PESIT Bangalore South Campus

Size: px
Start display at page:

Download "PESIT Bangalore South Campus"

Transcription

1 INTERNAL ASSESSMENT TEST 2 Date : 04//17 Max Marks : 50 Subject & Code : Object oriented Modeling & Design (CS71) Section : A and B Name of faculty : Mrs Sumana Sinha Time : 11:30-1:00 pm wer any five full questions Question 1 Prepare an use case diagram of computer system and explain the relevance of each Actor with corresponding uses case. Marks The diagram assumes that mail is moved from the server to the system as the user reads it. If mail is kept on the server, then the server would also be involved in the manage and maintain address list use cases. a. Some actors are: User. A person who is the focus of services. Server. A computer that communicates with the system and is the intermediate source and destination of messages. Virus checker. Software that protects against damage by a malicious user b. Some use cases are: Get . Retrieve from the server and display it for the user. Send . Take a message that was composed by the user and send it to the server.

2 Manage . Perform tasks such as deleting , managing folders, and moving between folders. Set options. Do miscellaneous things to tailor preferences to the user s liking. Maintain address list. Keep a list of addresses that are important to the user. 2 Write down the scenario of online stock broker and draw the sequence diagram for the same? 5&5 3a Explain with suitable example the following i> Include relationship ii> Extend relationship iii> Swim lanes 6 Include relationship. : The include relationship incorporates one use case within the behavior sequence of another use case.

3 Extend relationship: It adds incremental behavior to a use case and extension adds itself to the base rather than the base explicitly incorporating the extension. Swimlanes: 3b What are transient object explain with an example? 4 4 For an ATM system, analyze the different type of use cases by designing the use case diagram.

4 5 Write down the steps for choosing a software control strategy? Procedure control Event driven contro1 Concurrent Control Internal control Other Paradigm 6 Explain the application state model of ATM system. Application state model focuses on application classes and augments the domain state model. Determine application classes with states. Find events Build state diagram Check against other state diagrams Check against other state model Check against the interaction model 7 Write down the steps for reuse plan? Libraries Frameworks Patterns 8 Batch transformation Continuous transformation Batch transformation Performs the sequential computation. The application receives the input and aim is to compute an answer. The class model is important as there are various class models for

5 input, output and intervening stages The most important aim for batch transformation is to define a series of steps. Consider the following example Continuous transformation In this system the output actively depend on changing input and continuous transformation updates the output frequently Due to time constraint, the entire output cannot be recomputed, so it computes incrementally. Class, state model have similar purpose as with the batch transformation. One way to implement continuous transformation is with Pipeline function. Pipeline propagates the effect of each input stages and intermediate objects can be defined to improve the performance of pipeline * * * * * *.

Lecture 1. Chapter 6 Architectural design

Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process

More information

Architectural Design

Architectural Design Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures PART 1 ARCHITECTURAL DESIGN DECISIONS Recap on SDLC Phases

More information

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

Architectural Design

Architectural Design Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures Chapter 6 Architectural design 2 PART 1 ARCHITECTURAL DESIGN

More information

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered ² Architectural design decisions ² Architectural views ² Architectural patterns ² Application architectures 2 Software architecture ² The design

More information

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture Objectives Architectural Design To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

ASSIGNMENT- I Topic: Functional Modeling, System Design, Object Design. Submitted by, Roll Numbers:-49-70

ASSIGNMENT- I Topic: Functional Modeling, System Design, Object Design. Submitted by, Roll Numbers:-49-70 ASSIGNMENT- I Topic: Functional Modeling, System Design, Object Design Submitted by, Roll Numbers:-49-70 Functional Models The functional model specifies the results of a computation without specifying

More information

Architectural Design

Architectural Design Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Chapter 6 Architectural Design

Chapter 6 Architectural Design Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 7 Permissions

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 7 Permissions Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 7 Permissions Objective: Network Lab # 7 Permissions Define permissions. Explain the characteristics

More information

DLV02.01 Business processes. Study on functional, technical and semantic interoperability requirements for the Single Digital Gateway implementation

