Specification Methodology. Andy Reid, BT
|
|
- Amie Sutton
- 5 years ago
- Views:
Transcription
1 Specification Methodology Andy Reid, BT
2 Background Many systems, including telecommunications systems are specified and interconnected functional blocks Underpinned by formal mathematics of systems engineering theory and automata theory However, there are the following difficulties Tend to exclusively specification which generally do not include any specification of behaviour. Methods of representing abstract views tend to apply to the design phase of a system and cannot be defined after a system is operational. There is no well-established method for representing the process of deploying, activating, and the operating a virtual function. Commonly used techniques for specification do not directly address these requirements Modelling techniques such as UML have developed with data centric constructs increasingly embedded in the language Modelling techniques, even BPMN and SysML, have become ever more focussed on the design (ie coding) phase at the expense of the operational phase Need a technique which is Natural and easy extension of current techniques Capable of supporting and defining virtualisation Capable of supporting abstract, even abstract implemented while run time operational Deductive rather than assertive Mathematically sound and robust
3 Virtualisation Key Specification Requirement Virtualisation of functional blocks results in Division of a functional block between a host function and a virtualised network function Creation of a new container interface between host and VFB Division of the interface between an infrastructure interface and a virtualised interface. The virtualised functional block (VFB) is not a functional block independent of it host function The container interface is not an interface between functional blocks equivalent to other. al al Virtualised Infrastructure al Virtualised al al virtualisation Virtualised Container s Infrastructure al Virtualised al al Bloak
4 Basic Construction of Virtual s ports ports A Compound B Binding A B C Compound Port assigned to constructed function (marked as in use for the context of the compound function) A Constructed function C B Port assigned to constructed function (marked as in use for the context of the compound function)
5 The Basic Mechanism Virtual function dynamic State Configured State = virtual function Container Transfer function transfer function Generic al Partitioning of to create container interface Virtual function dynamic Virtual function dynamic Configured State = virtual function Container Virtual /State function transfer function virtual Configured State = virtual function Virtual function Container Virtual /State function transfer function virtual transfer function transfer function Formation of transfer function for virtual function ed virtual function Note: functional block may be distributed, parallel, and concurrent
6 Virtualisation a Recursive, Unifying Construct Outward recursion as well as inward recursion Virtual function dynamic State Configured = virtual function Container transfer function Every functional block is a virtual functional block Everything is always a configuration of a host Completely unifying construct Process, object, network, connection, CPU, storage, etc, are all virtual functional blocks
7 Virtual Abstract Domain Specific Language Run-Time Abstraction The VFB is, by nature, abstract Every viable abstract function is a virtual function Every (abstract) VFB can be implemented on a wide variety of hosts functions virtual Virtual function dynamic Configured State = virtual function Virtual function Container Virtual /State function transfer function transfer function virtual Domain specific languages (DSLs) Every container interface defines a configuration language a domain specific language (DSL) The run time of every DSL is a host function DSLs are layered as VFBs are layered Virtual function dynamic Configured State = virtual function Container transfer function
