The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Linux is not a real-time operating system, however it has been often recently used to implement soft real-time systems such as home multimedia centers. A quantitative study of the Linux kernel responsiveness to hardware interrupts has shown a huge variance in experimental results, however, we argue that a careful selection of the modules inserted in the kernel can greatly reduce this variance and...
The paper depicts experiments and results with predicate abstraction based verification applied to infinite state systems. Predicate abstraction is a method for automatic construction of abstract state space that can be used by any common finite state model checking tool, such as NuSMV. We have used abstract state space and NuSMV tool to verify safety properties of infinite state mutual exclusion...
We present in this paper a unified paradigm for the verification and validation of software and systems engineering design models expressed in UML 2.0 or SysML. This paradigm relies on an established synergy between three salient approaches, which are model-checking, program analysis, and software engineering techniques. To illustrate the accomplishment of our results, we have designed and implemented...
Requirements engineering has attained an important role in software development over the last few years as developers and other stakeholders have realized the importance of adequate requirement analysis and design in software development processes. However, the specification and analysis of functional requirements is better established compared to non-functional requirements. This could be attributed...
Refactoring of software systems represents a fundamental way of improving their quality properties. Large-scale refactoring has to be performed at an architectural level to execute such changes for larger systems. Architecture-oriented refactoring requires decisions with multiple, partly contradicting objectives and uncertain consequences. To minimize risks and effort, the decisions about optimal...
This paper describes our approach for changing the way supply chain management is performed today. We aim to support human interactors with software assistants which will perform most of the tedious tasks like negotiating on new contracts, handling and altering production workflows or managing the stock. Additionally, our assistants will have the ability to move from one machine to another allowing...
Change types of dynamic system reconfiguration are presented in this paper. A system under evolution implements one or more of these general types within the context of the conditions that motivated the change and the concrete representations of that system. As a set, the types of change represent a comprehensive capability of how a component-based system may evolve. They are governed by system integrity...
For complex systems that are reusing intellectual property components, functional and compositional design correctness are an important part of the design process. Common system level capture in software programming languages such as C/C++ allow for a comfortable design entry and simulation, but mere simulation is not enough to ensure proper design integration. Validating that reused components are...
J2EE is the de-facto industry standard for implementing and scaling Java on the enterprise scale distributed systems. It is the result of strong industry collaboration. All involved is trying to make the technology J2EE commercially viable. This industry support has allowed J2EE to be based on the experience and expertise from leading designers of industry systems that are scalable, well integrated...
Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes a metric-driven clustering organisation of participating nodes which provides an effective way to reduce network overhead, in contrast to traditional flooding methods. This novel method creates a network backbone for data routing...
The evolution of a design pattern typically involves the addition or removal of a group of modeling elements, such as classes, attributes, operations, and relationships. However, the possible evolutions of each design pattern are often not explicitly documented. Missing part of the evolution process may result in inconsistent evolution. In this paper, we define the evolution processes of design patterns...
Aspect-oriented programming (AOP) has emerged in recent years as a new paradigm for software development. PRISMA is an approach for developing complex and large software systems. It combines the aspect-oriented software development (AOSD) and the component-based software development (CBSD) in an elegant and novel way achieving a better management of crosscutting-concerns and software reusability....
Architectural change heuristics are a very powerful mechanism for implementing architectural optimisation. They allow for both the capture of the systematic changes required to maintain system integrity and the often poorly understood rationale of expert knowledge. However, even though heuristics are one of the oldest and most widely used problem-solving mechanisms, they are also perhaps one of the...
For several years, researchers have required the development of complex systems to be based on architectural models. Nevertheless, popular programming environments offer architecture related concepts, e.g. components and connectors, only as mere additions to object oriented programming. As a consequence, software is often cluttered with add-ons that are not application related. An important reason...
With the wireless communication network and location data, the existing telematics system provides various information services such as navigation, emergency service, and etc. In addition, it collects and exploits vehicle status through in-vehicle sensor network such as CAN and LIN (Kim et al., 2005). In this paper, WSN-based intelligent telematics system is presented that connects the telematics...
In this paper, we propose an equivalent model in a serial queue for representing the serial connection of the load balancer and a Web server of the Web cluster. We have set up an experimental Web cluster for doing some performance measurements. Moreover, we compare either the simulation results or the measurement results for the mean system response time of the serial queues forming the equivalent...
In the ubiquitous computing environment, it is expected that an intellectual vehicle with a capability of intelligence and communication has access to network and get useful information providing service. This requires a new network architecture and in-vehicle sensor network technology to support mobility of vehicle service. The mobility of vehicle service is to give users the vehicle services at...
Patterns help transporting knowledge and provide common names for solutions. Architects need a lot of experience to create long-lasting system architectures and should benefit from experiences written down in patterns. The description of architecture patterns and design patterns usually focuses on structures in software. This renders the patterns of limited use for architects who need to structure...
Specifications of non-functional requirements (NFR) such as security, safety, usability are as important as specification of functional requirements (FR). Non conformance to some NFR may render the whole software useless. There are many difficulties associated with the representation of NFR and the complexity of their subsequent validation. The main objective of this work is towards incorporating...
Computer-based systems (CBS) are becoming increasingly pervasive throughout society, continually increasing in complexity and cost as they are called upon to fulfil more and more complicated tasks. Unfortunately, multi-million dollar projects often fail because the systems are unreliable, inefficient, insecure and unmaintainable. The National Australia Bank's $409M software writedown and the failure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.