaches are widely used by autonomous robotic systems to sense the world around them and to guide their decision making as they perform diverse tasks such as collision avoidance, search and rescue, and object manipulation. High accuracy is critical, particularly for Human-on-the-loop (HoTL) systems where decisions are made autonomously by the system, and humans play only a supervisory role. Failures of the vision model can lead to erroneous decisions with potentially life or death consequences. In this paper, we propose a solution based upon adaptive autonomy levels, whereby the system detects loss of reliability of these models and responds by temporarily lowering its own autonomy levels and increasing engagement of the human in the decision-making process. Our solution is applicable for vision-based tasks in which humans have time to react and provide guidance. When implemented, our approach would estimate the reliability of the vision task by considering uncertainty in its model, and by performing covariate analysis to determine when the current operating environment is ill-matched to the model's training data. We provide examples from DroneResponse, in which small Unmanned Aerial Systems are deployed for Emergency Response missions, and show how the vision model's reliability would be used in addition to confidence scores to drive and specify the behavior and adaptation of the system's autonomy. This workshop paper outlines our proposed approach and describes open challenges at the intersection of Computer Vision and Software Engineering for the safe and reliable deployment of vision models in the decision making of autonomous systems.
- Published
- 2021
23. Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT Models
- Author
-
Jane Cleland-Huang, Jinfeng Lin, Qingkai Zeng, Yalin Liu, and Meng Jiang
- Subjects
FOS: Computer and information sciences ,Source code ,Traceability ,Computer science ,business.industry ,media_common.quotation_subject ,Deep learning ,020207 software engineering ,02 engineering and technology ,Machine learning ,computer.software_genre ,Data modeling ,Software Engineering (cs.SE) ,Computer Science - Software Engineering ,Software ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Language model ,Artificial intelligence ,business ,computer ,Natural language ,TRACE (psycholinguistics) ,media_common - Abstract
Software traceability establishes and leverages associations between diverse development artifacts. Researchers have proposed the use of deep learning trace models to link natural language artifacts, such as requirements and issue descriptions, to source code; however, their effectiveness has been restricted by availability of labeled data and efficiency at runtime. In this study, we propose a novel framework called Trace BERT (T-BERT) to generate trace links between source code and natural language artifacts. To address data sparsity, we leverage a three-step training strategy to enable trace models to transfer knowledge from a closely related Software Engineering challenge, which has a rich dataset, to produce trace links with much higher accuracy than has previously been achieved. We then apply the T-BERT framework to recover links between issues and commits in Open Source Projects. We comparatively evaluated accuracy and efficiency of three BERT architectures. Results show that a Single-BERT architecture generated the most accurate links, while a Siamese-BERT architecture produced comparable results with significantly less execution time. Furthermore, by learning and transferring knowledge, all three models in the framework outperform classical IR trace models. On the three evaluated real-word OSS projects, the best T-BERT stably outperformed the VSM model with average improvements of 60.31% measured using Mean Average Precision (MAP). RNN severely underper-formed on these projects due to insufficient training data, while T-BERT overcame this problem by using pretrained language models and transfer learning.
- Published
- 2021
24. Enhancing Taxonomy Completion with Concept Generation via Fusing Relational Representations
- Author
-
Qingkai Zeng, Meng Jiang, Jane Cleland-Huang, Jinfeng Lin, and Wenhao Yu
- Subjects
Text corpus ,FOS: Computer and information sciences ,Computer Science - Computation and Language ,Computer science ,business.industry ,computer.software_genre ,Completeness (order theory) ,Taxonomy (general) ,Question answering ,Graph (abstract data type) ,Embedding ,Concept name ,Artificial intelligence ,business ,computer ,Computation and Language (cs.CL) ,Natural language processing ,Generator (mathematics) - Abstract
Automatic construction of a taxonomy supports many applications in e-commerce, web search, and question answering. Existing taxonomy expansion or completion methods assume that new concepts have been accurately extracted and their embedding vectors learned from the text corpus. However, one critical and fundamental challenge in fixing the incompleteness of taxonomies is the incompleteness of the extracted concepts, especially for those whose names have multiple words and consequently low frequency in the corpus. To resolve the limitations of extraction-based methods, we propose GenTaxo to enhance taxonomy completion by identifying positions in existing taxonomies that need new concepts and then generating appropriate concept names. Instead of relying on the corpus for concept embeddings, GenTaxo learns the contextual embeddings from their surrounding graph-based and language-based relational information, and leverages the corpus for pre-training a concept name generator. Experimental results demonstrate that GenTaxo improves the completeness of taxonomies over existing methods.
