The presentation I gave at the ICSE 2009 doctoral consortium. Squeezing 3 years of work in a 10 minutes presentation is definitely a valuable exercise.
Searching for Key Stakeholders in Large-Scale Software ProjectsSoo Ling Lim
This document presents a method for identifying key stakeholders in large-scale software projects. It involves building a social network of stakeholders through recommendations and then eliciting requirements from stakeholders. Stakeholder influence is determined using social network measures and ratings of requirement importance. A genetic algorithm is used to search for weights that can better determine real stakeholder influence compared to existing measures alone. The method was evaluated on a real-world dataset and was able to prioritize stakeholders and requirements more accurately than social network measures.
We use AppEco to simulate Apple’s iOS app ecosystem and investigate the effectiveness of common publicity strategies such as viral marketing, mass broadcast, targeted broadcast, and recurring broadcast, having your apps appear on the top apps chart, and having your apps appear on the new apps chart.
The document presents a study on using social networks to analyze stakeholders of large-scale software projects. It describes a method called StakeNet that builds a stakeholder network by finding initial stakeholders, getting recommendations from them, and drawing the social network. It then applies network measures to identify and prioritize stakeholder roles and individuals. The study evaluated StakeNet on a university access control project, finding it identified roles with high precision and stakeholders with higher accuracy than an existing method. StakeNet was also more accurate than considering individuals, and closed recommendations outperformed open recommendations.
User Requirements in Audiovisual Search: a Quantitative Approachroelandordelman.nl
This document discusses using a quantitative approach to understand user requirements for audiovisual search. Researchers conducted interviews and sorting/rating exercises with professionals, researchers, and home users to generate statements about desired search features. These statements were categorized and rated for desirability. The results showed clear interest from users in advanced search options using multiple metadata sources. Users also wanted segment-level access to audiovisual content through annotations and a system that is clear, transparent, and smoothly functioning. The quantitative concept mapping approach provided insights into differences between user groups to help guide development of specialized audiovisual search tools.
Jan-Erik Sandberg - Succeeding with Large Scale AgileAgile Lietuva
Implementing Agile in small, short lived projects is easy. The real challenge comes when the project becomes long-running, and it gets even harder when spanning into multiple large projects. Add the challenge of distribution of resources and different cultures and it becomes almost impossible.
Jan-Erik Sandberg is an international veteran on successfully implementing Agile in large organizations. You will get insights into some of his hard earned experiences and this hour will be packed with proven techniques and real life examples. The goal of the session is to help you to reduce risk and increase your chances of succeeding with implementing agile at a large scale. Project and product-developments that utilize offshore resources will be the main focus for this session.
Eliciting Requirements for Search based Requirements PrioritisationSoo Ling Lim
The document discusses methods for eliciting requirements from stakeholders in large software projects. It proposes building a social network of stakeholders (StakeNet) to identify key stakeholders and their relationships. It then describes using stakeholders' social network measures and ratings of requirements to predict other requirements they may want (StakeRare). Finally, it discusses using multiple objectives optimization algorithms to find optimal solutions balancing ratings from many stakeholders but notes challenges with large numbers of stakeholders.
Searching for Key Stakeholders in Large-Scale Software ProjectsSoo Ling Lim
This document presents a method for identifying key stakeholders in large-scale software projects. It involves building a social network of stakeholders through recommendations and then eliciting requirements from stakeholders. Stakeholder influence is determined using social network measures and ratings of requirement importance. A genetic algorithm is used to search for weights that can better determine real stakeholder influence compared to existing measures alone. The method was evaluated on a real-world dataset and was able to prioritize stakeholders and requirements more accurately than social network measures.
We use AppEco to simulate Apple’s iOS app ecosystem and investigate the effectiveness of common publicity strategies such as viral marketing, mass broadcast, targeted broadcast, and recurring broadcast, having your apps appear on the top apps chart, and having your apps appear on the new apps chart.
The document presents a study on using social networks to analyze stakeholders of large-scale software projects. It describes a method called StakeNet that builds a stakeholder network by finding initial stakeholders, getting recommendations from them, and drawing the social network. It then applies network measures to identify and prioritize stakeholder roles and individuals. The study evaluated StakeNet on a university access control project, finding it identified roles with high precision and stakeholders with higher accuracy than an existing method. StakeNet was also more accurate than considering individuals, and closed recommendations outperformed open recommendations.
