-
Privacy-preserving transactive energy systems: Key topics and open research challenges
Authors:
Daniel Gerbi Duguma,
Juliana Zhang,
Meysam Aboutalebi,
Shiliang Zhang,
Catherine Banet,
Cato Bjørkli,
Chinmayi Baramashetru,
Frank Eliassen,
Hui Zhang,
Jonathan Muringani,
Josef Noll,
Knut Inge Fostervold,
Lars Böcker,
Lee Andrew Bygrave,
Matin Bagherpour,
Maunya Doroudi Moghadam,
Olaf Owe,
Poushali Sengupta,
Roman Vitenberg,
Sabita Maharjan,
Thiago Garrett,
Yushuai Li,
Zhengyu Shan
Abstract:
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover resear…
▽ More
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover research topics in energy technology and energy informatics, energy law, data law, energy market and socio-psychology that are relevant to the seamless integration of renewable energy resources and the transactive energy systems-in smart microgrids-focusing on distributed frameworks such as peer-to-peer (P2P) energy trading. We clarify issues, identify barriers, and suggest possible solutions to open questions in diversified topics, such as block-chain interoperability, consumer privacy and data sharing, and participation incentivization. Furthermore, we also elaborate challenges associated with cross-disciplinary collaboration and coordination for transactive energy systems, and enumerate the lessons learned from our work so far.
△ Less
Submitted 17 December, 2023;
originally announced December 2023.
-
Optimizing detection of continuous variable entanglement for limited data
Authors:
Martin Gärttner,
Tobias Haas,
Johannes Noll
Abstract:
We explore the advantages of a class of entanglement criteria for continuous variable systems based on the Husimi $Q$-distribution in scenarios with sparse experimental data. The generality of these criteria allows optimizing them for a given entangled state and experimental setting. We consider the scenario of coarse grained measurements, or finite detector resolution, where the values of the Hus…
▽ More
We explore the advantages of a class of entanglement criteria for continuous variable systems based on the Husimi $Q$-distribution in scenarios with sparse experimental data. The generality of these criteria allows optimizing them for a given entangled state and experimental setting. We consider the scenario of coarse grained measurements, or finite detector resolution, where the values of the Husimi $Q$-distribution are only known on a grid of points in phase space, and show how the entanglement criteria can be adapted to this case. Further, we examine the scenario where experimental measurements amount to drawing independent samples from the Husimi distribution. Here, we customize our entanglement criteria to maximize the statistical significance of the detection for a given finite number of samples. In both scenarios optimization leads to clear improvements enlarging the class of detected states and the signal-to-noise ratio of the detection, respectively.
△ Less
Submitted 15 January, 2024; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Detecting continuous variable entanglement in phase space with the $Q$-distribution
Authors:
Martin Gärttner,
Tobias Haas,
Johannes Noll
Abstract:
We prove a general class of continuous variable entanglement criteria based on the Husimi $Q$-distribution, which represents a quantum state in canonical phase space, by employing a theorem by Lieb and Solovej. We discuss their generality, which roots in the possibility to optimize over the set of concave functions, from the perspective of continuous majorization theory and show that with this app…
▽ More
We prove a general class of continuous variable entanglement criteria based on the Husimi $Q$-distribution, which represents a quantum state in canonical phase space, by employing a theorem by Lieb and Solovej. We discuss their generality, which roots in the possibility to optimize over the set of concave functions, from the perspective of continuous majorization theory and show that with this approach families of entropic as well as second moment criteria follow as special cases. All derived criteria are compared to corresponding marginal based criteria and the strength of the phase space approach is demonstrated for a family of prototypical example states where only our criteria flag entanglement. Further, we explore their optimization prospects in two experimentally relevant scenarios characterized by sparse data: finite detector resolution and finite statistics. In both scenarios optimization leads to clear improvements enlarging the class of detected states and the signal-to-noise ratio of the detection, respectively.
△ Less
Submitted 15 January, 2024; v1 submitted 30 November, 2022;
originally announced November 2022.
-
General class of continuous variable entanglement criteria
Authors:
Martin Gärttner,
Tobias Haas,
Johannes Noll
Abstract:
We present a general class of entanglement criteria for continuous variable systems. Our criteria are based on the Husimi $Q$-distribution and allow for optimization over the set of all concave functions rendering them extremely general and versatile. We show that several entropic criteria and second moment criteria are obtained as special cases. Our criteria reveal entanglement of families of sta…
▽ More
We present a general class of entanglement criteria for continuous variable systems. Our criteria are based on the Husimi $Q$-distribution and allow for optimization over the set of all concave functions rendering them extremely general and versatile. We show that several entropic criteria and second moment criteria are obtained as special cases. Our criteria reveal entanglement of families of states undetected by any commonly used criteria and provide clear advantages under typical experimental constraints such as finite detector resolution and measurement statistics.
