Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Seung Yeob Shin"'
Publikováno v:
ACM Transactions on Software Engineering and Methodology. 32:1-33
Estimating worst-case execution time (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure that task executions always complete before their
Publikováno v:
info:eu-repo/grantAgreement/EC/H2020/694277
In real-time systems, priorities assigned to real-time tasks determine the order of task executions, by relying on an underlying task scheduling policy. Assigning optimal priority values to tasks is critical to allow the tasks to complete their execu
Autor:
Lionel C. Briand, Mehrdad Sabetzadeh, Michael Garceau, Seung Yeob Shin, Antoine Meyers, Seifeddine Bettaieb
Publikováno v:
Empirical Software Engineering. 25:2550-2582
In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security st
Publikováno v:
IEEE Transactions on Systems, Man, and Cybernetics: Systems. 48:1578-1593
This paper presents a method for scheduling resources in complex systems that integrate humans with diverse hardware and software components, and for studying the impact of resource schedules on system characteristics. The method uses discrete-event
Autor:
Seung Yeob Shin, Mehrdad Sabetzadeh, Shiva Nejati, Lionel C. Briand, Frank Zimmer, Chetan Arora
Publikováno v:
Proceedings of the IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems
info:eu-repo/grantAgreement/EC/H2020/694277
SEAMS@ICSE
BASE-Bielefeld Academic Search Engine
info:eu-repo/grantAgreement/EC/H2020/694277
SEAMS@ICSE
BASE-Bielefeld Academic Search Engine
The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::024e93ece0c48a589e2e62cb8154a59a
Autor:
Lionel C. Briand, Mehrdad Sabetzadeh, Michael Garceau, Grégory Nou, Seung Yeob Shin, Seifeddine Bettaieb
Publikováno v:
Requirements Engineering: Foundation for Software Quality ISBN: 9783030155377
REFSQ
International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019. (2019).
REFSQ
International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019. (2019).
[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9fb693e57e800ec02f4b44dad0df7b8b
https://doi.org/10.1007/978-3-030-15538-4_1
https://doi.org/10.1007/978-3-030-15538-4_1
Publikováno v:
ISSTA
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis-ISSTA 2018
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis -ISSTA 2018
info:eu-repo/grantAgreement/EC/H2020/694277
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis-ISSTA 2018
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis -ISSTA 2018
info:eu-repo/grantAgreement/EC/H2020/694277
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis
Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a hardware-in-the-loop process conducted in a (nea
Autor:
Lionel C. Briand, Karim Chaouch, Seung Yeob Shin, Shiva Nejati, Mehrdad Sabetzadeh, Frank Zimmer
Publikováno v:
Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems-MODELS 18
Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems -MODELS '18
info:eu-repo/grantAgreement/EC/H2020/694277
MoDELS
Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems -MODELS '18
info:eu-repo/grantAgreement/EC/H2020/694277
MoDELS
Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environ
Autor:
Seung Yeob Shin, Philip L. Henneman, Yuriy Brun, Fidela S.J. Blank, Hari Balasubramanian, Leon J. Osterweil
Publikováno v:
JONA: The Journal of Nursing Administration. 45:551-556
Objective To study the impact of nurse-to-patient ratios on patient length of stay (LOS) in computer simulations of emergency department (ED) care. Methods Multiple 24-hour computer simulations of emergency care were used to evaluate the impact of di
Publikováno v:
SEHS@ICSE
Complex, human-intensive systems, such as those used in hospital Emergency Departments, typically require the effective support of many types of resources, each governed by potentially complex utilization policies. Resource utilization policies range