level requirement for hardware reliability could be satisfied by a policy of shadowed pairs or one of majority voting. Different engineering roles use

Size: px
Start display at page:

Download "level requirement for hardware reliability could be satisfied by a policy of shadowed pairs or one of majority voting. Different engineering roles use"

Transcription

1 TRACEABILITY FOR COMPLEX SYSTEMS ENGINEERING Stephanie White Grumman Aerospace & Electronics Mail Stop B38-35 Bethpage, NY Abstract. Improved requirements traceability would result in significant cost savings since more requirements problems are due to failures in requirements management than failures in technical functions. Without adequate requirements traceability, errors are found late in system development and are expensive to repair. Our research identifies problems with industry's capability to trace product and process information, and 1 offers some solutions. We have defined a unique method, Concurrent Stimulus-Response Threads (CSRT), that traces complex system behavior. Based on CSRT and Entity-Relationship modeling, we make recommendations that will improve traceability in two requirements methods, Requirements Driven Design (RDD), and Real-Time Structured Analysis (RT-SA). ISSUES IN TRACING SYSTEM INFORMATION The complexity of DOD systems is enormous and engineers developing these systems require traceability. System engineers need the capability to control change, control the process, and control risk. Maintenance engineers need traceability to better understand the product, and the process used to develop the system. All engineers need quick access to information, and since the information is vast and complex, engineers need information abstraction and visualization techniques that help promote understanding. Unfortunately tracing is difficult with current technology, and minimally supported. It is expensive to capture information. Tools cross disciplines and do not have the same lexicon. We cannot measure the benefits This research was performed under contract to Naval Surface Warfare Center, Dahlgren Division, White Oak Detachment, and was funded under the Engineering of Complex Systems Technology Program sponsored by the Office of Naval Research, Contract Number N C of traceability, and the cost is high. We do not know the level of granularity at which to trace, and how to represent much of the information that should be traced (e.g., behavior, non-functional requirements). In most cases, DOD customers are not asking for software traceability except for that covered in DOD-STD 2167A. This standard addresses traceability of documentation (requirements, design, implementation, test cases), and traceability of unit Software Development Folders to component Software Development Folders. Engineers need greater capability for traceability. They must be notified of changes, and should rigorously trace their impact. Change can affect cost, schedule and feasibility, system design and implementation, system tests, and support software and hardware. Engineers need traceability to assess system artifacts during development. They should assess whether the system is under or over designed, specifications contradict each other, lower level decisions are consistent with higher level decisions, test cases cover requirements, detailed behavior and high level behavior are consistent, and non-functional requirements are met. Current traceability aids are reasonably good for product functions, but are limited for tracing system behavior and product attributes (Director of Defense, Research and Engineering '91). Behavior is difficult to trace using current methods, as behavior is specified by stimulus-response statements that cross functional lines. Current trace mechanisms link stimulus-response paths to a significantly large system subset or the entire system. Current methods manage product attributes such as timing and reliability as they would manage weight, by allocating a portion to a component. However, timing and reliability are emergent properties and cross functional boundaries. These properties cannot be analyzed by examining each component in isolation. Timing and reliability vary by scenario, and should be traced to these scenarios. Current methods trace high level requirements for reliability, availability, security, and safety directly to lower level requirements. In many cases, high level requirements for these attributes should be traced to a high level design policy, and that policy should be traced to the lower level requirements. For example, a high

2 level requirement for hardware reliability could be satisfied by a policy of shadowed pairs or one of majority voting. Different engineering roles use information for different purposes. There may even be a conflict between roles. For example, reliability engineers are interested in availability and safety engineers do not want any failures. For this reason the stakeholders themselves must decide what should be traced. Because there is a vast amount of information, these engineers need automated support for capturing and linking information while performing their normal engineering functions. All information may not have to be collected and stored. Some information can be derived automatically by smart tools. RESEARCH OVERVIEW Our research solves problems in tracing system behavior. We have defined a formal method, Concurrent Stimulus-Response Threads (CSRT), for representing and tracing threads (White '93). CSRT represents system behavior in a manner that can be traced throughout the system. These threads of behavior relate system stimulus to system response, and relate environment and system events with system functions. Threads of requirements can be traced to threads in the system design and implementation to determine if behavioral requirements are implemented correctly. Concurrent Stimulus-Response Threads define ordered histories of interaction among system aspects and the environment, providing an excellent mechanism for defining threads for testing. While formal, CSRT is practical for use on large projects. Because CSRT is formal, it is reasonable to assume that analysis techniques such as temporal logic could be used to reason about system threads. We also investigated two requirements methods for real-time systems, RDD and RT-SA, to determine if their languages adequately support traceability and to identify the strengths and weaknesses of each. A method's language is important for traceability, as information that is not specified cannot be traced. We have identified weaknesses in both languages that can be repaired. We achieved this by examining the entities and relationships each method uses to express requirements. This work was based on previous research documented in (White '87). In order to compare languages, we have formally defined the semantics of each language in Entity-Relationship-Attribute (ERA) format. RDD entities and relationships were abstracted from RDD language reference manuals and training materials (Ascent Logic '92). A formal definition of the RT-SA language as expressed in both (Mellor and Ward '85) and (Hatley and Pirbhai '87) was not previously available and a definition of RT-SA in ERA format is a contribution of our research. CSRT Existing methods that organize system behavior by function and object provide poor visibility of interfunctional threads through the system. Because behavior is divided among a number of functions, system engineers find it difficult to verify that the entire thread from environment stimulus to system response is complete, that inter-component aspects are consistent, and that no unnecessary functions are included. This inability to verify the completeness and consistency of inter-functional threads is inherent in existing methods, and is a problem even when one engineer is creating the design. The problem is compounded on a large system with several contractors and numerous designers. Engineers need a method for identifying critical stimulus-response threads that cut horizontally across objects and functions in the requirements model. They need a method that can trace these system threads to more detailed threads, and to threads in the design and implementation. Our approach, Concurrent Stimulus- Response Threads (CSRT) formally defines threads of system behavior. This creates a firm foundation for tracing and analyzing critical threads. The highest level threads are the system requirements. These threads specify the environment stimulus and the system response. More detailed requirement and design threads define paths of system operation from system stimulus to system response that implement the high level requirement. Once the system stimulus occurs, other environment or system events can occur (e.g., a failure). Each thread is uniquely determined by a specific sequence of these conditions and events. The threads specify the behavior of the system in response to the conditions and events. We define a single thread of behavior T as an alternating sequence of events and processes, T = E, P, E, P, E, P,...,E, P n n where an event E is a compound expression of events i and conditions or a sequence of events. Examples: Ei = E 1 when C 1 OR C2 E i = E 1 when C 1 AND C2 E i = E 1, E 2, E 3... En

