Pub Date : 2017-06-01DOI: 10.1049/iet-sen.2016.0180
O. Bushehrian
Building composite value-added services by combining basic services has become a prevalent way of software development. To provide the dependability in a composite service it is essential to combine the backward and forward recovery strategies properly based on composition level quality of service (QoS) factors or user preferences. The backward recovery, known as a fault-tolerance (FT) technique, is performed by compensating the successfully terminated services dependent on the failed service which may entail rollback costs. The forward recovery is achieved by applying FT patterns to each workflow task to decrease its failure rate. It has the disadvantages of longer invocation time and cost. Obviously the success of these methods in finding transactional compositions is highly dependent on the compensateability and retriability of services. In this study, four composition-level QoS factors have been defined to select between the forward or backward recovery strategies in the workflow. The problem of creating a dependable composite service is formulated as a multiobjective optimisation algorithm which explores not only the huge search space of different recovery strategies but also the cross-cutting search space of task scheduling. The effect of task scheduling on finding solutions with lower costs has been verified using case studies.
{"title":"Dependable composition of transactional web services using fault-tolerance patterns and service scheduling","authors":"O. Bushehrian","doi":"10.1049/iet-sen.2016.0180","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0180","url":null,"abstract":"Building composite value-added services by combining basic services has become a prevalent way of software development. To provide the dependability in a composite service it is essential to combine the backward and forward recovery strategies properly based on composition level quality of service (QoS) factors or user preferences. The backward recovery, known as a fault-tolerance (FT) technique, is performed by compensating the successfully terminated services dependent on the failed service which may entail rollback costs. The forward recovery is achieved by applying FT patterns to each workflow task to decrease its failure rate. It has the disadvantages of longer invocation time and cost. Obviously the success of these methods in finding transactional compositions is highly dependent on the compensateability and retriability of services. In this study, four composition-level QoS factors have been defined to select between the forward or backward recovery strategies in the workflow. The problem of creating a dependable composite service is formulated as a multiobjective optimisation algorithm which explores not only the huge search space of different recovery strategies but also the cross-cutting search space of task scheduling. The effect of task scheduling on finding solutions with lower costs has been verified using case studies.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"52 1","pages":"338-346"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76275157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-19DOI: 10.1049/iet-sen.2016.0256
Mohammad Javad Amiri, Mahnaz Koupaee
Although measuring the similarity of business processes based on activity labels, structural and behavioural factors can be effective, defining inexact and incomplete labels and the existence of multiple labels for similar activities cause challenges for determining similar processes. Recent attempts to consider data in business process management and the support of data modelling in business process standards have led to the creation of multiple business models with data access. In this study, a method considering data for measuring business process similarity is presented in which first the similarity of activities is measured according to their structures and behaviours in a process and also their data access. Then based on the similarity of activities, the similarity of processes is determined using the proposed algorithm.
{"title":"Data-driven business process similarity","authors":"Mohammad Javad Amiri, Mahnaz Koupaee","doi":"10.1049/iet-sen.2016.0256","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0256","url":null,"abstract":"Although measuring the similarity of business processes based on activity labels, structural and behavioural factors can be effective, defining inexact and incomplete labels and the existence of multiple labels for similar activities cause challenges for determining similar processes. Recent attempts to consider data in business process management and the support of data modelling in business process standards have led to the creation of multiple business models with data access. In this study, a method considering data for measuring business process similarity is presented in which first the similarity of activities is measured according to their structures and behaviours in a process and also their data access. Then based on the similarity of activities, the similarity of processes is determined using the proposed algorithm.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"1 1","pages":"309-318"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76853044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-19DOI: 10.1049/iet-sen.2016.0173
Euler Horta Marinho, R. F. Resende
Mobile applications are becoming more and more pervasive. The increase in the amount of mobile applications is accompanied by a growing demand of quality. Software testing is considered an important activity in this context. The authors propose a method named platform for testing mobile applications (PLATEM) and its supporting tool, named PLATOOL, for assisting developers in the automation of system test. PLATEM and PLAtem supporting TOOL (PLATOOL) are able to deal with events of the mobile applications during the automation of system test. One important aspect of PLATEM and PLATOOL is to take advantage of the association of software quality assurance tests and test-driven design tests. Their initial results indicate a promising approach that can be improved and extended to other mobile platforms.
