Parameterised Argument Structure for GSN Patterns

Size: px
Start display at page:

Download "Parameterised Argument Structure for GSN Patterns"

Transcription

1 Parameterised Argument Structure for GSN Patterns Yutaka Matsuno Information Technology Center The University of Tokyo, Japan JST, CREST Kenji Taguchi National Institute of Advanced Industrial Science and Technology, Japan JST, CREST Abstract GSN (Goal Structuring Notation) is a graphical notation widely used to construct assurance cases, which are required for the system assurance of safety critical systems. Patterns and their supporting constructs are proposed in GSN, which include parameterised expressions in order to facilitate the reuse of existing assurance cases. Unfortunately the current GSN does not provide the precise account of parameterised expressions, thereby it is hard to automate their consistency check. The aim of this paper is to present a new proposal towards parameterisation of patterns in GSN and to show its formal background. We will present a new parameterised expressions with types, their scoping rules and type checking mechanism, which provide the safeguard to misuses of parameterised patterns and the means to automate checking their type consistency. 1. Introduction System assurance has become a great importance in many industrial sectors. Safety cases (assurance cases for safety of systems) are required to submit to certification bodies for developing and operating safety critical systems, e. g., automotive, railway, defense, nuclear plants and sea oils. There are several standards, e. g. EUROCONTROL [7], Rail Yellow Book [13] and MoD Defence Standard 00-56, which mandate the use of safety cases. There are several definition for assurance cases [3]. We show one of such definitions as follows[1]. a documented body of evidence that provides a convincing and valid argument that a system is adequately dependable for a given application in a given environment. Assurance cases are often written in structured documents using a graphical notation to ease the difficulty of writing and certifying them. Goal Structuring Notation (GSN) is one of such notations [10]. Writing assurance cases and reusing them in a cost effective way is a critical issue for organisations. Patterns and their supporting constructs are proposed in GSN for the reuse of existing assurance cases, which includes parameterised expressions. Unfortunately the current GSN does not provide the precise account of parameterised expressions, thereby it is hard to automate their consistency check. The aim of this paper is to present a proposal towards parameterisation of patterns in GSN and to show its formal background. We will present a new parameterised expressions with types, their scoping rules and type checking mechanism, which provide the safeguard to misuses of patterns with parameterisation and the means to automate checking their type consistency. The paper is organised as follows: the next section explains the background knowledge on this paper. Section 3 presents our proposal for parameterisation of the GSN, scoping rules for variables, and type checking mechanism. Section 4 describes our prototype implementation of parametarised expressions for assurance cases. Section 5 concludes the paper. 2. Background Knowledge 2.1. Goal Structuring Notation (GSN) Goal Structuring Notation (GSN) is introduced by Tim Kelly and his colleagues at University of York [10]. It is a graphical notation for assurance cases. GSN is widely used for safety cases. Some safety cases written in GSN are publicly available [2]. We briefly

2 explain constructs and their meanings in GSN. Arguments in GSN are structured as trees with a few kinds of nodes, including: goal nodes for claims to be argued for, strategy nodes for reasoning steps that decompose a goal into sub goals, and evidence nodes for references to direct evidences that respective goals hold. Figure 1 is a simple example of GSN. The root of the tree must be a goal node, called top goal, which is the claim to be argued (G 1 in Figure 1.) For G 1, a context node C 1 is attached to complement G 1. Context nodes are used to describe the context (environment) of the goal attached to. A goal node is decomposed through a strategy node (S 1) into sub goal nodes (G 2 and G 3). The strategy node contains an explanation, or reason, for why the goal is achieved when the sub goals are achieved. S 1 explains the way of arguing (argue over each possible fault: A and B). When successive decompositions reach a sub goal (G 2) that has a direct evidence of success, an evidence node (E 1) referring to the evidence is added. Here we use a result of fault tree analysis (FTA) as the evidence. For the sub goal (G 3) that is not decomposed nor supported by evidences, a node (a diamond) of type undeveloped is attached to highlight the incomplete status of the case. The assurance case in Figure 1 is written with D-Case Editor ( D derives from Dependability), which is our prototype implementation of assurance case editor [12]. We call assurance cases written in GSN as GSN terms GSN Patterns Writing and certifying assurance cases are difficult because they tend to be huge and complex, and they require domain specific knowledge of target systems. To ease the difficulties, it has been recognized that assurance case patterns should be collected and available for reuse, similarly to design patterns in object oriented languages. There have been several publicly available GSN patterns ([9], [14], [4]). Figure 2 is a simple example of GSN patterns in [4]. The top-level goal of system safety (G1) is reexpressed as a number of goals of functional safety (G2) as part of the strategy identified by S1. In order to support this strategy, it is necessary to have identified all system functions affecting overall safety (C1) e.g. through Functional Hazard Analysis (FHA). In addition, it is also necessary to put forward (and develop) the claim that either all the identified functions are independent, and therefore have no interactions that could give rise to hazards (G4) or that any interactions that have been identified are non-hazardous (G3). Goal:G_2 C/S Logic is free from fault A Evidence:E_1 FTA analysis Result Goal:G_1 C/S Logic is free from possible faults Strategy:S_1 Argue over each possible fault Goal:G_3 C/S Logic is free from fault B Undeveloped:U_1 No evidence is currently given Figure 1. A simple GSN Context:C_1 Risk Analysis Result: Possible faults are fault A and fault B Figure 2 includes main GSN extensions for GSN patterns, as defined in [5]: Parameterized expressions. {System X} and {Function Y } are parametarised expressions. We can instantiate X and Y by appropriate (possibly safety critical) system and function, respectively. Uninstantiated. Triangles ( ) attached to nodes indicate that the nodes contain uninstantiated paramerarised expressions. To instantiate the GSN pattern as an assurance case, we need to instantiate the expressions. 1 to many expressions (multiplicity). Number of functions are different by the target system. We can instantiate the number of functions (n) for the target system. Choice. By this extension, we can choose appropriate goals for the target system Assurance Cases and Standardisation Efforts Two major graphical notations for assurance cases are GSN and CAE (Claims, Arguments, and Evidence) [1]. There are two standardisation efforts for assurance cases; the system assurance task force at the OMG (Object Management Group) and GSN standardisation

