Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software

Published: 11 June 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Developing embedded software applications is a challenging task, chiefly due to the limitations that are imposed by the hardware devices or platforms on which they operate, as well as due to the heterogeneous non-functional requirements that they need to exhibit. Modern embedded systems need to be energy efficient and dependable, whereas their maintenance costs should be minimized, in order to ensure the success and longevity of their application. Being able to build embedded software that satisfies the imposed hardware limitations, while maintaining high quality with respect to critical non-functional requirements is a difficult task that requires proper assistance. To this end, in the present paper, we present the SDK4ED Platform, which facilitates the development of embedded software that exhibits high quality with respect to important quality attributes, with a main focus on energy consumption, dependability, and maintainability. This is achieved through the provision of state-of-the-art and novel quality attribute-specific monitoring and optimization mechanisms, as well as through a novel fuzzy multi-criteria decision-making mechanism for facilitating the selection of code refactorings, which is based on trade-off analysis among the three main attributes of choice. Novel forecasting techniques are also proposed to further support decision making during the development of embedded software. The usefulness, practicality, and industrial relevance of the SDK4ED platform were evaluated in a real-world setting, through three use cases on actual commercial embedded software applications stemming from the airborne, automotive, and healthcare domains, as well as through an industrial study. To the best of our knowledge, this is the first quality analysis platform that focuses on multiple quality criteria, which also takes into account their trade-offs to facilitate code refactoring selection.

    References

    [1]
    Aggarwal, K., Hindle, A., Stroulia, E.: Greenadvisor: a tool for analyzing the impact of software evolution on energy consumption. In: 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 311–320. IEEE (2015)
    [2]
    Alshammari, B., Fidge, C., Corney, D.: A hierarchical security assessment model for object-oriented programs. In: 2011 11th International Conference on Quality Software, vol. 1, pp. 218–227 (2011).
    [3]
    Amanatidis T, Mittas N, Moschou A, Chatzigeorgiou A, Ampatzoglou A, and Angelis L Evaluating the agreement among technical debt measurement tools: building an empirical benchmark of technical debt liabilities Empir. Softw. Eng. 2020 25 4161-4204
    [4]
    Ampatzoglou A, Ampatzoglou A, Chatzigeorgiou A, and Avgeriou P The financial aspect of managing technical debt: a systematic literature review Inf. Softw. Technol. 2015 64 52-73
    [5]
    Ampatzoglou, A., Michailidis, A., Sarikyriakidis, C., Ampatzoglou, A., Chatzigeorgiou, A., Avgeriou, P.: A framework for managing interest in technical debt: an industrial validation. In: 2018 IEEE/ACM International Conference on Technical Debt (TechDebt), pp 115–124 (2018)
    [6]
    Ampatzoglou, A., Tsintzira, A.A., Arvanitou, E.M., Chatzigeorgiou, A., Stamelos, I., Moga, A., Heb, R., Matei, O., Tsiridis, N., Kehagias, D.: Applying the single responsibility principle in industry: modularity benefits and trade-offs. In: Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering, Association for Computing Machinery, New York, EASE ’19, pp. 347–352 (2019)
    [7]
    Ampatzoglou A, Chatzigeorgiou A, Arvanitou EM, and Bibi S Sdk4ed: a platform for technical debt management Softw. Pract. Exp. 2022 5 55
    [8]
    Ansar, S.A., Alka, Khan, R.A.: A phase-wise review of software security metrics. In: Networking Communication and Data Knowledge Engineering (2018)
    [9]
