The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Block traces are widely used for system studies, model verifications, and design analyses in both industry and academia. While such traces include detailed block access patterns, existing trace-driven research unfortunately often fails to find true-north due to a lack of runtime contexts such as user idle periods and system delays, which are fundamentally linked to the characteristics of target storage...
The paper presents recent technological advancements that have been made by Siemens PLM in its simulation tools for multi-body analyses and multi-physics simulation in order to run physics-based high fidelity models in real-time. The motivation is enable reuse of simulation models developed during the engineering phase during the validation phase with hardware or humans in the loop. To demonstrate...
A key challenge in the automatic verification of robot mission software, especially critical mission software, is to be able to effectively model the performance of a human operator and factor that into the formal performance guarantees for the mission. We present a novel approach to modelling the skill level of the operator and integrating it into automatic verification using a linear Gaussians model...
Reducing carbon dioxide emissions is an important issue for the environment. The amine-based carbon capture system is a complex system with high energy consumption, and the system needs to be operated flexibly in a wide range. Therefore, advanced control technology is required and an appropriate model is a necessary condition for controller design. To this end, this paper investigates the nonlinearity...
Looking at the end-to-end processing, typical software-intensive systems are built as a system-of-systems where each sub-system specializes according to both the business and technology perspective. One challenge is the integration of all systems into a single system — crossing technological and organizational boundaries as well as functional domains. To facilitate the successful integration we propose...
A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines...
Trade-off analysis through goal model evaluation has been a valuable tool for requirements elicitation and analysis. This is also true in the context of reuse. When goal models are used to describe reusable artifacts and to represent the impacts of reusable artifacts on high-level goals and qualities, they can guide the selection of reusable artifacts to build reuse hierarchies. In previous work,...
We present CoSTest, a tool that supports the validation of Conceptual Schemas by using testing. The tool implements techniques for transforming instantiations from a Requirements Model into test case implementations by supporting a Model-driven architecture.
Understanding and keeping the customer happy is a central tenet of requirements engineering. Strategies to gather, analyze, and negotiate requirements are complemented by efforts to manage customer input after products have been deployed. For the latter, support tickets are key in allowing customers to submit their issues, bug reports, and feature requests. Whenever insufficient attention is given...
Manifold approaches to security requirements engineering have been proposed, yet there is no consensus how to elicit, analyze, or express security needs. This perspective paper systematizes the problem space of security requirements engineering. Security needs result from the interplay of three dimensions: threats, security goals, and system design. Elementary statements can be made in each dimension,...
Different contexts determine a different software process. This is especially true for requirements production. Different situations in a given universe of discourse will require different requirements processes. This paper proposes a family pattern that approaches the universe of discourse (context) from the viewpoint of whom are the actors demanding the software. We show five different instantiations...
Software requirements analyst work is considered crucial in the software development lifecycle. This paper presents a descriptive study on the software requirements analyst profile, considering Brazilian and Mexican markets, two countries that lead IT investment ranking in Latin America. To identify the competences expected by the Brazilian and Mexican markets for software requirements professionals...
The next generation of electrical distribution systems (EDSs), with increasing penetration of distributed generation resources (DERs), represent complex energy systems with multiple functionalities. One of those functionalities is to improve the resiliency through formation of a microgrid. An ideal microgrid is capable of seamless transition from grid-tied to island state of operation. However, microgrid...
The purpose of this research study is to investigate the problems of design and requirements to diagnostic automated systems based on image processing. To realize the research purpose, the authors designed a conceptual model, a use case diagram, and a prototype of automated system object model.
Effort-aware just-in-time (JIT) defect prediction aims at finding more defective software changes with limited code inspection cost. Traditionally, supervised models have been used; however, they require sufficient labelled training data, which is difficult to obtain, especially for new projects. Recently, Yang et al. proposed an unsupervised model (LT) and applied it to projects with rich historical...
An improvement of the support of people with special needs' education will promote a social integration of such people. Developing mathematical and software methods and tools means to create a scientific base of information technologies, which task is to support an inclusive education. Leaned on the analysis of the nowadays support of inclusive education with information technologies, the model of...
Nowadays, network and telecommunication operators require flexible and dynamic models to deploy new services in a fast, reliable and cost saving way. The Service Function Chaining (SFC) design is particularly suited to meet such needs, especially in conjunction with the Network Function Virtualization (NFV) paradigm that adds a noteworthy elasticity during the SFC deployment phase. Accordingly, SFC...
Design models are widely spread as core artifacts in software engineering. Yet, a key problem is how to fulfill correctly these blueprint specifications when code components are developed. The best possible scenario occurs when a source modeling language can be perfectly linked to a target language of election. Namely, a well defined mapping bridges the gap between the source and the target language...
This article describes the methods and tools to verify the location of nodes in wireless sensor networks. Software product that allows to analyze the positioning based on the distance with different algorithms is proposed. As a result of simulation the next statistical output variables are defined: percentage of nodes, which have position determined; minimum, maximum and average error in assessing...
Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation capability, and are integrated into and tightly coupled with a physical system. Because the physical and cyber components of the system are tightly coupled, cyber-security is important for ensuring the system functions properly and safely. However, the effects of a cyberattack on the whole system may be difficult...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.