𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Software Technologies: 16th International Conference, ICSOFT 2021, Virtual Event, July 6–8, 2021, Revised Selected Papers (Communications in Computer and Information Science)

✍ Scribed by Hans-Georg Fill (editor), Marten van Sinderen (editor), Leszek A. Maciaszek (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
245
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 16th International Conference on Software Technologies, ICSOFT 2021, Virtual Event, July 6–8, 2021. The conference was held virtually due to the COVID-19 crisis.
The 10 full papers included in this book were carefully reviewed and selected from 117 submissions.

✦ Table of Contents


Preface
Organization
Contents
Linked Data as Medium for Stigmergy-based Optimization and Coordination
1 Introduction
2 Related Work
3 Background
3.1 Resource-oriented Architectures
3.2 Linked Data Systems
3.3 Stigmergic Media
4 Linked Data as Digital Stigmergic Medium
4.1 Requirements for (Digital) Stigmergic Media
4.2 Linked Data as Stigmergic Medium
5 Optimization: Minimize Open Stacks Example
5.1 The Minimize Number of Open Stacks Problem
5.2 Medium Model
5.3 Agent Models
5.4 Evaluation
5.5 Implementation
6 Coordination: Make-to-Order Production
6.1 Domain Model
6.2 Algorithm and Agent Models
6.3 Evaluation
6.4 Implementation
7 Conclusion and Future Work
References
Object Parsing Expressions for Unplanned, Unmodified, and Incremental Grammar Reuse
1 Introduction
2 Background
2.1 Parsing Expressions
2.2 Parsing to Objects: Abstraction Mismatches
3 Advanced Object Parsing Expressions
3.1 Basics
3.2 Multi-valued Properties
3.3 Non-positional Parsing
4 Composing Parsing Expressions
4.1 On Composition Operations
4.2 Merges and Transforms
4.3 Application (ex.): Syntax Unification
5 Design and Implementation
5.1 Packrat Parsing
5.2 DjDSL
6 Discussion
7 Related Work
8 Concluding Remarks
References
A Methodology for Organizational Data Science Towards Evidence-based Process Improvement
1 Introduction
2 Methodological Dimension of the PRICED Framework
2.1 Static View
2.2 Dynamic View
3 PRICED Dimensions Supporting the Methodology
3.1 Process and Data Integration Approach
3.2 Business Process and Organizational Data Quality Model
3.3 Business Process Compliance Requirements Model
3.4 Integrated Process and Data Mining Approach
4 Applications of the Methodology
4.1 Students Mobility BP with Organizational Data Extension
4.2 Passport Request BP with Collaborative Extension
5 Related Work
6 Conclusions
References
Feedback Generation forΒ Automatic User Interface Design Evaluation
1 Introduction
2 Related Work
3 Techniques forΒ theΒ Automatic UI Design Evaluation
3.1 Automatic Usability Evaluation
3.2 UI Design Principles forΒ theΒ Automatic Usability Evaluation
4 FENIKS
4.1 Models
4.2 FENIkS Feedback
4.3 Implementation
5 Evaluation
5.1 Experimental Evaluation
5.2 Discussion
6 Conclusions
References
Tales from the Code #2: A Detailed Assessment of Code Refactoring's Impact on Energy Consumption
1 Introduction
2 Experimental Protocol
2.1 Hardware Environment
2.2 Projects Under Study
2.3 Methodology and Tools
3 Refactoring Impact Analysis
4 Refactoring Rules Impact
4.1 Software Energy Consumption Evolution
5 Related Work
6 Conclusion
References
Towards Power Consumption Optimization for Embedded Systems from a Model-driven Software Development Perspective
1 Introduction
2 Background and Related Work
3 Methodology and Tools
4 Hardware Component Models
4.1 Formal Definition of Hardware Component Models
4.2 Integration into the Software Model Domain
5 Power Analysis Profile (PAP)
6 Model Transformation
7 Model-Driven Development Workflow Integration
8 Evaluation
8.1 Development
8.2 Simulation
8.3 Analysis
9 Discussion
10 Conclusion
References
Materializing Microservice-oriented Architecture from Monolithic Object-oriented Source Code
1 Introduction
2 The Migration Towards an MSA: A Two-step Problem
2.1 Motivating Example: Information Screen
2.2 Microservice-based Architecture Recovery
2.3 OO Source Code Transformation Towards an MSA One
3 MonoToMicro: A Semi-automated Refactoring Approach
3.1 Detecting Encapsulation Violations
3.2 Healing Encapsulation Violations
3.3 Packaging and Deployment of an MSA
4 Explicit Encapsulation Violation Resolution
4.1 Attribute Access
4.2 Method Invocation
4.3 Instance Handling
5 Implicit Encapsulation Violation Resolution
5.1 Inheritance Relationship
5.2 Source Code Transformation to Heal Exception Throwing and Catching Violations
6 Violation Resolution Order
7 Evaluation
7.1 Data Pre-processing: Microservice Identification
7.2 Research Questions and Their Methodologies
7.3 Results
7.4 Threats to Validity
8 Related Work
8.1 Microservice-based Architecture Recovery
8.2 Transformation Towards a Microservice-oriented Application
9 Conclusion
References
A Personalized Code Formatter: Detection and Fixing
1 Introduction
2 Related Work
3 System Design
3.1 User Dataset
3.2 Tokenizer and Vectorizer
3.3 Model Generation
3.4 Snippet Scoring
3.5 Possible Fixes
3.6 Fixes Suggestion
4 Evaluation
4.1 Detection Evaluation
4.2 Application of Formatting Error Fixing in Practice
5 Threats to Validity
6 Conclusions and Future Work
References
Software Framework of Context-Aware Reconfigurable Secure Smart Grids
1 Introduction
2 Related Works
2.1 Context-Awareness and Smart Grids
2.2 Context-Awareness Frameworks
2.3 Discussion
3 Enhanced Software Framework
3.1 Reconfiguration Layer
3.2 Context Control Layer
3.3 Services Layer
3.4 Communication Layer
4 Application
4.1 Case Study Presentation
4.2 Settings Preparation
4.3 Use Case Scenario
5 Results and Discussions
6 Conclusions and Outlook
References
A Novel Neural Network-Based Malware Severity Classification System
1 Introduction
2 Related Work
2.1 Malware Classification
2.2 Severity Ranking
3 Problem Definition
4 Methodology
4.1 Function Representation Learning
4.2 Discriminative Function Clustering
4.3 Function Clone Search
4.4 Feature Vector Formation
4.5 Feed-Forward Neural Network Classification
5 Experiments
5.1 Dataset
5.2 Malware Classification Methods for Comparison
5.3 Experiment Settings
5.4 Results
5.5 Classification Result Interpretation
6 Discussions
7 Conclusion
References
Author Index