8 Absolute Specification and Relative Specification al Equivalence, Π-Calculus VFB can have a formal, precise, absolute specification value range, output value range, value range, transition transfer function (pure logic specification) VFB can have formal, precise, specification relative to host VFB, ie its defining configuration running code, reference implementation Need to establish equivalence Conformance testing (the practical and every day solution) Formal methods (difficult to scale and implement) Mathematical definition of equivalence strong bi-similarity Need to create ante hoc and/or post hoc equivalence Ante hoc formal sub-sets of VFB specification Post hoc translation interpreter, script, compiler Should have equivalence to π-calculus new is equivalent to reconfiguration in host VFB
9 Shannon Information Kolmogorov Information Shannon Information Four separate sets of Shannon Information virtual Virtual function dynamic Configured State = virtual function Container virtual transfer function Kolmogorov Information Defined as The complexity of an output signal (assumes no input) Measured by Length of shortest programme to create output Applies to Configurable transfer functions virtual Kolmogorov Information Virtual function dynamic Configured State = virtual function Container /State transfer function virtual
10 Application eg ETSI NFV ISG VI Container VM and Virtual Net Container s Compute Container s Infrastructure Network Domain
11
NFV and SDN. Andy Reid BT Research and Innovation
NFV and SDN Andy Reid BT Research and Innovation Clarifying what we mean by: SDN Separation of control plane logic/processing data plane header look up and forwarding Motivation Development of new control
More informationHaskell in the Software Industry
Haskell in the Software Industry What is Haskell? Haskell in a nutshell Haskell is a pure, non-strict, statically typed, garbage collected, general purpose, functional programming language. Early history
More informationModel-Driven Systems Engineering for Netcentric System of Systems With DEVS Unified Process
Model-Driven Systems Engineering for Netcentric System of Systems With DEVS Unified Process Saurabh Mittal, PhD Dunip Technologies, L3 Communications, USA Jose L. Risco Martin, PhD Universedad Complutense
More informationITU-T Y Next generation network evolution phase 1 Overview
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationInformal Semantics of Data. semantic specification names (identifiers) attributes binding declarations scope rules visibility
Informal Semantics of Data semantic specification names (identifiers) attributes binding declarations scope rules visibility 1 Ways to Specify Semantics Standards Documents (Language Definition) Language
More informationMWC 2015 End to End NFV Architecture demo_
MWC 2015 End to End NFV Architecture demo_ March 2015 demonstration @ Intel booth Executive summary The goal is to demonstrate how an advanced multi-vendor implementation of the ETSI ISG NFV architecture
More informationŁabiak G., Miczulski P. (IIE, UZ, Zielona Góra, Poland)
UML STATECHARTS AND PETRI NETS MODEL COMPARIS FOR SYSTEM LEVEL MODELLING Łabiak G., Miczulski P. (IIE, UZ, Zielona Góra, Poland) The system level modelling can be carried out with using some miscellaneous
More informationManaging Change and Complexity
Managing Change and Complexity The reality of software development Overview Some more Philosophy Reality, representations and descriptions Some more history Managing complexity Managing change Some more
More informationCom S 541. Programming Languages I
Programming Languages I Lecturer: TA: Markus Lumpe Department of Computer Science 113 Atanasoff Hall http://www.cs.iastate.edu/~lumpe/coms541.html TR 12:40-2, W 5 Pramod Bhanu Rama Rao Office hours: TR
More informationSemantics. There is no single widely acceptable notation or formalism for describing semantics Operational Semantics
There is no single widely acceptable notation or formalism for describing semantics Operational Describe the meaning of a program by executing its statements on a machine, either simulated or actual. The
More informationLecture 09. Ada to Software Engineering. Mr. Mubashir Ali Lecturer (Dept. of Computer Science)
Lecture 09 Ada to Software Engineering Mr. Mubashir Ali Lecturer (Dept. of dr.mubashirali1@gmail.com 1 Summary of Previous Lecture 1. ALGOL 68 2. COBOL 60 3. PL/1 4. BASIC 5. Early Dynamic Languages 6.
