mdh.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Alternative names
Publications (10 of 33) Show all publications
Čaušević, A. (2018). Appreciate the journey not the destination - Using video assignments in software testing education. CEUR Workshop Proceedings, 2066, 4-7
Open this publication in new window or tab >>Appreciate the journey not the destination - Using video assignments in software testing education
2018 (English)In: CEUR Workshop Proceedings, ISSN 1613-0073, E-ISSN 1613-0073, Vol. 2066, p. 4-7Article in journal (Refereed) Published
Abstract [en]

Courses related to software testing education, at the university level, in most cases have a learning outcome requiring from students to understand and apply a set of test design techniques upon completing the course. The problem, however, remains on how to both effectively and efficiently evaluate if a student has accomplished the stated outcome. By purely looking at the final resulting set of the test cases provided by a student, it is not evident which, if any, test design technique was used to derive them. In this paper, we are presenting a rather simple but effective method of collecting video assignment submissions from students instead of a traditional source code and tests solution. This way, the teacher could rather quickly and in detail gather evidence that student indeed obtained the knowledge needed for passing the stated learning outcome. 

Place, publisher, year, edition, pages
CEUR-WS, 2018
Keywords
Curricula; Students; Teaching, Learning outcome; Source codes; Test case; Test designs; University levels, Software testing
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-38920 (URN)2-s2.0-85044544738 (Scopus ID)
Available from: 2018-04-05 Created: 2018-04-05 Last updated: 2018-04-05Bibliographically approved
Šurković, A., Hanić, D., Lisova, E., Causevic, A., Lundqvist, K., Wenslandt, D. & Falk, C. (2018). Incorporating attacks modeling into safety process. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): . Paper presented at ASSURE, DECSoS, SASSUR, STRIVE, and WAISE 2018 co-located with 37th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2018; Västerås; Sweden; 18 September 2018 through 21 September 2018 (pp. 31-41). Springer Verlag, 11094
Open this publication in new window or tab >>Incorporating attacks modeling into safety process
Show others...
2018 (English)In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag , 2018, Vol. 11094, p. 31-41Conference paper, Published paper (Refereed)
Abstract [en]

Systems of systems (SoS) are built as a collection of systems capable of fulfilling their own function, as well as contributing to other functionalities. They are expected to increase production efficiency and possibly decrease human involvement in harmful environments, and in many cases such systems are safety-critical. For SoS it is a paramount to provide both safety and security assurance. It is not sufficient to analyze and provide assurance of these properties independently due to their mutual connection. Hence, a joint effort addressing safety and security that provides joint guarantees on both properties, is required. In this paper we provide a safety and security assurance argument by incorporating an adversary point of view, and identify potential failures coming from the security domain that might lead to an already identified set of hazards. In this way system assets, vulnerabilities and ways to exploit them can be assessed. As an outcome mitigation strategies coming from security considerations can be captured by the safety requirements. The approach is illustrated on an autonomous quarry.

Place, publisher, year, edition, pages
Springer Verlag, 2018
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 11094
Keywords
Safety engineering, Systems engineering, Increase productions, Mitigation strategy, Potential failures, Safety and securities, Safety requirements, Security considerations, Security domains, Systems of systems, System of systems
National Category
Computer Systems Embedded Systems
Identifiers
urn:nbn:se:mdh:diva-41127 (URN)10.1007/978-3-319-99229-7_4 (DOI)000458807000004 ()2-s2.0-85053870453 (Scopus ID)9783319992280 (ISBN)
Conference
ASSURE, DECSoS, SASSUR, STRIVE, and WAISE 2018 co-located with 37th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2018; Västerås; Sweden; 18 September 2018 through 21 September 2018
Available from: 2018-10-10 Created: 2018-10-10 Last updated: 2019-03-07Bibliographically approved
Bilic, D., Daniel, S., Afzal, W., Wallin, P., Causevic, A. & Amlinger, C. (2018). Model-Based Product Line Engineering in an Industrial Automotive Context: An Exploratory Case Study. In: 1st Intl. Workshop on Variability and Evolution of Software-intensive Systems VariVolution'18: . Paper presented at 1st Intl. Workshop on Variability and Evolution of Software-intensive Systems VariVolution'18, 10 Sep 2018, Gothenburg, Sweden.
Open this publication in new window or tab >>Model-Based Product Line Engineering in an Industrial Automotive Context: An Exploratory Case Study
Show others...
2018 (English)In: 1st Intl. Workshop on Variability and Evolution of Software-intensive Systems VariVolution'18, 2018Conference paper, Published paper (Refereed)
Abstract [en]

