When engineering complex software systems, the key Architectural Design Decisions (ADD) and the reasoning underlying those decisions need to be fully understood by all stakeholders. Achieving such understanding usually requires the use of ADD management tools. Most existing ADD management tools apply prescriptive ADD models and do not provide sufficient customizability. However, forcing architects to follow an ADD model that does not fit their specific needs can cause significant problems (e.g., extra cost is needed, and architects’ willingness and motivation can negatively be affected). This research project aims at solving this issue by developing a highly customizable solution, which can enable practitioners to define ADD models according to their preferences and working situations. The detailed needs for ADD model customization will be identified by multiple case studies and semi-structured interviews; the proposed solution will be evaluated using different empirical research methods.
{"title":"Supporting Customizable Architectural Design Decision Management","authors":"Lianping Chen, M. Babar","doi":"10.1109/ECBS.2010.32","DOIUrl":"https://doi.org/10.1109/ECBS.2010.32","url":null,"abstract":"When engineering complex software systems, the key Architectural Design Decisions (ADD) and the reasoning underlying those decisions need to be fully understood by all stakeholders. Achieving such understanding usually requires the use of ADD management tools. Most existing ADD management tools apply prescriptive ADD models and do not provide sufficient customizability. However, forcing architects to follow an ADD model that does not fit their specific needs can cause significant problems (e.g., extra cost is needed, and architects’ willingness and motivation can negatively be affected). This research project aims at solving this issue by developing a highly customizable solution, which can enable practitioners to define ADD models according to their preferences and working situations. The detailed needs for ADD model customization will be identified by multiple case studies and semi-structured interviews; the proposed solution will be evaluated using different empirical research methods.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper describes a business reengineering process (BPR) approach to address multi-timezone (3-timezone or 3TZ) collaborative teamwork environments by combining the Holonic architecture with the Zachman Metamodel Framework. While the use of collaborative project systems is not new, the methodology to share time resources from different timezones seeks to address pedagogical and engineering process concerns in team-based project development. The benefits of collaborative project management tools go beyond a uniform platform to deploy project resources, but to also enhance systemic processes and engineering practice. This facilitates team members to dedicate their time towards common work tasks, delineates individual and shared work packages, and improves student-tutor feedback techniques as teachers can actively monitor progress of development throughout the project lifecycle.
{"title":"3TZ Collaborative Team Environments Incorporating the Hybrid Holonic Architecture","authors":"Z. Chaczko, C. Chiu, R. Klempous, J. Nikodem","doi":"10.1109/ECBS.2010.42","DOIUrl":"https://doi.org/10.1109/ECBS.2010.42","url":null,"abstract":"The paper describes a business reengineering process (BPR) approach to address multi-timezone (3-timezone or 3TZ) collaborative teamwork environments by combining the Holonic architecture with the Zachman Metamodel Framework. While the use of collaborative project systems is not new, the methodology to share time resources from different timezones seeks to address pedagogical and engineering process concerns in team-based project development. The benefits of collaborative project management tools go beyond a uniform platform to deploy project resources, but to also enhance systemic processes and engineering practice. This facilitates team members to dedicate their time towards common work tasks, delineates individual and shared work packages, and improves student-tutor feedback techniques as teachers can actively monitor progress of development throughout the project lifecycle.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Early in the design-cycle of hardware-systems, details about data-formats, interfaces and the behavior of system components are not available. Nonetheless, choices between design alternatives, depending on given constraints, must be made. To support this process, simulation-models are used to determine the system-performance. In this work, an approach for modeling communication-structures for an EQN-based method, as introduced in previous work, is given. The approach employs component patterns to reduce the complexity of interfaces, while easing the composition of highly performant systems. As we show with the example of a FlexRayTM-bus-model, the proposed method fosters the assembly of simulation-models from coarse grained system component patterns, while it still allows to obtain detailed performance simulation results. Despite a high abstraction level, the full functionality can be specified with the proposed approach. This paper provides the modeling of components with Extended Queuing Networks(EQN) and a discussion of a fully parameterizable FlexRayTM-bus-model, taken from the automotive domain.