△ Less
Submitted 15 January, 2024; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Globally Distributed Development during COVID-19
Authors:
Clodagh NicCanna,
Mohammad Abdur Razzak,
John Noll,
Sarah Beecham
Abstract:
Due to the global pandemic, in March 2020 we in academia and industry were abruptly forced into working from home. Yet teaching never stopped, and neither did develo** software, fixing software, and expanding into new markets. Demands for flexible ways of working, responding to new requirements, have never been so high. How did we manage to continue working, when we had to suddenly switch all co…
▽ More
Due to the global pandemic, in March 2020 we in academia and industry were abruptly forced into working from home. Yet teaching never stopped, and neither did develo** software, fixing software, and expanding into new markets. Demands for flexible ways of working, responding to new requirements, have never been so high. How did we manage to continue working, when we had to suddenly switch all communication to online and virtual forms of contact? In this short paper we describe how Ocuco Ltd., a medium-sized organization headquartered in Ireland, managed our software development teams--distributed throughout Ireland, Europe, Asia and America during the COVID-19 pandemic. We describe how we expanded, kept our customers happy, and our teams motivated. We made changes, some large, such as providing emergency financial support; others small, like implementing regular online social pizza evenings. Technology and process changes were minor, an advantage of working in globally distributed teams since 2016, when development activities were coordinated according to the Scaled Agile Framework (SAFe). The results of implementing the changes were satisfying; productivity went up, we gained new customers, and preliminary results from our wellness survey indicate that everyone feels extremely well-supported by management to achieve their goals. However, the anonymised survey responses did show some developers' anxiety levels were slightly raised, and many are working longer hours. Administering this survey is very beneficial, as now we know, so we can act.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
A Multidisciplinary Definition of Privacy Labels: The Story of Princess Privacy and the Seven Helpers
Authors:
Johanna Johansen,
Tore Pedersen,
Simone Fischer-Hübner,
Christian Johansen,
Gerardo Schneider,
Arnold Roosendaal,
Harald Zwingelberg,
Anders Jakob Sivesind,
Josef Noll
Abstract:
Privacy is currently in distress and in need of rescue, much like princesses in the all-familiar fairytales. We employ storytelling and metaphors from fairytales to make reader-friendly and streamline our arguments about how a complex concept of Privacy Labeling (the 'knight in shining armor') can be a solution to the current state of Privacy (the 'princess in distress'). We give a precise definit…
▽ More
Privacy is currently in distress and in need of rescue, much like princesses in the all-familiar fairytales. We employ storytelling and metaphors from fairytales to make reader-friendly and streamline our arguments about how a complex concept of Privacy Labeling (the 'knight in shining armor') can be a solution to the current state of Privacy (the 'princess in distress'). We give a precise definition of Privacy Labeling (PL), painting a panoptic portrait from seven different perspectives (the 'seven helpers'): Business, Legal, Regulatory, Usability and Human Factors, Educative, Technological, and Multidisciplinary. We describe a common vision, proposing several important 'traits of character' of PL as well as identifying 'undeveloped potentialities', i.e., open problems on which the community can focus. More specifically, this position paper identifies the stakeholders of the PL and their needs with regard to privacy, describing how PL should be and look like in order to address these needs. Throughout the paper, we highlight goals, characteristics, open problems, and starting points for creating, what we consider to be, the ideal PL. In the end we present three approaches to establish and manage PL, through: self-evaluations, certifications, or community endeavors. Based on these, we sketch a roadmap for future developments.
△ Less
Submitted 9 May, 2021; v1 submitted 3 December, 2020;
originally announced December 2020.
