A Framework for Utility-Based Service Oriented Design in SASSY
|
|
- Polly Byrd
- 5 years ago
- Views:
Transcription
1 A Framework for Utility-Based Service Oriented Design in SASSY The material in these slides comes from the paper A Framework for Utility-Based Service Oriented Design in SASSY, D.A. Menasce, J. Ewing, H. Gomaa, S. Malek, and J.P. Sousa, First Joint WOSP/SIPEW International Conference on Performance Engineering (WOSP/SIPEW 2010), San Jose, California, USA. January 28-30, The copyrights to this material are the authors' or the paper publisher's.
2 Topics Overview of SASSY SASSY framework Service Activity Schema (SAS) Service Sequence Scenario (SSS) System Utility Service System Architecture (SSA) Base architecture Architecture patterns and architectural adaptation Optimizing Global Utility Experimental Results Contributions
3 SASSY Framework
4 SASSY Framework Self-Architecting Software Systems - SASSY Utilizes domain ontology which must be specified ahead of time Domain expert specifies high-level processes and service goals using a visual tool. The high-level components of SASSY are for the most part easily-recognizable as analogs of other autonomic systems we have seen so far. Components specific to the system: Service Activity Schema (SAS) and Service Sequence Scenario (SSS) models Architectural Pattern Model (APM) library System Service Architecture (SSA) models
5 Service Activity Schema (SAS) An SAS defines the high-level actions the system should take. Modeling constructs are defined by the domain ontology ahead of time. An SAS is put together by a domain expert, not a software engineer.
6 Service Sequence Scenarios (SSS) Specifies desired QoS properties Specified by the domain expert Uses a list of metrics defined in the domain ontology Each SSS deals with one QoS metric.
7 System Utility Each SSS has its own local utility function specific to that QoS metric The SAS has an overall global utility function which specifies the importance of each particular QoS metric to the service goals of the application SASSY's monitoring may replace service providers or re-architect the system based on the overall system utility.
8 Service System Architecture (SSA) The SSA provides an accurate functional model of the structure and behavioral properties of a system at run-time. Structural model is based on the extensible Architectural Description Language (xadl) Extended to include the concept of service instances the realization of a service type defined in the ontology Components are drawn from a library of Architectural Pattern Models (APMs)
9 SSA (cont.) Left: An SSA model for a base architecture Right: A modification of the base architecture using a fault-tolerant component
10 Base Architecture SASSY automatically generates a base architecture which minimally fulfills the task requirements e.g., one service per activity in the SAS, plus a coordinator Base architecture probably will probably not fulfill QoS objectives well, but provides a starting point for optimization
11 Architecture Patterns / Architectural Adaptation As optimization takes place, components of the architecture may be replaced to meet QoS goals The specific service provider which services an instance may be replaced A particular piece of the architecture may be replaced with a different piece from the APM library. The number of service instances associated with multi-instance components may be changed Each piece in the APM library carries with it one or more QoS metrics, and a QoS model for each metric it influences.
12 Architectural Patterns (cont.) The fault tolerant component in the figure has availability A = 1 - ( 1 a 1 ) ( 1 a 2 ) a 1, a 2 are availability of server 1, server 2 respectively Execution time E = a 1 (1-a 2 )e 1 /A + a 2 (1-a 1 )e 2 /A + a 1 a 2 min{e 1,e 2 }/A
13 Optimizing Global Utility Build a neighborhood N Unfiltered Replace every component of every SSS with architectural patterns that improve the metric associated with that SSS. May generate large neighborhoods. Filtered Concentrate on those SSSs which provide better gains to the utility function; for instance by selecting the SSSs that exhibit the lowest numerical contribution to the global utility function.
14 Optimizing Global Utility (cont.) Search proceeds using local search methods, e.g., hill climbing. May introduce randomness to prevent getting stuck in local optima. Smaller neighborhoods from filtering increase the risk of getting stuck in local optima. A naïve filtering methodology may also concentrate on less important SSSs due to smaller numerical contribution; these may not adequately contribute to the global utility due to low weighting.
15 Experimental Results Left: Convergence rate for different filtering values Right: The final architecture of the system
16 Autonomous Adaptation SASSY will autonomously adapt to changing service conditions. In the event of degradation of service from a provider, SASSY will re-evaluate the architecture based on current data, and re-architect the system.