{"title":"PLATEM: a method for mobile applications testing","authors":"Euler Horta Marinho, R. F. Resende","doi":"10.1049/iet-sen.2016.0173","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0173","url":null,"abstract":"Mobile applications are becoming more and more pervasive. The increase in the amount of mobile applications is accompanied by a growing demand of quality. Software testing is considered an important activity in this context. The authors propose a method named platform for testing mobile applications (PLATEM) and its supporting tool, named PLATOOL, for assisting developers in the automation of system test. PLATEM and PLAtem supporting TOOL (PLATOOL) are able to deal with events of the mobile applications during the automation of system test. One important aspect of PLATEM and PLATOOL is to take advantage of the association of software quality assurance tests and test-driven design tests. Their initial results indicate a promising approach that can be improved and extended to other mobile platforms.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"1 1","pages":"319-328"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91128775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-19DOI: 10.1049/iet-sen.2016.0174
Irum Inayat, S. Salim, S. Marczak
Requirements engineering is a social process and while working together, stakeholders develop socio-technical relationships. Socio-technical aspects such as communication (information exchange among members) and awareness (knowledge of others) were discussed in literature, but little is known with respect to their role in requirements engineering activities. Therefore, requirements-driven collaboration (RDC), particularly on the relevance of socio-technical aspects, warrants further investigation. The authors aim to fill this gap by conducting a systematic literature review on these two aspects. This review covers planning (defining objectives and search strategy), execution (study search and selection), and interpretation of the findings (results and discussions). Findings revealed more studies on communication than on awareness. Two aspects of communication covered for RDC in literature are: (i) preferred communication medium, and (ii) communication patterns of teams. However, for awareness the aspects affecting awareness and vice versa were studied for RDC. Further investigation indicated the interdependence of awareness and communication and that distance does not affect team's awareness. The authors discuss implications for software practitioners in terms of enhancing their performance by considering the role of information brokers, and identifying central and emergent members etc. Researchers can strengthen the domain by providing more empirical results on interdependence of socio-technical aspects.
{"title":"Survey of communication and awareness as the most relevant socio-technical aspects of requirements-driven collaboration among software development teams","authors":"Irum Inayat, S. Salim, S. Marczak","doi":"10.1049/iet-sen.2016.0174","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0174","url":null,"abstract":"Requirements engineering is a social process and while working together, stakeholders develop socio-technical relationships. Socio-technical aspects such as communication (information exchange among members) and awareness (knowledge of others) were discussed in literature, but little is known with respect to their role in requirements engineering activities. Therefore, requirements-driven collaboration (RDC), particularly on the relevance of socio-technical aspects, warrants further investigation. The authors aim to fill this gap by conducting a systematic literature review on these two aspects. This review covers planning (defining objectives and search strategy), execution (study search and selection), and interpretation of the findings (results and discussions). Findings revealed more studies on communication than on awareness. Two aspects of communication covered for RDC in literature are: (i) preferred communication medium, and (ii) communication patterns of teams. However, for awareness the aspects affecting awareness and vice versa were studied for RDC. Further investigation indicated the interdependence of awareness and communication and that distance does not affect team's awareness. The authors discuss implications for software practitioners in terms of enhancing their performance by considering the role of information brokers, and identifying central and emergent members etc. Researchers can strengthen the domain by providing more empirical results on interdependence of socio-technical aspects.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"39 1","pages":"277-285"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81109106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-17DOI: 10.1049/iet-sen.2016.0209
A. Y. Shahrah, M. Al-Mashari
Emergency response is a knowledge-intensive process that is very hard to model and automate. This primarily returns to the unpredictability and unrepeatability nature that characterises such process. Traditional modelling approaches are too rigid and do not effectively support the flexibility and dynamicity required by emergency response process. Case Management Model and Notation (CMMN) is a new standard modelling specification that has recently been released by Object Management Group (OMG) to standardise the modelling of Case Management approach. The objective of this study is to demonstrate how the CMMN can be used to model emergency response process. The authors use the CMMN to build a template model for a generic emergency response process. This model can easily be extended or interchanged among different modelling tools or execution platforms. In addition, they present a case study of a flood management process as a concrete example of using CMMN in modelling emergency response process. Finally, they conclude that the CMMN has a great potential to model case-based processes such as emergency response, but CMMN still in its infancy. As a result, there is a lack of mature modelling tools and execution engines to execute the CMMN models.