More informationProgram Proposal for a Direct Converted Program. BS in COMPUTER SCIENCE
Program Proposal for a Direct Converted Program BS in COMPUTER SCIENCE Document Page number Curriculum Sheet p. 2 p. -year Roadmap p. p. 5 Two Year Course Schedule p. 6 (2018 2019 AY and 2019 2020 AY)
More informationAn introduction to functional architecture Benjamin P. Niven-Jenkins, BT
An introduction to functional architecture Benjamin P. Niven-Jenkins, BT benjamin.niven-jenkins@bt.com Introduction This paper is intended to introduce the concepts and constructs of functional modelling
More informationAddressing Complexity in Connected & Autonomous Vehicles (and in fact everything else )
Addressing Complexity in Connected & Autonomous Vehicles (and in fact everything else ) 25.04.2018 Contents 1 Context and Background 2 The Architecture 3 SOA & SOA++ 4 SOA Connectivity Models 5 Summary
More informationA Study of High Performance Computing and the Cray SV1 Supercomputer. Michael Sullivan TJHSST Class of 2004
A Study of High Performance Computing and the Cray SV1 Supercomputer Michael Sullivan TJHSST Class of 2004 June 2004 0.1 Introduction A supercomputer is a device for turning compute-bound problems into
More informationChapter 3. Describing Syntax and Semantics ISBN
Chapter 3 Describing Syntax and Semantics ISBN 0-321-49362-1 Chapter 3 Topics Describing the Meanings of Programs: Dynamic Semantics Copyright 2015 Pearson. All rights reserved. 2 Semantics There is no
More informationIntroduction to Denotational Semantics
Introduction to Denotational Semantics Overview:! Syntax and Semantics! Approaches to Specifying Semantics! Sets, Semantic Domains, Domain Algebra, and Valuation Functions! Semantics of Expressions! Semantics
More informationSystem Design and Methodology/ Embedded Systems Design (Modeling and Design of Embedded Systems)
Design&Methodologies Fö 1&2-1 Design&Methodologies Fö 1&2-2 Course Information Design and Methodology/ Embedded s Design (Modeling and Design of Embedded s) TDTS07/TDDI08 Web page: http://www.ida.liu.se/~tdts07
More informationResearch and Implementation of Event Driven Multi Process Collaboration Interaction Platform Xiang LI * and Shuai ZHAO
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Implementation of Event Driven Multi Process Collaboration Interaction Platform
More informationLOGIC AND DISCRETE MATHEMATICS
LOGIC AND DISCRETE MATHEMATICS A Computer Science Perspective WINFRIED KARL GRASSMANN Department of Computer Science University of Saskatchewan JEAN-PAUL TREMBLAY Department of Computer Science University
More informationDistributed Systems Programming (F21DS1) Formal Verification
Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on
More informationITM DEVELOPMENT (ITMD)
ITM Development (ITMD) 1 ITM DEVELOPMENT (ITMD) ITMD 361 Fundamentals of Web Development This course will cover the creation of Web pages and sites using HTML, CSS, Javascript, jquery, and graphical applications
More informationLecture Notes on Program Equivalence
Lecture Notes on Program Equivalence 15-312: Foundations of Programming Languages Frank Pfenning Lecture 24 November 30, 2004 When are two programs equal? Without much reflection one might say that two
More informationSECURING FUTURE RADIO TECHNOLOGIES IN THE VIRTUALISED WORLD. The RRS impact on Security in Radio
SECURING FUTURE RADIO TECHNOLOGIES IN THE VIRTUALISED WORLD The RRS impact on Security in Radio Your speaker Scott CADZOW Director, Consultant, Security Expert, Standards developer, Pen tester, Cryptanalyst
More informationModeling, Testing and Executing Reo Connectors with the. Reo, Eclipse Coordination Tools
Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Modeling, Testing and Executing Reo Connectors with the
More informationModelling in Enterprise Architecture. MSc Business Information Systems
Modelling in Enterprise Architecture MSc Business Information Systems Models and Modelling Modelling Describing and Representing all relevant aspects of a domain in a defined language. Result of modelling
More informationDesign of Embedded Systems
Design of Embedded Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-01-02 José Costa (DEI/IST) Design of Embedded Systems 1