3 Figure 2. An example of GSN patterns [4] effort [5]. OMG has standardized the meta-model for assurance cases called ARM (Argument Metamodel) [8] by which both notations are in fact interchangeable. The main aim of the ARM is to align two major notations and facilitates the tool support. Unfortunately it only reflects main constructs between the two, and some specific features, which are not compatible are missing from it. For instance, patterns are not included in the ARM. 3. Parameterised Patterns We aim to formalise parametrised expressions with types in GSN patterns in this paper. In order to do so, we introduce types and define the scope of variables appeared in expressions. These two are not new and fairly basic notions in programming languages. However, the current GSN [4] neither incorporates types nor provides the precise account of the scope of variables. As explained in Section 2.2., the intended meaning of the parameterised expression {System X} in the Figure 2 is to instantiate the variable X by some particular instance which belongs to the System class (or type). We believe that introducing types and giving a precise account of the scope of variables will contribute to avoid misuses of parameterised expressions and to detect errors in early stages. For example, we can automatically avoid mis-placement of variables by type checking. In Figure 2, if a user instantiates X with e.g., Railway hazards, then the argument does not make sense. It is fairly obvious that type checking prevents such a mis-placement. If the scoping rules are not precisely defined, we cannot figure out where variables in a node are declared in the first place. We use contexts for type declaration, type assignment, and variable instantiation. We first define the GSN term as follows. Let g, e, c and st be meta-variables for goals, evidence, context and strategies, respectively. Definition 1 (GSN term T ): T ::=(g,, c) (g, e, c) (g, st, (T 1,..., T n ), c) (g,, c) denotes a GSN term, which consists of just one goal g, a context s attached to the goal. Undeveloped is depicted by and any evidence is not given to support g. (g, e, c) is a GSN term of just a goal g with its context c supported by an evidence e. (g, st, (T 1,..., T n ), c) denotes a GSN term whose top goal g is supported by the child nodes T 1,..., T n. Rationale for why the children nodes together support g is indicated by the strategy st. Context c is defined as a triple of (user-defined) type declarations, type

4 assignments of variables, and variable instantiations as follows. ([T ype 1,..., T ype m ], [x 1 : τ 1,..., x n : τ n ], [v 1 /x 1,..., v n /x n ]) We do not write c when c = ([], [], []). We explain the above definition. Let τ 1, τ 2,..., σ 1, σ 2,... be meta-variables for types. First, we introduce basic types. Let Int, String, F loat,... be sets of integers, strings, floating point numbers,..., respectively. [x 1 : τ 1,..., x n : τ n ] is type assignments for variables x 1,..., x n (we use meta-variables x 1, x 2,..., y, z, w,... for variables). We assume elements in Int, String, F loat,... have types of int, string, float,..., respectively. Basic types are assumed to be already defined. Furthermore, we will allow user-defined types. GSN is mostly used at early stages of the system development such that it is crucial to support high-level abstract data types. In formal specification languages, these data types are supported. For instance, in the Z notation [15], the given types are introduced for user defined data types. We will also allow these types in our parameterised GSN term. In our context, any user-defined types can be declared using the following format: [T ype 1,..., T ype m ] For instance, [System, F unction] should be declared in the GSN term of Figure 2. As in basic types, we assume that users define sets of elements for their defined types. Let v 1,..., v n be elements either in Int, String,..., and user-defined sets. GSN has uninstantiated icon which signifies that certain variables are not instantiated. Variable instantiation is represented by [v 1 /x 1,..., v n /x n ], in which variables x 1,..., x n are instantiated with v 1,..., v n, respectively. We write ɛ/y if y is not instantiated with any elements. For example, [2/x, ɛ/y, hello /z] represents that x and z are instantiated with 2 and hello, respectively whereas y is not instantiated. Goals, evidences, and strategies are written in strings with/without variables Scoping Rules The scoping rules follow those in programming languages with block structure. The scope of a variable in a context begins with its associated goal and covers all nodes in the sub-trees. For example, Consider a GSN term (g, st, (T 1,..., T n ), c), and c = ([], [x : int], [10/x]). Then all occurrences of x in the GSN term should be given type int and be instantiated with 10. If the same variable already declared is declared again in a context associated with a sub-goal, the scope of the variable covers all nodes in the subtrees under the sub-goal Simple Checking Mechanism We show a simple checking mechanism for type correctness and scoping. We borrow the formalism of type systems for programming languages. For simplicity of our explanation, we assume the following (it is not difficult to extend the mechanism for general cases, but it is just tedious to write): User-defined types are only defined in the top level of the GSN term, and contexts only consist of type assignments and variable instantiations. Variables are only used in goals. Each variable is declared only once in the GSN term. This is similar to Static Single Assignment (SSA) form in compiler optimization [6]. We prepare the following. Let {τ 1,..., τ k } be the set of types including both basic types and user-defined types defined in the top level of the GSN term, and let S 1,..., S k be the sets of elements of type τ 1,..., τ k, respectively. S 1,..., S k are assumed to be pairwise disjoint. Let V 0 = S 1 S k. Let ɛ V 0 and V = V 0 {ɛ}. We use metavariable v for elements in V. We define a function Var(g) which returns the set of all variables used in g. We define a function CorrectType(σ, v) which returns true if 1 i k.σ = τ i v S i, or v = ɛ. We denote Γ for type environments which are mappings from variables to types. Γ is written as {x 1 : τ 1,..., x j : τ j }. We write Γ, x : τ for Γ {x : τ}. We denote domain of Γ as dom(γ). The type judgment is of the form Γ T.