User Requirements in Audiovisual Search: a Quantitative Approachroelandordelman.nl
This document discusses using a quantitative approach to understand user requirements for audiovisual search. Researchers conducted interviews and sorting/rating exercises with professionals, researchers, and home users to generate statements about desired search features. These statements were categorized and rated for desirability. The results showed clear interest from users in advanced search options using multiple metadata sources. Users also wanted segment-level access to audiovisual content through annotations and a system that is clear, transparent, and smoothly functioning. The quantitative concept mapping approach provided insights into differences between user groups to help guide development of specialized audiovisual search tools.
Jan-Erik Sandberg - Succeeding with Large Scale AgileAgile Lietuva
Implementing Agile in small, short lived projects is easy. The real challenge comes when the project becomes long-running, and it gets even harder when spanning into multiple large projects. Add the challenge of distribution of resources and different cultures and it becomes almost impossible.
Jan-Erik Sandberg is an international veteran on successfully implementing Agile in large organizations. You will get insights into some of his hard earned experiences and this hour will be packed with proven techniques and real life examples. The goal of the session is to help you to reduce risk and increase your chances of succeeding with implementing agile at a large scale. Project and product-developments that utilize offshore resources will be the main focus for this session.
Eliciting Requirements for Search based Requirements PrioritisationSoo Ling Lim
The document discusses methods for eliciting requirements from stakeholders in large software projects. It proposes building a social network of stakeholders (StakeNet) to identify key stakeholders and their relationships. It then describes using stakeholders' social network measures and ratings of requirements to predict other requirements they may want (StakeRare). Finally, it discusses using multiple objectives optimization algorithms to find optimal solutions balancing ratings from many stakeholders but notes challenges with large numbers of stakeholders.
A Java-Compatible Multi-Thread Middleware for an Experimental Wireless Sensor...paperpublications3
Abstract: The software development for the Wireless Sensor Networks is complicated. Mainly by the programming languages and tools existing for it, which are unconventional to the well-known for the PC system developments. However, the use of middleware helps to this activity, increasing the abstraction level existing in the platform and making possible only think about the software requirements to the programmer. The present work describes the implementation of a multi-thread middleware which adopts the Java programming language and its standard class library for the threads programming. Helped by a Java RT kernel which complies with the Java Real-Time Specification Group. Also is reported the optimization for a better performance in the Java byte code interpretation.
A Java-Compatible Multi-Thread Middleware for an Experimental Wireless Sensor...paperpublications3
Abstract: The software development for the Wireless Sensor Networks is complicated. Mainly by the programming languages and tools existing for it, which are unconventional to the well-known for the PC system developments. However, the use of middleware helps to this activity, increasing the abstraction level existing in the platform and making possible only think about the software requirements to the programmer. The present work describes the implementation of a multi-thread middleware which adopts the Java programming language and its standard class library for the threads programming. Helped by a Java RT kernel which complies with the Java Real-Time Specification Group. Also is reported the optimization for a better performance in the Java byte code interpretation.
This document discusses seeing software through visualization. It begins by discussing how humans are visual beings and process most information visually through their eyes and brain. It then discusses the different types of memory humans use to process visual information, including iconic memory which briefly retains visual information, and short-term memory which acts as a working memory. The document suggests that seeing and visualizing are important for understanding software systems.
The document describes an instructional operating system called Nachos that was developed for teaching undergraduate operating systems courses. Some key points:
- Nachos simulates a RISC CPU and devices to allow students to modify an operating system kernel without needing physical hardware. It runs as a UNIX process.
- The assignments guide students through implementing core OS functionality like threads, file systems, multiprogramming, and networking. This allows students to build their understanding of modern operating system concepts through hands-on projects.
- Nachos emphasizes simplicity over realism so students can understand the entire system. The authors found simplicity was important for students to grasp concurrency and other challenging OS concepts.