Product Line Engineering is an approach to reuse assets of complex systems by taking advantage of commonalities between product families. Reuse within complex systems usually means reuse of artifacts from different engineering domains such as mechanical, electronics and software engineering. Model-based systems engineering is becoming a standard for systems engineering and collaboration within different domains. This paper presents an exploratory case study on initial efforts of adopting Product Line Engineering practices within the model-based systems engineering process at Volvo Construction Equipment (Volvo CE), Sweden. We have used SysML to create overloaded models of the engine systems at Volvo CE. The variability within the engine systems was captured by using the Orthogonal Variability Modeling language. The case study has shown us that overloaded SysML models tend to become complex even on small scale systems, which in turn makes scalability of the approach a major challenge. For successful reuse and to, possibly, tackle scalability, it is necessary to have a database of reusable assets from which product variants can be derived.

Keywords
System product lines, Model-based systems engineering, Variability management, Orthogonal variability modeling
National Category
Engineering and Technology Computer Systems
Identifiers
urn:nbn:se:mdh:diva-42238 (URN)10.1145/3236405.3237200 (DOI)000455363200013 ()
Conference
1st Intl. Workshop on Variability and Evolution of Software-intensive Systems VariVolution'18, 10 Sep 2018, Gothenburg, Sweden
Projects
MegaMaRt2 - Megamodelling at Runtime (ECSEL/Vinnova)
Available from: 2018-12-28 Created: 2018-12-28 Last updated: 2019-03-29Bibliographically approved
Brahneborg, D., Afzal, W., Causevic, A., Daniel, S. & Björkman, M. (2018). Round-Trip Time Anomaly Detection. In: ICPE '18 Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering: . Paper presented at 2018 ACM/SPEC International Conference on Performance Engineering, Berlin, Germany — April 09 - 13, 2018 (pp. 107-114).
Open this publication in new window or tab >>Round-Trip Time Anomaly Detection
Show others...
2018 (English)In: ICPE '18 Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering, 2018, p. 107-114Conference paper, Published paper (Refereed)
Abstract [en]

Mobile text messages (SMS) are sometimes used for authentication, which requires short and reliable delivery times. The observed round-trip times when sending an SMS message provide valuable information on the quality of the connection. In this industry paper, we propose a method for detecting round-trip time anomalies, where the exact distribution is unknown, the variance is several orders of magnitude, and there are lots of shorter spikes that should be ignored. In particular, we show that using an adaption of Double Seasonal Exponential Smoothing to reduce the content dependent variations, followed by the Remedian to find short-term and long-term medians, successfully identifies larger groups of outliers. As training data for our method we use log files from a live SMS gateway. In order to verify the effectiveness of our approach, we utilize simulated data. Our contributions are a description on how to isolate content dependent variations, and the sequence of steps to find significant anomalies in big data.

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-41840 (URN)10.1145/3184407.3184436 (DOI)2-s2.0-85048196185 (Scopus ID)978-1-4503-5095-2 (ISBN)
Conference
2018 ACM/SPEC International Conference on Performance Engineering, Berlin, Germany — April 09 - 13, 2018
Available from: 2018-12-27 Created: 2018-12-27 Last updated: 2018-12-27Bibliographically approved
Eldh, S., Demeyer, S., Borg, M. & Causevic, A. (2018). The 1st IEEE Workshop on the Next Level of Test Automation: (NEXTA 2018) - From the Program Chairs. Paper presented at 11th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2018; Västerås; Sweden; 9 April 2018 through 13 April 2018. 11th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2018, xix-xxi
Open this publication in new window or tab >>The 1st IEEE Workshop on the Next Level of Test Automation: (NEXTA 2018) - From the Program Chairs
2018 (English)In: 11th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2018, p. xix-xxiArticle in journal, Editorial material (Refereed) Published
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-40364 (URN)10.1109/ICSTW.2018.00012 (DOI)2-s2.0-85050992111 (Scopus ID)
Conference
11th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2018; Västerås; Sweden; 9 April 2018 through 13 April 2018
Available from: 2018-08-17 Created: 2018-08-17 Last updated: 2018-08-17Bibliographically approved
Brahneborg, D., Causevic, A., Afzal, W. & Björkman, M. (2018). Towards a more reliable store-and-forward protocol for mobile text messages. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing: . Paper presented at 2018 Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating Algorithms for Distributed Systems, ApPLIED 2018, co-located with the 37th ACM Symposium on the Principles of Distributed Computing, PODC 2018, 27 July 2018 (pp. 13-20). Association for Computing Machinery
Open this publication in new window or tab >>Towards a more reliable store-and-forward protocol for mobile text messages
2018 (English)In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery , 2018, p. 13-20Conference paper, Published paper (Refereed)
Abstract [en]

