Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952472
R. Newman
There is an increasing demand for hypermedia delivery of technical documentation for safety critical systems. The world in which such systems exist is dominated by standards bodies, whose standards rapidly become mandatory. In the world of hypermedia technical documentation, most of the work being done is directed towards data formats for storage and delivery, rather than on quality of content. Previous work by the author has discussed methods for ensuring the correct behaviour, against certain safety properties, of hypermedia databases for safety critical applications. Unfortunately, the standards bodies which dictate the standards in these areas have adopted standards that are incompatible with the proposed approach, in its initial form. This paper discusses the types of standard that might have been adopted, the ways in which they need to be enhanced to guarantee the safety properties required and proposes modifications to the previous work which will provide the same type of validation, while using databases of the type proposed in the emergent standards.
{"title":"Delivering the correct multimedia in a standards dominated environment","authors":"R. Newman","doi":"10.1109/EURMIC.2001.952472","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952472","url":null,"abstract":"There is an increasing demand for hypermedia delivery of technical documentation for safety critical systems. The world in which such systems exist is dominated by standards bodies, whose standards rapidly become mandatory. In the world of hypermedia technical documentation, most of the work being done is directed towards data formats for storage and delivery, rather than on quality of content. Previous work by the author has discussed methods for ensuring the correct behaviour, against certain safety properties, of hypermedia databases for safety critical applications. Unfortunately, the standards bodies which dictate the standards in these areas have adopted standards that are incompatible with the proposed approach, in its initial form. This paper discusses the types of standard that might have been adopted, the ways in which they need to be enhanced to guarantee the safety properties required and proposes modifications to the previous work which will provide the same type of validation, while using databases of the type proposed in the emergent standards.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952469
Christian Leubner, Christian Brockmann, Heinrich Müller
A computer-vision-based interaction system for back projection walls is presented. The user controls the projected graphical user interface of an application by pointing with the arm. The mouse cursor follows the motion of the arm. Further instructions corresponding e.g. to a mouse button click can be given by voice commands. The combination of the interaction system with an application program does not require any modifications of the application software, so that the system can be used to control any software running on the back-projection wall. On the image processing and recognition level, a special emphasis has been laid on coping with images disturbed by noise and varying illumination of the environment.
{"title":"Computer-vision-based human-computer interaction with a back projection wall using arm gestures","authors":"Christian Leubner, Christian Brockmann, Heinrich Müller","doi":"10.1109/EURMIC.2001.952469","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952469","url":null,"abstract":"A computer-vision-based interaction system for back projection walls is presented. The user controls the projected graphical user interface of an application by pointing with the arm. The mouse cursor follows the motion of the arm. Further instructions corresponding e.g. to a mouse button click can be given by voice commands. The combination of the interaction system with an application program does not require any modifications of the application software, so that the system can be used to control any software running on the back-projection wall. On the image processing and recognition level, a special emphasis has been laid on coping with images disturbed by noise and varying illumination of the environment.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952450
G. D. Girolamo, P. Maldari, F. Croce, M. Alberti
The INTEGRAL mission is concerned with the fine spectroscopy and fine imaging of celestial gamma-ray sources with concurrent source monitoring in the X-ray and optical energy ranges. The mission will be controlled from the INTEGRAL Mission Operation Centre (MOC) at ESOC in Darmstadt, based on scientific utilisation planning inputs provided by the INTEGRAL Science Operation Centre (ISOC) located at ESTEC (Nordwijk). The satellite science data will be processed at INTEGRAL Science Data Centre (ISDC) in Versoix. This paper describes the IMCS components from the design and integration point of view. It aims to provide readers with an understanding of how a combination of developed software systems (SCOS-2000 infrastructure) complemented by specific additional development and by the adoption of commercial off-the-shelf (COTS) products is best suited to fulfil the operational user requirements of a complex and demanding real-time critical system.