3 Thread 1 AND Thread 2 Event 1: Coin Accept & Count Coins Event 1: Customer Selection Respond to Customer Selection Thread 2.1 OR Thread 2.2 Event 1: Customer Selection is Coin Return Respond to Return Coin Request Event 1: Customer Selection is Product Selection Provide Product Thread OR Thread Event 1: Customer Selection is Product Selection Validate Payment Event 2: Payment Invalid Process 2: Return Coins Event 1: Customer Selection is Product Selection Validate Payment Event 2: Payment Valid Process 2: Dispense Product & Change Figure 2 Soda Vending Machine Threads A process P is a sequence of processes or a set of j concurrent processes, but cannot consist of alternate processes as disjuncture indicates separate threads. Examples: P = P, P, P... P j j1 j2 j3 jn P = P & P & P j j1 j2 j3 In a single thread, Pj cannot be represented as P j1 OR P j2. Assume a thread T: T = E, P, E, P, E, P,...,E, P n n A more detailed version of T, called T' will include the events and processes of T. In T', the events may be expressed in terms of more detailed data items, the processes may be expanded into more detailed threads, and new events and processes may be added (e.g., to handle interfaces due to allocation), see Fig. 1. Each thread T should be traced to the more detailed thread T'. Our concept is that threads should be generated from existing models, for example from RDD, RT-SA, or Object Oriented methods. We do not recommend developing a new modeling method based on threads. In Fig. 2, we show several threads for a soda vending machine that were manually generated from an RT-SA model by examining data flow diagrams and unraveling state machines. In (White '93) we also generate threads from an RDD model of the soda vending machine. The methods used for generating threads from RT-SA and RDD models could be automated. Figure 2 shows threads of soda vending machine behavior, at several levels of abstraction. At the top level, we have two concurrent threads, Thread 1: React to Coin, and Thread 2: React to Customer Selection. Thread 2 traces to two threads, Thread 2.1: React to Coin Return Request, and

4 Thread 2.2: React to Product Selection. Threads 2.1 and 2.2 are alternate threads for the entire Thread 2. They are not an expansion of a particular function in Thread 2. Thread 2.2 traces to two alternate threads, Thread 2.2.1: React to Product Selection and Payment Invalid, and Thread 2.2.2: React to Product Selection and Payment Valid. Note that each thread can be uniquely identified by a specific sequence of conditions and events. In this paper we trace threads within the same model, but related threads should also be traced between requirements, design, and implementation. Developers need these thread views of system behavior to isolate and understand different scenarios of system operation, and to be sure that threads are consistent and requirements are met. SUPPORT FOR TRACING IN CURRENT METHODS Requirements and design methods capture information about a system. Frequently, this information is formally defined using an Entity Relationship Attribute (ERA) notation. The ERA notation is especially useful for supporting information capture in a database and traceability. The schema defines entities and entity attributes that the modeler can use to describe a system, and relationships that the modeler can use to link entities. Engineers should trace entities, attributes, and relationships to the design and implementation. For example, in Fig. 3, relationship 210 indicates that Functions are activated by an Event when a Condition is true. Engineers should trace this relationship for specific functions, events, and conditions, to ensure that functions in the design and implementation are activated under the proper circumstances. Methods and tools that define models semiformally (e.g. via graphics and tables), should capture information in ERA or other formal notation. Many structured analysis tools do not capture all relationships in a form that can be traced. In order to encourage traceability when using RT-SA, we have formalized the language as represented in the two most popular books on Structured Analysis, "Structured Development for Real- Time Systems" (Mellor and Ward '85), and "Strategies for Real-Time System Specification" (Hatley and Pirbhai '87). We do not address entities and relationships captured by a specific tool, as there are numerous tools that support the structured analysis method. We have captured the RDD language in the same ERA format to compare information that the two methods can express. We found slightly different descriptions of the schema in the RDD User Manual, RDD Dynamic Verification Facility Manual, and RDD Training Material, perhaps because they were written at different times. Our description of RDD entities, relationships, and attributes is taken primarily from the training material. The following recommendations are based on our comparison of the ERA models for RT-SA and RDD. IMPROVING RT-SA FOR TRACEABILITY RDD was designed as a systems engineering method, and RT-SA was first designed as a software engineering method. This discipline focus accounts for use of words such as Function, Component, and Item in RDD, and use of words such as Process, Module, Data Flow, and DataStore in RT-SA. RDD has certain capabilities because of its system engineering focus that can be used to improve RT-SA. RT-SA does not trace derived requirements such as functions, data flows, and states to System Requirements or the Source of these requirements, nor does it capture Critical Issues, Decisions, Constraints, System Parameters (such as reliability), and Performance Indices (such as mean time to failure), all of which are expressible in RDD. This information is as important for software traceability as it is for system traceability. Also RDD can identify and trace sequences of data that enter and leave the system. RT-SA cannot specify the time history of stimuli or the time history of responses as single items. This history is only visible through state machine behavior and is not traceable. The concept of Interfaces is more fully developed and complete in RDD. By examining RDD interface relationships, we determine that an interface is defined by communication devices, functions that service the interface, components and systems that are connected by the interface, and data or things that cross the interface. Interface requirements that are specified using these entities and relationships can be traced, to verify that designs and implementation are consistent and complete. Function replication and control (e.g., for multiple elevators) is well representedin RDD. RT-SA does not have any mechanisms for representing this structure. Replicated functions should be traceable to an attribute that specifies limits on the number of functions, and should be traceable to their implementation. IMPROVING RDD FOR TRACEABILITY States and Events are not recognized as entities in RDD, as they are in RT-SA. RDD is based on the premise that sequences of Items (things or data) arrive at See Appendix A for a definition of terms. 2

