Enhancing Feature Interfaces for Suppor8ng So9ware Product Line Maintenance

Size: px
Start display at page:

Download "Enhancing Feature Interfaces for Suppor8ng So9ware Product Line Maintenance"

Transcription

1 Enhancing Feature Interfaces for Suppor8ng So9ware Product Line Maintenance Bruno B. P. Cafeo LES DI PUC- Rio - Brazil OPUS Group

2 Mo:va:on So9ware Product Line (SPL) Feature Model Page - 2

3 Mo:va:on Boundaries of features and modules of a programming language Legend: PE Program Element PE1 PE6 PE4 PE2 PE3 PE5 PE7 PE8 Feature Model Source code Page - 3

4 Mo:va:on Feature Dependencies in the source code of a SPL Legend: PE Program Element PE1 PE6 PE4 PE2 PE3 PE5 PE7 PE8 Feature Model Source code Page - 4

5 Mo:va:on Feature Dependencies in the source code of a SPL Legend: PE Program Element Feature under maintenance PE1 PE6 PE4 PE2 PE3 PE5 PE7 PE8 Feature Model Source code Page - 5

6 Mo:va:on Feature Dependencies in the source code of a SPL Legend: PE Program Element Maintenance problems related to the presence of a feature dependency Feature under maintenance PE1 PE6 PE4 PE2 PE3 PE5 PE7 PE8 Feature Model Source code Page - 6

7 Two points to explore! Iden:fica:on and understanding of feature dependency proper8es and their impact on SPL maintenance! Feature modularity improvement Page - 7

8 Two points to explore! Iden:fica:on and understanding of feature dependency proper8es and their impact on SPL maintenance! Feature modularity improvement Page - 8

9 Feature Dependency Proper:es! There is no conceptual framework that characterizes feature dependency proper:es in the source code! Revealing proper:es that may exert an impact on SPL maintenance would be interes:ng Page - 9

10 Feature Dependency Proper:es Results! Iden:fica:on of proper:es and defini:on of metrics based on these proper:es! Correla:on of these metrics with SPL maintenance problems! Comparison of our metrics with conven:onal metrics Page - 10

11 Two points to explore! Iden:fica:on and understanding of feature dependency proper8es and their impact on SPL maintenance! Feature modularity improvement Page - 11

12 Feature Interface Looking at the source code level! As in a conven:onal stand- alone soxware (i.e. non- SPLs), interfaces should help the understanding of the communica8on between features in SPLs! Program elements configuring dependencies are part of an implicit feature interface Page - 12

13 Challenge Complex feature interfaces REGULAR_ACCOUNT account_number type sort_code balance paid_in[] paid_out[] getendofmonthbalance() getbalance() makeapayment() getfullstatement() viewaccountdetailts() gettaxes()! Feature interfaces may become large! Several elements are member of an implicit interface! Implicit feature interfaces are not cohesive! Groups of elements act together for the purpose of a dependency Page - 13

14 Towards a Solu:on! The proposed solu:on relies on the idea of Interface Segrega,on Principle (ISP) that states that clients should not be forced to depend upon interfaces that they do not use! We observe the idea of ISP from the point of view of SPL maintenance and we argue that Developers should not be forced to understand parts of an interface that are not useful to their tasks Page - 14

15 Towards a Solu:on (simple example) Iden8fying feature interface elements Legend: PE Program Element Feature Interface att1 att2 att3 att4 att5 att6 att7 method1 method2 method3 method4 method5 {method4, method5, att,6, att7} PE2 PE1 {att3, att4, att5, method3} PE7 {att1, att2, method1, method2} PE3 PE6 PE4 PE8 PE5 Feature blue Source code Page - 15

16 Towards a Solu:on (simple example) Understanding the feature interface Important part of the code Legend: PE Program Element Feature Interface Relevant elements of the collaboration PE1 {att1, att2, method1, method2} PE6 {att3, att4, att5, method3} PE4 PE2 PE3 aj6 aj7 method4 method5 {method4, method5, att,6, att7} PE7 PE8 PE5 Feature blue Source code Page - 16

17 Feature Interface Evalua8on! Conduct empirical studies to compare! The reduc:on of maintenance side effects! The SPL maintenance effort Page - 17

18 Thanks! Page - 18

19 Enhancing Feature Interfaces for Suppor8ng So9ware Product Line Maintenance Bruno B. P. Cafeo LES DI PUC- Rio - Brazil OPUS Group

Enhancing Feature Interfaces for Suppor8ng So9ware Product Line Maintenance

Enhancing Feature Interfaces for Suppor8ng So9ware Product Line Maintenance Enhancing Feature Interfaces for Suppor8ng So9ware Product Line Maintenance Bruno B. P. Cafeo LES DI PUC- Rio - Brazil OPUS Group Introduc

More information

Net.info. A proposal for making network service informa6on easily available. Steven Bauer Slides from 2010 MIT