17 Contributions The paper itself lists several contributions Models system requirements as a high-level visual language usable directly by domain experts Maintains four types of run-time models which are synchronized with one another, and collectively support a rich set of alternatives for satisfying the system's requirements Provides a uniform approach to automated composition, adaptation and evolution of SOA systems
18 Contributions (cont.) The first and third of these contributions seem to be the most important The ability of domain experts to directly specify the desired behavior of the system is very important, in particular it ensures that information is not lost in translation between the domain experts and software engineers The introduction of a meaningful unified approach of how to model and automatically adapt the system architecture to meet the goals specified by domain experts is significant.
19 Potential Issues / Open Problems Filtering methodology the filter introduced in the paper is extremely simple, and could narrow neighborhoods in undesirable ways. Local search selection Could SASSY be employed to build self-protecting systems? In particular, modelling security concerns is treated roughly discrete utility based encryption strength and key lengths. There may potential to use SASSY to build and adapt systems that address security and vulnerability more robustly these are not typically employed as services however. Is the currently system flexible enough, or would it need to be extended to model threat evaluation and coping?
SASSY: A Framework for Self-Architecting Service-Oriented Systems
FEATURE: SOFTWARE ARCHITECTURE SASSY: A Framework for Self-Architecting -Oriented Systems Daniel A. Menascé, Hassan Gomaa, Sam Malek, and João P. Sousa, George Mason University // The SASSY self-architecting
More informationOn the Use of Performance Models in Autonomic Computing
On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle
More informationQoS Architectural Patterns for Self-Architecting Software Systems
QoS Architectural Patterns for Self-Architecting Software Systems Daniel A. Menascé, João P. Sousa, Sam Malek, and Hassan Gomaa Department of Computer Science George Mason University Fairfax, VA 22030,
More informationModel-based Run-Time Software Adaptation for Distributed Hierarchical Service Coordination
Model-based Run-Time Software Adaptation for Distributed Hierarchical Service Coordination Hassan Gomaa, Koji Hashimoto Department of Computer Science George Mason University Fairfax, VA, USA hgomaa@gmu.edu,
More informationAn Autonomic Framework for Integrating Security and Quality of Service Support in Databases
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases Firas Alomari The Volgenau School of Engineering George Mason University Daniel A. Menasce Department of Computer
More informationIncremental development A.Y. 2018/2019
Incremental development A.Y. 2018/2019 Incremental development Interleaves the activities of specification, development, and validation. The system is developed as a series of versions (increments), with
More informationMachine Learning for Software Engineering
Machine Learning for Software Engineering Single-State Meta-Heuristics Prof. Dr.-Ing. Norbert Siegmund Intelligent Software Systems 1 2 Recap: Goal is to Find the Optimum Challenges of general optimization
More informationCHAPTER 5 MAINTENANCE OPTIMIZATION OF WATER DISTRIBUTION SYSTEM: SIMULATED ANNEALING APPROACH
79 CHAPTER 5 MAINTENANCE OPTIMIZATION OF WATER DISTRIBUTION SYSTEM: SIMULATED ANNEALING APPROACH 5.1 INTRODUCTION Water distribution systems are complex interconnected networks that require extensive planning
More informationSolving an Oblique Triangle
Several methods exist to solve an oblique triangle, i.e., a triangle with no right angle. The appropriate method depends on the information available for the triangle. All methods require that the length
More informationExtending Workflow Systems with QoS Management
599 Advances in Extending Workflow Systems with QoS Management Jorge Cardoso 1 Summary As organizations adopt new working models, such as e-commerce, new challenges arise for workflow management systems
More informationArchitectural Blueprint
IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint
More informationSpace Cyber: An Aerospace Perspective
Space Cyber: An Aerospace Perspective USAF Cyber Vision 2025 AFSPC 19-21 March 2012 Frank Belz and Joe Betser The Aerospace Corporation Computers and Software Division 20 March 2012 frank.belz@aero.org
More informationThe Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne
The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based
More informationIntroduction to software architecture Revision : 732
Introduction to software architecture Revision : 732 Denis Conan Septembre 2018 Foreword The content of these slides is extracted from the following references: L. Bass, P. Clements, and R. Kazman. Software
More informationA Framework for Source Code metrics
A Framework for Source Code metrics Neli Maneva, Nikolay Grozev, Delyan Lilov Abstract: The paper presents our approach to the systematic and tool-supported source code measurement for quality analysis.