Businesses often use mobile text messages (SMS) as a cost effective and universal way of communicating concise information to their customers. Today, these messages are usually sent via SMS brokers, which forward them further to the next stakeholder, typically the various mobile operators, and then the messages eventually reach the intended recipients. Infoflex Connect AB delivers an SMS gateway application to the brokers with the main responsibility of reliable message delivery within set quality thresholds. However, the protocols used for SMS communication are not designed for reliability and thus messages may be lost. In this position paper we deduce requirements for a new protocol for routing messages through the SMS gateway application running at a set of broker nodes, in order to increase the reliability. The requirements cover important topics for the required communication protocol such as event ordering, message handling and system membership. The specification of such requirements sets the foundation for the forthcoming design and implementation of such a protocol and its evaluation.

Place, publisher, year, edition, pages
Association for Computing Machinery, 2018
Keywords
Replication, SMS, Store-and-forward, Cost effectiveness, Distributed computer systems, Samarium, Text messaging, Design and implementations, Message handling, Mobile operators, Position papers, Reliable message deliveries, Routing message, Store and forward, Gateways (computer networks)
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:mdh:diva-40746 (URN)10.1145/3231104.3231108 (DOI)2-s2.0-85052382122 (Scopus ID)9781450357753 (ISBN)
Conference
2018 Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating Algorithms for Distributed Systems, ApPLIED 2018, co-located with the 37th ACM Symposium on the Principles of Distributed Computing, PODC 2018, 27 July 2018
Available from: 2018-09-07 Created: 2018-09-07 Last updated: 2018-09-07Bibliographically approved
Brahneborg, D., Afzal, W. & Causevic, A. (2017). A Black-Box Approach to Latency and Throughput Analysis. In: Proceedings - 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017: . Paper presented at The 2017 IEEE International Conference on Software Quality, Reliability and Security QRS 2017, 25 Jul 2017, Prague, Czech Republic (pp. 603-604). , Article ID 8004393.
Open this publication in new window or tab >>A Black-Box Approach to Latency and Throughput Analysis
2017 (English)In: Proceedings - 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017, 2017, p. 603-604, article id 8004393Conference paper, Published paper (Refereed)
Abstract [en]

To enable fast and reliable delivery of mobile text messages (SMS), special bidirectional protocols are often used. Measuring the achieved throughput and involved latency is however non-trivial, due to the complexity of these protocols. Modifying an existing system would incur too much of a risk, so instead a new tool was created to analyse the log files containing information about this traffic in a black-box fashion. When the produced raw data was converted into graphs, they gave new insights into the behaviour of both the protocols and the remote systems involved.

Keywords
log file analysis, latency, black-box
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-37019 (URN)10.1109/QRS-C.2017.113 (DOI)000426819400107 ()2-s2.0-85034429122 (Scopus ID)978-1-5386-2072-4 (ISBN)
Conference
The 2017 IEEE International Conference on Software Quality, Reliability and Security QRS 2017, 25 Jul 2017, Prague, Czech Republic
Projects
TESTMINE - Mining Test Evolution for Improved Software Regression Test Selection (KKS)
Available from: 2017-11-27 Created: 2017-11-27 Last updated: 2018-03-22Bibliographically approved
Enoiu, E. P., Daniel, S., Causevic, A. & Pettersson, P. (2017). A Comparative Study of Manual and Automated Testing for Industrial Control Software. In: Proceedings - 10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017: . Paper presented at 10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017; Tokyo; Japan; 13 March 2017 through 17 March 2017 (pp. 412-417). , Article ID 7927994.
Open this publication in new window or tab >>A Comparative Study of Manual and Automated Testing for Industrial Control Software
2017 (English)In: Proceedings - 10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, 2017, p. 412-417, article id 7927994Conference paper, Published paper (Refereed)
Abstract [en]

Automated test generation has been suggested as a way of creating tests at a lower cost. Nonetheless, it is not very well studied how such tests compare to manually written ones in terms of cost and effectiveness. This is particularly true for industrial control software, where strict requirements on both specification-based testing and code coverage typically are met with rigorous manual testing. To address this issue, we conducted a case study in which we compared manually and automatically created tests. We used recently developed real-world industrial programs written in the IEC 61131-3, a popular programming language for developing industrial control systems using programmable logic controllers. The results show that automatically generated tests achieve similar code coverage as manually created tests, but in a fraction of the time (an average improvement of roughly 90%). We also found that the use of an automated test generation tool does not result in better fault detection in terms of mutation score compared to manual testing. Specifically, manual tests more effectively detect logical, timer and negation type of faults, compared to automatically generated tests. The results underscore the need to further study how manual testing is performed in industrial practice and the extent to which automated test generation can be used in the development of reliable systems.