Net.info. A proposal for making network service informa6on easily available. Steven Bauer Slides from 2010 MIT Net.info A proposal for making network service informa6on easily available Steven Bauer Slides from 2010 MIT Problem No easy way to iden6fy network service informa6on Ini6al mo6va6on is to make very basic

More information

Improving ExcepKon Handling with RecommendaKons

Improving ExcepKon Handling with RecommendaKons Improving ExcepKon Handling with RecommendaKons Eiji Adachi Barbosa Advisor: Alessandro Garcia LES DI PUC- Rio Brazil ICSE 14 Doctoral Symposium OPUS Research Group ExcepKons occurrence System that manages

More information

Model- Based Security Tes3ng with Test Pa9erns

Model- Based Security Tes3ng with Test Pa9erns Model- Based Security Tes3ng with Test Pa9erns Julien BOTELLA (Smartes5ng) Jürgen GROSSMANN (FOKUS) Bruno LEGEARD (Smartes3ng) Fabien PEUREUX (Smartes5ng) Mar5n SCHNEIDER (FOKUS) Fredrik SEEHUSEN (SINTEF)

More information

Dependency Cycles in So/ware Systems: Quality Issues and Opportuni:es for Refactoring

Dependency Cycles in So/ware Systems: Quality Issues and Opportuni:es for Refactoring Dependency Cycles in So/ware Systems: Quality Issues and Opportuni:es for Refactoring Tosin Daniel Oyetoyan Doctoral Thesis Presentation Trondheim, Norway June 26 th 2015 Agenda v Introduc)on v Research

More information

F.P. Brooks, No Silver Bullet: Essence and Accidents of Software Engineering CIS 422

F.P. Brooks, No Silver Bullet: Essence and Accidents of Software Engineering CIS 422 The hardest single part of building a software system is deciding precisely what to build. No other part of the conceptual work is as difficult as establishing the detailed technical requirements...no

More information

Register Alloca.on Deconstructed. David Ryan Koes Seth Copen Goldstein

Register Alloca.on Deconstructed. David Ryan Koes Seth Copen Goldstein Register Alloca.on Deconstructed David Ryan Koes Seth Copen Goldstein 12th Interna+onal Workshop on So3ware and Compilers for Embedded Systems April 24, 12009 Register Alloca:on Problem unbounded number

More information

History OOHDM. Hypermedia Design OOHDM. Developed by Gustavo Rossi (Universidad Nacional de la Plata)

History OOHDM. Hypermedia Design OOHDM. Developed by Gustavo Rossi (Universidad Nacional de la Plata) History OOHDM The Object Oriented Hypermedia Design Methods Developed by Gustavo Rossi (Universidad Nacional de la Plata) and Daniel Schwabe (PUC Rio, Brazil) In my view, the best method for designing

More information

Outline. In Situ Data Triage and Visualiza8on

Outline. In Situ Data Triage and Visualiza8on In Situ Data Triage and Visualiza8on Kwan- Liu Ma University of California at Davis Outline In situ data triage and visualiza8on: Issues and strategies Case study: An earthquake simula8on Case study: A

More information

RDD and Strategy Pa.ern

RDD and Strategy Pa.ern RDD and Strategy Pa.ern CSCI 3132 Summer 2011 1 OO So1ware Design The tradi7onal view of objects is that they are data with methods. Smart Data. But, it is be.er to think of them as en##es that have responsibili#es.

More information

Nfsight Ne*low- based Network Awareness Tool

Nfsight Ne*low- based Network Awareness Tool LISA 10 Nov 7-12, 2010 San Jose, CA Nfsight Ne*low- based Network Awareness Tool Robin Berthier (University of Illinois at Urbana- Champaign) Michel Cukier (University of Maryland) Ma3 Hiltunen (AT&T Research)

More information

Tools zur Op+mierung eingebe2eter Mul+core- Systeme. Bernhard Bauer

Tools zur Op+mierung eingebe2eter Mul+core- Systeme. Bernhard Bauer Tools zur Op+mierung eingebe2eter Mul+core- Systeme Bernhard Bauer Agenda Mo+va+on So.ware Engineering & Mul5core Think Parallel Models Added Value Tooling Quo Vadis? The Mul5core Era Moore s Law: The

More information

Design and Implementa/on of a Consolidated Middlebox Architecture. Vyas Sekar Sylvia Ratnasamy Michael Reiter Norbert Egi Guangyu Shi

Design and Implementa/on of a Consolidated Middlebox Architecture. Vyas Sekar Sylvia Ratnasamy Michael Reiter Norbert Egi Guangyu Shi Design and Implementa/on of a Consolidated Middlebox Architecture Vyas Sekar Sylvia Ratnasamy Michael Reiter Norbert Egi Guangyu Shi 1 Need for Network Evolu/on New applica/ons Evolving threats Performance,

More information

Chunking: An Empirical Evalua3on of So7ware Architecture (?)

