The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the challenges brought by the expansion of network scale, as well as the diversity of the equipments and the complexity of network protocols, many self-configurable systems have been proposed combining formal specification and model finding techniques. In this paper, we pay more attention to formal specifications of network information, i.e., exploring principles and algorithm to map network...
Good computational model design has always been a key factor in determining whether it will be a successful system. a new approach was proposed to formally specifying and proving the Grid jack computational model design which uses architectural description language WRIGHT together with the process algebra CSP. Formal specification in WRIGHT provides a convenient way to modeling the complex overall...
Software asset repository, a treasure house of knowledge in software industry, is a primary infrastructure of Asset-Based Software Engineering. Now asset repositories are usually built into isolated islands and are browsable or searchable only by people, which has substantially reduced their functionality and greatly hindered the reuse in practice. Based on service-oriented approach, we proposed a...
Service-oriented architecture (SOA) promotes a paradigm where ad-hoc applications are built by dynamically linking service-based software capabilities. Service providers follow specification standards to advertise their services' capabilities and to enable loosely coupled integration between their services and other businesses over the Web. A major challenge in this domain is interpreting the data...
Developing correct and complete real-world software applications is a difficult task in terms of the number and flexibility of the essential components and their interrelationship. As the field of agent-based computing matures, the requirements of well-founded techniques and methodology for such systems modeling will increased. This paper used integration of two well known modeling techniques, X-machines...
Nowadays, most organizations and companies support its main process (organizational and business) through Web portals; however, people that use these applications need trust on the data they manage. The analyst should add some kind of mechanisms to ensure an appropriate level of quality in the data. This paper shows an example of application of the DQ-VORD methodology, for managing and integrating...
Security models, developed for databases, differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This leads to disjointed and incomplete understanding of the organizational security strategy. This makes it difficult to reconcile different security requirements. This paper...
In this research, we designed a universal graph model. We targeted this work on improving graph data organization representation, flexible formation of graph substructures for complex system modeling and generic processing of data organization. We form coherently composed graph modeling features including inheritance hierarchy of basic graph types, data participating graphs of multiple aspects, hierarchically...
The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under development. This model-driven approach is focused on security-critical applications that are based on cryptographic protocols, especially Java Card applications. In this paper we describe the...
The authors propose an extension of SysML which enables description of continuous-time behavior. The authors also develop its execution tool integrated on Eclipse-based platform by exploiting co-simulation of SysML and MATLAB / Simulink. To demonstrate the effectiveness of the tool and the extension to SysML in verifying specifications of an embedded system, we create a sample model and analyze its...
Layering is a concept widely used in computer and software modeling. Many modern information systems are designed and built using a layered model where the function of each layer is specified and well defined. In this paper we will be discussing the layer whose responsibilities include data extraction, manipulation and provision of data to the rest of the application. Common design problems that designers...
The most straight forward approach to requirements elicitation is to provide a direct transformation from the user's task descriptions to analysis models. A detailed description of tasks is formalized in ontology. Using the task ontology it is possible to create templates to facilitate transforming tasks to both use cases and data flow diagrams. In this paper, a new user-oriented approach for task...
Using process composition capability and type system expressiveness of pi-calculus for reference, and pi-calculus as the requirement modeling language, this paper presents a formal approach to modeling requirement. And the consistent process interaction system is defined based on the notion of well-typedness in pi-calculus.
This paper presents a method to compose architectural description (AD) that is suitable for translative model-driven development (MDD). In it, we map the translative MDD artifacts to the AD which complies with the IEEE Standard 1471-2000. The method comprises viewpoints which address separately platform-independent requirements specification (PIRS) and platform requirements specification (PRS). Functional...
Maintaining consistency constraints in a complicated development environment is ever an open problem, as different development tools are usually involved which in turn use various files or databases to store their data. To solve this problem, current XML technology was used to build a repository which manages all data of a development effort. XML queries were also presented to state consistency constraints...
Web service based business process has become the backbone of enterprise information system, and it is evolving all the time. Therefore, the process has to be tested thoroughly and repeatedly whenever it is changed. This paper proposes a model driven approach toward generating executable test case from the given business process. The approach is composite of three stages: defining a process under...
JMASE is a modeling and simulation environment that provides capabilities for defining models, combining models into simulations, executing simulations, and post-processing the results. It is designed to support high-fidelity engineering-level analyses required for weapon system development and acquisition. But it is difficult for JMASE models to interact with other simulations because the standard...
In accordance with the characteristics of green alignment selection and problems existing in the current intelligent alignment selection design, this paper integrates the advantages of Unified Modeling Language (UML) in the software engineering and, then proposes comprehensive solution based on decision making model of UML green alignment selection. Furthermore, this paper elucidates ideas of each...
The goal of the data model is to certify that all data objects required by the database are completely and accurately represented. Because the data model uses easily understood notations and natural language, it can be examined and confirmed as correct by the end-users. There are two major methodologies used to create a data model: the Entity-Relationship (ER) approach and the object model. Ontologies...
This paper addresses the problem of describing and analyzing data manipulation within business process workflow specifications. We apply a model-driven approach. We begin with business requirement specifications, consisting of an ontology and an associated set of normative rules, that define the ways in which business processes can interact. We then transform this specification into a Petri Net workflow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.