The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is generally lost in the source code. Discovering design patterns from source code may help understand system designs and further change the systems. In this paper, we present a novel approach to discovering design patterns by defining...
As the use of the Internet for commercial purposes continues to grow, so do the number of security threats which attempt to disrupt online systems (Glisson and Welland, 2005); (Deloitte, 2005); and (Gordon et al., 2005). A number of these threats are in fact unintended (Mackey, 2003). For example, a careless employee might drop a cup of coffee onto essential equipment. However, when compared to the...
As tools are maturing rapidly model-based testing is gaining wider attention by industry as a potential replacement for suite-based testing approaches. To use model-based testing tools users however specify often quite detailed test models, at level of the implementation to be tested. We present here a first attempt to generate tests from more abstract implementation models, which we call architecture...
Recent massive research in the area of robustness testing of communication protocols have been driven by the fact that embedded systems are becoming more and more complex every day. Providing correct implementations of communication protocols is a key to successful interconnection of embedded system constituents. Test and verification is the last and the most critical phase in the production of the...
End user testing for higher-order software compliance becomes an issue of increasing importance with compositional reuse of software artifacts. Few if any existing approaches discuss the validation of higher-order domain aspects in this context. The proposed method derives testable validation scenarios directly from a customer domain model by abstraction, reduction and inclusion for critical coverage...
It has not been since the advent of the client/server architecture break through that an architectural concept has changed the face of enterprise systems so significantly as it has been done by service oriented architectures (SOA). The service oriented approach provides plenty of vantages for companies in regard to flexible system integration and adoption of new business cases. However, the adoption...
Due to the high cost of modeling, model-based techniques are yet to make their impact in the embedded systems industry, which still persist on maintaining code-oriented legacy systems. Re-engineering existing code-oriented systems to fit model-based development is a risky endeavor due to the cost and efforts required to maintain correspondence between the code and model. We aim to reduce the cost...
Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can also be caused by interactions involving more than two parameters. In this paper, we generalize an existing strategy, called in-parameter-order (IPO), from pairwise testing to t-way testing. A major challenge of our generalization...
This paper describes an agile development methodology which combines agile principles with organizational patterns and adapts them to build embedded real-time systems focusing on the system's constraints. The hardware/software partitioning and platform-based design are used in the proposed methodology to support the embedded system designer meet the system's constraints in an iterative and incremental...
This paper describes a new computer based delivery method of cognitive behavioral therapy for relief of depression or anxiety. Blues Begone combines established psychological principles with a novel implementation that makes depression recovery available to many more people than face-to-face therapy, and without the side effects of drugs. A flexible architecture makes possible significant variation...
The following paper presents the learning outcomes from an investigation into the aspects of complexity involved in architecture-based analysis. Using a framework of situational complexity as provocation, the manifestations of complexity observed in the architecture tradeoff analysis method (ATAM) process are presented in terms of a people and systems dimension. These aspects of complexity are shown...
In today's computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defense and security. To protect computers from the ever-increasing threat of intrusion, we propose an event-driven architecture that provides fine grained intrusion detection and decision support capability. Within this architecture,...
Providing powerful and fine-grained capabilities for the analysis and management of non-functional properties is a major challenge for component-based software systems. In this paper, we propose integration patterns for nonfunctional properties of hierarchical software components. These patterns are based on a classification of low-level non-functional properties, which takes into account their nature...
We present an application of a modeling method for distributed systems to a case study of mobile phone camera functionality based on an existing implementation. The modeling method, Lyra, utilizes formal definitions, in this case UML2 state machines, for behavior We observe the industrial application of the models, for instance modeling conventions and tool support needed to enable it, and the application...
The field of optimisation covers a great multitude of principles, methods and frameworks aimed at maximisation of an objective under constraints. However, the classical optimisation can not be easily applied in the context of computer-based systems architecture as there is not enough knowledge concerning the dependencies between non-functional qualities of the system. Out approach is based on the...
Cyber physical systems (CPS) is emerging as a new research discipline at the intersection of physical, biological, engineering and information sciences. Information technology, once a provider of tools for sciences and engineering, has become an interdisciplinary field at the center of scientific and industrial innovation. This talk addresses some of the basic challenges of CPS and its relationship...
In the early development stages of embedded systems, fundamental decisions concerning the system architecture and a proper hardware/software partition must be made. The choices determine, e.g. power consumption, performance, and other system features. For this reason, a method plus supporting tools for the fast, efficient, and automated evaluation of system design alternatives is required. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.