Computer Science and Engineering

Search CurateND

Search criteria:

Department or Unit: Computer Science and Engineering remove ×
Clear all

List of files deposited in CurateND that match your search criteria

  • Author(s):
    Ankit Agrawal, Seyedehzahra Khoshmanesh, Michael Vierhauser, Mona Rahimi, Jane Cleland-Huang, Robyn Lutz
    Abstract:

    Safety Assurance Cases (SACs) are increasingly used to guide and evaluate the safety of software-intensive systems. They are used to construct a hierarchically organized set of claims, arguments, and evidence in order to provide a structured argument that a system is safe for use. However, as the system evolves and grows in size, a SAC can be difficult to maintain. In this paper we utilize design science to develop a novel solution for identifying areas of a SAC that are affected by changes t…

    Date Published:
    2019-05
  • Author(s):
    Rick Rabiser, Klaus Schmid, Holger Eichelberger, Michael Vierhauser, Sam Guinea, Paul Gruenbacher
    Abstract:

    [Context] Complex and heterogeneous software systems need to be monitored as their full behavior often only emerges at runtime, e.g., when interacting with other systems or the environment. Software monitoring approaches observe and check properties or quality attributes of software systems during operation. Such approaches have been developed in diverse communities for various kinds of systems and purposes. For instance, requirements monitoring aims to check at runtime whether a software…

  • Author(s):
    Michael Vierhauser, Sean Beyley, Jane Wyngaard, Wandi Xiong, Joshua Huseman, Robyn Lutz, Jane Cleland-Huang
    Abstract:

    The growing adoption of unmanned aerial vehicles (UAV) for tasks such as eCommerce, aerial surveillance, and environmental monitoring introduces the need for new safety mechanisms in an increasingly cluttered airspace. In our work we thus emphasize safety issues that emerge at the intersection of infrastructures responsible for controlling the airspace, and the diverse UAVs operating in their space. We build on safety assurance cases (SAC)- a state-of-the-art solution for reasoning about safe…

  • Author(s):
    Norbert Seyff, Michael Vierhauser, Michael Schneider, Jane Cleland-Huang
    Abstract:

    [Context and motivation] With the rise of cyber-physical systems (CPS), smart ecosystems, and the Internet of Things (IoT), software-intensive systems have become pervasive in everyone’s daily life. The shift from software systems to ubiquitous adaptive software-intensive systems not only affects the way we use software but further has an impact on the way these systems are designed and developed. Gathering requirements for such systems can benefit from elicitation processes that are conducte…

  • Author(s):
    Jane Cleland-Huang, Michael Vierhauser
    Abstract:

    Traditionally, safety-critical projects have been developed using the waterfall process. However, this makes it costly and challenging to incrementally introduce new features and to certify the modified product for use. As a result, there has been increasing interest in adopting agile development paradigms within the safety-critical domain. This in turn introduces numerous challenges. In this paper we address the specific problems of discovering, analyzing, specifying, and managing safety req…

    Date Published:
    2018-08
  • Author(s):
    Michael Vierhauser, Jane Cleland-Huang, Rick Rabiser, Thomas Krismayer, Paul Grünbacher
    Abstract:

    Industrial software systems are often systems of systems~(SoS) whose full behavior only emerges during operation. They therefore require monitoring techniques to observe systems and detect deviations from their requirements. The focus of existing monitoring approaches, however, is mainly on detecting violations of expected behavior, while support for diagnosing violations is typically limited or even neglected. Diagnosis is particularly challenging in SoS due to their technological heterogene…

    Date Published:
    2018-08
  • Author(s):
    Jürgen Thanhofer-Pilisch, Alexander Lang, Michael Vierhauser, Rick Rabiser
    Abstract:

    Domain-specific languages (DSLs) are frequently used in software engineering. In contrast to general-purpose languages, DSLs are designed for a special purpose in a particular domain. Due to volatile user requirements and new technologies DSLs, similar to the software systems they describe or produce, are subject to continuous evolution. This work explores existing research on DSL evolution to summarize, structure and analyze this area of research, and to identify trends and open issues. We c…

  • Author(s):
    Michael Vierhauser, Sean Bayley, Jane Wyngaard, Jinghui Cheng, Wandi Xiong, Robyn Lutz, Joshua Huseman, Jane Cleland-Huang
    Abstract:

    The growing adoption of small unmanned aircraft systems (sUAS) for tasks such as eCommerce, aerial surveillance, and environmental monitoring introduces the need for new safety mechanisms in an increasingly cluttered airspace. Safety assurance cases (SAC) provide a state-of-the-art solution for reasoning about system and software safety in numerous safety-critical domains. We propose a novel approach based on the idea of interlocking safety cases. The sUAS infrastructure safety case (iSAC) sp…

  • Author(s):
    Jane Wyngaard, Samuel S.C. Rund, Gregory R. Madey, Michael Vierhauser, Jane Cleland-Huang
    Abstract:

    Remotely Piloted Aircraft Systems (RPAS) are an emerging application area for many industries including surveillance, agriculture monitoring, and vector-borne disease control. With drastically lower costs and increasing performance and autonomy, future application evolution will more than likely include the use of the RPAS swarms. Several largely successful experiments in recent years, using off the shelf small Unmanned Aircraft Systems (sUAS) have been conducted to address the long standing …

  • Author(s):
    Rick Rabiser, Sam Guinea, Michael Vierhauser, Luciano Baresi , Paul Grünbacher
    Abstract:

    The full behavior of complex software systems often only emerges during operation. They thus need to be monitored at run time to check that they adhere to their requirements. Diverse runtime monitoring approaches have been developed in various domains and for different purposes. Their sheer number and heterogeneity, however, make it hard to find the right approach for a specific application or purpose. The aim of our research therefore was to develop a comparison framework for runtime monitor…

  • Author(s):
    Michael Vierhauser, Jane Cleland-Huang, Sean Bayley, Thomas Krismayer, Rick Rabiser, Paul Grünbacher
    Abstract:

    Unmanned aerial vehicles (UAVs) are becoming increasingly pervasive in everyday life, supporting diverse use cases such as aerial photography, delivery of goods, or disaster reconnaissance and management. UAVS are cyber-physical systems (CPS): they integrate computation (embedded software and control systems) with physical components (the UAVS flying in the physical world).UAVS in particular and CPS in general require monitoring capabilities to detect and possibly mitigate erroneous and safet…

  • Author(s):
    Lisa Maria Kritzinger , Thomas Krismayer , Michael Vierhauser, Rick Rabiser, Paul Grünbacher
    Abstract:

    Industrial software systems are often systems of systems (SoS) whose full behavior only emerges at runtime. The systems and their interactions thus need to be continuously monitored and checked during operation to determine compliance with requirements. Many requirements monitoring approaches have been proposed. However, only few of these come with tools that present and visualize monitoring results and details on requirements violations to end users such as industrial engineers. In this tool…

    Date Published:
    2017-10