- Published
- 2021
- Full Text
- View/download PDF
25. Requirements-driven configuration of emergency response missions with small aerial vehicles
- Author
-
Eric Tsai, Nafee Al Islam, Michael Vierhauser, Jane Cleland-Huang, Maxime Van Speybroeck, and Ankit Agrawal
- Subjects
Focus (computing) ,Emergency response ,Process (engineering) ,Computer science ,Product line ,Systems engineering ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Use case ,Activity diagram ,Software product line - Abstract
Unmanned Aerial Vehicles (UAVs) are increasingly used by emergency responders to support search-and-rescue operations, medical supplies delivery, fire surveillance, and many other scenarios. At the same time, researchers are investigating usage scenarios in which UAVs are imbued with a greater level of autonomy to provide automated search, surveillance, and delivery capabilities that far exceed current adoption practices. To address this emergent opportunity, we are developing a configurable, multi-user, multi-UAV system for supporting the use of semi-autonomous UAVs in diverse emergency response missions. We present a requirements-driven approach for creating a software product line (SPL) of highly configurable scenarios based on different missions. We focus on the process for eliciting and modeling a family of related use cases, constructing individual feature models, and activity diagrams for each scenario, and then merging them into an SPL. We show how the SPL will be implemented through leveraging and augmenting existing features in our DroneResponse system. We further present a configuration tool, and demonstrate its ability to generate mission-specific configurations for 20 different use case scenarios.
- Published
- 2020
- Full Text
- View/download PDF
26. SENET: A Semantic Web for Supporting Automation of Software Engineering Tasks
- Author
-
Sugandha Lohar, Michael Vierhauser, Jin L.C. Guo, Yalin Liu, Jane Cleland-Huang, and Jinfeng Lin
- Subjects
Domain-specific language ,Vocabulary ,Glossary ,business.industry ,Computer science ,media_common.quotation_subject ,Ontology (information science) ,Semantic network ,Domain (software engineering) ,Software ,Software engineering ,business ,Semantic Web ,media_common - Abstract
The use of Natural Language (NL) interfaces to allow devices and applications to respond to verbal commands or free-form textual queries is becoming increasingly prevalent in our society. To a large extent, their success in interpreting and responding to a request is dependent upon rich underlying ontologies and conceptual models that understand the technical or domain specific vocabulary of diverse users. The effective use of NL interfaces in the Software Engineering (SE) domains requires its own ontology models focusing upon software related terms and concepts. While many SE glossaries exist, they are often incomplete and tend to define the vocabulary for specific sub-fields without capturing associations between terms and phrases. This limits their usefulness for supporting NL-related tasks. In this paper we propose an approach for constructing and evolving a semantic network of software engineering concepts and phrases. Our approach starts with a set of existing SE glossaries, uses the existing glossary terms and explicitly defined associations as a starting point, uses machine learning-based techniques to dynamically identify and document additional associations between terms, leverages the network to interpret NL queries in the SE domain, and finally augments the resulting semantic network with feedback provided by users. We evaluate the viability of our approach within the sub-domain of Agile Software Development, focusing on requirements related queries, and show that the semantic network enhances the ability of an NL interface to correctly interpret and execute user queries.
- Published
- 2020
- Full Text
- View/download PDF
27. Towards Semantically Guided Traceability
- Author
-
Qingkai Zeng, Jane Cleland-Huang, Jinfeng Lin, Meng Jiang, and Yalin Liu
- Subjects
Source code ,Traceability ,Computer science ,business.industry ,Semantics (computer science) ,media_common.quotation_subject ,020207 software engineering ,02 engineering and technology ,Tracing ,Domain (software engineering) ,Test case ,0202 electrical engineering, electronic engineering, information engineering ,Leverage (statistics) ,020201 artificial intelligence & image processing ,Software engineering ,business ,TRACE (psycholinguistics) ,media_common - Abstract
In many regulated domains, traceability is established across diverse artifacts such as requirements, design, code, test cases, and hazards – either manually or with the help of supporting tools, and the resulting trace links are used to support activities such as impact analysis, compliance verification, and safety inspections. Automated tracing techniques need to leverage the semantics of underlying artifacts in order to establish more accurate trace links and to provide explanations of links that have been created in either a manual or automated fashion. To support this, we propose an automated technique which leverages source code, project artifacts and an external domain corpus to generate a domain-specific concept model. We then use the generated concept model to improve traceability results and to provide explanations of the results. Our approach overcomes existing problems with deep-learning traceability algorithms, as it does not require a training set of existing trace links. Finally, as an initial proof-of-concept, we apply our semantically-guided approach to the Dronology project, and show that it improves over other tracing techniques that do not use a concept model.