{"title":"INTEGRAL mission control system (IMCS): technology and integrated solutions for supporting a complex scientific mission","authors":"G. D. Girolamo, P. Maldari, F. Croce, M. Alberti","doi":"10.1109/EURMIC.2001.952450","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952450","url":null,"abstract":"The INTEGRAL mission is concerned with the fine spectroscopy and fine imaging of celestial gamma-ray sources with concurrent source monitoring in the X-ray and optical energy ranges. The mission will be controlled from the INTEGRAL Mission Operation Centre (MOC) at ESOC in Darmstadt, based on scientific utilisation planning inputs provided by the INTEGRAL Science Operation Centre (ISOC) located at ESTEC (Nordwijk). The satellite science data will be processed at INTEGRAL Science Data Centre (ISDC) in Versoix. This paper describes the IMCS components from the design and integration point of view. It aims to provide readers with an understanding of how a combination of developed software systems (SCOS-2000 infrastructure) complemented by specific additional development and by the adoption of commercial off-the-shelf (COTS) products is best suited to fulfil the operational user requirements of a complex and demanding real-time critical system.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129260592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952473
G. Fortino, L. Nigro, F. Pupo
MBone technologies have fostered a variety of multimedia large-scale applications supporting collaborative joint work and remote group learning. Such applications span from videoconferencing to video-on-demand systems. Learning centered on videoconferencing tools delivers live video, audio and whiteboard-based interaction among the participants of a multimedia session, e.g., an on-line teleteaching session. Video recording on-demand systems have the potential to augment the contents of a learning session by playing back previously archived lectures. This paper proposes a multimedia system-VIVRO-enabling an original distance learning model, namely cooperative off-line learning, which merges text-based live interaction and shared control and visualisation of remote playbacks. The system allows an explicit group of users, e.g., classmates, to select an archived lecture, share its playback and go over it collaborating with each other through an interactive question board.
MBone技术促进了各种多媒体大规模应用,支持协同联合工作和远程小组学习。这些应用涵盖了从视频会议到视频点播系统的各个领域。以视频会议工具为中心的学习在多媒体会议(例如在线远程教学会议)的参与者之间提供实时视频、音频和基于白板的互动。视频录制点播系统有可能通过播放以前存档的讲座来增加学习课程的内容。本文提出了一种多媒体系统- vivo -支持一种独创的远程学习模式,即协作式离线学习,它将基于文本的实时交互与远程回放的共享控制和可视化相结合。该系统允许一组明确的用户,例如,同学,选择一个存档的讲座,分享它的回放,并通过一个交互式问题板相互协作。
{"title":"An MBone-based on-demand system for cooperative off-line learning","authors":"G. Fortino, L. Nigro, F. Pupo","doi":"10.1109/EURMIC.2001.952473","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952473","url":null,"abstract":"MBone technologies have fostered a variety of multimedia large-scale applications supporting collaborative joint work and remote group learning. Such applications span from videoconferencing to video-on-demand systems. Learning centered on videoconferencing tools delivers live video, audio and whiteboard-based interaction among the participants of a multimedia session, e.g., an on-line teleteaching session. Video recording on-demand systems have the potential to augment the contents of a learning session by playing back previously archived lectures. This paper proposes a multimedia system-VIVRO-enabling an original distance learning model, namely cooperative off-line learning, which merges text-based live interaction and shared control and visualisation of remote playbacks. The system allows an explicit group of users, e.g., classmates, to select an archived lecture, share its playback and go over it collaborating with each other through an interactive question board.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114211607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952459
J. Nawrocki, Bartosz Walter, A. Wojciechowski
Extreme programming (XP) is a lightweight software development methodology. It attracts attention of many software development teams and its popularity is growing very fast. A part of success comes from interesting composition of programming practices included in XP. But what particularly appeals to programmers and makes XP especially interesting to them is resignation of inspection meetings, thick documentation etc. Many people do not understand XP and they find XP a good excuse for not using approved programming practices. Thus, a maturity model for XP is needed that would indicate the risk associated with a project and in some cases make it clear that a project is following neither CMMI(SM) nor XP practices. In the paper, we propose a simple 4-level maturity model for XP.
