-
Viewing Vision Videos Online: Opportunities for Distributed Stakeholders
Authors:
Lukas Nagel,
Jianwei Shi,
Melanie Busch
Abstract:
Creating shared understanding between stakeholders is essential for the success of software projects. Conflicting requirements originating from misaligned mental models can hinder the development process. The use of videos to present abstract system visions is one approach to counteract this problem. These videos are usually shown in in-person meetings. However, face-to-face meetings are not suite…
▽ More
Creating shared understanding between stakeholders is essential for the success of software projects. Conflicting requirements originating from misaligned mental models can hinder the development process. The use of videos to present abstract system visions is one approach to counteract this problem. These videos are usually shown in in-person meetings. However, face-to-face meetings are not suited to every situation and every stakeholder, for example due to scheduling constraints. Methods for the use of vision videos in online settings are necessary. Furthermore, methods enabling an asynchronous use of vision videos are needed for cases when conjoined meetings are impossible even in an online setting.
In this paper, we compare synchronous and asynchronous viewings of vision videos in online settings. The two methods are piloted in a preliminary experiment. The results show a difference in the amount of arguments regarding the presented visions. On average, participants who took part in asynchronous meetings stated more arguments. Our results point to multiple advantages and disadvantages as well as use cases for each type. For example, a synchronous meeting could be chosen when all involved stakeholders can attend the appointment to discuss the vision and to quickly resolve ambiguities. An asynchronous meeting could be held if a joint meeting is not feasible due to time constraints. We also discuss how our findings can be applied to the elicitation of requirements from a crowd of stakeholders.
△ Less
Submitted 12 August, 2021;
originally announced August 2021.
-
Keep Your Stakeholders Engaged: Interactive Vision Videos in Requirements Engineering
Authors:
Lukas Nagel,
Oliver Karras
Abstract:
One of the most important issues in requirements engineering (RE) is the alignment of stakeholders' mental models. Making sure that all stakeholders share the same vision of a changing system is crucial to the success of any project. Misaligned mental models of stakeholders can lead to conflicting requirements. A promising approach to this problem is the use of video showing a system vision, so-ca…
▽ More
One of the most important issues in requirements engineering (RE) is the alignment of stakeholders' mental models. Making sure that all stakeholders share the same vision of a changing system is crucial to the success of any project. Misaligned mental models of stakeholders can lead to conflicting requirements. A promising approach to this problem is the use of video showing a system vision, so-called vision videos, which help stakeholders to disclose, discuss, and align their mental models of the future system. However, videos have the drawback of allowing viewers to adopt a passive role, as has been shown in research on e-learning. In this role, viewers tend to be inactive, unfocused and bored while watching a video. In this paper, we learn and adopt findings from scientific literature in the field of e-learning on how to mitigate this passive role while watching vision videos in requirements engineering. In this way, we developed concepts that incorporate interactive elements into vision videos to help viewers stay focused. These elements include questions that are asked during the video and ways for viewers to decide what happens next in the video. In a preliminary evaluation with twelve participants, we found statistically significant differences when comparing the interactive vision videos with their traditional form. Using an interactive vision videos, viewers are noticeably more engaged and gather more information on the shown system.
△ Less
Submitted 10 August, 2021;
originally announced August 2021.
-
Time-efficient Garbage Collection in SSDs
Authors:
Lars Nagel,
Tim Süß,
Kevin Kremer,
M. Umar Hameed,
Lingfang Zeng,
André Brinkmann
Abstract:
SSDs are currently replacing magnetic disks in many application areas. A challenge of the underlying flash technology is that data cannot be updated in-place. A block consisting of many pages must be completely erased before a single page can be rewritten. This victim block can still contain valid pages which need to be copied to other blocks before erasure. The objective of garbage collection str…
▽ More
SSDs are currently replacing magnetic disks in many application areas. A challenge of the underlying flash technology is that data cannot be updated in-place. A block consisting of many pages must be completely erased before a single page can be rewritten. This victim block can still contain valid pages which need to be copied to other blocks before erasure. The objective of garbage collection strategies is to minimize write amplification induced by copying valid pages from victim blocks while minimizing the performance overhead of the victim selection. Victim selection strategies minimizing write amplification, like the cost-benefit approach, have linear runtime, while the write amplifications of time-efficient strategies, like the greedy strategy, significantly reduce the lifetime of SSDs. In this paper, we propose two strategies which optimize the performance of cost-benefit, while (almost) preserving its write amplification. Trace-driven simulations for single- and multi-channel SSDs show that the optimizations help to keep the write amplification low while improving the runtime by up to 24-times compared to the original cost-benefit strategy, so that the new strategies can be used in multi-TByte SSDs.