{"title":"Communication Modeling for System-Level Performance-Simulation","authors":"Heike S. Rolfs, A. Liehr, K. Buchenrieder","doi":"10.1109/ECBS.2010.27","DOIUrl":"https://doi.org/10.1109/ECBS.2010.27","url":null,"abstract":"Early in the design-cycle of hardware-systems, details about data-formats, interfaces and the behavior of system components are not available. Nonetheless, choices between design alternatives, depending on given constraints, must be made. To support this process, simulation-models are used to determine the system-performance. In this work, an approach for modeling communication-structures for an EQN-based method, as introduced in previous work, is given. The approach employs component patterns to reduce the complexity of interfaces, while easing the composition of highly performant systems. As we show with the example of a FlexRayTM-bus-model, the proposed method fosters the assembly of simulation-models from coarse grained system component patterns, while it still allows to obtain detailed performance simulation results. Despite a high abstraction level, the full functionality can be specified with the proposed approach. This paper provides the modeling of components with Extended Queuing Networks(EQN) and a discussion of a fully parameterizable FlexRayTM-bus-model, taken from the automotive domain.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael L. Valenzuela, Chuan Feng, P. Reddy, F. Momen, J. Rozenblit, B. T. Eyck, F. Szidarovszky
Predicting asymmetric threats (e.g., terrorist events) is becoming ever more important. Prior works have focused on tactical, statistical, and data-fusion systems. The thrust of our work has been the development of a non-numerical predictive model for amplifying intelligence analysts’ recognition of emergent threats. The intelligence community uses a Template schema for assessing courses of action. Our predictive model processes non-numerical data to arrive at automated assessment and confidence scores for these Templates. The predictive model is traceable, transparent, and utilizes Human-in-the-Loop data-fusion. For future work, this predictive model will be further enhanced with behavioral filtering. Behavioral filtering adjusts the assessment and confidence of the predictions by intelligently evaluating characteristic behavioral data. This non-numerical predictive model has been tested and verified in the Asymmetric Threat Response and Analysis Program (ATRAP).
{"title":"A Non-numerical Predictive Model for Asymmetric Analysis","authors":"Michael L. Valenzuela, Chuan Feng, P. Reddy, F. Momen, J. Rozenblit, B. T. Eyck, F. Szidarovszky","doi":"10.1109/ECBS.2010.44","DOIUrl":"https://doi.org/10.1109/ECBS.2010.44","url":null,"abstract":"Predicting asymmetric threats (e.g., terrorist events) is becoming ever more important. Prior works have focused on tactical, statistical, and data-fusion systems. The thrust of our work has been the development of a non-numerical predictive model for amplifying intelligence analysts’ recognition of emergent threats. The intelligence community uses a Template schema for assessing courses of action. Our predictive model processes non-numerical data to arrive at automated assessment and confidence scores for these Templates. The predictive model is traceable, transparent, and utilizes Human-in-the-Loop data-fusion. For future work, this predictive model will be further enhanced with behavioral filtering. Behavioral filtering adjusts the assessment and confidence of the predictions by intelligently evaluating characteristic behavioral data. This non-numerical predictive model has been tested and verified in the Asymmetric Threat Response and Analysis Program (ATRAP).","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Middle school students are at a critical age where exposure to science, technology, engineering, and mathematics (STEM) fields can greatly impact their career goals. Unlike other STEM fields, many schools do not have the expertise or resources needed to acquire and utilize existing engineering education platforms. Thus, we have begun to investigate how to adapt proven interactive project-based learning techniques for resource-constrained middle school environments as well as evaluate interactive platforms or platform characteristics that can be adapted to ensure greater accessibility of these materials.
