From i* to istar 2.0: An Evolving Social Modelling Language
|
|
- Brittany Moody
- 5 years ago
- Views:
Transcription
1 From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, , China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps its adopters to describe an abstract observation to given rea word phenomena. i*, as a socia modeing anguage, was widey adopted by researchers in both requirements engineering and business information system anaysis. In order to further extend its adoption in future research and practice, istar 2.0 was conceived and pubished to reduce ambiguities and compexities. In this paper, I woud ike to share my observations as an i* modeer, about the major differences identified between i* and istar 2.0, about how to map an i* mode to an istar 2.0 mode, as we as how to further evove the modeing anguage to serve for the next generation modeing needs. Keywords: socia modeing, concepts, reations, evoution 1 Motivation My first contact with i* was in year 1999, a few months before my graduation and joining Eric s group, I downoaded two of his major i* modeing papers, in which he used i* to anayse business process of IKEA [1], and the mutua dependencies between members in software project team [2]. At that time, my word mode was aready agentoriented, due to my master s thesis, on Actor [3], the concurrent computing mode, and PhD thesis, on Agent-oriented requirements anaysis using Agent-Z [4] and process agebra to formaise use case scenarios. My first impression to the exampe modes was: it is a bit compex, and drawn artisticay, different from most other software engineering modes that I was famiiar with, such as, message sequence charts, state machines, and cass diagrams. Tonight, I finay get a chance to read the i* 2.0 Language Guide [5] by Fabiano, Xavier and Jennifer, word by word, which I shoud have done two and haf years earier, whie they sent numerous messages asking for comments and inputs. I fee synchronised with the evoving anguage finay, aas, it is better ate than never.
2 2 2 Reated work Bits and pieces in Retrospect of 17 Years persona modeing and extension experience with i* 2.1 A Successfu exercise - Modeing Trust in Smart Cards It didn t take me ong to faing in ove with using i* to mode rea word. As my first modeing exercise was a perfect match. Modeing trust in smart-cards systems can make use of many of the interesting modeing constructs in i*[6]. Incuding: Strategic dependency modeing captures the major roes in a genera smart-card system, and their dependencies. Roe, position and agent together with roe-paying and position occupancy inks, which are used to capture who is paying attacker, and which organisationa payer is paying the abstract roe of card owner, software owner, data producer, and how the trust and dependency distributed among different organisationa settings. The fexibe use of contribution inks, in particuar, the attacks are represented as a break contribution ignited from the attacker to the victim or vunerabe eement or ink. 2.2 A first attempt to extend i* capturing tempora orders between tasks with prior-to ink My second modeing exercise was due to the marriage of GRL with UCM [7]. GRL is a variation of i*, which emphasis more the goa-oriented perspectives of i*, I think I tried to combine the two anguage in a different way comparing to what the current URN standards suggested. I wanted to use i* mode as the container, or the pace-hoder of scenarios. I ony wanted the jogge ine of UCM, which traversing the tasks in i* payed by different actors. It captures the refining process of goas and generated the run-time execution scenarios invoving mutipe actors in the mode. In my mind, goas, actors, and scenarios are the three pieces to be fit together in the requirements engineering puzze. 2.3 Another successfu exercise modeing service reationships My next major move was using i* in services modeing. Again, i*, especiay, the socia, strategic dependency modeing construct, was a natura fit to mode service providers and service consumers, their needs and capabiities, their deegation of different types, their commitment and deivery of services, and quaity of service [8]. i* is expressive enough support my modeing objectives and provide meaningfu types of anaysis.
