Days: Wednesday, August 31st Thursday, September 1st Friday, September 2nd
View this program: with abstractssession overviewtalk overview
Title: Designing Reliable Distributed Systems
Abstract: Software is disrupting one industry after another. Currently, the automotive industry is under pressure to innovate in the area of software. New, innovative approaches to vehicles and their HW/SW architectures are required and are currently subsumed under the term “SW-defined vehicle”. However, this trend does not stop at the vehicle boundaries, but also includes communication with off-board edge and cloud services. Thinking it through further, this leads to a breakthrough technology we call “Reliable Distributed Systems”, which enables the operation of vehicles where time and safety-critical sensing and computing tasks are no longer tied to the vehicle, but can be shifted into an edge-cloud continuum. This allows a variety of novel applications and functional improvements but also has a tremendous impact on automotive HW/SW architectures and the value chain. Reliable distributed systems are not limited to automotive use cases. The ubiquitous and reliable availability of distributed computing and sensing in real-time enable novel applications and system architectures in a variety of domains: from industrial automation over building automation to consumer robotics. However, designing reliable distributed systems raises several issues and poses new challenges for edge and cloud computing stacks as well as electronic design automation.
Expomeloneras's Hall
10:30 | Negative Transfer in Cross Project Defect Prediction: Effect of Domain Divergence (abstract) |
10:45 | Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning in Scientific Applications (abstract) |
11:10 | Parallel Instance Filtering for Malware Detection (abstract) |
11:35 | WALTS: Walmart AutoML Libraries, Tools and Services (abstract) |
10:30 | "There and Back Again?" On the Influence of Software Community Dispersion Over Productivity (abstract) |
10:55 | STORM: A Model for Sustainably Onboarding Software Testers (abstract) |
11:10 | On the Role of Personality Traits in Implementation Tasks: A Preliminary Investigation with Students (abstract) |
11:35 | An 80-20 Analysis of Buggy and Non-buggy Refactorings in Open-Source Commits (abstract) |
10:30 | Quantifying TD Interest: Are we Getting Closer, or Not Even That? (abstract) |
10:55 | Exploiting dynamic analysis for architectural smell detection: a preliminary study (abstract) |
11:20 | Microservices smell detection through dynamic analysis (abstract) |
11:35 | ScrumBut as an Indicator of Process Debt (abstract) |
Title: Software Architecture Challenges in Industrial Process Automation: from Code Generation to Cloud-native Service Orchestration
Abstract: Large, distributed software systems with integrated embedded systems support production plant operators in controlling and supervising complex industrial processes, such as power generation, chemical refinement, or paper production. With several million lines of code these Operational Technology (OT) systems grow continuously more complex, while customers increasingly expect a higher degree of automation, easier customization, and faster time-to-market for new features. This has led to an ongoing adoption of modern Information Technology (IT) reference software architectures and approaches, e.g., middlewares, model-based development, and microservices. This talk presents illustrative examples of this trend from technology transfer projects at ABB Research, highlighting open issues and research challenges. These include information modeling in M2M middlewares for plug-and-play functionality, code generation from engineering requirements to speed up customization, as well as online updates of containerized control software on virtualized infrastructures.
Buffet lunch at Lopesan Baobab Resort.
14:30 | Evaluating Simple and Complex Models’ Performance When Predicting Accepted Answers on Stack Overflow (abstract) |
14:55 | STUN: an Embedding-Based Corpus Comparison Technique for Qualitative User Feedback in A/B Tests (abstract) |
15:20 | EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments (abstract) |
15:45 | Reducing Experiment Costs in Automated Software Performance Regression Detection (abstract) |
14:30 | A Preliminary Conceptualization and Analysis on Automated Static Analysis Tools for Vulnerability Detection in Android Apps (abstract) |
14:55 | An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Methods (abstract) |
15:20 | The Impact of Parameters Optimization in Software Prediction Models (abstract) |
15:45 | Using COSMIC to measure functional size of software: a Systematic Literature Review (abstract) |
14:30 | The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial Case Study (abstract) |
14:55 | Adopting DevOps Paradigm in Technical Debt Prioritization and Mitigation (abstract) |
15:20 | Timing is Everything! A Test and Production Class View of Self-Admitted Technical Debt (abstract) |
15:35 | Technical Debt Management in Automotive Software Industry (abstract) |
Expomeloneras's Hall
Welcome reception Cocktail at the Lopesan Baobab Resort.