- Published
- 2020
- Full Text
- View/download PDF
28. Supporting Program Comprehension through Fast Query response in Large-Scale Systems
- Author
-
Jane Cleland-Huang, Jinfeng Lin, and Yalin Liu
- Subjects
Graph database ,Traceability ,business.industry ,Computer science ,Relational database ,Program comprehension ,Big data ,020207 software engineering ,02 engineering and technology ,Tracing ,computer.software_genre ,020204 information systems ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,business ,Software engineering ,computer ,TRACE (psycholinguistics) - Abstract
Software traceability provides support for various engineering activities including Program Comprehension; however, it can be challenging and arduous to complete in large industrial projects. Researchers have proposed automated traceability techniques to create, maintain and leverage trace links. Computationally intensive techniques, such as repository mining and deep learning, have showed the capability to deliver accurate trace links. The objective of achieving trusted, automated tracing techniques at industrial scale has not yet been successfully accomplished due to practical performance challenges. This paper evaluates high-performance solutions for deploying effective, computationally expensive trace-ability algorithms in large scale industrial projects and leverages generated trace links to answer Program Comprehension Queries. We comparatively evaluate four different platforms for supporting industrial-scale tracing solutions, capable of tackling software projects with millions of artifacts. We demonstrate that tracing solutions built using big data frameworks scale well for large projects and that our Spark implementation outperforms relational database, graph database (GraphDB), and plain Java implementations. These findings contradict earlier results which suggested that GraphDB solutions should be adopted for large-scale tracing problems.
- Published
- 2020
- Full Text
- View/download PDF
29. Traceability Support for Multi-Lingual Software Projects
- Author
-
Jane Cleland-Huang, Jinfeng Lin, and Yalin Liu
- Subjects
FOS: Computer and information sciences ,Information retrieval ,Machine translation ,Traceability ,Generalized vector space model ,business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,Tracing ,computer.software_genre ,Latent Dirichlet allocation ,Software Engineering (cs.SE) ,Computer Science - Software Engineering ,symbols.namesake ,Software ,Test case ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Vector space model ,symbols ,business ,computer - Abstract
Software traceability establishes associations between diverse software artifacts such as requirements, design, code, and test cases. Due to the non-trivial costs of manually creating and maintaining links, many researchers have proposed automated approaches based on information retrieval techniques. However, many globally distributed software projects produce software artifacts written in two or more languages. The use of intermingled languages reduces the efficacy of automated tracing solutions. In this paper, we first analyze and discuss patterns of intermingled language use across multiple projects, and then evaluate several different tracing algorithms including the Vector Space Model (VSM), Latent Semantic Indexing (LSI), Latent Dirichlet Allocation (LDA), and various models that combine mono- and cross-lingual word embeddings with the Generative Vector Space Model (GVSM). Based on an analysis of 14 Chinese-English projects, our results show that best performance is achieved using mono-lingual word embeddings integrated into GVSM with machine translation as a preprocessing step.
- Published
- 2020
- Full Text
- View/download PDF
30. Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering
- Author
-
Jane Cleland-Huang and Darko Marinov
- Published
- 2020
- Full Text
- View/download PDF
31. Requirements Engineering (RE) for Social Good: RE Cares [Requirements]
- Author
-
Maleknaz Nayebi, Daniel Amyot, Matt C. Primrose, Walid Maalej, Alessio Ferrari, Alex Dekhtyar, Sarah Gregory, Jane Huffman Hayes, Meira Levy, Chuck Brophy, Paola Spoletini, Didar Zowghi, Jennifer Horkoff, Irit Hadar, Jane Cleland-Huang, Shell Clarke, Barbara Paech, Guenther Ruhe, Erin Combs, and Jared Payne
- Subjects
Nonprofit organization ,Requirements engineering ,business.industry ,Event (computing) ,Software Engineering ,Public relations ,Software ,Ask price ,Human multitasking ,0803 Computer Software, 0806 Information Systems, 0906 Electrical and Electronic Engineering ,Sociology ,Mutual aid ,Natural disaster ,business - Abstract
© 1984-2012 IEEE. As researchers and teachers and practitioners, we software types excel at multitasking. This, in part, led us to ask the question: Can one attend a software engineering conference and do something good for society? We found the answer to be a resounding yes. In this article, we present our first experience of running RE Cares, a conference collocated event. This event included a workshop, conference sessions, and a hackathon for developing an application to support emergency field activity for Mutual Aid Alberta, a nonprofit organization coordinating natural disaster responses in the Canadian province.
- Published
- 2019
- Full Text
- View/download PDF
32. The Risk of Overly Strict Requirements
- Author
-
Robyn R. Lutz and Jane Cleland-Huang
- Subjects
Requirements management ,Engineering ,Business requirements ,Requirement ,Requirements engineering ,business.industry ,Software requirements specification ,020207 software engineering ,02 engineering and technology ,Requirements elicitation ,Risk analysis (engineering) ,Requirement prioritization ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Software engineering ,Requirements analysis ,Software - Abstract
Overly strict requirements can lead to more work, more dependencies, and more code, all of which place extra pressure on software development project schedules and budgets. Identifying such requirements and considering viable alternatives can reduce needless design complexity and project risk. The Web Extra https://youtu.be/SMdU78gPP1Q is an audio podcast of the Requirements article "The Risk of Overly Strict Requirements."
