The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The web, seen as a graph of linked resources shared between microservices, can serve as an integration style. It offers unique characteristics and possibilities regarding dataflow, control flow, and other qualities, compared to file transfer, shared databases, remote procedure calls, and asynchronous messaging. Carrying these insights in your toolbox will make you aware of all the options to consider...
The paper presents the application of the RFID technology in the international system of the European Union (EU) border control. The proposed architecture consists of computerized portable units (equipped with specialized devices for data acquisition) carried by border officers and the server cloud infrastructure. Among other details of the proposed system (such as QR codes or images of people trying...
System landscapes within logistical scenarios is highly heterogenic. Adding specific mechanisms, e.g. to support planing, monitoring and analyses for fully electrical powered vehicles, could become a mess or at least a challenge. While our project Smart City Logistic (SCL) is trying to manage this extension for multiple logistic scenarios, other projects want to do comparable system extensions as...
In the quest for energy efficiency of Information and Communication Technology, so far research has mostly focused on the role of hardware. However, as hardware technology becomes more sophisticated, the role of software becomes crucial. Recently, the impact of software on energy consumption has been acknowledged as significant by researchers in software engineering. In spite of that, measuring the...
Feature location is a critical step in the software maintenance process where a developer identifies the software artifacts that need to be changed in order to fulfill a new feature request. Much progress has been made in understanding the feature location process and in creating new tools to help a developer in performing this task. However, there is still lack of support for locating architectural...
Distributed systems are largely present and deployed in recent applications. Several systems have common basic requirements, which motivates to adapt reusable solutions for each family of systems. In this paper, we focus on distributed systems designed for large-scale applications requiring a high degree of Reliability and Dynamicity (ReDy distributed systems). We propose a basic architecture for...
This paper provides an introduction to the field of software engineering requires facility in architectural software design. The goal is to demonstrate the current state of the discipline and examine the ways in which architectural design can impact soft-ware design. Software architecture is used to describe a high level design methodology of large software systems. It provides the overall structure...
The operation of large scale information systems requires investment into hardware infrastructure and causes running cost for keeping it in a productive state. This especially applies in an enterprise environment where also expenses for software licenses costs or penalties for downtime occur. The deployment of software influences these costs both in their amount and their composition. In order to...
Offering services in the internet requires a dependable operation of the underlying software systems with guaranteed quality of service. The workload of such systems typically significantly varies throughout a day and thus leads to changing resource utilisations. Existing system monitoring tools often use fixed threshold values to determine if a system is in an unexpected state. Especially in low...
Useful enhancements to UML for security exist, including for the requirements and analysis/design stages: notably misuse case diagrams/descriptions, mis-sequence diagrams, UMLpac, and security patterns. These all consider security attacks on software functionality. This paper considers the system architecture when analyzing security. The advantage of the proposed misuse deployment diagram is that...
The Special Session on “Pathways to Servers of the Future” outlines a new research program set up at Technische Universität Dresden addressing the increasing energy demand of global internet usage and the resulting ecological impact of it. The program pursues a novel holistic approach that considers hardware as well as software adaptivity to significantly increase energy efficiency, while suitably...
To create a common understanding of a software system, for users and developers, we believe that run-time visualization of both behavior and internal structure is critical. This is particularly true for distributed embedded systems, which are designed to be unobtrusive, making them difficult to comprehend for people who are not familiar with them. We suggest a novel method to visualize software behavior...
Last technological advances have brought drastic changes affecting the way distributed systems are conceived. Designers have to tackle the fact that applications could be controlled by different end users on diverse computing platforms in assorted environments. However, these kinds of facilities only make sense when they are ruled by the well-known group awareness. It is necessary to devise new mechanisms...
A multi-tenant software application is a special type of highly scalable, hosted software, in which the application and its infrastructure are shared among multiple tenants to save development and maintenance costs. The limited understanding of the underlying architectural concepts still prevents many software architects from designing such a system. Existing documentation on multi-tenant software...
Cloud computing is one of the emerging technologies that will lead to the next generation of Internet. It provides optimized and efficient computing through enhanced collaboration, agility, scalability, and availability. In this paper, the evolution of the Cloud is discussed, the cloud computing model is explained, a set of cloud computing infrastructure metrics is listed, the cloud service model...
The concept of awareness plays a pivotal role in research in Computer-Supported Cooperative Work. Recently, software engineering researchers interested in the collaborative nature of software development have explored the implications of this concept in the design of software development tools. A critical aspect of awareness is the associated coordinative work practices of displaying and monitoring...
This paper examines service migration in a new computing paradigm, the cloud computing environment (CCE), by examining security and integration issues associated with service implementation. We postulate that a cloud architecture will evolve to be both more flexible and heterogeneous in resources because of the services complexity demanded by organizations. This introduces additional, but tractable,...
The behavior adaptation of Software component is a crucial problem in component-based software engineering. Software Adaptation aims at generating, as automatically as possible, adaptors to compensate mismatch between component interfaces, and ensure the deadlock-freedom of component interaction at the architectural level. A general and safe approach is proposed to solve the behavior mismatch. Firstly,...
C/S and B/S structure is analyzed that the two structures have their different advantages and disadvantages. The hybrid software architecture combined the advantages of C/S and B/S. The China Petrochemical Corporation Luoyang branch crude oil transport management system is developed by the C/S and B/S Hybrid software Architecture and runs well. These practices make it clear that the Hybrid software...
ATAM is a widely known software architecture analysis method based on trade-offs of design decisions for coping with quality attribute requirements. Practically, all reported cases of applying ATAM refer mainly to software-intensive systems. However, there is a series of software systems for which fulfilling their requirements strongly depends on hardware-related decisions. As ATAM provides no special...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.