Ergebnis 2 von 37
Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...

Details

Autor(en) / Beteiligte
Titel
Software architecture : 15th European Conference, ECSA 2021, virtual event, Sweden, September 13-17, 2021, proceedings
Ort / Verlag
Cham, Switzerland : Springer International Publishing,
Erscheinungsjahr
[2021]
Link zum Volltext
Beschreibungen/Notizen
  • Intro -- Preface -- Organization -- Abstracts of Keynotes -- Determinism -- Software Architecture for a Digital Age -- Enterprise Architecture in an Agile World -- Contents -- Architectures for Reconfigurable and Self-Adaptive Systems -- Dynamic Updates of Virtual PLCs Deployed as Kubernetes Microservices -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 State-Transfer Approach -- 4.1 Example -- 4.2 Static View -- 4.3 Dynamic View -- 4.4 Decision Points -- 5 Prototypical Implementation -- 6 Experimental Evaluation -- 6.1 Test Application Sizing -- 6.2 Jitter Characterization -- 6.3 State Transfer Time -- 7 Assumptions and Limitations -- 8 Conclusions -- References -- A Runtime Safety Enforcement Approach by Monitoring and Adaptation -- 1 Introduction -- 2 Related Work -- 3 Running Example: The MRM System -- 4 Safety Enforcement by Monitoring and Adaptation -- 4.1 Abstract State Machines for Specifying Enforcement Models -- 4.2 ASMs Operating as Enforcement Models -- 5 Safety Enforcement Framework -- 6 Runtime Safety Enforcement at Work -- 6.1 Instantiation of the Enforcement Framework -- 6.2 Validation of Enforcement Strategies -- 7 Conclusion and Future Work -- References -- Towards a Taxonomy of Autonomous Systems -- 1 Introduction -- 2 Background -- 2.1 Existing Efforts to Formalise Autonomy -- 2.2 Formal Modelling Approach -- 3 A Taxonomy for Defining Autonomy -- 3.1 Autonomy as a Property of Individual Functions -- 3.2 Main Ideas Behind the Taxonomy for Autonomy -- 3.3 Taxonomy Levels -- 3.4 Formalisation of Taxonomy Levels -- 4 Discussion and Conclusion -- References -- Machine Learning For Software Architecture -- Explaining Architectural Design Tradeoff Spaces: A Machine Learning Approach -- 1 Introduction -- 2 Motivating Scenario: Tele-Assistance System (TAS) -- 3 Approach -- 3.1 Preliminaries -- 3.2 Configuration Data Extraction.
  • 3.3 Data Aggregation and Normalization -- 3.4 Principal Component Analysis -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Scenario: Network Architecture -- 4.3 Discussion -- 5 Related Work -- 6 Conclusions and Future Work -- References -- A Machine Learning Approach to Service Discovery for Microservice Architectures -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 ML Based Service Discovery -- 4.1 Data Extraction -- 4.2 Feature Extraction -- 4.3 Training -- 4.4 Prediction -- 4.5 Selection -- 5 Evaluation -- 5.1 Proof-of-Concept: The Coin Collection Application -- 5.2 Controlled Experiments -- 5.3 Approach Effectiveness -- 5.4 Approach Efficiency -- 5.5 Threats to Validity -- 6 Conclusion -- References -- FLRA: A Reference Architecture for Federated Learning Systems -- 1 Introduction -- 2 Methodology -- 2.1 Generation of Theory -- 2.2 Confirmation of Theory -- 3 FLRA Reference Architecture -- 3.1 Job Creation -- 3.2 Data Collection and Preprocessing -- 3.3 Model Training -- 3.4 Model Deployment -- 3.5 Model Monitoring -- 4 Related Work -- 5 Discussion and Conclusion -- References -- Architectural Knowledge, Decisions, and Rationale -- Trace Link Recovery for Software Architecture Documentation -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 4 Evaluation -- 4.1 Gold Standards -- 4.2 Metrics -- 4.3 Results of SWATTR -- 4.4 Comparison to Other Approaches -- 5 Discussion and Threats to Validity -- 6 Conclusion and Future Work -- References -- An Exploratory Study on Architectural Knowledge in Issue Tracking Systems -- 1 Introduction -- 2 Background - Architectural Knowledge Concepts -- 3 Study Design -- 3.1 Research Questions -- 3.2 Research Process -- 4 RQ1: Representation of AK Concepts in Issues -- 5 RQ2: Prominent AK Concepts in Issues -- 6 RQ3: Significant Co-occurrences Between AK Concepts -- 7 Discussion.
  • 7.1 RQ1: Representation of AK Concepts in Issues -- 7.2 RQ2: AK Concepts in Issues -- 7.3 RQ3: Significant Co-Occurrences Between AK Concepts -- 8 Threats to Validity -- 8.1 External Validity -- 8.2 Construct Validity -- 8.3 Reliability -- 9 Related Work -- 10 Conclusions -- References -- Human Behavior-Oriented Architectural Design -- 1 Introduction -- 2 Background and Case Study -- 2.1 Agent-Based Modeling and Simulation -- 2.2 Architectural Modeling and Simulation -- 2.3 Case Study: The Uffizi Galleries -- 3 Methodology -- 4 Application -- 4.1 Agent-Based Modeling Scenarios and Simulations -- 4.2 IoT Architectures Modeling and Simulations -- 4.3 Results -- 5 Conclusion -- References -- Architecting for Quality Attributes -- Updating Service-Based Software Systems in Air-Gapped Environments -- 1 Introduction -- 2 Updating Service-Based Air-Gapped Systems -- 3 Architecture for Instrumenting Air-Gapped Updates -- 3.1 Design Requirements -- 3.2 Functional Components -- 3.3 Update Workflow -- 4 Service Dependency Resolution -- 4.1 Problem Formulation -- 4.2 Dependency Resolution Strategies -- 5 Evaluation -- 5.1 Applicability -- 5.2 Dependency Resolution Performance -- 5.3 Discussion -- 6 Related Work -- 7 Conclusion and Future Work -- References -- Architectural Tactics for Energy-Aware Robotics Software: A Preliminary Study -- 1 Introduction -- 2 ROS-Based Robotics Software -- 3 Mining the Architectural Tactics -- 4 Results -- 4.1 Energy Savings Mode (AT1) -- 4.2 Stop Current Task &amp -- Recharge (AT2) -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Taxonomy of Edge Blockchain Network Designs -- 1 Introduction -- 2 Background and Related Work -- 2.1 Blockchain Network Design -- 2.2 Related Work -- 3 Taxonomy of Edge Blockchain Network Designs -- 3.1 Methodology -- 3.2 Taxonomy of Edge Blockchain Network Designs.
