Managed Software Evolution.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2019.
©2019.
Year of Publication:2019
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (439 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 11012nam a22004933i 4500
001 5005802488
003 MiAaPQ
005 20240229073832.0
006 m o d |
007 cr cnu||||||||
008 240229s2019 xx o ||||0 eng d
020 |a 9783030134990  |q (electronic bk.) 
020 |z 9783030134983 
035 |a (MiAaPQ)5005802488 
035 |a (Au-PeEL)EBL5802488 
035 |a (OCoLC)1106162593 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a QA76.758 
100 1 |a Reussner, Ralf. 
245 1 0 |a Managed Software Evolution. 
250 |a 1st ed. 
264 1 |a Cham :  |b Springer International Publishing AG,  |c 2019. 
264 4 |c ©2019. 
300 |a 1 online resource (439 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Intro -- Foreword -- Contents -- Contributors -- International Board of Reviewers -- Acronyms -- Part I Introduction -- 1 Introducing Managed Software Evolution -- 2 The Nature of Software Evolution -- 2.1 Introduction -- 2.2 Software Systems -- 2.2.1 Application Domains -- 2.2.2 Scopes and Environments of Software Systems -- 2.2.3 Software Artefacts -- 2.2.4 Software Variants -- 2.3 Software Quality -- 2.3.1 Consistency -- 2.3.2 Correctness -- 2.3.3 Dependability -- 2.3.4 Performance -- 2.3.5 Usability -- 2.3.6 Maintainability -- 2.4 Software Evolution -- 2.4.1 Kinds of Software Change -- 2.4.2 Evolution Processes -- 2.4.3 Configuration Management -- 3 Addressed Challenges -- 3.1 Tacit Knowledge -- 3.2 Design Decisions -- 3.3 Software Product Line Round-Trip Engineering -- 3.4 Maintaining Performance -- 3.5 Maintaining Security -- 3.6 Learning from Evolution for Evolution -- 3.7 Maintaining Correctness -- 4 Introduction to Case Studies -- 4.1 Evolution of Long-Living Systems to an Industry 4.0 Case Study -- 4.2 Introduction of the CoCoME Case Study -- 4.2.1 Platform Migration -- 4.2.2 Adding a Pick-Up Shop -- 4.2.3 Database Migration -- 4.2.4 Adding a Mobile App Client -- 4.2.5 Microservice Architecture -- 4.2.6 Container Virtualization -- 4.2.7 Adding Payment Methods -- 4.3 Introduction of the PPU and xPPU Case Studies -- 4.3.1 Evolution Scenarios of the PPU -- 4.3.2 Incremental Evolution Scenarios -- 4.3.3 Evolution Scenarios of the xPPU -- 4.4 Industry 4.0 Case Study -- 4.4.1 Industry 4.0 Interface of the xPPU -- 4.4.2 Integration of CoCoME and xPPUto Form an Industry 4.0 Case Study -- Part II Knowledge Carrying Software -- 5 Tacit Knowledge in Software Evolution -- 5.1 Toward Identification and Extraction of Tacit Knowledge -- 5.2 Foundations -- 5.3 Tacit Knowledge During Design Time -- 5.3.1 Security in Requirement Documents. 