DLV02.01 Business processes. Study on functional, technical and semantic interoperability requirements for the Single Digital Gateway implementation Study on functional, technical and semantic interoperability requirements for the Single Digital Gateway implementation 18/06/2018 Table of Contents 1. INTRODUCTION... 7 2. METHODOLOGY... 8 2.1. DOCUMENT

More information

UNIT-4 Behavioral Diagrams

UNIT-4 Behavioral Diagrams UNIT-4 Behavioral Diagrams P. P. Mahale Behavioral Diagrams Use Case Diagram high-level behaviors of the system, user goals, external entities: actors Sequence Diagram focus on time ordering of messages

More information

Architectural Styles. Reid Holmes

Architectural Styles. Reid Holmes Material and some slide content from: - Emerson Murphy-Hill - Software Architecture: Foundations, Theory, and Practice - Essential Software Architecture Architectural Styles Reid Holmes Lecture 5 - Tuesday,

More information

Activity Diagram Written Date : September 02, 2016

Activity Diagram Written Date : September 02, 2016 Written Date : September 02, 2016 s describe how activities are coordinated to provide a service which can be at different levels of abstraction. Typically, an event needs to be achieved by some operation,

More information

AOMEI Backupper Network Beta Quick Start Guide

AOMEI Backupper Network Beta Quick Start Guide AOMEI Backupper Network Beta Overview AOMEI Backupper Network Beta is a solution to create and manage backups for your client computers within same LAN from server side. To back up for multiple client

More information

Best Practices for Model-Based Systems Engineering

Best Practices for Model-Based Systems Engineering Seminar / Workshop Best Practices for Model-Based Systems Engineering Hans-Peter Hoffmann, Ph.D. Chief Systems Methodologist, IBM Rational Software hoffmape@us.ibm.com Overview Successfully delivering

More information

In this Lecture you will Learn: System Design. System Architecture. System Architecture

In this Lecture you will Learn: System Design. System Architecture. System Architecture In this Lecture you will Learn: System Design Chapter 13 The major concerns of system design The main aspects of system architecture, in particular what is meant by subdividing a system into layers and

More information

How to setup Microsoft RDS

How to setup Microsoft RDS 1. Introduction UDS Enterprise enables the deployment and management of virtual applications through Microsoft Remote Desktop Services (RDS). RDS let users run applications remotely. In order to ensure

More information

Eaton Reviewer Quick Reference Guide

Eaton Reviewer Quick Reference Guide Key Contacts GlobalLink Support for all project related questions: Eaton_Support@transperfect.com GlobalLink Technology contact: Mariann Morrell eatontech@translations.com Project Director URL: https://eaton1.translations.com/pd/

More information

BPMN Getting Started Guide

BPMN Getting Started Guide Enterprise Studio BPMN Getting Started Guide 2017-09-21 Applies to: Enterprise Studio 3.0.0, Team Server 3.0.0 Table of contents 1 About modeling with BPMN 5 1.1 What is BPMN? 5 1.2 BPMN modeling 5 1.3

More information

Advanced Interaction

Advanced Interaction 8 Advanced nteraction Modeling The interaction model has several advanced features that can be helpful. You can skip this chapter on a first reading of the book. 8.1 Use Case Relationships ndependent use

More information

Nikon Capture NX "How To..." Series

Nikon Capture NX How To... Series 1 of 8 5/15/2007 2:24 PM Nikon Capture NX "How To..." Series Article 22 - How to convert multiple RAW NEF images to JPEG Purpose: Using the "Batch" process, you can convert all RAW NEF images in a single

More information

Backup everything to cloud / local storage. CloudBacko Pro. Essential steps to get started

Backup everything to cloud / local storage. CloudBacko Pro. Essential steps to get started CloudBacko Pro Essential steps to get started Last update: September 22, 2017 Index Step 1). Configure a new backup set, and trigger a backup manually Step 2). Configure other backup set settings Step

More information

OBJECT-ORIENTED SOFTWARE DEVELOPMENT Using OBJECT MODELING TECHNIQUE (OMT)

