ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Software Architecture. ECSA 2022 Tracks and Workshops: Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers (Lecture Notes in Computer Science)

دانلود کتاب معماری نرم افزار. آهنگ ها و کارگاه های آموزشی ECSA 2022: پراگ، جمهوری چک، 19 تا 23 سپتامبر 2022، مقالات منتخب اصلاح شده (یادداشت های سخنرانی در علوم کامپیوتر)

Software Architecture. ECSA 2022 Tracks and Workshops: Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers (Lecture Notes in Computer Science)

مشخصات کتاب

Software Architecture. ECSA 2022 Tracks and Workshops: Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers (Lecture Notes in Computer Science)

ویرایش:  
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 3031368886, 9783031368882 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 512
[492] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 34 Mb 

قیمت کتاب (تومان) : 41,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Software Architecture. ECSA 2022 Tracks and Workshops: Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers (Lecture Notes in Computer Science) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب معماری نرم افزار. آهنگ ها و کارگاه های آموزشی ECSA 2022: پراگ، جمهوری چک، 19 تا 23 سپتامبر 2022، مقالات منتخب اصلاح شده (یادداشت های سخنرانی در علوم کامپیوتر) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب معماری نرم افزار. آهنگ ها و کارگاه های آموزشی ECSA 2022: پراگ، جمهوری چک، 19 تا 23 سپتامبر 2022، مقالات منتخب اصلاح شده (یادداشت های سخنرانی در علوم کامپیوتر)

این کتاب مجموعه مقالات داوری آهنگ ها و کارگاه های آموزشی است که تکمیل کننده شانزدهمین کنفرانس اروپایی معماری نرم افزار، ECSA 2022، که در پراگ، جمهوری چک، در سپتامبر 2022 برگزار شد. 26 مقاله کامل همراه با 4 مقاله کوتاه و 2 مقاله آموزشی ارائه شده است. این جلد به دقت بررسی و از بین 61 مورد ارسالی انتخاب شد. مقالات ارائه شده در آهنگ ها و کارگاه های زیر پذیرفته شدند: پیست صنعت; ابزار و آهنگ تظاهرات. سمپوزیوم دکتری; آموزش; هشتمین کارگاه بین المللی معماری سیستم/نرم افزار خودرو (WASA); پنجمین کارگاه بین المللی Context-Aware، Autonomous and Smart Architectures (CASA); ششمین کارگاه بین المللی رویکردهای رسمی برای سیستم های محاسباتی پیشرفته (FAACS). سومین کارگاه آموزشی سیستم‌ها، معماری‌ها و راه‌حل‌ها برای صنعت 4.0 (SASI4). دومین کارگاه بین المللی طراحی و اندازه گیری امنیت در معماری نرم افزار (DeMeSSA); دومین کارگاه بین المللی معماری نرم افزار و یادگیری ماشین (SAML)؛ نهمین کارگاه آموزشی فرسایش و سازگاری معماری نرم افزار (SAEroCon); دومین کارگاه بین المللی مخازن نرم افزار معدن برای معماری نرم افزار (MSR4SA); و اولین کارگاه بین المللی معماری دوقلو دیجیتال (TwinArch).


توضیحاتی درمورد کتاب به خارجی

This book constitutes the refereed proceedings of the tracks and workshops which complemented the 16th European Conference on Software Architecture, ECSA 2022, held in Prague, Czech Republic, in September 2022. The 26 full papers presented together with 4 short papers and 2 tutorial papers in this volume were carefully reviewed and selected from 61 submissions. Papers presented were accepted into the following tracks and workshops: Industry track; Tools and Demonstrations Track; Doctoral Symposium; Tutorials; 8th International Workshop on Automotive System/Software Architectures (WASA); 5th Context-Aware, Autonomous and Smart Architectures International Workshop (CASA); 6th International Workshop on Formal Approaches for Advanced Computing Systems (FAACS); 3rd Workshop on Systems, Architectures, and Solutions for Industry 4.0 (SASI4); 2nd International Workshop on Designing and Measuring Security in Software Architectures (DeMeSSA); 2nd International Workshop on Software Architecture and Machine Learning (SAML); 9th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon); 2nd International Workshop on Mining Software Repositories for Software Architecture (MSR4SA); and 1st International Workshop on Digital Twin Architecture (TwinArch).