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-34088 (URN)10.1109/ICST.2017.44 (DOI)000403393600037 ()2-s2.0-85020701655 (Scopus ID)9781509060313 (ISBN)
Conference
10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017; Tokyo; Japan; 13 March 2017 through 17 March 2017
Projects
ITS-EASY Post Graduate School for Embedded Software and SystemsTOCSYC - Testing of Critical System Characteristics (KKS)AGENTS - Automated Generation of Tests for Simulated Software Systems (KKS)
Available from: 2016-12-15 Created: 2016-12-13 Last updated: 2018-10-31Bibliographically approved
Stratis, A. & Causevic, A. (2017). A Practical Approach towards Validating HIL Simulation of a Safety-critical System. In: The 28th International Symposium on Software Reliability Engineering (ISSRE) - IEEE ISSRE 2017: . Paper presented at The 28th International Symposium on Software Reliability Engineering (ISSRE) - IEEE ISSRE 2017, 23 Oct 2017, Toulouse, France (pp. 40-43).
Open this publication in new window or tab >>A Practical Approach towards Validating HIL Simulation of a Safety-critical System
2017 (English)In: The 28th International Symposium on Software Reliability Engineering (ISSRE) - IEEE ISSRE 2017, 2017, p. 40-43Conference paper, Published paper (Refereed)
Abstract [en]

In order to perform efficient testing of software intensive safety-critical products, organisations often utilise hardware-in-the-loop simulation of the system under test surrounding environment. This way, the system could be invoked and its behaviour could be observed in a controlled setting rather than in the field. However, what effect simulation quality might have on the effectiveness of the testing process still remains an open question. An answer to such a question is rather critical for organisations who are obliged to safety certify their products. In this paper, we are presenting an approach used by Bombardier Transportation to validate their hardware-in-the-loop simulation of a safety-critical system, by executing test cases both in the control setting (lab) and on the real product (train). The process is intended to be used when certifying the simulation which is a necessary step in order to certify the complete system. In addition, we are also presenting some observations from the pilot study and lessons learned.

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-37066 (URN)10.1109/ISSREW.2017.22 (DOI)000418465000012 ()2-s2.0-85040615562 (Scopus ID)978-1-5386-2387-9 (ISBN)
Conference
The 28th International Symposium on Software Reliability Engineering (ISSRE) - IEEE ISSRE 2017, 23 Oct 2017, Toulouse, France
Projects
MegaMaRt2 - Megamodelling at Runtime (ECSEL/Vinnova)
Available from: 2017-11-07 Created: 2017-11-07 Last updated: 2018-02-08Bibliographically approved
Brahneborg, D., Afzal, W. & Causevic, A. (2017). A Pragmatic Perspective on Regression Testing Challenges. In: Proceedings - 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017: . Paper presented at The 2017 IEEE International Conference on Software Quality, Reliability and Security QRS 2017, 25 Jul 2017, Prague, Czech Republic (pp. 618-619). Prague, Czech Republic, Article ID 8004401.
Open this publication in new window or tab >>A Pragmatic Perspective on Regression Testing Challenges
2017 (English)In: Proceedings - 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017, Prague, Czech Republic, 2017, p. 618-619, article id 8004401Conference paper, Published paper (Refereed)
Abstract [en]

Regression testing research has received significant focus during the past decades, acknowledging the benefits it can provide to organisations in terms of reduced development and maintenance costs, as well as sustained end-user satisfaction. There are several challenges left to overcome before the industry can fully take advantage of the available research results in this area. To get a better overview of how current regression testing research fits in with today’s industrial practices, we read a selection of papers in the field and based on our experience, critically examined their content. As a result, we present and discuss a taxonomy of regression testing challenges, from the perspectives of both methods and organisations, that we believe will foster the industrial uptake of regression testing.

Place, publisher, year, edition, pages
Prague, Czech Republic: , 2017
Keywords
regression testing
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-37020 (URN)10.1109/QRS-C.2017.117 (DOI)000426819400115 ()2-s2.0-85034450784 (Scopus ID)978-1-5386-2072-4 (ISBN)
Conference
The 2017 IEEE International Conference on Software Quality, Reliability and Security QRS 2017, 25 Jul 2017, Prague, Czech Republic
Projects
TESTMINE - Mining Test Evolution for Improved Software Regression Test Selection (KKS)
Available from: 2017-11-27 Created: 2017-11-27 Last updated: 2018-03-22Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-8009-9052

Search in DiVA

Show all publications