31) Feature Models and MDA for Product Lines
|
|
- Jemima Chandler
- 5 years ago
- Views:
Transcription
1 Obligatory Literature Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie Ø Florian Heidenreich, Jan Kopcsek, and Christian Wende. FeatureMapper: Features to s. In Companion Proceedings of the 30th International Conference on Software Engineering (ICSE'08), Leipzig, Germany, May s.pdf 31) Feature s and MDA for Product Lines 1. Feature s 2. Product Linie Configuration with Feature s 3. Multi-Stage Configuration Ø Prof. Dr. U. Aßmann Ø Florian Heidenreich Ø Technische Universität Dresden Ø Institut für Software- und Multimediatechnik Ø Gruppe Softwaretechnologie Ø Ø Version , January 23, 2013 References 2 Object-Oriented Analysis vs Object-Oriented Design Ø [Aßm03] U. Aßmann. Invasive Software Composition. Springer, Ø Ø [Cza05] K. Czarnecki and M. Antkiewicz. Features to s: A Template Approach Based on Superimposed Variants. In R. Glück and M. Lowry, editors, Proceedings of the 4th International Conference on Generative Programming and Component Engineering (GPCE'05), volume 3676 of LNCS, pages Springer, [Cza06] K. Czarnecki and K. Pietroszek. Verifying Feature-Based Templates Against Well-Formedness OCL Constraints. In Proceedings of the 5th International Conference on Generative Programming and Component Engineering (GPCE'06), pages , New York, NY, USA, ACM. textual requirements (stories) requirements specification context analysis Ø Ø Ø [Hei08a] F. Heidenreich, J. Kopcsek, and C. Wende. FeatureMapper: Features to s. In Companion Proceedings of the 30th International Conference on Software Engineering (ICSE'08), pages , New York, NY, USA, May ACM. [Hei08b] Florian Heidenreich, Ilie Şavga and Christian Wende. On Controlled Visualisations in Software Product Line Engineering. In Proc. of the 2nd Int l Workshop on Visualisation in Software Product Line Engineering (ViSPLE 2008), collocated with the 12th Int l Software Product Line Conference (SPLC 2008), Limerick, Ireland, September [Hei09] Florian Heidenreich. Towards Systematic Ensuring Well-Formedness of Software Product Lines. In Proceedings of the 1st Workshop on Feature- Oriented Software Development (FOSD 2009) collocated with MODELS/GPCE/ SLE Denver, Colorado, USA, October ACM Press use cases analysis domain architectural design detailed design Slide 3 4
2 Extended to -Driven Architecture (MDA) Product Lines (Product Families) Ø Horizontal product line: one product idea in several markets textual requirements (stories) use cases requirements specification context analysis (CIM) analysis domain Platform independent Platform-1 specific Platform-(1,.., n) specific Feature textual requirements (stories) (varability Product 1 use cases requirements specification context ) domain analysis Product 2 Product n 5 Adding Extensions to Abstract s in the MDA 6 Configuration of Variabilities in Vertical Product Lines (MDA for Vertical Product Lines) Ø In the following, we extend the MDA (below) with configuration Vertical product line: several products in one or several markets The VIM (variant independent ) is the common of the product family Domain Platform independent (PIM) Platform-1-specific extension (PSE) weaving Configuration With Feature Variants Product Variants Design Variants Analysis Product Line (Framework, VIM) Platform-1 specific (PIM) Platform-2 specific extension (PSE) weaving weaving Configuration With Feature Variants PSM Variants Extensions Product PIM weaving Platform-(1+2) specific (PSM) 7 Product Product PSM PSM Product PSM 8
3 Feature s for Product configuration Ø Feature s are used to express variability in Product Lines Ø alternative, Ø mandatory, Ø optional features, and Ø their relations OR XOR 31.1 PRODUCT LINES WITH FEATURE TREES AND FEATURE MODELS Ø A variant represents a concrete product (variant) from the product line Ø The variant results from a selection of a subgraph of the feature Ø The variant can be used to parameterize and drive the product instantiation process Prof. U. Aßmann Feature-driven SPLE 9 10 Feature s Example Ø The Feature Tree Notation is derived from And-Or-Trees Group of AND Features Ø A1 or A2 or A3 Ø B1; B2 xor B3 Ø B4; optional B5 Ø B1; B7 Group of Alternative (XOR) Features Mandatory Feature Optional Feature Group of OR Features A1 A2 A3 FeatureA FeatureB FeatureD B1 B2 B3 B4 B5 B6 B7 PhD Thesis, Czarnecki (1998) based on FODA-Notation by Kang et al. (1990) 11 12
