31) Feature Models and MDA for Product Lines

Size: px
Start display at page:

Download "31) Feature Models and MDA for Product Lines"

Transcription

1 Obligatory Literature Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie Ø Florian Heidenreich, Jan Kopcsek, and Christian Wende. FeatureMapper: Features to s. In Companion Proceedings of the 30th International Conference on Software Engineering (ICSE'08), Leipzig, Germany, May s.pdf 31) Feature s and MDA for Product Lines 1. Feature s 2. Product Linie Configuration with Feature s 3. Multi-Stage Configuration Ø Prof. Dr. U. Aßmann Ø Florian Heidenreich Ø Technische Universität Dresden Ø Institut für Software- und Multimediatechnik Ø Gruppe Softwaretechnologie Ø Ø Version , January 23, 2013 References 2 Object-Oriented Analysis vs Object-Oriented Design Ø [Aßm03] U. Aßmann. Invasive Software Composition. Springer, Ø Ø [Cza05] K. Czarnecki and M. Antkiewicz. Features to s: A Template Approach Based on Superimposed Variants. In R. Glück and M. Lowry, editors, Proceedings of the 4th International Conference on Generative Programming and Component Engineering (GPCE'05), volume 3676 of LNCS, pages Springer, [Cza06] K. Czarnecki and K. Pietroszek. Verifying Feature-Based Templates Against Well-Formedness OCL Constraints. In Proceedings of the 5th International Conference on Generative Programming and Component Engineering (GPCE'06), pages , New York, NY, USA, ACM. textual requirements (stories) requirements specification context analysis Ø Ø Ø [Hei08a] F. Heidenreich, J. Kopcsek, and C. Wende. FeatureMapper: Features to s. In Companion Proceedings of the 30th International Conference on Software Engineering (ICSE'08), pages , New York, NY, USA, May ACM. [Hei08b] Florian Heidenreich, Ilie Şavga and Christian Wende. On Controlled Visualisations in Software Product Line Engineering. In Proc. of the 2nd Int l Workshop on Visualisation in Software Product Line Engineering (ViSPLE 2008), collocated with the 12th Int l Software Product Line Conference (SPLC 2008), Limerick, Ireland, September [Hei09] Florian Heidenreich. Towards Systematic Ensuring Well-Formedness of Software Product Lines. In Proceedings of the 1st Workshop on Feature- Oriented Software Development (FOSD 2009) collocated with MODELS/GPCE/ SLE Denver, Colorado, USA, October ACM Press use cases analysis domain architectural design detailed design Slide 3 4

2 Extended to -Driven Architecture (MDA) Product Lines (Product Families) Ø Horizontal product line: one product idea in several markets textual requirements (stories) use cases requirements specification context analysis (CIM) analysis domain Platform independent Platform-1 specific Platform-(1,.., n) specific Feature textual requirements (stories) (varability Product 1 use cases requirements specification context ) domain analysis Product 2 Product n 5 Adding Extensions to Abstract s in the MDA 6 Configuration of Variabilities in Vertical Product Lines (MDA for Vertical Product Lines) Ø In the following, we extend the MDA (below) with configuration Vertical product line: several products in one or several markets The VIM (variant independent ) is the common of the product family Domain Platform independent (PIM) Platform-1-specific extension (PSE) weaving Configuration With Feature Variants Product Variants Design Variants Analysis Product Line (Framework, VIM) Platform-1 specific (PIM) Platform-2 specific extension (PSE) weaving weaving Configuration With Feature Variants PSM Variants Extensions Product PIM weaving Platform-(1+2) specific (PSM) 7 Product Product PSM PSM Product PSM 8

3 Feature s for Product configuration Ø Feature s are used to express variability in Product Lines Ø alternative, Ø mandatory, Ø optional features, and Ø their relations OR XOR 31.1 PRODUCT LINES WITH FEATURE TREES AND FEATURE MODELS Ø A variant represents a concrete product (variant) from the product line Ø The variant results from a selection of a subgraph of the feature Ø The variant can be used to parameterize and drive the product instantiation process Prof. U. Aßmann Feature-driven SPLE 9 10 Feature s Example Ø The Feature Tree Notation is derived from And-Or-Trees Group of AND Features Ø A1 or A2 or A3 Ø B1; B2 xor B3 Ø B4; optional B5 Ø B1; B7 Group of Alternative (XOR) Features Mandatory Feature Optional Feature Group of OR Features A1 A2 A3 FeatureA FeatureB FeatureD B1 B2 B3 B4 B5 B6 B7 PhD Thesis, Czarnecki (1998) based on FODA-Notation by Kang et al. (1990) 11 12