    Ardalani, N., Lestourgeon, C., Sankaralingam, K., Zhu, X.: Cross-architecture performance prediction (xapp) using cpu code to predict gpu performance. In: Proceedings of the 48th International Symposium on Microarchitecture, pp. 725–737. ACM (2015)
    [10]
    Arora, R.: ITALC: Interactive tool for application—level checkpointing. In: Proceedings of the Fourth International Workshop on HPC User Support Tools (2017)
    [11]
    Avgeriou PC, Taibi D, Ampatzoglou A, Arcelli Fontana F, Besker T, Chatzigeorgiou A, Lenarduzzi V, Martini A, Moschou A, Pigazzini I, Saarimaki N, Sas DD, de Toledo SS, and Tsintzira AA An overview and comparison of technical debt measurement tools IEEE Softw. 2021 38 3 61-71
    [12]
    Awan, M.A., Petters, S.M.: Enhanced race-to-halt: a leakage-aware energy management approach for dynamic priority systems. In: 2011 23rd Euromicro Conference on Real-Time Systems, pp. 92–101. IEEE (2011)
    [13]
    Bazzaz M, Salehi M, and Ejlali A An accurate instruction-level energy estimation model and tool for embedded systems IEEE Trans. Instrum. Meas. 2013 62 7 1927-1934
    [14]
    Besker T, Martini A, and Bosch J Software developer productivity loss due to technical debt-a replication and extension study examining developers’ development work J. Syst. Softw. 2019 156 41-61
    [15]
    Binkert N, Beckmann B, Black G, Reinhardt SK, Saidi A, Basu A, Hestness J, Hower DR, Krishna T, Sardashti S, et al. The gem5 simulator ACM SIGARCH Comput. Archit. News 2011 39 2 1-7
    [16]
    Brooke J et al. Sus-a quick and dirty usability scale Usability Eval. Ind. 1996 189 194 4-7
    [17]
    Brown, N., Cai, Y., Guo, Y., Kazman, R., Kim, M., Kruchten, P., Lim, E., MacCormack, A., Nord, R., Ozkaya, I., Sangwan, R., Seaman, C., Sullivan, K., Zazworka, N.: Managing technical debt in software-reliant systems. In: Proceedings of the FSE/SDP Workshop on Future of Software Engineering Research, Association for Computing Machinery, New York, FoSER ’10, pp. 47–52 (2010),
    [18]
    Catthoor F, Danckaert K, Brockmeyer E, Kulkarni K, Kjeldsberg PG, Van Achteren T, and Omnes T Data Access and Storage Management for Embedded Programmable Processors 2002 Berlin Springer Science & Business Media
    [19]
    Charalampidou S, Ampatzoglou A, Chatzigeorgiou A, Gkortzis A, and Avgeriou P Identifying extract method refactoring opportunities based on functional relevance IEEE Trans. Softw. Eng. 2017 43 10 954-974
    [20]
    Chatzigeorgiou, A., Ampatzoglou, A., Ampatzoglou, A., Amanatidis, T.: Estimating the breaking point for technical debt. In: 2015 IEEE 7th International Workshop on Managing Technical Debt (MTD), IEEE Computer Society, Los Alamitos, pp 53–56 (2015),
    [21]
    Chowdhury I and Zulkernine M Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities J. Syst. Archit. 2011 5 55
    [22]
    Colombo RT, Pessôa MS, Guerra AC, Filho AB, and Gomes CC Prioritization of software security intangible attributes ACM SIGSOFT Softw. Eng. Notes 2012 37 6 1
    [23]
    Cunningham W The wycash portfolio management system ACM SIGPLAN OOPS Messenger 1993 4 2 29-30
    [24]
    Dam HK, Tran T, Pham T, Ng SW, Grundy J, and Ghose A Automatic feature learning for predicting vulnerable software components IEEE Trans. Softw. Eng. 2018 47 1 67-85
    [25]
    David, H., Gorbatov, E., Hanebutte, U.R., Khanna, R., Le, C.: Rapl: memory power estimation and capping. In: Proceedings of the 16th ACM/IEEE International Symposium on Low Power Electronics and Design, pp. 189–194 (2010)
    [26]
    Dayanandan U and Kalimuthu V Software architectural quality assessment model for security analysis using fuzzy analytical hierarchy process (FAHP) method 3D Res. 2018 9 3 31
    [27]
    DeMarco T Controlling Software Projects: Management, Measurement, and Estimates 1986 Upper Saddle River Prentice Hall PTR
    [28]
    Digkas G, Chatzigeorgiou A, Ampatzoglou A, and Avgeriou P Can clean new code reduce technical debt density? IEEE Trans. Softw. Eng. 2022 48 05 1705-1721