4 Ø [K. Lehmann-Siegemund, Diplomarbeit] Ein Featurel for Computer-Aided cognitive Rehabilitation Features to Fragments ( Snippets) Ø Bridging the gap between configuration and solution space FM K J E S CE CU NO NM... ge gz IS IT T A IS IT ge gz T A ge gz IS IT T A ge gz IS IT T A [1-2] [1-2] [1-2] [1-2] A/K Ø Need for mapping of features from feature s to artefacts of the solution space Ø Possible artefacts Ø s defined in DSLs Ø fragments (snippets) Ø Architectural artefacts (components, connectors, aspects) Ø Source code Ø Files K J E S CE CU NO NM... Ø But how can we achieve the mapping...? [c1] ge T A IS IT IS IT [c1] T A [c1] ge gz IS IT T A [1-2] [1-2] [1-2] [1-2] [c1] IS IT T A Ex: Plugins have Features (in Eclipse) 15 Prof. U. Aßmann 31.2 PRODUCT-LINE CONFIGURATION WITH FEATURE MODELS Feature-driven SPLE 16
5 Different Approaches of Variant Selection Additive approach Ø Map all features to fragments ( snippets) Ø Compose them with a core based on the presence of the feature in the variant Different Approaches of Variant Selection (2) Subtractive approach Ø all features in one Ø Remove elements based on absence of the feature in the variant Ø Pros: Ø conflicting variants can be led correctly Ø strong per-feature decomposition Ø Cons: Ø traceability problems Ø increased overhead in linking the different fragments Ø Pros: Ø no need for redundant links between artifacts Ø short cognitive distance Ø Cons: Ø conflicting variants can't be led correctly Ø huge and inconcise s 17 The Problem between Features and Solution Elements 18 Features to s Ø FeatureMapper - a tool for mapping of feature s to ling artefacts developed at the ST Group Ø Screencast and paper available at Problem Space FeatureA Creation Solu5on Space A B Ø Advantages: Ø Explicit representation of mappings Ø Configuration of large product lines from selection of variants in feature trees Ø Customers understand Ø Consistency of each product in the line is simple to check Ø and code snippets can be traced to requirements Visualisation FeatureB FeatureD FeatureE Validation Derivation F G E D Slide 19 20
6 FeatureMapper Features to s Ø We chose an explicit Representation in our tool FeatureMapper Ø s are stored in a mapping that is based on a mapping meta Feature Solu5on s FeatureA D A B E FeatureB FeatureD FeatureE FeatureE FeatureE G F F G E D Prof. U. Aßmann Slide 21 Feature-driven SPLE Slide 22 From Feature s to Transformations Visualisation of s (1) Ø Visualisations play a crucial role in Software Engineering It s hard to impossible to understand a complex system unless you look at it from different points of view Ø In many cases, developers are interested only in a particular aspect of the connection between a feature and realising artefacts How a particular feature is realised? Which features communicate or interact in their realisation? Which artefacts may be effectively used in a variant? Ø Solution of the FeatureMapper: Views, a visualisation technique that provides four basic visualisations Realisation View Variant View Context View Property-Changes View 23 Slide 24
7 Realisation View Variant View Ø For one Variant, the realisation in the solution space is shown Ø The variant view shows different variant realisations (variant s) in parallel Feature Feature System System FeatureB Address Address Address Slide 25 Slide 26 Context View Property-Changes View Ø The Context View draws the variants with different colors Aspect-separation: each variant forms an aspect Feature System... Feature System Arbitrary Depth Recorded change- set of changing the cardinality of the reflexive associa5on of Group to itself from 1 to many Address Group Other Feature Arbitrary Depth Group Group... Address Address... Slide 27 Slide 28
8 Textual Languages Support (1) Textual Languages Support (2) Ø Unified handling of ling languages and textual languages by lifting textual languages to the ling level with the help of EMFText Ø Aspect-related color markup of the code Ø All >80 languages from the EMFText Syntax Zoo are supported, including Java 5 Ø Slide 29 Slide 30 -based Derivation of Transformations Ø Transformations in the solution space build the product Feature Solu5on s FeatureA D A B E FeatureB FeatureE G F F G E D FeatureD FeatureE FeatureE Variant <<in>> <<in>> Variant FeatureA FeatureB FeatureD <<in>> Derivation Of Transformations <<out>> A B E D 31.3 MULTI-STAGE CONFIGURATION Prof. U. Aßmann Feature-driven SPLE 32 Slide 31
9 FEASIPLE: A Multi-Stage Process Architecture for PLE FEASIPLE: A Multi-Stage Process Architecture for PLE Ø Chose one variant on each level Ø Feature Tree as input for the configuration of the weavings Ø Goal: a staged MDSD-framework for PLE where each stage produces the software artefacts used for the next stage Advantages of FEASIPLE Advantages of FEASIPLE Ø Characteristic feature 1: Ø Variability on each stage Ø Characteristic feature 2: Ø Different ling languages, component systems and composition languages per stage 35 36