5 the System; Functions transform those Items; and the system state is represented by the state of Items in the system after transformations are performed. State and Event are implicit rather than explicit, and cannot be traced. In addition, RDD does not relate conditions that determine function flow to Items (things, data) on which conditions are based. Also, RDD does not have a specific item to represent a Data Store, so the modeler cannot easily represent the updating of persistent data by various Functions. Although this is a drawback graphically, it is not too harmful from a traceability point of view. RDD can relate Items to their subparts and to Functions that generate and use them, and the attribute State Item allows the modeler to indicate that data is persistent, as opposed to transient. Ascent Logic should upgrade RDD to include the concepts of State, Event, and Data Store, and should relate conditions to Items. RDD does not support information modeling, while RT-SA does. This capability would be helpful for understanding the relationship among "things" and data in the system, and ensuring that these relationships are preserved in the implementation. IMPROVING BOTH RT-SA AND RDD Neither RDD nor RT-SA can identify a unique system Thread and trace this thread to less abstract threads at a more detailed level of system specification. This capability is needed to verify requirements with customers, and to support test and integration. A thread view is also needed for ensuring that required order is preserved between requirements, design and implementation. We recommend that CSRT be used with RT-SA and RDD. Neither method traces Positions, Arguments, and Assumptions as in (Ramesh and Luqi '93). These entities are needed to understand and trace the design and decision making process during system development and re- engineering. The capture and tracing of these entities supports understanding, tradeoff analysis, and change impact analysis. Many tools that implement RT-SA and RDD, fail to formally capture some relationships that are expressed graphically. In RT-SA, we can express graphically in a State Transition Diagram, that an Event occurring in a State causes an Action. However, many tools trace the state transition diagram (STD), but not relationships embodied in the STD. If we expressed state transition relationships in ERA format as in Fig. 4, we could trace these relationships to system design and implementation. FUTURE WORK We intend to integrate formal methods for specifying thread interdependencies with CSRT, and develop methods for analyzing thread consistency. In Fig. 1, T represents a single thread, but complex systems are composed of multiple concurrent threads with interdependencies. These threads must either include synchronization points, may be restricted by "constrained expressions" that specify the required ordering of events (Wiledon '86), or may be restricted by using a combination of conditions and events as in the Naval Research Laboratory Software Cost Reduction (SCR) Method (Heninger '80). We will investigate these techniques for use with CSRT. We will also investigate the use of temporal logic to analyze whether the sequence of events and functions is consistent in related threads. CONCLUSIONS Good process and product traceability would reduce costs significantly. Contractors should place more emphasis on the need to improve information capture and traceability. Tracing critical stimulus-response requirements to threads in requirements models, design and implementation would locate inter-functional and inter- component errors, inconsistencies, and missing elements. We plan continued experimentation with CSRT on larger problems. ACKNOWLEDGMENTS The author would like to thank Mike Edwards, Naval Surface Warfare Center, for his critique of this research and helpful suggestions. REFERENCES Ascent Logic Corporation, RDD Manual, Release 3.0, Jun Director of Defense Research and Engineering, DOD Software Technology Strategy, Dec Department of Defense System Management College(DSMC), DSMC Glossary, Defense Acquisition Acronyms and Terms, DSMC Acquisition Policy Department, Fort Belvoir, Va., Sept Hatley, D.J. and Pirbhai, I.A., Strategies for Real-Time System Specification, Dorset House, NY, Heninger, K., "Specifying Software Requirements for Complex Systems: New Techniques and their