The document describes an instructional operating system called Nachos that was developed for teaching undergraduate operating systems concepts. Some key points:
- Nachos simulates a RISC CPU and devices to allow students to modify an operating system kernel as a project. It runs as a UNIX process for simplicity.
- There are 5 main assignments that cover thread management, file systems, multiprogramming, virtual memory, and networking. Each builds on concepts from previous assignments.
- The goal was to create a simple yet realistic system that illustrates modern OS techniques and allows quantitative evaluation of design tradeoffs through benchmarks.
The document describes the Nachos Instructional Operating System, which was developed at UC Berkeley to teach operating systems concepts to undergraduate students. Nachos simulates a RISC CPU and network of workstations running as a UNIX process. It uses modern techniques like threads and remote procedure calls. Students complete assignments that have them implement and improve core OS functionality like threading, file systems, virtual memory and networking in a simplified way. The goal is to illustrate key concepts while keeping the code understandable for students within a semester. Nachos has been used successfully in Berkeley's undergraduate OS course.
Stefane Fermigier is the Chairman and Founder of Nuxeo, an open source ECM software company established in 2000. Nuxeo EP 5.2 is a full-featured software platform for ECM that provides many new features such as content annotations, content preview, and a visible content store. Nuxeo has many customers including media companies and partners some of whom were featured in case studies such as AFP.
Duc M. Le is a PhD candidate in computer science at USC studying software architecture and mining software repositories. He has experience in software design, development, and data mining. His research focuses on analyzing architectural changes in open source software systems and predicting potential bugs. He has worked as an intern at several companies including NEC Labs, Veritas, and Samsung Research America.
1) UCD-Generator is an application that uses natural language processing to automatically generate use case diagrams from plain English requirements.
2) It analyzes the text using LESSA, which performs tokenization, part-of-speech tagging, and meaning understanding to extract actors, actions, and objects.
3) It then generates use case diagrams in two phases - first extracting information, then drawing the diagrams based on that information. Experiments showed it could accurately generate diagrams for 85% of scenarios.
IRJET- Extension to Visual Information Narrator using Neural NetworkIRJET Journal
The document describes a proposed extension to a visual information narrator application using neural networks. The researchers developed an Android application that can generate image captions on inexpensive mobile hardware in real-time for visually impaired users. They trained an image captioning model using TensorFlow on the FLICKR dataset and implemented the model in an Android app to demonstrate real-world applicability and optimizations for low-cost hardware performance. The system uses an encoder-decoder neural network architecture that encodes an input image into a fixed-length vector using a convolutional neural network, then decodes the vector into a natural language description.
Share the architecture through multiple views to address different stakeholder needs. Document key architectural layers, components, interfaces and how the system addresses functional and non-functional requirements. Present architectural principles, constraints, and how the design maps to deployment and operations. Socialize the architecture through various channels to build understanding and gather feedback.
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...IDES Editor
For a long ago, world of digital design has spread
out in the many major and a lot of logics, approaches, and
theories has been proposed. The digital emerges as a solution
of a daily-life need and applicable on such technology from
the developing devices until software-based. All of the designs
has a significant point on the spesification, integration, and
optimization. The designers have been trying to make a good
designs on both hardware and software, latest both
combinations have been known as the basic idea of hardware/
software co-design. The state-of-the art computer is very
interesting to research because of its implementation can
make changes of the cycle of reconfigurable objects. This paper
presents a comparison of the two role plays in reconfigurable
devices especially FPGA-based, i.e. Altera and Xilinx. The
idea is that of a simple compiler has a good performance designs
for synthesizing Very high speed integrated circuit Hardware
Description Language (VHDL) code as well as the other
complexity software that more powerful. So, this paper
proposes such method as interoperability for reconfiguring
devices to get the point why few of the standard VHDL code
can’t be synthesised in the different compiler of VHDL code
between Xilinx and Altera. The project of compiler softwares
that is observed from Xilinx is ISE and from Altera is Max+Plus
II. Max+Plus II is a low-cost software than ISE Xilinx, although
both Xilinx and Altera devices have a different structure each
other.