4 Ø [K. Lehmann-Siegemund, Diplomarbeit] Ein Featurel for Computer-Aided cognitive Rehabilitation Features to Fragments ( Snippets) Ø Bridging the gap between configuration and solution space FM K J E S CE CU NO NM... ge gz IS IT T A IS IT ge gz T A ge gz IS IT T A ge gz IS IT T A [1-2] [1-2] [1-2] [1-2] A/K Ø Need for mapping of features from feature s to artefacts of the solution space Ø Possible artefacts Ø s defined in DSLs Ø fragments (snippets) Ø Architectural artefacts (components, connectors, aspects) Ø Source code Ø Files K J E S CE CU NO NM... Ø But how can we achieve the mapping...? [c1] ge T A IS IT IS IT [c1] T A [c1] ge gz IS IT T A [1-2] [1-2] [1-2] [1-2] [c1] IS IT T A Ex: Plugins have Features (in Eclipse) 15 Prof. U. Aßmann 31.2 PRODUCT-LINE CONFIGURATION WITH FEATURE MODELS Feature-driven SPLE 16

5 Different Approaches of Variant Selection Additive approach Ø Map all features to fragments ( snippets) Ø Compose them with a core based on the presence of the feature in the variant Different Approaches of Variant Selection (2) Subtractive approach Ø all features in one Ø Remove elements based on absence of the feature in the variant Ø Pros: Ø conflicting variants can be led correctly Ø strong per-feature decomposition Ø Cons: Ø traceability problems Ø increased overhead in linking the different fragments Ø Pros: Ø no need for redundant links between artifacts Ø short cognitive distance Ø Cons: Ø conflicting variants can't be led correctly Ø huge and inconcise s 17 The Problem between Features and Solution Elements 18 Features to s Ø FeatureMapper - a tool for mapping of feature s to ling artefacts developed at the ST Group Ø Screencast and paper available at Problem Space FeatureA Creation Solu5on Space A B Ø Advantages: Ø Explicit representation of mappings Ø Configuration of large product lines from selection of variants in feature trees Ø Customers understand Ø Consistency of each product in the line is simple to check Ø and code snippets can be traced to requirements Visualisation FeatureB FeatureD FeatureE Validation Derivation F G E D Slide 19 20

6 FeatureMapper Features to s Ø We chose an explicit Representation in our tool FeatureMapper Ø s are stored in a mapping that is based on a mapping meta Feature Solu5on s FeatureA D A B E FeatureB FeatureD FeatureE FeatureE FeatureE G F F G E D Prof. U. Aßmann Slide 21 Feature-driven SPLE Slide 22 From Feature s to Transformations Visualisation of s (1) Ø Visualisations play a crucial role in Software Engineering It s hard to impossible to understand a complex system unless you look at it from different points of view Ø In many cases, developers are interested only in a particular aspect of the connection between a feature and realising artefacts How a particular feature is realised? Which features communicate or interact in their realisation? Which artefacts may be effectively used in a variant? Ø Solution of the FeatureMapper: Views, a visualisation technique that provides four basic visualisations Realisation View Variant View Context View Property-Changes View 23 Slide 24

7 Realisation View Variant View Ø For one Variant, the realisation in the solution space is shown Ø The variant view shows different variant realisations (variant s) in parallel Feature Feature System System FeatureB Address Address Address Slide 25 Slide 26 Context View Property-Changes View Ø The Context View draws the variants with different colors Aspect-separation: each variant forms an aspect Feature System... Feature System Arbitrary Depth Recorded change- set of changing the cardinality of the reflexive associa5on of Group to itself from 1 to many Address Group Other Feature Arbitrary Depth Group Group... Address Address... Slide 27 Slide 28

8 Textual Languages Support (1) Textual Languages Support (2) Ø Unified handling of ling languages and textual languages by lifting textual languages to the ling level with the help of EMFText Ø Aspect-related color markup of the code Ø All >80 languages from the EMFText Syntax Zoo are supported, including Java 5 Ø Slide 29 Slide 30 -based Derivation of Transformations Ø Transformations in the solution space build the product Feature Solu5on s FeatureA D A B E FeatureB FeatureE G F F G E D FeatureD FeatureE FeatureE Variant <<in>> <<in>> Variant FeatureA FeatureB FeatureD <<in>> Derivation Of Transformations <<out>> A B E D 31.3 MULTI-STAGE CONFIGURATION Prof. U. Aßmann Feature-driven SPLE 32 Slide 31

9 FEASIPLE: A Multi-Stage Process Architecture for PLE FEASIPLE: A Multi-Stage Process Architecture for PLE Ø Chose one variant on each level Ø Feature Tree as input for the configuration of the weavings Ø Goal: a staged MDSD-framework for PLE where each stage produces the software artefacts used for the next stage Advantages of FEASIPLE Advantages of FEASIPLE Ø Characteristic feature 1: Ø Variability on each stage Ø Characteristic feature 2: Ø Different ling languages, component systems and composition languages per stage 35 36

10 Advantages of FEASIPLE Advantages of FEASIPLE Ø Characteristic feature 3: Ø Different composition mechanisms per stage Ø Characteristic feature 4: Ø Composition mechanisms are driven by variant selection 37 Multi-Staged Derivation of Transformations Ø How do we compose transformations? Between different stages? 38 TraCo: A Framework for Safe Multi-Stage Composition of Transformations Ø TraCo encapsulates transformations into composable components Arranges them with composition programs of parallel and sequential transformation steps (multi-threaded transformation func)onal Feature VIM Variant Independent Functional variant V1 M1 SA1 T1 M2M Trafos SA2 SA1* context Feature PIM Platform Independent s Platform Independent s PlaLorm Independent s Platform variant V2 M2 T2 T1* M1* V1* M2M Trafos SA3 SA2* pla-orm Feature PSM Platform Specific s Platform Specific s PlaLorm Specific s V1 Feature Selection M1 SA1 Solution Artefact T1 Transformation SAn-1 M2C Generators Context variant Vn Mn Tn PlaLorm Specific Code SAn Folie 39 Folie 40