6 Application", IEEE Trans. on Software Engineering, Vol. SE-6, Jan. 1980, pp Mellor, S.J. and Ward, P.T., Structured Development for Real-Time Systems, Vol. 1-3, Prentice Hall, Englewood Cliffs, NJ, Ramesh, B. and Luqi, "An Intelligent Assistant for Requirements Validation for Embedded Systems, submitted to IEEE Expert, White, S.M., A Pragmatic Method for Computer System Definition, Ph.D. Dissertation, Polytechnic University, University Microfilms, Ann Arbor, MI, Jun. 1987; also Tech. Report RE-791, Grumman Corporate Research Center. White, S.M., "Tracing Entities, Relationships, and System Behavior", Final Report, NSWC Contract No. N C-0051, Grumman Corporate Research Center, October Wiledon, J.C., "Applying Event Based Analysis to Specification and Designs", IFIP 1986, Elsevier Science Publishers, pp APPENDIX A TABLE OF DEFINITIONS Action: An event which is caused by the system or the environment. Condition: A condition is an expression in which the operands are conditions and the operators are Boolean. A primitive condition is a relation between a data item or "thing" and a value. At a particular instant in time, a condition is either true or false. Data Flow Diagram: A graphic representation of a system or system part, including all or some of the following nodes: data sources, data sinks, storage and processes. The logical flow of data is shown as links between the nodes. Data Flow: Data passed between system processes or between processes and the environment. Data Store: Persistent system data. relationship. Event: A condition becoming true or false. Item (in RDD): An observable thing (energy, matter, or data) that arrives at or leaves a system, component, process, or function (Ascent Logic '92). Performance Index: A quantifiable measure of a function's performance, for example, accuracy, reliability, speed, efficiency, etc. (Ascent Logic '92). State: A set of conditions, or a system variable which is based on an initial set of conditions and the history of events that affect the system. State Transition Diagram: A directed graph used for describing a system in terms of state changes. Nodes correspond to system states, and edges correspond to transitions. System Parameter: A measure of performance in which the units of measurement are directly related to the performance index. (DSMC '91). Thread: A path of system behavior that is uniquely determined by specific environmental stimuli, system conditions, and system events. A thread cuts across multiple functions, as for example, the thread in a surveillance system that produces a report on detecting a target. Author's Biography. Stephanie White, principal engineer of software process at Grumman Aerospace and Electronics, improves software and system engineering methods for use on Grumman and Navy programs. Her primary research interests are system and software requirements engineering, traceability and analysis of system behavior, and reengineering. She serves as vicechair of the IEEE Computer Society Task Force on the Engineering of Computer-Based Systems (ECBS), and previously chaired its State of Practice Working Group. She has an M.S. in mathematics from New York University and a Ph.D. in computer science from the Polytechnic University of New York. Entity-Relationship-Attribute Model (ERA Model): A model in which objects (entities) are related to their attributes and to other objects. The verb or verb phrase which describes how the objects are related is the relationship. For example, in "Process receives Input". "Process" and "Input" are entities and "receives" is the

H&A Engineering. Systems

H&A Engineering. Systems Introduction to Structured Methods The idea that system descriptions are more clear and easier with pictures rather than words provided the basis for the development of structured methods. Structured analysis

More information

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S. 10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence

More information

OBJECT-ORIENTED SOFTWARE DEVELOPMENT Using OBJECT MODELING TECHNIQUE (OMT)

OBJECT-ORIENTED SOFTWARE DEVELOPMENT Using OBJECT MODELING TECHNIQUE (OMT) OBJECT-ORIENTED SOFTWARE DEVELOPMENT Using OBJECT MODELING TECHNIQUE () Ahmed Hayajneh, May 2003 1 1 Introduction One of the most popular object-oriented development techniques today is the Object Modeling

More information

Introduction to Software Specifications and Data Flow Diagrams. Neelam Gupta The University of Arizona

Introduction to Software Specifications and Data Flow Diagrams. Neelam Gupta The University of Arizona Introduction to Software Specifications and Data Flow Diagrams Neelam Gupta The University of Arizona Specification A broad term that means definition Used at different stages of software development for

More information

Sequence-Based Specification

Sequence-Based Specification Sequence-Based Specification Tom Swain tomswain@comcast.net Specification Objectives Completeness Consistency a response is defined for every stimulus history each stimulus history maps to only one response

More information

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities

More information

SE351a: Software Project & Process Management. 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa

SE351a: Software Project & Process Management. 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa SE351a: Software Project & Process Management W4.1: Requirements Engineering 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa SE351 Roadmap Introduction to Software Project Management Project Management

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

Supporting Systems Engineering with Methods and Tools: A Case Study

Supporting Systems Engineering with Methods and Tools: A Case Study Supporting Systems Engineering with Methods and Tools: A Case Study Jock Rader and Leslie Haggerty Hughes Aircraft Company and H&A System Engineering Abstract Many projects have applied the Hatley-Pirbhai

More information

Improved Database Development using SQL Compare

Improved Database Development using SQL Compare Improved Database Development using SQL Compare By David Atkinson and Brian Harris, Red Gate Software. October 2007 Introduction This white paper surveys several different methodologies of database development,

More information

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC 20301-3000 ACQUISITION, TECHNO LOGY. A N D LOGISTICS SEP 2 1 2017 MEMORANDUM FOR COMMANDER, UNITED ST A TES SPECIAL OPERATIONS

More information

COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY

COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY AFRL-IF-RS-TR-2002-61 Final Technical Report April 2002 COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY Kestrel Institute Sponsored by Defense Advanced Research Projects Agency DARPA Order

More information

Chapter 4. Capturing the Requirements. 4th Edition. Shari L. Pfleeger Joanne M. Atlee

Chapter 4. Capturing the Requirements. 4th Edition. Shari L. Pfleeger Joanne M. Atlee Chapter 4 Capturing the Requirements Shari L. Pfleeger Joanne M. Atlee 4th Edition It is important to have standard notations for modeling, documenting, and communicating decisions Modeling helps us to

More information

Professor Hausi A. Müller PhD PEng FCAE Department of Computer Science Faculty of Engineering University of Victoria

Professor Hausi A. Müller PhD PEng FCAE Department of Computer Science Faculty of Engineering University of Victoria Professor Hausi A. Müller PhD PEng FCAE Department of Computer Science Faculty of Engineering University of Victoria www.engr.uvic.ca/~seng321/ courses1.csc.uvic.ca/courses/201/spring/seng/321 SENG 321