More informationElastic Network Functions: Opportunities and Challenges
Elastic Network Functions: Opportunities and Challenges Robert Szabo (Ericsson Research) EU-FP7-UNIFY Project UNIFY is co-funded by the European Commission DG CONNECT in FP7 Outline ETSI Elastic VNF with
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/22891 holds various files of this Leiden University dissertation Author: Gouw, Stijn de Title: Combining monitoring with run-time assertion checking Issue
More informationONAP CCVPN Blueprint Overview. ONAP CCVPN Blueprint Improves Agility and Provides Cross-Domain Connectivity. ONAP CCVPN Blueprint Overview 1
ONAP CCVPN Blueprint Overview ONAP CCVPN Blueprint Improves Agility and Provides Cross-Domain Connectivity ONAP CCVPN Blueprint Overview 1 OVERVIEW: Build high-bandwidth, flat OTN (Optical Transport Networks)
More informationPrinciples of Program Analysis. Lecture 1 Harry Xu Spring 2013
Principles of Program Analysis Lecture 1 Harry Xu Spring 2013 An Imperfect World Software has bugs The northeast blackout of 2003, affected 10 million people in Ontario and 45 million in eight U.S. states
More informationONAP VoLTE Use Case Solution Brief
ONAP VoLTE Use Case Solution Brief ONAP Voice over LTE Improves Agility and Slashes Costs for Communication Service Providers ONAP VoLTE Use Case Solution Brief 1 By using ONAP to support the VoLTE use
More informationImplementing Scheduling Algorithms. Real-Time and Embedded Systems (M) Lecture 9
Implementing Scheduling Algorithms Real-Time and Embedded Systems (M) Lecture 9 Lecture Outline Implementing real time systems Key concepts and constraints System architectures: Cyclic executive Microkernel
More informationEnhancing Business Processes Using Semantic Reasoning. Monica. J. Martin Sun Java Web Services. 26 May
Enhancing Business Processes Using Semantic Reasoning Monica. J. Martin Sun Java Web Services www.sun.com 26 May 2005 Presentation Outline Industry landscape Standards landscape Needs for and use of semantic
More informationCS/ECE 5780/6780: Embedded System Design
CS/ECE 5780/6780: Embedded System Design John Regehr Lecture 18: Introduction to Verification What is verification? Verification: A process that determines if the design conforms to the specification.
More informationApplying UML Modeling and MDA to Real-Time Software Development
Michael Benkel Aonix GmbH www.aonix.de michael.benkel@aonix.de Applying UML Modeling and MDA to Real-Time Software Development The growing complexity of embedded real-time applications requires presentation
More information1. true / false By a compiler we mean a program that translates to code that will run natively on some machine.
1. true / false By a compiler we mean a program that translates to code that will run natively on some machine. 2. true / false ML can be compiled. 3. true / false FORTRAN can reasonably be considered
More informationAn Information Model for High-Integrity Real Time Systems
An Information Model for High-Integrity Real Time Systems Alek Radjenovic, Richard Paige, Philippa Conmy, Malcolm Wallace, and John McDermid High-Integrity Systems Group, Department of Computer Science,
More informationModel Driven Engineering (MDE)
Model Driven Engineering (MDE) Yngve Lamo 1 1 Faculty of Engineering, Bergen University College, Norway 26 April 2011 Ålesund Outline Background Software Engineering History, SE Model Driven Engineering
More informationFormal Methods in Software Design. Markus Roggenbach
Formal Methods in Software Design Markus Roggenbach October 2001 2 Formal Methods Use of mathematics in software development main activities: writing formal specifications 2 Formal Methods Use of mathematics
More informationWHITE PAPER. Applying Software-Defined Security to the Branch Office
Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry
More informationCOURSE: DATA STRUCTURES USING C & C++ CODE: 05BMCAR17161 CREDITS: 05
COURSE: DATA STRUCTURES USING C & C++ CODE: 05BMCAR17161 CREDITS: 05 Unit 1 : LINEAR DATA STRUCTURES Introduction - Abstract Data Types (ADT), Arrays and its representation Structures, Stack, Queue, Circular
More informationChoosing IP-XACT IEEE 1685 standard as a unified description for timing and power performance estimations in virtual platforms platforms