OBJECT-ORIENTED SOFTWARE DEVELOPMENT Using OBJECT MODELING TECHNIQUE (OMT) OBJECT-ORIENTED SOFTWARE DEVELOPMENT Using OBJECT MODELING TECHNIQUE () Ahmed Hayajneh, May 2003 1 1 Introduction One of the most popular object-oriented development techniques today is the Object Modeling

More information

Chapter 10. Object-Oriented Analysis and Modeling Using the UML. McGraw-Hill/Irwin

Chapter 10. Object-Oriented Analysis and Modeling Using the UML. McGraw-Hill/Irwin Chapter 10 Object-Oriented Analysis and Modeling Using the UML McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 10-2 Define object modeling and explain

More information

Visual Paradigm Quick Start

Visual Paradigm Quick Start Visual Paradigm Quick Start Last update: Apr 23, 2015 Copyright 2002-2015 Visual Paradigm International Ltd. Matrix Diagram... 33 Getting Started Installing Visual Paradigm 1. Execute the Visual Paradigm

More information

Ebix/HealthConnect Online Quoting

Ebix/HealthConnect Online Quoting E b i x / H e a l t h C o n n e c t O n l i n e Q u o t i n g Ebix/HealthConnect Online Quoting Ebix/HealthConnect s Online Quoting Application is a web-based small group rating, quoting and proposal generation

More information

Lab 01 Assignment. Diagramming Software Systems for Analysis and Design Modeling

Lab 01 Assignment. Diagramming Software Systems for Analysis and Design Modeling Lab 01 Assignment Diagramming Software Systems for Analysis and Design Modeling 1 Lab 01 Assignment Use computers in BR150 or Br180 OR download on your own laptop and a use all REQUIRED (IBM Rational.

More information

Business Process Document Fundamentals: Recognizing Universal Navigation Elements

Business Process Document Fundamentals: Recognizing Universal Navigation Elements Department Responsibility/Role File Name Version Document Generation Date 11/7/2007 Date Modified 11/7/2007 Last Changed by Status CS 8.9 Fundamentals Recognizing Universal Navigation Elements_BUSPROC.doc

More information

350 Index 2005 GOAL/QPC

350 Index 2005 GOAL/QPC Index abstract testing, 274 acceptance criteria, 270 acceptance tests, 270 activity diagrams, 113, 114, 174-175, 321 actor catalog, 144 actor description, 144 actor hierarchy, 148 actor map, 59, 114, 144,

More information

New Features Guide Sybase ETL 4.9

New Features Guide Sybase ETL 4.9 New Features Guide Sybase ETL 4.9 Document ID: DC00787-01-0490-01 Last revised: September 2009 This guide describes the new features in Sybase ETL 4.9. Topic Page Using ETL with Sybase Replication Server

More information

Chapter 4 Communication

Chapter 4 Communication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI

More information

CSC 330 Object Oriented Software Design. Software Design Phase

CSC 330 Object Oriented Software Design. Software Design Phase CSC 330 Object Oriented Software Design Software Design Phase 1 Overview Overview Design and abstraction Action-oriented design Data flow analysis Transaction analysis Data-oriented design Object-oriented

More information

Architectural Design. CSCE Lecture 12-09/27/2016

Architectural Design. CSCE Lecture 12-09/27/2016 Architectural Design CSCE 740 - Lecture 12-09/27/2016 Architectural Styles 2 Today s Goals Define what architecture means when discussing software development. Discuss methods of documenting and planning

More information

Failure Modelling in Software Architecture Design for Safety

Failure Modelling in Software Architecture Design for Safety Failure Modelling in Software Architecture Design for Safety Weihang Wu Tim Kelly Presented by George Despotou High Integrity Systems Engineering Group Department of Computer Science Failure Modelling

More information

ICS 52: Introduction to Software Engineering

ICS 52: Introduction to Software Engineering ICS 52: Introduction to Software Engineering Fall Quarter 2004 Professor Richard N. Taylor Lecture Notes Week 3: Architectures http://www.ics.uci.edu/~taylor/ics_52_fq04/syllabus.html Copyright 2004, Richard

More information

Chapter 8. Pipelining

Chapter 8. Pipelining Chapter 8. Pipelining Overview Pipelining is widely used in modern processors. Pipelining improves system performance in terms of throughput. Pipelined organization requires sophisticated compilation techniques.