5 This intend to mean that in a type environment Γ, T is well-typed. In particular, for a given GSN term T, if T, In T, each variable is assigned a value of the declared type, or, the variable is uninstantiated. In T, each variable is only used in its scope. The typing rules are shown in Figure 3. We omit the typing rules for T = (g, e) and T = (g, e, c), because they are almost the same as the ones for T = (g, ) and T = (g,, c), respectively. In this short paper, we omit the explanation of these typing rules and the proof. The type checking algorithm should be straightforward. 4. Prototype Implementation of Parameterised Expressions In D-Case Editor, we have prototyped parameterised expressions with types. Current implementation is limited that variables and types can only be declared in the top level of the GSN term. Declaration of variables and types are written in an XML file, as shown in Figure 4. In Figure 4, variables STATUS, CPU, USAGE, and MESSAGE are declared, and given types enum, int, double, and string, respectively. Furthermore, these types are given useful restrictions such that the value of CPU (this variable is intended as the CPU resource usage rate of the target system) is restricted within 0 100%. Users of D-Case Editor can assign values to these variables via the parameter setting window. If a user mis-assigned a value (e.g., 150 for CPU), then D-Case Editor reports the type error. As far as we know, there is not any assurance case editor which has such parameterised expressions and type checking mechanism. We plan to implement the type checking mechanism in Section Conclusion In this paper we have presented a new proposal towards parameterisation of patterns in GSN and to formalise a checking mechanism for type correctness and the scope of variables for them. Our parameterised patterns can include variables with types, which can detect anomalies of wrong instantiations, which help to validate that assurance cases obtained are free from type inconsistency. It can also help to develop a tool to automate type consistency check. One direction is to incorporate this proposal into standardisation efforts for assurance cases. We are planning to propose this to be included in the OMG ARM in order to promote wider adoption of this proposal. We already have started our activities for the goal [11]. References [1] [2] [3] Workshop on Assurance Cases: Best Practices,Possible Obstacles, and Future Opportunities, DSN 2004, [4] Robert Alexander, Tim Kelly, Zeshan Kurd, and John McDermid. Safety cases for advanced control software: Safety case patterns. Technical report, Department of Computer Science, University of York, [5] GSN contributors. DRAFT GSN standard version 1.0, [6] Ron Cytron, Jeanne Ferrante, Barry K. Rosen, Mark N. Wegman, and F. Kenneth Zadeck. Efficiently computing static single assignment form and the control dependence graph. TOPLAS, 13(4): , Oct [7] European Organisation for the Safety of Air Navigation. Safety case development manual. European Air Traffic Management, [8] Object Management Group. Argument metamodel (ARM). OMG Document Number Sysa/ [9] Tim Kelly and John McDermid. Safety case patterns - reusing successful arguments. In IEE Colloquium on Understanding Patterns and Their Application to System Engineering, [10] Tim Kelly and Rob Weaver. The goal structuring notation - a safety argument notation. In Proc. of the Dependable Systems and Networks 2004, Workshop on Assurance Cases, [11] Yutaka Matsuno, Kenji Taguchi, and Hiroki Takamura. Standardization of GSN patterns in OMG sysa PTF. System Assurance Task Force, OMG Technical Meeting, September [12] Yutaka Matsuno, Hiroki Takamura, and Yutaka Ishikawa. A dependability case editor with pattern library. In Procs. IEEE 12th International Symposium on High-Assurance Systems Engineering (HASE), pages , [13] Railtrack. Yellow book 3. Engineering Safety Management Issue3, Vol. 1, Vol. 2, [14] Robert Andrew Weaver. The Safety of Software - Constructing and Assuring Arguments. PhD thesis, Department of Computer Science, University of York, [15] Jim Woodcock and Jim Davies. Using Z: Specification, Refinement and Proof. Prentice Hall, 1996.

6 Var(g) Dom(Γ) Γ (g, ) c = ([x 1 : σ 1,..., x m : σ m], [v 1/x 1,..., v m/x m]) {x 1,..., x m} dom(γ) Var(g) Dom(Γ) {x 1,..., x m} 1 i m.correcttype(σ i, v i ) Γ (g,, c) Var(g) Dom(Γ) Γ T 1,..., Γ T n Γ (g, st, (T 1,..., T n)) c = ([x 1 : σ 1,..., x m : σ m ], [v 1 /x 1,..., v m /x m ]) {x 1,..., x m } dom(γ) Var(g) Dom(Γ) {x 1,..., x m } 1 i m.correcttype(σ i, v i) Γ, x 1 : σ 1,..., x m : σ m T 1,..., Γ, x 1 : σ 1,..., x m : σ m T n Γ (g, st, (T 1,..., T n), c) Figure 3. Typing Rules <?xml version="1.0" encoding="utf-8"?> <!-- all element names and attributes are case sensitive --> <datatype> <parameter name="status" type="enum"> <items> <item value="normal"/> <item value="error"/> <item value="running"/> <item value="satisfied"/> </items> <parameter name="cpu" type="int"> <range min="0" max="100"/> <parameter name="usage" type="double"> <range min="0.00" max="999.99" digit="2" inc="0.02" /> <parameter name="message" type="string"> <length min="0" max="20"/> </datatype> Figure 4. Variables and Type Declarations XML file for D-Case Editor

D-Case Editor: A Typed Assurance Case Editor

D-Case Editor: A Typed Assurance Case Editor D-Case Editor: A Typed Assurance Case Editor Yutaka Matsuno The University of Tokyo, Japan JST, CREST matsu@cc.u-tokyo.ac.jp Abstract System assurance has become an important issue in many system domains,

More information

Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot

Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot 1 1 1 1 0,,, Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot Abstract: It had been emphasized that formal methods in software development are