πŸ“œ SIMILAR VOLUMES


Software Technologies: 16th Internationa
✍ Hans-Georg Fill (editor), Marten van Sinderen (editor), Leszek A. Maciaszek (edi πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 16th International Conference on Software Technologies, ICSOFT 2021, Virtual Event, July 6–8, 2021. TheΒ conference was held virtually due to the COVID-19 crisis.<br>The 10 full papers included in this book were carefully reviewed and select

Software Technologies: 15th Internationa
✍ Marten van Sinderen (editor), Leszek A. Maciaszek (editor), Hans-Georg Fill (edi πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Software Technologies, ICSOFT 2020, which was held virtually due to the Covid-19 pandemic. <br>The 12 revised full papers were carefully reviewed and selected from 95 submissions. The papers deal

Software Technologies: 17th Internationa
✍ Hans-Georg Fill (editor), Marten van Sinderen (editor), Leszek A. Maciaszek (edi πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<span>This book includes extended and revised versions of a set of selected papers from the 17th International Conference on Software Technologies, ICSOFT 2022, held in Lisbon, Portugal, during July 11–13, 2022. <br><br>The 10 full papers included in this book were carefully reviewed and selected fr

E-Business and Telecommunications: 18th
✍ Pierangela Samarati (editor), Marten van Sinderen (editor), Sabrina De Capitani πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<span>The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.<br>The 17 full papers includ

Information, Communication and Computing
✍ Mahua Bhattacharya (editor), Latika Kharb (editor), Deepak Chahal (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

This book constitutes the refereed proceedings of the 6th International Conference on Information, Communication and Computing Technology, ICICCT 2021, held in New Delhi, India, in May 2021.<p>The 16 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 83

Information, Communication and Computing
✍ Mahua Bhattacharya (editor), Latika Kharb (editor), Deepak Chahal (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 6th International Conference on Information, Communication and Computing Technology, ICICCT 2021, held in New Delhi, India, in May 2021.</span><p><span>The 16 full papers and 4 short paper presented in this volume were carefully reviewed an