3 3 2.4 A second attempt to extend i* capturing context as annotations My second attempt to extend i* was due to the modeing needs of service adaptation. Where I wanted to say that when service text changes, service provider and consumer s choices wi change accordingy, so I associated context information on each of the service goa refinement ink [9]. I am doing this retrospect just to take a position of modeer, to see if the current istar 2.0 concepts and reations wi sti aow me to do simiar things in a cearer way, or it has decided to avoid such use or extension of the modeing anguage. 3 Redrawing i* modes with istar Discard organizationa positions together with occupancy and coverage ink As shown on the eft-hand side, in i*, position is used to capture organizationa positions, which can cover different abstract roes, and being occupied by different agents. As i* was designed as an organizationa modeing anguage, so position is considered as a first-cass modeing concept. In istar 2.0, organization is not stressed anymore, so we can define it as an abstract roe, participatedby agents, and it can speciaize either an attacker or a defender or both using is-a ink. In this case, a cover ink wi become an is-a, an occupies wi become a participates-in. It is not cear whether the INS ink is represented now, as it is a reation between actors of same nature. Athough I can make the mapping, I fee that it is a more natura and direct refection of the rea word meaning using pays and is-part-of than participates-in in this case. Fig. 1 actors and association inks in i* [6] 3.2 Changing means-ends and decomposition as AND/OR refinement In istar 2.0, the means-ends and decomposition inks in i* are unified to be caed AND/OR refinement inks, which oosens up the origina i* s strict enforcement on iterative eicitation of aternative ways to satisfy a given goa using means-ends ink. As a modeer, I had hated the constraint of imposed by this means-ends semantics, as I had to use some dummy tasks and goas when there are not meaningfu aternatives to choose from. However, I have to admit that we shoud keep it in mind to ask the
4 4 question each time we face a goa. In other words, I woud rather see the current istar 2.0 treatment as a simpification of the i* syntax rather than a change of semantics. 3.3 Adding Quaification ink between a quaity attributes with its associated eements A new kind of ink, quaification ink, represented as dotted ine, inks the quaity attributes with the corresponding goa, resource and task eements expicity. This is a major extension in istar 2.0, which can ony be represented using the naming convention of subject[object] in softgoas in i* or NFR framework [10]. This extension carifies the semantics of quaity attributes and suggests a proper way of its usage. 3.4 Adding DependerEmt, dependeeemt, rues and constraints on socia dependencies There is a rues and constraints section in the specification of dependency reationship in istar 2.0. It gives cearer guideines to modeers which encourage the proper use of the ink. This incude: (1) adding definition of dependeremt, dependeeemt, and confine depender and dependee as actors; (2) when a depender deegates a dependeremt to others, it cannot be refined or contributed by other eements within the actor boundary. Dependency reationships are not aowed to share the same name, which means there is exacty one depender and one dependee for each dependums. This extension is aso a very good move in making the semantics of dependency ink cear and easy to use. 3.5 Adding NeededBy reation between a task and its required resource Resources are considered a sub-component of a task in i*, which is not distinguished from a sub-goa, sub-task, or sub-softgoa. In istar 2.0, as resources are different from goas and task in nature, a different kind of ink NeededBy is suggested. Its impication is that resources are eave nodes, they wi not be further refined, they are ony checked for avaiabiity or not. 3.6 Removing some of the contribution inks in i* In istar 2.0, four types of contribution inks are defined: hep, hurt, make and break. Other contribution ink types, such as: some+, some-, unknown, AND, OR are discarded. The impication of this change is that, contribution inks are evauated individuay, we ony consider weak or sufficient, positive or negative contributions from a source eement to a quaity attribute. This aso improves the carity of the modes.