Simulations on Computer Network An Improved Study in the Simulator Methodolog...YogeshIJTSRD
This document discusses and compares various network simulation tools. It begins by explaining that network simulators are used to analyze network performance and behavior without real-world implementation. It then categorizes and describes several popular simulators: NS2, NS3, OPNET, OMNeT++, NetSim, QualNet, and J-Sim. For each simulator, it provides details on features, advantages, disadvantages and basic architecture. It concludes by recommending choosing a simulator based on requirements and focusing on analyzing statistical results to validate performance.
The document discusses Cisco's Open Network Environment (ONE) approach to making networks more flexible, programmable, and application-aware. It highlights key aspects of ONE including support for software-defined networking (SDN) and open standards like OpenFlow, as well as network virtualization using technologies like OpenStack and overlay networks. The document also outlines Cisco's vision of providing programmability and automation across different network segments including research, cloud computing, service providers, and enterprises.
This document provides guidance on framework design. It discusses how organizational structure and culture can impact a product. Frameworks should manage dependencies and balance new features with maintaining compatibility. Duplication and unfinished features should be avoided. APIs should be designed based on code samples for key scenarios before defining object models. Simplicity is important and thorough testing and measurement is needed. Framework engineering best practices from Microsoft, Cwalina, and Schmidt are referenced.
This chapter provides an overview of the content and structure of the book. It introduces the main chapters that will focus on tools and programming languages like Linux, shell scripting, sed, awk, perl, MySQL, R, and worked examples. It outlines the prerequisites needed to complete the exercises, which are running Linux, Unix, Mac OS X, or Cygwin. Formatting conventions for the text are also described. Additional online resources that accompany the book are mentioned. The overall aim is to present fundamental concepts and tools for command line programming and data analysis in a practical, example-driven way.
Journal Seminar: Is Singularity-based Container Technology Ready for Running ...Kento Aoyama
1. The study evaluates the performance of running MPI applications in Singularity containers on HPC clouds and local clusters.
2. Experiments were conducted on Chameleon Cloud using Intel Xeon Haswell nodes and a local cluster using Intel Knights Landing nodes.
3. Results show that Singularity incurs less than 8% overhead for MPI point-to-point and collective communications and for HPC applications, demonstrating its potential for efficiently running MPI workloads on HPC clouds and systems.
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
This paper presents an in-house created software application that emulates and virtualizes computer networking laboratory hardware and proprietary equipment on PCs and servers. A user friendly remote laboratory manage system is developed using .NET technology. Through the presented lab management system, the students are able to conduct more than 200 lab assignments covering 10 courses from both lower level routing and switching classes to upper level network management and security classes that demand a large amount of physical equipment and a great number of student lab contact hours prior to the emulated lab. This emulation solution eliminates our dependencies on expensive proprietary networking equipment. It also reduces the burden of system administration. This remote lab has been used and tested in three networking courses. The feedbacks show that the lab delivers similar or better lab experiences for the DE students while the lab construction and maintenance cost is reduced to the minimum.
This document proposes developing a system to display data structures and algorithms in a graphical user interface. It will allow users to visualize changes in data structures as algorithms execute through animated graphical objects. The system will be implemented using the Genesis programming language and JavaFX for the interface. It will follow a MVC design pattern with classes to represent runtime objects, control interaction, and define the interface. This system aims to help novice students learn programming and algorithms visually through manipulating objects.
The document discusses Simplify, a framework for enabling fast functional simulation of multiprocessor system-on-chips (MPSoCs). Simplify uses an abstract MPSoC platform model to allow for easy modeling of MPSoC architectures and fast behavioral simulation. It integrates an operating system and supports tasks migration and communication between processors. Experimental results show that Simplify achieves scalable simulation performance and allows for online design, simulation, and debugging of MPSoCs.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
More Related Content
Similar to Visual Exploration of Large-Scale Evolving Software
A Java-Compatible Multi-Thread Middleware for an Experimental Wireless Sensor...paperpublications3
Abstract: The software development for the Wireless Sensor Networks is complicated. Mainly by the programming languages and tools existing for it, which are unconventional to the well-known for the PC system developments. However, the use of middleware helps to this activity, increasing the abstraction level existing in the platform and making possible only think about the software requirements to the programmer. The present work describes the implementation of a multi-thread middleware which adopts the Java programming language and its standard class library for the threads programming. Helped by a Java RT kernel which complies with the Java Real-Time Specification Group. Also is reported the optimization for a better performance in the Java byte code interpretation.