-
Motivation and Autonomy in Global Software Development: An Empirical Study
Authors:
John Noll,
Mohammad Abdur Razzak,
Sarah Beecham
Abstract:
Distributed development involving globally distributed teams in different countries and timezones adds additional complexity into an already complex undertaking. This paper focuses on the effect of global software development on motivation. Specifically, we ask, what impact does misalignment between needed and actual autonomy have on global team motivation? We studied members of two distributed so…
▽ More
Distributed development involving globally distributed teams in different countries and timezones adds additional complexity into an already complex undertaking. This paper focuses on the effect of global software development on motivation. Specifically, we ask, what impact does misalignment between needed and actual autonomy have on global team motivation? We studied members of two distributed software development teams with different degrees of distribution, both following the Scrum approach to software development. One team's members are distributed across Ireland, England and Wales; the other has members in locations across Europe and North America. We observed the teams during their Scrum "ceremonies," and interviewed each team member, during which asked we asked team members to rate their motivation on a 5 point ordinal scale. Considering both the reported motivation levels, and qualitative analysis of our observations and interviews, our results suggest that autonomy appears to be just one of three job aspects that affect motivation, the others being competence and relatedness. We hypothesize that (1) autonomy is a necessary but not sufficient condition for motivation among experienced team members, and (2) autonomy is not a motivator unless accompanied by sufficient competence.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
Do Scaling Agile Frameworks Address Global Software Development Risks? An Empirical Study
Authors:
Sarah Beecham,
Tony Clear,
Ramesh Lal,
John Noll
Abstract:
Driven by the need to coordinate activities of multiple agile development teams cooperating to produce a large software product, software-intensive organizations are turning to scaling agile software development frameworks. Despite the growing adoption of various scalin g agile frameworks, there is little empirical evidence of how effective their practices are in mitigating risk, especially in glo…
▽ More
Driven by the need to coordinate activities of multiple agile development teams cooperating to produce a large software product, software-intensive organizations are turning to scaling agile software development frameworks. Despite the growing adoption of various scalin g agile frameworks, there is little empirical evidence of how effective their practices are in mitigating risk, especially in global software develop ment (GSD), where project failure is a known problem.
In this study, we develop a GSD Risk Catalog of 63 risks to assess the degree to which two scaling agile frameworks--Disciplined Agile Delivery (DAD) and the Scaled Agile Framework (SAFe)--address software project risks in GSD. We examined data from two longitudinal case studies implementing each framework to identify the extent to which the framework practices address GSD risks.
Scaling agile frameworks appear to help companies eliminate or mitigate many traditional risks in GSD, especially relating to users and customers. How ever, several important risks were not eliminated or mitigated. These persistent risks in the main belonged to the Environment quadrant highlighting t he inherent risk in develo** software across geographic boundaries. Perhaps these frameworks (and arguably any framework), would have difficulty all eviating, issues that appear to be outside the immediate control of the organization.
△ Less
Submitted 17 September, 2020;
originally announced September 2020.
-
White Paper on 6G Drivers and the UN SDGs
Authors:
Marja Matinmikko-Blue,
Sirpa Aalto,
Muhammad Imran Asghar,
Hendrik Berndt,
Yan Chen,
Sudhir Dixit,
Risto Jurva,
Pasi Karppinen,
Markku Kekkonen,
Marianne Kinnula,
Panagiotis Kostakos,
Johanna Lindberg,
Edward Mutafungwa,
Kirsi Ojutkangas,
Elina Rossi,
Seppo Yrjola,
Anssi Oorni,
Petri Ahokangas,
Muhammad-Zeeshan Asghar,
Fan Chen,
Netta Iivari,
Marcos Katz,
Atte Kinnula,
Josef Noll,
Harri Oinas-Kukkonen
, et al. (7 additional authors not shown)
Abstract:
The commercial launch of 6G communications systems and United Nations Sustainable Development Goals, UN SDGs, are both targeted for 2030. 6G communications is expected to boost global growth and productivity, create new business models and transform many aspects of society. The UN SDGs are a way of framing opportunities and challenges of a desirable future world and cover topics as broad as ending…
▽ More
The commercial launch of 6G communications systems and United Nations Sustainable Development Goals, UN SDGs, are both targeted for 2030. 6G communications is expected to boost global growth and productivity, create new business models and transform many aspects of society. The UN SDGs are a way of framing opportunities and challenges of a desirable future world and cover topics as broad as ending poverty, gender equality, climate change and smart cities. The relationship between these potentially mutually reinforcing forces is currently under-defined. Building on the vision for 6G, a review of megatrends, on-going activities on the relation of mobile communications to the UN SDGs and existing indicators, a novel linkage between 6G and the UN SDGs is proposed via indicators. The white paper has also launched the work of deriving new 6G related indicators to guide the research of 6G systems. The novel linkage is built on the envisaged three-fold role of 6G as a provider of services to help steer and support communities and countries towards reaching the UN SDGs, as an enabler of measuring tool for data collection to help reporting of indicators with hyperlocal granularity, and as a reinforcer of new ecosystems based on 6G technology enablers and 6G network of networks to be developed in line with the UN SDGs that incorporates future mobile communication technologies available in 2030. Related challenges are also identified. An action plan is presented along with prioritized focus areas within the mobile communication sector technology and industry evolution to best support the achievement of the UN SDGs.