{"title":"Modelling emergency response process using case management model and notation","authors":"A. Y. Shahrah, M. Al-Mashari","doi":"10.1049/iet-sen.2016.0209","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0209","url":null,"abstract":"Emergency response is a knowledge-intensive process that is very hard to model and automate. This primarily returns to the unpredictability and unrepeatability nature that characterises such process. Traditional modelling approaches are too rigid and do not effectively support the flexibility and dynamicity required by emergency response process. Case Management Model and Notation (CMMN) is a new standard modelling specification that has recently been released by Object Management Group (OMG) to standardise the modelling of Case Management approach. The objective of this study is to demonstrate how the CMMN can be used to model emergency response process. The authors use the CMMN to build a template model for a generic emergency response process. This model can easily be extended or interchanged among different modelling tools or execution platforms. In addition, they present a case study of a flood management process as a concrete example of using CMMN in modelling emergency response process. Finally, they conclude that the CMMN has a great potential to model case-based processes such as emergency response, but CMMN still in its infancy. As a result, there is a lack of mature modelling tools and execution engines to execute the CMMN models.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"120 1","pages":"301-308"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78553930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-14DOI: 10.1049/iet-sen.2016.0130
Munish Saini, K. Chahal
Software evolution refers to the phenomenon of continuous software change and growth after its initial development. A version control system records all information about these changes. Several research studies in the past have studied the historical records of changes of open source software (OSS) projects and found them useful for understanding the software evolution process. However, most of them investigate the distributions of changes types, change size, and change effort in an isolated manner. There is no work, to the best of our knowledge, which takes a combined view of various dimensions of a change. This study examines the change activity in 106 OSS projects from three points of view: change purpose (type), change size, and change effort. The common patterns in change type, change size, and change effort are highlighted using the burst detection technique. The burst detection technique helps in identifying the peaks in the time series and compares them with the peaks of other time series. The results indicate that the change-type activity of OSS projects is significantly related with change effort, and change size for high and moderate-activity clusters. Though for low-activity cluster, this commonality of patterns is not there for all types of changes.
{"title":"Analysing change profiles of open source software projects using burst detection","authors":"Munish Saini, K. Chahal","doi":"10.1049/iet-sen.2016.0130","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0130","url":null,"abstract":"Software evolution refers to the phenomenon of continuous software change and growth after its initial development. A version control system records all information about these changes. Several research studies in the past have studied the historical records of changes of open source software (OSS) projects and found them useful for understanding the software evolution process. However, most of them investigate the distributions of changes types, change size, and change effort in an isolated manner. There is no work, to the best of our knowledge, which takes a combined view of various dimensions of a change. This study examines the change activity in 106 OSS projects from three points of view: change purpose (type), change size, and change effort. The common patterns in change type, change size, and change effort are highlighted using the burst detection technique. The burst detection technique helps in identifying the peaks in the time series and compares them with the peaks of other time series. The results indicate that the change-type activity of OSS projects is significantly related with change effort, and change size for high and moderate-activity clusters. Though for low-activity cluster, this commonality of patterns is not there for all types of changes.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"83 1","pages":"329-337"},"PeriodicalIF":0.0,"publicationDate":"2017-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75035097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-14DOI: 10.1049/iet-sen.2015.0154
Maicon Bernardino, E. Rodrigues, A. Zorzo, Luciano Marchezan
Every year several contributions to the model-based testing (MBT) field are published. Therefore, to follow the evolution and trends of several tools and models available is difficult. Moreover, since the variety of models and tools that became available in recent years, choosing an approach to support the MBT process is a challenging activity. The main objective of this study is to provide an overview on MBT tools and models used by those tools. Furthermore, the authors' study can help academic researchers and companies to understand the topics involving MBT. Therefore, a systematic mapping study was conducted in which 1197 distinct papers were evaluated. At the end, 87 primary studies were selected to be analysed in a quantitative and qualitative way. As a result, they classified the tools and models that are currently used to support MBT. Moreover, they identified 70 MBT tools, as well as different domains in which MBT is already applied to. Therefore, there are some evidence that MBT continues to be a broad and ‘alive’ research field since every year a significant number of papers presenting different kinds of contributions are published.
