1.

Record Nr.

UNISA996490365103316

Titolo

Software architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19-23, 2022, proceedings / / Ilias Gerostathopoulos [and three others], editors

Pubbl/distr/stampa

Cham, Switzerland : , : Springer Nature Switzerland AG, , [2022]

©2022

ISBN

3-031-16697-3

Descrizione fisica

1 online resource (225 pages)

Collana

Lecture notes in computer science ; ; 13444

Disciplina

005.3

Soggetti

Software architecture

Software engineering

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Preface -- Organization -- Abstract of Keynotes -- Humanizing Software Architecture -- Software Architectures in the Age of Cloud Computing -- Software Sustainability: What it Means for Software Architects and Why Should We Care -- Contents -- Components, APIs and Interface Management -- Avoiding Excessive Data Exposure Through Microservice APIs -- 1 Introduction -- 2 Related Work -- 3 Excessive Data Exposure in Microservice APIs -- 4 Communication Model -- 4.1 Formal Model Description -- 4.2 Source Code Mining -- 5 Metrics -- 6 Case Studies -- 6.1 Case Study 1: Lakeside Mutual -- 6.2 Case Study 2: eShopOnContainers -- 6.3 Summary -- 7 Discussion -- 8 Threats to Validity -- 9 Conclusions and Future Work -- References -- Documentation-as-Code for Interface Control Document Management in Systems of Systems: A Technical Action Research Study -- 1 Introduction -- 2 Background and Related Work -- 2.1 DaC-Documentation-as-Code -- 2.2 ICD Management Approaches -- 3 Research Method -- 3.1 Problem Formulation and Research Questions -- 3.2 Research Method -- 4 Results -- 4.1 RQ1: What Are the Issues with ICDs Management that Cause Assumptions and Misunderstandings When Working with These Documents in SoS? -- 4.2 RQ2: What Are the Features Required for a DaC-Based ICD Management Approach to Address Such Issues? -- 4.3 RQ3: What Is the



Design of an ICD Management Pipeline that Provides the Identified Features? -- 4.4 RQ4: To What Extent Can the Designed ICD Management Pipeline Improve the Identified ICD Management-Related Issues? -- 5 Discussion/Lessons Learned -- 6 Conclusion -- References -- To Deprecate or to Simply Drop Operations? An Empirical Study on the Evolution of a Large OpenAPI Collection -- 1 Introduction -- 2 Dataset Overview -- 3 Results -- 3.1 Deprecation Detection -- 3.2 Operation Stability over Time -- 3.3 Operation State Model.

4 Discussion -- 5 Related Work -- 6 Conclusion -- References -- Architecting for Data-Driven Systems -- ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems -- 1 Introduction -- 2 Preliminary -- 3 ProML Platform -- 3.1 User-Driven Provenance Capture -- 3.2 Artefact-as-a-State-Machine -- 4 Performance and Cost Evaluation -- 4.1 Experimental Design -- 4.2 Results -- 5 Security Evaluation -- 5.1 Threat Model -- 6 Discussions -- 6.1 Usage Scenarios -- 6.2 Where ProML Performs unsatisfactorily -- 6.3 Threat to Validity -- 7 Related Work -- 8 Conclusion -- References -- A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification -- 1 Introduction -- 2 Background and Motivation -- 2.1 Architectural Privacy Tactics and Patterns -- 2.2 Problem Statement and Research Questions -- 3 Reference Model for De-identification -- 4 Study Design -- 4.1 Input and Source Selection -- 4.2 SLR Results -- 4.3 Research Approach -- 5 De-identification Tactics -- 5.1 Phase I. Classification and Recognition of Personal Data -- 5.2 Phase II. De-identification of Personal Data -- 6 Non-functional Attributes and Trade-Offs Involved in De-identification -- 7 Validation -- 7.1 Threats to Validity -- 7.2 Applicability of the De-identification Tactics to Data Types -- 7.3 Coverage of the Privacy Strategies and Privacy Patterns -- 8 Conclusion -- References -- Accurate Performance Predictions with Component-Based Models of Data Streaming Applications -- 1 Introduction -- 2 Running Example -- 3 Related Work -- 4 Problem Analysis -- 4.1 Types of Delays -- 4.2 Required Capabilities of the Modeling Language and Simulation -- 5 Modeling Concepts -- 6 Implementation -- 7 Evaluation -- 7.1 Goals, Questions, Metrics -- 7.2 Evaluation Design -- 7.3 Experiment Setup -- 7.4 Models -- 7.5 Calibration -- 7.6 Results.