hoosing IP-XAT IEEE 1685 standard as a unified description for timing and power performance estimations in virtual platforms platforms Emmanuel Vaumorin (Magillem Design Services) Motivation New needs
More informationTowards more robust internetworks:
Towards more robust internetworks: an application of graph theory Authors Jamie Greenwood, MSc (Royal Holloway, 2016) Stephen Wolthusen, ISG, Royal Holloway Abstract As networks become increasingly connected
More informationREVIEW AND OUTLOOKS OF THE MEANS FOR VISUALIZATION OF SYNTAX SEMANTICS AND SOURCE CODE. PROCEDURAL AND OBJECT ORIENTED PARADIGM DIFFERENCES
REVIEW AND OUTLOOKS OF THE MEANS FOR VISUALIZATION OF SYNTAX SEMANTICS AND SOURCE CODE. PROCEDURAL AND OBJECT ORIENTED PARADIGM DIFFERENCES Hristo Hristov Abstract. In the article, we have reviewed the
More information3.4 Deduction and Evaluation: Tools Conditional-Equational Logic
3.4 Deduction and Evaluation: Tools 3.4.1 Conditional-Equational Logic The general definition of a formal specification from above was based on the existence of a precisely defined semantics for the syntax
More informationCloud Computing For Researchers
Cloud Computing For Researchers August, 2016 Compute Canada is often asked about the potential of outsourcing to commercial clouds. This has been investigated as an alternative or supplement to purchasing
More informationExperiences with OWL-S, Directions for Service Composition:
Experiences with OWL-S, Directions for Service Composition: The Cashew Position Barry Norton 1 Knowledge Media Institute, Open University, Milton Keynes, UK b.j.norton@open.ac.uk Abstract. Having used
More information1 Executive Overview The Benefits and Objectives of BPDM
1 Executive Overview The Benefits and Objectives of BPDM This is an excerpt from the Final Submission BPDM document posted to OMG members on November 13 th 2006. The full version of the specification will
More informationFormal Verification for UML/SysML models
Formal Verification for UML/SysML models IBM Research Lab - Haifa Content Formal verification v.s. testing Correctness properties Formal verification for Rhapsody models 2 Formal Verification Desired Properties
More informationLocal Specialization in Open-Axiom
Local Specialization in Open-Axiom Jacob Smith Yue Li Yuriy Solodkyy Gabriel Dos Reis Jaakko Järvi September 1, 2009 Abstract Most algebraic structures in computational mathematics are instances of functors.
More informationDEPARTMENT OF INFORMATION TECHNOLOGY, HIGHER COLLEGE OF TECHNOLOGY ( Semester 1 ) Post Foundation Final Examination Schedule - Ver 1.
Page 1 of 6 DAY 1 12/12/2018 Wednesday ITIS4101 ITIS4203 ITNT4102 ITSE4100 ITSE4102 ITDB4102 Network Security Management Portal Management Ad-hoc Wireless Mobile Networking Formal Language and Automata
More informationHippo Software BPMN and UML Training
Hippo Software BPMN and UML Training Icon Key: www.hippo-software.co.uk Teaches theory concepts and notation Teaches practical use of Enterprise Architect Covers BPMN, UML, SysML, ArchiMate Includes paper
More informationPart I: Preliminaries 24
Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 2 2. Why are there so many programming languages?... 2 3. What makes a language successful?... 2 4. Programming Domains... 3 5. Language and Computer Architecture... 4 6.
More informationEnterprise Architect Training Courses
On-site training from as little as 135 per delegate per day! Enterprise Architect Training Courses Tassc trainers are expert practitioners in Enterprise Architect with over 10 years experience in object
More informationRECURSIVE DEFINITION, BASED ON A META-MODEL, FOR THE TYPE SYSTEM OF COMPLEX COMPUTING SYSTEMS ARCHITECTURES
An. Şt. Univ. Ovidius Constanţa Vol. 12(1), 2004, 45 58 RECURSIVE DEFINITION, BASED ON A META-MODEL, FOR THE TYPE SYSTEM OF COMPLEX COMPUTING SYSTEMS ARCHITECTURES Abstract A theoretical abstract analysis
More informationCOrDeT Cannes : Use of domain engineering process to develop reusable architectures and building-blocks
COrDeT Cannes : Use of domain engineering process to develop reusable architectures and building-blocks G. Garcia 1, X. Olive 1, A. Pasetti 2, O. Rohlik 2, T. Vardanega 3, A.-I. Rodríguez-Rodríguez 4 A.