- Published
- 2017
- Full Text
- View/download PDF
33. Enhancing Source Code Refactoring Detection with Explanations from Commit Messages
- Author
-
Jane Cleland-Huang and Rrezarta Krasniqi
- Subjects
Source code ,Software_GENERAL ,Programming language ,Computer science ,media_common.quotation_subject ,020207 software engineering ,02 engineering and technology ,Commit ,Software_PROGRAMMINGTECHNIQUES ,computer.software_genre ,Code refactoring ,Software_SOFTWAREENGINEERING ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Completeness (statistics) ,computer ,media_common - Abstract
We investigate the extent to which code commit summaries provide rationales and descriptions of code refactorings. We present a refactoring description detection tool CMMiner that detects code commit messages containing refactoring information and differentiates between twelve different refactoring types. We further explore whether refactoring information mined from commit messages using CMMiner, can be combined with refactoring descriptions mined from source code using the well-known RMiner tool. For six refactoring types covered by both CMMiner and RMiner, we observed 21.96% to 38.59% overlap in refactorings detected across four diverse open-source systems. RMiner identified approximately 49.13% to 60.29% of refactorings missed by CMMiner, primarily because developers often failed to describe code refactorings that occurred alongside other code changes. However, CMMiner identified 10.30% to 19.51% of refactorings missed by RMiner, primarily when refactorings occurred across multiple commits. Our results suggest that integrating both approaches can enhance the completeness of refactoring detection and provide refactoring rationales.
- Published
- 2020
- Full Text
- View/download PDF
34. The Next Generation of Human-Drone Partnerships: Co-Designing an Emergency Response System
- Author
-
John M. Hoeksema, Ryan Bauer, Steve Cox, Walter J. Scheirer, Michael Vierhauser, Sophia Abraham, Luke Fraser, Ankit Agrawal, Elizabeth Travnik, Benjamin Burger, Sarah Hwang, Chichi Christine, Jane Cleland-Huang, and Shreya Kumar
- Subjects
FOS: Computer and information sciences ,Process management ,Situation awareness ,Computer science ,Process (engineering) ,media_common.quotation_subject ,05 social sciences ,Computer Science - Human-Computer Interaction ,020207 software engineering ,02 engineering and technology ,Drone ,Human-Computer Interaction (cs.HC) ,Domain (software engineering) ,Software Engineering (cs.SE) ,H.5.2 ,Computer Science - Software Engineering ,Participatory design ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,Engineering design process ,050107 human factors ,Autonomy ,Search and rescue ,media_common - Abstract
The use of semi-autonomous Unmanned Aerial Vehicles (UAV) to support emergency response scenarios, such as fire surveillance and search and rescue, offers the potential for huge societal benefits. However, designing an effective solution in this complex domain represents a "wicked design" problem, requiring a careful balance between trade-offs associated with drone autonomy versus human control, mission functionality versus safety, and the diverse needs of different stakeholders. This paper focuses on designing for situational awareness (SA) using a scenario-driven, participatory design process. We developed SA cards describing six common design-problems, known as SA demons, and three new demons of importance to our domain. We then used these SA cards to equip domain experts with SA knowledge so that they could more fully engage in the design process. We designed a potentially reusable solution for achieving SA in multi-stakeholder, multi-UAV, emergency response applications., 10 Pages, 5 Figures, 2 Tables. This article is publishing in CHI2020
- Published
- 2020
35. Model-Driven Requirements for Humans-on-the-Loop Multi-UAV Missions
- Author
-
Jane Cleland-Huang, Jan-Philipp Steghöfer, and Ankit Agrawal
- Subjects
FOS: Computer and information sciences ,Human intelligence ,Computer science ,Process (engineering) ,Autonomous agent ,Computer Science - Human-Computer Interaction ,Swarm behaviour ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Requirements elicitation ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Drone ,Human-Computer Interaction (cs.HC) ,Software Engineering (cs.SE) ,Subject-matter expert ,Computer Science - Software Engineering ,Emergency response ,Systems engineering - Abstract
The use of semi-autonomous Unmanned Aerial Vehicles (UAVs or drones) to support emergency response scenarios, such as fire surveillance and search-and-rescue, has the potential for huge societal benefits. Onboard sensors and artificial intelligence (AI) allow these UAVs to operate autonomously in the environment. However, human intelligence and domain expertise are crucial in planning and guiding UAVs to accomplish the mission. Therefore, humans and multiple UAVs need to collaborate as a team to conduct a time-critical mission successfully. We propose a meta-model to describe interactions among the human operators and the autonomous swarm of UAVs. The meta-model also provides a language to describe the roles of UAVs and humans and the autonomous decisions. We complement the meta-model with a template of requirements elicitation questions to derive models for specific missions. We also identify common scenarios where humans should collaborate with UAVs to augment the autonomy of the UAVs. We introduce the meta-model and the requirements elicitation process with examples drawn from a search-and-rescue mission in which multiple UAVs collaborate with humans to respond to the emergency. We then apply it to a second scenario in which UAVs support first responders in fighting a structural fire. Our results show that the meta-model and the template of questions support the modeling of the human-on-the-loop human interactions for these complex missions, suggesting that it is a useful tool for modeling the human-on-the-loop interactions for multi-UAVs missions., Comment: 10 pages
