Article
Construction & Building Technology
Shuqi Li
Summary: Lunar habitat design is a complex process with complicated tasks and intense task-coupling. A design structure matrix (DSM) is used to determine the task flow for optimization. Statistical analysis reveals 20 design tasks across four phases: Pre-planning, spatial design, environmental design, and optimization. Related disciplines should coordinate and build requirement and design models in an orderly manner to improve design efficiency.
Article
Computer Science, Information Systems
Yuanfang Cai, Rick Kazman
Summary: This paper reflects on the authors' decade-long journey in software design concepts and technical debt management technologies, including novel metrics, models, design anti-patterns, and a formalized model of design debt. These concepts aim to help software project teams quantify and visualize design principles and tackle practical maintainability challenges. The research evolved through continuous interactions with industrial collaborators and empirical validation through lab experiments, industry partnerships, and open source projects. The authors highlight the need for improved software design education and address gaps between research and practitioner needs, management and development, and debt detection and reduction.
INFORMATION AND SOFTWARE TECHNOLOGY
(2023)
Article
Computer Science, Software Engineering
Ran Mo, Yuanfang Cai, Rick Kazman, Lu Xiao, Qiong Feng
Summary: This paper discusses the architecture anti-patterns that occur in all large-scale software systems and contribute to high maintenance costs, impacting files' bug-proneness and change-proneness. Among all defined architecture anti-patterns, Unstable Interface and Crossing have the most significant impact on files' error-proneness and change-proneness.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
(2021)
Article
Computer Science, Information Systems
Maryam Gillani, Hafiz Adnan Niaz, Ata Ullah
Summary: This paper aims to explore and discuss the application and importance of software architecture in requirement engineering through a systematic literature review. It also identifies the challenges and methods in bridging the gap between requirements and architecture. Furthermore, a resource bank is created to provide relevant software architecture tools and techniques for effective requirement engineering.
Article
Chemistry, Multidisciplinary
Andres Bastidas Fuertes, Maria Perez, Jaime Meza
Summary: This study introduces an innovative software architecture design model that integrates transpilers into the back-end layer, enabling the automatic transformation of business logic and back-end components from a single source code into diverse equivalent versions using distinct programming languages. The work covers both abstract and detailed design aspects, defines the main target audiences, discusses pros and cons, and emphasizes the pivotal role of the transpiler.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Aisha K. El Allam, Abdul-Halim M. Jallad, Mohammed Awad, Maen Takruri, Prashanth R. Marpu
Summary: The paper introduces a flight software framework developed specifically for nanosatellites, characterized by simplicity, reliability, modularity, portability, and real-time capability. The framework simplifies software development by providing standardized skeletons and interfaces for modules to facilitate construction and communication.
Article
Computer Science, Interdisciplinary Applications
Maarten van Geest, Bedir Tekinerdogan, Cagatay Catal
Summary: Smart warehousing focuses on enhancing service quality, productivity, and efficiency while reducing costs and failures. Domain analysis is conducted to identify key concerns shaping the architecture, followed by architecture design.
COMPUTERS IN INDUSTRY
(2021)
Article
Chemistry, Multidisciplinary
Mamoona Humayun, Mahmood Niazi, Mohammed Assiri, Mariem Haoues
Summary: Global software development (GSD) is becoming standard practice in the software industry, but it is important to include security practices in GSD projects. This article aims to identify critical security practices for GSD projects by selecting and evaluating practices from existing literature. The findings reveal that 16 out of 36 security practices are critical for GSD projects, belonging to different phases of GSDLC.
APPLIED SCIENCES-BASEL
(2023)
Article
Construction & Building Technology
Yanlong Guo, Xinlei Geng, Denghang Chen, Yufei Chen
Summary: This article compares and analyzes the research results in the subject area of sustainable architectural design since 2000 using the Web of Science database and scientific visualization software. It explores the research themes, collaboration, hotspots, and future research topics in sustainable building design.
Article
Computer Science, Information Systems
Muhammad Azeem Akbar, Ahmed Alsanad, Sajjad Mahmood, Abdulrahman Alothaim
Summary: This study aims to prioritize the challenges faced by practitioners during the management of GSD projects. Through a questionnaire survey and FAHP method, a taxonomy of challenges is provided to assist software organizations in better planning and managing GSD projects.