△ Less
Submitted 30 April, 2020;
originally announced April 2020.
-
Plan-Driven approaches are alive and kicking in agile Global Software Development
Authors:
Marcelo Marinho,
John Noll,
Ita Richardson,
Sarah Beecham
Abstract:
Background: Agile methods are no longer restricted to small projects and co-located teams. The last decade has seen the spread of agile into large scale, distributed and regulated domains. Many case studies show successful agile adoption in GSD, however, taken as a whole, it remains unclear how widespread this trend is, and what form the agile adoption takes in a global software development (GSD)…
▽ More
Background: Agile methods are no longer restricted to small projects and co-located teams. The last decade has seen the spread of agile into large scale, distributed and regulated domains. Many case studies show successful agile adoption in GSD, however, taken as a whole, it remains unclear how widespread this trend is, and what form the agile adoption takes in a global software development (GSD) setting.
Aims: Our objective is to gain a deeper understanding of how organisations adopt agile development methods in distributed settings. Specifically we aim to plot the current development process landscape in GSD.
Method: We analyse industrial survey data from 33 different countries collected as part of the project that explored the wider use of hybrid development approaches in software development. We extract and analyse the results of 263 surveys completed by participants involved in globally distributed projects.
Results: In our sample, 72 of globally distributed projects implement a mix of both agile and traditional approaches (termed `hybrid'). 25 of GSD organisations are predominantly agile, with only very few (5) opting for traditional approaches. GSD projects that used only agile methods tended to be very large.
Conclusions: Globally Distributed Software Development (and project size) is not a barrier to adopting agile practices. Yet, to facilitate project coordination and general project management, many adopt traditional approaches, resulting in a hybrid approach that follows defined rules.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
InfoInternet for Education in the Global South: A Study of Applications Enabled by Free Information-only Internet Access in Technologically Disadvantaged Areas (authors' version)
Authors:
Johanna Johansen,
Christian Johansen,
Josef Noll
Abstract:
This paper summarises our work on studying educational applications enabled by the introduction of a new information layer called InfoInternet. This is an initiative to facilitate affordable access to internet based information in communities with network scarcity or economic problems from the Global South. InfoInternet develops both networking solutions as well as business and social models, toge…
▽ More
This paper summarises our work on studying educational applications enabled by the introduction of a new information layer called InfoInternet. This is an initiative to facilitate affordable access to internet based information in communities with network scarcity or economic problems from the Global South. InfoInternet develops both networking solutions as well as business and social models, together with actors like mobile operators and government organisations. In this paper we identify and describe characteristics of educational applications, their specific users, and learning environment. We are interested in applications that make the adoption of Internet faster, cheaper, and wider in such communities. When develo** new applications (or adopting existing ones) for such constrained environments, this work acts as initial guidelines prior to field studies.
△ Less
Submitted 28 August, 2018;
originally announced August 2018.
-
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications
Authors:
Christian Johansen,
Aulon Mujaj,
Hamed Arshad,
Josef Noll
Abstract:
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. Several new implementations of such end-to-end encrypted…
▽ More
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. Several new implementations of such end-to-end encrypted messaging protocols have appeared, and commonly used chat applications have been updated with these implementations as well. In this survey, we compare the existing implementations, where most of them implement one of the recent and popular protocols called Signal.
We conduct a series of experiments on these implementations to identify which types of security and usability properties each application provides. The results of the experiments demonstrate that the applications have variations of usability and security properties, and none of them are infallible. Finally, the paper gives proposals for improving each application w.r.t. security, privacy, and usability.
△ Less
Submitted 30 July, 2019; v1 submitted 20 July, 2018;
originally announced July 2018.
-
A Study of the Scrum Master's Role
Authors:
John Noll,
Mohammad Abdur Razzak,
Julian M Bass,
Sarah Beecham
Abstract:
Scrum is an increasingly common approach to software development adopted by organizations around the world. However, as organizations transition from traditional plan-driven development to agile development with Scrum, the question arises as to which Scrum role (Product Owner, Scrum Master, or Scrum Team Member) corresponds to a Project Manager, or conversely which Scrum role should the Project Ma…
▽ More
Scrum is an increasingly common approach to software development adopted by organizations around the world. However, as organizations transition from traditional plan-driven development to agile development with Scrum, the question arises as to which Scrum role (Product Owner, Scrum Master, or Scrum Team Member) corresponds to a Project Manager, or conversely which Scrum role should the Project Managers adopt? In an attempt to answer this question, we adopted a mixed-method research approach comprising a systematic literature review and embedded case study of a commercial software development team. Our research has identified activities that comprise the Scrum Master role, and which additional roles are actually performed by Scrum Masters in practice. We found nine activities that are performed by Scrum Masters. In addition, we found that Scrum Masters also perform other roles, most importantly as Project Managers. This latter situation results in tension and conflict of interest that could have a negative impact on the performance of the team as a whole. These results point to the need to re-assess the role of Project Managers in organizations that adopt Scrum as a development approach. We hypothesize that it might be better for Project Managers to become Product Owners, as aspects of this latter role are more consistent with the traditional responsibilities of a Project Manager.