505 8 |a 5.3.2 Modelling of Security Knowledge -- Security Ontology -- Representation of Knowledge -- 5.3.3 Identification and Extraction of Tacit Security Knowledge -- Classification of Words -- Measurement of Similarity Between Security Abstraction Models -- (Semi)-Automatic Acquisition of Tacit Knowledge -- 5.3.4 Tacit Security Knowledge Examples -- 5.4 Tacit Knowledge During Run Time -- 5.4.1 Usage Knowledge in Software Evolution -- 5.4.2 Modelling of Knowledge -- 5.4.3 Identification and Extraction of Tacit Usage Knowledge -- Runtime Personas -- Extraction of Tacit Usage Knowledge -- 5.4.4 Tacit Usage Knowledge Examples -- 5.5 Related Work -- 5.6 Conclusion -- 5.6.1 Summary -- 5.6.2 Outlook -- 5.6.3 Further Reading -- 6 Continuous Design Decision Support -- 6.1 Introduction -- 6.1.1 Challenges for a Continuous Design Decision Support -- 6.1.2 Solution Approaches for Design Decision Challenges -- 6.1.3 Structure of This Chapter -- 6.2 Foundations -- 6.3 Using a Design Pattern Catalogue to Make Design Decisions -- 6.3.1 Motivation for Using a Pattern Catalogue -- 6.3.2 Decision-Making Process Using a Pattern Catalogue -- 6.3.3 Application to the Case Study -- 6.4 Integrating Design Decision Models with Program Code -- 6.4.1 Integrating Architecture Models with Code -- 6.4.2 Design Decisions, Rationale, and Patterns in the IAL -- 6.4.3 Application to the Case Study -- 6.5 Continuous Management of Decision Knowledge -- 6.5.1 Integrating Design Decisions into CSE -- 6.5.2 Decision Knowledge Triggers -- Making Tacit Decisions Explicit -- Packaging Distributed Decision Knowledge -- Considering Consistency Between Decisions -- 6.5.3 Application to the Case Study -- Scenario for the Explicit Documentation of Decision Knowledge -- Scenario for Making Tacit Decisions Explicit -- Scenario for Packaging Distributed Decision Knowledge. 
505 8 |a Scenario for Considering Consistency Between Decisions -- 6.6 Related Work -- 6.6.1 Documentation Consistent with External Decision Knowledge -- 6.6.2 Documentation of Decision Knowledge Consistent with Architecture and Code -- 6.6.3 Non-intrusive Documentation of Decision Knowledge -- 6.7 Conclusion -- 6.8 Further Reading -- 7 Model-Based Round-Trip Engineering and Testing of Evolving Software Product Lines -- 7.1 Foundations -- 7.1.1 Model-Based Software Development and Testing -- 7.1.2 Model-Based Product-Line Engineering and Testing -- 7.1.3 Product-Line Round-Trip Engineering and Artefact Co-evolution -- 7.2 Evolution -- 7.2.1 Evolution of Software Variants -- 7.2.2 Evolution of Software Product Lines -- 7.2.3 Evolution of Model-Based Testing Artefacts -- 7.3 Co-evolution -- 7.3.1 Co-evolution of Software Product Lines and Product Variants -- 7.3.2 Co-evolution of Software Product Lines and Model-Based Testing Artefacts -- 7.3.3 Co-evolution of Product Variants and Test Artefacts -- 7.4 Conclusion -- 7.5 Further Reading -- 8 Performance Analysis Strategies for Software Variants and Versions -- 8.1 Analysis Strategies for Software Variants -- 8.1.1 Sample-Based Analysis of Software Variants -- 8.1.2 Family-Based Test-Suite Generation for Software Variants -- 8.1.3 Family-Based Analysis of Software Variants -- 8.2 Analysis Strategies for Software Versions -- 8.2.1 Declarative Analysis Strategies for Evolving Software -- 8.2.2 Align Development-Level Evolution and Operation-Level Adaptation -- 8.2.3 Co-evolution of Architecture and Analysis Models -- Sequence Diagram to Layered Queueing Network -- State Charts to Continuous Time Markov Chains -- Analysis of LQN and CTMC Models with Model Solvers -- 8.3 Conclusion and Road Map -- 9 Maintaining Security in Software Evolution -- 9.1 Foundations. 