A Java-Compatible Multi-Thread Middleware for an Experimental Wireless Sensor...paperpublications3
Abstract: The software development for the Wireless Sensor Networks is complicated. Mainly by the programming languages and tools existing for it, which are unconventional to the well-known for the PC system developments. However, the use of middleware helps to this activity, increasing the abstraction level existing in the platform and making possible only think about the software requirements to the programmer. The present work describes the implementation of a multi-thread middleware which adopts the Java programming language and its standard class library for the threads programming. Helped by a Java RT kernel which complies with the Java Real-Time Specification Group. Also is reported the optimization for a better performance in the Java byte code interpretation.
This document discusses seeing software through visualization. It begins by discussing how humans are visual beings and process most information visually through their eyes and brain. It then discusses the different types of memory humans use to process visual information, including iconic memory which briefly retains visual information, and short-term memory which acts as a working memory. The document suggests that seeing and visualizing are important for understanding software systems.
The document describes an instructional operating system called Nachos that was developed for teaching undergraduate operating systems courses. Some key points:
- Nachos simulates a RISC CPU and devices to allow students to modify an operating system kernel without needing physical hardware. It runs as a UNIX process.
- The assignments guide students through implementing core OS functionality like threads, file systems, multiprogramming, and networking. This allows students to build their understanding of modern operating system concepts through hands-on projects.
- Nachos emphasizes simplicity over realism so students can understand the entire system. The authors found simplicity was important for students to grasp concurrency and other challenging OS concepts.
The document describes an instructional operating system called Nachos that was developed for teaching undergraduate operating systems concepts. Some key points:
- Nachos simulates a RISC CPU and devices to allow students to modify an operating system kernel as a project. It runs as a UNIX process for simplicity.
- There are 5 main assignments that cover thread management, file systems, multiprogramming, virtual memory, and networking. Each builds on concepts from previous assignments.
- The goal was to create a simple yet realistic system that illustrates modern OS techniques and allows quantitative evaluation of design tradeoffs through benchmarks.
The document describes the Nachos Instructional Operating System, which was developed at UC Berkeley to teach operating systems concepts to undergraduate students. Nachos simulates a RISC CPU and network of workstations running as a UNIX process. It uses modern techniques like threads and remote procedure calls. Students complete assignments that have them implement and improve core OS functionality like threading, file systems, virtual memory and networking in a simplified way. The goal is to illustrate key concepts while keeping the code understandable for students within a semester. Nachos has been used successfully in Berkeley's undergraduate OS course.
Stefane Fermigier is the Chairman and Founder of Nuxeo, an open source ECM software company established in 2000. Nuxeo EP 5.2 is a full-featured software platform for ECM that provides many new features such as content annotations, content preview, and a visible content store. Nuxeo has many customers including media companies and partners some of whom were featured in case studies such as AFP.
Duc M. Le is a PhD candidate in computer science at USC studying software architecture and mining software repositories. He has experience in software design, development, and data mining. His research focuses on analyzing architectural changes in open source software systems and predicting potential bugs. He has worked as an intern at several companies including NEC Labs, Veritas, and Samsung Research America.
1) UCD-Generator is an application that uses natural language processing to automatically generate use case diagrams from plain English requirements.
2) It analyzes the text using LESSA, which performs tokenization, part-of-speech tagging, and meaning understanding to extract actors, actions, and objects.
3) It then generates use case diagrams in two phases - first extracting information, then drawing the diagrams based on that information. Experiments showed it could accurately generate diagrams for 85% of scenarios.
IRJET- Extension to Visual Information Narrator using Neural NetworkIRJET Journal
The document describes a proposed extension to a visual information narrator application using neural networks. The researchers developed an Android application that can generate image captions on inexpensive mobile hardware in real-time for visually impaired users. They trained an image captioning model using TensorFlow on the FLICKR dataset and implemented the model in an Android app to demonstrate real-world applicability and optimizations for low-cost hardware performance. The system uses an encoder-decoder neural network architecture that encodes an input image into a fixed-length vector using a convolutional neural network, then decodes the vector into a natural language description.