More information

Architectural Design. Topics covered. Architectural Design. Software architecture. Recall the design process

Architectural Design. Topics covered. Architectural Design. Software architecture. Recall the design process Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

CS 138: Google. CS 138 XVII 1 Copyright 2016 Thomas W. Doeppner. All rights reserved.

CS 138: Google. CS 138 XVII 1 Copyright 2016 Thomas W. Doeppner. All rights reserved. CS 138: Google CS 138 XVII 1 Copyright 2016 Thomas W. Doeppner. All rights reserved. Google Environment Lots (tens of thousands) of computers all more-or-less equal - processor, disk, memory, network interface

More information

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION (Autonomous) (ISO/IEC Certified) MODEL ANSWER

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION (Autonomous) (ISO/IEC Certified) MODEL ANSWER Important Instructions to examiners: 1) The answers should be examined by key words and not as word-to-word as given in the model answer scheme. 2) The model answer and the answer written by candidate

More information

Combinational and sequential circuits (learned in Chapters 1 and 2) can be used to create simple digital systems.

Combinational and sequential circuits (learned in Chapters 1 and 2) can be used to create simple digital systems. REGISTER TRANSFER AND MICROOPERATIONS Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations Logic Microoperations Shift Microoperations Arithmetic Logic Shift

More information

R. Reports Menu: 8. Batch Detail Report

R. Reports Menu: 8. Batch Detail Report R. Reports Menu: 8. Batch Detail Report Table of Contents Batch Detail Report... 3 The Transaction Options tab... 3 The Output tab... 5 The Accounts tab... 6 The More Accounts tab... 8 Click on R. Reports

More information

Classes and Inheritance in Actor- Oriented Models

Classes and Inheritance in Actor- Oriented Models Classes and Inheritance in Actor- Oriented Models Stephen Neuendorffer Edward Lee UC Berkeley Chess Review May 8, 2003 Berkeley, CA Introduction Component-based design Object-oriented components Actor-oriented

More information

Decision. Intelligent. Assistant: Research and Technical Background. Emergency. ENEA, July by C.Balducelli S.Bologna and A.M.

Decision. Intelligent. Assistant: Research and Technical Background. Emergency. ENEA, July by C.Balducelli S.Bologna and A.M. EIDA Project ( Proposal ) Emergency Intelligent Decision Assistant: Toolkit for Coordinated Emergency Management Research and Technical Background by C.Balducelli S.Bologna and A.M.Gadomski ENEA, July

More information

3. Blackboard and Client/Server Systems

3. Blackboard and Client/Server Systems 3. Blackboard and Client/Server Systems 3.1 Introduction The blackboard model of problem solving arose from the Hearsay speech understanding systems [55,174,175] developed at Carnegie-Mellon University

More information

EEL 4783: HDL in Digital System Design

EEL 4783: HDL in Digital System Design EEL 4783: HDL in Digital System Design Lecture 3: Architeching Speed Prof. Mingjie Lin 1 Flowchart of CAD 2 Digital Circuits: Definition of Speed Throughput Latency The amount of data that is processed

More information

CHAPTER 4: Register Transfer Language and Microoperations

CHAPTER 4: Register Transfer Language and Microoperations CS 224: Computer Organization S.KHABET CHAPTER 4: Register Transfer Language and Microoperations Outline Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations

More information

Four Components of a Computer System. Operating System Concepts 7 th Edition, Jan 12, 2005

Four Components of a Computer System. Operating System Concepts 7 th Edition, Jan 12, 2005 Introduction Four Components of a Computer System 1.2 Silberschatz, Galvin and Gagne 2005 Computer System Organization Computer-system operation One or more CPUs, device controllers connect through common

More information

Design of the MIPS Processor (contd)