فهرست مطالب

Preface
Organization
Contents
Industry Track
Blockchain-Based Architecture of Immutable Document Repository
	1 Introduction
	2 Showcase of Durable Media System
		2.1 Business Context and the Purpose of the System
		2.2 Key Architectural Decisions
		2.3 Architecture Presentation
		2.4 Pros and Cons of the Architecture
	3 Conclusion
	References
An Overview About Terravis Architecture Large-Scale Business Process Integration for Swiss Land Register Processes
	1 Introduction and History of Terravis
	2 Desired Quality Attributes
	3 Architecture Description
	4 API Design Principles
	5 Lessons Learned
	6 Conclusions and Outlook
	References
Architectural Revision of the E-Assessment System JACK
	1 Introduction
	2 Problem Analysis
	3 Solution Architecture
	4 Initial Solution Assessment
	5 Future Work and Lessons Learned
	References
Tools and Demonstrations Track
ExpressO: From Express.js Implementation Code to OpenAPI Interface Descriptions
	1 Introduction
	2 Background: OpenAPI
	3 Related Work
	4 Use Cases
	5 ExpressO
		5.1 Approach
		5.2 Architecture
		5.3 API Comparison and Coverage Report
	6 Evaluation
		6.1 API Components Coverage
		6.2 Performance
	7 Conclusion
	References
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
	1 Introduction
	2 Running Example
	3 Attack Propagation Tool
		3.1 Modeling Software Architecture
		3.2 Attack Propagation Modeling
		3.3 Attack Propagation Analysis and Tool Results
	4 Modeling Architectural Access Control
	5 Analyzing Access Control Policies
	6 Evaluation
		6.1 Evaluation Design
		6.2 Results and Discussion
		6.3 Threats to Validity
		6.4 Limitations
	7 Related Work
	8 Conclusion and Future Development
	References
Apache Kafka as a Middleware to Support the PLC-Service Bus Architecture with IEC 61499
	1 Introduction
	2 Background
		2.1 Architectural Background
		2.2 IEC 61499
	3 PLC-Service Bus with IEC 61499
		3.1 Ad-hoc Implementation
		3.2 Limitations
	4 Apache Kafka with IEC 61499
		4.1 Suitability of Apache Kafka as a Middleware
		4.2 Integration of Apache Kafka
	5 Using Apache Kafka as Middleware for the PLC-Service Bus
		5.1 Running Example
		5.2 Implementation
	6 Related Work
	7 Discussion
	8 Conclusion and Future Work
	References
A Toolchain for Simulation Component Specification and Identification
	1 Introduction
	2 Related Work
	3 The Toolchain for Simulation Specification and Simulation Component Identification
		3.1 Specification of Simulation Components
		3.2 Identification of Simulation Components
	4 Conclusion
	5 Future Development
	References
DAT: Data Architecture Modeling Tool for Data-Driven Applications
	1 Introduction
	2 Background
		2.1 IEEE/ISO/IEC 42010 Architecture Description
		2.2 The CAPS Modeling Framework
		2.3 The Important of Data Architecture
		2.4 The DAT Tool
	3 Real Use Cases
		3.1 Operational Data Warehouse
		3.2 Hydre
		3.3 Errors Data Pipeline
	4 Evaluation
		4.1 Errors Data Pipeline
		4.2 Hydre
		4.3 Operational Data Warehouse
	5 Related Work
	6 Conclusion and Future Work
	References
Doctoral Symposium
Controlling Automatic Experiment-Driven Systems Using Statistics and Machine Learning
	1 Introduction
	2 Background
		2.1 What is an Experiment-Driven System?
		2.2 A Use-Case of an Experiment-Driven System
		2.3 Reducing Experiment Driven Systems Computation Costs
		2.4 Controlling Experiment-Driven Systems
	3 Running Example
	4 Motivation
	5 Research Goals and Methodology
	6 Evaluation Strategy