Chunking: An Empirical Evalua3on of So7ware Architecture (?) Chunking: An Empirical Evalua3on of So7ware Architecture (?) Rachana Koneru David M. Weiss Iowa State University weiss@iastate.edu rachana.koneru@gmail.com With participation by Audris Mockus, Jeff St.

More information

Robust Identification of Fuzzy Duplicates

Robust Identification of Fuzzy Duplicates Robust Identification of Fuzzy Duplicates ì Authors: Surajit Chaudhuri (Microso3 Research) Venkatesh Gan; (Microso3 Research) Rajeev Motwani (Stanford University) Publica;on: 21 st Interna;onal Conference

More information

Seman&c Aware Anomaly Detec&on in Real World Parking Data

Seman&c Aware Anomaly Detec&on in Real World Parking Data Seman&c Aware Anomaly Detec&on in Real World Parking Data Arnamoy Bha+acharyya 1, Weihan Wang 2, Chris&ne Tsang 2, Cris&ana Amza 1 1 University of Toronto, 2 Smarking Inc Mo&va&on Mo&va&on heps://www.engadget.com/2017/01/17/google-

More information

Enforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags

Enforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags Enforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags Seyed K. Fayazbakhsh *, Luis Chiang, Vyas Sekar *, Minlan Yu, Jeffrey Mogul * CMU, Deutsche Telekom, USC, Google

More information

There is a tempta7on to say it is really used, it must be good

There is a tempta7on to say it is really used, it must be good Notes from reviews Dynamo Evalua7on doesn t cover all design goals (e.g. incremental scalability, heterogeneity) Is it research? Complexity? How general? Dynamo Mo7va7on Normal database not the right fit

More information

Today s Class. High Dimensional Data & Dimensionality Reduc8on. Readings for This Week: Today s Class. Scien8fic Data. Misc. Personal Data 2/22/12

Today s Class. High Dimensional Data & Dimensionality Reduc8on. Readings for This Week: Today s Class. Scien8fic Data. Misc. Personal Data 2/22/12 High Dimensional Data & Dimensionality Reduc8on Readings for This Week: Graphical Histories for Visualiza8on: Suppor8ng Analysis, Communica8on, and Evalua8on, Jeffrey Heer, Jock D. Mackinlay, Chris Stolte,

More information

CHAPTER 9 DESIGN ENGINEERING. Overview

CHAPTER 9 DESIGN ENGINEERING. Overview CHAPTER 9 DESIGN ENGINEERING Overview A software design is a meaningful engineering representation of some software product that is to be built. Designers must strive to acquire a repertoire of alternative

More information

TrueView: Harnessing the Power of Mul6ple Review Sites

TrueView: Harnessing the Power of Mul6ple Review Sites TrueView: Harnessing the Power of Mul6ple Review Sites AMANDA MINNICH, NIKAN CHAVOSHI, ABDULLAH MUEEN, SHUANG LUAN, MICHALIS FALOUTSOS UNIVERSITY OF NEW MEXICO, USA 2 1. Who read hotel reviews before booking?

More information

Design Principles & Prac4ces

Design Principles & Prac4ces Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on

More information

IMPROVING PROGRAMS THROUGH SOURCE CODE TRANSFORMATIONS. Disserta(on Proposal Jonathan Dorn April 19, 2016

IMPROVING PROGRAMS THROUGH SOURCE CODE TRANSFORMATIONS. Disserta(on Proposal Jonathan Dorn April 19, 2016 IMPROVING PROGRAMS THROUGH SOURCE CODE TRANSFORMATIONS Disserta(on Proposal Jonathan Dorn April 19, 2016 2 Beyond Functional Correctness So9ware development involves tradeoffs. Fast, good, or cheap. Pick

More information

Data Flow Analysis. Suman Jana. Adopted From U Penn CIS 570: Modern Programming Language Implementa=on (Autumn 2006)

Data Flow Analysis. Suman Jana. Adopted From U Penn CIS 570: Modern Programming Language Implementa=on (Autumn 2006) Data Flow Analysis Suman Jana Adopted From U Penn CIS 570: Modern Programming Language Implementa=on (Autumn 2006) Data flow analysis Derives informa=on about the dynamic behavior of a program by only

More information

MFTP: a Clean- Slate Transport Protocol for the Informa8on Centric MobilityFirst Network

MFTP: a Clean- Slate Transport Protocol for the Informa8on Centric MobilityFirst Network MFTP: a Clean- Slate Transport Protocol for the Informa8on Centric MobilityFirst Network Kai Su (presen8ng), Francesco Bronzino, K. K. Ramakrishnan*, and Dipankar Raychaudhuri WINLAB, Rutgers University

More information

Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School

Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School July 6, 2011 Route Aggrega.on Child Route Unallocated Child Prefix: e.g., 10.1.33.0/24 19.1.1.2 Aggregate Route 10.1.1.0/24

More information

Cellular Networks and Mobile Compu5ng COMS , Spring 2012

Cellular Networks and Mobile Compu5ng COMS , Spring 2012 Cellular Networks and Mobile Compu5ng COMS 6998-8, Spring 2012 Instructor: Li Erran Li (lierranli@cs.columbia.edu) hkp://www.cs.columbia.edu/~coms6998-8/ 3/26/2012: Cellular Network and Traffic Characteriza5on

More information

Architectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2

Architectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2 Architectural Requirements Phase See Sommerville Chapters 11, 12, 13, 14, 18.2 1 Architectural Requirements Phase So7ware requirements concerned construc>on of a logical model Architectural requirements

More information

Blue Hill, Maine! FORWARD!

