Showing 1–2 of 2 results for author: Vetter, A
-
Agile meets Assessments: Case Study on how to do Agile Process Improvement in a Very Small Enterprise
Authors:
Jakob Diebold,
Philipp Diebold,
Arthur Vetter
Abstract:
Smaller software companies, such as start-ups do not often follow an explicit process, but rather develop in a more or less unstructured way. Especially when they grow or customer involvement increases. This development without any structured process results in problems. Thus, our objective was the improvement of the current development process of one software start-up by introducing appropriate a…
▽ More
Smaller software companies, such as start-ups do not often follow an explicit process, but rather develop in a more or less unstructured way. Especially when they grow or customer involvement increases. This development without any structured process results in problems. Thus, our objective was the improvement of the current development process of one software start-up by introducing appropriate agile practices and eliciting their effects. For this reason, we per-formed a pre and post process assessment using interviews. Based on the initial assessment, agile practices were selected and implemented. Finally, the post assessment and additional code metrics served as controlling mechanism to check whether weak points are addressed. The comparison of the two assessments showed that 13 ISO29110 base practices have been improved by the introduced eight agile practices. Thus, even more aspects have casually been improved than initially planned. Finally, the additional retrospective with company employees showed how the introduced agile practices positively influenced their work.
△ Less
Submitted 6 September, 2018;
originally announced September 2018.
-
Batch Codes from Hamming and Reed-Müller Codes
Authors:
Travis Baumbaugh,
Yariana Diaz,
Sophia Friesenhahn,
Felice Manganiello,
Alexander Vetter
Abstract:
Batch codes, introduced by Ishai et al. encode a string $x \in Σ^{k}$ into an $m$-tuple of strings, called buckets. In this paper we consider multiset batch codes wherein a set of $t$-users wish to access one bit of information each from the original string. We introduce a concept of optimal batch codes. We first show that binary Hamming codes are optimal batch codes. The main body of this work pr…
▽ More
Batch codes, introduced by Ishai et al. encode a string $x \in Σ^{k}$ into an $m$-tuple of strings, called buckets. In this paper we consider multiset batch codes wherein a set of $t$-users wish to access one bit of information each from the original string. We introduce a concept of optimal batch codes. We first show that binary Hamming codes are optimal batch codes. The main body of this work provides batch properties of Reed-Müller codes. We look at locality and availability properties of first order Reed-Müller codes over any finite field. We then show that binary first order Reed-Müller codes are optimal batch codes when the number of users is 4 and generalize our study to the family of binary Reed-Müller codes which have order less than half their length.
△ Less
Submitted 19 October, 2017;
originally announced October 2017.