Design of the MIPS Processor (contd) Design of the MIPS Processor (contd) First, revisit the datapath for add, sub, lw, sw. We will augment it to accommodate the beq and j instructions. Execution of branch instructions beq $at, $zero, L add

More information

Interactions A link message

Interactions A link message Interactions An interaction is a behavior that is composed of a set of messages exchanged among a set of objects within a context to accomplish a purpose. A message specifies the communication between

More information

REGISTER TRANSFER AND MICROOPERATIONS

REGISTER TRANSFER AND MICROOPERATIONS 1 REGISTER TRANSFER AND MICROOPERATIONS Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations Logic Microoperations Shift Microoperations Arithmetic Logic Shift

More information

System Sequence Diagrams. Based on Craig Larman, Chapter 10 and Anuradha Dharani s notes

System Sequence Diagrams. Based on Craig Larman, Chapter 10 and Anuradha Dharani s notes System Sequence Diagrams Based on Craig Larman, Chapter 10 and Anuradha Dharani s notes Dynamic behaviors Class diagrams represent static relationships. Why? What about modeling dynamic behavior? Interaction

More information

CS 138: Google. CS 138 XVI 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

CS 138: Google. CS 138 XVI 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. CS 138: Google CS 138 XVI 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Google Environment Lots (tens of thousands) of computers all more-or-less equal - processor, disk, memory, network interface

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

signature i-1 signature i instruction j j+1 branch adjustment value "if - path" initial value signature i signature j instruction exit signature j+1

signature i-1 signature i instruction j j+1 branch adjustment value if - path initial value signature i signature j instruction exit signature j+1 CONTROL FLOW MONITORING FOR A TIME-TRIGGERED COMMUNICATION CONTROLLER Thomas M. Galla 1, Michael Sprachmann 2, Andreas Steininger 1 and Christopher Temple 1 Abstract A novel control ow monitoring scheme

More information

6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views

6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views 1 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES Outline for Today 2 Architecture views C&C Views 1 Components and Connectors (C&C) Styles 3 Elements Relations Properties

More information

Testing Digital Systems I

Testing Digital Systems I Testing Digital Systems I Lecture 6: Fault Simulation Instructor: M. Tahoori Copyright 2, M. Tahoori TDS I: Lecture 6 Definition Fault Simulator A program that models a design with fault present Inputs:

More information

Final Examination. Winter Problem Points Score. Total 180

Final Examination. Winter Problem Points Score. Total 180 CS243 Winter 2002-2003 You have 3 hours to work on this exam. The examination has 180 points. Please budget your time accordingly. Write your answers in the space provided on the exam. If you use additional

More information

Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila

Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Software Design and Architecture Software Design Software design is a process of problem-solving

More information

An Introduction to Software Architecture

An Introduction to Software Architecture An Introduction to Software Architecture Software Engineering Design Lecture 11 Motivation for studying SW architecture As the size of SW systems increases, the algorithms and data structures of the computation

More information

Viewport 2.0 API Porting Guide for Locators

Viewport 2.0 API Porting Guide for Locators Viewport 2.0 API Porting Guide for Locators Introduction This document analyzes the choices for porting plug-in locators (MPxLocatorNode) to Viewport 2.0 mostly based on the following factors. Portability:

More information

Issues in the Development of Transactional Web Applications R. D. Johnson D. Reimer IBM Systems Journal Vol 43, No 2, 2004 Presenter: Barbara Ryder

Issues in the Development of Transactional Web Applications R. D. Johnson D. Reimer IBM Systems Journal Vol 43, No 2, 2004 Presenter: Barbara Ryder Issues in the Development of Transactional Web Applications R. D. Johnson D. Reimer IBM Systems Journal Vol 43, No 2, 2004 Presenter: Barbara Ryder 3/21/05 CS674 BGR 1 Web Applications Transactional processing

More information

MIS Essentials, 4e (Kroenke) Chapter 2: Business Processes, Information Systems, and Information

MIS Essentials, 4e (Kroenke) Chapter 2: Business Processes, Information Systems, and Information MIS Essentials, 4e (Kroenke) Chapter 2: Business Processes, Information Systems, and Information Multiple Choice 1) A is a network of activities for accomplishing a business function. A) workgroup B) task