More information

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz Results obtained by researchers in the aspect-oriented programming are promoting the aim to export these ideas to whole software development

More information

Adding Formal Requirements Modeling to SysML

Adding Formal Requirements Modeling to SysML Adding Formal Requirements Modeling to SysML Mark R. Blackburn www.markblackburn.com Abstract. This paper seeks to raise awareness on the SCR extensions derived from industry use, and discusses how an

More information

Formal Methods in Describing Architectures

Formal Methods in Describing Architectures Presented at the 1995 Monterey Workshop on Formal Methods and Architecture Introduction Formal Methods in Describing Architectures Dr. Paul C. Clements Software Engineering Institute 1 Carnegie Mellon

More information

Sample Exam Syllabus

Sample Exam Syllabus ISTQB Foundation Level 2011 Syllabus Version 2.9 Release Date: December 16th, 2017. Version.2.9 Page 1 of 46 Dec 16th, 2017 Copyright 2017 (hereinafter called ISTQB ). All rights reserved. The authors

More information

Composability Test of BOM based models using Petri Nets

Composability Test of BOM based models using Petri Nets I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology

More information

SOFTWARE ENGINEERING

SOFTWARE ENGINEERING SOFTWARE ENGINEERING INTRODUCTION TO SOFTWARE ENGINEERING. COURSE STRUCTURE AND REQUIREMENTS Saulius Ragaišis saulius.ragaisis@mif.vu.lt WHAT IS SOFTWARE ENGINEERING? First definition Software engineering

More information

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created>

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created> Software Requirements Specification for Version 1.0 approved Prepared by Software Requirements Specification for Page 2 Table of Contents Revision

More information

System Name Software Architecture Description

System Name Software Architecture Description System Name Software Architecture Description Author Name Contact Details Version Date template 2011 Eoin Woods & Nick Rozanski 1 / 25 1. Version History Version Date Author Comments 1 July 08 Eoin Woods

More information

XIV. The Requirements Specification Document (RSD)

XIV. The Requirements Specification Document (RSD) XIV. The Requirements Specification Document (RSD) What is a RSD? What to include/not include in a RSD? Attributes of a Well-Written RSD Organization of a RSD Sample Table of Contents An Example 2002 John

More information

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Definitions Cellular Telephone Service For the purposes of this policy, cellular telephone

More information

Chapter 4 Objectives

Chapter 4 Objectives Chapter 4 Objectives Eliciting requirements from the customers Modeling requirements Reviewing requirements to ensure their quality Documenting requirements for use by the design and test teams 4.1 The

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

THE NATIONAL SHIPBUILDING RESEARCH PROGRAM

THE NATIONAL SHIPBUILDING RESEARCH PROGRAM SHIP PRODUCTION COMMITTEE FACILITIES AND ENVIRONMENTAL EFFECTS SURFACE PREPARATION AND COATINGS DESIGN/PRODUCTION INTEGRATION HUMAN RESOURCE INNOVATION MARINE INDUSTRY STANDARDS WELDING INDUSTRIAL ENGINEERING

More information

MIGRATING COOL:TEAMWORK MODELS INTO MODERN CASE TOOLS

MIGRATING COOL:TEAMWORK MODELS INTO MODERN CASE TOOLS MIGRATING COOL:TEAMWORK MODELS INTO MODERN CASE TOOLS A UML/MOF METAMODEL FOR HATLEY-PIRBHAI SYSTEM SPECIFICATION By Colin Coates (Senior Consultant) Version 1.0 Tuesday, 13 October 2015 Table of Contents

More information

Higher-order Testing. Stuart Anderson. Stuart Anderson Higher-order Testing c 2011

Higher-order Testing. Stuart Anderson. Stuart Anderson Higher-order Testing c 2011 Higher-order Testing Stuart Anderson Defining Higher Order Tests 1 The V-Model V-Model Stages Meyers version of the V-model has a number of stages that relate to distinct testing phases all of which are

More information

Lecture 7: Requirements Modeling III. Formal Methods in RE

Lecture 7: Requirements Modeling III. Formal Methods in RE Lecture 7: Requirements Modeling III Last Last Week: Week: Modeling Modeling and and (II) (II) Modeling Modeling Functionality Functionality Structured Structured Object Object Oriented Oriented This This

More information

Integrating Systems and Software Engineering Concepts in AP-233

Integrating Systems and Software Engineering Concepts in AP-233 Integrating Systems and Software Engineering Concepts in AP-233 Asmus Pandikow, Erik Herzog, Anders Törne Real-Time Systems Laboratory Linköpings Universitet 581 83 Linköping, Sweden E-mail: {asmpa, erica,

More information

Briefing Date. Purpose

Briefing Date. Purpose Applying the Systems Engineering Method for the Joint Capabilities Integration and Development System (JCIDS) Chris Ryder and Dave Flanigan 27 October 2005 Purpose JCIDS prescribes a joint forces approach

More information

UML and the Cost of Defects

UML and the Cost of Defects UML and the of s Stephen J Mellor stephen_mellor@mentor.com It is common knowledge that software defects, especially in embedded systems, are expensive to repair; less well appreciated is just how very

More information

The Software Platform consists of device stacks and software services. This section describes both parts and how they are related to each other.