- Published
- 2020
- Full Text
- View/download PDF
36. Evolving Software Trace Links between Requirements and Source Code
- Author
-
Mona Rahimi and Jane Cleland-Huang
- Subjects
Evolver ,Source code ,Traceability ,Imagix 4D ,Computer science ,business.industry ,media_common.quotation_subject ,Distributed computing ,020207 software engineering ,02 engineering and technology ,Software maintenance ,computer.software_genre ,Software ,Code refactoring ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,KPI-driven code analysis ,Software system ,business ,computer ,media_common ,TRACE (psycholinguistics) - Abstract
Traceability provides support for diverse software engineering activities including safety analysis, compliance verification, test-case selection, and impact prediction. However, in practice, there is a tendency for trace links to degrade over time as the system continually evolves. This is especially true for links between source-code and upstream artifacts such as requirements --- because developers frequently refactor and change code without updating the links. In this paper we present TLE (Trace Link Evolver), a solution for automating the evolution of bidirectional trace links between source code classes or methods and requirements. TLE depends on a set of heuristics coupled with refactoring detection tools and informational retrieval algorithms to detect predefined change scenarios that occur across contiguous versions of a software system. We first evaluate TLE at the class level in a controlled experiment to evolve trace links for revisions of two Java applications. Second, we comparatively evaluate several variants of TLE across six releases of our in-house Dronology project. We study the results of integrating human analyst feed back in the evolution cycle of this emerging project. Additionally, in this system, we compare the efficacy of class-level versus method-level evolution of trace links. Finally, we evaluate TLE in a larger scale across 27 releases of the Cassandra Database System and show that the evolved trace links are significantly more accurate than those generated using only information retrieval techniques.
- Published
- 2019
- Full Text
- View/download PDF
37. The Interplay of Design and Runtime Traceability for Non-Functional Requirements
- Author
-
Jane Cleland-Huang, Michael Vierhauser, Janet E. Burge, and Paul Grünbacher
- Subjects
Non-functional requirement ,Traceability ,business.industry ,Computer science ,Process (engineering) ,Cyber-physical system ,Usability ,Fault tolerance ,computer.software_genre ,Risk analysis (engineering) ,Code refactoring ,business ,computer ,TRACE (psycholinguistics) - Abstract
Non-functional Requirements (NFRs) play a unique role in the development of any software-intensive system. They often have a significant impact upon the architectural design and drive critical trade-offs. However, such trade-off decisions are often based on assumptions about future workloads, environmental factors, and anticipated system behavior. From a traceability perspective, it is thus necessary to trace individual NFRs into the design and their associated design rationales, and further forward into the running system in order to monitor and assess the design-time assumptions at runtime. When runtime data indicates that a mismatch has occurred that adversely impacts system performance and/or behavior, measures need to be taken, such as applying critical bug fixes, or refactoring performance bottlenecks. In this paper, we explore five different types of NFRs across the design and runtime phases of the development process. Our approach is illustrated by examples from the Dronology System for Fault Tolerance, Security, Usability, Performance, and other critical qualities.
- Published
- 2019
- Full Text
- View/download PDF
38. Leveraging Artifact Trees to Evolve and Reuse Safety Cases
- Author
-
Mona Rahimi, Robyn R. Lutz, Ankit Agrawal, Michael Vierhauser, Seyedehzahra Khoshmanesh, and Jane Cleland-Huang
- Subjects
Traceability ,Computer science ,business.industry ,020207 software engineering ,System safety ,02 engineering and technology ,Certification ,Artifact (software development) ,Reuse ,Tree (data structure) ,020204 information systems ,Safety assurance ,0202 electrical engineering, electronic engineering, information engineering ,Safety case ,Software engineering ,business ,TRACE (psycholinguistics) - Abstract
Safety Assurance Cases (SACs) are increasingly used to guide and evaluate the safety of software-intensive systems. They are used to construct a hierarchically organized set of claims, arguments, and evidence in order to provide a structured argument that a system is safe for use. However, as the system evolves and grows in size, a SAC can be difficult to maintain. In this paper we utilize design science to develop a novel solution for identifying areas of a SAC that are affected by changes to the system. Moreover, we generate actionable recommendations for updating the SAC, including its underlying artifacts and trace links, in order to evolve an existing safety case for use in a new version of the system. Our approach, Safety Artifact Forest Analysis (SAFA), leverages traceability to automatically compare software artifacts from a previously approved or certified version with a new version of the system. We identify, visualize, and explain changes in a Delta Tree. We evaluate our approach using the Dronology system for monitoring and coordinating the actions of cooperating, small Unmanned Aerial Vehicles. Results from a user study show that SAFA helped users to identify changes that potentially impacted system safety and provided information that could be used to help maintain and evolve a SAC1.
