The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an algorithm that generates test programs in order to test programming languages and domain specific languages using formal methods. The novelty of the approach is that it is embedded into a model driven engineering environment and it is described as a model finding problem. The grammar of the language and the respective test programs are represented as meta-models and models,...
New standards like CAEX [1] and AutomationML [2] provide new means for data exchange between engineering tools. In order to provide an unambiguous exchange of information, a common data format should be used that is based on semantically well defined data elements as defined in IEC 61360 [3]. In order to use such data elements (e.g. properties), some extensions of the model defined in IEC 61360 are...
Businesses are always looking for opportunities to improve their processes in order to become more efficient and effective. Patterns for business process improvement have been defined and used as best practices to help analysts discover such opportunities. A modeling language allowing analysts to define or use a predefined library of improvement patterns to detect improvement opportunities in business...
Reverse engineering of behavior models has received a lot of attention over the last few years. However, no standard benchmark exists for the comparison and analysis of published miners. Evaluation is usually performed on few case studies, which fails to demonstrate effectiveness in a broad context. This paper proposes a general, approach-independent, platform for the intensive evaluation of behavior...
Existing approaches to tool integration based upon metamodels encounter the problem that common (integration) metamodels become too large and complicated, due to the large number of different tools that have to be integrated, each with their specific metamodel defining models handled by each tool. The approach taken here is radically different in that it distinguishes between the model for integration...
In the context of safety-critical software development, one important step in ensuring safe behavior is conformance testing, i.e., checking compliance between expected behavior and implementation. Round-trip path testing (RTP) is one example of conformance testing. Another essential step, however, is sneak-path testing, that is testing of how software reacts to unexpected events for a particular system...
Electricity network resources are frequently identified within different power systems by inhomogeneous names and identities due to the legacy of their administration by different utility business domains. The IEC 61970 Common Information Model (CIM) enables network modeling to reflect the reality of multiple names for unique network resources. However this issue presents a serious challenge to the...
Large and various amounts of context data related to a user's environment are available from different domains including mobile devices, smarthomes, wearable sensors, and social networking services. These context domains are interconnected and the context data from them can be shared thanks to mobile, pervasive, convergent, and ubiquitous technologies. We can provide user-centric context-aware services...
Today, information systems rely largely on web services and XML as their payloads. Every information system also depends on checking and preserving integrity constraints. In the world of conceptual modeling, they can be expressed using Object Constraint Language (OCL) expressions over class diagrams. However, the expressions defined in the conceptual model of the system must be rewritten to the form...
Model transformation in the context of Model-Driven Data Warehouse is ensured by human experts. It generates an exorbitant cost and requires high proficiency. We propose in this paper a machine learning approach to reduce the expert contribution in the transformation process. We propose to express the model transformation problem as an Inductive Logic Programming one and to use existing project traces...
Model-driven engineering (MDE) promises faster and more reliable software development processes. A key factor of MDE is the transformation of models, allowing a software engineer to use the most appropriate modeling notation for a particular task. The earlier transformations can be applied during software development, the greater the potential cost savings. To that effect, we report on the transformation...
Smart Grid can be thought as integrating the electrical and information technologies in between any point of generation and any point of consumption of the grid. This is a challenging context for the software-intensive systems of the grid, since interoperability among them become a fundamental issue to communicate and interchange data (syntactic interoperability). More than supporting just communication...
Air Traffic Management (ATM) has embraced the concept of System Wide Information Management (SWIM) as the means to improve data exchange between various applications in different domains such as flight data management, weather and aeronautical information management. Even though SWIM definitions in the US and Europe put emphasis at different aspects in their NextGen and SESAR (Single European Sky...
The commercial success of many automated systems stems from the ability to turn high numbers of transactions into revenue. In large enterprises this is typically done with bespoke billing software, tailored to the market of the business. Small businesses do not typically possess the skills to develop such complex systems, and so do not benefit from the efficiencies and revenue assurance that they...
One of the personalized service in the ubiquitous For establishing real u-health environments, it is necessary to receive the context information obtained from various platforms at proper time in portable devices, which are operated in both wire and wireless communication. And, a knowledge model that reflects the information and characteristics for such services while it is appropriate for medical...
Testing methods aiming to demonstrate that an implementation behaves the same as a specification X-machine (extended finite-state machine) usually assume that (1) all states are terminal states and (2) there are no priorities associated with operations on transitions. The considered model for the machine is such that outputs for transitions leading to non-terminal states will be buffered and contents...
Recent rich services provided by mobile devices take a form of composite services consisting of several constituent atomic services and they are gaining popularity due to technological advances and wireless network infrastructures. To make the best use of these technological benefits, the services given by the device need to be developed and provided with consideration of user context that contains...
MDA can be easy adopted to data models. Conceptual, logical, and physical database models can be regarded as PIM, PSM and code level within MDA architecture. MDA transformations concentrate on functional demands and aim in data preservation. However, beside functional also non-functional demands should be taken into account within model driven development. Non-functional requirements can influence...
This paper presents a case study for the modeling and model-based testing (MBT) of enterprise service choreographies. Our proposed MBT approach uses proprietary models called Message Choreography Models (MCM) as test models. The case study illustrates how MCM-based service integration testing allows to formalize design decisions and enables full integration into an existing industrial test infrastructure...
Many errors in spreadsheet formulas can be avoided if spreadsheets are built automatically from higher-level models that can encode and enforce consistency constraints. However, designing such models is time consuming and requires expertise beyond the knowledge to work with spreadsheets. Legacy spreadsheets pose a particular challenge to the approach of controlling spreadsheet evolution through higher-level...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.