    [29]
    Eder, K., Gallagher, J.P., Fagas, G., Gammaitoni, L., Paul, D.: Energy-aware software engineering. ICT-energy concepts for energy efficiency and sustainability, pp. 103–127 (2017)
    [30]
    Egwutuoha IP, Levy D, Selic B, and Chen S A survey of fault tolerance mechanisms and checkpoint/restart implementations for high performance computing systems J. Supercomput. 2013 65 3 1302-1326
    [31]
    Elnozahy EN, Alvisi L, Wang YM, and Johnson DB A survey of rollback-recovery protocols in message-passing systems ACM Comput. Surv. 2002 34 3 375-408
    [32]
    Elo S and Kyngäs H The qualitative content analysis process J. Adv. Nurs. 2008 62 1 107-115
    [33]
    Euler, L.: De serie lambertina plurimisque eius insignibus proprietatibus. Acta Academiae scientiarum imperialis petropolitanae, pp. 29–51 (1783)
    [34]
    Filus K, Boryszko P, Domańska J, Siavvas M, and Gelenbe E Efficient feature selection for static analysis vulnerability prediction Sensors 2021 21 4 1133
    [35]
    Filus, K., Siavvas, M., Domańska, J., Gelenbe, E.: The random neural network as a bonding model for software vulnerability prediction. In: Modelling, Analysis, and Simulation of Computer and Telecommunication Systems: 28th International Symposium, MASCOTS 2020, Nice, 2020, Revised Selected Papers 28, pp. 102–116. Springer (2021b)
    [36]
    Fontana, F.A., Roveda, R., Zanoni, M.: Technical debt indexes provided by tools: a preliminary discussion. In: 2016 IEEE 8th International Workshop on Managing Technical Debt (MTD), pp. 28–31 (2016),
    [37]
    Fowers, J., Brown, G., Cooke, P., Stitt, G.: A performance and energy comparison of FPGAS, GPUS, and multicores for sliding-window applications. In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, pp. 47–56 (2012)
    [38]
    Fowler M Refactoring: Improving the Design of Existing Code 1999 Boston Addison-Wesley Longman Publishing Co. Inc
    [39]
    Gelenbe E Random neural networks with negative and positive signals and product form solution Neural Comput. 1989 1 4 502-510
    [40]
    Gelenbe E and Siavvas M Minimizing energy and computation in long-running software Appl. Sci. 2021 11 3 1169
    [41]
    Gelenbe, E., Boryszko, P., Siavvas, M., Domanska, J.: Optimum checkpoints for time and energy. In: 2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp 1–8. IEEE (2020)
    [42]
    Georgiou S, Rizou S, and Spinellis D Software development lifecycle for energy efficiency: techniques and tools ACM Comput. Surv. (CSUR) 2019 52 4 1-33
    [43]
    Guo S and Zhao H Fuzzy best-worst multi-criteria decision-making method and its applications Knowl.-Based Syst. 2017 121 23-31
    [44]
    Hanif, H., Maffeis, S.: Vulberta: Simplified source code pre-training for vulnerability detection. In: 2022 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2022)
    [45]
    Holzmann GJ The value of doubt IEEE Softw. 2017 34 1 106-109
    [46]
    Hönig T, Eibel C, Kapitza R, and Schröder-Preikschat W Seep: exploiting symbolic execution for energy-aware programming ACM SIGOPS Oper. Syst. Rev. 2012 45 3 58-62
    [47]
    Hönig, T., Janker, H., Eibel, C., Mihelic, O., Kapitza, R.: Proactive energy-aware programming with {PEEK}. In: 2014 Conference on Timely Results in Operating Systems ({TRIOS} 14) (2014)
    [48]
    Hursey, J., Squyres, J.M., Mattox, T.I., Lumsdaine, A.: The Design and Implementation of Checkpoint / Restart Process Fault Tolerance for Open MPI. Architecture (2007)
    [49]
    ISO/IEC (2011) ISO/IEC 25010 - Systems and software engineering—Systems and software Quality Requirements and Evaluation (SQuaRE)—System and software quality models. ISO/IEC
    [50]
    ISO/IEC (2013) ISO/IEC 27001:2013(en) Information technology—Security techniques—Information security management systems—Requirements. Tech. rep
    [51]
    Kim, S., Choi, J., Ahmed, M.E., Nepal, S., Kim, H.: Vuldebert: A vulnerability detection system using bert. In: 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 69–74 (2022)