△ Less
Submitted 24 August, 2019; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Transition from Plan Driven to SAFe : Periodic Team Self-Assessment
Authors:
Mohammad Abdur Razzak,
John Noll,
Ita Richardson,
Clodagh Nic Canna,
Sarah Beecham
Abstract:
Context: How to adopt, scale and tailor agile methods depends on several factors such as the size of the organization, business goals, operative model, and needs. The Scaled Agile Framework (SAFe) was developed to support organizations to scale agile practices across the enterprise. Problem: Early adopters of SAFe tend to be large multi-national enterprises who report that the adoption of SAFe has…
▽ More
Context: How to adopt, scale and tailor agile methods depends on several factors such as the size of the organization, business goals, operative model, and needs. The Scaled Agile Framework (SAFe) was developed to support organizations to scale agile practices across the enterprise. Problem: Early adopters of SAFe tend to be large multi-national enterprises who report that the adoption of SAFe has led to significant productivity and quality gains. However, little is known about whether these benefits translate to small to medium sized enterprises (SMEs). Method: As part of a longitudinal study of an SME transitioning to SAFe we ask, to what extent are SAFe practices adopted at the team level? We targeted all team members and administrated a mixed method survey in February, 2017 and in July, 2017 to identify and evaluate the adoption rate of SAFe practices. Results: Initially in Quarter 1, teams were struggling with PI/Release health and Technical health throughout the organization as most of the teams were transitioning from plan-driven to SAFe . But, during the transition period in Quarter 3, we observed discernible improvements in different areas of SAFe practice adoption. Conclusion: The observed improvement might be due to teams merely becoming more familiar with the practices over-time. However, management had also made some structural changes to the teams that may account for the change.
△ Less
Submitted 2 November, 2017;
originally announced November 2017.
-
Using TV Receiver Information to Increase Cognitive White Space Spectrum
Authors:
Brage Ellingsæter,
Hemdan Bezabih,
Josef Noll,
Torleiv Maseng
Abstract:
In this paper we investigate the usage of cognitive radio devices within the service area of TV broadcast stations. Until now the main approach for a cognitive radio to operate in the TV bands has been to register TV broadcast stations locations and thus protecting the broadcast stations service area. Through information about TV receivers location, we show that a cognitive radio should be able to…
▽ More
In this paper we investigate the usage of cognitive radio devices within the service area of TV broadcast stations. Until now the main approach for a cognitive radio to operate in the TV bands has been to register TV broadcast stations locations and thus protecting the broadcast stations service area. Through information about TV receivers location, we show that a cognitive radio should be able to operate within this service area without causing harmful interference to the TV receivers as defined by Ofcom and FCC. We provide simulations based on real statistics from Norway that show that especially in rural areas TV receiver registration can provide a substantial gain in terms of exploitable frequencies for a cognitive radio.
△ Less
Submitted 14 February, 2012;
originally announced February 2012.
-
Compositions constrained by graph Laplacian minors
Authors:
Benjamin Braun,
Robert Davis,
Ashley Harrison,
Jessica McKim,
Jenna Noll,
Clifford Taylor
Abstract:
Motivated by examples of symmetrically constrained compositions, super convex partitions, and super convex compositions, we initiate the study of partitions and compositions constrained by graph Laplacian minors. We provide a complete description of the multivariate generating functions for such compositions in the case of trees. We answer a question due to Corteel, Savage, and Wilf regarding supe…
▽ More
Motivated by examples of symmetrically constrained compositions, super convex partitions, and super convex compositions, we initiate the study of partitions and compositions constrained by graph Laplacian minors. We provide a complete description of the multivariate generating functions for such compositions in the case of trees. We answer a question due to Corteel, Savage, and Wilf regarding super convex compositions, which we describe as compositions constrained by Laplacian minors for cycles; we extend this solution to the study of compositions constrained by Laplacian minors of leafed cycles. Connections are established and conjectured between compositions constrained by Laplacian minors of leafed cycles of prime length and algebraic/combinatorial properties of reflexive simplices.
△ Less
Submitted 9 February, 2012;
originally announced February 2012.