5 5 4 Discussions In summary, istar 2.0 carifies ambiguities in i* modeing framework, which makes the adoption by students and engineers earning the modeing syntax and semantics easy. For i* users, it wi not require much effort to understand the changes and adopt it in new cases and appying the changes in existing i* modes. Some minor points require further deiberation are as foows: Is a roe aowed to participates-in an agent? Whie there is no ogica expanation for it, in the istar 2.0 meta-mode, it is not prohibited? Is instantiation reation in actors aowed in istar 2.0? Sometimes the modeer may want to express scenarios at an instance eve? Is a quaity attribute evauated by itsef or together with the eement it quaifies? In other words, whether a quaity attribute is a standaone eement or is ony meaningfu together with an entity? A major probem yet to be addressed are using views of actors as a measure to contro scaabiity of mode. In today s organization, socia and strategic anaysis is often supported with operationa data as evidence for socia dependencies and infuentia factors. Thus, automated eicitation of socia modeing concepts and reations are considered an effective way to obtain socia reation modes as in i*. Acknowedgements This paper is partiay supported by the Nationa Natura Science Foundation Project (Grant No ) and Nationa Science and Technoogy Support Program (project no. 2015BAH14F02). Tong Li acknowedges the support of BJUT Startup Funding No References 1. E. Yu. Strategic Modeing for Enterprise Integration, Proceedings of the 14th Word Congress of Internationa Federation of Automatic Contro (IFAC 99), Juy 5-9, 1999, Beijing, China. pp Permagon, Esevier Science. 2. E. Yu and J. Myopouos. Modeing Organizationa Issues for Enterprise Integration, Proceedings of Internationa Conference on Enterprise Integration and Modeing Technoogy, October 28-30, 1997, Turin, Itay. 3. Agha G A. Actors: A mode of concurrent computation in distributed systems[r]. MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB, d'inverno M, Kinny D, Luck M, et a. A forma specification of dmars[c]//internationa Workshop on Agent Theories, Architectures, and Languages. Springer Berin Heideberg, 1997:
6 6 5. Dapiaz F, Franch X, Horkoff J. istar 2.0 anguage guide[j]. arxiv preprint arxiv: , Yu E, Liu L. Modeing trust for system design using the i* strategic actors framework[m]//trust in Cyber-societies. Springer Berin Heideberg, 2001: Liu L, Yu E. Designing information systems in socia context: a goa and scenario modeing approach[j]. Information systems, 2004, 29(2): Liu L, Liu Q, Chi C H, et a. Towards a service requirements modeing ontoogy based on agent knowedge and intentions[j]. Internationa Journa of Agent-Oriented Software Engineering, 2008, 2(3): Sun J, Liu F, Zhang H, et a. Understanding the Diversity of Services Based on Users Identities[C]//Internationa Conference on Advanced Information Systems Engineering. Springer Berin Heideberg, 2011: Chung L, do Prado Leite J C S. On non-functiona requirements in software engineering[m]//conceptua modeing: Foundations and appications. Springer Berin Heideberg, 2009:
Mobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationAuthorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal
Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.
More informationNavigating and searching theweb
Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web
More informationIntroduction to USB Development
Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard
More informationAn Introduction to Design Patterns
An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationOuterjoins, Constraints, Triggers
Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in
More informationRelational Model. Lecture #6 Autumn, Fall, 2001, LRX
Reationa Mode Lecture #6 Autumn, 2001 #06 Reationa Mode HUST,Wuhan,China 121 Reationa Mode Tabe = reation. Coumn headers = attributes. Row = tupe Reation schema = name(attributes). Exampe: Beers(name,
More informationRDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*
RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationSection 3 : Exploring 3D shapes
Section 3 : Exporing 3D shapes Copyright 2016 The Open University Contents Section 3: Exporing 3D shapes 3 1. Using practica work 3 2. A cross-curricuar approach 4 3. Using practica work to consoidate
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationInternational Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement
Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation
More informationOutline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics
Outine Introduce yoursef!! What is Machine Learning? What is CAP-5610 about? Cass information and ogistics Lecture Notes for E Apaydın 2010 Introduction to Machine Learning 2e The MIT Press (V1.0) About
More informationA Method for Group Extraction in Complex Social Networks
This is not the fina version of this paper. You can find the fina version on the pubisher web page. A Method for Group Extraction in Compex Socia Networks Piotr Bródka 1, Katarzyna Musia 2, Przemysław
More informationFuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages
Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.