More informationDO YOU UTILIZE WIRELESS TECHNOLOGY?
DO YOU UTILIZE WIRELESS TECHNOLOGY? January 2015 http:///publications/studies/survey_wireless.html Survey Details Topic: Utilization of wireless technologies among German companies Timeframe: Sep 15, 2014
More informationSOFTWARE ARCHITECTURE For MOLECTRONICS
SOFTWARE ARCHITECTURE For MOLECTRONICS John H. Reif Computer Science Dept Duke Univ. In Collaboration with: Allara, Hill, Reed, Seminario, Tour, Weiss DARPA Moletronics Program BLACK BOX ARCHITECTURE:
More information5. Computational Geometry, Benchmarks and Algorithms for Rectangular and Irregular Packing. 6. Meta-heuristic Algorithms and Rectangular Packing
1. Introduction 2. Cutting and Packing Problems 3. Optimisation Techniques 4. Automated Packing Techniques 5. Computational Geometry, Benchmarks and Algorithms for Rectangular and Irregular Packing 6.
More information3.6.2 Generating admissible heuristics from relaxed problems
3.6.2 Generating admissible heuristics from relaxed problems To come up with heuristic functions one can study relaxed problems from which some restrictions of the original problem have been removed The
More informationArtificial Intelligence
Artificial Intelligence Information Systems and Machine Learning Lab (ISMLL) Tomáš Horváth 10 rd November, 2010 Informed Search and Exploration Example (again) Informed strategy we use a problem-specific
More information( It will be applied from Fall)
İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING MASTER OF SCIENCE PROGRAM IN COMPUTER ENGINEERING Core Courses ECTS *CENG 590 Seminar (0-2)
More informationImage Processing algorithm for matching horizons across faults in seismic data
Image Processing algorithm for matching horizons across faults in seismic data Melanie Aurnhammer and Klaus Tönnies Computer Vision Group, Otto-von-Guericke University, Postfach 410, 39016 Magdeburg, Germany
More informationLSST Scheduler Operations Simulator. Francisco Delgado CTIO/LSST
LSST Scheduler Operations Simulator Francisco Delgado CTIO/LSST Operations Simulator Operations Simulator Verify the specifications of LSST hardware and survey against SRD Design the set of science programs
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationProbabilistic Ontology: The Next Step for Net-Centric Operations
Probabilistic Ontology: The Next Step for Net-Centric Operations Kathryn Blackmond Laskey, Paulo C. G. da Costa George Mason University Kenneth J. Laskey MITRE Corporation Edward J. Wright Information
More informationRemotely Sensed Image Processing Service Automatic Composition
Remotely Sensed Image Processing Service Automatic Composition Xiaoxia Yang Supervised by Qing Zhu State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University
More informationModeling the Real World for Data Mining: Granular Computing Approach
Modeling the Real World for Data Mining: Granular Computing Approach T. Y. Lin Department of Mathematics and Computer Science San Jose State University San Jose California 95192-0103 and Berkeley Initiative
More informationCisco Service-Oriented Network Architecture: Support and Optimize SOA and Web 2.0 Applications
Cisco Service-Oriented Network Architecture: Support and Optimize SOA and Web 2.0 Applications Executive Summary Today, Web 2.0 and service-oriented architectures (SOAs) are among the top issues of concern
More informationSystem Development Life Cycle Methods/Approaches/Models
Week 11 System Development Life Cycle Methods/Approaches/Models Approaches to System Development System Development Life Cycle Methods/Approaches/Models Waterfall Model Prototype Model Spiral Model Extreme
More informationAdobe Target Analyst Adobe Certified Expert Exam Guide
Adobe Target Analyst Adobe Certified Expert Exam Guide Exam number: 9A0-399 Note: To become certified as an Adobe Target Analyst requires passing this exam and exam 9A0-398 Adobe Target Business Practitioner.
More informationW H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud
W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...
