skip to main content
10.1145/3123779acmotherconferencesBook PagePublication PagesecbsConference Proceedingsconference-collections
ECBS '17: Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ECBS '17: Fifth European Conference on the Engineering of Computer Based Systems Larnaca Cyprus 31 August 2017- 1 September 2017
ISBN:
978-1-4503-4843-0
Published:
31 August 2017
In-Cooperation:

Bibliometrics
Skip Abstract Section
Abstract

This volume contains the proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems (ECBS 2017), organized by the University of Cyprus in cooperation with ACM SIGAPP, SIGOPS, and SIGSOFT.

ECBS 2017 is a continuation of the Eastern European Regional Conference on the Engineering of Computer Based Systems (ECBS-EERC). It was established in 2008 as an Eastern/Central European offspring of the Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, which itself was discontinued in 2013. This realization of ECBS makes the conference step out organizationally from the Central European region to Cyprus as a convenient and attractive location for both European and many non-European authors.

Skip Table Of Content Section
SESSION: Software engineering
research-article
Employing issues and commits for in-code sentence based use case identification and remodularization

Use case driven modularization improves code comprehension and maintenance and provides another view on software alongside object-oriented modularization. However, approaches enabling use case driven modularization require to modularize code manually. ...

research-article
Using core ontologies for extending sensitive business process modeling with the knowledge perspective

This research article presents an extension of the most suitable business process modeling formalism BPMN 2.0 for including and implementing the knowledge dimension in Sensitive Business Processes (SBPs). This extension is semantically rich and well-...

research-article
Model driven secure web applications: the SeWAT platform

Model driven security (MDS) is a well known approach in the access control domain. It proposes a security-by-design approach intended to link the encoded policy to the security policy modeling. However, this technique does not tie in the specificity and ...

research-article
Decision guidance models for microservices: service discovery and fault tolerance

Introducing a microservice system is a challenging task and requires the exploration and documentation of several related areas of design. Exploration and documentation of software architecture design is supported by decision guidance models in software ...

research-article
Structuring analyses of complex enterprise datasets with adaptive morphogenesis methods

The potential of the adaptive morphogenesis methods proposed by architect Christopher Alexander is yet to be fully realised in enterprise data analysis context. These could be customised to provide a suitable metaphor for organising analyses and to ...

research-article
Reconstructing timed symbolic traces from rtioco-based timed test sequences using backward-induction

As of today, model-based testing is considered as a leading-edge technology in the IT industry. In model-based testing, an implementation under test is tested for compliance with a model that describes the required behaviour of the implementation. U...

research-article
Estimation of the domination number in sparse random graphs and applications

Motivated by airborne intruder detection and defence systems, we examine sparse random graphs with linear number of connections. We establish theoretical bounds on domination number and our analysis gives a partial solution of the problem posed in [6]. ...

SESSION: Embedded systems and networking
research-article
Towards analysis of IP communication in a constrained environment of tactical radio networks

The trend of unifying communication by deploying TCP/IP also influenced the domain of tactical networks. Commonly used narrowband waveform tactical radios offer only the low bandwidth data transfer. Because of very restricted resources available in ...

research-article
Towards defending connected vehicles against attacks

Connected vehicles utilize various communication types that take place between different entities such as vehicle, infrastructure, cloud, and mobile. Connected vehicles have sensors and Electronic Control Units (ECUs) that perform in-vehicle ...

research-article
Instructions energy consumption on a heterogeneous multicore platform
Article No.: 10, pp 1–10https://doi.org/10.1145/3123779.3123795

Today more than ever, energy and power distribution on heterogeneous multicore platforms have immense influence on hardware and software architectures because of general tendencies towards energy efficient solutions. This paper provides an insight into ...

research-article
Towards a realtime, collision-free motion coordination and navigation system for a UAV fleet

This paper presents a realtime, collision-free motion coordination and navigation system for an Unmanned Aerial Vehicle (UAV) fleet. The proposed system uses geographical locations of the UAVs and of the successfully detected, static and moving ...

research-article
A Constraint-based intrusion detection system
Article No.: 12, pp 1–10https://doi.org/10.1145/3123779.3123812

The expressiveness of constraints has a potential to define network behavior and defend against complex network intrusions. This potential can be an integral part of an Intrusion Detection System (IDS) for defending networks against various attacks. The ...

SESSION: Parallel and distributed systems
research-article
An approach to formal verification of python software transactional memory
Article No.: 13, pp 1–10https://doi.org/10.1145/3123779.3123788

Although Python is one of the most widely used programming languages, and it is a foundation for a variety of parallel and distributed computing frameworks, it still lacks an applicable and reliable software transactional memory. In this paper, we ...

research-article
Design principles of an embedded language (EFL) enabling well defined order-independent execution

Parallel programming platforms are heterogeneous and incompatible; a common approach is needed to free programmers from platforms' technical intricacies, allowing <u>flexible execution</u> in which sequential and parallel executions produce identical ...

research-article
Performance improvement of distributed file system using tunneling

The paper deals with the modern concepts of distributed and hierarchical storage systems. Because of the high capacity of modern storage devices, the increasing number of files stored in such systems and the new client access patterns of mobile devices, ...

research-article
Virtual machine consolidation for cloud data centers using parameter-based adaptive allocation
Article No.: 16, pp 1–10https://doi.org/10.1145/3123779.3123807

Cloud computing enables cloud providers to offer computing infrastructure as a service (IaaS) in the form of virtual machines (VMs). Cloud management platforms automate the allocation of VMs to physical machines (PMs). An adaptive VM allocation policy ...

SESSION: Short papers
short-paper
Using FPGA implementations for evaluation of internet retransmission-time-out predictors

The congestion control avoidance of TCP (Transport Control Protocol), the most used protocol in Internet, is based on critical RTT (Round Trip Time) forecasting process. Currently, several delay predictors are proposed in literature; but practical ...

short-paper
Information system evolution management: a complex evaluation

In our previous papers we have focused on problems of model and/or information system evolution. We have dealt with popular technologies and languages for data storage and data management, such as XML, SQL, XPath, REST, BPMN, etc. In this paper we sum ...

short-paper
Towards a generic framework for model-driven engineering of software process lines

Situational Method Engineering (SME) approaches help construct bespoke software development processes according to the specifications of the project at hand, but they are time-consuming and costly. A Software Process Line (SPrL) tackles this problem by ...

SESSION: Extended abstracts
extended-abstract
Dual channel security

Defying attacks and vulnerabilities has been a challenge since the beginning of modern technology and especially after the gigantic leap of the online market system. Developers tend to aim at protection against theft in a new binary world that opened up ...

extended-abstract
Optimal smart mobile access point placement for maximal coverage and minimal communication

A selection of the optimal placements of the access points and sensors constitutes one of the fundamental challenges in the monitoring of spatial phenomena in wireless sensor networks (WSNs). Access points should occupy the best locations in order to ...

extended-abstract
An FPGA-based beam steering transceiver prototype for narrowband IoT communications

This work presents the design and implementation of a beam steering transceiver prototype targeting narrowband IoT communications. The proposed architecture, integrating an open-source 8051 processor IP-core and a revised 4-channel DDS-PLL phase shifter,...

Contributors
  • Brno University of Technology
  • Slovak University of Technology in Bratislava
  • University of Cyprus

Recommendations

Acceptance Rates

Overall Acceptance Rate25of49submissions,51%
YearSubmittedAcceptedRate
ECBS '19492551%
Overall492551%