10 Advantages of FEASIPLE Advantages of FEASIPLE Ø Characteristic feature 3: Ø Different composition mechanisms per stage Ø Characteristic feature 4: Ø Composition mechanisms are driven by variant selection 37 Multi-Staged Derivation of Transformations Ø How do we compose transformations? Between different stages? 38 TraCo: A Framework for Safe Multi-Stage Composition of Transformations Ø TraCo encapsulates transformations into composable components Arranges them with composition programs of parallel and sequential transformation steps (multi-threaded transformation func)onal Feature VIM Variant Independent Functional variant V1 M1 SA1 T1 M2M Trafos SA2 SA1* context Feature PIM Platform Independent s Platform Independent s PlaLorm Independent s Platform variant V2 M2 T2 T1* M1* V1* M2M Trafos SA3 SA2* pla-orm Feature PSM Platform Specific s Platform Specific s PlaLorm Specific s V1 Feature Selection M1 SA1 Solution Artefact T1 Transformation SAn-1 M2C Generators Context variant Vn Mn Tn PlaLorm Specific Code SAn Folie 39 Folie 40
11 Steps in Multi-Staged Derivation of Transformations Multi-Staged Derivation of Transformations 1. Transformations are represented as composable components 2. Definition and Composition of Transformation Steps A Composition System is needed (course CBSE): Allows for reuse of arbitrary existing transformation techniques 3. Validation of each transformation and composition step Type-checking Invariant- and constraint-checking Correctness of port and parameter binding Static and dynamic analysis 4. Execution of composition program Ø Implemented in our tool TraCo Component, Composition Language, Composition Technique Component instances Component Adapter references Actual Transformation Code Connectors Constant value Slide 41 Slide 42 Composition Programs can be Configured (Metacomposition) Loading Functional Variability Add EJB Semantics Platform Variability Domain Load Domain VIM to VSM Domain to UML Attributes to Properties UML to Java Anything you can do, I do meta (Charles Simonyi) Ø The composition program shown in the last slide can be subject to transformation and composition Load Actions VIM to VSM Actions to SimpleImpl UML UML to Java Actions to SimpleDelegateUML UML to Java Ø If we build a product line with TraCo, platform variability can be realised by different transformation steps Actions Actions to EJB UML Add EJB Persistence Semantics UML to Java Ø A TraCo composition program can be used with FeatureMapper Multi-Staged transformation steps Even of composition programs Ø More about metacomposition in CBSE course Folie 43 January 2011 Florian Heidenreich - Feature-driven SPLE Folie 44 Application State User Interface Navigation Load ApplicationState Load User Interface Load Navigation VIM to VSM VIM to VSM VIM to VSM Actions to EJB Delegate UML ApplicationState to UML Ensure Control IDs Add Local Memory Semantics Attributes to Properties SWT User Interface JSP User Interface Navigation to Java Navigation to JSP Presentation SWT JSP UML to Java UML to Java Business Logic Java EJB Persistence In-Memory EJB Persistence Mixed EJB + In-Memory EJB + EJB Persistence
12 The final frontier: Ensuring Well-formedness of SPLs Ø Motivation: Make sure that well-formedness of all participating s is ensured Feature Solution s Ø Well-formedness rules are described using OCL Case Studies with FeatureMapper, TraCo, and FEASIPLE Ø Simple Contact Management Application Software Product Line FeatureMapper used to map features to UML2 elements Both static and dynamic ling Ø Simple Time Sheet Application Software Product Line FeatureMapper used to tailor ISC composition programs ISC used as a universal variability mechanism in SPLE Meta Transformation Ø Constraints are enforced during mapping time The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Ø SalesScenario Software Product Line FeatureMapper used to tailor s expressed in Ecore-based DSLs was developed in project feasiple ( Ø TAOSD AOM Crisis Management System Slide 45 Slide 46 Summary The End Ø Configuration of product lines with mapping of feature s to solution spaces Ø of Features to s in Ecore-based languages using FeatureMapper Ø Visualisations of those mappings using Views Realisation View Variant View Context View Property-Changes View Ø Derivation of solution s based on variant selection and mapping Ø Multi-Staged derivation using TraCo Ø Ensuring well-formedness of SPLs Slide 47 48
30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA)
Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.
More informationAspect Decomposition: Model-Driven Architecture (MDA) 30 Transformational Design with Essential. References. Ø Optional: Ø Obligatory:
Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.
