-
Article
Open AccessMachine learning experiment management tools: a mixed-methods empirical study
Machine Learning (ML) experiment management tools support ML practitioners and software engineers when building intelligent software systems. By managing large numbers of ML experiments comprising many differe...
-
Article
Open AccessChecking security compliance between models and code
It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intend...
-
Chapter and Conference Paper
Finding the Right Way to Rome: Effect-Oriented Graph Transformation
Many applications of graph transformation require rules that change a graph without introducing new consistency violations. When designing such rules, it is natural to think about the desired outcome state, i....
-
Article
Open AccessSoftware variability in service robotics
Robots artificially replicate human capabilities thanks to their software, the main embodiment of intelligence. However, engineering robotics software has become increasingly challenging. Developers need exper...
-
Article
Open AccessA fine-grained data set and analysis of tangling in bug fixing commits
Tangled commits are changes to software that address multiple concerns at once. For researchers interested in bugs, tangled commits mean that they actually study not only bugs, but also other concerns irreleva...
-
Article
Open AccessEffects of variability in models: a family of experiments
The ever-growing need for customization creates a need to maintain software systems in many different variants. To avoid having to maintain different copies of the same model, developers of modeling languages ...
-
Chapter
Family-Based Fingerprint Analysis: A Position Paper
Thousands of vulnerabilities are reported on a monthly basis to security repositories, such as the National Vulnerability Database. Among these vulnerabilities, software misconfiguration is one of the top 10 s...
-
Article
Open AccessApplying MDD in the content management system domain
Content management systems (CMSs) such as Joomla and WordPress dominate today’s web. Enabled by standardized extensions, administrators can build powerful web applications for diverse customer demands. However...
-
Article
Open AccessA semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness requirements are no exception. Importantly, undetected conflicts between such requirements can lead to severe effects, ...
-
Chapter and Conference Paper
Graph Consistency as a Graduated Property
Where graphs are used for modelling and specifying systems, consistency is an important concern. To be a valid model of a system, the graph structure must satisfy a number of constraints. To date, consistency ...
-
Article
Model clone detection for rule-based model transformation languages
Cloning is a convenient mechanism to enable reuse across and within software artifacts. On the downside, it is also a practice related to severe long-term maintainability impediments, thus generating a need to...
-
Chapter
Maintaining Security in Software Evolution
In this chapter, we introduce a three-layered framework for maintaining security in software evolution at design time and run time. Additionally, we present a suite of five approaches that employ the framework...
-
Chapter and Conference Paper
Exploring Conflict Reasons for Graph Transformation Systems
Conflict and dependency analysis (CDA) is a static analysis for the detection of conflicting and dependent rule applications in a graph transformation system. Recently, granularity levels for conflicts and dep...
-
Article
VMTL: a language for end-user model transformation
Model transformation is a key enabling technology of Model-Driven Engineering (MDE). Existing model transformation languages are shaped by and for MDE practitioners—a user group with needs and capabilities whi...
-
Chapter and Conference Paper
Taming Multi-Variability of Software Product Line Transformations
Software product lines continuously undergo model transformations, such as refactorings, refinements, and translations. In product line transformations, the dedicated management of variability can help to cont...
-
Chapter
Initial Conflicts and Dependencies: Critical Pairs Revisited
Considering a graph transformation system, a critical pair represents a pair of conflicting transformations in a minimal context. A conflict between two direct transformations of the same structure occurs if o...
-
Chapter and Conference Paper
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models
Detecting conflicts between security and data-minimization requirements is a challenging task. Since such conflicts arise in the specific context of how the technical and organizational components of the targe...
-
Article
What Can Transcranial Alternating Current Stimulation Tell Us About Brain Oscillations?
Transcranial alternating current stimulation (tACS) allows to interfere with oscillatory brain activity. Here, we provide an overview of novel approaches for removing the tACS artefact to elucidate the mechani...
-
Chapter and Conference Paper
Differencing of Model Transformation Rules: Towards Versioning Support in the Development and Maintenance of Model Transformations
With model transformations arising as primary development artifacts in Model-driven Engineering, dedicated tools supporting the development and maintenance of model transformations are strongly required. Calcu...
-
Chapter and Conference Paper
Iterative Model-Driven Development of Software Extensions for Web Content Management Systems
Dynamic web applications powered by Web Content Management Systems (WCMSs) such as Joomla, WordPress, or Drupal dominate today’s web. A main advantage of WCMSs is their functional extensibility by standardized...