The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To facilitate system architecture development using DoDAF, we propose an architecture development methodology based on DoDAF 2.0 in this paper. First, based on experiences in practice, gaps between Operational Viewpoint (OV), Capability Viewpoint (CV) and System/Service Viewpoint (SV/SvcV) are analyzed. Second, to bridge the gaps, two architecture viewpoints, i.e. Information activity Viewpoint (IaV)...
Architectural engineering of embedded systems comprehensively affects both the development processes and the abilities of the systems. Verification of architectural engineering is consequently essential in the development of safety- and missioncritical embedded system to avoid costly and hazardous faults. In this paper, we present the Architecture Quality Assurance Tool (AQAT), an application program...
Earlier research has identified network analysis techniques, methods, and models used to analyze structural aspects of an enterprise architecture (EA) modeled as a network or graph. However, there is still no common set of conceptual elements for such research that could allow one to identify the information requirements needed to perform this type of analysis. In the present research, we organize...
Models are perceived as effective tools for stakeholder communication and analysis concerning a given system. Enterprise Architecture assists organizational change with the creation and maintenance of models as a means to mitigate the business-IT misalignment and supporting decision-making regarding the strategic vision of the enterprise. Literature has acknowledged the topic of enterprise architecture...
ICT systems have become an integral part of business and life. At the same time, these systems have become extremely complex. In such systems exist numerous vulnerabilities waiting to be exploited by potential threat actors. pwnPr3d is a novel modelling approach that performs automated architectural analysis with the objective of measuring the cyber security of the modeled architecture. Its integrated...
Architecture models mainly have three functions; 1) document, 2) analyze, and 3) improve the system under consideration. All three functions have suffered from being timeconsuming and expensive, mainly due to being manual processes in need of hard to find expertise. Recent work has however automated both the data collection and the analysis. In order for enterprise architecture modeling to finally...
Porting sequential applications to heterogeneous HPC systems requires extensive software and hardware expertise to estimate the potential speedup and to efficiently use the available compute resources in such systems. To streamline this daunting process, researchers have proposed several “black-box” performance prediction approaches that rely on the performance of a training set of parallel applications...
The need for performance has motivated the increasing adoption of solid-state drives (SSD) both in personal computers and data centers. However, the high cost per gigabyte and reduced lifetime hinder the thorough replacement of hard disk drives (HDD) with SSDs. To mitigate these issues, several architectures have been conceived based on hybrid storage systems, but performance and dependability models...
Looking at the end-to-end processing, typical software-intensive systems are built as a system-of-systems where each sub-system specializes according to both the business and technology perspective. One challenge is the integration of all systems into a single system — crossing technological and organizational boundaries as well as functional domains. To facilitate the successful integration we propose...
The performance model of an application can provide understanding about its runtime behavior on particular hardware. Such information can be analyzed by developers for performance tuning. However, model building and analyzing is frequently ignored during software development until performance problems arise because they require significant expertise and can involve many time-consuming application...
In high-performance computing (HPC), end-to-end workflows are typically utilized to gain insights from scientific simulations. An end-to-end workflow consists of scientific simulation and data analysis, and can be executed in-situ, in-transit, and offline. Existing studies on end-to-end workflows have largely focused on the high-performance execution approaches. However, the emerging heterogeneous...
Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation capability, and are integrated into and tightly coupled with a physical system. Because the physical and cyber components of the system are tightly coupled, cyber-security is important for ensuring the system functions properly and safely. However, the effects of a cyberattack on the whole system may be difficult...
Simulation is a powerful tool to evaluate quality attributes of complex software systems, but it is not the most comfortable environment for software engineers. They usually use to specify software architectures graphical notations like Use Case Map (UCM). This paper presents a methodological framework to apply DEVS to the software architecture evaluation problem. This framework is organized in two...
A major challenge for the European electronic industry is to enhance productivity while reducing costs and ensuring quality in development, integration and maintenance. Model-Driven Engineering (MDE) principles and techniques have already shown promising capabilities but still need to scale to support real-world scenarios implied by the full deployment and use of complex electronic components and...
Software Defined Networking (SDN) emphasizes the separation of data and control plane while network function virtualization (NFV) decouples network function from underlying hardware. Combining SDN with NFV would have many benefits, but the problem is how to integrate them. There are two possible architectures for such integration: the controller interacts with virtualized network functions (VNFs)...
In this paper, we investigate the propagation coupling loss (captures all sources of attenuation between serving cell and mobile station (MS)) and geometry metric (GM) (downlink average signal-to-interference plus noise ratio) performance of mmWave cellular networks for outdoor and indoor MSs, considering urban micro (UMi) environments. Based on these studies, we identify effective mmWave frequency...
Knowledge Discovery in Databases (KDD) tools emerged as a solution to discover information and knowledge from rapidly growing data; they allow the execution of interactive and iterative processes in order to obtain new useful information from data. In this work, we present a KDD tool extension that allows the execution of interactive software architecture extraction processes. Actually, even though...
Due to the painful time consuming of cycle-accurate simulations, analytical modeling of DRAM systems has been becoming an effective alternative to give guidance for architecture optimizations. Some analytical models forecast the DRAM performance by obtaining the proportions of different DRAM command appearances from memory trace profiling. However, existing works require too many cases composed by...
The system configuration is an import aspect of Integrated Modular Avionics systems. These IMA blueprints are configured based on ASSAC and ARINC653 standards by analyzing all the requirements. Application requirements, such as required memory, communication, period, deadline and execution time, are stipulated in the blueprint. Hardware resources are also described in the blueprint. Moreover, the...
To satisfy growing computational demands of modern applications, significant enhancements have been introduced in the contemporary processor architectures with the aim to increase their attainable performance, such as increased number of cores, improved capability of memory subsystem and enhancements in the processor pipeline [1]. Therefore, the performance improvements are usually coupled with an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.