More informationSelection of Techniques and Metrics
Selection of Techniques and Metrics Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: 3-1 Overview Criteria for Selecting an
More informationCertitude Functional Qualification with Formal Verification. Jean-Marc Forey November 2012
Certitude Functional Qualification with Formal Verification Jean-Marc Forey November 2012 Springsoft Proprietary Topics Case study presentation Why Verification Verification efficiency Formal verification
More informationSolace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery
Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape
More informationCISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION
CUSTOMER TESTIMONIAL CISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION EXECUTIVE SUMMARY Visionary Technology Provides New Model for Application Infrastructure Services
More informationUtility-based Optimal Service Selection for Business Processes in Service Oriented Architectures
Utility-based Optimal Service Selection for Business Processes in Service Oriented Architectures Vinod K. Dubey Daniel A. Menascé Web Services (ICWS), 2010 IEEE International Conference on. IEEE, 2010
More informationAn object of research has changed System events System renewal Mathematical computer tools reliability dependability
Preface The conference DepCoS - RELCOMEX '06 is organized by the Institute of Computer Engineering, Control and Robotics (previously the Institute of Engineering Cybernetics), Wroclaw University of Technology.
More informationRequirements Validation and Negotiation
REQUIREMENTS ENGINEERING LECTURE 2017/2018 Joerg Doerr Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects of
More informationSmart Power Grid Security: A Unified Risk Management Approach. Presenter: Yan Zhang
Smart Power Grid Security: A Unified Risk Management Approach Authors: Partha Datta Ray, Rajopal Harnoor, Dr. Mariana Hentea Presenter: Yan Zhang Submitted in Partial Fulfillment of the Course Requirements
More informationScan Matching. Pieter Abbeel UC Berkeley EECS. Many slides adapted from Thrun, Burgard and Fox, Probabilistic Robotics
Scan Matching Pieter Abbeel UC Berkeley EECS Many slides adapted from Thrun, Burgard and Fox, Probabilistic Robotics Scan Matching Overview Problem statement: Given a scan and a map, or a scan and a scan,
More informationSemantic SOA - Realization of the Adaptive Services Grid
Semantic SOA - Realization of the Adaptive Services Grid results of the final year bachelor project Outline review of midterm results engineering methodology service development build-up of ASG software
More informationA Scalable and Highly Available Brokering Service for SLA-Based Composite Services
A Scalable and Highly Available Brokering Service for SLA-Based Composite Services Alessandro Bellucci, Valeria Cardellini, Valerio Di Valerio, and Stefano Iannucci Università di Roma Tor Vergata, Viale
More informationGate Level Fault Diagnosis in Scan-Based BIST
Gate Level Fault Diagnosis in Scan-Based BIST Ismet Bayraktaroglu Computer Science & Engineering Department University of California, San Diego La Jolla, CA 92093 ibayrakt@csucsdedu Alex Orailoglu Computer
More informationTransformation-free Data Pipelines by combining the Power of Apache Kafka and the Flexibility of the ESB's
Building Agile and Resilient Schema Transformations using Apache Kafka and ESB's Transformation-free Data Pipelines by combining the Power of Apache Kafka and the Flexibility of the ESB's Ricardo Ferreira
More informationQoS-aware model-driven SOA using SoaML
QoS-aware model-driven SOA using SoaML Niels Schot A thesis submitted for the degree of MSc Computer Science University of Twente EEMCS - TRESE: Software Engineering Group Examination committee: Luís Ferreira
More informationA Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics
A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics Helmut Berger and Dieter Merkl 2 Faculty of Information Technology, University of Technology, Sydney, NSW, Australia hberger@it.uts.edu.au
More informationArtificial Intelligence
Artificial Intelligence Information Systems and Machine Learning Lab (ISMLL) Tomáš Horváth 16 rd November, 2011 Informed Search and Exploration Example (again) Informed strategy we use a problem-specific
More informationChapter 14 Global Search Algorithms
Chapter 14 Global Search Algorithms An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Introduction We discuss various search methods that attempts to search throughout the entire feasible set.