More information30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA)
Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.
More informationGraph Structurings. 16. How to Structure Large Models - Obligatory Reading. Ø T. Fischer, Jörg Niere, L. Torunski, and Albert Zündorf, 'Story
Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 16. How to Structure Large Models - Graph Structurings Prof. Dr. U. Aßmann Technische Universität Dresden
More information16. How to Structure Large Models and Programs with Graph Structurings
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 16. How to Structure Large Models and Programs with Graph Structurings Prof. Dr. U. Aßmann Technische
More informationLecture 8: Verification and Validation
Thanks to Prof. Steve Easterbrook University of Toronto What are goals of V&V Validation Techniques Ø Inspection Ø Model Checking Ø Prototyping Verification Techniques Ø Consistency Checking Lecture 8:
More information51. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems
51. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems Prof. Dr. Uwe Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnik http://st.inf.tu-dresden.de
More information47. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems
47. Rich Components with A/P-Quality Contracts The Future Component Model for Embedded Systems 1. CBSE for Embedded Systems 2. SPEEDS Heterogeneous Rich Components 3. Contract specification language CSL
More informationPlan For the Week. Solve problems by programming in Python. Compsci 101 Way-of-life. Vocabulary and Concepts
Plan For the Week Solve problems by programming in Python Ø Like to do "real-world" problems, but we're very new to the language Ø Learn the syntax and semantics of simple Python programs Compsci 101 Way-of-life
More informationDevOps Course Content
INTRODUCTION TO DEVOPS DevOps Course Content Ø What is DevOps? Ø History of DevOps Ø Different Teams Involved Ø DevOps definitions Ø DevOps and Software Development Life Cycle o Waterfall Model o Agile
More informationArguments and Artifacts for Dispute Resolution
Arguments and Artifacts for Dispute Resolution Enrico Oliva Mirko Viroli Andrea Omicini ALMA MATER STUDIORUM Università di Bologna, Cesena, Italy WOA 2008 Palermo, Italy, 18th November 2008 Outline 1 Motivation/Background
More informationGoal. Security Risk-Oriented BPMN
Fundamentals of Secure System Modelling Springer, 2017 Chapter 5: Security Risk-Oriented BPMN Raimundas Matulevičius University of Tartu, Estonia, rma@ut.ee Goal Explain how security risks are managed
More informationIBM Cognos Open Mic Cognos Analytics 11 Part nd June, IBM Corporation
IBM Cognos Open Mic Cognos Analytics 11 Part 2 22 nd June, 2016 IBM Cognos Open MIC Team Deepak Giri Presenter Subhash Kothari Technical Panel Member Chakravarthi Mannava Technical Panel Member 2 Agenda
More informationEconomic and Social Council
UNITED NATIONS E Economic and Social Council Distr. GENERAL 23 July 2008 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE COMMITTEE ON TRADE Centre for Trade Facilitation and Electronic Business Fourteenth
More informationCoverage tools Eclipse Debugger Object-oriented Design Principles. Oct 26, 2016 Sprenkle - CSCI209 1
Objec&ves Coverage tools Eclipse Debugger Object-oriented Design Principles Ø Design in the Small Ø DRY Ø Single responsibility principle Ø Shy Ø Open-closed principle Oct 26, 2016 Sprenkle - CSCI209 1
More informationUSDL Variant Management. Dr. Daniel Oberle, Senior Researcher, SAP Research Karlsruhe Gunther Stuhec, Standards Architect, SAP AG Walldorf
USDL Variant Management Dr. Daniel Oberle, Senior Researcher, SAP Research Karlsruhe Gunther Stuhec, Standards Architect, SAP AG Walldorf Agenda 1. Problem 2. Solution 1. Grammar : UN/CEFACT Core Component
More informationChapter 8: Recursion
Chapter 8: Recursion Presentation slides for Java Software Solutions for AP* Computer Science 3rd Edition by John Lewis, William Loftus, and Cara Cocking Java Software Solutions is published by Addison-Wesley
More informationFirst International Workshop on UN/CEFACT Modeling Methodology. UML and other OMG technologies in a standardization environment
First International Workshop on UN/CEFACT Modeling Methodology - Technical Track UML and other OMG technologies in a standardization environment 9 March in Stockholm, Sweden Introduction UN/CEFACT develops
More informationInstitution Aware Conceptual Modelling
Institution Aware Conceptual Modelling Paul Johannesson 1, Maria Bergholtz 1, and Owen Eriksson 2 1 Department of Computer and Systems Sciences, Stockholm University, Postbox 7003, SE 164 07 Kista, Sweden
More informationWorking with Government on Animal Welfare Legislation
Working with Government on Animal Welfare Legislation Presented by Sita Kuruvilla Executive Member, Animal Welfare Network (AWN) President, T&TSPCA Trinidad & Tobago, WI Caribbean Animal Welfare Conference
More informationCadac SoundGrid I/O. User Guide
Cadac SoundGrid I/O User Guide 1 TABLE OF CONTENTS 1. Introduction... 3 1.1 About SoundGrid and the Cadac SoundGrid I/O... 3 1.2 Typical Uses... 4 1.3 Native/SoundGrid Comparison Table... 6 2. Hardware
More informationCS 5523 Operating Systems: Intro to Distributed Systems
CS 5523 Operating Systems: Intro to Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu, Dr. Palden Lama for providing their slides. Outline Different Distributed Systems Ø Distributed
More informationTrusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)
April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic
More informationLecture 6 Cryptographic Hash Functions
Lecture 6 Cryptographic Hash Functions 1 Purpose Ø CHF one of the most important tools in modern cryptography and security Ø In crypto, CHF instantiates a Random Oracle paradigm Ø In security, used in
More informationUses and Challenges. Care. Health C. ents in H. ive Age. Normati. Javier Vazquez-Salceda Utrecht University.