More information

A Software Safety Argument Pattern Catalogue

A Software Safety Argument Pattern Catalogue A Software Safety Argument Pattern Catalogue R. Hawkins and T. Kelly {richard.hawkins\tim.kelly}@york.ac.uk Department of Computer Science The University of York Abstract This document presents a catalogue

More information

A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD)

A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD) A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD) Nada Olayan 1 and Shuichiro Yamamoto 2 1 Graduate School of Information Sciences, Nagoya University, Nagoya, Aichi,

More information

Safety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University

Safety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University 1 Safety Argument based on GSN for Automotive Control Systems Yutaka Matsubara Nagoya University yutaka@ertl.jp 02.26.2014 2 Agenda 1. Safety argument in ISO26262 2. Requirements related to safety argument

More information

A Systematic Approach for Developing Software Safety Arguments

A Systematic Approach for Developing Software Safety Arguments A Systematic Approach for Developing Software Safety Arguments R.D. Hawkins, Ph.D.; Software Systems Engineering Initiative; The University of York, York, UK T.P. Kelly, PhD; Department of Computer Science;

More information

Lecture Notes on Static Single Assignment Form

Lecture Notes on Static Single Assignment Form Lecture Notes on Static Single Assignment Form 15-411: Compiler Design Frank Pfenning Lecture 6 September 12, 2013 1 Introduction In abstract machine code of the kind we have discussed so far, a variable

More information

GSN Metamodel. In the following subsections we describe the model elements. All references are to sections within the GSN Community Standard.

GSN Metamodel. In the following subsections we describe the model elements. All references are to sections within the GSN Community Standard. 1. Background GSN Metamodel This section defines a metamodel for representing structured arguments using GSN. GSN arguments should be instances of this GSN Metamodel. Instances of the GSN Metamodel are

More information

Safety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study

Safety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study Safety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study Jane Fenn and Richard Hawkins BAE SYSTEMS, Brough, UK Phil Williams General Dynamics (United Kingdom)

More information

Developing Successful Modular Arguments for Object Oriented Systems. R.D. Hawkins; University of York; York, UK

Developing Successful Modular Arguments for Object Oriented Systems. R.D. Hawkins; University of York; York, UK Developing Successful Modular Arguments for Object Oriented Systems R.D. Hawkins; University of York; York, UK S.A. Bates; University of York; York, UK J.A. McDermid; University of York; York, UK Keywords:

More information

CS4120/4121/5120/5121 Spring 2018 Xi Type System Specification Cornell University Version of February 18, 2018

CS4120/4121/5120/5121 Spring 2018 Xi Type System Specification Cornell University Version of February 18, 2018 CS4120/4121/5120/5121 Spring 2018 Xi Type System Specification Cornell University Version of February 18, 2018 0 Changes 2/16: Added typing rule for empty blocks 1 Types The Xi type system uses a somewhat

More information

Lecture Notes on Static Single Assignment Form

Lecture Notes on Static Single Assignment Form Lecture Notes on Static Single Assignment Form 15-411: Compiler Design Frank Pfenning, Rob Simmons Lecture 10 October 1, 2015 1 Introduction In abstract machine code of the kind we have discussed so far,

More information

Support for Safety Case Generation via Model Transformation

Support for Safety Case Generation via Model Transformation Support for Safety Case Generation via Model Transformation Chung-Ling Lin, Wuwei Shen Department of Computer Science Western Michigan University Kalamazoo, MI, USA {chung-ling.lin, wuwei.shen}@wmich.edu

More information

Weaving an Assurance Case from Design: A Model-Based Approach

Weaving an Assurance Case from Design: A Model-Based Approach Weaving an Assurance Case from Design: A Model-Based Approach Richard Hawkins, Ibrahim Habli, Dimitris Kolovos, Richard Paige, Tim Kelly Department of Computer Science The University of York York, UK {Richard.Hawkins,

More information

Translation validation: from Simulink to C

Translation validation: from Simulink to C Translation validation: from Simulink to C Ofer Strichman Michael Ryabtsev Technion, Haifa, Israel. Email: ofers@ie.technion.ac.il, michaelr@cs.technion.ac.il Abstract. Translation validation is a technique

More information

Evidence-based Development coupling structured argumentation with requirements development.

Evidence-based Development coupling structured argumentation with requirements development. Evidence-based Development coupling structured argumentation with requirements development Jeremy.Dick@integrate.biz integrate 2012 based on paper Paper: EVIDENCE-BASED DEVELOPMENT COUPLING STRUCTURED

More information

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements Capturing and Formalizing SAF Availability Management Framework Configuration Requirements A. Gherbi, P. Salehi, F. Khendek and A. Hamou-Lhadj Electrical and Computer Engineering, Concordia University,

More information

Mixed Criticality Scheduling in Time-Triggered Legacy Systems

Mixed Criticality Scheduling in Time-Triggered Legacy Systems Mixed Criticality Scheduling in Time-Triggered Legacy Systems Jens Theis and Gerhard Fohler Technische Universität Kaiserslautern, Germany Email: {jtheis,fohler}@eit.uni-kl.de Abstract Research on mixed

More information

Goal-Based Assessment for the Cybersecurity of Critical Infrastructure

Goal-Based Assessment for the Cybersecurity of Critical Infrastructure Goal-Based Assessment for the Cybersecurity of Critical Infrastructure IEEE HST 2010 November 10, 2010 NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS

More information

Testing Techniques for Ada 95

Testing Techniques for Ada 95 SOFTWARE QUALITY ASSURANCE TOOLS & TECHNOLOGY PROFESSIONAL SERVICES ACADEMY P a g e 1 White Paper Testing Techniques for Ada 95 The Ada language is widely accepted as the language of choice for the implementation