More information

Software Engineering

Software Engineering Software Engineering Engr. Abdul-Rahman Mahmood MS, MCP, QMR(ISO9001:2000) Usman Institute of Technology University Road, Karachi armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm

More information

Design of the MIPS Processor

Design of the MIPS Processor Design of the MIPS Processor We will study the design of a simple version of MIPS that can support the following instructions: I-type instructions LW, SW R-type instructions, like ADD, SUB Conditional

More information

Object-Oriented Systems Analysis and Design Using UML

Object-Oriented Systems Analysis and Design Using UML 10 Object-Oriented Systems Analysis and Design Using UML Systems Analysis and Design, 8e Kendall & Kendall Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall Learning Objectives Understand

More information

COMP108 Algorithmic Foundations

COMP108 Algorithmic Foundations Algorithmic Foundations Basics Prudence Wong http://www.csc.liv.ac.uk/~pwong/teaching/comp108/201314 Crossing Bridge @ Night 1 min each time, 2 persons share a torch they walk @ speed of slower person

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

COURSE OVERVIEW & OPERATING SYSTEMS CONCEPT Operating Systems Design Euiseong Seo

COURSE OVERVIEW & OPERATING SYSTEMS CONCEPT Operating Systems Design Euiseong Seo COURSE OVERVIEW & OPERATING SYSTEMS CONCEPT 2017 Operating Systems Design Euiseong Seo (euiseong@skku.edu) Overview What this course is about How you study this course Why you have to take this course

More information

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION (Autonomous) (ISO/IEC Certified) MODEL ANSWER

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION (Autonomous) (ISO/IEC Certified) MODEL ANSWER Important Instructions to examiners: 1) The answers should be examined by key words and not as word-to-word as given in the model answer scheme. 2) The model answer and the answer written by candidate

More information

Final Exam. Final Exam Review. Ch 1: Introduction: Object-oriented analysis, design, implementation. Exam Format

Final Exam. Final Exam Review. Ch 1: Introduction: Object-oriented analysis, design, implementation. Exam Format Final Exam Final Exam Review CS 4354 Fall 2012 Jill Seaman Friday, December 14, 11AM Closed book, closed notes, clean desk Content: Textbook: Chapters 1, 2, 4-10 Java Lectures, GRASP + JUnit 35% of your

More information

Modeling Crisis Management System With the Restricted Use Case Modeling Approach

Modeling Crisis Management System With the Restricted Use Case Modeling Approach Modeling Crisis Management System With the Restricted Use Case Modeling Approach Gong Zhang 1, Tao Yue 2, and Shaukat Ali 3 1 School of Computer Science and Engineering, Beihang University, Beijing, China

More information

Reasoning About Exceptions Using Model Checking

Reasoning About Exceptions Using Model Checking Reasoning About Exceptions Using Model Checking Reid Simmons David Garlan Jeannette M. Wing George Fairbanks, Gil Tolle, Balaji Sarpeshkar, Joe Jiang Computer Science Department Carnegie Mellon University

More information

Compilers. Computer Science 431

Compilers. Computer Science 431 Compilers Computer Science 431 Instructor: Erik Krohn E-mail: krohne@uwosh.edu Text Message Only: 608-492-1106 Class Time: Tuesday & Thursday: 9:40am - 11:10am Classroom: Halsey 237 Office Location: Halsey

More information

Establishing the overall structure of a software system

Establishing the overall structure of a software system Architectural Design Establishing the overall structure of a software system Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 13 Slide 1 Objectives To introduce architectural design and

More information

Redesigning Apache Flink s Distributed Architecture. Till

Redesigning Apache Flink s Distributed Architecture. Till Redesigning Apache Flink s Distributed Architecture Till Rohrmann trohrmann@apache.org @stsffap 2 1001 Deployment Scenarios Many different deployment scenarios Yarn Mesos Docker/Kubernetes Standalone Etc.