11 Steps in Multi-Staged Derivation of Transformations Multi-Staged Derivation of Transformations 1. Transformations are represented as composable components 2. Definition and Composition of Transformation Steps A Composition System is needed (course CBSE): Allows for reuse of arbitrary existing transformation techniques 3. Validation of each transformation and composition step Type-checking Invariant- and constraint-checking Correctness of port and parameter binding Static and dynamic analysis 4. Execution of composition program Ø Implemented in our tool TraCo Component, Composition Language, Composition Technique Component instances Component Adapter references Actual Transformation Code Connectors Constant value Slide 41 Slide 42 Composition Programs can be Configured (Metacomposition) Loading Functional Variability Add EJB Semantics Platform Variability Domain Load Domain VIM to VSM Domain to UML Attributes to Properties UML to Java Anything you can do, I do meta (Charles Simonyi) Ø The composition program shown in the last slide can be subject to transformation and composition Load Actions VIM to VSM Actions to SimpleImpl UML UML to Java Actions to SimpleDelegateUML UML to Java Ø If we build a product line with TraCo, platform variability can be realised by different transformation steps Actions Actions to EJB UML Add EJB Persistence Semantics UML to Java Ø A TraCo composition program can be used with FeatureMapper Multi-Staged transformation steps Even of composition programs Ø More about metacomposition in CBSE course Folie 43 January 2011 Florian Heidenreich - Feature-driven SPLE Folie 44 Application State User Interface Navigation Load ApplicationState Load User Interface Load Navigation VIM to VSM VIM to VSM VIM to VSM Actions to EJB Delegate UML ApplicationState to UML Ensure Control IDs Add Local Memory Semantics Attributes to Properties SWT User Interface JSP User Interface Navigation to Java Navigation to JSP Presentation SWT JSP UML to Java UML to Java Business Logic Java EJB Persistence In-Memory EJB Persistence Mixed EJB + In-Memory EJB + EJB Persistence

12 The final frontier: Ensuring Well-formedness of SPLs Ø Motivation: Make sure that well-formedness of all participating s is ensured Feature Solution s Ø Well-formedness rules are described using OCL Case Studies with FeatureMapper, TraCo, and FEASIPLE Ø Simple Contact Management Application Software Product Line FeatureMapper used to map features to UML2 elements Both static and dynamic ling Ø Simple Time Sheet Application Software Product Line FeatureMapper used to tailor ISC composition programs ISC used as a universal variability mechanism in SPLE Meta Transformation Ø Constraints are enforced during mapping time The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Ø SalesScenario Software Product Line FeatureMapper used to tailor s expressed in Ecore-based DSLs was developed in project feasiple ( Ø TAOSD AOM Crisis Management System Slide 45 Slide 46 Summary The End Ø Configuration of product lines with mapping of feature s to solution spaces Ø of Features to s in Ecore-based languages using FeatureMapper Ø Visualisations of those mappings using Views Realisation View Variant View Context View Property-Changes View Ø Derivation of solution s based on variant selection and mapping Ø Multi-Staged derivation using TraCo Ø Ensuring well-formedness of SPLs Slide 47 48

30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA)

30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA) Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.

More information

Aspect Decomposition: Model-Driven Architecture (MDA) 30 Transformational Design with Essential. References. Ø Optional: Ø Obligatory:

Aspect Decomposition: Model-Driven Architecture (MDA) 30 Transformational Design with Essential. References. Ø Optional: Ø Obligatory: Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.

More information

30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA)

30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA) Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.

More information

Graph Structurings. 16. How to Structure Large Models - Obligatory Reading. Ø T. Fischer, Jörg Niere, L. Torunski, and Albert Zündorf, 'Story

Graph Structurings. 16. How to Structure Large Models - Obligatory Reading. Ø T. Fischer, Jörg Niere, L. Torunski, and Albert Zündorf, 'Story Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 16. How to Structure Large Models - Graph Structurings Prof. Dr. U. Aßmann Technische Universität Dresden

More information

16. How to Structure Large Models and Programs with Graph Structurings

16. How to Structure Large Models and Programs with Graph Structurings Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 16. How to Structure Large Models and Programs with Graph Structurings Prof. Dr. U. Aßmann Technische

More information

Lecture 8: Verification and Validation

Lecture 8: Verification and Validation Thanks to Prof. Steve Easterbrook University of Toronto What are goals of V&V Validation Techniques Ø Inspection Ø Model Checking Ø Prototyping Verification Techniques Ø Consistency Checking Lecture 8:

More information

51. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems

51. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems 51. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems Prof. Dr. Uwe Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnik http://st.inf.tu-dresden.de