Blue Hill, Maine! FORWARD! Blue Hill, Maine! FORWARD! Internet & Broadband Access What we have and what are our op/ons? Presented by Butler Smythe January 26, 2017 Disclaimer: The Informa=on provided is in no way is intended to

More information

Best Prac*ces in Accessibility and Universal Design for Learning. Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology

Best Prac*ces in Accessibility and Universal Design for Learning. Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology Best Prac*ces in Accessibility and Universal Design for Learning Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology Purpose The purpose of this session is to iden*fy best

More information

A formal design process, part 2

A formal design process, part 2 Principles of So3ware Construc9on: Objects, Design, and Concurrency Designing (sub-) systems A formal design process, part 2 Josh Bloch Charlie Garrod School of Computer Science 1 Administrivia Midterm

More information

Database Management Systems Introduction to DBMS

Database Management Systems Introduction to DBMS Database Management Systems Introduction to DBMS D B M G 1 Introduction to DBMS Data Base Management System (DBMS) A software package designed to store and manage databases We are interested in internal

More information

Automa'c, Efficient, and General Repair of So8ware Defects using Lightweight Program Analyses

Automa'c, Efficient, and General Repair of So8ware Defects using Lightweight Program Analyses Automa'c, Efficient, and General Repair of So8ware Defects using Lightweight Program Analyses Disserta'on Proposal Claire Le Goues September 22, 2010 So8ware Errors Are Expensive Everyday, almost 300 bugs

More information

CS 2340 Objects and Design

CS 2340 Objects and Design CS 2340 Objects and Design Software Design Christopher Simpkins chris.simpkins@gatech.edu Chris Simpkins (Georgia Tech) CS 2340 Objects and Design Software Design 1 / 6 Design Design (noun) A plan or protocol

More information

Object Oriented Design (OOD): The Concept

Object Oriented Design (OOD): The Concept Object Oriented Design (OOD): The Concept Objec,ves To explain how a so8ware design may be represented as a set of interac;ng objects that manage their own state and opera;ons 1 Topics covered Object Oriented

More information

Regression Tes+ng. Midterm Wednesday Oct. 26, 7:00-8:30pm Room 142

Regression Tes+ng. Midterm Wednesday Oct. 26, 7:00-8:30pm Room 142 Regression Tes+ng Computer Science 521-621 Fall 2011 Prof. L. J. Osterweil Material adapted from slides originally prepared by Prof. L. A. Clarke Midterm Wednesday Oct. 26, 7:00-8:30pm Room 142 Closed

More information

Next hop in rou-ng Summary of Future Internet WP1 work. Hannu Flinck

Next hop in rou-ng Summary of Future Internet WP1 work. Hannu Flinck Next hop in rou-ng Summary of Future Internet WP1 work Hannu Flinck Original focus on Rou-ng Scalability Mo$va$on: Internet Architecture Board stated (in RFC 4984): rou-ng scalability is the most important

More information

Inferring Autonomous System Relationships in the Internet. Outline

Inferring Autonomous System Relationships in the Internet. Outline Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst http://www-unix.ecs.umass.edu/~lgao Outline Internet

More information

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 Goal of the Panel Engage the workshop par/cipants in an interac/ve discussion of the experimenta/on capabili/es and

More information

Distributed State Es.ma.on Algorithms for Electric Power Systems

Distributed State Es.ma.on Algorithms for Electric Power Systems Distributed State Es.ma.on Algorithms for Electric Power Systems Ariana Minot, Blue Waters Graduate Fellow Professor Na Li, Professor Yue M. Lu Harvard University, School of Engineering and Applied Sciences

More information

ITEC1620 Object-Based Programming. Lecture 11

ITEC1620 Object-Based Programming. Lecture 11 ITEC1620 Object-Based Programming Lecture 11 User Defined Datatypes Real-World Programming Determine the problem Define the problem Analyze the problem Solve the problem A Case Study The Client A credit

More information

A Complementary Local Feature Descriptor for Face Identification

A Complementary Local Feature Descriptor for Face Identification WACV 2012 A Complementary Local Feature Descriptor for Face Identification Jonghyun Choi Dr. William R. Schwartz* Huimin Guo Prof. Larry S. Davis Institute for Advanced Computer Studies, University of

More information

Quantifying and Assessing the Merge of Cloned Web-Based System: An Exploratory Study

