2019
DOI: 10.1007/s11219-019-09478-x
|View full text |Cite
|
Sign up to set email alerts
|

Quality attribute trade-offs in the embedded systems industry: an exploratory case study

Abstract: The embedded systems domain has grown exponentially over the past years. The industry is forced by the market to rapidly improve and release new products to beat the competition. Frenetic development rhythms thus shape this domain and give rise to several new challenges for software design and development. One of them is dealing with trade-offs between run-time and design-time quality attributes. To study practices, processes and tools concerning the management of run-time and design-time quality attributes as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 31 publications
1
5
0
Order By: Relevance
“…An observation stemming from the results of RQ2.3 is that most projects prioritise other quality attributes over Maintainability. In our previous work [76] on the matter, we found that (industrial) software practitioners prioritise runtime qualities (e.g. Performance, Availability, Evolvability) over design-time qualities (e.g.…”
Section: Discussionmentioning
confidence: 96%
“…An observation stemming from the results of RQ2.3 is that most projects prioritise other quality attributes over Maintainability. In our previous work [76] on the matter, we found that (industrial) software practitioners prioritise runtime qualities (e.g. Performance, Availability, Evolvability) over design-time qualities (e.g.…”
Section: Discussionmentioning
confidence: 96%
“…Studies such as Kasunic & Anderson (2004) and Sas & Avgeriou (2020) indicated that scenario-based or architectural styled assessments are better to understand interoperability measures and associated trade-offs involved between systems i.e. IAM data and tools.…”
Section: Uncorrected Proofmentioning
confidence: 99%
“…As discussed, in the aforementioned tools [75] considered the best applications for formal authentication security proofs are Tamarin and AVISPA, due to their implementation of ISO 9798 standard and due to the sensitivity of the patient medical data in the authentication scheme. This survey contained statistics of the most used formal methods in proving schemes validity between 2016 and 2020.…”
Section: Authentication Simulation Toolsmentioning
confidence: 99%