ve Agealth : Uses and Challenges Javier Vazquez-Salceda Utrecht University it http://www.cs.uu.nl/people/javier lk Invited tal Motivation ealth Motivation o (I) New environment for Health services Need
More informationExploring QR Factorization on GPU for Quantum Monte Carlo Simulation
Exploring QR Factorization on GPU for Quantum Monte Carlo Simulation Tyler McDaniel Ming Wong Mentors: Ed D Azevedo, Ying Wai Li, Kwai Wong Quantum Monte Carlo Simulation Slater Determinant for N-electrons
More informationFunctional Requirements for a Secure Electronic Voting System
Functional Requirements for a Secure Electronic Voting System Spyros IKONOMOPOULOS 1, Costas LAMBRINOUDAKIS 1, Dimitris GRITZALIS 2, Spyros KOKOLAKIS 1, Kostas VASSILIOU 1 1 Dept. of Information and Communication
More informationFinal Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems
Final Review Chenyang Lu CSE 467S Embedded Compu5ng Systems OS: Basic Func2ons Ø OS controls resources: q who gets the CPU; q when I/O takes place; q how much memory is allocated; q power management. Ø
More informationProgramming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna
Programming with Android: SDK install and initial setup Luca Bedogni Marco Di Felice Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna SDK and initial setup: Outline Ø Today: How
More informationSmart Voting System using UIDAI
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student
More informationApproaching a Formal Definition of Fairness in Electronic Commerce. Felix Gärtner Henning Pagnia Holger Vogt
1 Approaching a Formal Definition of Fairness in Electronic Commerce Felix Gärtner Henning Pagnia Holger Vogt Darmstadt University of Technology, Germany 2 Overview What is fair exchange and how does it
More informationEvent Based Sequential Program Development: Application to Constructing a Pointer Program
Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach
More informationAadhaar Based Voting System Using Android Application
Aadhaar Based Voting System Using Android Application Sreerag M 1, Subash R 1, Vishnu C Babu 1, Sonia Mathew 1, Reni K Cherian 2 1 Students, Department of Computer Science, Saintgits College of Engineering,
More informationIntroduction to VI-HPS
Introduction to VI-HPS Brian Wylie Jülich Supercomputing Centre Virtual Institute High Productivity Supercomputing Goal: Improve the quality and accelerate the development process of complex simulation
More informationComparing and Contrasting Workshop
Contents Learning Goals and Overview Lesson Plan Handout 1: Brainstorming Strategy (Venn Diagram) Handout 2: Nike Men s Ad Handout 3: Nike Women s Ad Handout 4: Strategies for Significance Handout 5: Dove
More informationOperating Systems. Chenyang Lu
Operating Systems Chenyang Lu Example: Linux Ø A Brief History: https://youtu.be/aurdhyl7bta Chenyang Lu 2 Android Source: h*p:// en.wikipedia.org/wiki/ File:Android-System- Architecture.svg Chenyang Lu
More informationBiometrics how to put to use and how not at all?