Quantifying and Assessing the Merge of Cloned Web-Based System: An Exploratory Study Quantifying and Assessing the Merge of Cloned Web-Based System: An Exploratory Study Jadson Santos Department of Informatics and Applied Mathematics Federal University of Rio Grande do Norte, UFRN Natal,

More information

DNSSEC Activities In North America: Comcast

DNSSEC Activities In North America: Comcast DNSSEC Activities In North America: Comcast ICANN 45 October 17, 2012 NATIONAL ENGINEERING & TECHNICAL OPERATIONS DNSSEC Deployment Status We began working on this in 2008 (see 4meline) We completed our

More information

Microsoft Azure Stream Analytics

Microsoft Azure Stream Analytics Microsoft Azure Stream Analytics Marcos Roriz and Markus Endler Laboratory for Advanced Collaboration (LAC) Departamento de Informática (DI) Pontifícia Universidade Católica do Rio de Janeiro (PUC-Rio)

More information

Preliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016)

Preliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016) Preliminary ACTL-SLOW Design in the ACS and OPC-UA context G. Tos? (19/04/2016) Summary General Introduc?on to ACS Preliminary ACTL-SLOW proposed design Hardware device integra?on in ACS and ACTL- SLOW

More information

From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on

From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Distributed Embedded Systems University of Paderborn From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Falko Dressler dressler@ccs-labs.org Science Brunch, Zurich From Connected

More information

RouteBricks: Exploi2ng Parallelism to Scale So9ware Routers

RouteBricks: Exploi2ng Parallelism to Scale So9ware Routers RouteBricks: Exploi2ng Parallelism to Scale So9ware Routers Mihai Dobrescu and etc. SOSP 2009 Presented by Shuyi Chen Mo2va2on Router design Performance Extensibility They are compe2ng goals Hardware approach

More information

The balancing act: Research vs. Produc7on. Kobus Van der Merwe

The balancing act: Research vs. Produc7on. Kobus Van der Merwe The balancing act: Research vs. Produc7on Kobus Van der Merwe 1 The balancing act: and Research vs. Produc7on Kobus Van der Merwe 2 Context All started with 3 Context All started with NSF program manager

More information

Getting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro

Getting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro Getting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro Agenda: What are the Core Elements of DCIM? What is DCIM and why? The DCIM Maturation Model What is a Successful

More information

ENEA s Critical Infrastructures Protection Program. ENEA s Critical Infrastructures Protection Program. Meeting AIIC-ENEA Roma, 29 March, 2010

ENEA s Critical Infrastructures Protection Program. ENEA s Critical Infrastructures Protection Program. Meeting AIIC-ENEA Roma, 29 March, 2010 ENEA s Critical Infrastructures Protection Program ENEA s Critical Infrastructures Protection Program Sandro Bologna sandro.bologna@enea.it Meeting AIIC-ENEA Roma, 29 March, 2010 ENEA s Critical Infrastructures

More information

Chapter 15. Object-Oriented Testing. Software Testing: A Craftsman s Approach, 4 th Edition. Chapter 15 O-O Testing

Chapter 15. Object-Oriented Testing. Software Testing: A Craftsman s Approach, 4 th Edition. Chapter 15 O-O Testing Chapter 15 Object-Oriented Testing Software Testing: A Craftsman s Approach, 3 rd Edition Object- Issues in Testing Object-Oriented Software How is object-oriented (o-o) software different/special? Need

More information

Measuring and Managing Power Consump2on

Measuring and Managing Power Consump2on Measuring and Managing Power Consump2on Todd Rosedahl, Chief Engineer IBM/POWER Firmware Development Revolu'onizing the Datacenter Join the Conversa'on #OpenPOWERSummit Mo2va2on! US datacenter energy consump2on

More information

Applica'on Aware Deadlock Free Oblivious Rou'ng

Applica'on Aware Deadlock Free Oblivious Rou'ng Applica'on Aware Deadlock Free Oblivious Rou'ng Michel Kinsy, Myong Hyo Cho, Tina Wen, Edward Suh (Cornell University), Marten van Dijk and Srinivas Devadas Massachuse(s Ins,tute of Technology Outline

More information

Chapter 8: Class and Method Design

Chapter 8: Class and Method Design Chapter 8: Class and Method Design Objectives Become familiar with coupling, cohesion, and connascence. Be able to specify, restructure, and optimize object designs. Be able to identify the reuse of predefined

More information

Siemens Sanayi ve Ticaret A.Ş. Şafak Karahan

Siemens Sanayi ve Ticaret A.Ş. Şafak Karahan Interna'onal Brokerage Event Brussels, 26-27/10/2017 Siemens Sanayi ve Ticaret A.Ş. Şafak Karahan Safak.karahan@siemens.com Descrip(on of the Organiza(on Power u'li'es and TSOs Municipali'es and DSOs Renewable

More information

Transac'onal Libraries Alexander Spiegelman *, Guy Golan-Gueta, and Idit Keidar * Technion Yahoo Research