More informationVerification of Multiple Agent Knowledge-based Systems
Verification of Multiple Agent Knowledge-based Systems From: AAAI Technical Report WS-97-01. Compilation copyright 1997, AAAI (www.aaai.org). All rights reserved. Daniel E. O Leary University of Southern
More informationIntroduction to ANSYS DesignXplorer
Lecture 5 Goal Driven Optimization 14. 5 Release Introduction to ANSYS DesignXplorer 1 2013 ANSYS, Inc. September 27, 2013 Goal Driven Optimization (GDO) Goal Driven Optimization (GDO) is a multi objective
More information6.871 Expert System: WDS Web Design Assistant System
6.871 Expert System: WDS Web Design Assistant System Timur Tokmouline May 11, 2005 1 Introduction Today, despite the emergence of WYSIWYG software, web design is a difficult and a necessary component of
More informationAutomated Test Data Generation and Optimization Scheme Using Genetic Algorithm
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Automated Test Data Generation and Optimization Scheme Using Genetic Algorithm Roshni
More informationModelling Variation in Quality Attributes
Modelling Variation in Quality Attributes Leire Etxeberria, Goiuria Sagardui, Lorea Belategi Faculty of Engineering University of Mondragon Limerick 16.01.2007 Research group &3 ;078 9 4143/7, 43 Research
More informationProbabilistic Robotics
Probabilistic Robotics Probabilistic Motion and Sensor Models Some slides adopted from: Wolfram Burgard, Cyrill Stachniss, Maren Bennewitz, Kai Arras and Probabilistic Robotics Book SA-1 Sensors for Mobile
More information2. TOPOLOGICAL PATTERN ANALYSIS
Methodology for analyzing and quantifying design style changes and complexity using topological patterns Jason P. Cain a, Ya-Chieh Lai b, Frank Gennari b, Jason Sweis b a Advanced Micro Devices, 7171 Southwest
More informationSoftswitch Multicriteria Analysis for Software Quality based on IPCC Reference Architecture
Softswitch Multicriteria Analysis for Software Quality based on IPCC Reference Architecture M. Lemay, W. Suryn and S. Brown. École de Technologie Supérieure, Montréal, QC, Canada Waveroad Canada, Montréal,
More informationSWE 760 Lecture 1: Introduction to Analysis & Design of Real-Time Embedded Systems
SWE 760 Lecture 1: Introduction to Analysis & Design of Real-Time Embedded Systems Hassan Gomaa References: H. Gomaa, Chapters 1, 2, 3 - Real-Time Software Design for Embedded Systems, Cambridge University
More informationWhy Consider Implementation-Level Decisions in Software Architectures?
1. Abstract Why Consider Implementation-Level Decisions in Software Architectures? Nikunj Mehta Nenad Medvidović Marija Rakić {mehta, neno, marija}@sunset.usc.edu Department of Computer Science University
More informationPredicting Diabetes using Neural Networks and Randomized Optimization
Predicting Diabetes using Neural Networks and Randomized Optimization Kunal Sharma GTID: ksharma74 CS 4641 Machine Learning Abstract This paper analysis the following randomized optimization techniques
More informationHitachi Visualization Predictive Crime Analytics
Hitachi Visualization Predictive Crime Analytics Creating Safe Cities - The Problem Public safety budgets are tightening Violent crimes e.g., assault are increasing in many cities along with the shifting
More informationMachine Learning Techniques for Data Mining
Machine Learning Techniques for Data Mining Eibe Frank University of Waikato New Zealand 10/25/2000 1 PART VII Moving on: Engineering the input and output 10/25/2000 2 Applying a learner is not all Already
More informationL7 Security Semantics
UNIK4750 - Measurable Security for the Internet of Things L7 Security Semantics György Kálmán, UiO/DNB gyorgy.kalman@its.uio.no Josef Noll UiO josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750, #IoTSec,
More informationRequirements and Design Overview
Requirements and Design Overview Robert B. France Colorado State University Robert B. France O-1 Why do we model? Enhance understanding and communication Provide structure for problem solving Furnish abstractions
More informationAnalysis Range-Free Node Location Algorithm in WSN
International Conference on Education, Management and Computer Science (ICEMC 2016) Analysis Range-Free Node Location Algorithm in WSN Xiaojun Liu1, a and Jianyu Wang1 1 School of Transportation Huanggang
