the proceedings contain 37 papers. the topics discussed include: most driven control;privacy access control model for aggregated e-health services;automated middleware QoS configuration techniques using model transfor...
ISBN:
(纸本)9780769533384
the proceedings contain 37 papers. the topics discussed include: most driven control;privacy access control model for aggregated e-health services;automated middleware QoS configuration techniques using model transformations;service level management in global enterprise services: from QoS monitoring and diagnostics to adaptation, a case study;metadata support for transactional Web services;Web services interfaces and open standards integration into the European UNICORE 6 grid middleware;usage tracking components for service-oriented middleware systems;alignment of authentication information for trust federation;an economy driven resource allocation middleware for grid workflow;towards a privacy policy enforcement middleware with location intelligence;and network-centric middleware for service oriented architectures across heterogeneous embedded systems.
the proceedings contain 39 papers. the topics discussed include: model-driven development of real-time software using OMG standards;real time distributed control systems using RTAI;RTC: a real-time communication middl...
ISBN:
(纸本)0769519288
the proceedings contain 39 papers. the topics discussed include: model-driven development of real-time software using OMG standards;real time distributed control systems using RTAI;RTC: a real-time communication middleware on top of RTAI-Linux;embedded Linux outlook in the PostPC industry;introduction to the TOPPERS project-open source RTOS for embedded systems;the next generation software platform for mobile phones;compositional design of RT systems: a conceptual basis for specification of linking interfaces;general framework for the description of QoS in UML;towards model-based and CCM-based applications for real-time systems;a cooperative simulation mechanism of distributed control systems based on object-oriented design patterns;issues withobject orientation in verifying safety-critical systems;and a systems engineering approach for constructing certifiable real-time distributed systems.
the object Management Group (OMG) is pursuing its new Model-Driven Architecture (MDA) strategy,. the Meta-object Facility, (MOF) is an important technology, to support the MDA, both as a general modelling technique bu...
详细信息
ISBN:
(纸本)0769517420
the object Management Group (OMG) is pursuing its new Model-Driven Architecture (MDA) strategy,. the Meta-object Facility, (MOF) is an important technology, to support the MDA, both as a general modelling technique but also specifically, to support the definition of other modelling systems. the OMG has standardised the generation of repositories based on MOF models. Anti-Yacc is a tool that can be used to extract the contents of MOF-based repository, in textual form. the Anti-Yacc tool takes as input the specification of grammar rules, lexical rules, and MOF-extraction rules, from which a Java program is generated to extract the contents of a MOF-based repository, on demand Anti-Yacc can be used for code generation, interfacing with legacy syntaxes, and general report writing.
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perform application-aware adaptation for ub...
详细信息
ISBN:
(纸本)0769517420
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perform application-aware adaptation for ubiquitous computing. We present a scenario showing how to provide self-adaptive deployment of components to give mobile users ubiquitous access to a service irrespective of the user's end device and location across multiple network service providers. We concentrate primarily on solving the problem of how to automatically configure these proxylets in the network without violating the constraints set for the components and network elements involved. this system permits access to ubiquitous applications performing application specific transformations and adaptation on behalf of the user, as well as to seamlessly adapt to changes due to failures or traffic conditions in the network.
LEAF the Lean and Extensible Architectural Framework is an enhancement vi-rapper for J2EE implementations. Basically, LEAF fixes some identified J2EE issues and extends, as well as simplifies, the use of the J2EE by p...
详细信息
ISBN:
(纸本)0769517420
LEAF the Lean and Extensible Architectural Framework is an enhancement vi-rapper for J2EE implementations. Basically, LEAF fixes some identified J2EE issues and extends, as well as simplifies, the use of the J2EE by providing several incremental improvements. these improvements are seamlessly, integrated, include an additional component type, allow the same interfaces for local and remote service implementations, offer better J2EE implementation compatibility and ORB interceptors, and encompass several new technical services. this paper explains the need for LEAF through a diagnosis of the J2EE, presents the fundamental concepts underlying LEAF, overviews its implementation, reports on field experiences from using it in a number of commercial projects, and points out some interesting tradeoffs in using the J2EE with and without LEAF.
this paper describes a set of modeling techniques for developing vertical applications in specific domains. Previous approaches are mainly focused on obtaining final applications, We propose a methodology, to obtain s...
详细信息
ISBN:
(纸本)0769517420
this paper describes a set of modeling techniques for developing vertical applications in specific domains. Previous approaches are mainly focused on obtaining final applications, We propose a methodology, to obtain standards-driven service architectures used to build those final applications. this methodology, is based on the OMG's MDA, the Unified Software Development Process and recommendations by other authors like Bass et al. To test the proposed methodology, we have chosen learning/training as our vertical application domain. Also, it,c have used CORBA as the implementation/deployment environment for the last phases of this experience work. As a result, we have developed a Domain CORBA Facility, for learning/training, whose defined services have been derived from a strict and systematic software development process.
the main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advocate a model-based approach to risk ass...