More information

47. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems

47. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems 47. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems 1. CBSE for Embedded Systems 2. SPEEDS Heterogeneous Rich Components 3. Contract specification language CSL

More information

Plan For the Week. Solve problems by programming in Python. Compsci 101 Way-of-life. Vocabulary and Concepts

Plan For the Week. Solve problems by programming in Python. Compsci 101 Way-of-life. Vocabulary and Concepts Plan For the Week Solve problems by programming in Python Ø Like to do "real-world" problems, but we're very new to the language Ø Learn the syntax and semantics of simple Python programs Compsci 101 Way-of-life

More information

DevOps Course Content

DevOps Course Content INTRODUCTION TO DEVOPS DevOps Course Content Ø What is DevOps? Ø History of DevOps Ø Different Teams Involved Ø DevOps definitions Ø DevOps and Software Development Life Cycle o Waterfall Model o Agile

More information

Arguments and Artifacts for Dispute Resolution

Arguments and Artifacts for Dispute Resolution Arguments and Artifacts for Dispute Resolution Enrico Oliva Mirko Viroli Andrea Omicini ALMA MATER STUDIORUM Università di Bologna, Cesena, Italy WOA 2008 Palermo, Italy, 18th November 2008 Outline 1 Motivation/Background

More information

Goal. Security Risk-Oriented BPMN

Goal. Security Risk-Oriented BPMN Fundamentals of Secure System Modelling Springer, 2017 Chapter 5: Security Risk-Oriented BPMN Raimundas Matulevičius University of Tartu, Estonia, rma@ut.ee Goal Explain how security risks are managed

More information

IBM Cognos Open Mic Cognos Analytics 11 Part nd June, IBM Corporation

IBM Cognos Open Mic Cognos Analytics 11 Part nd June, IBM Corporation IBM Cognos Open Mic Cognos Analytics 11 Part 2 22 nd June, 2016 IBM Cognos Open MIC Team Deepak Giri Presenter Subhash Kothari Technical Panel Member Chakravarthi Mannava Technical Panel Member 2 Agenda

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL 23 July 2008 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE COMMITTEE ON TRADE Centre for Trade Facilitation and Electronic Business Fourteenth

More information

Coverage tools Eclipse Debugger Object-oriented Design Principles. Oct 26, 2016 Sprenkle - CSCI209 1

Coverage tools Eclipse Debugger Object-oriented Design Principles. Oct 26, 2016 Sprenkle - CSCI209 1 Objec&ves Coverage tools Eclipse Debugger Object-oriented Design Principles Ø Design in the Small Ø DRY Ø Single responsibility principle Ø Shy Ø Open-closed principle Oct 26, 2016 Sprenkle - CSCI209 1

More information

USDL Variant Management. Dr. Daniel Oberle, Senior Researcher, SAP Research Karlsruhe Gunther Stuhec, Standards Architect, SAP AG Walldorf

USDL Variant Management. Dr. Daniel Oberle, Senior Researcher, SAP Research Karlsruhe Gunther Stuhec, Standards Architect, SAP AG Walldorf USDL Variant Management Dr. Daniel Oberle, Senior Researcher, SAP Research Karlsruhe Gunther Stuhec, Standards Architect, SAP AG Walldorf Agenda 1. Problem 2. Solution 1. Grammar : UN/CEFACT Core Component

More information

Chapter 8: Recursion

Chapter 8: Recursion Chapter 8: Recursion Presentation slides for Java Software Solutions for AP* Computer Science 3rd Edition by John Lewis, William Loftus, and Cara Cocking Java Software Solutions is published by Addison-Wesley

More information

First International Workshop on UN/CEFACT Modeling Methodology. UML and other OMG technologies in a standardization environment

First International Workshop on UN/CEFACT Modeling Methodology. UML and other OMG technologies in a standardization environment First International Workshop on UN/CEFACT Modeling Methodology - Technical Track UML and other OMG technologies in a standardization environment 9 March in Stockholm, Sweden Introduction UN/CEFACT develops

More information

Institution Aware Conceptual Modelling

Institution Aware Conceptual Modelling Institution Aware Conceptual Modelling Paul Johannesson 1, Maria Bergholtz 1, and Owen Eriksson 2 1 Department of Computer and Systems Sciences, Stockholm University, Postbox 7003, SE 164 07 Kista, Sweden

More information

Working with Government on Animal Welfare Legislation

Working with Government on Animal Welfare Legislation Working with Government on Animal Welfare Legislation Presented by Sita Kuruvilla Executive Member, Animal Welfare Network (AWN) President, T&TSPCA Trinidad & Tobago, WI Caribbean Animal Welfare Conference

More information

Cadac SoundGrid I/O. User Guide

Cadac SoundGrid I/O. User Guide Cadac SoundGrid I/O User Guide 1 TABLE OF CONTENTS 1. Introduction... 3 1.1 About SoundGrid and the Cadac SoundGrid I/O... 3 1.2 Typical Uses... 4 1.3 Native/SoundGrid Comparison Table... 6 2. Hardware

More information

CS 5523 Operating Systems: Intro to Distributed Systems

CS 5523 Operating Systems: Intro to Distributed Systems CS 5523 Operating Systems: Intro to Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu, Dr. Palden Lama for providing their slides. Outline Different Distributed Systems Ø Distributed

More information

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic

More information

Lecture 6 Cryptographic Hash Functions

Lecture 6 Cryptographic Hash Functions Lecture 6 Cryptographic Hash Functions 1 Purpose Ø CHF one of the most important tools in modern cryptography and security Ø In crypto, CHF instantiates a Random Oracle paradigm Ø In security, used in

More information

Uses and Challenges. Care. Health C. ents in H. ive Age. Normati. Javier Vazquez-Salceda Utrecht University.