{"title":"Systematic mapping study on MBT: tools and models","authors":"Maicon Bernardino, E. Rodrigues, A. Zorzo, Luciano Marchezan","doi":"10.1049/iet-sen.2015.0154","DOIUrl":"https://doi.org/10.1049/iet-sen.2015.0154","url":null,"abstract":"Every year several contributions to the model-based testing (MBT) field are published. Therefore, to follow the evolution and trends of several tools and models available is difficult. Moreover, since the variety of models and tools that became available in recent years, choosing an approach to support the MBT process is a challenging activity. The main objective of this study is to provide an overview on MBT tools and models used by those tools. Furthermore, the authors' study can help academic researchers and companies to understand the topics involving MBT. Therefore, a systematic mapping study was conducted in which 1197 distinct papers were evaluated. At the end, 87 primary studies were selected to be analysed in a quantitative and qualitative way. As a result, they classified the tools and models that are currently used to support MBT. Moreover, they identified 70 MBT tools, as well as different domains in which MBT is already applied to. Therefore, there are some evidence that MBT continues to be a broad and ‘alive’ research field since every year a significant number of papers presenting different kinds of contributions are published.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"123 1","pages":"141-155"},"PeriodicalIF":0.0,"publicationDate":"2017-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86431169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-09DOI: 10.1049/iet-sen.2015.0108
Joohyung Sun, Hyeonjoong Cho
Recent advances in mobile technologies have led to improved quality of multimedia services (QoMS) in a variety of mobile devices. Because multimedia has become a major form of content consumption for mobile users, satisfying user expectation on QoMS in energy-restricted mobile devices is critical. This need has motivated us to develop an aggressive and conservative low-power work demand analysis with multi-granularity (lpWDA-MG-AGG/CON) algorithm, designed to minimise power consumption in mobile devices by utilising a dynamic voltage scaling technique while simultaneously ensuring QoMS based on a resource reservation scheme. In addition, the authors analytically showed the schedulability of the proposed scheme under the rate monotonic scheduling policy. For performance evaluation, the authors implemented the two lpWDA-MG algorithms and several existing algorithms in a Linux operating system. Specifically, the authors measured power consumption with a power metre and determined that the proposed algorithms consume about 40% less dynamic power than the other existing algorithms. Moreover, the authors found that the proposed algorithms ensure acceptable QoMS.