More information

Lecture 15 Distributed System Architectures

Lecture 15 Distributed System Architectures Lecturer: Sebastian Coope Ashton Building, Room G.18 E-mail: coopes@liverpool.ac.uk COMP 201 web-page: http://www.csc.liv.ac.uk/~coopes/comp201 Lecture 15 Distributed System Architectures Architectural

More information

VP-UML Quick Start. Last update: October 15, Copyright Visual Paradigm International Ltd.

VP-UML Quick Start. Last update: October 15, Copyright Visual Paradigm International Ltd. VP-UML Quick Start Last update: October 15, 2012 Copyright 2002-2012 Visual Paradigm International Ltd. Table of Contents Table of Contents... 2 Getting Started... 3 Installing Visual Paradigm for UML

More information

Tutorial SemTalk 3.2 EPC Edition

Tutorial SemTalk 3.2 EPC Edition Tutorial SemTalk 3.2 EPC Edition Contents 1. About Event-driven Process Chains (EPC)... 3 2. Starting SemTalk EPC Edition... 4 3. Editing a process... 6 3.1. Adding Process Elements... 7 3.2. Using Swimlanes...

More information

Chapter 7 Consistency And Replication

Chapter 7 Consistency And Replication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 7 Consistency And Replication Data-centric Consistency Models Figure 7-1. The general organization

More information

CHAPTER 9 DESIGN ENGINEERING. Overview

CHAPTER 9 DESIGN ENGINEERING. Overview CHAPTER 9 DESIGN ENGINEERING Overview A software design is a meaningful engineering representation of some software product that is to be built. Designers must strive to acquire a repertoire of alternative

More information

An Introduction to Software Architecture

An Introduction to Software Architecture An Introduction to Software Architecture Software Requirements and Design CITS 4401 Lecture 11 Motivation for studying SW architecture As the size of SW systems increase, the algorithms and data structures

More information

Replication in Distributed Systems

Replication in Distributed Systems Replication in Distributed Systems Replication Basics Multiple copies of data kept in different nodes A set of replicas holding copies of a data Nodes can be physically very close or distributed all over

More information

Department of Computer Science and Engineering

Department of Computer Science and Engineering Department of Computer Science and Engineering UNIT-III PROCESSOR AND CONTROL UNIT PART A 1. Define MIPS. MIPS:One alternative to time as the metric is MIPS(Million Instruction Per Second) MIPS=Instruction

More information

CSC 261/461 Database Systems Lecture 20. Spring 2017 MW 3:25 pm 4:40 pm January 18 May 3 Dewey 1101

CSC 261/461 Database Systems Lecture 20. Spring 2017 MW 3:25 pm 4:40 pm January 18 May 3 Dewey 1101 CSC 261/461 Database Systems Lecture 20 Spring 2017 MW 3:25 pm 4:40 pm January 18 May 3 Dewey 1101 Announcements Project 1 Milestone 3: Due tonight Project 2 Part 2 (Optional): Due on: 04/08 Project 3

More information

Module 4: Processes. Process Concept Process Scheduling Operation on Processes Cooperating Processes Interprocess Communication

Module 4: Processes. Process Concept Process Scheduling Operation on Processes Cooperating Processes Interprocess Communication Module 4: Processes Process Concept Process Scheduling Operation on Processes Cooperating Processes Interprocess Communication Operating System Concepts 4.1 Process Concept An operating system executes

More information

Module 4: Processes. Process Concept Process Scheduling Operation on Processes Cooperating Processes Interprocess Communication

Module 4: Processes. Process Concept Process Scheduling Operation on Processes Cooperating Processes Interprocess Communication Module 4: Processes Process Concept Process Scheduling Operation on Processes Cooperating Processes Interprocess Communication 4.1 Process Concept An operating system executes a variety of programs: Batch

More information

How to Give a Bad Talk

How to Give a Bad Talk Lecture 20: How to Give a Bad Talk Professor David A. Patterson Computer Science 152 Fall 1997 Cs252.1 CS 152: Remaining Schedule What s Left: Thursday 12/4: Oral Presentations, Noon to 7PM, 6thfloor Friday