More informationMay 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home]
"Using Python": a Book Preview May 13, 1995 Mark Lutz Bouder, Coorado utz@kapre.com (303) 546-8848 [work] (303) 684-9565 [home] Introduction. This paper is a brief overview of the upcoming Python O'Reiy
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationA study of comparative evaluation of methods for image processing using color features
A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationSolutions to the Final Exam
CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationThe Internet and the web
The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationindex.pdf March 17,
index.pdf March 17, 2013 1 ITI 1121. Introduction to omputing II Marce Turcotte Schoo of Eectrica Engineering and omputer Science Linked List (Part 2) Tai pointer ouby inked ist ummy node Version of March
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationIntroducing a Target-Based Approach to Rapid Prototyping of ECUs
Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,
More informationAutomatic Grouping for Social Networks CS229 Project Report
Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct
More informationTSR: Topology Reduction from Tree to Star Data Grids
03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen
More informationAvaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1
Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information
More informationExtended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem
Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions
More informationSection 3: Exploring 3D shapes
Section 3: Exporing 3D shapes Contents Section 3: Exporing 3D shapes 3 1. Using practica work 3 2. A cross-curricuar approach 5 3. Using practica work to consoidate earning 6 Resource 1: Coecting and making
More informationA Method for Calculating Term Similarity on Large Document Collections
$ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information
More informationInfinity Connect Web App Customization Guide
Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationAdministration and Autonomy In A Replication-Transparent Distributed DBMS
Administration and Autonomy In A Repication-Transparent Distributed DBMS Kenneth R. Abbott, Dennis R. McCarthy Computer Corporation of America Four Cambridge Center, Cambridge, MA 02142 Abstract Administrative
More informationFDA Registration Trials. Aisha Shah CRP Information Meeting, Conducting FDA Registration Trials
FDA Registration Trias Aisha Shah CRP Information Meeting, Conducting FDA Registration Trias November 1, 2018 Goas Registration Tria Considerations DTL and RCR AE Submissions Essentia Documents Protoco
More informationModelling and Querying Video Data
Modeing and Querying Video Data Rune Hjesvod and Roger Midtstraum Department of Computer Systems and Teematics Norwegian Institute of Technoogy { rhj,roger}@idt.unit.no Abstract As video data is penetrating
More informationThe Big Picture WELCOME TO ESIGNAL
2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for
More informationIFLA LRM- finally here
IFLA LRM- finay here Maja Žumer University of Ljubjana, Sovenia Pat Riva Concordia University, Montrea, Canada FRBR Consoidation - Why and How FRBR (1998), FRAD (2009), FRSAD (2010) 3 distinct modes Different
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based
More informationSpace-Time Trade-offs.
Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe
More informationDynamic Symbolic Execution of Distributed Concurrent Objects
Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United
More informationMore Relation Model: Functional Dependencies
More Reation Mode: Functiona Dependencies Lecture #7 Autumn, 2001 Fa, 2001, LRX #07 More Reation Mode: Functiona Dependencies HUST,Wuhan,China 152 Functiona Dependencies X -> A = assertion about a reation
More informationExtracting semistructured data from the Web: An XQuery Based Approach
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More informationHour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model
Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide
More informationHalf Year 2018 DDoS Trends Report
Haf Year 2018 DDoS Trends Report EXECUTIVE SUMMARY 3 Key Trends 7 Key Insights 12 Recommendations 14 Summary Organizations have become dependent on the Internet as a means to conduct business and deiver
More informationINTELLIGENT USER INTERFACE IN FUZZY ENVIRONMENT
INTELLIGENT SE INTEFACE IN FZZY ENVIONMENT Ben Khayut 1, Lina Fabri 2 and Maya Abuhana 3 1 Department of &D, IDTS at Inteigence Decisions Technoogies Systems, Ashdod, Israe ben_hi@hotmai.com 2 Department
More informationLink Registry Protocol Options
Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission
More informationWelcome - CSC 301. CSC 301- Foundations of Programming Languages
Wecome - CSC 301 CSC 301- Foundations of Programming Languages Instructor: Dr. Lutz Hame Emai: hame@cs.uri.edu Office: Tyer, Rm 251 Office Hours: TBA TA: TBA Assignments Assignment #0: Downoad & Read Syabus
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationA SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS
Artificia Inteigence and Language Processing ]acques Cohen Editor A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS LESLIE LAMPORT Over the past few years, I have deveoped an approach to the forma specification
More informationNCH Software Express Delegate
NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationConfidence in measurement
Confidence in measurement Caibration Goba caibration network www.kister.com Tech Center Tech Office Production Center Kister caibration network Acceerometers Data Acquisition (Crash) Whee Force Transducers
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationAvaya Interaction Center Client SDK Programmer Guide
Avaya Interaction Center Cient SDK Programmer Guide Reease 7.2 May 2013 Issue 1.1 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document
More informationChapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies.