		6.1 Preliminary Evaluation
		6.2 Evaluation Strategy
	7 Preliminary Results
	8 Related Works
	9 Conclusion
	References
Tutorials
Trust Management in the Internet of Everything
	1 Introduction
	2 Understanding Trust
		2.1 Definitions of Trust
		2.2 Characteristics of Trust
		2.3 Scope of Trust Evaluation
		2.4 Trust Components
	3 Trust Management Activities
		3.1 Direct-Trust Evaluation
		3.2 Indirect-Trust Management
		3.3 Trust Decision
	4 Trust-Based Mechanisms for Ecosystem Wellbeing
	5 Trust Attacks
	6 Scenarios
		6.1 Collision Avoidance with Misbehaving Vehicle
		6.2 Trust in Run-time Update Downloaded to a Vehicle
		6.3 Trust-based Vehicle Admission in a Platoon
		6.4 Human-to-Vehicle Trust Building in Autonomous Driving
		6.5 Information Exchange in Coordinated Ecosystem Moves
	7 Challenges of Trust Management in IoE
	8 Conclusion
	References
Continuous Dependability Assessment of Microservice Systems
	1 Introduction
	2 Domain-based Metric and Scalability Assessment
	3 PPTAM Tool Overview
	4 Software Performance Anti-pattern Detection
	5 Conclusion
	References
8th International Workshop on Automotive System/Software Architectures (WASA)
Assessing Security of Internal Vehicle Networks
	1 Introduction
	2 Related Work
	3 Study Design
		3.1 Artefact
		3.2 Evaluation of the Artefact
		3.3 Test Bed
		3.4 Use Cases
	4 Results
		4.1 CAN
		4.2 Ethernet
	5 Solution Proposals
	6 Impact on Architectural Design
	7 Conclusions
	References
Methodical Approach for Centralization Evaluation of Modern Automotive E/E Architectures
	1 Introduction
	2 Dominating E/E Architectures and Trends
		2.1 Domain-Oriented E/E Architectures
		2.2 Limitations and Challenges
		2.3 Cross-Domain- and Zone-Oriented E/E Architectures
		2.4 Limitations and Challenges
	3 Technical Approaches for Centralization
	4 Development of Methodical Approaches
		4.1 Methodical Approach for Function Abstraction
		4.2 Methodical Approach for Function Centralization
		4.3 Validation of Methodical Approach
	5 Discussion
	6 Conclusion
	References
5th Context-Aware, Autonomous and Smart Architectures International Workshop (CASA)
MockSAS: Facilitating the Evaluation of Bandit Algorithms in Self-adaptive Systems
	1 Introduction
	2 Background
		2.1 Multi-armed Bandits
		2.2 Online Learning with MABs in Self-adaptive Systems
		2.3 Running Example: SWIM
	3 Approach
		3.1 MockSAS Process
		3.2 Application
	4 Evaluation
		4.1 Setup
		4.2 Results
	5 Conclusions and Further Work
	References
Towards Uncertainty Reduction Tactics for Behavior Adaptation
	1 Introduction
	2 Related Work
	3 Achievable Benefit of Uncertainty Reduction
		3.1 Preliminaries: A Markov Decision Process for Modeling Uncertainty Reduction
		3.2 Results and Interpretation
	4 Concept for Behavior Planning with Uncertainty Reduction
		4.1 Running Example
		4.2 Uncertain Environment Representation
		4.3 Admissibility of Actions and Tactics
		4.4 Suitability of Tactics
		4.5 Benefit of Tactics
	5 Evaluation
		5.1 Simulation Setup
		5.2 Results and Discussion
	6 Conclusion
	References
Towards Characterization of Edge-Cloud Continuum
	1 Introduction
	2 Background
	3 Existing Views on Edge-Cloud Continuum
		3.1 Main Elements of the Edge-Cloud Continuum
		3.2 Workload Placement
		3.3 Artificial Intelligence in Edge-Cloud Continuum
	4 Common Properties
		4.1 Reference Example
	5 Open Questions
	6 Conclusion
	References