Transac'onal Libraries Alexander Spiegelman *, Guy Golan-Gueta, and Idit Keidar * Technion Yahoo Research Transac'onal Libraries Alexander Spiegelman *, Guy Golan-Gueta, and Idit Keidar * * Technion Yahoo Research 1 Mul'-Threading is Everywhere 2 Agenda Mo@va@on Concurrent Data Structure Libraries (CDSLs)

More information

Equa%onal Reasoning of x86 Assembly Code. Kevin Coogan and Saumya Debray University of Arizona, Tucson, AZ

Equa%onal Reasoning of x86 Assembly Code. Kevin Coogan and Saumya Debray University of Arizona, Tucson, AZ Equa%onal Reasoning of x86 Assembly Code Kevin Coogan and Saumya Debray University of Arizona, Tucson, AZ Assembly Code is Source Code Commercial libraries oeen do not come with source code, but there

More information

COSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan

COSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan COSC 310: So*ware Engineering Dr. Bowen Hui University of Bri>sh Columbia Okanagan 1 Admin A2 is up Don t forget to keep doing peer evalua>ons Deadline can be extended but shortens A3 >meframe Labs This

More information

CAP5415-Computer Vision Lecture 13-Support Vector Machines for Computer Vision Applica=ons

CAP5415-Computer Vision Lecture 13-Support Vector Machines for Computer Vision Applica=ons CAP5415-Computer Vision Lecture 13-Support Vector Machines for Computer Vision Applica=ons Guest Lecturer: Dr. Boqing Gong Dr. Ulas Bagci bagci@ucf.edu 1 October 14 Reminders Choose your mini-projects

More information

Social Networks Measures. Single- node Measures: Based on some proper7es of specific nodes Graph- based measures: Based on the graph- structure

Social Networks Measures. Single- node Measures: Based on some proper7es of specific nodes Graph- based measures: Based on the graph- structure Social Networks Measures Single- node Measures: Based on some proper7es of specific nodes Graph- based measures: Based on the graph- structure of the network Graph- based measures of social influence Previously

More information

CM-OPL: An Ontology Pattern Language for the Configuration Management Task

CM-OPL: An Ontology Pattern Language for the Configuration Management Task CM-OPL: An Ontology Pattern Language for the Configuration Management Task Ana Carolina Almeida 1, Daniel Schwabe 2, Sérgio Lifschitz 2, Maria Luiza M. Campos 3 1 Dept. of Comp. Science State University

More information

Amol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn

Amol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn Amol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn Mo>va>on: Parallel Query Processing Increasing parallelism in compu>ng Shared nothing clusters, mul> core technology,

More information

Chapter 1: Principles of Programming and Software Engineering

Chapter 1: Principles of Programming and Software Engineering Chapter 1: Principles of Programming and Software Engineering Data Abstraction & Problem Solving with C++ Fifth Edition by Frank M. Carrano Software Engineering and Object-Oriented Design Coding without

More information

A Case Study: Privacy Preserving Release of Spa9o- temporal Density in Paris

A Case Study: Privacy Preserving Release of Spa9o- temporal Density in Paris A Case Study: Privacy Preserving Release of Spa9o- temporal Density in Paris Gergely Acs (INRIA) gergely.acs@inria.fr!! Claude Castelluccia (INRIA) claude.castelluccia@inria.fr! Outline 2! Dataset descrip9on!

More information

L7: Tes(ng. Smoke tes(ng. The test- vee Black- box vs. white- box tes(ng Tes(ng methods. Four levels of tes(ng. Case study

L7: Tes(ng. Smoke tes(ng. The test- vee Black- box vs. white- box tes(ng Tes(ng methods. Four levels of tes(ng. Case study Smoke tes(ng L7: Tes(ng The test- vee Black- box vs. white- box tes(ng Tes(ng methods Matrix test Step- by- step test Automated test scripts Four levels of tes(ng Debugging Unit tes?ng Integra?on tes?ng

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

Start Screen: Select Yes

Start Screen: Select Yes Start Screen: Select Yes So.ware confirms communica4on with instrument Bo#om Row: Angle is a control: 90 is default; double click here to move detector if desired Wavelength indicates green laser: value

More information

A Design Rationale Representation for Model-Based Designs in Software Engineering

A Design Rationale Representation for Model-Based Designs in Software Engineering A Design Rationale Representation for Model-Based Designs in Software Engineering Adriana Pereira de Medeiros, Daniel Schwabe, and Bruno Feijó Dept. of Informatics, PUC-Rio, Rua Marquês de São Vicente

More information

Transac.on Management. Transac.ons. CISC437/637, Lecture #16 Ben Cartere?e

Transac.on Management. Transac.ons. CISC437/637, Lecture #16 Ben Cartere?e Transac.on Management CISC437/637, Lecture #16 Ben Cartere?e Copyright Ben Cartere?e 1 Transac.ons A transac'on is a unit of program execu.on that accesses and possibly updates rela.ons The DBMS s view

More information

SEDA An architecture for Well Condi6oned, scalable Internet Services

SEDA An architecture for Well Condi6oned, scalable Internet Services SEDA An architecture for Well Condi6oned, scalable Internet Services Ma= Welsh, David Culler, and Eric Brewer University of California, Berkeley Symposium on Operating Systems Principles (SOSP), October

More information

A Security Punctua.on Framework for Enforcing Access Control on Streaming Data. Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Ber.

