10,747 Hits in 8.2 sec

Decision making and visualizations based on test results

Per Erik Strandberg, Wasif Afzal, Daniel Sundmark
2018 Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '18  
Testing is one of the main methods for quality assurance in the development of embedded software, as well as in software engineering in general.  ...  Method: We conducted an embedded case study with multiple units of analysis by conducting interviews, questionnaires, using archival data and participant observations.  ...  In particular we would like to thank interviewees and visualization co-developers at Westermo.  ... 
doi:10.1145/3239235.3268921 dblp:conf/esem/StrandbergAS18 fatcat:5lcpw4iggfatddu6hjelcqzgfy

Information Flow in Software Testing – An Interview Study with Embedded Software Engineering Practitioners

Per Erik Strandberg, Eduard Paul Enoiu, Wasif Afzal, Daniel Sundmark, Robert Feldt.
2019 IEEE Access  
INDEX TERMS Embedded software development, information flow, interview study, software testing.  ...  Method: Data was collected through semi-structured interviews of twelve experienced practitioners with an average work experience of more than fourteen years working at five organizations in the embedded  ...  CONCLUSION We have conducted an interview study of information flow in software testing of embedded systems in five organizations in Sweden.  ... 
doi:10.1109/access.2019.2909093 fatcat:ltbmj2qqrfbrbgwylak6z7uwua

Present and future requirements in developing industrial embedded real-time systems - interviews with designers in the vehicle domain

K. Hanninen, J. Maki-Turja, M. Nolin
2006 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)  
In this paper, we aim at capturing the industrial viewpoint of todays and future requirements in development of embedded real-time systems.  ...  We do this by interviewing ten senior designers at four Swedish companies, developing embedded applications in the vehicle domain.  ...  Introduction There is an increasing trend towards software solutions in embedded systems.  ... 
doi:10.1109/ecbs.2006.56 dblp:conf/ecbs/HanninenMN06 fatcat:eesa6v3sm5br7op4fma2ipier4

Quality attribute trade-offs in the embedded systems industry: an exploratory case study

Darius Sas, Paris Avgeriou
2019 Software quality journal  
We would also like to thank all the companies that took part in this study and provided us with valuable information. Funding information  ...  Acknowledgements Special thanks to Apostolos Ampatzoglou for providing suggestions and comments on the design of this study.  ...  software engineers in the context of industrial embedded system projects.  ... 
doi:10.1007/s11219-019-09478-x fatcat:l6fqcpzi6jcnppkaafa7nfmfna

Challenges and Strategies for Undertaking Continuous Experimentation to Embedded Systems: Industry and Research Perspectives [chapter]

David Issa Mattos, Jan Bosch, Helena Holmström Olsson
2018 Lecture Notes in Business Information Processing  
Context: Continuous experimentation is frequently used in web-facing companies and it is starting to gain the attention of embedded systems companies.  ...  To the knowledge of the authors, this paper is the first to provide an extensive list of challenges and strategies for continuous experimentation in embedded systems.  ...  This work was partially supported by the Wallenberg Autonomous Systems and Software Program (WASP) and the Software Center.  ... 
doi:10.1007/978-3-319-91602-6_20 fatcat:4tngd65xkzcf5pq25ec45fjmxq

A Perception of the Practice of Software Security and Performance Verification

Victor Vidigal Ribeiro, Daniela Soares Cruzes, Guilherme Horta Travassos
2018 2018 25th Australasian Software Engineering Conference (ASWEC)  
Few empirical studies have been focused on how is the state of the practice in security and performance verification.  ...  This paper presents the results of a case study performed in the context of Brazilian organizations aiming to characterize security and performance verification practices.  ...  This work was partially supported by the SoS-Agile project: Science of Security in Agile Software Development, funded by the Research Council of Norway (grant number 247678).  ... 
doi:10.1109/aswec.2018.00018 dblp:conf/aswec/RibeiroCT18 fatcat:rc2ouxjlevc47lr5bkdi5hszvi

The Evolution of Continuous Experimentation in Software Product Development: From Data to a Data-Driven Organization at Scale

Aleksander Fabijan, Pavel Dmitriev, Helena Holmstrom Olsson, Jan Bosch
2017 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)  
In this paper, and based on an exhaustive and collaborative case study research in a large software-intense company with highly developed experimentation culture, we present the evolution process of moving  ...  With our contribution, we aim to provide guidance to practitioners on how to develop and scale continuous experimentation in software organizations with the purpose of becoming data-driven at scale.  ...  Ronny Kohavi was the creator of a similar model used internally in A&E that was used as inspiration for this work.  ... 
doi:10.1109/icse.2017.76 dblp:conf/icse/FabijanDOB17 fatcat:wzitigxflvhrlefwt63ispla3u

Automated System-Level Software Testing of Industrial Networked Embedded Systems [article]

Per Erik Strandberg
2021 arXiv   pre-print
Software testing is a standard approach for quality assurance of embedded software, and many software development processes strive for test automation.  ...  , and how test results reach the developers that updated the software in the first place; (ii) selecting which test cases to execute in a test suite given constraints on available time and test systems  ...  [17] made studies in 2015 and 2016 on how practitioners perceived relevance of research in software engineering.  ... 
arXiv:2111.08312v1 fatcat:34er6l6de5dinpiwymy7sisgci