- Published
- 2019
- Full Text
- View/download PDF
39. Safety Stories in Agile Development
- Author
-
Jane Cleland-Huang
- Subjects
Engineering ,Software documentation ,Requirement ,business.industry ,Empirical process (process control model) ,Software requirements specification ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020207 software engineering ,02 engineering and technology ,Engineering management ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Avionics software ,Lean software development ,business ,Software engineering ,Requirements analysis ,Software ,Agile software development - Abstract
Safety stories specify safety requirements, using the EARS (Easy Requirements Specification) format. Software practitioners can use them in agile projects at lower levels of safety criticality to deal effectively with safety concerns.
- Published
- 2017
- Full Text
- View/download PDF
40. Tackling the term-mismatch problem in automated trace retrieval
- Author
-
Jane Cleland-Huang, Marek Gibiec, and Jin L.C. Guo
- Subjects
Information retrieval ,Requirements traceability ,Database ,Requirements engineering ,Traceability ,Computer science ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Term (time) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,computer ,Software ,Reverse semantic traceability ,TRACE (psycholinguistics) - Published
- 2016
- Full Text
- View/download PDF
41. Keeping Ahead of Our Adversaries
- Author
-
Samuel Weber, Forrest Shull, Tadayoshi Kohno, Jane Cleland-Huang, and Tamara Denning
- Subjects
Engineering ,Security bug ,business.industry ,media_common.quotation_subject ,Software development ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Column (database) ,Software development process ,Software deployment ,Software security assurance ,Reading (process) ,0202 electrical engineering, electronic engineering, information engineering ,Software requirements ,business ,computer ,Software ,media_common - Abstract
Building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. The Web extra at https://youtu.be/77FTWWj1clk is an audio podcast of author Jane Cleland-Huang reading her column.
- Published
- 2016
- Full Text
- View/download PDF
42. Detecting, Tracing, and Monitoring Architectural Tactics in Code
- Author
-
Jane Cleland-Huang and Mehdi Mirakhorli
- Subjects
Traceability ,business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,Tracing ,Change management (ITSM) ,Software ,Architectural pattern ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Architecture ,Software engineering ,business ,Classifier (UML) - Abstract
Software architectures are often constructed through a series of design decisions. In particular, architectural tactics are selected to satisfy specific quality concerns such as reliability, performance, and security. However, the knowledge of these tactical decisions is often lost, resulting in a gradual degradation of architectural quality as developers modify the code without fully understanding the underlying architectural decisions. In this paper we present a machine learning approach for discovering and visualizing architectural tactics in code, mapping these code segments to tactic traceability patterns, and monitoring sensitive areas of the code for modification events in order to provide users with up-to-date information about underlying architectural concerns. Our approach utilizes a customized classifier which is trained using code extracted from fifty performance-centric and safety-critical open source software systems. Its performance is compared against seven off-the-shelf classifiers. In a controlled experiment all classifiers performed well; however our tactic detector outperformed the other classifiers when used within the larger context of the Hadoop Distributed File System. We further demonstrate the viability of our approach for using the automatically detected tactics to generate viable and informative messages in a simulation of maintenance events mined from Hadoop's change management system.
- Published
- 2016
- Full Text
- View/download PDF
43. Towards the Next Generation of Scenario Walkthrough Tools – A Research Preview
- Author
-
Michael Vierhauser, Michael Schneider, Jane Cleland-Huang, Norbert Seyff, University of Zurich, Knauss, Eric, Goedicke, Michael, and Seyff, Norbert
- Subjects
050101 languages & linguistics ,10009 Department of Informatics ,Computer science ,05 social sciences ,Principal (computer security) ,Stakeholder ,Context (language use) ,02 engineering and technology ,Requirements elicitation ,000 Computer science, knowledge & systems ,Software walkthrough ,Data science ,Context analysis ,Contextual design ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,1700 General Computer Science ,Software system ,2614 Theoretical Computer Science - Abstract
[Context and motivation] With the rise of cyber-physical systems (CPS), smart ecosystems, and the Internet of Things (IoT), software-intensive systems have become pervasive in everyone’s daily life. The shift from software systems to ubiquitous adaptive software-intensive systems not only affects the way we use software but further has an impact on the way these systems are designed and developed. Gathering requirements for such systems can benefit from elicitation processes that are conducted in the field with domain experts. [Question/problem] More traditional elicitation approaches such as interviews or workshops exhibit limitations when it comes to gathering requirements for systems of this nature – often lacking an in-depth context analysis and understanding of contextual constraints which are easily missed in a formal elicitation setting. Furthermore, dedicated methods which focus on understanding the system context such as contextual design are not widely adopted by the industry as they are perceived to be time-consuming and cumbersome to apply. [Principal ideas/results]. In this research preview paper we argue that scenario-based RE, scenario walkthrough approaches in particular, have the potential to support requirements elicitation for ubiquitous adaptive software-intensive systems through facilitating broader stakeholder involvement and enabling contextual requirements elicitation within the workplace of future system end-users. The envisioned on-site scenario walkthroughs can either be conducted by an analyst or by future end-users of the system themselves. [Contribution] We describe a research agenda including our ongoing research and our efforts to develop a novel framework and tool support for scenario-based RE.