  • 4 Availability Evaluation -- 5 Concluding Remarks -- References -- An Analysis of Software Parallelism in Big Data Technologies for Data-Intensive Architectures -- 1 Introduction -- 2 Software Parallelism in Big Data Tools -- 3 Experiment Design -- 4 Results -- 5 Conclusions -- References -- Architecture-Centric Source Code Analysis -- State of the Practice in Application Programming Interfaces (APIs): A Case Study -- 1 Introduction -- 2 Background and Previous Work -- 3 Research Method: Case Study -- 4 Case Study Findings -- 4.1 API Usage Scenarios -- 4.2 Technologies and Adoption of New Technologies -- 4.3 Deployment -- 4.4 API Versioning -- 4.5 API Documentation -- 4.6 API Quality Attributes -- 4.7 API Management -- 5 Discussion -- 6 Study Validity -- 7 Conclusions -- References -- Identifying Domain-Based Cyclic Dependencies in Microservice APIs Using Source Code Detectors -- 1 Introduction -- 2 Related Work -- 3 Static Analysis -- 3.1 Microservice API Communication Model -- 3.2 Model Reconstruction -- 4 Metrics -- 5 Case Studies -- 5.1 Case Study 1: Lakeside Mutual -- 5.2 Case Study 2: eShopOnContainers -- 6 Discussion -- 7 Threats to Validity -- 8 Conclusions and Future Work -- References -- Optimized Dependency Weights in Source Code Clustering -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Method -- 4.1 Data Analysis -- 4.2 Genetic Algorithm -- 4.3 Subject Systems -- 5 Results -- 6 Discussion and Threats to Validity -- 7 Conclusion and Future Work -- References -- Experiences and Learnings from Industrial Case Studies -- Reliable Event Routing in the Cloud and on the Edge -- 1 Introduction -- 2 Business Context: AgeTech Startup with IoT Device -- 2.1 Software Architecture Overview -- 2.2 Vision: Unified Event Plane -- 3 Design and Implementation of the CloudEvents Router -- 3.1 Technical Constraints and Requirements.
  • 3.2 CloudEvents Router Architecture -- 3.3 Implementation: Rust SDK for CloudEvents -- 4 Delivery Guarantees and Their Implementations -- 4.1 Reliable Event Routing with the CloudEvents Router -- 4.2 Different Approaches to Reliable Event Routing (Options) -- 4.3 How Common Protocols Implement Delivery Guarantees -- 4.4 Selection of At Least Once for the CloudEvents Router -- 4.5 Implementation and Validation of At Least Once Channels -- 5 Lessons Learned -- 6 Related Work -- 7 Summary and Outlook -- References -- An Experience Report on Modernizing I/O Configuration Software -- 1 Introduction -- 2 Background -- 2.1 IBM Z -- 2.2 Firmware -- 2.3 Spiral Model -- 3 Applied Process for Modernizing a System -- 3.1 Change Trigger Analysis -- 3.2 Identifying Affected System Parts -- 3.3 Multi-criteria Design Decisions -- 3.4 Requirements Prioritization -- 3.5 Designing a First Architecture Draft -- 3.6 Implementation -- 4 Application in a Real-World Project -- 4.1 Change Trigger Analysis -- 4.2 Identifying Affected System Parts -- 4.3 Multi-criteria Design Decisions -- 4.4 Requirements Prioritization -- 4.5 Designing a First Architecture Draft -- 4.6 Implementation -- 5 Lessons Learned and Discussion -- 6 Related Work -- 7 Conclusion -- References -- Enabling SMEs to Industry 4.0 Using the BaSyx Middleware: A Case Study -- 1 Introduction -- 2 State of the Art and State of the Practice -- 2.1 Industry 4.0 and the Automation Pyramid -- 2.2 Asset Administration Shells as Digital Twins -- 2.3 BaSyx Middleware -- 3 Industry Use Cases -- 3.1 Use Case 1 - Continuous Optimization of Quotations -- 3.2 Use Case 2 - Improving the Product Quality Through Continuous Monitoring -- 4 Experiences and Lessons Learned -- 5 Conclusion -- References -- Software Architectures for Edge Analytics: A Survey -- 1 Introduction -- 2 Edge Analytics -- 2.1 Edge Analytics Foundations.
  • 2.2 Example Use Case.
  • Description based on print version record.
Sprache
Identifikatoren
ISBN: 3-030-86044-2
OCLC-Nummer: 1265463178
Titel-ID: 9925033922306463
Format
1 online resource (339 pages)
Schlagworte
Software architecture, Software engineering