A Security Punctua.on Framework for Enforcing Access Control on Streaming Data. Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Ber. A Security Punctua.on Framework for Enforcing Access Control on Streaming Data Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Ber.no Presented by Thao Pham Mo.va.on Mobile devices make available personal

More information

Could your Building Catch a Virus?

Could your Building Catch a Virus? Could your Building Catch a Virus? Measuring the Impact of Cyber Security Threats on Building Management Systems 3rd Interna(onal Conference ENERGY in BUILDINGS 2014 Konstan(nos Karagiannis 1 email:kk@getechgr

More information

IP-Layer Handover Transport Layer Mobility

IP-Layer Handover Transport Layer Mobility IP-Layer Handover Transport Layer Mobility h"p://www.cs.unibo.it./difelice/sm/ Mobile Systems Prof. Marco Di Felice Department of Computer Science and Engineering University of Bologna q IP-Layer handover

More information

Sta$c Single Assignment (SSA) Form

Sta$c Single Assignment (SSA) Form Sta$c Single Assignment (SSA) Form SSA form Sta$c single assignment form Intermediate representa$on of program in which every use of a variable is reached by exactly one defini$on Most programs do not

More information

Introduction to Dynamic Analysis

Introduction to Dynamic Analysis Introduction to Dynamic Analysis Reading assignment Gary T. Leavens, Yoonsik Cheon, "Design by Contract with JML," draft paper, http://www.eecs.ucf.edu/~leavens/jml//jmldbc.pdf G. Kudrjavets, N. Nagappan,

More information

ProAc&ve Rou&ng In Scalable Data Centers with PARIS

ProAc&ve Rou&ng In Scalable Data Centers with PARIS ProAc&ve Rou&ng In Scalable Data Centers with PARIS Theophilus Benson Duke University Joint work with Dushyant Arora + and Jennifer Rexford* + Arista Networks *Princeton University Data Center Networks

More information

Alterna(ve Architectures

Alterna(ve Architectures Alterna(ve Architectures COMS W4118 Prof. Kaustubh R. Joshi krj@cs.columbia.edu hep://www.cs.columbia.edu/~krj/os References: Opera(ng Systems Concepts (9e), Linux Kernel Development, previous W4118s Copyright

More information

Solution Biasing for Optimized Cloud Workload Placement

Solution Biasing for Optimized Cloud Workload Placement Solution Biasing for Optimized Cloud Workload Placement Asser N. Tantawi 2016 IEEE International Conference on Autonomic Computing Summarized by Uma Tadakamalla 1 I. Introduction Outline II. III. Problem

More information

Integra(ng an open source dynamic river model in hydrology modeling frameworks

Integra(ng an open source dynamic river model in hydrology modeling frameworks Integra(ng an open source dynamic river model in hydrology modeling frameworks Simula(on of Guadalupe and San Antonio River basin during a flood event with 1.3 x 10 5 computa(onal nodes at 100 m resolu(on.

More information

LISP: LISt Processing

LISP: LISt Processing Introduc)on to Racket, a dialect of LISP: Expressions and Declara)ons LISP: designed by John McCarthy, 1958 published 1960 CS251 Programming Languages Spring 2017, Lyn Turbak Department of Computer Science

More information

Principles of So3ware Construc9on. A formal design process, part 2

Principles of So3ware Construc9on. A formal design process, part 2 Principles of So3ware Construc9on Design (sub- )systems A formal design process, part 2 Josh Bloch Charlie Garrod School of Computer Science 1 Administrivia Midterm exam Thursday Review session Wednesday,

More information

CS 101: Computer Programming and Utilization

CS 101: Computer Programming and Utilization CS 101: Computer Programming and Utilization Jul-Nov 2017 Umesh Bellur (cs101@cse.iitb.ac.in) Lecture 14: Object Oritented Programming and Classes About These Slides Based on Chapter 18 of the book An

More information

A Script- Based Autotuning Compiler System to Generate High- Performance CUDA code

A Script- Based Autotuning Compiler System to Generate High- Performance CUDA code A Script- Based Autotuning Compiler System to Generate High- Performance CUDA code Malik Khan, Protonu Basu, Gabe Rudy, Mary Hall, Chun Chen, Jacqueline Chame Mo:va:on Challenges to programming the GPU

More information

Semantic Web Technologies: Assignment 1. Axel Polleres Siemens AG Österreich

Semantic Web Technologies: Assignment 1. Axel Polleres Siemens AG Österreich Semantic Web Technologies: Assignment 1 Siemens AG Österreich 1 The assignment: 2 FOAF: 1. Create your own FOAF file. You can use a generator tool such as FOAF- a- Ma>c to generate a skeleton. 2. Make

More information

Proac&vely Accountable Anonymous Messaging in Verdict

Proac&vely Accountable Anonymous Messaging in Verdict Proac&vely Accountable Anonymous Messaging in Verdict Henry Corrigan- Gibbs, David Isaac Wolinsky, and Bryan Ford Department of Computer Science Yale University 22 nd USENIX Security Symposium 14 August

More information

Design Pa*erns. Philippe Collet. Master 1 IFI Interna3onal h8p://dep3nfo.unice.fr/twiki/bin/view/minfo/soeeng1213. P.