    [52]
    Lai, S.T.: An analyzer-based software security measurement model for enhancing software system security. In: Proceedings—2010 2nd WRI World Congress on Software Engineering (2010)
    [53]
    Lambert JH Observationes variae in mathesin puram Acta Helv. 1758 3 1 128-168
    [54]
    Lamprakos CP, Marantos C, Siavvas M, Papadopoulos L, Tsintzira AA, Ampatzoglou A, Chatzigeorgiou A, Kehagias D, and Soudris D Translating quality-driven code change selection to an instance of multiple-criteria decision making Inf. Softw. Technol. 2022 145 106851
    [55]
    Lee, S., Meredith, J.S., Vetter, J.S.: Compass: A framework for automated performance modeling and prediction. In: Proceedings of the 29th ACM on International Conference on Supercomputing, pp. 405–414 (2015)
    [56]
    Li Z, Avgeriou P, and Liang P A systematic mapping study on technical debt and its management J. Syst. Softw. 2015 101 193-220
    [57]
    Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., Deng, Z., Zhong, Y.: Vuldeepecker: a deep learning-based system for vulnerability detection (2018). arXiv preprint arXiv:1801.01681
    [58]
    Llamocca, D., Carranza, C., Pattichis, M.: Separable fir filtering in FPGA and GPU implementations: energy, performance, and accuracy considerations. In: 2011 21st International Conference on Field Programmable Logic and Applications, pp. 363–368. IEEE (2011)
    [59]
    Losada N, Martín MJ, Rodríguez G, and Gonzalez P Portable application-level checkpointing for hybrid MPI-OpenMP applications Proced. Comput. Sci. 2016 80 19-29
    [60]
    Lowe-Power, J., Ahmad, A.M., Akram, A., Alian, M., Amslinger, R., Andreozzi, M., Armejach, A., Asmussen, N., Beckmann, B., Bharadwaj, S., et al.: The gem5 simulator: version 20.0+. arXiv preprint arXiv:2007.03152 (2020)
    [61]
    Manotas, I., Pollock, L., Clause, J.: Seeds: a software engineer’s energy-optimization decision support framework. In: Proceedings of the 36th International Conference on Software Engineering, pp. 503–514 (2014)
    [62]
    Manotas, I., Bird, C., Zhang, R., Shepherd, D., Jaspan, C., Sadowski, C., Pollock, L., Clause, J.: An empirical study of practitioners’ perspectives on green software engineering. In: 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), pp. 237–248. IEEE (2016)
    [63]
    Marantos C, Salapas K, Papadopoulos L, and Soudris D A flexible tool for estimating applications performance and energy consumption through static analysis SN Comput. Sci. 2021 2 1 1-11
    [64]
    Marantos C, Papadopoulos L, Lamprakos CP, Salapas K, and Soudris D Bringing energy efficiency closer to application developers: an extensible software analysis framework IEEE Trans. Sustain. Comput. 2022
    [65]
    Marantos C, Papadopoulos L, Tsintzira AA, Ampatzoglou A, Chatzigeorgiou A, and Soudris D Decision support for GPU acceleration by predicting energy savings and programming effort Sustain. Comput. Inf. Syst. 2022 34 100631
    [66]
    Marantos, C., Siavvas, M., Tsoukalas, D., Lamprakos, C.P., Papadopoulos, L., Boryszko, P., Filus, K., Domańska, J., Ampatzoglou, A., Chatzigeorgiou, A., et al.: Sdk4ed: one-click platform for energy-aware, maintainable and dependable applications. In: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 981–986. IEEE (2022c)
    [67]
    Medeiros, N., Ivaki, N., Costa, P., Vieira, M.: An approach for trustworthiness benchmarking using software metrics. In: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 84–93 (2018)
    [68]
    Mohammed NM, Niazi M, Alshayeb M, and Mahmood S Exploring software security approaches in software development lifecycle: a systematic mapping study Comput. Stand. Interfaces 2016
    [69]
    Moody, A., Bronevetsky, G., Mohror, K., d Supinski, B.R.: Design, modeling, and evaluation of a scalable multi-level checkpointing system. In: 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis, pp 1–11 (2010).