{"title":"Toward maturity model for extreme programming","authors":"J. Nawrocki, Bartosz Walter, A. Wojciechowski","doi":"10.1109/EURMIC.2001.952459","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952459","url":null,"abstract":"Extreme programming (XP) is a lightweight software development methodology. It attracts attention of many software development teams and its popularity is growing very fast. A part of success comes from interesting composition of programming practices included in XP. But what particularly appeals to programmers and makes XP especially interesting to them is resignation of inspection meetings, thick documentation etc. Many people do not understand XP and they find XP a good excuse for not using approved programming practices. Thus, a maturity model for XP is needed that would indicate the risk associated with a project and in some cases make it clear that a project is following neither CMMI(SM) nor XP practices. In the paper, we propose a simple 4-level maturity model for XP.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129987816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952449
S. Jarzabek
Components are rarely reused "as are" most often, we must adapt components' functions, interfaces and other properties to make them fit into a specific reuse context. Therefore, reusable components must be flexible. This paper is a case study in applying frame technology to inject flexibility into components. During reuse, we can engineer anticipated variant requirements into components by customizing framed components at breakpoints marked, with the frame language commands. Framed components can be also extended with new, unexpected requirements that arise evolution. Frame technology has productivity improvements in engineering data processing COBOL systems for reuse. In this paper we show how frame technology and concepts of flexible manufacturing can be effectively applied to component systems written in Java.
{"title":"Flexible components with frame technology: a case study","authors":"S. Jarzabek","doi":"10.1109/EURMIC.2001.952449","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952449","url":null,"abstract":"Components are rarely reused \"as are\" most often, we must adapt components' functions, interfaces and other properties to make them fit into a specific reuse context. Therefore, reusable components must be flexible. This paper is a case study in applying frame technology to inject flexibility into components. During reuse, we can engineer anticipated variant requirements into components by customizing framed components at breakpoints marked, with the frame language commands. Framed components can be also extended with new, unexpected requirements that arise evolution. Frame technology has productivity improvements in engineering data processing COBOL systems for reuse. In this paper we show how frame technology and concepts of flexible manufacturing can be effectively applied to component systems written in Java.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129665098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952434
P. Popov, L. Strigini, S. Riddle, A. Romanovsky
Off-the-shelf (OTS) components are increasingly used in application areas with stringent dependability requirements. Component wrapping is a well known structuring technique used in many areas. We propose a general approach to developing protective wrappers that assist in integrating OTS items with a focus on the overall system dependability. The wrappers are viewed as redundant software used to detect errors or suspicious activity and to execute appropriate recovery when possible; wrapper development is considered as a part of system integration activities. Wrappers are to be rigorously specified and executed at run time as a means of protecting OTS items against faults in the rest of the system, and the system against the OTS item's faults. Possible symptoms of erroneous behaviour to be detected by a protective wrapper and possible actions to be undertaken in response are listed and discussed. The information required for wrapper development is provided by traceability analysis. Possible approaches to implementing "protectors" in the standard current component technologies are briefly outlined.
{"title":"On systematic design of protectors for employing OTS items","authors":"P. Popov, L. Strigini, S. Riddle, A. Romanovsky","doi":"10.1109/EURMIC.2001.952434","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952434","url":null,"abstract":"Off-the-shelf (OTS) components are increasingly used in application areas with stringent dependability requirements. Component wrapping is a well known structuring technique used in many areas. We propose a general approach to developing protective wrappers that assist in integrating OTS items with a focus on the overall system dependability. The wrappers are viewed as redundant software used to detect errors or suspicious activity and to execute appropriate recovery when possible; wrapper development is considered as a part of system integration activities. Wrappers are to be rigorously specified and executed at run time as a means of protecting OTS items against faults in the rest of the system, and the system against the OTS item's faults. Possible symptoms of erroneous behaviour to be detected by a protective wrapper and possible actions to be undertaken in response are listed and discussed. The information required for wrapper development is provided by traceability analysis. Possible approaches to implementing \"protectors\" in the standard current component technologies are briefly outlined.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115943230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952438
R. Seacord, David A. Mundie, Somjai Boonsiri
Component reuse suffers from the inability of system integrators to effectively identify ensembles of compatible software components that can be easily integrated into a system. To address this problem, we developed a process for identifying component ensembles that satisfy a system requirements specification, and for ranking these ensembles based on a knowledge base of system integration rules. We also built a prototype system that automates this process.