1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät
More informationSchool of Management and Economics
School of Management and Economics Simulation Models for Economics Migration in Europe (Simulation in NetLogo 5.0.5.) Students: Lilian Brodesco Nadezhda Krasavina Vitalii Podoleanu Instructor: Prof. Pietro
More informationFile Systems: Fundamentals
File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,
More informationA Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset
A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset Sisi Xiong*, Feiyi Wang + and Qing Cao* *University of Tennessee Knoxville, Knoxville, TN, USA + Oak Ridge National Laboratory,
More informationPhilips Lifeline. Ø Chenyang Lu 1
Philips Lifeline Ø http://www.lifelinesys.com/content/lifeline-products/auto-alert Chenyang Lu 1 Smartphone for Medicine Ø http://video.msnbc.msn.com/rock-center/50582822 2 Proposal Presenta5on Ø 2/12,
More informationEconomic and Social Council
UNITED NATIONS E Economic and Social Council Distr. GENERAL ECE/TRADE/C/CEFACT/2008/11 23 July 2008 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE COMMITTEE ON TRADE Centre for Trade Facilitation and
More informationLOCAL epolitics REPUTATION CASE STUDY
LOCAL epolitics REPUTATION CASE STUDY Jean-Marc.Seigneur@reputaction.com University of Geneva 7 route de Drize, Carouge, CH1227, Switzerland ABSTRACT More and more people rely on Web information and with
More information20 Design Methods - An Overview
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 20 Design Methods - An Overview Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software-
More informationEconomic and Social Council
UNITED NATIONS E Economic and Social Council Distr. GENERAL ECE/TRADE/C/2007/3 11 September 2007 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE COMMITTEE ON TRADE Second session Geneva, 22-25 October
More informationCreating and Managing Clauses. Selectica, Inc. Selectica Contract Performance Management System
Selectica, Inc. Selectica Contract Performance Management System Copyright 2006 Selectica, Inc. Copyright 2007 Selectica, Inc. 1740 Technology Drive, Suite 450 San Jose, CA 95110 http://www.selectica.com
More informationLaw And Order Automation
Law And Order Automation Guided By Anindita Mukherjee Swagata Ray, Upasana Maity, Puja Talukder, Priyanka De Dream Institute Of Technology Computer Science and Engineering Department West Bengal University
More informationErsin Özsahin. The International Constraints on Regime Changes
Ersin Özsahin The International Constraints on Regime Changes Ersin Özsahin The International Constraints on Regime Changes How Globalization Hinders the Prospects for Democratization Bibliographic information
More informationThe optical memory card is a Write Once media, a written area cannot be overwritten. Information stored on an optical memory card is non-volatile.
T10/99-128r0 Subject: Comments on the Committee Draft 14776-381 -Small Computer System Interface -Part 381: Optical Memory Card Device Commands (SCSI OMC). 99-107R0 on T10 site. I have a number of comments
More informationProcedures for the Use of Optical Scan Vote Tabulators
Procedures for the Use of Optical Scan Vote Tabulators (Revised December 4, 2017) CONTENTS Purpose... 2 Application. 2 Exceptions. 2 Authority. 2 Definitions.. 3 Designations.. 4 Election Materials. 4
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationThe Buddy System. A Distributed Reputation System Based On Social Structure 1
The Buddy System A Distributed Reputation System Based On Social Structure 1 Stefan Fähnrich, Philipp Obreiter, Birgitta König-Ries Institute for Program Structures and Data Organization Universität Karlsruhe
More informationUN/CEFACT Update Report
In This Issue 2007 Plenary session 10 th UN/CEFACT Forum, Dublin The UN/CEFACT Forum made simple News to use Topics for Intersessional Actions Future events Publications Communications with HoDs Recent
More informationImplementing Domain Specific Languages using Dependent Types and Partial Evaluation
Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Edwin Brady eb@cs.st-andrews.ac.uk University of St Andrews EE-PigWeek, January 7th 2010 EE-PigWeek, January 7th 2010
More informationPerformance & Energy
1 Performance & Energy Optimization @ Md Abdullah Shahneous Bari Abid M. Malik Millad Ghane Ahmad Qawasmeh Barbara M. Chapman 11/28/15 2 Layout of the talk Ø Overview Ø Motivation Ø Factors that affect
More information1-1. Copyright 2015 Pearson Education, Inc.
1-1 Chapter 1: What Is Organiza3onal Behavior? 1-2 Learning Objectives A:er studying this chapter, you should be able to: Ø Demonstrate the importance of interpersonal skills in the workplace. Ø Describe
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationPOLÍCIA JUDICIÁRIA. ASSEMBLEIA DA REPUBLICA T.N. Act no. 73/2009 of 12 August 2009
ASSEMBLEIA DA REPUBLICA T.N. Act no. 73/2009 of 12 August 2009 establishes the conditions and procedures that shall apply to ensure interoperability between information systems of criminal police bodies.
More informationBiometrics how to put to use and how not at all?