详细信息
ISBN:
(纸本)0769517420
the main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advocate a model-based approach to risk assessment, and this paper attempts to define the required models for this. Whereas traditional risk assessment is performed without any formal description of the target of evaluation or results of the risk assessment, CORAS aims to provide a well defined set of models well suited to (1) describe the target of assessment at the right level of abstraction, (2) as a medium for communication between different groups of stakeholders involved in a risk assessment, and (3) to document risk assessment results and the assumptions on which these results depend. We propose here models for each step in a risk assessment process and report results of use.
Business Process Integration and Automation (BPIA) has emerged as an important aspect of the enterprisecomputing landscape. Intra-enterprise application integration (EAI) as well as the inter enterprise integration (...
详细信息
ISBN:
(纸本)0769517420
Business Process Integration and Automation (BPIA) has emerged as an important aspect of the enterprisecomputing landscape. Intra-enterprise application integration (EAI) as well as the inter enterprise integration (B2B) are increasingly, being performed it? the context of business processes. the integration scenarios typically involve distributed systems that are autonomous to some degree. From the BPIA perspective, the autonomy refers to the fact that the systems being integrated have their own process choreography engines and execute internal business processes that are private to them. In the case of B2B integration, the systems being integrated are fully autonomous, while various levels of autonomy exist in systems partaking in EAI. In this paper we present a new paradigm for business process integration. Our approach is based on a conversation model that enables autonomous, distributed BPM (Business Process Management) modules to integrate and collaborate. Our conversation model supports the exchange of multiple correlated messages with arbitrary sequencing constraints and covers the formatting of messages that are to be sent as well as the parsing of the messages that have been received. the crux of our conversation model is the notion of a conversation policy, which is a machine-readable specification of a pattern of message exchange it? a conversation. Our model supports nesting and composition of conversation policies to provide a dynamic, adaptable, incremental, open-ended, and extensible mechanism for business process integration. We discuss the current implementation of this conversation model and early, experience in applying the model to solve customer problems. the implementation utilizes distributedobject technology.
Many scientific and engineering computer applications are computationally intensive. these applications are generally hosted on powerful servers, often multi-processor or cluster configurations. Engineers typically lo...
详细信息
ISBN:
(纸本)0769517420
Many scientific and engineering computer applications are computationally intensive. these applications are generally hosted on powerful servers, often multi-processor or cluster configurations. Engineers typically login to these servers and launch these applications through shell commands or scripts. Mien multiple engineering applications need to run in a design-experiment flow, a complicated script in languages like PERL is needed. For long-running jobs, the user has to continuously check job status to learn when results can be accessed. Furthermore, special soft-ware is needed for a user to remotely, login to the computation servers and the user must know on which machine an application of interest resides. this paper describes "Engineering computing Portal," an architecture and its implementation for simplifying the use of scientific and engineering applications using web technology and lightweight high performance CORBA technology. In this architecture, a web portal manages user profiles and interacts with a Use via Java Applets and Servlets. In the mid-tier of the architecture, a broker is used to locate applications and resources on the backend computation servers, manage application states, and coordinate the flow of multiple applications. Since system performance is critical for engineering applications, the broker should add as little overhead as possible to the overall system. Lightweight high performance CORBA enables an integration broker to be implemented in a small footprint, with much lower overhead in distributed communication, and with more efficient runtime object management. the Engineering computing Portal broker is implemented using lightweight high performance CORBA with a Naming service and an Event Service. the choice of CORBA is important because it enables language-independent interoperability between multiple platforms. On backend compute servers, a computation manager based on a lightweight high performance CORBA bridges the gap between
the proceedings contain 27 papers. the topics discussed include: dynamic conflict detection in policy-based management systems;on expressing and monitoring behaviour in contracts;model-based risk assessment to improve...
the proceedings contain 27 papers. the topics discussed include: dynamic conflict detection in policy-based management systems;on expressing and monitoring behaviour in contracts;model-based risk assessment to improve enterprise security;collaboration management framework for integrating B-to-B and internal processes;from business process model to consistent implementation: a case for formal verification methods;business modelling for component systems with UML;an architecture and a process for implementing distributed collaborations;separation of concerns in modeling distributed component-based architectures;model driven geo-information system's development;an MDA-based model for vertical application task forces: an experience report;quality of service issues related to transforming platform independent models to platform specific models;performance management in component-oriented systems using a model driven architecture™ approach;and the LEAF platform: incremental enhancements for the J2EE.
暂无评论