Article
Computer Science, Software Engineering
S. Magnus Agren, Eric Knauss, Rogardt Heldal, Patrizio Pelliccione, Anders Alminger, Magnus Antonsson, Thomas Karlkvist, Anders Lindeborg
Summary: This study investigates how architecture evaluation can provide useful feedback in the development of continuously evolving systems, using the ATAM method and integrating experiences of architects from different organizations. The research proposes principles for continuous evaluation and evolution of architecture, discussing a roadmap for future research based on these findings. The importance of dedicated feedback-loops for continuous evolution of systems and their architecture in iterative development settings is highlighted.
JOURNAL OF SYSTEMS AND SOFTWARE
(2022)
Article
Computer Science, Software Engineering
S. Magnus Agren, Eric Knauss, Rogardt Heldal, Patrizio Pelliccione, Anders Alminger, Magnus Antonsson, Thomas Karlkvist, Anders Lindeborg
Summary: This study investigates how architecture evaluation can provide useful feedback during the development of continuously evolving systems. Through the experience of architects from different organizations, principles of continuous evaluation and evolution of architecture are proposed, along with a roadmap for future research. The importance of dedicated feedback-loops for the continuous evolution of systems and their architecture is highlighted.
JOURNAL OF SYSTEMS AND SOFTWARE
(2022)
Article
Computer Science, Information Systems
Rafiq Ahmad Khan, Siffat Ullah Khan, Musaad Alzahrani, Muhammad Ilyas
Summary: This article proposes a new Security Assurance Model (SAM) for Software Development and evaluates its effectiveness. The SAM consists of seven security assurance levels and addresses 46 critical software security risks through 388 practices. The results of case studies indicate that SAM helps measure the security assurance level of an organization and can potentially serve as a framework for developing new software security measures.
Article
Computer Science, Software Engineering
Wesley K. G. Assuncao, Jacob Kruger, Sebastien Mosser, Sofiane Selaoui
Summary: Microservice architectures are widely used in the industry for developing scalable software systems. However, their design and maintenance present challenges to software engineers. To gain insights into the evolution of microservices, a large-scale empirical study was conducted on 11 open-source systems, revealing recurring patterns of evolution and analyzing the dependence between microservices.
JOURNAL OF SYSTEMS AND SOFTWARE
(2023)
Article
Computer Science, Artificial Intelligence
Arif Ali Khan, Mohammad Shameem, Mohammad Nadeem, Muhammad Azeem Akbar
Summary: This study aims to develop a taxonomy of factors that positively impact the scaling process of agile methods in Chinese GSD industry, the factors were identified through literature exploration and industrial study with practitioners, and categorized, prioritized using the multi-criterion decision making (MCDM) Fuzzy AHP approach.