Uses and Challenges. Care. Health C. ents in H. ive Age. Normati. Javier Vazquez-Salceda Utrecht University. ve Agealth : Uses and Challenges Javier Vazquez-Salceda Utrecht University it http://www.cs.uu.nl/people/javier lk Invited tal Motivation ealth Motivation o (I) New environment for Health services Need

More information

Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation

Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation Tyler McDaniel Ming Wong Mentors: Ed D Azevedo, Ying Wai Li, Kwai Wong Quantum Monte Carlo Simulation Slater Determinant for N-electrons

More information

Functional Requirements for a Secure Electronic Voting System

Functional Requirements for a Secure Electronic Voting System Functional Requirements for a Secure Electronic Voting System Spyros IKONOMOPOULOS 1, Costas LAMBRINOUDAKIS 1, Dimitris GRITZALIS 2, Spyros KOKOLAKIS 1, Kostas VASSILIOU 1 1 Dept. of Information and Communication

More information

Final Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems

Final Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems Final Review Chenyang Lu CSE 467S Embedded Compu5ng Systems OS: Basic Func2ons Ø OS controls resources: q who gets the CPU; q when I/O takes place; q how much memory is allocated; q power management. Ø

More information

Programming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna

Programming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna Programming with Android: SDK install and initial setup Luca Bedogni Marco Di Felice Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna SDK and initial setup: Outline Ø Today: How

More information

Smart Voting System using UIDAI

Smart Voting System using UIDAI IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student

More information

Approaching a Formal Definition of Fairness in Electronic Commerce. Felix Gärtner Henning Pagnia Holger Vogt

Approaching a Formal Definition of Fairness in Electronic Commerce. Felix Gärtner Henning Pagnia Holger Vogt 1 Approaching a Formal Definition of Fairness in Electronic Commerce Felix Gärtner Henning Pagnia Holger Vogt Darmstadt University of Technology, Germany 2 Overview What is fair exchange and how does it

More information

Event Based Sequential Program Development: Application to Constructing a Pointer Program

Event Based Sequential Program Development: Application to Constructing a Pointer Program Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach

More information

Aadhaar Based Voting System Using Android Application

Aadhaar Based Voting System Using Android Application Aadhaar Based Voting System Using Android Application Sreerag M 1, Subash R 1, Vishnu C Babu 1, Sonia Mathew 1, Reni K Cherian 2 1 Students, Department of Computer Science, Saintgits College of Engineering,

More information

Introduction to VI-HPS

Introduction to VI-HPS Introduction to VI-HPS Brian Wylie Jülich Supercomputing Centre Virtual Institute High Productivity Supercomputing Goal: Improve the quality and accelerate the development process of complex simulation

More information

Comparing and Contrasting Workshop

Comparing and Contrasting Workshop Contents Learning Goals and Overview Lesson Plan Handout 1: Brainstorming Strategy (Venn Diagram) Handout 2: Nike Men s Ad Handout 3: Nike Women s Ad Handout 4: Strategies for Significance Handout 5: Dove

More information

Operating Systems. Chenyang Lu

Operating Systems. Chenyang Lu Operating Systems Chenyang Lu Example: Linux Ø A Brief History: https://youtu.be/aurdhyl7bta Chenyang Lu 2 Android Source: h*p:// en.wikipedia.org/wiki/ File:Android-System- Architecture.svg Chenyang Lu

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

School of Management and Economics

School of Management and Economics School of Management and Economics Simulation Models for Economics Migration in Europe (Simulation in NetLogo 5.0.5.) Students: Lilian Brodesco Nadezhda Krasavina Vitalii Podoleanu Instructor: Prof. Pietro

More information

File Systems: Fundamentals

File Systems: Fundamentals File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,

More information

A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset

A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset Sisi Xiong*, Feiyi Wang + and Qing Cao* *University of Tennessee Knoxville, Knoxville, TN, USA + Oak Ridge National Laboratory,

More information

Philips Lifeline. Ø Chenyang Lu 1

Philips Lifeline. Ø  Chenyang Lu 1 Philips Lifeline Ø http://www.lifelinesys.com/content/lifeline-products/auto-alert Chenyang Lu 1 Smartphone for Medicine Ø http://video.msnbc.msn.com/rock-center/50582822 2 Proposal Presenta5on Ø 2/12,

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL ECE/TRADE/C/CEFACT/2008/11 23 July 2008 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE COMMITTEE ON TRADE Centre for Trade Facilitation and