△ Less
Submitted 24 July, 2018;
originally announced July 2018.
-
Self-stabilizing Balls & Bins in Batches
Authors:
Petra Berenbrink,
Tom Friedetzky,
Peter Kling,
Frederik Mallmann-Trenn,
Lars Nagel,
Chris Wastell
Abstract:
A fundamental problem in distributed computing is the distribution of requests to a set of uniform servers without a centralized controller. Classically, such problems are modeled as static balls into bins processes, where $m$ balls (tasks) are to be distributed to $n$ bins (servers). In a seminal work, Azar et al. proposed the sequential strategy \greedy{d} for $n=m$. When thrown, a ball queries…
▽ More
A fundamental problem in distributed computing is the distribution of requests to a set of uniform servers without a centralized controller. Classically, such problems are modeled as static balls into bins processes, where $m$ balls (tasks) are to be distributed to $n$ bins (servers). In a seminal work, Azar et al. proposed the sequential strategy \greedy{d} for $n=m$. When thrown, a ball queries the load of $d$ random bins and is allocated to a least loaded of these. Azar et al. showed that $d=2$ yields an exponential improvement compared to $d=1$. Berenbrink et al. extended this to $m\gg n$, showing that the maximal load difference is independent of $m$ for $d=2$ (in contrast to $d=1$).
We propose a new variant of an \emph{infinite} balls into bins process. Each round an expected number of $λn$ new balls arrive and are distributed (in parallel) to the bins. Each non-empty bin deletes one of its balls. This setting models a set of servers processing incoming requests, where clients can query a server's current load but receive no information about parallel requests. We study the \greedy{d} distribution scheme in this setting and show a strong self-stabilizing property: For \emph{any} arrival rate $λ=λ(n)<1$, the system load is time-invariant. Moreover, for \emph{any} (even super-exponential) round $t$, the maximum system load is (w.h.p.) $O(\frac{1}{1-λ}\cdot\log\frac{n}{1-λ})$ for $d=1$ and $O(\log\frac{n}{1-λ})$ for $d=2$. In particular, \greedy{2} has an exponentially smaller system load for high arrival rates.
△ Less
Submitted 7 March, 2016;
originally announced March 2016.
-
Exploring the Physical Layer Frontiers of Cellular Uplink - The Vienna LTE-A Simulator
Authors:
Erich Zöchmann,
Stefan Schwarz,
Stefan Pratschner,
Lukas Nagel,
Martin Lerch,
Markus Rupp
Abstract:
Communication systems in practice are subject to many technical/technological constraints and restrictions. MIMO processing in current wireless communications, as an example, mostly employs codebook based pre-coding to save computational complexity at the transmitters and receivers. In such cases, closed form expressions for capacity or bit-error probability are often unattainable; effects of real…
▽ More
Communication systems in practice are subject to many technical/technological constraints and restrictions. MIMO processing in current wireless communications, as an example, mostly employs codebook based pre-coding to save computational complexity at the transmitters and receivers. In such cases, closed form expressions for capacity or bit-error probability are often unattainable; effects of realistic signal processing algorithms on the performance of practical communication systems rather have to be studied in simulation environments. The Vienna {LTE-A} Uplink Simulator is a 3GPP {LTE-A} standard compliant link level simulator that is publicly available under an academic use license, facilitating reproducible evaluations of signal processing algorithms and transceiver designs in wireless communications. This paper reviews research results that have been obtained by means of the Vienna LTE-A Uplink Simulator, highlights the effects of Single Carrier Frequency Division Multiplexing (as the distinguishing feature to LTE-A downlink), extends known link adaptation concepts to uplink transmission, shows the implications of the uplink pilot pattern for gathering Channel State Information at the receiver and completes with possible future research directions.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.