More information

Don t Judge Software by Its (Code) Coverage

Don t Judge Software by Its (Code) Coverage Author manuscript, published in "SAFECOMP 2013 - Workshop CARS (2nd Workshop on Critical Automotive applications : Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability

More information

Reuse Contracts As Component Interface. Descriptions. Koen De Hondt, Carine Lucas, and Patrick Steyaert. Programming Technology Lab

Reuse Contracts As Component Interface. Descriptions. Koen De Hondt, Carine Lucas, and Patrick Steyaert. Programming Technology Lab Reuse Contracts As Component Interface Descriptions Koen De Hondt, Carine Lucas, and Patrick Steyaert Programming Technology Lab Computer Science Department Vrije Universiteit Brussel Pleinlaan 2, B-1050

More information

Final Project Report

Final Project Report 16.04.02 Final Project Report Document information Project Title HP Tool Repository of SESAR standard HP methods and tools Project Number 16.04.02 Project Manager DFS Deliverable Name 16.04.02 Final Project

More information

Meeting14:Denotations

Meeting14:Denotations Meeting14:Denotations Announcements Homework 3 due next week Friday at 6:00pm Reminder: 5-minute feedback discussion with Sean is part of the assignment ("interview light") Talk (with me, with the class

More information

Generalized Constant Expressions

Generalized Constant Expressions Doc. no. Date: September 21, 2003 Reply-To: Gabriel Dos Reis gdr@acm.org Abstract We suggest to generalize the notion of constant expressions to include calls to constant-valued functions. The purpose

More information

An Efficient Staging Algorithm for Binding-Time Analysis

An Efficient Staging Algorithm for Binding-Time Analysis An Efficient Staging Algorithm for Binding-Time Analysis Takuma Murakami 1, Zhenjiang Hu 1,2, Kazuhiko Kakehi 1, and Masato Takeichi 1 1 Department of Mathematical Informatics, Graduate School of Information

More information

CS152: Programming Languages. Lecture 11 STLC Extensions and Related Topics. Dan Grossman Spring 2011

CS152: Programming Languages. Lecture 11 STLC Extensions and Related Topics. Dan Grossman Spring 2011 CS152: Programming Languages Lecture 11 STLC Extensions and Related Topics Dan Grossman Spring 2011 Review e ::= λx. e x e e c v ::= λx. e c τ ::= int τ τ Γ ::= Γ, x : τ (λx. e) v e[v/x] e 1 e 1 e 1 e

More information

Spemmet - A Tool for Modeling Software Processes with SPEM

Spemmet - A Tool for Modeling Software Processes with SPEM Spemmet - A Tool for Modeling Software Processes with SPEM Tuomas Mäkilä tuomas.makila@it.utu.fi Antero Järvi antero.jarvi@it.utu.fi Abstract: The software development process has many unique attributes

More information

A Software Product Model Emphasizing Relationships

A Software Product Model Emphasizing Relationships JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 349-377 (2004) A Software Product Model Emphasizing Relationships Department of Computer Science and Information Engineering National Dong Hwa University

More information

3 Competitive Dynamic BSTs (January 31 and February 2)

3 Competitive Dynamic BSTs (January 31 and February 2) 3 Competitive Dynamic BSTs (January 31 and February ) In their original paper on splay trees [3], Danny Sleator and Bob Tarjan conjectured that the cost of sequence of searches in a splay tree is within

More information

Hierarchical Pointer Analysis for Distributed Programs

Hierarchical Pointer Analysis for Distributed Programs Hierarchical Pointer Analysis for Distributed Programs Amir Kamil Computer Science Division, University of California, Berkeley kamil@cs.berkeley.edu April 14, 2006 1 Introduction Many distributed, parallel

More information

A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process

A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process Vaise Patu, Shuichiro Yamamoto To cite this version: Vaise

More information

Modeling the Evolution of Aspect Configurations using Model Transformations

Modeling the Evolution of Aspect Configurations using Model Transformations Modeling the Evolution of Aspect Configurations using Model Transformations Uwe Zdun, Mark Strembeck Institute of Information Systems, New Media Lab Vienna University of Economics, Austria {uwe.zdun mark.strembeck}@wu-wien.ac.at

More information

Static Analysis Techniques

Static Analysis Techniques oftware Design (F28SD2): Static Analysis Techniques 1 Software Design (F28SD2) Static Analysis Techniques Andrew Ireland School of Mathematical and Computer Science Heriot-Watt University Edinburgh oftware

More information

Approaches to Certification of Reconfigurable IMA Systems Paul Hollow, John McDermid, Mark Nicholson, University of York, UK Abstract

Approaches to Certification of Reconfigurable IMA Systems Paul Hollow, John McDermid, Mark Nicholson, University of York, UK Abstract Approaches to Certification of Reconfigurable IMA Systems Paul Hollow, John McDermid, Mark Nicholson, University of York, UK Abstract The aerospace industry have been investigating integrated modular avionics

More information

On Meaning Preservation of a Calculus of Records

On Meaning Preservation of a Calculus of Records On Meaning Preservation of a Calculus of Records Emily Christiansen and Elena Machkasova Computer Science Discipline University of Minnesota, Morris Morris, MN 56267 chri1101, elenam@morris.umn.edu Abstract

More information

An approach to the model-based fragmentation and relational storage of XML-documents

An approach to the model-based fragmentation and relational storage of XML-documents An approach to the model-based fragmentation and relational storage of XML-documents Christian Süß Fakultät für Mathematik und Informatik, Universität Passau, D-94030 Passau, Germany Abstract A flexible

More information

A Translation Framework for Automatic Translation of Annotated LLVM IR into OpenCL Kernel Function

A Translation Framework for Automatic Translation of Annotated LLVM IR into OpenCL Kernel Function A Translation Framework for Automatic Translation of Annotated LLVM IR into OpenCL Kernel Function Chen-Ting Chang, Yu-Sheng Chen, I-Wei Wu, and Jyh-Jiun Shann Dept. of Computer Science, National Chiao