505 8 |a 9.2 Design Time: Leveraging Knowledge from Natural Language for Design-Time System Adaptation -- 9.2.1 Overview -- 9.2.2 Capturing Security Requirements Using Natural-Language Processing -- 9.2.3 Representing Security Knowledge Using Ontologies -- 9.2.4 Rule-Based Model Co-evolution -- 9.2.5 Related Work -- 9.2.6 Leveraging Security Knowledge to Infer Adequate Reaction to Context Changes -- 9.2.7 Summary -- 9.3 Integrating Model-Based Security Constraints with Program Code -- 9.3.1 Codeling: Integrating Architecture Model Information with Program Code -- 9.3.2 Application: Security Evolution Scenario -- 9.3.3 Security Aspects in the Intermediate Architecture Language -- 9.3.4 Integrating Security-Architectures with Code Using the Model Integration Concept -- 9.3.5 Related Work -- 9.3.6 Summary -- 9.4 Contextual Security Patterns -- 9.4.1 Security Challenges in Software Evolution -- 9.4.2 Contextual Security -- 9.4.3 From Design Patterns to Security Patterns -- 9.4.4 Security Patterns as a Means for Contextual Software Security -- 9.4.5 Related Work -- 9.4.6 Summary -- 9.5 Self-adaptive Security Maintenance at Run Time by Identifying Suspicious Behaviour -- 9.5.1 Overview -- Application: Running Example -- 9.5.2 Capturing Context for Security Adaption -- 9.5.3 Leveraging Run-Time Information to Support Design-Time Security Adaption -- 9.5.4 Heuristics-Based Run-Time Assessment to Detect Security Requirement Violations -- 9.5.5 Adaption During Run Time -- 9.5.6 Related Work -- 9.5.7 Summary -- 9.6 Anomaly Detection for Evolving Software Controlled Production Systems at Run Time -- 9.6.1 Overview -- 9.6.2 Detection Model: Machine State Petri Net -- 9.6.3 Anomaly Detection Mechanism -- 9.6.4 Example: Using the PPU Case Study -- 9.6.5 Related Work: Finding Behaviour Anomalies -- 9.6.6 Summary -- 9.7 Conclusion -- 9.8 Further Reading. 
505 8 |a 10 Learning from Evolution for Evolution -- 10.1 Detailed Analysis of Past Evolutions of Models -- 10.1.1 Analysing Linear Evolution of Monolithic Models -- Motivation and Goals -- Overview of the Approach -- Example Applications -- 10.1.2 Analysing Co-evolution of Coupled Models -- A Generic Framework for Analysing Model Co-evolution -- Case Study on Architecture and Fault Tree Co-evolution -- 10.1.3 Related Work -- 10.1.4 Conclusion -- 10.1.5 Further Reading -- 10.2 Formal Analysis of Planned Changes -- 10.2.1 Using Model-Based Verification of Interdisciplinary Models -- 10.2.2 Using Regression Verification for Small Evolution Steps in PLC-Code -- 10.2.3 Conclusion and Outlook -- 10.3 Analyse Non-functional Aspects of the System -- 10.3.1 Learning and Analysing the Machine States and Material Flow of Evolving ManufacturingSystems -- Three-Phase Evolution Support Process -- Application on xPPU Case Study -- 10.3.2 Learning and Analysing DTMCs for Reliability Evaluation -- Related Work -- Further Reading -- 10.3.3 Conclusion and Outlook -- 10.4 Recommend and Assess Future Changes Basedon Past Changes -- 10.4.1 Supporting Model Editing with Automatic Recommendations -- Foundation -- Analysis of Change Histories -- Inferring Blueprints -- Evaluation -- Related Work -- Conclusion -- 10.4.2 Recommending Evolution Steps Within a Knowledge Carrying Network -- Express Evolution Steps of a System -- Application on xPPU Case Study -- Related Work -- Further Reading -- 10.4.3 Learning Maintainability Estimation for Enabling an ``Economical Effort Recommender'' -- Challenges for Maintainability Estimation: Information Systems vs. Automated Production Systems -- Karlsruhe Architectural Maintainability Prediction for Automated Production Systems: An Architecture-Based Change Impact Analysis Method for aPS -- 10.4.4 Conclusion and Outlook -- 10.5 Conclusion. 
505 8 |a 11 Formal Verification of Evolutionary Changes. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a Goedicke, Michael. 
700 1 |a Hasselbring, Wilhelm. 
700 1 |a Vogel-Heuser, Birgit. 
700 1 |a Keim, Jan. 
700 1 |a Märtin, Lukas. 
776 0 8 |i Print version:  |a Reussner, Ralf  |t Managed Software Evolution  |d Cham : Springer International Publishing AG,c2019  |z 9783030134983 
797 2 |a ProQuest (Firm) 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5802488  |z Click to View