8 Threats to Validity -- 9 Conclusion and Future Work -- References -- Microservices and Middleware -- Assessing Architecture Conformance to Coupling-Related Infrastructure-as-Code Best Practices: Metrics and Case Studies -- 1 Introduction -- 2 Related Work -- 3 Research and Modeling Methods -- 4 Decisions on Coupling-Related, IaC-Specific Practices -- 5 Metrics Definition -- 5.1 Model Elements Definition -- 5.2 Metrics for System Coupling Through Deployment Strategy Decision -- 5.3 Metrics for System Coupling Through Infrastructure Stack Grouping Decision -- 6 Case Studies -- 7 Discussion -- 8 Conclusions and Future Work -- References -- Teaching Microservice Architecture Using DevOps-An Experience Report -- 1 Introduction -- 2 Challenges in Teaching -- 3 Course Description -- 3.1 Pedagogical Considerations -- 3.2 Learning Goals and Week Plan -- 3.3 SkyCave -- 3.4 Technical Environment -- 4 Modernization: From Monolith to Microservices -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- Should Microservice Security Smells Stay or be Refactored? Towards a Trade-off Analysis -- 1 Introduction -- 2 Background: SIGs -- 3 Towards a SIG-Based Trade-offs Analysis -- 4 Illustrative Example -- 5 Related Work -- 6 Conclusions -- References -- Architecture Modeling, Design and Decision Making -- From Informal Architecture Diagrams to Flexible Blended Models -- 1 Introduction -- 2 Motivation and Challenges -- 3 Flexible and Blended Modeling of Architectures -- 3.1



Approach Overview -- 3.2 Defining Textual and Graphical Formats -- 3.3 Blended Modeling Loop -- 4 Implementation and Validation -- 4.1 Implementation and Validation in Lab Setting -- 4.2 Evaluative Case Study -- 4.3 Experiences from the Studied Industrial Setting -- 5 Discussion -- 5.1 When to Use This Approach -- 5.2 Approach Limitations -- 5.3 Considered Alternative Approaches.

5.4 Other Threats to Validity -- 6 Related Work -- 7 Conclusion -- References -- Debiasing Architectural Decision-Making: A Workshop-Based Training Approach -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Results -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusion and Future Work -- References -- Persistence Factories Architectural Design Pattern -- 1 Introduction -- 2 The Problem -- 3 Industry Solutions -- 4 The Persistence Factories Architectural Pattern -- 5 Conclusions -- References -- Feature-Based Investigation of Simulation Structure and Behaviour -- 1 Introduction -- 2 Problem Statement -- 3 Specification Language and Feature Identification -- 3.1 Specification Metamodel -- 3.2 Structure Comparison -- 3.3 Behaviour Comparison with SMT -- 4 Evaluation -- 4.1 Evaluation Goals and Design -- 4.2 Evaluation Results and Discussion -- 5 Related Work -- 6 Conclusion -- References -- Architecture Reconstruction and Recovery -- ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware -- 1 Introduction and Motivation -- 2 Foundation -- 2.1 PMX -- 2.2 Palladio Component Model (PCM) -- 2.3 Message-Oriented Middleware (MOM) -- 2.4 Flowing Retail Case Study System -- 3 ARCHI4MOM Structure -- 3.1 PMXController -- 3.2 Data Preparation -- 3.3 Data Processing -- 3.4 Architecture Extraction -- 3.5 Model Builder -- 4 Implementation of ARCHI4MOM -- 5 Evaluation -- 5.1 Threats to Validity -- 6 Related Work -- 7 Conclusion and Future Work -- References -- AutoArx: Digital Twins of Living Architectures -- 1 Introduction -- 2 Application Scenarios -- 3 Background and Related Work -- 3.1 Architecture Information and Documentation -- 3.2 Architecture Information Recovery Methods -- 4 AutoArx Framework -- 4.1 Data Collection Agents (DCAs).

4.2 Architecture Information Recovery Services (AIRS) -- 4.3 Digital Architecture Twin (DArT) -- 4.4 Architecture Information Query Language (AIQL) -- 5 Evaluation Plan -- 6 Conclusion -- References -- Author Index.

Sommario/riassunto

This book constitutes the refereed proceedings of the 16th International Conference on Software Architecture, ECSA 2022, held in Prague in September 2022.The 9 full papers and 6 short papers were carefully selected from 47 submissions.In the Research Track, 11 full papers presented together with 5 short papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections as follows: components, APIs and interface management; architecting for data-driven systems; microservices and middleware; architecture modeling, design and decision making; architecture reconstruction and recovery.



2.

Record Nr.

UNINA9910760299603321

Titolo

Advanced Data Mining and Applications : 19th International Conference, ADMA 2023, Shenyang, China, August 21–23, 2023, Proceedings, Part II / / edited by Xiaochun Yang, Heru Suhartanto, Guoren Wang, Bin Wang, Jing Jiang, Bing Li, Huaijie Zhu, Ningning Cui

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023

ISBN

3-031-46664-0

Edizione

[1st ed. 2023.]