APPLIED SOFT COMPUTING
(2021)
Review
Computer Science, Software Engineering
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar
Summary: This study provides a comprehensive view of the challenges and critical success factors in the design, implementation, and evaluation stages of phishing education, training, and awareness (PETA). The findings highlight the need to address human-centric issues, bridge users' knowledge gaps, and adopt personalized approaches to enhance defense against phishing attacks.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Carlos Araujo, Meuse Oliveira Jr., Bruno Nogueira, Paulo Maciel, Eduardo Tavares
Summary: This paper proposes a method based on stochastic Petri nets for evaluating the consistency levels of storage systems based on NoSQL DBMS. The method takes into account different consistency levels and redundant nodes, and estimates the system's availability, throughput, and the probability of accessing the newest data. Experimental results demonstrate the practical feasibility of this approach.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Review
Computer Science, Software Engineering
L. Giamattei, A. Guerriero, R. Pietrantuono, S. Russo, I. Malavolta, T. Islam, M. Dinga, A. Koziolek, S. Singh, M. Armbruster, J. M. Gutierrez-Martinez, S. Caro-Alvaro, D. Rodriguez, S. Weber, J. Henss, E. Fernandez Vogelin, F. Simon Panojo
Summary: This article presents the results of a systematic study on the available monitoring tools for DevOps and microservices. It provides a classification and analysis of these tools, aiming to be a useful reference for researchers and practitioners in this field.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Jessica Diaz, Jorge Perez, Isaque Alves, Fabio Kon, Leonardo Leite, Paulo Meirelles, Carla Rocha
Summary: This paper presents empirical research on the structure of DevOps teams in software-producing organizations to better understand the organizational structure and characteristics of teams adopting DevOps. A theory of DevOps taxonomies is built through analysis, and its consistency with other taxonomies is tested.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Sinan Sigurd Tanilkan, Jo Erskine Hannay
Summary: When deciding to develop new software, it is important to have a clear understanding of the intended benefits. However, our research shows that stakeholders' understanding of benefits often fluctuates during the development process, leading to uncertainty. Therefore, we recommend focusing on helping practitioners embrace changes in their understanding of benefits.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang
Summary: This paper presents an approach that combines static analysis tools and manual audits to effectively detect various types of security vulnerabilities. By using a special Petri net representation, the proposed method is able to assist in the detection of taint-style vulnerabilities.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Edgar Sarmiento-Calisaya, Julio Cesar Sampaio do Prado Leite
Summary: This research introduces an automated requirements analysis approach that combines natural language processing, Petri-nets, and visualization techniques to improve the quality of scenario-based specifications, identify defects, and anticipate inconsistencies.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Jian Hu
Summary: This paper proposes a two-stage trace matrix optimization method for fault localization, which addresses the challenges of coincidental correctness and data imbalance in the current trace matrix. Through extensive experiments, significant improvements in fault localization effectiveness are demonstrated.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Fan Zhang, Manman Peng, Yuanyuan Shen, Qiang Wu
Summary: This study proposes a novel method called HFEDR that utilizes the hierarchical features of Transformer models and reorganizes training data to improve code search performance. Experimental results demonstrate the effectiveness and rationality of the proposed approach.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Tong Wang, Bixin Li
Summary: Software architecture erosion has a negative impact on software quality, performance, and evolution cost. This paper proposes an approach called EsArCost to locate the causes of architecture erosion and estimate the repair cost of each erosion problem. Experimental results show that EsArCost can effectively and efficiently estimate repair costs.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Xiajing Wang, Rui Ma, Wei Huo, Zheng Zhang, Jinyuan He, Chaonan Zhang, Donghai Tian
Summary: This paper proposes a new potential-aware fuzzing scheme called SYNTONY that measures seed potential using multiple objectives and prioritizes promising seeds to increase the number of unique crashes and coverage. Experimental results show that SYNTONY outperforms other fuzzing tools and has high compatibility and expansibility.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Stefano Lambiase, Gemma Catolino, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Willem-Jan van den Heuvel, Filomena Ferrucci
Summary: This paper contributes to the existing body of knowledge on factors affecting productivity in software development by studying the cultural and geographical dispersion of a development community. The results show that cultural and geographical dispersion significantly impact productivity, suggesting that managers and practitioners should consider these aspects throughout the software development lifecycle.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Elaine Venson, Bradford Clark, Barry Boehm
Summary: The software industry has been under pressure to adopt security practices and reduce software vulnerabilities. This study quantifies the effort required to develop secure software in increasing levels of rigor and scope and provides validated cost multipliers for practitioners to estimate proper resources for adopting security practices.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Yangyang Zhao, Mingyue Jiang, Yibiao Yang, Yuming Zhou, Hanjie Ma, Zuohua Ding
Summary: Previous studies have ignored the potential associations between modules involved in the same defect, and this comprehensive study explores the implications of intra-defect associations for defect prediction. The majority of defects occur across functions, with implicit dependencies between the modules. By considering intra-defect associations and merging modules, the proposed data processing approach significantly improves defect prediction performance.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Meira Levy, Irit Hadar
Summary: This research sheds new light on how students learn and practice hybrid work in educational settings through two educational studies. The findings show the benefits of new educational programs in fostering empathy and innovation among students, while also highlighting the challenges and opportunities in addressing real challenges.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)