{"title":"Adapting Engineering Education to Resource-Constrained Middle Schools: Teaching Methodologies and Computing Technologies","authors":"Mario Riojas, Susan Lysecky, J. Rozenblit","doi":"10.1109/ECBS.2010.35","DOIUrl":"https://doi.org/10.1109/ECBS.2010.35","url":null,"abstract":"Middle school students are at a critical age where exposure to science, technology, engineering, and mathematics (STEM) fields can greatly impact their career goals. Unlike other STEM fields, many schools do not have the expertise or resources needed to acquire and utilize existing engineering education platforms. Thus, we have begun to investigate how to adapt proven interactive project-based learning techniques for resource-constrained middle school environments as well as evaluate interactive platforms or platform characteristics that can be adapted to ensure greater accessibility of these materials.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128589650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. A. Malik, A. Jääskeläinen, H. Virtanen, Mika Katara, Fredrik Abbors, D. Truscan, J. Lilius
We discuss the differences between using system models and test models with respect to the model-based testing process. Although these two terms are usually used interchangeably, very little is known about the distinction between the two. System models describe internal behavior of the system under test while the test models contain the behavior from user’s or environment’s point of view. We describe how these two types of models are obtained and used throughout the model-based testing process and how they are related to each other. The discussion is based on our earlier experiences as well as on two case study examples from the telecommunication domain.
{"title":"Model-Based Testing Using System vs. Test Models - What Is the Difference?","authors":"Q. A. Malik, A. Jääskeläinen, H. Virtanen, Mika Katara, Fredrik Abbors, D. Truscan, J. Lilius","doi":"10.1109/ECBS.2010.41","DOIUrl":"https://doi.org/10.1109/ECBS.2010.41","url":null,"abstract":"We discuss the differences between using system models and test models with respect to the model-based testing process. Although these two terms are usually used interchangeably, very little is known about the distinction between the two. System models describe internal behavior of the system under test while the test models contain the behavior from user’s or environment’s point of view. We describe how these two types of models are obtained and used throughout the model-based testing process and how they are related to each other. The discussion is based on our earlier experiences as well as on two case study examples from the telecommunication domain.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ulrich Krenn, Michael Thonhauser, Christian Kreiner
Modern distributed computer systems with mobile and embedded devices as first class citizens are formed from heterogeneous platforms. To support this heterogeneity along with adaptation of the system an approach for interpretation of domain specific models at runtime has been proposed with the concept of Model-Based Software Components (MBSC), separating the domain specific functionality from the current technical platform. This is achieved by the usage of different sets of high-level models. These sets are interpreted by a portable, plugin-extensible runtime environment, utilizing several instances of model-based containers (MCC) for models and their corresponding data. In this paper the design of a domain specific language is presented, enabling the specification of accessing and manipulating data entities provided by various MCCs used in the runtime architecture of a MBSC. For demonstration purposes the application of the various language elements is presented using a case study of an exemplary distributed pervasive system running in the business domain of logistics.
{"title":"ECQL: A Query and Action Language for Model-Based Applications","authors":"Ulrich Krenn, Michael Thonhauser, Christian Kreiner","doi":"10.1109/ECBS.2010.40","DOIUrl":"https://doi.org/10.1109/ECBS.2010.40","url":null,"abstract":"Modern distributed computer systems with mobile and embedded devices as first class citizens are formed from heterogeneous platforms. To support this heterogeneity along with adaptation of the system an approach for interpretation of domain specific models at runtime has been proposed with the concept of Model-Based Software Components (MBSC), separating the domain specific functionality from the current technical platform. This is achieved by the usage of different sets of high-level models. These sets are interpreted by a portable, plugin-extensible runtime environment, utilizing several instances of model-based containers (MCC) for models and their corresponding data. In this paper the design of a domain specific language is presented, enabling the specification of accessing and manipulating data entities provided by various MCCs used in the runtime architecture of a MBSC. For demonstration purposes the application of the various language elements is presented using a case study of an exemplary distributed pervasive system running in the business domain of logistics.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Casanova, Tanara Lauschner, Luiz André Portes Paes Leme, K. Breitman, A. Furtado, V. Vidal
In this paper, we address the problem of modeling the constraints of a mediated schema. We argue that, from the point of view of an application that processes the results of queries defined over the mediated schema, the constraints should be modeled as the greatest lower bound of the constraints of the export schemas, after appropriate translation to a common vocabulary. This assures that the application will correctly interpret query results.