    [70]
    Morrison P, Moye D, Pandita R, and Williams L Mapping the field of software life cycle security metrics Inf. Softw. Technol. 2018 102 May 146-159
    [71]
    Noureddine A, Rouvoy R, and Seinturier L Monitoring energy hotspots in software Autom. Softw. Eng. 2015 22 3 291-332
    [72]
    Pinto G and Castor F Energy efficiency: a new concern for application software developers Commun. ACM 2017 60 12 68-75
    [73]
    Reddy R and Petrov P Cache partitioning for energy-efficient and interference-free embedded multitasking ACM Trans. Embedded Comput. Syst. (TECS) 2010 9 3 1-35
    [74]
    Rios, N., Oliveira Spínola, R., Mendonça, M., Seaman, C.: Supporting analysis of technical debt causes and effects with cross-company probabilistic cause-effect diagrams. In: 2019 IEEE/ACM International Conference on Technical Debt (TechDebt), pp. 3–12 (2019)
    [75]
    Rodríguez G, Martín MJ, González P, Touriño J, and Doallo R CPPC: a compiler-assisted tool for portable checkpointing of message-passing applications Concurr. Comput. Pract. Exp. 2010 22 6 749-766
    [76]
    Saaty TL Decision making with the analytic hierarchy process Int. J. Serv. Sci. 2008
    [77]
    Sas D and Avgeriou P Quality attribute trade-offs in the embedded systems industry: an exploratory case study Softw. Qual. J. 2020 28 2 505-534
    [78]
    Scandariato R, Walden J, Hovsepyan A, and Joosen W Predicting vulnerable software components via text mining IEEE Trans. Softw. Eng. 2014 40 10 993-1006
    [79]
    SDK4ED (2019a) D7.2 - Airborne Use Case Deployment. Tech. rep
    [80]
    SDK4ED (2019b) D7.3 - Healthcare Use Case Deployment. Tech. rep
    [81]
    SDK4ED (2019c) D7.4 - Automotive Use Case Deployment. Tech. rep
    [82]
    SDK4ED (2019d) D7.5 - Empirical Study Results. Tech. rep
    [83]
    Seaman, C., Guo, Y.: Chapter 2—measuring and monitoring technical debt. Advances in Computers, vol 82, Elsevier, pp 25–46, https://www.sciencedirect.com/science/article/pii/B9780123855121000025 (2011)
    [84]
    Seaman CB Qualitative methods in empirical studies of software engineering IEEE Trans. Softw. Eng. 1999 25 4 557-572
    [85]
    Sentilles, S., Papatheocharous, E., Ciccozzi, F.: What do we know about software security evaluation? A preliminary study. In: 6th International Workshop on Quantitative Approaches to Software Quality (2018)
    [86]
    Shahzad F, Thies J, and Wellein G CRAFT: a library for easier application-level checkpoint/restart and automatic fault tolerance IEEE Trans. Parallel Distrib. Syst. 2018
    [87]
    Shin Y, Meneely A, Williams L, and Osborne JA Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities IEEE Trans. Softw. Eng. 2011 37 6 772-787
    [88]
    Siavvas M and Gelenbe E Optimum checkpoints for programs with loops Simul. Model. Pract. Theory 2019 97 101951
    [89]
    Siavvas, M., Gelenbe, E.: Optimum interval for application-level checkpoints. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 145–150. IEEE (2019b)
    [90]
    Siavvas M, Kehagias D, Tzovaras D, and Gelenbe E A hierarchical model for quantifying software security based on static analysis alerts and software metrics Softw. Qual. J. 2021 29 2 431-507
    [91]
    Siddiqi, M.A., Tsintzira, A.A., Digkas, G., Siavvas, M.G., Strydis, C.: Adding security to implantable medical devices: Can we afford it? In: EWSN, pp. 67–78 (2021)
    [92]
    Sommerville I Software Engineering 1995 Boston Addison-Wesley
    [93]
    Suryanarayana G, Samarthyam G, and Sharma T Refactoring for software design smells: managing technical debt 2014 Burlington Morgan Kaufmann
    [94]
    Takizawa, H., Koyama, K., Sato, K., Komatsu, K., Kobayashi, H.: CheCL: Transparent checkpointing and process migration of OpenCL applications. In: Proceedings—25th IEEE International Parallel and Distributed Processing Symposium. IPDPS 2011, pp. 864–876 (2011).