More information7. Introduction to Denotational Semantics. Oscar Nierstrasz
7. Introduction to Denotational Semantics Oscar Nierstrasz Roadmap > Syntax and Semantics > Semantics of Expressions > Semantics of Assignment > Other Issues References > D. A. Schmidt, Denotational Semantics,
More informationLearning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels
Learning Outcomes Extended OS An appreciation that the abstract interface to the system can be at different levels. Virtual machine monitors (VMMs) provide a lowlevel interface An understanding of trap
More informationScheme of Studies. BS Computer Science
Department of Computer Science and Information Technology Scheme of Studies BS Computer Science Eligibility: Minimum 2nd division or equivalent qualification in intermediate or equivalent qualification
More informationFormal Verification. Lecture 10
Formal Verification Lecture 10 Formal Verification Formal verification relies on Descriptions of the properties or requirements of interest Descriptions of systems to be analyzed, and rely on underlying
More informationImplementação de Linguagens 2016/2017
Implementação de Linguagens Ricardo Rocha DCC-FCUP, Universidade do Porto ricroc @ dcc.fc.up.pt Ricardo Rocha DCC-FCUP 1 Logic Programming Logic programming languages, together with functional programming
More informationCIS 1.5 Course Objectives. a. Understand the concept of a program (i.e., a computer following a series of instructions)
By the end of this course, students should CIS 1.5 Course Objectives a. Understand the concept of a program (i.e., a computer following a series of instructions) b. Understand the concept of a variable
More informationMODEL BASED TEST DESIGN AT UNITY
Sophia Antipolis, French Riviera 20-22 October 2015 MODEL BASED TEST DESIGN AT UNITY Marek Turski, Ilya Turshatov, Tomasz Paszek Unity Technologies All rights reserved Unity Technologies Provider of an
More informationProofs-Programs correspondance and Security
Proofs-Programs correspondance and Security Jean-Baptiste Joinet Université de Lyon & Centre Cavaillès, École Normale Supérieure, Paris Third Cybersecurity Japanese-French meeting Formal methods session
More informationPotential new case studies for behavioural types: Switching software systems
Potential new case studies for behavioural types: Switching software systems Faculty of Engineering University of Rijeka Croatia Summary Introduction Switching software System requirements Related work
More informationStored Relvars 18 th April 2013 (30 th March 2001) David Livingstone. Stored Relvars
Stored Relvars Introduction The purpose of a Stored Relvar (= Stored Relational Variable) is to provide a mechanism by which the value of a real (or base) relvar may be partitioned into fragments and/or
More informationTo be or not programmable Dimitri Papadimitriou, Bernard Sales Alcatel-Lucent April 2013 COPYRIGHT 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED.
To be or not programmable Dimitri Papadimitriou, Bernard Sales Alcatel-Lucent April 2013 Introduction SDN research directions as outlined in IRTF RG outlines i) need for more flexibility and programmability
More informationUsing LNT Formal Descriptions for Model-Based Diagnosis
Using LNT Formal Descriptions for Model-Based Diagnosis Birgit Hofer 1, Radu Mateescu 2, Wendelin Serwe 2, and Franz Wotawa 1 1 TU Graz, Institute for Software Technology 2 Univ. Grenoble Alpes, Inria,
More informationAdministrivia. ECE/CS 5780/6780: Embedded System Design. Acknowledgements. What is verification?