- Published
- 2019
- Full Text
- View/download PDF
44. Automated requirements engineering challenges with examples from small unmanned aerial systems (keynote)
- Author
-
Jane Cleland-Huang
- Subjects
Software analytics ,Software ,Requirements engineering ,business.industry ,Computer science ,Process (engineering) ,Analytics ,business ,Automation ,Data science ,Agile software development ,Domain (software engineering) - Abstract
Requirements Engineering includes various activities aimed at discovering, analyzing, validating, evolving, and managing software and systems requirements. Many of these activities are human facing, effort intensive, and sometimes error prone. They could benefit greatly from cutting edge advances in automation. However, the software engineering community has primarily focused on automating other aspects of the development process such as testing, code analytics, and mining software respositories. As a result, advances in software analytics have had superficial impact upon advancing the state of art and practice in the field of requirements engineering. Two primary inhibitors are the lack of publicly available datasets and poorly publicized industry-relevant open requirements analytic challenges. To empower the Automated Software Engineering community to tackle open Requirements Engineering challenges, the talk will describe the rapidly evolving landscape of requirements engineering, clearly articulate open challenges, draw upon examples from an ongoing, agile, safety-critical project in the domain of Unmanned Aerial Vehicles, and introduce Dronology as a new community dataset.
- Published
- 2018
- Full Text
- View/download PDF
45. Discovering, Analyzing, and Managing Safety Stories in Agile Projects
- Author
-
Jane Cleland-Huang and Michael Vierhauser
- Subjects
business.industry ,Computer science ,Process (engineering) ,020207 software engineering ,02 engineering and technology ,Domain (software engineering) ,Scrum ,Software ,020204 information systems ,Waterfall model ,0202 electrical engineering, electronic engineering, information engineering ,Task analysis ,Product (category theory) ,business ,Software engineering ,Agile software development - Abstract
Traditionally, safety-critical projects have been developed using the waterfall process. However, this makes it costly and challenging to incrementally introduce new features and to certify the modified product for use. As a result, there has been increasing interest in adopting agile development paradigms within the safety-critical domain. This in turn introduces numerous challenges. In this paper we address the specific problems of discovering, analyzing, specifying, and managing safety requirements within the agile Scrum process. We propose SafetyScrum, a methodology that augments the Scrum lifecycle with incrementally applied safety-related activities and introduces the notion of "safety debt" for incrementally tracking the current safety status of a project. We demonstrate the viability of SafetyScrum for managing safety stories in an agile development environment by applying it to a project in which our existing Unmanned Aerial Vehicle system is enhanced to support a River-Rescue scenario.
- Published
- 2018
- Full Text
- View/download PDF
46. Monitoring CPS at Runtime - A Case Study in the UAV Domain
- Author
-
Thomas Krismayer, Jane Cleland-Huang, Rick Rabiser, Pau Grunbacher, Sean Bayley, and Michael Vierhauser
- Subjects
Computer science ,business.industry ,Distributed computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020207 software engineering ,02 engineering and technology ,Drone ,Domain (software engineering) ,Software ,Embedded software ,020204 information systems ,Control system ,Management system ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Use case ,business - Abstract
Unmanned aerial vehicles (UAVs) are becoming increasingly pervasive in everyday life, supporting diverse use cases such as aerial photography, delivery of goods, or disaster reconnaissance and management. UAVs are cyber-physical systems (CPS): they integrate computation (embedded software and control systems) with physical components (the UAVs flying in the physical world). UAVs in particular and CPS in general require monitoring capabilities to detect and possibly mitigate erroneous and safety-critical behavior at runtime. Existing monitoring approaches mostly do not adequately address UAV CPS characteristics such as the high number of dynamically instantiated components, the tight int elements, and the massive amounts of data that need to be processed. In this paper we report results of a case study on monitoring in UAVs. We discuss CPS-specific monitoring challenges and present a prototype we implemented by extending \reminds, a framework for software monitoring so far mainly used in the domain of metallurgical plants. Additionally, we demonstrate the applicability and scalability of our approach by monitoring a real control and management system for UAVs in simulations with up to 30 drones flying in an urban area.