View this program: with abstractssession overviewtalk overview
Title: From Traditional to Digital: How software, data and AI are transforming the embedded systems industry
Abstract: With digitalization and with technologies such as software, data, and artificial intelligence, companies in the embedded systems domain are experiencing a rapid transformation of their conventional businesses. While the physical products and associated product sales provide the core revenue, these are increasingly being complemented with service offerings, new data-driven services, and digital products that allow for continuous value creation and delivery to customers. This talk explores the difference between what constitutes a traditional and a digital company and details the typical evolution path embedded systems companies take when transitioning towards becoming digital companies. The talk focuses on the changes associated with business models, ways-of-working and ecosystem engagements and provides concrete examples based on action-oriented research conducted in close collaboration with companies in the embedded systems domain.
Expomeloneras's Hall
10:30 | Maintainability Challenges in ML: A Systematic Literature Review (abstract) |
10:55 | Deep Reinforcement Learning in a Dynamic Environment: A Case Study in the Telecommunication Industry (abstract) |
11:20 | Comparing Input Prioritization Techniques for Testing Deep Learning Algorithms (abstract) |
11:45 | A Multivocal Literature Review of MLOps Tools and Features (abstract) |
10:30 | Analyzing Programming Effort Model Accuracy of High-Level Parallel Programs for Stream Processing (abstract) |
10:45 | Effort Prediction with Limited Data: A Case for Data Warehouse Projects (abstract) |
11:10 | Utilization of Three Software Size Measures for Effort Estimation in Agile World: A Case Study (abstract) |
10:30 | Web-Based Tracing for Model-Driven Applications (abstract) |
10:55 | Handling Environmental Uncertainty in Design Time Access Control Analysis (abstract) |
11:20 | Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Objective Problems (abstract) |
11:45 | A Context-Driven Modelling Framework for Dynamic Authentication Decisions (abstract) |
Title: Open-Source Research on Time-predictable Computer Architecture
Abstract: Real-time systems need time-predictable computers to be able to guarantee that computation can be performed within a given deadline.For worst-case execution time analysis we need detailed knowledgeof the processor and memory architecture. Providing the design of a processor in open-source enables the development of worst-cease execution time analysis tools without the unsafe reverse engineering of processor architectures. Open-source software is currently the basis of many Internet services, e.g., an Apache web server running on top of Linux with a web application written in Java. Furthermore, for most programming languages in use today, there are a open-source compilers available. However, hardware designs are seldom published in open-source. Furthermore, many artifacts developed in research, especially hardware designs, are not published in open-source. The two main arguments formulated against publishing research in open source are:(1) “When I publish my source before the paper gets accepted, someone may steal my ideas” and(2) “My code is not pretty enough to publish it, I first need to clean it up (which seldom happens)”. In this paper and in the presentation I will give counterarguments for those two issues. I will present the successful T-CREST/Patmos research project, where almost all artifacts have been developed in open-source from day one. Furthermore, I will present experiences using the Google/Skywater open-sourcetool flow to produce a Patmos chip with 12 students within a one semester course.
Buffet lunch at Lopesan Baobab Resort.
14:30 | Anomaly Detection in Cloud-Native Systems (abstract) |
14:45 | An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract Testing (abstract) |
15:10 | Towards the Generation of Robust E2E Test Cases in Template-based Web Applications (abstract) |
15:35 | Towards Perspective-Based Specification of Machine Learning-Enabled Systems (abstract) |
15:50 | KennyRiMr: An Eclipse Plug-in to Improve Correctness of Rename Method Refactoring in Java (abstract) |
14:30 | Service Classification through Machine Learning: Aiding in the Efficient Identification of Reusable Assets in Cloud Application Development (abstract) |
14:55 | Applicability of Software Reliability Growth Models to Open Source Software (abstract) |
15:20 | Software Reuse and Evolution in JavaScript Applications (abstract) |
15:45 | Regularity or Anomaly? On The Use of Anomaly Detection for Fine-Grained JIT Defect Prediction (abstract) |
14:30 | Search Budget in Multi-Objective Refactoring Optimization: a Model-Based Empirical Study (abstract) |
14:55 | Synthesis of Pareto-optimal Policies for Continuous-Time Markov Decision Processes (abstract) |
15:20 | UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems (abstract) |
15:45 | Sustainability in Software Architecture: A Systematic Mapping Study (abstract) |
Expomeloneras's Hall
At the social event, we will show you the Canarian culture and its prehispanic origins in the park Mundo Aborigen. The visitors are welcomed by a traditional aboriginal town from an outstanding location, outside of the touristic area. Finally, we will admire the ravine of Fataga, which is part of the Gran Canaria World Biosphere Reserve declared by UNESCO. At 19:00 is the comeback so you will have free time to get ready for Social Dinnner at 20:00h at the Lopesan Villa del Conde Resort & Thalasso.