Design Pa*erns. Philippe Collet. Master 1 IFI Interna3onal h8p://dep3nfo.unice.fr/twiki/bin/view/minfo/soeeng1213. P. Design Pa*erns Philippe Collet Master 1 IFI Interna3onal 2012-2013 h8p://dep3nfo.unice.fr/twiki/bin/view/minfo/soeeng1213 P. Collet 1 Agenda Introduc3on First example Principles and classifica3on Presenta3on

More information

How to live with IP forever

How to live with IP forever How to live with IP forever (or at least for quite some 5me) IPv6 to the rescue! Solves all problems with IPv4 Standardized during the 1990 s Final RFC in 1999 IPv4 vs IPv6 32- bit addresses IPSec op5onal

More information

Towards Provably Secure and Correct Systems. Avik Chaudhuri

Towards Provably Secure and Correct Systems. Avik Chaudhuri Towards Provably Secure and Correct Systems Avik Chaudhuri Systems we rely on Opera

More information

Chapter 7: Software Engineering. Copyright 2015 Pearson Education, Inc.

Chapter 7: Software Engineering. Copyright 2015 Pearson Education, Inc. Chapter 7: Software Engineering Chapter 7: Software Engineering 7.1 The Software Engineering Discipline 7.2 The Software Life Cycle 7.3 Software Engineering Methodologies 7.4 Modularity 7.5 Tools of the

More information

GeIng Deeper Insights into your and Storage with Splunk

GeIng Deeper Insights into your and Storage with Splunk Copyright 2014 Splunk Inc. GeIng Deeper Insights into your Virtualiza@on and Storage with Splunk Stela Udovicic Sr. Product Marke@ng Manager, Splunk Michael Donnelly Senior SE, Virtualiza@on Technologies

More information

ENGINEERED EFFICIENCY. FlexNet Server. Administraon Guide. Contact & informaon:

ENGINEERED EFFICIENCY. FlexNet Server. Administraon Guide. Contact & informaon: ENGINEERED EFFICIENCY FlexNet Server Administraon Guide Contact & informaon: CAXperts GmbH Carl-Zeiss-Ring 4 85737 Ismaning Germany P.: +49 89 96 97 72 0 F.: +49 89 96 97 72 11 E.: info@caxperts.com FlexLM

More information

ThousandEyes for. Application Delivery White Paper

ThousandEyes for. Application Delivery White Paper ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services

More information

Towards Stream- based Reasoning and Machine Learning for IoT Applica<ons

Towards Stream- based Reasoning and Machine Learning for IoT Applica<ons Towards Stream- based Reasoning and Machine Learning for IoT Applica

More information

A Prospect of Websites Evaluation Tools Based on Event Logs

A Prospect of Websites Evaluation Tools Based on Event Logs A Prospect of Websites Evaluation Tools Based on Event Logs Vagner Figuerêdo de Santana 1, and M. Cecilia C. Baranauskas 2 1 Institute of Computing, UNICAMP, Brazil, v069306@dac.unicamp.br 2 Institute

More information

InfoMAP General Information Session. Information Management and Access Project General Information Session Presentation

InfoMAP General Information Session. Information Management and Access Project General Information Session Presentation InfoMAP General Information Session. Information Management and Access Project General Information Session Presentation Contents. Introductions Where are we? Where are we going? How will we get there?

More information

Secure and Ef icient Iris and Fingerprint Identi ication

Secure and Ef icient Iris and Fingerprint Identi ication Secure and Eficient Iris and Fingerprint Identiication Marina Blanton Department of Computer Science and Engineering, University of Notre Dame mblanton@nd.edu Paolo Gas Department of Computer Science,

More information

Modularizing Design Patterns with Aspects: A Quantitative Study

Modularizing Design Patterns with Aspects: A Quantitative Study Modularizing Design s with Aspects: A Quantitative Study Alessandro Garcia Cláudio Sant Anna Eduardo Figueiredo Uirá Kulesza Carlos Lucena Arndt von Staa Software Engineering Laboratory - Computer Science

More information

An ontology of resources for Linked Data

An ontology of resources for Linked Data An ontology of resources for Linked Data Harry Halpin and Valen8na Presu: LDOW @ WWW2009 Madrid, April 20th Outline Premises and background Proposal overview Some details of IRW ontology Simple applica8on

More information