- Published
- 2018
- Full Text
- View/download PDF
47. Supporting Diagnosis of Requirements Violations in Systems of Systems
- Author
-
Rick Rabiser, Jane Cleland-Huang, Michael Vierhauser, Paul Grünbacher, and Thomas Krismayer
- Subjects
System of systems ,Computer science ,business.industry ,020207 software engineering ,02 engineering and technology ,Artifact (software development) ,Root cause ,Software walkthrough ,Automation ,Risk analysis (engineering) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Domain knowledge ,Software system ,business ,TRACE (psycholinguistics) - Abstract
Industrial software systems are often systems of systems (SoS) whose full behavior only emerges during operation. They therefore require monitoring techniques to observe systems and detect deviations from their requirements. The focus of existing monitoring approaches, however, is mainly on detecting violations of expected behavior, while support for diagnosing violations is typically limited or even neglected. Diagnosis is particularly challenging in SoS due to their technological heterogeneity and the diversity of development tools in use. Uncovering the root cause of a violation typically requires developers to trace violations to artifacts such as source code or requirements documents, which is difficult without detailed domain knowledge. In this paper we describe our experiences of developing a tool-supported approach facilitating the diagnosis of requirements violations in SoS. We describe how we complemented a requirements monitoring model with a system artifact model relating SoS artifacts needed for diagnosis with monitored events. We customized our approach to an industrial SoS and conducted a scenario-based walkthrough with engineers developing the SoS and engineers and researchers unfamiliar with it. The results of our evaluation have shown that our approach can significantly ease diagnosing violations in a real-world SoS.
- Published
- 2018
- Full Text
- View/download PDF
48. Vetting Automatically Generated Trace Links: What Information is Useful to Human Analysts?
- Author
-
Jane Cleland-Huang, Miroslaw Staron, Jan-Philipp Steghöfer, Jane Huffman Hayes, and Salome Maro
- Subjects
Requirements traceability ,Traceability ,Computer science ,020207 software engineering ,Information needs ,Context (language use) ,02 engineering and technology ,Tracing ,Data science ,Information model ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Design science research ,TRACE (psycholinguistics) - Abstract
Automated traceability has been investigated for over a decade with promising results. However, a human analyst is needed to vet the generated trace links to ensure their quality. The process of vetting trace links is not trivial and while previous studies have analyzed the performance of the human analyst, they have not focused on the analyst's information needs. The aim of this study is to investigate what context information the human analyst needs. We used design science research, in which we conducted interviews with ten practitioners in the traceability area to understand the information needed by human analysts. We then compared the information collected from the interviews with existing literature. We created a prototype tool that presents this information to the human analyst. To further understand the role of context information, we conducted a controlled experiment with 33 participants. Our interviews reveal that human analysts need information from three different sources: 1) from the artifacts connected by the link, 2) from the traceability information model, and 3) from the tracing algorithm. The experiment results show that the content of the connected artifacts is more useful to the analyst than the contextual information of the artifacts.
- Published
- 2018
- Full Text
- View/download PDF
49. Disruptive Change in Requirements Engineering Research
- Author
-
Jane Cleland-Huang
- Subjects
Engineering ,Requirements engineering ,business.industry ,media_common.quotation_subject ,020207 software engineering ,02 engineering and technology ,Creativity ,01 natural sciences ,010305 fluids & plasmas ,Engineering management ,Software ,0103 physical sciences ,Goldilocks principle ,0202 electrical engineering, electronic engineering, information engineering ,Social media ,business ,media_common - Abstract
This keynote addresses the challenges and opportunities introduced by disruptive change in the current requirements engineering landscape. Sea changes in the way practitioners develop software, along with advances in artificial intelligence algorithms and the ubiquity of social media environments have created a goldilocks opportunity for innovative creativity that potentially touches every aspect of requirements engineering research. Coupled with passion and vision, these advances revitalize our ability to address open requirements challenges in new and meaningful ways.
- Published
- 2018
- Full Text
- View/download PDF
50. Welcome from the Organizers
- Author
-
Jane Cleland-Huang and Alistair Mavin
- Subjects
Software ,Syntax (programming languages) ,Requirements engineering ,Computer science ,business.industry ,Software requirements specification ,Software engineering ,business - Abstract
The 1st International Workshop on Easy Approach to Requirements Syntax (EARS) is hosted in August 2018 at the International Requirements Engineering Conference in Banff, Canada. The workshop provides an opportunity for exchanging ideas and discussing the application and challenges of using EARS across diverse software and systems engineering domains. In addition to presentations and discussions, participants will engage in hands-on challenges.
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.