{"title":"Power-efficient real-time scheduling based on multi-granularity resource reservation for multimedia services","authors":"Joohyung Sun, Hyeonjoong Cho","doi":"10.1049/iet-sen.2015.0108","DOIUrl":"https://doi.org/10.1049/iet-sen.2015.0108","url":null,"abstract":"Recent advances in mobile technologies have led to improved quality of multimedia services (QoMS) in a variety of mobile devices. Because multimedia has become a major form of content consumption for mobile users, satisfying user expectation on QoMS in energy-restricted mobile devices is critical. This need has motivated us to develop an aggressive and conservative low-power work demand analysis with multi-granularity (lpWDA-MG-AGG/CON) algorithm, designed to minimise power consumption in mobile devices by utilising a dynamic voltage scaling technique while simultaneously ensuring QoMS based on a resource reservation scheme. In addition, the authors analytically showed the schedulability of the proposed scheme under the rate monotonic scheduling policy. For performance evaluation, the authors implemented the two lpWDA-MG algorithms and several existing algorithms in a Linux operating system. Specifically, the authors measured power consumption with a power metre and determined that the proposed algorithms consume about 40% less dynamic power than the other existing algorithms. Moreover, the authors found that the proposed algorithms ensure acceptable QoMS.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"84 1","pages":"171-180"},"PeriodicalIF":0.0,"publicationDate":"2017-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74934921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-27DOI: 10.1049/iet-sen.2016.0168
L. Varga
The agents of a distributed adaptive system perceive the current state of their environment and make decisions which action to perform. The actions are both reactive and proactive. Reactivity can be supported by the availability of real-time data and proactivity can be supported by anticipatory techniques. Recent investigations proved that if the agents use selfish strategy, then in some situations sometimes the system maybe worst off with real-time data than without real-time data, even if anticipatory techniques are applied to predict the future state of the environment. This study investigates that version of the Braess paradox, where each subsequent agent of the flow may select a different route, using real-time data and anticipatory techniques. The authors contribute to the state-of-the-art by proving that the traffic distribution in this Braess paradox approximates the Nash equilibrium.
{"title":"Equilibrium with predictive routeing in the online version of the Braess paradox","authors":"L. Varga","doi":"10.1049/iet-sen.2016.0168","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0168","url":null,"abstract":"The agents of a distributed adaptive system perceive the current state of their environment and make decisions which action to perform. The actions are both reactive and proactive. Reactivity can be supported by the availability of real-time data and proactivity can be supported by anticipatory techniques. Recent investigations proved that if the agents use selfish strategy, then in some situations sometimes the system maybe worst off with real-time data than without real-time data, even if anticipatory techniques are applied to predict the future state of the environment. This study investigates that version of the Braess paradox, where each subsequent agent of the flow may select a different route, using real-time data and anticipatory techniques. The authors contribute to the state-of-the-art by proving that the traffic distribution in this Braess paradox approximates the Nash equilibrium.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"124 1","pages":"165-170"},"PeriodicalIF":0.0,"publicationDate":"2017-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88029795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-13DOI: 10.1049/iet-sen.2016.0169
T. D. Noia, E. Sciascio, F. Donini, M. Mongiello, Francesco Nocera
The authors present an approach to complex adaptive mobile applications modelling and implementation, able to dynamically change according to changed behavioural properties, state and/or context variables and user's preference. To this aim, they design a metamodel made up of an action repository (AR) to store triples composed by logical propositions to define criteria for selecting actions to be executed. An algorithm has been devised to retrieve a set of possible actions – apps, services or components – to be executed from the AR. The selection of a single action to be executed depends on a user's model. The metamodel validation is carried out through an instantiation in two real scenarios: a proximity environment and a smartphone.
{"title":"Formal model for user-centred adaptive mobile devices","authors":"T. D. Noia, E. Sciascio, F. Donini, M. Mongiello, Francesco Nocera","doi":"10.1049/iet-sen.2016.0169","DOIUrl":"https://doi.org/10.1049/iet-sen.2016.0169","url":null,"abstract":"The authors present an approach to complex adaptive mobile applications modelling and implementation, able to dynamically change according to changed behavioural properties, state and/or context variables and user's preference. To this aim, they design a metamodel made up of an action repository (AR) to store triples composed by logical propositions to define criteria for selecting actions to be executed. An algorithm has been devised to retrieve a set of possible actions – apps, services or components – to be executed from the AR. The selection of a single action to be executed depends on a user's model. The metamodel validation is carried out through an instantiation in two real scenarios: a proximity environment and a smartphone.","PeriodicalId":13395,"journal":{"name":"IET Softw.","volume":"4 1","pages":"156-164"},"PeriodicalIF":0.0,"publicationDate":"2017-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88001825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}