6th International Workshop on Formal Approaches for Advanced Computing Systems (FAACS)
Towards Online Testing Under Uncertainty Using Model-Based Reinforcement Learning
	1 Introduction
	2 Background
		2.1 Markov Decision Processes and Rewards
		2.2 Bayesian Inference
		2.3 Reinforcement Learning
	3 A Running Example: The SafeHome System
	4 Envisioned Approach
	5 Preliminary Evaluation
	6 Related Work
	7 Conclusion and Future Work
	References
A Maude Formalization of Object Nets
	1 Introduction
	2 Background
	3 MAUDE Implementation of Eos
		3.1 EOS Specification
	4 An Example: The Production Line
		4.1 Analysis of the Maude Representation
	5 Summary and Outlook
	References
3rd Workshop on Systems, Architectures, and Solutions for Industry 4.0 (SASI4)
Developing an AI-Enabled IIoT Platform - Lessons Learned from Early Use Case Validation
	1 Introduction
	2 Related Work
	3 IIoT Platform
	4 Demonstrator Use-Case Description
	5 Demonstrator Realization
	6 Lessons Learned
	7 Future Work and Conclusion
	References
DevOps in Robotics: Challenges and Practices
	1 Introduction
	2 Related Work
		2.1 DevOps in Robotics and Cyber-Physical Systems
		2.2 Robotics Testing
		2.3 Performance Metrics
	3 DevOps Practices for Robotics
		3.1 DevOps Metrics
		3.2 Test Pipeline
		3.3 Scenario Coverage
	4 Autonomous Mobile Robots for Intralogistics
	5 Case Study
		5.1 DevOps Metrics
		5.2 Test Pipeline
		5.3 Scenario Coverage
	6 Preliminary Results and Discussion
	7 Conclusion
	References
Enabling IoT Connectivity and Interoperability by Using Automated Gateways
	1 Introduction
	2 State of the Art
		2.1 Types of Gateways
		2.2 Open Issues and Challenges
	3 Related Work
	4 Design and Implementation of the Proposed Automatic Gateway
		4.1 Overall Architecture
		4.2 Protocol Conversion
		4.3 Device Management
		4.4 Middleware Abstraction
		4.5 Resource Management
		4.6 Traffic Optimization
	5 Experimental Results
	6 Comparison to Existing Frameworks
	7 Conclusion and Future Work
	References
2nd International Workshop on Designing and Measuring Security in Software Architectures (DeMeSSA)
A Methodological Approach to Verify Architecture Resiliency
	1 Introduction
	2 Background
		2.1 Architectural Tactics
		2.2 Common Architectural Weaknesses
		2.3 Architecture Modeling and AADL
		2.4 Architecture Reasoning on AADL Using Resolute
	3 Architecture-Centric Verification Methodology
		3.1 Architecture Modeling
		3.2 Common Architectural Weakness Modeling and Specification
		3.3 Architectural Model Annotation
		3.4 Architecture Verification
	4 Case Example
	5 Related Work
	6 Conclusion
	References
Microservices Security: Bad vs. Good Practices
	1 Introduction
	2 Research Design
		2.1 Literature Selection
		2.2 Literature Analysis
	3 Bad vs. Good Practices for Microservices Security
		3.1 Trust the Network vs. Zero-Trust Principle
		3.2 No Layered Security Vs. Defense-in-Depth
		3.3 Non-proactive vs. Proactive Security Measures
		3.4 Non-scalable vs. Scalable Security Controls
	4 Threats to Validity
	5 Related Work
	6 Conclusions
	References
2nd International Workshop on Software Architecture and Machine Learning (SAML)
Multi-metric Approach for Decomposition of Microservice-Based Data Science Workflows
	1 Introduction
	2 Related Work
	3 Multi-metric Approach
		3.1 Atomar Unit, Modeling and Identification
		3.2 Implementation
		3.3 Runtime Evaluation Metrics
	4 Evaluation by Real-World Use Case
		4.1 Use Case and Data Science Workflow
		4.2 Cohesion Metric Results