1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationExtensional Equality in Intensional Type Theory
Extensional Equality in Intensional Type Theory Thorsten Altenkirch Department of Informatics University of Munich Oettingenstr. 67, 80538 München, Germany, alti@informatik.uni-muenchen.de Abstract We
More informationDelegation of Obligations. Andreas Schaad & Jonathan Moffett Department of Computer Science University of York, UK
Delegation of Obligations Andreas Schaad & Jonathan Moffett Department of Computer Science University of York, UK 1 Outline of Talk Introduction and Motivation The Alloy Specification Language Organisational
More informationNew features in Oracle 11g for PL/SQL code tuning.
New features in Oracle 11g for PL/SQL code tuning. 1-1 - Speakers Nikunj Gadoya Nikunj is working in Blink Consul4ng as Technical Consultant for more than 2 years now. He did his engineering in computer
More informationProbabilistic Latent Semantic Analysis Hofmann (1999)
Probabilistic Latent Semantic Analysis Hofmann (1999) Presenter: Mercè Vintró Ricart February 8, 2016 Outline Background Topic models: What are they? Why do we use them? Latent Semantic Analysis (LSA)
More informationAssumption of TOBT Responsibility and Usage Agreement HAM CSA
Assumption of TOBT Responsibility and Usage Agreement HAM CSA (Airport CDM Common Situational Awareness Tool) Please mark with a cross as appropriate! We wish to agree the assumption of TOBT responsibility
More informationInstallation Instructions HM2085-PLM Strain Gage Input Module
Helm Instrument Company, Inc. 361 West Dussel Drive Maumee, Ohio 43537 USA Phone: 419-893-4356 Fax: 419-893-1371 www.helminstrument.com Installation Instructions HM2085-PLM Strain Gage Input Module October,
More informationComputational Architecture. The Social Organization of Distributed Cognition. A foundational metaphor. Two Physical Symbol Systems?
The Social Organization of Distributed Cognition How social arrangements affect the cognitive properties of groups (which can be different from the cognitive properties of the individuals in the group).
More informationGlobal Conditions (applies to all components):
Conditions for Use ES&S The Testing Board would also recommend the following conditions for use of the voting system. These conditions are required to be in place should the Secretary approve for certification
More informationExamination of CII and Business Methods Applications
Joint Cluster Computers of and Business Methods Applications Die Dienststelle Wien WWW2006 Edinburgh Dr. Clara Neppel Examiner EPO, München Joint Cluster Computers Das Europäische Patentamt The European
More informationMidterm Review. EECS 2011 Prof. J. Elder - 1 -
Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues
More informationJussi T. Lindgren, PhD Lead Engineer Inria
Jussi T. Lindgren, PhD jussi.lindgren@inria.fr Lead Engineer Hybrid @ Inria Jozef Legeny, M. Eng jozef.legeny@mensiatech.com Lead Architect Mensia Technologies JL & JL - POSS 2016 - OpenViBE 2 Tapping
More informationDocument and Author Promotion Strategies in the Secure Wiki Model
Document and Author Promotion Strategies in the Secure Wiki Model Kasper Lindberg and Christian Damsgaard Jensen Department of Informatics and Mathematical Modelling Technical University of Denmark Christian.Jensen@imm.dtu.dk
More informationUsers reading habits in online news portals
Esiyok, C., Kille, B., Jain, B.-J., Hopfgartner, F., & Albayrak, S. Users reading habits in online news portals Conference paper Accepted manuscript (Postprint) This version is available at https://doi.org/10.14279/depositonce-7168
More informationDrafting Legislation Using XML in the U.S. House of Representatives
1 Drafting Legislation Using XML in the U.S. House of Representatives Kirsten Gullickson, Senior Systems Analyst House of Representatives of the United States of America For more information: http://xml.house.gov
More informationSolutions of Implication Constraints yield Type Inference for More General Algebraic Data Types
Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Peter J. Stuckey NICTA Victoria Laboratory Department of Computer Science and Software Engineering The University
More informationSoftware License Agreement for Beckhoff Software Products
1 Scope of this Agreement (1) Licensor has agreed with Licensee to grant Licensee a license to use and exploit the software set out in the License Certificate ("Licensed Software") subject to the terms
More informationSoftware Agents Behaviour.