The Software Platform consists of device stacks and software services. This section describes both parts and how they are related to each other. Organization of the Software Platform Frozen Content Modified by Admin on Sep 13, 2017 Introduction to the Software Platform Organization of the Software Platform Using the Software Platform Builder Glossary

More information

Chapter : Analysis Modeling

Chapter : Analysis Modeling Chapter : Analysis Modeling Requirements Analysis Requirements analysis Specifies software s operational characteristics Indicates software's interface with other system elements Establishes constraints

More information

FORMALIZED SOFTWARE DEVELOPMENT IN AN INDUSTRIAL ENVIRONMENT

FORMALIZED SOFTWARE DEVELOPMENT IN AN INDUSTRIAL ENVIRONMENT FORMALIZED SOFTWARE DEVELOPMENT IN AN INDUSTRIAL ENVIRONMENT Otthein Herzog IBM Germany, Dept. 3100 P.O.Box 80 0880 D-7000 STUTTGART, F. R. G. ABSTRACT tn the IBM Boeblingen Laboratory some software was

More information

CHAPTER 19: Building a Preliminary Behavioral Model

CHAPTER 19: Building a Preliminary Behavioral Model 1 z 7 CHAPTER 19: Building a Preliminary Behavioral Model Things are always at their best in their beginning. Blaise Pascal Lettres Provinciales, 1656-1657, no. 4 IN THIS CHAPTER, YOU WILL LEARN: Why a

More information

Software Architecture. Lecture 5

Software Architecture. Lecture 5 Software Architecture Lecture 5 Roadmap of the course What is software architecture? Designing Software Architecture Requirements: quality attributes or qualities How to achieve requirements : tactics

More information

ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS

ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS This form is completed by the Task Monitors and forwarded to DISA/DITCO-Scott with a complete ENCORE II Requirements Package. (electronic signatures

More information

Software Engineering from a

Software Engineering from a Software Engineering from a modeling perspective Robert B. France Dept. of Computer Science Colorado State University USA france@cs.colostate.edu Softwaredevelopment problems Little or no prior planning

More information

Mei Nagappan. How the programmer wrote it. How the project leader understood it. How the customer explained it. How the project leader understood it

Mei Nagappan. How the programmer wrote it. How the project leader understood it. How the customer explained it. How the project leader understood it Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Elisa Baniassad - Reid Holmes How the customer explained it How the project leader understood it How the

More information

Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme

Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme NIST Special Publication 800-51 Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme Recommendations of the National Institute of Standards and Technology Peter Mell Tim Grance

More information

06. Analysis Modeling

06. Analysis Modeling 06. Analysis Modeling Division of Computer Science, College of Computing Hanyang University ERICA Campus 1 st Semester 2017 Overview of Analysis Modeling 1 Requirement Analysis 2 Analysis Modeling Approaches

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

Years ago many of us had high expectations for effective database systems to support our requirements analysis and management needs.

Years ago many of us had high expectations for effective database systems to support our requirements analysis and management needs. Years ago many of us had high expectations for effective database systems to support our requirements analysis and management needs. Many of us developed in-house systems because system engineering tools

More information

A number of optimizations are already in use by the majority of companies in industry, notably:

A number of optimizations are already in use by the majority of companies in industry, notably: 1 Abstract Mechatronics products contain significant amounts of software. Most advances in embedded software development focus on specific phases of the development process. However, very little emphasis

More information

Evaluation of Commercial Web Engineering Processes

Evaluation of Commercial Web Engineering Processes Evaluation of Commercial Web Engineering Processes Andrew McDonald and Ray Welland Department of Computing Science, University of Glasgow, Glasgow, Scotland. G12 8QQ. {andrew, ray}@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/

More information

Issues in Programming Language Design for Embedded RT Systems

Issues in Programming Language Design for Embedded RT Systems CSE 237B Fall 2009 Issues in Programming Language Design for Embedded RT Systems Reliability and Fault Tolerance Exceptions and Exception Handling Rajesh Gupta University of California, San Diego ES Characteristics

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

Software Architectures. Lecture 6 (part 1)

Software Architectures. Lecture 6 (part 1) Software Architectures Lecture 6 (part 1) 2 Roadmap of the course What is software architecture? Designing Software Architecture Requirements: quality attributes or qualities How to achieve requirements

More information

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering

More information

Natural Language Specification

Natural Language Specification REQUIREMENTS ENGINEERING LECTURE 2017/2018 Dr. Jörg Dörr Natural Language Specification Most Requirements are Described in Natural Language Free Text (Prose) In Word In Excel (Tabular) In RM-Tools In Sys-ML

More information

Schneider Electric Critical Power & Cooling Services. Services to keep your mission-critical applications operating at optimal performance

Schneider Electric Critical Power & Cooling Services. Services to keep your mission-critical applications operating at optimal performance Schneider Electric Critical Power & Cooling Services Services to keep your mission-critical applications operating at optimal performance The Data Center Life Cycle Whether you are planning, building,

More information

Naval Surface Warfare Center,

Naval Surface Warfare Center, CAPT Brian R. Durant Commander NSWCDD Technical Director - (540) 653-8103 Dennis M. McLaughlin Technical Director Naval Surface Warfare Center, Dahlgren Naval Undersea DivisionWarfare Center The The Leader

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

Universal Model Framework -- An Introduction

Universal Model Framework -- An Introduction Universal Model Framework -- An Introduction By Visible Systems Corporation www.visible.com This document provides an introductory description of the Universal Model Framework an overview of its construct

More information

Adaptive Scenario-Based Testing Using UML

Adaptive Scenario-Based Testing Using UML Adaptive Scenario-Based Testing Using UML W.T Tsai, R. Paul*, Zhibin Cao, Bingnan Xiao, Lian Yu Department of Computer Science and Engineering Arizona State University Tempe, AZ 85287 *Department of Defence,