More information

An Ontological Analysis of Metamodeling Languages

An Ontological Analysis of Metamodeling Languages An Ontological Analysis of Metamodeling Languages Erki Eessaar and Rünno Sgirka 2 Department of Informatics, Tallinn University of Technology, Estonia, eessaar@staff.ttu.ee 2 Department of Informatics,

More information

A Type System for Object Initialization In the Java TM Bytecode Language

A Type System for Object Initialization In the Java TM Bytecode Language Electronic Notes in Theoretical Computer Science 10 (1998) URL: http://www.elsevier.nl/locate/entcs/volume10.html 7 pages A Type System for Object Initialization In the Java TM Bytecode Language Stephen

More information

Introduction to Programming, Aug-Dec 2006

Introduction to Programming, Aug-Dec 2006 Introduction to Programming, Aug-Dec 2006 Lecture 3, Friday 11 Aug 2006 Lists... We can implicitly decompose a list into its head and tail by providing a pattern with two variables to denote the two components

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

A Generic Method for Defining Viewpoints in SysML

A Generic Method for Defining Viewpoints in SysML A Generic Method for Defining Viewpoints in SysML Takahiro Yamada Japan Aerospace Exploration Agency/Institute for Space and Astronautical Science 3-1-1 Yoshinodai, Sagamihara 229-8510, JAPAN Copyright

More information

Structure of Abstract Syntax trees for Colored Nets in PNML

Structure of Abstract Syntax trees for Colored Nets in PNML Structure of Abstract Syntax trees for Colored Nets in PNML F. Kordon & L. Petrucci Fabrice.Kordon@lip6.fr Laure.Petrucci@lipn.univ-paris13.fr version 0.2 (draft) June 26, 2004 Abstract Formalising the

More information

Subtyping (cont) Lecture 15 CS 565 4/3/08

Subtyping (cont) Lecture 15 CS 565 4/3/08 Subtyping (cont) Lecture 15 CS 565 4/3/08 Formalization of Subtyping Inversion of the subtype relation: If σ

More information

Arguing Conformance. FOCUS: Software Engineering for Compliance

Arguing Conformance. FOCUS: Software Engineering for Compliance FOCUS: Software Engineering for Compliance Arguing Conformance Patrick Graydon, Ibrahim Habli, Richard Hawkins, and Tim Kelly, University of York John Knight, University of Virginia // Explicit and structured

More information

An Information Model for High-Integrity Real Time Systems

An Information Model for High-Integrity Real Time Systems An Information Model for High-Integrity Real Time Systems Alek Radjenovic, Richard Paige, Philippa Conmy, Malcolm Wallace, and John McDermid High-Integrity Systems Group, Department of Computer Science,

More information

Mobile Security Assurance through ArchiMate

Mobile Security Assurance through ArchiMate through ArchiMate Shuichiro Yamamoto and Nobuhide Kobayashi Nagoya University, Furo-cho Chikusa-ku, Nagoya Aichi 464-8601, Japan syamamoto@acm.org, nobuhide@dcinc.co.jp Abstract ArchiMate is used to describe

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process

Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process UK MathWorks Aerospace & Defence Industry Working Group Guidelines for deployment of MathWorks R2010a toolset within

More information

Mappings from BPEL to PMR for Business Process Registration

Mappings from BPEL to PMR for Business Process Registration Mappings from BPEL to PMR for Business Process Registration Jingwei Cheng 1, Chong Wang 1 +, Keqing He 1, Jinxu Jia 2, Peng Liang 1 1 State Key Lab. of Software Engineering, Wuhan University, China cinfiniter@gmail.com,

More information

cs109: Programming Paradigms C++ FS 2014

cs109: Programming Paradigms C++ FS 2014 UNIVERSITÄT BASEL Thorsten Möller Alexander Haesen Valentino Rugolo cs109: Programming Paradigms C++ FS 2014 Exercise 1 Deadline: 30.03.2014 23:59:59 Note: Please upload answers to the questions and source

More information

Just-In-Time Certification

Just-In-Time Certification Just-In-Time Certification John Rushby Computer Science Laboratory SRI International Menlo Park, California, USA John Rushby, SR I Just-In-Time Certification: 1 Certification Provides assurance that deploying

More information

CS4215 Programming Language Implementation. Martin Henz

CS4215 Programming Language Implementation. Martin Henz CS4215 Programming Language Implementation Martin Henz Thursday 26 January, 2012 2 Chapter 4 The Language simpl In this chapter, we are exting the language epl in order to provide a more powerful programming

More information

ICAEW REPRESENTATION 68/16

ICAEW REPRESENTATION 68/16 ICAEW REPRESENTATION 68/16 Improving the Structure of the Code of Ethics for Professional Accountants - Phase 1 ICAEW welcomes the opportunity to comment on the Improving the Structure of the Code of Ethics

More information

On the Challenges of Composing Multi-View Models

On the Challenges of Composing Multi-View Models On the Challenges of Composing Multi-View Models Matthias Schöttle and Jörg Kienzle School of Computer Science, McGill University, Montreal, Canada mschoettle@cs.mcgill.ca, joerg.kienzle@mcgill.ca Abstract.

More information

PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS

PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS Objective PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS Explain what is meant by compiler. Explain how the compiler works. Describe various analysis of the source program. Describe the

More information

THE TASK-TO-PRESENTATION-DIALOG MAPPING PROBLEM

THE TASK-TO-PRESENTATION-DIALOG MAPPING PROBLEM THE TSK-TO-PRESENTTION-LOG MPNG PROBLEM Quentin Limbourg and Jean Vanderdonckt Université catholique de Louvain, Place des Doyens, 1 B-1348 Louvain-la-Neuve, Belgium {Limbourg, Vanderdonckt}@isys.ucl.ac.be

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

BNetzA therefore requests a BEREC Opinion on the above measures until June 1.