More information

LOCAL epolitics REPUTATION CASE STUDY

LOCAL epolitics REPUTATION CASE STUDY LOCAL epolitics REPUTATION CASE STUDY Jean-Marc.Seigneur@reputaction.com University of Geneva 7 route de Drize, Carouge, CH1227, Switzerland ABSTRACT More and more people rely on Web information and with

More information

20 Design Methods - An Overview

20 Design Methods - An Overview Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 20 Design Methods - An Overview Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software-

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL ECE/TRADE/C/2007/3 11 September 2007 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE COMMITTEE ON TRADE Second session Geneva, 22-25 October

More information

Creating and Managing Clauses. Selectica, Inc. Selectica Contract Performance Management System

Creating and Managing Clauses. Selectica, Inc. Selectica Contract Performance Management System Selectica, Inc. Selectica Contract Performance Management System Copyright 2006 Selectica, Inc. Copyright 2007 Selectica, Inc. 1740 Technology Drive, Suite 450 San Jose, CA 95110 http://www.selectica.com

More information

Law And Order Automation

Law And Order Automation Law And Order Automation Guided By Anindita Mukherjee Swagata Ray, Upasana Maity, Puja Talukder, Priyanka De Dream Institute Of Technology Computer Science and Engineering Department West Bengal University

More information

Ersin Özsahin. The International Constraints on Regime Changes

Ersin Özsahin. The International Constraints on Regime Changes Ersin Özsahin The International Constraints on Regime Changes Ersin Özsahin The International Constraints on Regime Changes How Globalization Hinders the Prospects for Democratization Bibliographic information

More information

The optical memory card is a Write Once media, a written area cannot be overwritten. Information stored on an optical memory card is non-volatile.

The optical memory card is a Write Once media, a written area cannot be overwritten. Information stored on an optical memory card is non-volatile. T10/99-128r0 Subject: Comments on the Committee Draft 14776-381 -Small Computer System Interface -Part 381: Optical Memory Card Device Commands (SCSI OMC). 99-107R0 on T10 site. I have a number of comments

More information

Procedures for the Use of Optical Scan Vote Tabulators

Procedures for the Use of Optical Scan Vote Tabulators Procedures for the Use of Optical Scan Vote Tabulators (Revised December 4, 2017) CONTENTS Purpose... 2 Application. 2 Exceptions. 2 Authority. 2 Definitions.. 3 Designations.. 4 Election Materials. 4

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

The Buddy System. A Distributed Reputation System Based On Social Structure 1

The Buddy System. A Distributed Reputation System Based On Social Structure 1 The Buddy System A Distributed Reputation System Based On Social Structure 1 Stefan Fähnrich, Philipp Obreiter, Birgitta König-Ries Institute for Program Structures and Data Organization Universität Karlsruhe

More information

UN/CEFACT Update Report

UN/CEFACT Update Report In This Issue 2007 Plenary session 10 th UN/CEFACT Forum, Dublin The UN/CEFACT Forum made simple News to use Topics for Intersessional Actions Future events Publications Communications with HoDs Recent

More information

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Edwin Brady eb@cs.st-andrews.ac.uk University of St Andrews EE-PigWeek, January 7th 2010 EE-PigWeek, January 7th 2010

More information

Performance & Energy

Performance & Energy 1 Performance & Energy Optimization @ Md Abdullah Shahneous Bari Abid M. Malik Millad Ghane Ahmad Qawasmeh Barbara M. Chapman 11/28/15 2 Layout of the talk Ø Overview Ø Motivation Ø Factors that affect

More information

1-1. Copyright 2015 Pearson Education, Inc.

1-1. Copyright 2015 Pearson Education, Inc. 1-1 Chapter 1: What Is Organiza3onal Behavior? 1-2 Learning Objectives A:er studying this chapter, you should be able to: Ø Demonstrate the importance of interpersonal skills in the workplace. Ø Describe

More information

Swiss E-Voting Workshop 2010

Swiss E-Voting Workshop 2010 Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability

More information

POLÍCIA JUDICIÁRIA. ASSEMBLEIA DA REPUBLICA T.N. Act no. 73/2009 of 12 August 2009

POLÍCIA JUDICIÁRIA. ASSEMBLEIA DA REPUBLICA T.N. Act no. 73/2009 of 12 August 2009 ASSEMBLEIA DA REPUBLICA T.N. Act no. 73/2009 of 12 August 2009 establishes the conditions and procedures that shall apply to ensure interoperability between information systems of criminal police bodies.

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Extensional Equality in Intensional Type Theory

Extensional Equality in Intensional Type Theory Extensional Equality in Intensional Type Theory Thorsten Altenkirch Department of Informatics University of Munich Oettingenstr. 67, 80538 München, Germany, alti@informatik.uni-muenchen.de Abstract We

More information

Delegation of Obligations. Andreas Schaad & Jonathan Moffett Department of Computer Science University of York, UK

Delegation of Obligations. Andreas Schaad & Jonathan Moffett Department of Computer Science University of York, UK Delegation of Obligations Andreas Schaad & Jonathan Moffett Department of Computer Science University of York, UK 1 Outline of Talk Introduction and Motivation The Alloy Specification Language Organisational

More information

New features in Oracle 11g for PL/SQL code tuning.

