We explore the idea of objects that, under some contextual conditions, become less "agreeable" to the user. Such an object may lower its performance level, become less usable, or start producing discouraging...
详细信息
ISBN:
(纸本)9781467369367
We explore the idea of objects that, under some contextual conditions, become less "agreeable" to the user. Such an object may lower its performance level, become less usable, or start producing discouraging stimuli. Yet, it always remains fully functional and usable. We call such objects resistive. We describe three ways, in which making an object resistive may add value to the user. the resistive object may offer feedback on the user's past improper actions. It may encourage the user to improve her behavior at the moment. Or, it may offer the user an instant, discouraging evaluation of a bad operation on the object, which she is about to perform. In each case, resistivity is meant to help the user avoid undesirable behavior and choose a better course of action. In the paper we introduce the concepts of personal and community-wide resistive objects and provide a model of object resistivity. We exemplify the concepts with a number of ideas for resistive objects. Notably, the examples may serve as an inspiration for quite a few experiments with end users. Finally, we hint at selected research issues.
the Unified Modeling Language (UML) is a de-facto standard for software development and, together withthe object Constraint Language (OCL), allows for a precise description of a system prior to its implementation. At...
详细信息
ISBN:
(纸本)9781467369084
the Unified Modeling Language (UML) is a de-facto standard for software development and, together withthe object Constraint Language (OCL), allows for a precise description of a system prior to its implementation. At the same time, these descriptions can be employed to check the consistency and, hence, the correctness of a given UML/OCL model. In the recent past, numerous (automated) approaches have been proposed for this purpose. the behavior of the systems has usually been considered by means of sequence diagrams, state machines, and activity diagrams. But withthe increasing popularity of design by contract, also composite structures, classes, and operations are frequently used to describe behavior in UML/OCL. However, for these description means no solution for the validation and verification of concurrent behavior is available yet. In this work, we propose such a solution. To this end, we discuss the possible interpretations of "concurrency" which are admissible according to the common UML/OCL interpretation and, afterwards, propose a methodology which exploits solvers for SAT Modulo theories (i.e., SMT solvers) in order to check the concurrent behavior of UML/OCL models. How to address the resulting problems is described and illustrated by means of a running example. Finally, the application of the proposed method is demonstrated.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
the proceedings contain 25 papers. the topics discussed include: Pravaaha: mining android applications for discovering API call usage patterns and trends;verb-based semantic modeling and analysis of textual requiremen...
ISBN:
(纸本)9781450334327
the proceedings contain 25 papers. the topics discussed include: Pravaaha: mining android applications for discovering API call usage patterns and trends;verb-based semantic modeling and analysis of textual requirements;reengineering enterprise wide legacy BFSI systems industrial case study;SARAthI: characterization study on regression bugs and identification of regression bug inducing changes: a case-study on Google chromium project;analyzing dependencies in an industrial automation engineering system;simplifying web programming;an automated approach for bug categorization using fuzzy logic;predicting object-oriented software maintainability using hybrid neural network with parallel computing concept;and lack of conceptual cohesion of methods : a new alternative to lack of cohesion of methods.
Summary form only given. Model-driven engineering has gained popularity in recent years offering a way to abstractly specify complex computational models and algorithms and generate both configurations and code to ach...
详细信息
Summary form only given. Model-driven engineering has gained popularity in recent years offering a way to abstractly specify complex computational models and algorithms and generate both configurations and code to achieve their realisation. Often domain-specific languages are used as way to express these model structures enabling end users to better specify their target system needs. We have been applying MDE and Domain-Specific Visual Languages (DSVLs) to the domain of Big Data analytics systems to better support end users in realising solutions for the enterprise as well as individual needs. In this talk I discuss key requirements of Big Data social enterprise systems, including those for health, transport and finance domains. I discuss approaches to utilising MDE and DSVLs to achieve desired solutions, including interface and architectures. I report on our and others progress to date and outline ways increasing personal and social data from the emerging Internet of things with further transform this space.
Secure outsourcing of computation has gained importance withthe proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. ...
详细信息
Secure outsourcing of computation has gained importance withthe proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. they offer limited support for secure outsourcing of computation of large datasets in cloud computing environments. this paper presents a model driven approach to define then coordinate the execution of secure outsourcing protocols. First we present the details of our Outsourcing Protocol Definition Language (OPDL) used to define a machine-process able protocols in an abstract and declarative way while leaving the implementation details to the underlying runtime components. the proposed language aims to simplify the design of these protocols while allowing their verification and the generation of cloud services composition to coordinate the protocol execution. We evaluated the expressiveness of OPDL by using it to define a set of representative secure outsourcing protocols from the literature.
During the last years, several enterprise modeling languages became de-facto standards in their particular field of application. this dissemination increased the need for extending these languages in order to both spe...
详细信息
During the last years, several enterprise modeling languages became de-facto standards in their particular field of application. this dissemination increased the need for extending these languages in order to both specify concepts domain-specifically and integrate additional concepts. However, only the minority of enterprise modeling languages provides an extension mechanism and even those defining one, reveal some syntactical shortcomings. this issue can be also observed in the context of the well-known meta modeling language MOF and its correspondingly defined enterprise modeling languages like BPMN. this position paper therefore elaborates an adaptation of the profile mechanism from UML for generic extensions of meta models in the field of enterprise modeling. therefore, the characteristics of profiling are abstracted to the meta meta model layer and comprehensively integrated within an framework for the integrated definition of meta models. the Stereotype concept is thereby applied to several parts of meta models including also aspects of the concrete syntax as well as semantics. the proposed framework serves as reference architecture for the derivation of meta modeling language specific implementations (e.g., Within MOF).
Approximate query processing with relatively small random samples is an effective way to deal with many queries on large databases. However, small random samples might miss relevant records for highly selective querie...
详细信息
Approximate query processing with relatively small random samples is an effective way to deal with many queries on large databases. However, small random samples might miss relevant records for highly selective queries due to insufficient coverage. A multidimensional index tree called the k-MDI was proposed as an effective sampling scheme for highly selective decision support queries. It has been shown to support a fast response time and high accuracy, whereas implementation of the k-MDI on database tables was not discussed. this paper proposes the Multidimensional Cluster Sampling View based on the k-MDI. the view can be implemented with ease using common database tables and can be manipulated by SQL statements. Furthermore, it is able to provide trustable approximate answers quickly for any query condition. the response time and accuracy of approximation are validated on a large dataset based on TPC-DS specifications.
the proliferation of tools for different aspects of cloud resource configuration processes encourages DevOps to design end-to-end and automated configuration processes that span across a selection of best-of-breed too...
详细信息
the proliferation of tools for different aspects of cloud resource configuration processes encourages DevOps to design end-to-end and automated configuration processes that span across a selection of best-of-breed tools. But heterogeneities among configuration knowledge representation models of such tools pose vital limitations for acquisition, discovery and curation of configuration knowledge for federated cloud application and resource requirements. We propose an embryonic data-model for representing cloud resource configuration knowledge artifacts. We also propose a rule based recommender service, which empowers (1) incremental knowledge acquisition and curation, and (2) declarative context driven knowledge recommendation. the paper describes the concepts, techniques and current implementation of the proposed system. Experiments on 36 real-life cloud resources show efficient re-use of configuration knowledge by our approach compared to traditional techniques.
暂无评论