The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although capturing and documenting the design making process in software architecture is an important task, few tools exist to support the architect in this task. Often, such decisions are made during discussions with other stakeholders, but typically these remain implicit. We envision the Software Architecture Video Wall as a collaborative decision making tool for the software architect. The video...
Thorough and continuous architecting is the key to overall success in software engineering, and architecture evaluation is a crucial part of it. This tutorial presents a pragmatic architecture evaluation approach and insights gained from its application in more than 75 projects with industrial customers in the past decade. It presents context factors, empirical data, and example cases, as well as...
We motivate and describe why erosion modeling from a static architecture conformance checking point of view is important as well as the impact we think it can have on industry. Our research goal is to get a better understanding of erosion and develop smarter and simpler methods to assess erosion. We describe preliminary results from a retrospective, longitudinal case study of an open source software...
The recent growth of popularity of cloud computing services delivers various benefits in multiple fields of activity, including reduced resource costs due to optimized hardware setup, as well as improving mobility. However, cloud computing has some issues that need to be clarified, one of which is the security of cloud computing. The dispersion of cloud service vendors means that most security issues...
Agile methods have gained wide acceptance over the past several years, to the point that they are now a standard management and execution approach for small-scale software development projects. While conventional Agile methods are not generally applicable to large multi-year and mission-critical systems, Agile hybrids are now being developed (such as SAFe) to exploit the productivity improvements...
This paper reports on an interview-based study of 18 authors of different chapters of the two-volume book "Architecture of Open-Source Applications". The main contributions are a synthesis of the process of authoring essay-style documents (ESDs) on software architecture, a series of observations on important factors that influence the content and presentation of architectural knowledge in...
Research on software Architecture is vigorous from the early 90's and its lead to a number of different architecture description languages (ADLs). These languages are increasing in a huge amount and are different in term of analysis produced by these languages and abstraction supported by them. Moreover, a lot of other languages not intended as ADL serve reasonably fine on analyzing and representing...
Documenting the time dimension part of your architecture might look like extra work. However, anticipation should be a large part of your job as an architect, anyway. If you communicate your anticipation as an evolution viewpoint or architecture roadmap, your architecture description will stay valid longer. And, you'll have a ready answer when stakeholders ask how you've addressed their change and...
Clock tree of a complex system-on-chip is modeled across different design stages independently, resulting in multiplication of time and effort needed to develop clock tree models. Model-based design is an emerging methodology that can improve the efficiency, time, and cost of a system design. We propose an approach to modeling clock tree of a complex system-on-chip by exploiting patterns in hardware...
This paper will discuss an implementable action plan for startups to capture and leverage their intellectual capital and identify the key players of the process. The paper will discuss the Knowledge Management deliverables that can help startups reduce the over-dependence on chief architects, reduce onboarding time for new employees, facilitate cross-functional team communication, and capture intellectual...
Processor specifications are of critical importance for verifying programs, compilers, operating systems/hypervisors, and, of course, for verifying microprocessors themselves. But to be useful, the scope of these specifications must be sufficient for the task, the specification must be applicable to processors of interest and the specification must be trustworthy. This paper describes a 5 year project...
The development of distributed and fault tolerant avionics systems from the first drafts to the finalization of the certification process is complex, resource intensive (financial and man power) and involves high risks. Therefore, implementations like fly-by-wire systems are usually limited to the FAR25 (CS25) domain. Previous research at the Institute of Aircraft Systems at University of Stuttgart...
Software architecture patterns present solutions for software architecture problems and help to document architectural design decisions. Complexity and variability of patterns, and the required expertise for selecting an appropriate pattern, would cause some difficulties in utilizing architectural patterns. Using an ontology for registering architectural patterns is an efficient step in solving those...
Agile Software Development (ASD) is a movement that emerged in the late 1990's and since then has been increasingly adopted by organizations. They are successful in projects characterized by rapid changes, small teams and small cycles. Implementing the same agile philosophy but with an increase of complexity, i.e., large-scale agile (LSA) development, are sometimes criticized of not being as effective...
Despite the best intentions of software architects, it is often the case that individual developers do not faithfully implement the original security design decisions. Such a scenario sometimes leads to a situation in which while an architect claims the use of a secure architecture in the form of some tactic, the corresponding source code does not support the claim. To bridge this gap, the first critical...
Language endangerment is one of the most urgent problems facing humanities, with roughly one language disappearing every two weeks. Currently most of the linguistics tools used for endangered language documentation and analysis are desktop-based standalone software systems that do not expose libraries or services to be integrated by user applications, nor do they sufficiently support data sharing...
Although traceability information is vital to many software engineering activities, agile development approaches rarely use it because of the extra effort required. In this industry case study, the authors report the results of applying their lightweight semiautomated method that integrates traceability into software architecture developed with an agile process like Scrum.
Variability Management (VM) is one of the core activities for the success of software reuse. Several VM tools developed in academia and industry support mass customization of new software products and decrease time to market. Despite of a signi cant number of VM tools, in most cases, industry has adopted different techniques for managing variability, including producing their own tools. Such a heterogeneity...
Designing a software architecture is a highly complex task and associated with a high degree of uncertainty. There are a variety of reusable and established solutions, but they differ in their impact on the system's functionality and quality. The architect has to consider different aspects like stakeholders' requirements as well as numerous constraints coming, among others, from the technical environment...
Through massive deployment of additional small cell infrastructure, Dense Small cell Networks (DSNs) are expected to help meet the foreseen increase in traffic demand on cellular networks. Performance assessment of architectural and protocol solutions tailored to DSNs will require system and network level simulators that can appropriately model the complex interference environment found in those networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.