New features in Oracle 11g for PL/SQL code tuning. New features in Oracle 11g for PL/SQL code tuning. 1-1 - Speakers Nikunj Gadoya Nikunj is working in Blink Consul4ng as Technical Consultant for more than 2 years now. He did his engineering in computer

More information

Probabilistic Latent Semantic Analysis Hofmann (1999)

Probabilistic Latent Semantic Analysis Hofmann (1999) Probabilistic Latent Semantic Analysis Hofmann (1999) Presenter: Mercè Vintró Ricart February 8, 2016 Outline Background Topic models: What are they? Why do we use them? Latent Semantic Analysis (LSA)

More information

Assumption of TOBT Responsibility and Usage Agreement HAM CSA

Assumption of TOBT Responsibility and Usage Agreement HAM CSA Assumption of TOBT Responsibility and Usage Agreement HAM CSA (Airport CDM Common Situational Awareness Tool) Please mark with a cross as appropriate! We wish to agree the assumption of TOBT responsibility

More information

Installation Instructions HM2085-PLM Strain Gage Input Module

Installation Instructions HM2085-PLM Strain Gage Input Module Helm Instrument Company, Inc. 361 West Dussel Drive Maumee, Ohio 43537 USA Phone: 419-893-4356 Fax: 419-893-1371 www.helminstrument.com Installation Instructions HM2085-PLM Strain Gage Input Module October,

More information

Computational Architecture. The Social Organization of Distributed Cognition. A foundational metaphor. Two Physical Symbol Systems?

Computational Architecture. The Social Organization of Distributed Cognition. A foundational metaphor. Two Physical Symbol Systems? The Social Organization of Distributed Cognition How social arrangements affect the cognitive properties of groups (which can be different from the cognitive properties of the individuals in the group).

More information

Global Conditions (applies to all components):

Global Conditions (applies to all components): Conditions for Use ES&S The Testing Board would also recommend the following conditions for use of the voting system. These conditions are required to be in place should the Secretary approve for certification

More information

Examination of CII and Business Methods Applications

Examination of CII and Business Methods Applications Joint Cluster Computers of and Business Methods Applications Die Dienststelle Wien WWW2006 Edinburgh Dr. Clara Neppel Examiner EPO, München Joint Cluster Computers Das Europäische Patentamt The European

More information

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Midterm Review. EECS 2011 Prof. J. Elder - 1 - Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues

More information

Jussi T. Lindgren, PhD Lead Engineer Inria

Jussi T. Lindgren, PhD Lead Engineer Inria Jussi T. Lindgren, PhD jussi.lindgren@inria.fr Lead Engineer Hybrid @ Inria Jozef Legeny, M. Eng jozef.legeny@mensiatech.com Lead Architect Mensia Technologies JL & JL - POSS 2016 - OpenViBE 2 Tapping

More information

Document and Author Promotion Strategies in the Secure Wiki Model

Document and Author Promotion Strategies in the Secure Wiki Model Document and Author Promotion Strategies in the Secure Wiki Model Kasper Lindberg and Christian Damsgaard Jensen Department of Informatics and Mathematical Modelling Technical University of Denmark Christian.Jensen@imm.dtu.dk

More information

Users reading habits in online news portals

Users reading habits in online news portals Esiyok, C., Kille, B., Jain, B.-J., Hopfgartner, F., & Albayrak, S. Users reading habits in online news portals Conference paper Accepted manuscript (Postprint) This version is available at https://doi.org/10.14279/depositonce-7168

More information

Drafting Legislation Using XML in the U.S. House of Representatives

Drafting Legislation Using XML in the U.S. House of Representatives 1 Drafting Legislation Using XML in the U.S. House of Representatives Kirsten Gullickson, Senior Systems Analyst House of Representatives of the United States of America For more information: http://xml.house.gov

More information

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Peter J. Stuckey NICTA Victoria Laboratory Department of Computer Science and Software Engineering The University

More information

Software License Agreement for Beckhoff Software Products

Software License Agreement for Beckhoff Software Products 1 Scope of this Agreement (1) Licensor has agreed with Licensee to grant Licensee a license to use and exploit the software set out in the License Certificate ("Licensed Software") subject to the terms

More information

Software Agents Behaviour.

Software Agents Behaviour. From Human Regulations to einstitutions From Human Regulations to Regulated Software Agents Behaviour. (einstitutions: the KEMLG@UPC and IS@Utrecht view) Javier Vázquez-Salceda May 20, 2005 http://www.lsi.upc.es/~webia/kemlg

More information

Public policy Analysis. Prof S.M Omodia and Mr Ozekhome Igechi LECTURE 1. Objectives

Public policy Analysis. Prof S.M Omodia and Mr Ozekhome Igechi LECTURE 1. Objectives Public policy Analysis Prof S.M Omodia and Mr Ozekhome Igechi LECTURE 1 Objectives 1. To conceptualize public policy 2. To know the features of public policy What is public policy? Public policy refers

More information

INTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT TEMPLATE INTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT

INTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT TEMPLATE INTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT INTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT TEMPLATE In the International Software Distribution Agreement, the owner of a Software program (the Licensor) exclusively grants the software exploitation

More information

Estonian National Electoral Committee. E-Voting System. General Overview

Estonian National Electoral Committee. E-Voting System. General Overview Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.