BNetzA therefore requests a BEREC Opinion on the above measures until June 1. BoR (18) 88 Transatel / Telefónica dispute resolution proceeding Application with regard to the dispute resolution procedure pursuant to Article 17 (1) Roaming Regulation by Transatel SA vs Telefonica

More information

Appendix: Generic PbO programming language extension

Appendix: Generic PbO programming language extension Holger H. Hoos: Programming by Optimization Appendix: Generic PbO programming language extension As explained in the main text, we propose three fundamental mechanisms to be covered by a generic PbO programming

More information

Reachability in K 3,3 -free and K 5 -free Graphs is in Unambiguous Logspace

Reachability in K 3,3 -free and K 5 -free Graphs is in Unambiguous Logspace CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 2014, Article 2, pages 1 29 http://cjtcs.cs.uchicago.edu/ Reachability in K 3,3 -free and K 5 -free Graphs is in Unambiguous Logspace Thomas Thierauf Fabian

More information

A Proposal for Verified Code Generation from Modelica

A Proposal for Verified Code Generation from Modelica A Proposal for Verified Code Generation from Modelica Bernhard Thiele PELAB Linköping University 04. February 2015-9th MODPROD Workshop on Model-Based Product Development 1 / 22 Goals of this presentation

More information

The Fox Project: Advanced Development of Systems Software

The Fox Project: Advanced Development of Systems Software The Fox Project: Advanced Development of Systems Software R&D Status Report July 1 to September 30, 1999 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 19991222 022 This research

More information

European Standards & Community Specifications

European Standards & Community Specifications European Standards & Community Specifications The ESO role, process and method Presented by: Gavin Craik, ETSI for the Joint CEN ETSI Workshop of the 17 th March 2011 1 What is an ESO? An ESO is a recognised

More information

Separating Product Variance and Domain Concepts in the Specification of Software Product Lines

Separating Product Variance and Domain Concepts in the Specification of Software Product Lines Separating Product Variance and Domain Concepts in the Specification of Software Product Lines Pertti Kellomäki Software Systems Laboratory, Tampere University of Technology P.O. Box 553, FIN-33101 Tampere,

More information

Subtyping. Lecture 13 CS 565 3/27/06

Subtyping. Lecture 13 CS 565 3/27/06 Subtyping Lecture 13 CS 565 3/27/06 Polymorphism Different varieties of polymorphism: Parametric (ML) type variables are abstract, and used to encode the fact that the same term can be used in many different

More information

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.

More information

Metamodeling. Janos Sztipanovits ISIS, Vanderbilt University

Metamodeling. Janos Sztipanovits ISIS, Vanderbilt University Metamodeling Janos ISIS, Vanderbilt University janos.sztipanovits@vanderbilt.edusztipanovits@vanderbilt edu Content Overview of Metamodeling Abstract Syntax Metamodeling Concepts Metamodeling languages

More information

Local Specialization in Open-Axiom

Local Specialization in Open-Axiom Local Specialization in Open-Axiom Jacob Smith Yue Li Yuriy Solodkyy Gabriel Dos Reis Jaakko Järvi September 1, 2009 Abstract Most algebraic structures in computational mathematics are instances of functors.

More information

SDD Advanced-User Manual Version 1.1

SDD Advanced-User Manual Version 1.1 SDD Advanced-User Manual Version 1.1 Arthur Choi and Adnan Darwiche Automated Reasoning Group Computer Science Department University of California, Los Angeles Email: sdd@cs.ucla.edu Download: http://reasoning.cs.ucla.edu/sdd

More information

Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{

Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{ Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{ 5.1 INTRODUCTION The purpose of the previous chapter was to recognize the knowledge embedded in current alignment approaches by inductively creating

More information

Course on Database Design Carlo Batini University of Milano Bicocca

Course on Database Design Carlo Batini University of Milano Bicocca Course on Database Design Carlo Batini University of Milano Bicocca 1 Carlo Batini, 2015 This work is licensed under the Creative Commons Attribution NonCommercial NoDerivatives 4.0 International License.

More information

Informing Assurance Case Review through a Formal Interpretation of GSN Core Logic

Informing Assurance Case Review through a Formal Interpretation of GSN Core Logic Informing Assurance Case Review through a Formal Interpretation of GSN Core Logic Victor Bandur and John McDermid University of York, UK Abstract. A formalization of a logical subset of Goal Structuring

More information

Topic 6: Types COS 320. Compiling Techniques. Princeton University Spring Prof. David August. Adapted from slides by Aarne Ranta

Topic 6: Types COS 320. Compiling Techniques. Princeton University Spring Prof. David August. Adapted from slides by Aarne Ranta Topic 6: Types COS 320 Compiling Techniques Princeton University Spring 2015 Prof. David August 1 Adapted from slides by Aarne Ranta Types What is a type? Type Checking: Helps find language-level errors:

More information

Safe and Secure Software. Ada An Invitation to. Safe Syntax. Courtesy of. John Barnes. The GNAT Pro Company

Safe and Secure Software. Ada An Invitation to. Safe Syntax. Courtesy of. John Barnes. The GNAT Pro Company Safe and Secure Software An Invitation to Ada 2005 1 Safe Syntax Courtesy of The GNAT Pro Company John Barnes Syntax is often considered to be a rather boring mechanical detail. The argument being that

More information

Common Lisp Object System Specification. 1. Programmer Interface Concepts

Common Lisp Object System Specification. 1. Programmer Interface Concepts Common Lisp Object System Specification 1. Programmer Interface Concepts Authors: Daniel G. Bobrow, Linda G. DeMichiel, Richard P. Gabriel, Sonya E. Keene, Gregor Kiczales, and David A. Moon. Draft Dated:

More information

A Template for an Assurance Case Shall Be Known as an Assurance Case Template

A Template for an Assurance Case Shall Be Known as an Assurance Case Template A Template for an Assurance Case Shall Be Known as an Assurance Case Template Alan Wassyng With lots of help if not always encouragement from: Tom Maibaum, Mark Lawford, Neeraj Singh, Paul Joannou VeriSure:

More information

System Assurance and Related Standards

System Assurance and Related Standards System Assurance and Related Standards Dr. Ben Calloni, P.E., CISSP, OCRES Lockheed Martin Fellow, Cybersecurity Lockheed Martin Representative to OMG OMG Board of Directors Co-chair OMG System Assurance

More information

The Systematic Generation of Channelling Constraints

The Systematic Generation of Channelling Constraints The Systematic Generation of Channelling Constraints Bernadette Martínez-Hernández and Alan M. Frisch Artificial Intelligence Group, Dept. of Computer Science, Univ. of York, York, UK Abstract. The automatic

More information

Configuration Management for Component-based Systems

Configuration Management for Component-based Systems Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,

More information

Reusability Metrics for Object-Oriented System: An Alternative Approach

Reusability Metrics for Object-Oriented System: An Alternative Approach Reusability Metrics for Object-Oriented System: An Alternative Approach Parul Gandhi Department of Computer Science & Business Administration Manav Rachna International University Faridabad, 121001, India

More information

Requirements Engineering

Requirements Engineering Requirements Engineering An introduction to requirements engineering Gerald Kotonya and Ian Sommerville G. Kotonya and I. Sommerville 1998 Slide 1 Objectives To introduce the notion of system requirements

More information

Parameterized Complexity of Independence and Domination on Geometric Graphs

Parameterized Complexity of Independence and Domination on Geometric Graphs Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de

More information

PCP and Hardness of Approximation

PCP and Hardness of Approximation PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting

More information

CS:5810 Formal Methods in Software Engineering

CS:5810 Formal Methods in Software Engineering CS:5810 Formal Methods in Software Engineering Introduction to Alloy Part 1 Copyright 2001-17, Matt Dwyer, John Hatcliff, Rod Howell, Laurence Pilard, and Cesare Tinelli. Created by Cesare Tinelli and

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

EXTREME POINTS AND AFFINE EQUIVALENCE

EXTREME POINTS AND AFFINE EQUIVALENCE EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard

More information

Conceptual Data Modeling for the Functional Decomposition of Mission Capabilities

Conceptual Data Modeling for the Functional Decomposition of Mission Capabilities Conceptual Data Modeling for the Functional Decomposition of Mission Capabilities February 27, 2018 Andrew Battigaglia Andrew.Battigaglia@gtri.gatech.edu 1 Motivation Describing Data The purpose of a functional

More information

Instances of Instances Modeled via Higher-Order Classes

Instances of Instances Modeled via Higher-Order Classes Instances of Instances Modeled via Higher-Order Classes douglas foxvog Digital Enterprise Research Institute (DERI), National University of Ireland, Galway, Ireland Abstract. In many languages used for

More information

Designing MAS Organisation through an integrated MDA/Ontology Approach

Designing MAS Organisation through an integrated MDA/Ontology Approach Designing MAS Organisation through an integrated MDA/Ontology Approach Daniel Okouya 1 and Loris Penserini 1 and Sébastien Saudrais 2 and Athanasios Staikopoulos 2 and Virginia Dignum 1 and Siobhán Clarke

More information

D3.1 Validation workshops Workplan v.0

D3.1 Validation workshops Workplan v.0 D3.1 Validation workshops Workplan v.0 D3.1 Validation workshops Tasks and Steps The objectives within this deliverable are: To involve relevant stakeholders in the drafting of a certification process

More information

XI International PhD Workshop OWD 2009, October Fuzzy Sets as Metasets

XI International PhD Workshop OWD 2009, October Fuzzy Sets as Metasets XI International PhD Workshop OWD 2009, 17 20 October 2009 Fuzzy Sets as Metasets Bartłomiej Starosta, Polsko-Japońska WyŜsza Szkoła Technik Komputerowych (24.01.2008, prof. Witold Kosiński, Polsko-Japońska

More information

A Framework for Network Reliability Problems on Graphs of Bounded Treewidth

A Framework for Network Reliability Problems on Graphs of Bounded Treewidth A Framework for Network Reliability Problems on Graphs of Bounded Treewidth Thomas Wolle Institute of Information and Computing Sciences, Utrecht University P.O.Box 80.089, 3508 TB Utrecht, The Netherlands

More information

Review of Basic Software Design Concepts. Fethi Rabhi SENG 2021

Review of Basic Software Design Concepts. Fethi Rabhi SENG 2021 Review of Basic Software Design Concepts Fethi Rabhi SENG 2021 1 Topics The development process Planning Designing Implementing 2 1. The development process How to organise activities related to the creation,

More information

ISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation

ISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation INTERNATIONAL STANDARD ISO/IEC 15909-1 First edition 2004-12-01 Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation Ingénierie du logiciel et du système

More information

Notes on Binary Dumbbell Trees

Notes on Binary Dumbbell Trees Notes on Binary Dumbbell Trees Michiel Smid March 23, 2012 Abstract Dumbbell trees were introduced in [1]. A detailed description of non-binary dumbbell trees appears in Chapter 11 of [3]. These notes

More information

MDA and Integration of Legacy Systems: An Industrial Case Study

MDA and Integration of Legacy Systems: An Industrial Case Study MDA and Integration of Legacy Systems: An Industrial Case Study Parastoo Mohagheghi 1, Jan Pettersen Nytun 2, Selo 2, Warsun Najib 2 1 Ericson Norway-Grimstad, Postuttak, N-4898, Grimstad, Norway 1 Department

More information