More informationCLOUD TECHNOLOGIE A UNIFORM CLOUD-ECOSYSTEM
CLOUD TECHNOLOGIE A UNIFORM CLOUD-ECOSYSTEM Thanks to our unified cloud services, your IT infrastructure is no longer located on your local computer or at your company data center, but at our high-security
More informationHarnessing Byzantine Fault Tolerance Using Classical Theory. Dr. Thaddeus Westerson
Harnessing Byzantine Fault Tolerance Using Classical Theory Dr. Thaddeus Westerson 1 Motivation The popularity of game-theoretic technology among end-users is decreasing Theory must be made scalable, distributed,
More informationIsolating Compromised Routers. Alper Mizrak, Keith Marzullo and Stefan Savage UC San Diego Department of Computer Science and Engineering
Isolating Compromised Routers Alper Mizrak, Keith Marzullo and Stefan Savage UC San Diego Department of Computer Science and Engineering Problem Routers are vulnerable points in the Internet, especially
More informationRouting with a distance vector protocol - EIGRP
Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License
More informationCOMP 465: Data Mining Still More on Clustering
3/4/015 Exercise COMP 465: Data Mining Still More on Clustering Slides Adapted From : Jiawei Han, Micheline Kamber & Jian Pei Data Mining: Concepts and Techniques, 3 rd ed. Describe each of the following
More informationRapid prototyping for CANopen system development
Rapid prototyping for CANopen system development Heinz-Jürgen Oertel, Rüdiger Härtel, Torsten Gedenk port GmbH The development of simple CANopen devices up to complex systems requires exact planning and
More informationImproving Adaptive Hypermedia by Adding Semantics
Improving Adaptive Hypermedia by Adding Semantics Anton ANDREJKO Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic andrejko@fiit.stuba.sk
More informationDependability Analysis of Web Service-based Business Processes by Model Transformations
Dependability Analysis of Web Service-based Business Processes by Model Transformations László Gönczy 1 1 DMIS, Budapest University of Technology and Economics Magyar Tudósok krt. 2. H-1117, Budapest,
More informationUnifying Agent and Component Concepts - Jadex Active Components
Unifying Agent and Component Concepts - Jadex Active Components Alexander Pokahr, Lars Braubach, Kai Jander Distributed Systems and Information Systems Group (VSIS) Department of Informatics, University
More informationActive Appearance Models
Active Appearance Models Edwards, Taylor, and Cootes Presented by Bryan Russell Overview Overview of Appearance Models Combined Appearance Models Active Appearance Model Search Results Constrained Active
More informationService Interface Design RSVZ / INASTI 12 July 2006
Architectural Guidelines Service Interface Design RSVZ / INASTI 12 July 2006 Agenda > Mandatory standards > Web Service Styles and Usages > Service interface design > Service versioning > Securing Web
More informationDYNAMICS and CONTROL
DYNAMICS and CONTROL Module V(III) V(I) Control Benefits A look at the future Presented by Pedro Albertos Professor of Systems Engineering and Control - UPV Modules: Examples of systems and signals Models
More informationSOFTWARE ARCHITECTURE & DESIGN INTRODUCTION
SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,
More informationResearch Article Apriori Association Rule Algorithms using VMware Environment
Research Journal of Applied Sciences, Engineering and Technology 8(2): 16-166, 214 DOI:1.1926/rjaset.8.955 ISSN: 24-7459; e-issn: 24-7467 214 Maxwell Scientific Publication Corp. Submitted: January 2,
More informationImplementing the Army Net Centric Data Strategy in a Service Oriented Environment
Implementing the Army Net Centric Strategy in a Service Oriented Environment Michelle Dirner Army Net Centric Strategy (ANCDS) Center of Excellence (CoE) Service Team Lead RDECOM CERDEC SED in support
More informationProcedure for the Specification of Web Ontology
WG2 N1283 Study Period on Extending MDR for the Semantic Web Procedure for the Specification of Web Ontology ISO/IEC JTC 1/SC 32 Plenary and WGs Meetings Jeju, Korea, June 25, 2009 Jeong-Dong Kim, Doo-Kwon
More informationDesign. Introduction
Design Introduction a meaningful engineering representation of some software product that is to be built. can be traced to the customer's requirements. can be assessed for quality against predefined criteria.