{"title":"Modeling the Mediated Schema Constraints","authors":"M. Casanova, Tanara Lauschner, Luiz André Portes Paes Leme, K. Breitman, A. Furtado, V. Vidal","doi":"10.1109/ECBS.2010.52","DOIUrl":"https://doi.org/10.1109/ECBS.2010.52","url":null,"abstract":"In this paper, we address the problem of modeling the constraints of a mediated schema. We argue that, from the point of view of an application that processes the results of queries defined over the mediated schema, the constraints should be modeled as the greatest lower bound of the constraints of the export schemas, after appropriate translation to a common vocabulary. This assures that the application will correctly interpret query results.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Competitions of shared web resources have been widely concerned today. Under the circumstances of networks, especially in distributed systems, central supervisor can hardly be implemented, which makes it more complicated to prevent deadlock problems. This paper describes the competitions of web services for shared web resources using CSP method. Deadlocks can be analyzed based on the formal model by means of the trace semantics. The capability of deadlock prevention solutions which have been applied in industry can be proved theoretically under this approach. Moreover, the FDR which is a model checking tool for CSP can be used to automate the verifications.
{"title":"Formal Modeling and Verifications of Deadlock Prevention Solutions in Web Service Oriented System","authors":"Jieqi Ding, Han Zhu, Huibiao Zhu, Qin Li","doi":"10.1109/ECBS.2010.48","DOIUrl":"https://doi.org/10.1109/ECBS.2010.48","url":null,"abstract":"Competitions of shared web resources have been widely concerned today. Under the circumstances of networks, especially in distributed systems, central supervisor can hardly be implemented, which makes it more complicated to prevent deadlock problems. This paper describes the competitions of web services for shared web resources using CSP method. Deadlocks can be analyzed based on the formal model by means of the trace semantics. The capability of deadlock prevention solutions which have been applied in industry can be proved theoretically under this approach. Moreover, the FDR which is a model checking tool for CSP can be used to automate the verifications.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129237973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In situations where a human operator is unable to perform tactical control of an unmanned aerial vehicle (UAV), it may be necessary to have the UAV make or suggest tactical decisions. The interaction of the UAV computers with those of the human decision makers requires that choices for the human decision maker be easy to interpret and intuitive to implement or approve. This paper provides closed-form solutions to maximize detection of a slow-moving ground target by a UAV. The output of these solutions is a height at which the UAV should fly in order to maximize probability of detection, which informs the operator whether a single vehicle is sufficient. We assume that the UAV can travel faster than the ground target with some bounded speed (but no certain direction). The ground target is detected when it is inside a field of view which is a function of the state of the UAV, so the controller for motion affects whether the target will be detected. We also provide avenues for future work where we consider the impact of results for multi-UAV search and alternative sensor accuracy models.
{"title":"UAV Search: Maximizing Target Acquisition","authors":"H. Al-Helal, J. Sprinkle","doi":"10.1109/ECBS.2010.9","DOIUrl":"https://doi.org/10.1109/ECBS.2010.9","url":null,"abstract":"In situations where a human operator is unable to perform tactical control of an unmanned aerial vehicle (UAV), it may be necessary to have the UAV make or suggest tactical decisions. The interaction of the UAV computers with those of the human decision makers requires that choices for the human decision maker be easy to interpret and intuitive to implement or approve. This paper provides closed-form solutions to maximize detection of a slow-moving ground target by a UAV. The output of these solutions is a height at which the UAV should fly in order to maximize probability of detection, which informs the operator whether a single vehicle is sufficient. We assume that the UAV can travel faster than the ground target with some bounded speed (but no certain direction). The ground target is detected when it is inside a field of view which is a function of the state of the UAV, so the controller for motion affects whether the target will be detected. We also provide avenues for future work where we consider the impact of results for multi-UAV search and alternative sensor accuracy models.","PeriodicalId":356361,"journal":{"name":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}