Social dinner at 20:00 h at the Lopesan Villa del Conde Resort & Thalasso including a traditional Canarian music concert.
View this program: with abstractssession overviewtalk overview
Title: Looking for the limits of electronics for autonomous microsystems
Abstract: Autonomous microsystems are microscale systems that do not need external power to operate and communicate for a given period of time. If we can build autonomous microsystems even with dimensions as small as the diameter of a human hair (< 100 μm) new use cases for sensing applications could be addressed. For example, microsensors could be embedded into fibers to produce smart clothing, new approaches to in-vitro and in-body sensing could be performed, etc. This keynote will address the challenges that electronic circuits must meet to be part of and support the design and integration of autonomous microsystems.
Expomeloneras's Hall
11:30 | Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-Grained Repository-Based Co-Evolution Analysis (abstract) |
11:45 | Change-Aware Regression Test Prioritization using Genetic Algorithms (abstract) |
12:10 | An Evaluation of General-Purpose Static Analysis Tools on C/C++ Test Code (abstract) |
12:35 | Investigating the Adoption of History-based Prioritization in the Context of Manual Testing in a Real Industrial Setting (abstract) |
11:30 | Exploring the impact of scenario and distance information on the reliability assessment of multi-sensor systems (abstract) |
11:55 | An Industrial Experience Report about Challenges from Continuous Monitoring, Improvement, and Deployment for Autonomous Driving Features (abstract) |
12:20 | Risk and Engineering Knowledge Integration in Cyber-physical Production Systems Engineering (abstract) |
12:45 | Bad Smells in Industrial Automation: Sniffing out Feature Envy (abstract) |
11:30 | Aligning Platform Ecosystems Through Product Roadmapping: Systematic Mapping Study and Research Agenda (abstract) |
11:55 | How are software datasets constructed in Empirical Software Engineering studies? A systematic mapping study (abstract) |
12:20 | API Deprecation: A Systematic Mapping Study (abstract) |
12:45 | Automotive Service-oriented Architectures: a Systematic Mapping Study (abstract) |
Buffet lunch at Lopesan Baobab Resort.
14:30 | Towards Secure Agile Software Development Process: A Practice-Based Model (abstract) |
14:55 | Agile Enterprise Transformations: Surveying the Many Facets of Agility for the Hybrid Era (abstract) |
15:10 | Living in a Pink Cloud or Fighting a Whack-a-Mole? On the Creation of Recurring Revenue Streams in the Embedded Systems Domain (abstract) |
15:35 | The Role Of Post-Release Software Traceability in Release Engineering: A Software-Intensive Embedded Systems Case Study From The Telecommunications Domain (abstract) |
14:30 | RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive Systems (abstract) |
14:55 | Metamorphic Testing in Autonomous System Simulations (abstract) |
15:20 | End-to-end Timing Model Extraction from TSN-Aware Distributed Vehicle Software (abstract) |
15:35 | Mitigating Risk in Neural Network Classifiers (abstract) |
14:30 | Towards Continuous Systematic Literature Review in Software Engineering (abstract) |
14:55 | A Systematic Mapping Review on Robotic Testing of Mobile Devices (abstract) |
15:20 | SCAS-AI: A Strategy to Semi-Automate the Initial Selection Task in Systematic Literature Reviews (abstract) |
15:45 | A Mapping Study of Security Vulnerability Detection Approaches for Web Applications (abstract) |
Expomeloneras's Hall