Share the architecture through multiple views to address different stakeholder needs. Document key architectural layers, components, interfaces and how the system addresses functional and non-functional requirements. Present architectural principles, constraints, and how the design maps to deployment and operations. Socialize the architecture through various channels to build understanding and gather feedback.
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...IDES Editor
For a long ago, world of digital design has spread
out in the many major and a lot of logics, approaches, and
theories has been proposed. The digital emerges as a solution
of a daily-life need and applicable on such technology from
the developing devices until software-based. All of the designs
has a significant point on the spesification, integration, and
optimization. The designers have been trying to make a good
designs on both hardware and software, latest both
combinations have been known as the basic idea of hardware/
software co-design. The state-of-the art computer is very
interesting to research because of its implementation can
make changes of the cycle of reconfigurable objects. This paper
presents a comparison of the two role plays in reconfigurable
devices especially FPGA-based, i.e. Altera and Xilinx. The
idea is that of a simple compiler has a good performance designs
for synthesizing Very high speed integrated circuit Hardware
Description Language (VHDL) code as well as the other
complexity software that more powerful. So, this paper
proposes such method as interoperability for reconfiguring
devices to get the point why few of the standard VHDL code
can’t be synthesised in the different compiler of VHDL code
between Xilinx and Altera. The project of compiler softwares
that is observed from Xilinx is ISE and from Altera is Max+Plus
II. Max+Plus II is a low-cost software than ISE Xilinx, although
both Xilinx and Altera devices have a different structure each
other.
Simulations on Computer Network An Improved Study in the Simulator Methodolog...YogeshIJTSRD
This document discusses and compares various network simulation tools. It begins by explaining that network simulators are used to analyze network performance and behavior without real-world implementation. It then categorizes and describes several popular simulators: NS2, NS3, OPNET, OMNeT++, NetSim, QualNet, and J-Sim. For each simulator, it provides details on features, advantages, disadvantages and basic architecture. It concludes by recommending choosing a simulator based on requirements and focusing on analyzing statistical results to validate performance.
The document discusses Cisco's Open Network Environment (ONE) approach to making networks more flexible, programmable, and application-aware. It highlights key aspects of ONE including support for software-defined networking (SDN) and open standards like OpenFlow, as well as network virtualization using technologies like OpenStack and overlay networks. The document also outlines Cisco's vision of providing programmability and automation across different network segments including research, cloud computing, service providers, and enterprises.
This document provides guidance on framework design. It discusses how organizational structure and culture can impact a product. Frameworks should manage dependencies and balance new features with maintaining compatibility. Duplication and unfinished features should be avoided. APIs should be designed based on code samples for key scenarios before defining object models. Simplicity is important and thorough testing and measurement is needed. Framework engineering best practices from Microsoft, Cwalina, and Schmidt are referenced.
This chapter provides an overview of the content and structure of the book. It introduces the main chapters that will focus on tools and programming languages like Linux, shell scripting, sed, awk, perl, MySQL, R, and worked examples. It outlines the prerequisites needed to complete the exercises, which are running Linux, Unix, Mac OS X, or Cygwin. Formatting conventions for the text are also described. Additional online resources that accompany the book are mentioned. The overall aim is to present fundamental concepts and tools for command line programming and data analysis in a practical, example-driven way.
Journal Seminar: Is Singularity-based Container Technology Ready for Running ...Kento Aoyama
1. The study evaluates the performance of running MPI applications in Singularity containers on HPC clouds and local clusters.
2. Experiments were conducted on Chameleon Cloud using Intel Xeon Haswell nodes and a local cluster using Intel Knights Landing nodes.
3. Results show that Singularity incurs less than 8% overhead for MPI point-to-point and collective communications and for HPC applications, demonstrating its potential for efficiently running MPI workloads on HPC clouds and systems.