Interactive Semi-automated Specification Mining for Debugging: An Experience Report

Mohammad Jafar Mashhadi, Taha R. Siddiqui, Hadi Hemmati, Howard Loewen
2019 Information and Software Technology  
Results: We qualitatively evaluate the approach by a set of interviews (including observational studies) with the company's developers on their real-world reported bugs.  ...  Context: Specification mining techniques are typically used to extract the specification of a software in the absence of (up-to-date) specification documents.  ...  Acknowledgements This work is partially supported by the Natural Sciences and Engineering Research Council of Canada [CRDPJ/515254-2017].  ... 
doi:10.1016/j.infsof.2019.05.002 fatcat:x6qoh5l5c5hxbfegzubxgrcrlm

Supporting Software Decision Meetings: Heatmaps for Visualising Test and Code Measurements

Robert Feldt, Miroslaw Staron, Erika Hult, Thomas Liljegren
2013 2013 39th Euromicro Conference on Software Engineering and Advanced Applications  
However, even if this information is available in test logs and code repositories it is seldomly put to good use in supporting decision processes in software development.  ...  This case study shows how visualisation and correlation between software measurements can support improvement discussions.  ...  We also acknowledge the thesis work of Tobias Alette and Viktor Fritzon [19] which affected the present study.  ... 
doi:10.1109/seaa.2013.61 dblp:conf/euromicro/FeldtSHL13 fatcat:w6plj7yldzdq7pgxgicxtb2jtm

Capturing Software Security Practices using CBR: Three Case Studies

Ikram Elrhaffari, Ounsa Roudies
2019 International Journal of Advanced Computer Science and Applications  
This paper focuses on embedding security concerns in the software development lifecycle (SDLC) using a bottom-up approach that is based on case based reasoning (CBR) paradigm.  ...  Generally, software security can be regarded as one of the most important issues in software engineering field since it may affect the software product effectiveness due to the various technological vulnerabilities  ...  There are several works about embedding security in software development lifecycle, but they often propose an ordered series of security activities that start from the SDLC input and are closely linked  ... 
doi:10.14569/ijacsa.2019.0101159 fatcat:pg5t55fq25eipezvxd354bjeje

The emerging role of data scientists on software development teams

Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel
2016 Proceedings of the 38th International Conference on Software Engineering - ICSE '16  
In this paper, we describe their education and training background, their missions in software engineering contexts, and the type of problems on which they work.  ...  in software-oriented data analytics.  ...  Some of the team structures that we observed in the interviews were similar to an Experience Factory in spirit; however, many data scientists were also directly embedded in the development organizations  ... 
doi:10.1145/2884781.2884783 dblp:conf/icse/Kim0DB16 fatcat:o256h4jdr5dkdkvtg6phhvrz2i

Smart Home Strategies for User-Centered Functional Assessment of Older Adults

Burleson Winslow
2015 International Journal of Automation and Smart Technology  
Advances in Smart Home technologies are increasingly able to provide embedded assessments of an individual's functional ability in his/her home on a momentto-moment, daily, and longitudinal basis.  ...  This paper presents strategies for user-centric approaches to identify the technical and design challenges of developing, deploying, and using functional assessment systems in homes occupied by senior  ...  The third phase included use of the embedded functional assessment technologies in the participant's home and concluded with an audio-recorded post-study interview.  ... 
doi:10.5875/ausmt.v5i4.952 fatcat:ffp4vcvod5c2fomy52j7bxvjfy

The bones of the system

Titus Barik, Robert DeLine, Steven Drucker, Danyel Fisher
2016 Proceedings of the 38th International Conference on Software Engineering Companion - ICSE '16  
We find that the use of event data span every job role in our interviews and survey, that different perspectives on event data create tensions between roles or teams, and that professionals report social  ...  Through qualitative interviews of 28 participants, and a quantitative survey of 1,823 respondents, we catalog a diverse set of activities that leverage event data sources, identify challenges in conducting  ...  BACKGROUND Previous research on logging has focused on its use by developers for troubleshooting. Two previous empirical studies document logging in practice.  ... 
doi:10.1145/2889160.2889231 dblp:conf/icse/BarikDDF16 fatcat:nitj2kzpwfgcxoavo7z7f3sjsy

Practices and Infrastructures for Machine Learning Systems: An Interview Study in Finnish Organizations

Dennis Muiruri, Lucy Ellen Lwakatare, Jukka K. Nurminen, Tommi Mikkonen
2022 Computer  
In this study, a case (Table 1 ) is an organization in Finland with experience in developing, deploying, and maintaining ML-enabled software systems.  ...  BACKGROUND AND RELATED WORK Software engineering for ML The adaptation and incorporation of well-established software engineering (SE) methods in the development of ML systems are crucial 7 because  ...  Over the Rainbow: 21st Century Security & Privacy Podcast Tune in with security leaders of academia, industry, and government. Subscribe Today Bob Blakley Bob  ... 
doi:10.1109/mc.2022.3161161 fatcat:ib4xtmw3njb4lmvktihfylzbn4
« Previous Showing results 1 — 15 out of 10,747 results