More information

Amendment to the Infinite Campus END USER LICENSE AGREEMENT

Amendment to the Infinite Campus END USER LICENSE AGREEMENT Amendment to the Infinite Campus END USER LICENSE AGREEMENT This Amendment to the Infinite Campus End User License Agreement (the Amendment ), is made between Infinite Campus, Inc. a Minnesota corporation

More information

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) B.Y. Choueiry 1 Instructor s notes #5 Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/~choueiry/f17-476-876

More information

Cyber-Physical Systems Scheduling

Cyber-Physical Systems Scheduling Cyber-Physical Systems Scheduling ICEN 553/453 Fall 2018 Prof. Dola Saha 1 Quick Recap 1. What characterizes the memory architecture of a system? 2. What are the issues with heaps in embedded/real-time

More information

Lab 11: Pair Programming. Review: Pair Programming Roles

Lab 11: Pair Programming. Review: Pair Programming Roles Lab 11: Pair Programming Apr 2, 2019 Sprenkle - CSCI111 1 Review: Pair Programming Roles Driver (Like the role I play when we write programs in class) Uses keyboard and mouse to execute all actions on

More information

Getting strategic: vertically integrated approaches

Getting strategic: vertically integrated approaches JUNE 2016 MANILA LEARNING EVENT BACKGROUND NOTES 1 Getting strategic: vertically integrated approaches JOY ACERON AND FRANCIS ISAAC Authors Joy Aceron is Senior Knowledge Leader at the Ateneo School of

More information

MPI Forum Procedures Version 3.0. The MPI Forum

MPI Forum Procedures Version 3.0. The MPI Forum MPI Forum Procedures Version 3.0 The MPI Forum Effective: December 6th, 2017 Copyright 2013-2017 by the authors. Licensed under a Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0/

More information

The European Patent Office

The European Patent Office Joint Cluster Computers European Patent Office Das Europäische Patentamt The European Service For Industry and Public Joint Cluster Computers European Patent Office CII examination practice in Europe and

More information

ETSI TS V ( )

ETSI TS V ( ) TS 128 526 V14.1.0 (2018-04) TECHNICAL SPECIFICATION LTE; Telecommunication management; Life Cycle Management (LCM) for mobile networks that include virtualized network functions; Procedures (3GPP TS 28.526

More information

ForeScout Extended Module for McAfee epolicy Orchestrator

ForeScout Extended Module for McAfee epolicy Orchestrator ForeScout Extended Module for McAfee epolicy Orchestrator Version 3.1 Table of Contents About McAfee epolicy Orchestrator (epo) Integration... 4 Use Cases... 4 Additional McAfee epo Documentation... 4

More information

Regulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations]

Regulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations] The Regulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations] ( Ordnung für die digitale Informationsverarbeitung und Kommunikation

More information

Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems

Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Shengxiang Yang Department of Computer Science, University of Leicester University Road, Leicester LE1 7RH, United Kingdom

More information

Design of Below-the-Hook Lifting Devices

Design of Below-the-Hook Lifting Devices ASME BTH-1 2011 (Revision of ASME BTH-1 2008) Design of Below-the-Hook Lifting Devices AN AMERICAN NATIONAL STANDARD ASME BTH-1 2011 (Revision of ASME BTH-1 2008) Design of Below-the-Hook Lifting Devices

More information

One View Watchlists Implementation Guide Release 9.2

One View Watchlists Implementation Guide Release 9.2 [1]JD Edwards EnterpriseOne Applications One View Watchlists Implementation Guide Release 9.2 E63996-03 April 2017 Describes One View Watchlists and discusses how to add and modify One View Watchlists.

More information

FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF

FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF VOTE-TRAKKER EVC308-SPR-FF is a patent-pending full-face touch-screen option of the error-free standard VOTE-TRAKKER EVC308-SPR system. It

More information

Constraint satisfaction problems. Lirong Xia

Constraint satisfaction problems. Lirong Xia Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions

More information

Andreas Fring. Basic Operations

Andreas Fring. Basic Operations Basic Operations Creating a workbook: The first action should always be to give your workbook a name and save it on your computer. Go for this to the menu bar and select by left mouse click (LC): Ø File

More information

List of terminology and concepts

List of terminology and concepts [CR01] List of terminology and concepts Summary ID Initiative Short description Owner Contact Type Sub-Type Context Base Registry type Operating model IPR Status Aggregated business need Functionalities

More information

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 - Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap

More information

Refinement in Requirements Specification and Analysis: a Case Study

Refinement in Requirements Specification and Analysis: a Case Study Refinement in Requirements Specification and Analysis: a Case Study Edwin de Jong Hollandse Signaalapparaten P.O. Box 42 7550 GD Hengelo The Netherlands edejong@signaal.nl Jaco van de Pol CWI P.O. Box

More information

Cluster Analysis. (see also: Segmentation)

Cluster Analysis. (see also: Segmentation) Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar

More information