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
This paper presents an in-house created software application that emulates and virtualizes computer networking laboratory hardware and proprietary equipment on PCs and servers. A user friendly remote laboratory manage system is developed using .NET technology. Through the presented lab management system, the students are able to conduct more than 200 lab assignments covering 10 courses from both lower level routing and switching classes to upper level network management and security classes that demand a large amount of physical equipment and a great number of student lab contact hours prior to the emulated lab. This emulation solution eliminates our dependencies on expensive proprietary networking equipment. It also reduces the burden of system administration. This remote lab has been used and tested in three networking courses. The feedbacks show that the lab delivers similar or better lab experiences for the DE students while the lab construction and maintenance cost is reduced to the minimum.
This document proposes developing a system to display data structures and algorithms in a graphical user interface. It will allow users to visualize changes in data structures as algorithms execute through animated graphical objects. The system will be implemented using the Genesis programming language and JavaFX for the interface. It will follow a MVC design pattern with classes to represent runtime objects, control interaction, and define the interface. This system aims to help novice students learn programming and algorithms visually through manipulating objects.
The document discusses Simplify, a framework for enabling fast functional simulation of multiprocessor system-on-chips (MPSoCs). Simplify uses an abstract MPSoC platform model to allow for easy modeling of MPSoC architectures and fast behavioral simulation. It integrates an operating system and supports tasks migration and communication between processors. Experimental results show that Simplify achieves scalable simulation performance and allows for online design, simulation, and debugging of MPSoCs.
Similar to Visual Exploration of Large-Scale Evolving Software (20)
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
11. research hypothesis
The use of a city
metaphor helps building a
consistent mental model
of software systems.
12. the city metaphor
Richard Wettel, Michele Lanza. Visualizing Software Systems as Cities.
In Proc. of VISSOFT 2007 (4th IEEE International Workshop on Visualizing Software for Understanding and Analysis), pp. 92 - 99, IEEE CS Press, 2007.
13. the city metaphor
class building
package district
Richard Wettel, Michele Lanza. Visualizing Software Systems as Cities.
In Proc. of VISSOFT 2007 (4th IEEE International Workshop on Visualizing Software for Understanding and Analysis), pp. 92 - 99, IEEE CS Press, 2007.
14. the city metaphor
class building
package district
Richard Wettel, Michele Lanza. Visualizing Software Systems as Cities.
In Proc. of VISSOFT 2007 (4th IEEE International Workshop on Visualizing Software for Understanding and Analysis), pp. 92 - 99, IEEE CS Press, 2007.
15. the city metaphor
number of methods (NOM) height
number of attributes (NOA) base size
class building
package district
Richard Wettel, Michele Lanza. Visualizing Software Systems as Cities.
In Proc. of VISSOFT 2007 (4th IEEE International Workshop on Visualizing Software for Understanding and Analysis), pp. 92 - 99, IEEE CS Press, 2007.
16. the city metaphor
number of methods (NOM) height
number of attributes (NOA) base size
class building
package district
nesting level color
Richard Wettel, Michele Lanza. Visualizing Software Systems as Cities.
In Proc. of VISSOFT 2007 (4th IEEE International Workshop on Visualizing Software for Understanding and Analysis), pp. 92 - 99, IEEE CS Press, 2007.
18. Application 1: program comprehension
ArgoUML
~2‘500 classes
~150 packages
Richard Wettel, Michele Lanza. Program Comprehension through Software Habitability.
In Proceedings of ICPC 2007 (15th IEEE International Conference on Program Comprehension), pp. 231 - 240, IEEE Computer Society, 2007.
19. Application 1: program comprehension
massive buildings
ArgoUML
~2‘500 classes
~150 packages
Richard Wettel, Michele Lanza. Program Comprehension through Software Habitability.
In Proceedings of ICPC 2007 (15th IEEE International Conference on Program Comprehension), pp. 231 - 240, IEEE Computer Society, 2007.
20. Application 1: program comprehension
skyscrapers
massive buildings
ArgoUML
~2‘500 classes
~150 packages
Richard Wettel, Michele Lanza. Program Comprehension through Software Habitability.
In Proceedings of ICPC 2007 (15th IEEE International Conference on Program Comprehension), pp. 231 - 240, IEEE Computer Society, 2007.
21. Application 1: program comprehension
skyscrapers
massive buildings
ArgoUML
~2‘500 classes
~150 packages
parking lots
Richard Wettel, Michele Lanza. Program Comprehension through Software Habitability.
