- Advanced Software Engineering Methodologies
- Software Engineering Research
- Software System Performance and Reliability
- Service-Oriented Architecture and Web Services
- Mobile Health and mHealth Applications
- Software Reliability and Analysis Research
- Model-Driven Software Engineering Techniques
- Business Process Modeling and Analysis
- Software Engineering Techniques and Practices
- Microbial Metabolic Engineering and Bioproduction
- Advanced Control Systems Optimization
- Ergonomics and Human Factors
- BIM and Construction Integration
- Open Source Software Innovations
- Ergonomics and Musculoskeletal Disorders
- Spreadsheets and End-User Computing
- Semantic Web and Ontologies
- Privacy, Security, and Data Protection
- Scheduling and Optimization Algorithms
- Distributed systems and fault tolerance
- Digital and Cyber Forensics
- Process Optimization and Integration
- Digital Mental Health Interventions
- Viral Infectious Diseases and Gene Expression in Insects
- Privacy-Preserving Technologies in Data
Karlstad University
2016-2024
Technische Universität Berlin
2010-2017
University of Limerick
2014-2015
Lero
2015
Clausthal University of Technology
2007-2014
RWTH Aachen University
2007
Digital Health (DH) is widely considered essential for sustainable future healthcare systems. Software quality, particularly usability, crucial the success and adoption of most DH products. However, concerns about effectiveness efficiency testing usability products have been raised. This article aims to analyse prevalence application contexts evaluation methods in highlight potential issues related their efficiency. A systematic literature review studies, published by (academic)...
Architecture Consistency (AC) aims to align implemented systems with their intended architectures. Several AC approaches and tools have been proposed empirically evaluated, suggesting favourable results. In this paper, we examine the state of practice respect Consistency, through interviews nineteen experienced software engineers. Our goal is identify 1) any practises that companies these architects work for, currently undertake achieve AC; 2) barriers undertaking explicit in companies; 3)...
Context: Facing the implementation of EU General Data Protection Regulation in May 2018, many commercial software providers will soon need to adapt their products new privacy-related constraints. Privacy patterns defined for different aspects engineering process promise be a useful concept this task. In situation, it seems valuable characterize state research related privacy patterns.Objective: To identify, and classify contributions made by published results context considering concerns...
Software architecture degradation is a phenomenon that frequently occurs during software evolution. Source code anomalies are one of the several aspects potentially contribute to degradation. Many techniques for automating detection such based on source metrics. It is, however, unclear how accurate these in identifying architecturally relevant system. The objective this paper shed light extent which metrics their own can be used characterize classes contributing We performed multi-case study...
Modern enterprise application systems are parts of complex IT landscapes. The architecture such a landscape may impose constraints upon the design single applications, for example by mandatory use enterprise-wide reference architectures. It is great importance sake smooth operation and easy maintaining that applications com-pliant to Checking this compliance highly important management assure quality systems. Unfortunately, current tool support not flexible enough easily check different...
Reference architecture can help in enterprise management to develop and operate standardized maintainable software landscapes. Similar the architectures of single systems, however, they are threatened by erosion, i.e. continuous divergence between intended their actual realizations. Architecture erosion has negative effects on maintainability systems other quality attributes. In this paper, we report application a rule-based conformance checking approach an industrial case study which...
Theory suggests that software development may benefit from applying architecture consistency checking and hence, academics have focused on this area. In such circumstances it is important to characterize the overall focus of field, in order assess actual impact research work carried out date, identifying where researchers are placing their effort which sub-topics being neglected. doing so a map provided for allowing them relevant gaps avoiding saturated sub-topics, deliver results academia...
Ultra-Large-Scale Systems are considered to be the new system generation. For these systems current development approaches not well suited, since they do scale for large systems. One view onto such is see them as IT Ecosystems comparable complex ecosystems from nature and biology. We will present an example a system, smart city. Furthermore, we challenges that arise engineering operating Ecosystems.
The software architecture of systems often imposes constraints upon the design and implementation a system, for example how components are logically grouped or they may interact. It is great importance sake maintainability smooth operation system that its compliant to intended architecture. Due complexity today's diversity those constraints, guaranteeing compliance by manual checks impossible. Unfortunately, current tool support not flexible enough easily check different aspects...
Today's software-intensive systems are among the most complex artifacts created by men. This is due to ever increasing requirements and functionality of software on one hand, rising structural complexity with respect size, interconnectedness, distribution other hand. Engineering controlling these pushes existing engineering approaches (and beyond) their limits [1]. paper describes concept IT ecosystems as a new approach for addressing this challenge from perspective engineering. The...
Spreadsheets are commonly used to inform decision making across many business sectors, despite the fact that research performed in financial sector has shown they quite error-prone. However, few studies have investigated spreadsheet errors and their impact other domains, like healthcare sector. This article derives a lifecycle-stage classification scheme of error types based on an aggregation of, extension existing classifications. Based these classifications, case study is then presented,...
Expert software engineers working on large systems often need to perform feature location when moving work in unfamiliar areas. We hypothesise that leveraging the system-specific knowledge of these nomads may help improve semi-automated techniques. In order assess and understand how manual searches, two expert professional were observed in-vivo following a think-aloud protocol while performing large-scale heterogeneous system. The nomads' search actions found be around twice as effective...
There exist techniques that attempt to automate the mapping step in Reflexion Modelling, a popular software architecture consistency checking method. However, most of these require an initial set pre-mapped entities order execute automated mapping. This study proposes interactive technique is able without need for entities. Using some minimal documentation, utilises information retrieval concepts applied software's codebase recommend mappings between source code and its architectural...
Reflexion Modelling is a successful method used in industry for Software Architectural Consistency Checking (SACC). However, it includes mapping step that manual and tedious, especially large complex systems. Various studies have shown how to successfully automate the interactive of basic units software's codebase, i.e. its classes, architecture modules. their inherent drawback effort required by an architect review recommendations produced, whether during occurs or at end mapping, can be...
Reflexion Modelling is a popular method used in industry for Software Architectural Consistency Checking (SACC). However, it involves mapping step that manual and tedious. There exist techniques tools attempt to automate mapping, yet they are either limited their approach or require an initial set of manually pre-mapped entities. This study proposes novel technique, InMap, improves the process reflexion modelling by both providing versatility eliminating constraint needing entities order...
Expert software engineers working on large systems often need to perform feature location when moving work in unfamiliar areas. We hypothesise that leveraging the system-specific knowledge of these may help improve semi-automated techniques. In order assess and understand how nomads manual searches, two expert professional were observed in-vivo following a think-aloud protocol while performing large-scale heterogeneous system. The nomads' search actions found be around twice as effective...
Reflexion Modelling is a well-understood technique to detect architectural violations that occur during software architecture erosion. Resolving these can be difficult when erosion has reached critical level and the causes of are interwoven understand. This article outlines novel automatically typical in reflexion models, based on definition detection symptoms for causes. Preliminary results show proposed support architects' navigation through models eroded systems understand systematically...
Detecting software architecture erosion is an important task during the development and maintenance of systems. Even in model-driven approaches which consistency between artifacts can partially be established by construction issues have been intensively investigated, intended its realization may diverge with negative effects on quality. In this article, we describe approach to flexible detection for approaches. Consistency constraints expressed architectural aspects called rules are...
Context: Several studies suggest that there is a relation between code smells and architecture degradation. They claim classes, which have degraded architecture-wise, can be detected on the basis of smells, at least if these are manually identified in source code.