Computer Science and Engineering

Search CurateND

Search criteria:

Department or Unit: Computer Science and Engineering remove ×
Clear all

List of files deposited in CurateND that match your search criteria

  • Author:
    Shenglong Zhu
    Advisory Committee:
    Taeho Jung, Gregory R. Madey, Scott J. Emrich, Danny Z. Chen, Meng Jiang
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-10-07
  • Author:
    Chao Zheng
    Advisory Committee:
    Douglas L. Thain, Christian Poellabauer, Dong Wang, Lukas Rupprecht
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-08-22
  • Author:
    Xunzhao Yin
    Advisory Committee:
    Michael T. Niemier, Xiaobo Sharon Hu
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-07-05
  • Author:
    Joel Robert Gray Brogan
    Advisory Committee:
    Edward Delp, Patrick Flynn, Walter J. Scheirer, Kevin W. Bowyer, Adam Czajka
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-06-11
  • Author(s):
    Ankit Agrawal, Seyedehzahra Khoshmanesh, Michael Vierhauser, Mona Rahimi, Jane Cleland-Huang, Robyn Lutz
    Abstract:

    Safety Assurance Cases (SACs) are increasingly used to guide and evaluate the safety of software-intensive systems. They are used to construct a hierarchically organized set of claims, arguments, and evidence in order to provide a structured argument that a system is safe for use. However, as the system evolves and grows in size, a SAC can be difficult to maintain. In this paper we utilize design science to develop a novel solution for identifying areas of a SAC that are affected by changes t…

    Date Published:
    2019-05
  • Author(s):
    Rick Rabiser, Klaus Schmid, Holger Eichelberger, Michael Vierhauser, Sam Guinea, Paul Gruenbacher
    Abstract:

    [Context] Complex and heterogeneous software systems need to be monitored as their full behavior often only emerges at runtime, e.g., when interacting with other systems or the environment. Software monitoring approaches observe and check properties or quality attributes of software systems during operation. Such approaches have been developed in diverse communities for various kinds of systems and purposes. For instance, requirements monitoring aims to check at runtime whether a software…

  • Author(s):
    Michael Vierhauser, Sean Beyley, Jane Wyngaard, Wandi Xiong, Joshua Huseman, Robyn Lutz, Jane Cleland-Huang
    Abstract:

    The growing adoption of unmanned aerial vehicles (UAV) for tasks such as eCommerce, aerial surveillance, and environmental monitoring introduces the need for new safety mechanisms in an increasingly cluttered airspace. In our work we thus emphasize safety issues that emerge at the intersection of infrastructures responsible for controlling the airspace, and the diverse UAVs operating in their space. We build on safety assurance cases (SAC)- a state-of-the-art solution for reasoning about safe…

  • Author(s):
    Norbert Seyff, Michael Vierhauser, Michael Schneider, Jane Cleland-Huang
    Abstract:

    [Context and motivation] With the rise of cyber-physical systems (CPS), smart ecosystems, and the Internet of Things (IoT), software-intensive systems have become pervasive in everyone’s daily life. The shift from software systems to ubiquitous adaptive software-intensive systems not only affects the way we use software but further has an impact on the way these systems are designed and developed. Gathering requirements for such systems can benefit from elicitation processes that are conducte…

  • Author:
    Andrew Wood
    Advisory Committee:
    Jane Cleland-Huang, David Chiang, Collin McMillan
    Degree Area:
    Computer Science and Engineering
    Degree:
    Master of Science in Computer Science and Engineering
    Defense Date:
    2019-03-19
  • Author:
    Rachael Purta
    Advisory Committee:
    Aaron Striegel, David Hachen, Christian Poellabauer, Ronald Metoyer
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-03-19
  • Author:
    Antonios Anastasopoulos
    Advisory Committee:
    David Chiang
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-01-21
  • Author(s):
    Jane Cleland-Huang, Michael Vierhauser
    Abstract:

    Traditionally, safety-critical projects have been developed using the waterfall process. However, this makes it costly and challenging to incrementally introduce new features and to certify the modified product for use. As a result, there has been increasing interest in adopting agile development paradigms within the safety-critical domain. This in turn introduces numerous challenges. In this paper we address the specific problems of discovering, analyzing, specifying, and managing safety req…

    Date Published:
    2018-08