More information

Design Concepts and Principles

Design Concepts and Principles Design Concepts and Principles Analysis to Design Data Object Description Entity- Relationship Diagram Data Flow Diagram Process Specification (PSPEC) Component level design (or) procedural design Data

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

NACC2016, June 5-7, 2016, San Antonio, TX

NACC2016, June 5-7, 2016, San Antonio, TX Verification, Validation, and Control of Automated Calculational Applications Subject to ASME NQA-1 Quality Assurance Requirements Katie Phillips, Jaime Rickert, Charles A. Waggoner Institute for Clean

More information

A Formal V&V Framework for UML Models Based on Model Transformation Techniques

A Formal V&V Framework for UML Models Based on Model Transformation Techniques A Formal V&V Framework for UML Models Based on Model Transformation Techniques Soon-Kyeong Kim and David Carrington Information Technology and Electrical Engineering The University of Queensland, St. Lucia,

More information

Ingegneria del Software II academic year: Course Web-site: [www.di.univaq.it/ingegneria2/]

Ingegneria del Software II academic year: Course Web-site: [www.di.univaq.it/ingegneria2/] Course: Ingegneria del Software II academic year: 2004-2005 Course Web-site: [www.di.univaq.it/ingegneria2/] Verification and Validation Lecturer: Henry Muccini and Vittorio Cortellessa Computer Science

More information

Minsoo Ryu. College of Information and Communications Hanyang University.

Minsoo Ryu. College of Information and Communications Hanyang University. Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based

More information

Lecture 11 Lecture 11 Nov 5, 2014

Lecture 11 Lecture 11 Nov 5, 2014 Formal Verification/Methods Lecture 11 Lecture 11 Nov 5, 2014 Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems to be analyzed, and

More information

OPTIMIZING PRODUCTION WORK FLOW USING OPEMCSS. John R. Clymer

OPTIMIZING PRODUCTION WORK FLOW USING OPEMCSS. John R. Clymer Proceedings of the 2000 Winter Simulation Conference J. A. Joines, R. R. Barton, K. Kang, and P. A. Fishwick, eds. OPTIMIZING PRODUCTION WORK FLOW USING OPEMCSS John R. Clymer Applied Research Center for

More information

Elements of Requirements Style

Elements of Requirements Style Elements of Requirements Style Sponsored by: Karl Wiegers Principal Consultant, Process Impact www.processimpact.com Introduction to Requirements Analysis Improve Quality & Reduce Risk Author Requirements

More information

Software Reuse and Component-Based Software Engineering

Software Reuse and Component-Based Software Engineering Software Reuse and Component-Based Software Engineering Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Contents Software Reuse Components CBSE (Component-Based Software Engineering) Domain Engineering

More information

SCR: A PRACTICAL METHOD FOR REQUIREMENTS SPECIFICATION

SCR: A PRACTICAL METHOD FOR REQUIREMENTS SPECIFICATION SCR: A PRACTICAL METHOD FOR REQUIREMENTS SPECIFICATION Constance Heitmeyer, Naval Research Laboratory, Washington, DC Abstract A controversial issue in the formal methods research community is the degree

More information

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,

More information

20. Business Process Analysis (2)

20. Business Process Analysis (2) 20. Business Process Analysis (2) DE + IA (INFO 243) - 31 March 2008 Bob Glushko 1 of 38 3/31/2008 8:00 AM Plan for Today's Class Process Patterns at Different Levels in the "Abstraction Hierarchy" Control

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES OUR MISSION Promote the highest level of safety for the U.S. offshore oil and natural gas industry through effective leadership, communication, teamwork, utilization of disciplined management systems and

More information

Contemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements.

Contemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements. Contemporary Design We have been talking about design process Let s now take next steps into examining in some detail Increasing complexities of contemporary systems Demand the use of increasingly powerful

More information

Project Posting 8 Frequently Asked Questions Guide

Project Posting 8 Frequently Asked Questions Guide Project 2007-02 Posting 8 Frequently Asked Questions Guide General Questions 1. What were the inputs that drove the development of posting 8 of Project 2007-02? The NERC Board of Trustees November 7 th,

More information

Software Change-Merging in Dynamic Evolution

Software Change-Merging in Dynamic Evolution ARMY RESEARCH LABORATORY Software Change-Merging in Dynamic Evolution CPT David A. Dampier U.S. ARMY RESEARCH LABORATORY Valdis Berzins NAVAL POSTGRADUATE SCHOOL : : : >>>:-: :*:::*&x & ARL-TR-841»k; KÄS*

More information

PICSIL. A Data Flow Approach to Silicon Compilation. top-down decomposition. Programming Language primitives

PICSIL. A Data Flow Approach to Silicon Compilation. top-down decomposition. Programming Language primitives PICSIL A Data Flow Approach to Silicon Compilation M W Pearson P J Lyons M D Apperley Department of Computer Science Massey University Palmerston North, New Zealand Silicon Compilation is a promising approach

More information

Abstract. NSWC/NCEE contract NCEE/A303/41E-96.