Descrizione fisica

1 online resource (722 pages)

Collana

Lecture Notes in Artificial Intelligence, , 2945-9141 ; ; 14177

Disciplina

006.3

Soggetti

Data mining

Artificial intelligence

Application software

Computer systems

Education - Data processing

Computer vision

Data Mining and Knowledge Discovery

Artificial Intelligence

Computer and Information Systems Applications

Computer System Implementation

Computers and Education

Computer Vision

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Knowledge Graph -- Improving Distance Based Knowledge Graph Embedding via Contrastive Learning -- Knowledge Graph Completion with Information Adaptation and Refinement -- Duet Representation Learning with Entity Multi-Attribute Information in Knowledge Graphs -- TKGAT: Temporal Knowledge Graph Representation Learning Using Attention Network -- Separate-and-Aggregate: A Transformer-based Patch Refinement Model for Knowledge Graph Completion -- Two Birds With One Stone: An Link Prediction Model for Knowledge Hypergraph Based on Fully-Connected Tensor Decomposition -- HEM: an improved



parametric link prediction algorithm based on hybrid network evolution mechanism -- Joint embedding of local structures and evolutionary patterns for temporal link prediction -- Multimedia -- DQN-based Stitching Algorithm for Unmanned Aerial Vehicle Images -- HM-QCNN: Hybrid Multi-branches Quantum-Classical Neural Network for image classification -- DetOH: An Anchor-free Object Detector with Only Heatmaps -- LAANet: An Efficient Automatic Modulation Recognition Model Based on LSTM-Autoencoder and Attention Mechanism -- A Compact Phoneme-To-Audio Aligner for Singing Voice -- Song-to-Video Translation: Writing a Video from Song Lyrics Based on Multimodal Pre-Training -- Medical Image Analysis -- Breast Cancer Histopathology Image Classification Using Frequency Attention Convolution Network -- Wavelet-SVDD: Anomaly Detection and Segmentation with Frequency Domain Attention -- Anatomical-Functional Fusion Network for Lesion Segmentation using Dual-view CEUS -- SpMVNet: Spatial Multi-view Network for Head and Neck Organs at Risk Segmentation -- SNN-BS: A Clinical Terminology Standardization Method using Siamese Networks with Batch Sampling Strategy -- Natural Language -- Read then Respond: Multi-granularity Grounding Prediction for Knowledge-Grounded Dialogue Generation -- SUMO-PEGASUS: A Two-Stage Model for Long Text Summarization -- An Extractive Automatic Summarization Method for Chinese Long Text -- A Likelihood Probability-based Online Summarization Ranking Model -- Spatial Commonsense Reasoning for Machine Reading Comprehension -- Multimodal learning for Automatic Summarization: A Survey -- Deep Knowledge Tracing with Concept Trees -- Privacy and Security -- Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning -- A Hessian-Based Federated Learning Approach to tackle Statistical Heterogeneity -- Analyzing the Convergence of Federated Learning with Biased Client Participation -- Privacy Lost in online Education: Analysis of Web Tracking Evolution -- DANAA: Towards transferable attacks with double adversarial neuron attribution -- CRNN-SA: A Network Intrusion Detection Method Based on Deep Learning -- Applications -- Conspiracy SpoofingOrders Detection with Transformer-based Deep Graph Learning -- A Novel Explainable Rumor Detection Model with Fusing Objective Information -- VLS: A Reinforcement Learning-based Value Lookahead Strategy for Multi-product Order Fulfillment -- Deep Reinforcement Learning for Stock Trading with Behavioral Finance Strategy -- Ensemble Learning based Employment Recommendation under Interaction Sparsity for College Students -- How does ChatGPT Affect Fake News Detection Systems? -- CNGT: Co-attention Networks with Graph Transformer for Fact Verification -- Multi-Modal -- Supervised Discriminative Discrete Hashing for Cross-modal Retrieval -- A Knowledge-enhanced Inferential Network for Cross-modality Multi-hop VQA -- Multi-Head Similarity Feature Representation and Filtration for Image-Text Matching -- Multimodal Conditional VAE for Zero-shot Real-world Event Discovery -- MAMRP: Multi-modal Data Aware Movie Rating Prediction -- MFMGC: A Multi-Modal Data Fusion Model for Movie Genre Classification -- TED-CS: Textual Enhanced Sensitive Video Detection with Common Sense Knowledge.

Sommario/riassunto

This book constitutes the refereed proceedings of the 19th International Conference on Advanced Data Mining and Applications, ADMA 2023, held in Shenyang, China, during August 21–23, 2023. The 216 full papers included in this book were carefully reviewed and selected from 503 submissions. They were organized in topical sections as follows: Data mining foundations, Grand challenges of data mining, Parallel and distributed data mining algorithms, Mining on data



streams, Graph mining and Spatial data mining.