More informationFor Monday. Read chapter 18, sections Homework:
For Monday Read chapter 18, sections 10-12 The material in section 8 and 9 is interesting, but we won t take time to cover it this semester Homework: Chapter 18, exercise 25 a-b Program 4 Model Neuron
More informationAutonomic Computing. Pablo Chacin
Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research
More informationOntology- and Bayesian- based Information Security Risk Management
Ontology- and Bayesian- based Information Security Risk Management Stefan Fenz sfenz@securit 4 th ETSI Security Workshop 13 14 January 2009 ETSI, Sophia Antipolis, France Motivation Almost every business
More informationWeb Applications Testing. Ario Nejad, Christopher Choi
Web Applications Testing Ario Nejad, Christopher Choi What is a Web Application? Though the boundaries of what constitute a web application are vague, it is commonly perceived to be an application that
More informationA Study of Future Internet Applications based on Semantic Web Technology Configuration Model
Indian Journal of Science and Technology, Vol 8(20), DOI:10.17485/ijst/2015/v8i20/79311, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Future Internet Applications based on
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY
More informationStudy of Component Based Software Engineering
Study of Based Software Ishita Verma House No.4, Village Dayalpur Karawal Nagar Road Delhi-110094, India ish.v.16@gmail.com Abstract based engineering is an approach of development that emphasizes the
More informationRisk Identification: Vulnerability Analysis
Risk Identification: Vulnerability Analysis Vulnerability Analysis Vulnerability flaw or weakness in an info. asset, its design, implementation or security procedure that can be exploited accidentally
More informationCHAPTER 6 ORTHOGONAL PARTICLE SWARM OPTIMIZATION
131 CHAPTER 6 ORTHOGONAL PARTICLE SWARM OPTIMIZATION 6.1 INTRODUCTION The Orthogonal arrays are helpful in guiding the heuristic algorithms to obtain a good solution when applied to NP-hard problems. This
More informationData Management Glossary
Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative
More informationIMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION
IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION Briefing for OFPP Working Group 19 Feb 2015 Emile Monette GSA Office of Governmentwide Policy emile.monette@gsa.gov Cybersecurity Threats are
More informationArchitectural Blueprint The 4+1 View Model of Software Architecture. Philippe Kruchten
Architectural Blueprint The 4+1 View Model of Software Architecture Philippe Kruchten Model What is a model? simplified abstract representation information exchange standardization principals (involved)
More informationDiscovering Interdomain Prefix Propagation using Active Probing
Discovering Interdomain Prefix Propagation using Active Probing lorenzo@ripe.net - colitti@dia.uniroma3.it ISMA 2006 WIT, San Diego, 10 May 2006 http://www.ripe.net 1 The problem ISMA 2006 WIT, San Diego,
More informationVblock Architecture Accelerating Deployment of the Private Cloud
Vblock Architecture Accelerating Deployment of the Private Cloud René Raeber Technical Solutions Architect Datacenter rraeber@cisco.com 1 Vblock Frequently Asked Questions 2 What is a Vblock? It is a product
More informationWhat is a Graphon? Daniel Glasscock, June 2013
What is a Graphon? Daniel Glasscock, June 2013 These notes complement a talk given for the What is...? seminar at the Ohio State University. The block images in this PDF should be sharp; if they appear
More informationSection A. 1. a) Explain the evolution of information systems into today s complex information ecosystems and its consequences.
Section A 1. a) Explain the evolution of information systems into today s complex information ecosystems and its consequences. b) Discuss the reasons behind the phenomenon of data retention, its disadvantages,
More informationEscaping Local Optima: Genetic Algorithm
Artificial Intelligence Escaping Local Optima: Genetic Algorithm Dae-Won Kim School of Computer Science & Engineering Chung-Ang University We re trying to escape local optima To achieve this, we have learned
More informationWhat is This Thing Called System Configuration?
PAUL ANDERSON dcspaul@inf.ed.ac.uk Alva Couch couch@cs.tufts.edu What is This Thing Called System Configuration? Tufts University Computer Science LISA 2004 (1) Overview Paul says: The configuration problem
More informationModule B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8
Informs the capability Ensures Realization of Business Vision Business needs feed into method Refines Understanding Informs the Business of the current state Sets targets, KPIs, budgets for architecture
More information