In Proceedings of ICPC 2007 (15th IEEE International Conference on Program Comprehension), pp. 231 - 240, IEEE Computer Society, 2007.
22. Application 1: program comprehension
skyscrapers
massive buildings
ArgoUML
~2‘500 classes
houses ~150 packages
parking lots
Richard Wettel, Michele Lanza. Program Comprehension through Software Habitability.
In Proceedings of ICPC 2007 (15th IEEE International Conference on Program Comprehension), pp. 231 - 240, IEEE Computer Society, 2007.
31. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
32. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
33. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
34. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
35. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
36. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
37. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
38. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
39. Application 2: evolution analysis
ArgoUML
8 major releases
~5 years
0.10.1 0.12 0.14 0.16 0.18.1 0.20 0.22 0.24
2002 2003 2004 2005 2006 2007
Richard Wettel, Michele Lanza. Visual Exploration of Large-Scale System Evolution.
In Proceedings of WCRE 2008 (15th Working Conference on Reverse Engineering), pp. 219 - 228, IEEE Computer Society, 2008.
40. Application 3: design assessment
ArgoUML
Richard Wettel, Michele Lanza. Visually Localizing Design Problems with Disharmony Maps.
In Proceedings of Softvis 2008 (4th ACM International Symposium on Software Visualization), pp. 155 - 164, ACM Press, 2008.
41. Application 3: design assessment
ArgoUML
Brain classes 8
God classes 30
Brain & God classes 6
Data classes 17
Richard Wettel, Michele Lanza. Visually Localizing Design Problems with Disharmony Maps.
In Proceedings of Softvis 2008 (4th ACM International Symposium on Software Visualization), pp. 155 - 164, ACM Press, 2008.
42. tool support
Richard Wettel, Michele Lanza. CodeCity: 3D Visualization of Large-Scale Software.
In companion Proceedings of ICSE 2008 (30th International Conference on Software Engineering), Research Demonstration Track, pp. 921 - 922, ACM Press, 2008.
Richard Wettel, Michele Lanza. CodeCity.
In Proceedings of WASDeTT 2008 (1st International Workshop on Advanced Software Development Tools and Techniques), 2008.
43. tool support
Richard Wettel, Michele Lanza. CodeCity: 3D Visualization of Large-Scale Software.
In companion Proceedings of ICSE 2008 (30th International Conference on Software Engineering), Research Demonstration Track, pp. 921 - 922, ACM Press, 2008.
Richard Wettel, Michele Lanza. CodeCity.
In Proceedings of WASDeTT 2008 (1st International Workshop on Advanced Software Development Tools and Techniques), 2008.
Richard Wettel. Scripting 3D Visualizations with CodeCity
In Proceedings of FAMOOSr 2008 (2nd Workshop on FAMIX and Moose in Reengineering), 2008.
44. tool support
http://www.inf.unisi.ch/phd/wettel/ codecity.html
Richard Wettel, Michele Lanza. CodeCity: 3D Visualization of Large-Scale Software.
In companion Proceedings of ICSE 2008 (30th International Conference on Software Engineering), Research Demonstration Track, pp. 921 - 922, ACM Press, 2008.
Richard Wettel, Michele Lanza. CodeCity.
In Proceedings of WASDeTT 2008 (1st International Workshop on Advanced Software Development Tools and Techniques), 2008.
Richard Wettel. Scripting 3D Visualizations with CodeCity
In Proceedings of FAMOOSr 2008 (2nd Workshop on FAMIX and Moose in Reengineering), 2008.
48. current status
Prof. Michele Lanza
advisor
Prof. Matthias Hauswirth
internal member
Prof. Cesare Pautasso
internal member
Prof. André van der Hoek
external member
Prof. Rainer Koschke
external member
49. current status
Prof. Michele Lanza
advisor
Prof. Matthias Hauswirth
internal member
Prof. Cesare Pautasso
internal member
Prof. André van der Hoek
external member
Prof. Rainer Koschke
external member
50. current status: 10 months to go
Prof. Michele Lanza
advisor
Prof. Matthias Hauswirth
internal member
Prof. Cesare Pautasso
internal member
Prof. André van der Hoek
external member
Prof. Rainer Koschke
external member