More information

Web Enabling Solution for Windows Desktop Applications. White Paper

Web Enabling Solution for Windows Desktop Applications. White Paper Web Enabling Solution for Windows Desktop Applications White Paper 1. Introduction Thinfinity VirtualUI offers a GUI remoting solution for in house Windows desktop developments, allowing them to be delivered

More information

Generating system documentation augmented with traceability information, using a central XML-based repository

Generating system documentation augmented with traceability information, using a central XML-based repository Generating system documentation augmented with traceability information, using a central XML-based repository Master s thesis presentation Thomas U. Kraus Department of Software Engineering Faculty of

More information

Software Engineering Principles

Software Engineering Principles 1 / 19 Software Engineering Principles Miaoqing Huang University of Arkansas Spring 2010 2 / 19 Outline 1 2 3 Compiler Construction 3 / 19 Outline 1 2 3 Compiler Construction Principles, Methodologies,

More information

IDERA ER/Studio Software Architect Evaluation Guide. Version 16.5/2016+ Published February 2017

IDERA ER/Studio Software Architect Evaluation Guide. Version 16.5/2016+ Published February 2017 IDERA ER/Studio Software Architect Evaluation Guide Version 16.5/2016+ Published February 2017 2017 IDERA, Inc. All rights reserved. IDERA and the IDERA logo are trademarks or registered trademarks of

More information

Visual Paradigm Quick Start

Visual Paradigm Quick Start Visual Paradigm Quick Start Last update: Apr 15, 2014 Copyright 2002-2014 Visual Paradigm International Ltd. Table of Contents Table of Contents... 2 Getting Started... 3 Installing Visual Paradigm...

More information

Architectural Patterns

Architectural Patterns Architectural Patterns Dr. James A. Bednar jbednar@inf.ed.ac.uk http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson dr@inf.ed.ac.uk http://www.inf.ed.ac.uk/ssp/members/dave.htm SEOC2 Spring 2005:

More information

Specifying Precise Use Cases with Use Case Charts

Specifying Precise Use Cases with Use Case Charts Specifying Precise Use Cases with Use Case Charts Jon Whittle Dept of Information & Software Engineering George Mason University 4400 University Drive Fairfax, VA 22030 jwhittle@ise.gmu.edu Abstract. Use

More information

Topic 01. Software Engineering, Web Engineering, agile methodologies.

Topic 01. Software Engineering, Web Engineering, agile methodologies. Topic 01 Software Engineering, Web Engineering, agile methodologies. 1 What is Software Engineering? 2 1 Classic Software Engineering The IEEE definition: Software Engineering is the application of a disciplined,

More information

Cascaded Pyramid Network for Multi-Person Pose Estimation

Cascaded Pyramid Network for Multi-Person Pose Estimation Cascaded Pyramid Network for Multi-Person Pose Estimation Gang YU yugang@megvii.com Megvii (Face++) Team members: Yilun Chen* Zhicheng Wang* Xiangyu Peng Zhiqiang Zhang Gang Yu Jian Sun (https://arxiv.org/abs/1711.07319)

More information

SAMPLE. ICT Level 1. Functional Skills. Mark Scheme. Assessment Code: FSIL1SA/P. The following documents are included in this assessment pack:

SAMPLE. ICT Level 1. Functional Skills. Mark Scheme. Assessment Code: FSIL1SA/P. The following documents are included in this assessment pack: Functional Skills ICT Level Scheme The following documents are included in this assessment pack: scheme Coverage grid. Assessment Code: FSILSA/P October 07 FS ICT L - Scheme - Sample P a g e Part A Q Criteria

More information

Advanced Topics in Distributed Systems. Dr. Ayman A. Abdel-Hamid. Computer Science Department Virginia Tech

Advanced Topics in Distributed Systems. Dr. Ayman A. Abdel-Hamid. Computer Science Department Virginia Tech Advanced Topics in Distributed Systems Dr. Ayman A. Abdel-Hamid Computer Science Department Virginia Tech Communication (Based on Ch2 in Distributed Systems: Principles and Paradigms, 1/E or Ch4 in 2/E)

More information