{"title":"K-BACEE: knowledge-based automated component ensemble evaluation","authors":"R. Seacord, David A. Mundie, Somjai Boonsiri","doi":"10.1109/EURMIC.2001.952438","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952438","url":null,"abstract":"Component reuse suffers from the inability of system integrators to effectively identify ensembles of compatible software components that can be easily integrated into a system. To address this problem, we developed a process for identifying component ensembles that satisfy a system requirements specification, and for ranking these ensembles based on a knowledge base of system integration rules. We also built a prototype system that automates this process.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952460
Sami Beydeda, V. Gruhn
Evolution is one of the integral parts in the lifecycle of a process. Similar to software, a process often has to be modified in order to fulfill changed process requirements, or to correct problems that occurred during its enactment. Although currently changes are often implemented ad-hoc without any consideration of side-effects and risks, it is obvious that such side-effects and especially the risk inherent to a change have to be analyzed before actually changing a process. Additionally, it is often impossible to stop, change and restart a process. In these cases, techniques are required which are capable of analyzing and changing currently enacted processes. The article describes the approach for risk and decision analysis elaborated in the ESPRIT project Process Instance Evolution (PIE). The main concept of the approach used in PIE consists of determining the probability distribution of important process parameters and calculating risk measures for decision making. The article describes the overall approach and explains the algorithm used for determining probability distributions.
{"title":"Decision and risk analysis for process evolution","authors":"Sami Beydeda, V. Gruhn","doi":"10.1109/EURMIC.2001.952460","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952460","url":null,"abstract":"Evolution is one of the integral parts in the lifecycle of a process. Similar to software, a process often has to be modified in order to fulfill changed process requirements, or to correct problems that occurred during its enactment. Although currently changes are often implemented ad-hoc without any consideration of side-effects and risks, it is obvious that such side-effects and especially the risk inherent to a change have to be analyzed before actually changing a process. Additionally, it is often impossible to stop, change and restart a process. In these cases, techniques are required which are capable of analyzing and changing currently enacted processes. The article describes the approach for risk and decision analysis elaborated in the ESPRIT project Process Instance Evolution (PIE). The main concept of the approach used in PIE consists of determining the probability distribution of important process parameters and calculating risk measures for decision making. The article describes the overall approach and explains the algorithm used for determining probability distributions.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-09-04DOI: 10.1109/EURMIC.2001.952433
G. Kotonya, A. Rashid
The reality of component-based development is often very different from the commonly held notion that it is a low risk development strategy, which provides a simple and rapid mechanism for increasing the functionality and capability of a system. In reality component-based development carries significant risk throughout the system life cycle. These risks are related to the nature of COTS software, the development process, component technologies and vendor support. This paper describes an approach to developing component-based systems that incorporates risk management in the development process.
{"title":"A strategy for managing risk in component-based software development","authors":"G. Kotonya, A. Rashid","doi":"10.1109/EURMIC.2001.952433","DOIUrl":"https://doi.org/10.1109/EURMIC.2001.952433","url":null,"abstract":"The reality of component-based development is often very different from the commonly held notion that it is a low risk development strategy, which provides a simple and rapid mechanism for increasing the functionality and capability of a system. In reality component-based development carries significant risk throughout the system life cycle. These risks are related to the nature of COTS software, the development process, component technologies and vendor support. This paper describes an approach to developing component-based systems that incorporates risk management in the development process.","PeriodicalId":196541,"journal":{"name":"Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114635807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}