Administrivia ECE/CS 5780/6780: Embedded System Design Scott R. Little Lab 8 status report. Set SCIBD = 52; (The Mclk rate is 16 MHz.) Lecture 18: Introduction to Hardware Verification Scott R. Little
More informationTHE APPROACH TO PROGRAMMING AGENT-BASED SYSTEMS. Dmitry Cheremisinov Liudmila Cheremisinova
THE APPROACH TO PROGRAMMING AGENT-BASED SYSTEMS Dmitry Cheremisinov Liudmila Cheremisinova The United Institute of Informatics Problems of National Academy of Sciences of Belarus 8-th International Workshop
More informationCognitive Complexity of Boolean Problems
Cognitive Complexity of Boolean Problems Ilya Levin, Gabriel Shafat, Osnat Keren School of Education, Tel Aviv University, School of Engineering, Bar Ilan University, Israel 10th International Workshop
More informationModel driven Engineering & Model driven Architecture
Model driven Engineering & Model driven Architecture Prof. Dr. Mark van den Brand Software Engineering and Technology Faculteit Wiskunde en Informatica Technische Universiteit Eindhoven Model driven software
More informationMobile World Congress 2016 OPEN SOURCE MANO (OSM) E2E Orchestration Demo. February 2016
osm.etsi.org Mobile World Congress 2016 OPEN SOURCE MANO () E2E Orchestration Demo February 2016 Open Source MANO () aims to accelerate NFV adoption around a common IM for orchestration Delivering an open
More informationAutomata and Formal Languages - CM0081 Introduction to Agda
Automata and Formal Languages - CM0081 Introduction to Agda Andrés Sicard-Ramírez Universidad EAFIT Semester 2018-2 Introduction Curry-Howard correspondence Dependent types Constructivism Martin-Löf s
More informationLecture content. Course goals. Course Introduction. TDDA69 Data and Program Structure Introduction
Lecture content TDDA69 Data and Program Structure Introduction Cyrille Berger Course Introduction to the different Programming Paradigm The different programming paradigm Why different paradigms? Introduction
More informationHardware Description Languages & System Description Languages Properties
Hardware Description Languages & System Description Languages Properties There is a need for executable specification language that is capable of capturing the functionality of the system in a machine-readable
More informationThe Future of Campus Video Surveillance
The Future of Campus Video Surveillance Thursday, Dec. 6, 2018 08:30 a.m. 09:30 a.m. Mark Bonde Parallel Technologies Mark Bonde Publisher IPVS Magazine Publication Focused on the transition from Analog
More informationBy: Chaitanya Settaluri Devendra Kalia
By: Chaitanya Settaluri Devendra Kalia What is an embedded system? An embedded system Uses a controller to perform some function Is not perceived as a computer Software is used for features and flexibility
More informationModule 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur
Module 3 Requirements Analysis and Specification Lesson 6 Formal Requirements Specification Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a formal
More informationCourse notes for Data Compression - 2 Kolmogorov complexity Fall 2005
Course notes for Data Compression - 2 Kolmogorov complexity Fall 2005 Peter Bro Miltersen September 29, 2005 Version 2.0 1 Kolmogorov Complexity In this section, we present the concept of Kolmogorov Complexity
More informationETSI ETR 046 TECHNICAL July 1992 REPORT
ETSI ETR 046 TECHNICAL July 1992 REPORT Source: ETSI TC-NA Reference: DTR/NA-43303 ICS: 33.080 Key words: TMN, modelling Network Aspects (NA); Telecommunications management networks modelling guidelines
More informationWhere are you with your Cloud or Clouds? Simon Kaye Dr Cloud
Where are you with your Cloud or Clouds? Simon Kaye Dr Cloud 15 th September, 2011 2 3 Cloud Computing definitions are varying, but a common set of attributes can be identified 4 Organizations need to
More informationMulti-Board Systems Design
Multi-Board Systems Design D A T A S H E E T MAJOR BENEFITS: Xpedition optimizes multi-board system design from logical system definition through manufacturing. Overview Electronic multi-board systems
More informationIntroduction to Formal Methods