    [95]
    Tsantalis, N., Chaikalis, T., Chatzigeorgiou, A.: Ten years of jdeodorant: Lessons learned from the hunt for smells. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 4–14, (2018)
    [96]
    Tsintzira, A.A., Ampatzoglou, A., Matei, O., Ampatzoglou, A., Chatzigeorgiou, A., Heb, R.: Technical debt quantification through metrics: an industrial validation. In: 15th China-Europe International Symposium on Software Engineering Education (2019)
    [97]
    Tsoukalas, D., Jankovic, M., Siavvas, M., Kehagias, D., Chatzigeorgiou, A., Tzovaras, D.: On the applicability of time series models for technical debt forecasting. In: 15th China-Europe International Symposium on Software Engineering Education (CEISEE) (in press), pp. 1–10 (2019),
    [98]
    Tsoukalas D, Kehagias D, Siavvas M, and Chatzigeorgiou A Technical debt forecasting: an empirical study on open-source repositories J. Syst. Softw. 2020 170 110777
    [99]
    Tsoukalas D, Siavvas M, Kehagias D, Ampatzoglou A, and Chatzigeorgiou A A practical approach for technical debt prioritization based on class-level forecasting J. Softw. Evol. Process 2023
    [100]
    Wagner S, Goeb A, Heinemann L, Kläs M, Lampasona C, Lochmann K, Mayr A, Plösch R, Seidl A, Streit J, and Trendowicz A Operationalised product quality models and assessment: the Quamoco approach Inf. Softw. Technol. 2015 62 101-123
    [101]
    Walden, J., Doyle, M., Welch, G.A., Whelan, M.: Security of open source web applications. In: 3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009 (2009)
    [102]
    Wang S, Zhong G, and Mitra T Cgpredict: embedded GPU performance estimation from single-threaded applications ACM Trans. Embed. Comput. Syst. (TECS) 2017 16 5s 146
    [103]
    Wang, W., Mishra, P., Ranka, S.: Dynamic cache reconfiguration and partitioning for energy optimization in real-time multi-core systems. In: 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 948–953. IEEE (2011)
    [104]
    Xu, H., Heijmans, J., Visser, J.: A practical model for rating software security. In: Proceedings—7th International Conference on Software Security and Reliability Companion, SERE-C 2013 (2013)
    [105]
    Zafar S, Mehboob M, Naveed A, and Malik B Security quality model: an extension of Dromey’s model Softw. Qual. J. 2015 23 1 55
    [106]
    Zagane M, Abdi MK, and Alenezi M Deep learning for software vulnerabilities detection using code metrics IEEE Access 2020 8 74562-74570
    [107]
    Zheng, X., John, L.K., Gerstlauer, A.: Accurate phase-level cross-platform power and performance estimation. In: Proceedings of the 53rd Annual Design Automation Conference (2016)
    [108]
    Zheng, X., Vikalo, H., Song, S., John, L.K., Gerstlauer, A.: Sampling-based binary-level cross-platform performance estimation. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pp. 1709–1714. IEEE (2017)
    [109]
    Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks (2019). arXiv preprint arXiv:1909.03496

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Automated Software Engineering
    Automated Software Engineering  Volume 31, Issue 2
    Nov 2024
    860 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 11 June 2024
    Accepted: 24 May 2024
    Received: 16 December 2023

    Author Tags

    1. Embedded software
    2. Software quality evaluation
    3. Energy consumption
    4. Dependability
    5. Maintainability
    6. Trade-off analysis

    Qualifiers

    • Research-article

    Funding Sources

    • Horizon2020
    • Horizon2020
    • Horizon2020
    • Horizon2020
    • Horizon2020
    • Horizon2020
    • Horizon2020
    • Horizon2020
    • Horizon2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media