Computer Science and Engineering

Search CurateND

Search criteria:

Department or Unit: Computer Science and Engineering remove ×
Clear all

List of files deposited in CurateND that match your search criteria

  • Author(s):
    Rick Rabiser, Klaus Schmid, Holger Eichelberger, Michael Vierhauser, Sam Guinea, Paul Gruenbacher
    Abstract:

    [Context] Complex and heterogeneous software systems need to be monitored as their full behavior often only emerges at runtime, e.g., when interacting with other systems or the environment. Software monitoring approaches observe and check properties or quality attributes of software systems during operation. Such approaches have been developed in diverse communities for various kinds of systems and purposes. For instance, requirements monitoring aims to check at runtime whether a software…

  • Author(s):
    Michael Vierhauser, Sean Beyley, Jane Wyngaard, Wandi Xiong, Joshua Huseman, Robyn Lutz, Jane Cleland-Huang
    Abstract:

    The growing adoption of unmanned aerial vehicles (UAV) for tasks such as eCommerce, aerial surveillance, and environmental monitoring introduces the need for new safety mechanisms in an increasingly cluttered airspace. In our work we thus emphasize safety issues that emerge at the intersection of infrastructures responsible for controlling the airspace, and the diverse UAVs operating in their space. We build on safety assurance cases (SAC)- a state-of-the-art solution for reasoning about safe…

  • Author(s):
    Norbert Seyff, Michael Vierhauser, Michael Schneider, Jane Cleland-Huang
    Abstract:

    [Context and motivation] With the rise of cyber-physical systems (CPS), smart ecosystems, and the Internet of Things (IoT), software-intensive systems have become pervasive in everyone’s daily life. The shift from software systems to ubiquitous adaptive software-intensive systems not only affects the way we use software but further has an impact on the way these systems are designed and developed. Gathering requirements for such systems can benefit from elicitation processes that are conducte…

  • Author:
    Andrew Wood
    Advisory Committee:
    Jane Cleland-Huang, David Chiang, Collin McMillan
    Degree Area:
    Computer Science and Engineering
    Degree:
    Master of Science in Computer Science and Engineering
    Defense Date:
    2019-03-19
  • Author:
    Xueying Wang
    Advisory Committee:
    Meng Jiang
    Degree Area:
    Computer Science and Engineering
    Degree:
    Master of Science in Computer Science and Engineering
    Defense Date:
    2019-03-18
  • Author:
    Maria Glenski
    Advisory Committee:
    Tim Weninger, Meng Jiang, Dong Wang, Huan Liu
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-03-26
  • Author:
    Frederick C. Nwanganga
    Advisory Committee:
    Nitesh V. Chawla
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-03-22
  • Author:
    Arturo Argueta
    Advisory Committee:
    David Chiang
    Degree Area:
    Computer Science and Engineering
    Degree:
    Doctor of Philosophy
    Defense Date:
    2019-02-27
  • Author(s):
    Jane Cleland-Huang, Michael Vierhauser
    Abstract:

    Traditionally, safety-critical projects have been developed using the waterfall process. However, this makes it costly and challenging to incrementally introduce new features and to certify the modified product for use. As a result, there has been increasing interest in adopting agile development paradigms within the safety-critical domain. This in turn introduces numerous challenges. In this paper we address the specific problems of discovering, analyzing, specifying, and managing safety req…

    Date Published:
    2018-08
  • Author(s):
    Michael Vierhauser, Jane Cleland-Huang, Rick Rabiser, Thomas Krismayer, Paul Grünbacher
    Abstract:

    Industrial software systems are often systems of systems~(SoS) whose full behavior only emerges during operation. They therefore require monitoring techniques to observe systems and detect deviations from their requirements. The focus of existing monitoring approaches, however, is mainly on detecting violations of expected behavior, while support for diagnosing violations is typically limited or even neglected. Diagnosis is particularly challenging in SoS due to their technological heterogene…

    Date Published:
    2018-08
  • Author:
    Yue Ma
    Advisory Committee:
    Michael Niemier, Yiyu Shi, Xiaobo Sharon Hu, Robert P. Dick
    Degree Area:
    Computer Science and Engineering
    Degree:
    PhD
    Defense Date:
    2018-11-09
  • Author(s):
    Kyle Sweeney, Douglas Thain
    Abstract:

    Scientists using workflows often have access to both High Performance Computing and High-Throughput Computing sites, but HPC sites’ architecture is less conducive to HTC paradigms. The choices of middleware and site can have drastic performance differences on different workflows. To explore these differences, we created tools to expand Makeflow and Work Queue’s capabilities. We then performed four speed of light tests, testing job dispatch rate, data delivery from the master to worker…