Abstract. NSWC/NCEE contract NCEE/A303/41E-96. A Distributed Architecture for QoS Management of Dynamic, Scalable, Dependable, Real-Time Systems 1 Lonnie R. Welch and Behrooz A.Shirazi Computer Science and Engineering Dept. The University of Texas

More information

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview Overview PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS The Product Safety Professional Certification Program at the Richard A. Chaifetz School of Business focuses on the theoretical as well

More information

Developing an Agent Systems Reference Architecture

Developing an Agent Systems Reference Architecture Developing an Agent Systems Reference Architecture 91 Duc N. Nguyen 1, Robert N. Lass 1, Kyle Usbeck 1, William M. Mongan 1, Christopher T. Cannon 1, William C. Regli 1, Israel Mayk 2 and Todd Urness 2

More information

Using Relational Model Transformations to Reduce Complexity in SoS Requirements Traceability: Preliminary Investigation

Using Relational Model Transformations to Reduce Complexity in SoS Requirements Traceability: Preliminary Investigation Using Relational Model Transformations to Reduce Complexity in SoS Requirements Traceability: Preliminary Investigation Charles Dickerson SEIC, Holywell Park Loughborough University Leicestershire, LE11

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

SOFTWARE ENGINEERING

SOFTWARE ENGINEERING SOFTWARE ENGINEERING INTRODUCTION TO SOFTWARE ENGINEERING. COURSE STRUCTURE AND REQUIREMENTS Saulius Ragaišis saulius.ragaisis@mif.vu.lt WHAT IS SOFTWARE ENGINEERING? First definition Software engineering

More information

Ch 4: Requirements Engineering. What are requirements?

Ch 4: Requirements Engineering. What are requirements? Ch 4: Engineering What are? Functional and non-functional The software document specification engineering processes elicitation and analysis validation management The descriptions of what the system should

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

Data Verification and Validation (V&V) for New Simulations

Data Verification and Validation (V&V) for New Simulations Data Verification and Validation (V&V) for New Simulations RPG Special Topic 9/15/06 1 Table of Contents Introduction 1 Data V&V Activities During M&S Development 1 Determine M&S Requirements Phase 2 V&V

More information

CS350 Lecture 2 Requirements Engineering. Doo-Hwan Bae

CS350 Lecture 2 Requirements Engineering. Doo-Hwan Bae CS350 Lecture 2 Requirements Engineering Doo-Hwan Bae bae@se.kaist.ac.kr Contents Overview of Requirements Engineering OO Analysis: Domain modeling, Use-case, sequence, class Structured Analysis: Dataflow

More information

Rich Hilliard 20 February 2011

Rich Hilliard 20 February 2011 Metamodels in 42010 Executive summary: The purpose of this note is to investigate the use of metamodels in IEEE 1471 ISO/IEC 42010. In the present draft, metamodels serve two roles: (1) to describe the

More information

Requirement Analysis

Requirement Analysis Requirement Analysis Requirements Analysis & Specification Objective: determine what the system must do to solve the problem (without describing how) Done by Analyst (also called Requirements Analyst)

More information

For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop.

For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop. For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop. The authors can be reached at cb@mitre.org or ioannis @Mitre.org. In

More information

System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms

System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms SysCon 2008 IEEE International Systems Conference Montreal, Canada, April 7 10, 2008 System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms Joseph J. Simpson 1, Dr. Cihan

More information

Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems

Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Valentin Gies and Thierry M. Bernard ENSTA, 32 Bd Victor 75015, Paris, FRANCE, contact@vgies.com,

More information

Important Lessons. Today's Lecture. Two Views of Distributed Systems

Important Lessons. Today's Lecture. Two Views of Distributed Systems Important Lessons Replication good for performance/ reliability Key challenge keeping replicas up-to-date Wide range of consistency models Will see more next lecture Range of correctness properties L-10

More information

It s just software Or It s all software and it s the new normal

It s just software Or It s all software and it s the new normal NSWCDD-PN-18-00055 t s just software Or t s all software and it s the new normal John Seel, Ph.D. Distinguished Engineer for Warfare s Software 540-653-4443 John.seel@navy.mil Thoughts about software We

More information

An Integrated Test Framework to Reduce Embedded Software Lifecycle Costs

An Integrated Test Framework to Reduce Embedded Software Lifecycle Costs White Paper An Integrated Test Framework to Reduce Embedded Software Lifecycle Costs Version 1.0: August 23, 2012 Presented by: Chris Domin, Business Dev. Mgr. Engineering Services, sales@danlawinc.com

More information

On Nested Depth First Search

On Nested Depth First Search DIMACS Series in Discrete Mathematics and Theoretical Computer Science Volume 32, 1997 On Nested Depth First Search Gerard J. Holzmann, Doron Peled, and Mihalis Yannakakis The SPIN. ABSTRACT. We show in

More information

Building and Reusing Of Requirements Repository

Building and Reusing Of Requirements Repository Arab Academy for Science and Technology and Maritime Transport Faculty of Engineering Dept. of Computer Engineering Building and Reusing Of Requirements Repository A thesis submitted as partial fulfillment

More information

Lesson 06. Requirement Engineering Processes

Lesson 06. Requirement Engineering Processes Lesson 06 Requirement Engineering Processes W.C.Uduwela Department of Mathematics and Computer Science Objectives To describe the principal requirements engineering activities and their relationships To

More information

Flight Systems are Cyber-Physical Systems

Flight Systems are Cyber-Physical Systems Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November

More information

Programming Languages for Real-Time Systems. LS 12, TU Dortmund

Programming Languages for Real-Time Systems. LS 12, TU Dortmund Programming Languages for Real-Time Systems Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 20 June 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 41 References Slides are based on Prof. Wang Yi, Prof.

More information

Diagram Oriented Requirement Specification and the DorsGen Tool

Diagram Oriented Requirement Specification and the DorsGen Tool The Open University of Israel Department of Mathematics and Computer Science Diagram Oriented Requirement Specification and the DorsGen Tool This thesis submitted as partial fulfillment of the requirements

More information