From Human Regulations to einstitutions From Human Regulations to Regulated Software Agents Behaviour. (einstitutions: the KEMLG@UPC and IS@Utrecht view) Javier Vázquez-Salceda May 20, 2005 http://www.lsi.upc.es/~webia/kemlg
More informationPublic policy Analysis. Prof S.M Omodia and Mr Ozekhome Igechi LECTURE 1. Objectives
Public policy Analysis Prof S.M Omodia and Mr Ozekhome Igechi LECTURE 1 Objectives 1. To conceptualize public policy 2. To know the features of public policy What is public policy? Public policy refers
More informationINTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT TEMPLATE INTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT
INTERNATIONAL SOFTWARE DISTRIBUTION AGREEMENT TEMPLATE In the International Software Distribution Agreement, the owner of a Software program (the Licensor) exclusively grants the software exploitation
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationAmendment to the Infinite Campus END USER LICENSE AGREEMENT
Amendment to the Infinite Campus END USER LICENSE AGREEMENT This Amendment to the Infinite Campus End User License Agreement (the Amendment ), is made between Infinite Campus, Inc. a Minnesota corporation
More informationTitle: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)
B.Y. Choueiry 1 Instructor s notes #5 Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/~choueiry/f17-476-876
More informationCyber-Physical Systems Scheduling
Cyber-Physical Systems Scheduling ICEN 553/453 Fall 2018 Prof. Dola Saha 1 Quick Recap 1. What characterizes the memory architecture of a system? 2. What are the issues with heaps in embedded/real-time
More informationLab 11: Pair Programming. Review: Pair Programming Roles
Lab 11: Pair Programming Apr 2, 2019 Sprenkle - CSCI111 1 Review: Pair Programming Roles Driver (Like the role I play when we write programs in class) Uses keyboard and mouse to execute all actions on
More informationGetting strategic: vertically integrated approaches
JUNE 2016 MANILA LEARNING EVENT BACKGROUND NOTES 1 Getting strategic: vertically integrated approaches JOY ACERON AND FRANCIS ISAAC Authors Joy Aceron is Senior Knowledge Leader at the Ateneo School of
More informationMPI Forum Procedures Version 3.0. The MPI Forum
MPI Forum Procedures Version 3.0 The MPI Forum Effective: December 6th, 2017 Copyright 2013-2017 by the authors. Licensed under a Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0/
More informationThe European Patent Office
Joint Cluster Computers European Patent Office Das Europäische Patentamt The European Service For Industry and Public Joint Cluster Computers European Patent Office CII examination practice in Europe and
More informationETSI TS V ( )
TS 128 526 V14.1.0 (2018-04) TECHNICAL SPECIFICATION LTE; Telecommunication management; Life Cycle Management (LCM) for mobile networks that include virtualized network functions; Procedures (3GPP TS 28.526
More informationForeScout Extended Module for McAfee epolicy Orchestrator
ForeScout Extended Module for McAfee epolicy Orchestrator Version 3.1 Table of Contents About McAfee epolicy Orchestrator (epo) Integration... 4 Use Cases... 4 Additional McAfee epo Documentation... 4
More informationRegulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations]
The Regulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations] ( Ordnung für die digitale Informationsverarbeitung und Kommunikation
More informationGenetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems
Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Shengxiang Yang Department of Computer Science, University of Leicester University Road, Leicester LE1 7RH, United Kingdom
More informationDesign of Below-the-Hook Lifting Devices
ASME BTH-1 2011 (Revision of ASME BTH-1 2008) Design of Below-the-Hook Lifting Devices AN AMERICAN NATIONAL STANDARD ASME BTH-1 2011 (Revision of ASME BTH-1 2008) Design of Below-the-Hook Lifting Devices
More informationOne View Watchlists Implementation Guide Release 9.2
[1]JD Edwards EnterpriseOne Applications One View Watchlists Implementation Guide Release 9.2 E63996-03 April 2017 Describes One View Watchlists and discusses how to add and modify One View Watchlists.
More informationFULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF
FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF VOTE-TRAKKER EVC308-SPR-FF is a patent-pending full-face touch-screen option of the error-free standard VOTE-TRAKKER EVC308-SPR system. It
More informationConstraint satisfaction problems. Lirong Xia
Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions
More informationAndreas Fring. Basic Operations
Basic Operations Creating a workbook: The first action should always be to give your workbook a name and save it on your computer. Go for this to the menu bar and select by left mouse click (LC): Ø File
More informationList of terminology and concepts
[CR01] List of terminology and concepts Summary ID Initiative Short description Owner Contact Type Sub-Type Context Base Registry type Operating model IPR Status Aggregated business need Functionalities
More informationMaps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -
Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap
More informationRefinement in Requirements Specification and Analysis: a Case Study
Refinement in Requirements Specification and Analysis: a Case Study Edwin de Jong Hollandse Signaalapparaten P.O. Box 42 7550 GD Hengelo The Netherlands edejong@signaal.nl Jaco van de Pol CWI P.O. Box
More informationCluster Analysis. (see also: Segmentation)
Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar
More information