2008 Spring Software Special Development 1 Introduction to Formal Methods Part I : Formal Specification i JUNBEOM YOO jbyoo@knokuk.ac.kr Reference AS Specifier s Introduction to Formal lmethods Jeannette
More informationSWE 760 Lecture 1: Introduction to Analysis & Design of Real-Time Embedded Systems
SWE 760 Lecture 1: Introduction to Analysis & Design of Real-Time Embedded Systems Hassan Gomaa References: H. Gomaa, Chapters 1, 2, 3 - Real-Time Software Design for Embedded Systems, Cambridge University
More informationETSI Plugtests Test Plan V1.0.0 ( ) 2 nd ETSI NFV Plugtests Sophia Antipolis, France 15 th 19 th January 2018
Plan V1.0.0 (2018-02) 2 nd ETSI NFV Plugtests Sophia Antipolis, France 15 th 19 th January 2018 2 ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4
More informationParallel and High Performance Computing CSE 745
Parallel and High Performance Computing CSE 745 1 Outline Introduction to HPC computing Overview Parallel Computer Memory Architectures Parallel Programming Models Designing Parallel Programs Parallel
More informationIntroduction to Software Engineering
Introduction to Software Engineering Gérald Monard Ecole GDR CORREL - April 16, 2013 www.monard.info Bibliography Software Engineering, 9th ed. (I. Sommerville, 2010, Pearson) Conduite de projets informatiques,
More informationSide Effects (3A) Young Won Lim 1/13/18
Side Effects (3A) Copyright (c) 2016-2018 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later
More informationTeraVM in CloudNFV Test Data as a Service (TDaaS)
TeraVM in CloudNFV Test Data as a Service (TDaaS) Solution Brief CloudNFV overview TeraVM in CloudNFV Test Data as a Service 1 CloudNFV overview... 3 1.1 Service Models in CloudNFV...4 1.2 Test Data as
More informationETSI documents published or circulated for vote/comment in May 2018
ETSI documents published or circulated for vote/comment in May 2018 ETSI documents issued under AP20180806. Comments should be sent to the named contact by 07/07/2018 EN 303 423 Environmental Engineering
More informationSoftware Engineering with Objects and Components Open Issues and Course Summary
Software Engineering with Objects and Components Open Issues and Course Summary Massimo Felici Software Engineering with Objects and Components Software development process Lifecycle models and main stages
More informationUbiquitous and Open Access: the NextGen library. Edmund Balnaves, Phd. Information Officer, IFLA IT Section
Ubiquitous and Open Access: the NextGen library Edmund Balnaves, Phd Information Officer, IFLA IT Section Director, Australian Library and Information Association Director, Prosentient Systems ejb@prosentient.com.au
More informationNetwork Virtualisation Reference architecture and ecosystem_. Telefónica Global CTO
Network isation Reference architecture and ecosystem_ Telefónica I+D @ Global CTO 18.03.2014 A future-proof network architecture requires distributing data plane intensive functions and centralising control
More informationVerification Overview Testing Theory and Principles Testing in Practice. Verification. Miaoqing Huang University of Arkansas 1 / 80
1 / 80 Verification Miaoqing Huang University of Arkansas Outline 1 Verification Overview 2 Testing Theory and Principles Theoretical Foundations of Testing Empirical Testing Principles 3 Testing in Practice
More informationMetaSuite : Advanced Data Integration And Extraction Software
MetaSuite Technical White Paper March, 2000 A Minerva SoftCare White Paper MetaSuite : Advanced Data Integration And Extraction Software WP-FPA-101998 Content CAPITALIZE ON YOUR VALUABLE LEGACY DATA 3
More informationINTRODUCTION TO MATHEMATICAL PROOFS: A TRANSITION (TEXTBOOKS IN MATHEMATICS) BY CHARLES ROBERTS
Read Online and Download Ebook INTRODUCTION TO MATHEMATICAL PROOFS: A TRANSITION (TEXTBOOKS IN MATHEMATICS) BY CHARLES ROBERTS DOWNLOAD EBOOK : INTRODUCTION TO MATHEMATICAL PROOFS: A Click link bellow
More informationSysML Past, Present, and Future. J.D. Baker Sparx Systems Ambassador Sparx Systems Pty Ltd
SysML Past, Present, and Future J.D. Baker Sparx Systems Ambassador Sparx Systems Pty Ltd A Specification Produced by the OMG Process SysML 1.0 SysML 1.1 Etc. RFI optional Issued by Task Forces RFI responses
More information