		4.3 Runtime Evaluation and Experimental Setup
		4.4 Runtime Results
	5 Discussion and Architecture Recommendations
	6 Implications and Conclusion
	References
Introducing Estimators—Abstraction for Easy ML Employment in Self-adaptive Architectures
	1 Introduction
	2 Running Example and Background
		2.1 Modeling Self-adaptive Systems via Components and Ensembles
	3 Estimators
		3.1 Estimators in CEB Architectures
		3.2 Employing Estimators
		3.3 Mapping to Python
	4 Discussion and Evaluation
		4.1 Exemplar
		4.2 Implementation of ML-DEECo Runtime Framework
		4.3 Simulation of the Use-Case and Evaluation of Machine-Learning Potential
		4.4 Limitations and Threats to Validity
	5 Related Work
	6 Conclusion
	References
Generalization of Machine-Learning Adaptation in Ensemble-Based Self-adaptive Systems
	1 Introduction
	2 Running Example
	3 ANN-Driven Ensembles
		3.1 Composition Algorithms
		3.2 ANN Post-processing
	4 Technical Details
		4.1 Data Transformation
		4.2 Neural Network Architecture
	5 Evaluation
		5.1 Aggregated Results
		5.2 Covering Various Configurations
		5.3 Detailed Evaluation of Individual Parts
		5.4 Composition Method Quality
	6 Related Work
	7 Conclusion
	References
Finding Reusable Machine Learning Components to Build Programming Language Processing Pipelines
	1 Introduction
	2 Selected Publications
	3 Taxonomies
		3.1 PLP Tasks
		3.2 Model Architectures
		3.3 Tokenization Tools
	4 PLP Pipelines
		4.1 Pretraining Pipelines
		4.2 Pipeline Specialization
	5 Related Work
	6 Conclusion
	References
9th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon)
Optimized Machine Learning Input for Evolutionary Source Code to Architecture Mapping
	1 Introduction
	2 Automated Mapping and Critera for Mapping
	3 Method
	4 Results and Statistical Analysis
	5 Related Work
	6 Discussion and Validity
	7 Conclusion and Future Work
	References
2nd International Workshop on Mining Software Repositories for Software Architecture (MSR4SA)
A Taxonomy for Design Decisions in Software Architecture Documentation
	1 Introduction
	2 Foundations and Related Work
		2.1 Foundations for Taxonomy Building
		2.2 Classification Schemata for Design Decisions
		2.3 Automatic Analysis of Design Decisions
	3 Research Design
	4 Taxonomy of Design Decisions
	5 Evaluation
		5.1 Evaluating the Purpose
		5.2 Evaluating the Structure
		5.3 Evaluating the Application
	6 Exploratory Automated Application
	7 Threats to Validity
	8 Conclusion
	References
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
	1 Introduction
	2 Creating a Benchmark Dataset
	3 A Benchmark Dataset for TLR Between SAD and SAM
		3.1 Software Architecture Documentations
		3.2 Software Architectural Models
		3.3 Gold Standard
		3.4 Simple Tracelink Discovery (STD)
	4 Discussion
	References
1st International Workshop on Digital Twin Architecture (TwinArch)
Engineering of Trust Analysis-Driven Digital Twins for a Medical Device
	1 Introduction
	2 Running Example: MVM Case Study
	3 Our View of a Digital Twin
		3.1 DT Runtime Models
		3.2 DT Engineering Technology
		3.3 Trust Assurance
	4 DT Runtime Models
	5 DT Trust Analysis
	6 Conclusion and Future Directions
	References
Using I4.0 Digital Twins in Agriculture
	1 Introduction
	2 Background
	3 Related Work
	4 Using I4.0 DTs in the Agricultural Domain
		4.1 Architecture Drivers
		4.2 Solution Concept
	5 Discussion
	6 Conclusion
	References
Author Index




نظرات کاربران