Chapter 3: KDE Page 1 of 31 Chapter 3: KDE In This Chapter What Is KDE? Instaing KDE Seecting KDE Basic Desktop Eements Running Programs Stopping KDE KDE Capabiities Configuring KDE with the Contro Center
More informationngenius Instrumentation Overview
ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark
More informationChapter 3: Introduction to the Flash Workspace
Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage
More informationFor Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah
Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationGeometric clustering for line drawing simplification
Eurographics Symposium on Rendering (2005) Kavita Baa, Phiip Dutré (Editors) Geometric custering for ine drawing simpification P. Bara, J.Thoot and F. X. Siion ε ARTIS GRAVIR/IMAG INRIA Figure 1: The two
More informationAvaya one-x Mobile Pre-Installation Checklist
Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete
More informationWindows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture
Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina
More informationComputing devices have become increasingly mobile at the client end, and the
Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized
More informationReadme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT
ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported
More informationTHE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM
17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationModelling and Performance Evaluation of Router Transparent Web cache Mode
Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,
More informationPCT: Partial Co-Alignment of Social Networks
PCT: Partia Co-Aignment of Socia Networks Jiawei Zhang University of Iinois at Chicago Chicago, IL, USA jzhan9@uicedu Phiip S Yu University of Iinois at Chicago, IL, USA Institute for Data Science Tsinghua
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More information(12) United States Patent (16) Patent N0.: US 6,604,196 B1 Monday et al. (45) Date of Patent: Aug. 5, 2003
US006604196B1 (12) United States Patent (16) Patent N0.: Monday et a. () Date of Patent: Aug. 5, 2003 (54) APPARATUS AND METHOD FOR (56) References Cited COMPONENT ROLE FULFILLMENT BASED ON ENVIRONMENT
More informationRealization of GGF DAIS Data Service Interface for Grid Access to Data Streams
Reaization of GGF DAIS Data Interface for Grid Access to Data Streams Ying Liu, Beth Pae, Nithya Vijayakumar Indiana University Boomington, IN IU-CS TR 613 ABSTRACT As the computation power of hardware
More informationA New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions
2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationDevelopment of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim
Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationEvolving Role Definitions Through Permission Invocation Patterns
Evoving Roe Definitions Through Permission Invocation Patterns Wen Zhang EECS Dept. Vanderbit University Nashvie, TN, USA wen.zhang.1@vanderbit.edu David Liebovitz Dept. of Medicine Northwestern University
More informationPeople's Republic of China b College of Life and Environmental Science, Central University. Nanjing, People's Republic of China
This artice was downoaded by: [Nationa Library of China] On: 30 December 2011, t: 18:19 Pubisher: Tayor & Francis Informa Ltd Registered in Engand and Waes Registered Number: 1072954 Registered office:
More informationA Taxonomy for Computer Architectures
A Taxonomy for Computer Architectures David B. Skiicorn Queen s University at Kingston F ynn s cassification of architectures does not discriminate ceary between different mutiprocessor architectures.
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationImportance of Timely Data Submission
Importance of Timey Data Submission Shauna Himan Mayo Cinic CRP Information Session, November 2 nd, 2017 Presentation Objectives Iustrate the importance of data submission timeiness Communicate the status
More informationComplex Human Activity Searching in a Video Employing Negative Space Analysis
Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798
More informationOn Reasoning about Structural Equality in XML: A Description Logic Approach
On Reasoning about Structura Equaity in XML: A Description Logic Approach David Toman and Grant Wedde Schoo of Computer Science, University of Wateroo, Canada {david,gwedde}@uwateroo.ca Abstract. We define
More informationRough Sets Clustering and Markov model for Web Access Prediction
Proceedings of the Postgraduate Annua Research Seminar 006 470 Rough Sets Custering and Marov mode for Web Access Prediction Siriporn Chimphee 1, Naomie Saim, Mohd Saihin Bin Ngadiman, Witcha Chimphee
More informationUser-Centered Security
User-Centered Security Mary Een Zurko zurko@opengroup.org The Open Group Research Institute Eeven Cambridge Center Cambridge, MA 02142 Richard T. Simon rsimon@opengroup.org The Open Group Research Institute
More informationMOS 2013 Study Guide. Microsoft Excel Expert EXAMS & Mark Dodge.
MOS 2013 Study Guide Mark Dodge EXAMS 77-427 & 77-428 Microsoft Exce Expert PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2013
More informationSpecial Edition Using Microsoft Office Sharing Documents Within a Workgroup
Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing
More information