We discuss the current situation of formal methods and their use in the re-engineering of computing systems, especially real time systems. Based on the analysis result, a solution which uses a consistent 4-sector Wide...
详细信息
We discuss the current situation of formal methods and their use in the re-engineering of computing systems, especially real time systems. Based on the analysis result, a solution which uses a consistent 4-sector Wide Spectrum Language (WSL) is proposed, which presently includes the general architecture and work flow, the structure of Object-Action Model, the syntax and semantics of Object Oriented Temporal Agent Model (ObTAM) and Timed Guarded Command Language (TGCL). A small case study shows an optimistic future of our WSL technique. Further research will aim to build the complete semantic kernel of the WSL and its associated algebraic laws, including transformation rules and abstraction rules.
The development of Web-based Information systems is crucial in the quest to maintain and develop the enterprise competiveness. However, capturing requirements from Business Processes (BP) is still an issue, as existin...
详细信息
ISBN:
(纸本)9783319487434;9783319487427
The development of Web-based Information systems is crucial in the quest to maintain and develop the enterprise competiveness. However, capturing requirements from Business Processes (BP) is still an issue, as existing methods mostly focus, or on human aspects and the user interface, or on business concerns as rules and workflow coordination, and therefore do not specify all the software Architectural components which are relevant for software development. We present the Goals Approach, which analyzes BPs and User Tasks and details them in the process of methodically designing and structuring the User Interface, the Business Logic and the Database of the Information System given a Model-View-Controller (MVC) architectural pattern. In this paper we focus on how to obtain the Goals business model of requirements based on the DEMO method. The approach can be used for in-house software development, and the method is straightforward fitting Small and Medium Enterprises agility needs.
Mentoring is one of the most effective pedagogical tools, holding great promise for softwareengineering education. When done badly, however, it can lead to dysfunctional interpersonal relationships and may turn off m...
详细信息
ISBN:
(纸本)9781538626719
Mentoring is one of the most effective pedagogical tools, holding great promise for softwareengineering education. When done badly, however, it can lead to dysfunctional interpersonal relationships and may turn off mentees from careers in softwareengineering. In this qualitative interview-based study we examine how socio-technical dimensions of software impact the formation of social ties important for satisfying two goals of mentorship, building technical skill and interpersonal development. We find that mentees working on user facing, interdependent software form a balance of ties that facilitate both goals, while mentees working on non-user facing software mostly form ties important for building technical skill. Work practices that create opportunities for unstructured contact between mentees and community members, such as code review in a mentee cohort, can help to overcome this imbalance. Our findings have important implications for task definition in softwareengineering e-mentoring program schemes.
DARE-COTS is a CASE tool that supports domain analysis - the activity of identifying and documenting the commonalities and variabilities in related softwaresystems. DARE-COTS supports the capture of domain informatio...
详细信息
DARE-COTS is a CASE tool that supports domain analysis - the activity of identifying and documenting the commonalities and variabilities in related softwaresystems. DARE-COTS supports the capture of domain information from experts, documents, and code in a domain. Captured domain information is stored in a domain book that will typically contain a generic architecture for the domain and domain-specific reusable components.
The majority of computer science undergraduates enter the workforce in software development jobs. If students have been well prepared for their careers in computer science then why do 25 percent of software projects f...
详细信息
ISBN:
(纸本)0889865744
The majority of computer science undergraduates enter the workforce in software development jobs. If students have been well prepared for their careers in computer science then why do 25 percent of software projects fail and why are fifty percent of software projects either delivered significantly late, over budget or with reduced functionality? This paper proposes the use of experiential learning in the senior capstone course to expose students to the type of issues faced in a "real world" medium size software project of 5-20 developers. The class format and the resulting benefits for students from the successful use of experiential learning on the development of a 15,000 line of code commercial software game are presented.
In this paper we consider a Timed Process Algebra on the basis of the classical LOTOS operators, in order to specify the behaviour of concurrent systems and, concretely, those systems for which time becomes an importa...
详细信息
ISBN:
(纸本)0769514081
In this paper we consider a Timed Process Algebra on the basis of the classical LOTOS operators, in order to specify the behaviour of concurrent systems and, concretely, those systems for which time becomes an important factor to be taken into account, such as real-time systems. One of the main goals of this paper is to define a translation into a kind of dynamic state graph, which is currently supported by a tool (TPAL), which allows us to simulate the execution of a specification by means of these dynamic state graphs.
A Brief overview is given of the current status of software complexity metrics and their applicability in practical situations. Conclusions from a study carried out over some three years are presented and suggestions ...
详细信息
ISBN:
(纸本)0858253062
A Brief overview is given of the current status of software complexity metrics and their applicability in practical situations. Conclusions from a study carried out over some three years are presented and suggestions given on the best way to use complexity metrics as a warning against badly written programs or designs. Some new concepts in complexity measurement are also presented. Finally a software product is described which can evaluate a large number of different metrics for different source languages and at the same time provide a considerable help in software documentation and software testing.
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution, and protection of mobile agents. Secu...
详细信息
ISBN:
(纸本)076952284X
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution, and protection of mobile agents. Security services are usually provided by implementing new security mechanisms that are explicitly tailored to mobile components. Unfortunately, developing sound, reliable security mechanisms is a non-trivial task, and a history of vulnerable and/or incomplete implementations of these mechanisms led to the idea that mobile code systems are inherently insecure, too complex, and very difficult to deploy. To overcome these problems, we developed a mobile code system that relies as much as possible on the security mechanisms already provided by the underlying operating system. By doing this, it is possible to develop, with reduced effort, security services that rely on well-known, well-understood, and well-tested security mechanisms. Also, by describing the security of the mobile code system in terms of the OS security mechanisms, system administrators can better evaluate the security implications of deploying the system. This paper describes the design and implementation of our system and compares its performance to several existing mobile code systems.
The authors present the development and the methodology to implement the software of a secure learning-bridge which has the ability to filter, to forward, and to cipher frames in an extended Ethernet environment. The ...
详细信息
A methodology for library design is outlined and it is implemented for the domain of discrete event simulations. The top-down approach consists of five stages: state the users' needs, state the general goals for t...
详细信息
A methodology for library design is outlined and it is implemented for the domain of discrete event simulations. The top-down approach consists of five stages: state the users' needs, state the general goals for the library, derive the requirements of goals, list opposing requirements and resolve contradictions by analyzing requirements in view of users' needs and the domain, or by conducting field studies with prospective users.< >
暂无评论