This volume contains the proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems (ECBS 2017), organized by the University of Cyprus in cooperation with ACM SIGAPP, SIGOPS, and SIGSOFT.
ECBS 2017 is a continuation of the Eastern European Regional Conference on the Engineering of Computer Based Systems (ECBS-EERC). It was established in 2008 as an Eastern/Central European offspring of the Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, which itself was discontinued in 2013. This realization of ECBS makes the conference step out organizationally from the Central European region to Cyprus as a convenient and attractive location for both European and many non-European authors.
Proceeding Downloads
Employing issues and commits for in-code sentence based use case identification and remodularization
Use case driven modularization improves code comprehension and maintenance and provides another view on software alongside object-oriented modularization. However, approaches enabling use case driven modularization require to modularize code manually. ...
Using core ontologies for extending sensitive business process modeling with the knowledge perspective
This research article presents an extension of the most suitable business process modeling formalism BPMN 2.0 for including and implementing the knowledge dimension in Sensitive Business Processes (SBPs). This extension is semantically rich and well-...
Model driven secure web applications: the SeWAT platform
Model driven security (MDS) is a well known approach in the access control domain. It proposes a security-by-design approach intended to link the encoded policy to the security policy modeling. However, this technique does not tie in the specificity and ...
Decision guidance models for microservices: service discovery and fault tolerance
Introducing a microservice system is a challenging task and requires the exploration and documentation of several related areas of design. Exploration and documentation of software architecture design is supported by decision guidance models in software ...
Structuring analyses of complex enterprise datasets with adaptive morphogenesis methods
The potential of the adaptive morphogenesis methods proposed by architect Christopher Alexander is yet to be fully realised in enterprise data analysis context. These could be customised to provide a suitable metaphor for organising analyses and to ...
Reconstructing timed symbolic traces from rtioco-based timed test sequences using backward-induction
As of today, model-based testing is considered as a leading-edge technology in the IT industry. In model-based testing, an implementation under test is tested for compliance with a model that describes the required behaviour of the implementation. U...
Estimation of the domination number in sparse random graphs and applications
Motivated by airborne intruder detection and defence systems, we examine sparse random graphs with linear number of connections. We establish theoretical bounds on domination number and our analysis gives a partial solution of the problem posed in [6]. ...
Towards analysis of IP communication in a constrained environment of tactical radio networks
The trend of unifying communication by deploying TCP/IP also influenced the domain of tactical networks. Commonly used narrowband waveform tactical radios offer only the low bandwidth data transfer. Because of very restricted resources available in ...
Towards defending connected vehicles against attacks
Connected vehicles utilize various communication types that take place between different entities such as vehicle, infrastructure, cloud, and mobile. Connected vehicles have sensors and Electronic Control Units (ECUs) that perform in-vehicle ...
Instructions energy consumption on a heterogeneous multicore platform
Today more than ever, energy and power distribution on heterogeneous multicore platforms have immense influence on hardware and software architectures because of general tendencies towards energy efficient solutions. This paper provides an insight into ...
Towards a realtime, collision-free motion coordination and navigation system for a UAV fleet
This paper presents a realtime, collision-free motion coordination and navigation system for an Unmanned Aerial Vehicle (UAV) fleet. The proposed system uses geographical locations of the UAVs and of the successfully detected, static and moving ...
A Constraint-based intrusion detection system
The expressiveness of constraints has a potential to define network behavior and defend against complex network intrusions. This potential can be an integral part of an Intrusion Detection System (IDS) for defending networks against various attacks. The ...
An approach to formal verification of python software transactional memory
Although Python is one of the most widely used programming languages, and it is a foundation for a variety of parallel and distributed computing frameworks, it still lacks an applicable and reliable software transactional memory. In this paper, we ...
Design principles of an embedded language (EFL) enabling well defined order-independent execution
Parallel programming platforms are heterogeneous and incompatible; a common approach is needed to free programmers from platforms' technical intricacies, allowing <u>flexible execution</u> in which sequential and parallel executions produce identical ...
Performance improvement of distributed file system using tunneling
The paper deals with the modern concepts of distributed and hierarchical storage systems. Because of the high capacity of modern storage devices, the increasing number of files stored in such systems and the new client access patterns of mobile devices, ...
Virtual machine consolidation for cloud data centers using parameter-based adaptive allocation
Cloud computing enables cloud providers to offer computing infrastructure as a service (IaaS) in the form of virtual machines (VMs). Cloud management platforms automate the allocation of VMs to physical machines (PMs). An adaptive VM allocation policy ...
Using FPGA implementations for evaluation of internet retransmission-time-out predictors
The congestion control avoidance of TCP (Transport Control Protocol), the most used protocol in Internet, is based on critical RTT (Round Trip Time) forecasting process. Currently, several delay predictors are proposed in literature; but practical ...
Information system evolution management: a complex evaluation
In our previous papers we have focused on problems of model and/or information system evolution. We have dealt with popular technologies and languages for data storage and data management, such as XML, SQL, XPath, REST, BPMN, etc. In this paper we sum ...
Towards a generic framework for model-driven engineering of software process lines
Situational Method Engineering (SME) approaches help construct bespoke software development processes according to the specifications of the project at hand, but they are time-consuming and costly. A Software Process Line (SPrL) tackles this problem by ...
Dual channel security
Defying attacks and vulnerabilities has been a challenge since the beginning of modern technology and especially after the gigantic leap of the online market system. Developers tend to aim at protection against theft in a new binary world that opened up ...
Optimal smart mobile access point placement for maximal coverage and minimal communication
A selection of the optimal placements of the access points and sensors constitutes one of the fundamental challenges in the monitoring of spatial phenomena in wireless sensor networks (WSNs). Access points should occupy the best locations in order to ...
An FPGA-based beam steering transceiver prototype for narrowband IoT communications
This work presents the design and implementation of a beam steering transceiver prototype targeting narrowband IoT communications. The proposed architecture, integrating an open-source 8051 processor IP-core and a revised 4-channel DDS-PLL phase shifter,...
Recommendations
Acceptance Rates
| Year | Submitted | Accepted | Rate |
|---|---|---|---|
| ECBS '19 | 49 | 25 | 51% |
| Overall | 49 | 25 | 51% |



