component-basedsoftware construction relies on suitable models underlying components, and in particular the coordinators which orchestrate component behaviour. Verifying correctness and safety of such systems amounts...
详细信息
component-basedsoftware construction relies on suitable models underlying components, and in particular the coordinators which orchestrate component behaviour. Verifying correctness and safety of such systems amounts to model checking the underlying system model. The model checking techniques not only need to be correct (since system sizes increase), but also scalable and efficient. In this paper, we present a SAT-based approach for bounded model checking of Timed Constraint Automata, which permits true concurrency in the timed orchestration of components. We present an embedding of bounded model checking into propositional logic with linear arithmetic. We define a product that is linear in the size of the system, and in this way overcome the state explosion problem to deal with larger systems. To further improve model checking performance, we show how to embed our approach into an extension of counterexample guided abstraction refinement with Craig interpolants. (c) 2011 Elsevier B.V. All rights reserved.
Due to the rapid changes in information technology (IT), the life cycle to develop an information system has become significantly shorter Furthermore, companies world vide have invested much time and effort in develop...
详细信息
Due to the rapid changes in information technology (IT), the life cycle to develop an information system has become significantly shorter Furthermore, companies world vide have invested much time and effort in developing their existing enterprise application systems in order to maintain their own competitive advantages. Specifically, they are facing a similar problem of preserving the investment. Information system reengineering technology (ISRT) is one way to solve this problem. However most of the systems reengineered by using traditional ISRT may lack flexibility and reusability and also have some quality concerns. The component-based software engineering can provide some remedy by providing a flexible and reusable enterprise application system. Many companies could benefit from thinking more in terms of building their own business components for their information system areas. This article considers a reengineering approach in order to migrate legacy systems to component-based information systems with a quality control mechanism. Companies can build their own business component libraries in the reengineering process. One additional benefit is to build information systems from business components rather than reinventing the wheel in the future. This study proposed a system architecture and also implemented the prototype system to validate that our mechanism is technically practical. Additionally, we used an example to evaluate that our approach is effective and practicable in the real world.
We present enforceable component-based realtime contracts, the first extension of component-based software engineering technology that comprehensively supports adaptive realtime systems from specification all the way ...
详细信息
We present enforceable component-based realtime contracts, the first extension of component-based software engineering technology that comprehensively supports adaptive realtime systems from specification all the way to the running system. To provide this support, we have extended component-based interface definition languages (IDLs) and component representations in repositories to express realtime requirements for components. The final software, which is assembled from the components, is then executed on a realtime operating system (RTOS) with the help of a component runtime system. RTOS resource managers and the IDL-extensions are based on the same mathematical foundation. Thus, the component runtime system can use information expressed in a component-oriented manner in the extended IDL to derive parameters for the task-based admission and scheduling in the RTOS. Once basic realtime properties can thus be guaranteed, runtime support can be extended to more elaborate schemes that also support adaptive applications (container-managed quality assurance). We claim that this study convincingly demonstrates how component-based software engineering can be extended to build systems with non-functional requirements.
The production of maintainable and reusable agents depends largely on how well the agent architecture is modularized. Most commercial agent toolkits provide an Object-Oriented (00) framework, whose agent architecture ...
详细信息
The production of maintainable and reusable agents depends largely on how well the agent architecture is modularized. Most commercial agent toolkits provide an Object-Oriented (00) framework, whose agent architecture does not facilitate separate (re)use of the domain-specific functionality of an agent from other concerns. This paper presents Malaca, an agent architecture that combines the use of component-based software engineering and Aspect-Oriented software Development, both of which promote better modularization of the agent architecture while increase at the architectural level. Malaca supports the separate (re)use of the domain-specific functionality of an agent from other communication concerns, providing explicit support for the design and configuration of agent architectures and allows the development of agent-basedsoftware so that it is easy to understand, maintain and reuse. (C) 2009 Elsevier B.V. All rights reserved.
We use the term component-basedsoftware deployment (CBSD) to refer to the process of deploying a software application in a component-based format. In this paper, we propose a formal conceptual framework for CBSD. Thi...
详细信息
We use the term component-basedsoftware deployment (CBSD) to refer to the process of deploying a software application in a component-based format. In this paper, we propose a formal conceptual framework for CBSD. This framework allows us to articulate various strategies for deploying component-basedsoftware. In addition, the framework permits us to express conditions under which various forms of CBSD are both successful (the deployed application works) and safe (no existing applications are damaged). (C) 2001 Elsevier Science Inc. All rights reserved.
In this paper, we present a methodology to estimate the impact of modifying a given software system design. In addition, we will be able to evaluate its reusability as well as the coupling of its components. In order ...
详细信息
In this paper, we present a methodology to estimate the impact of modifying a given software system design. In addition, we will be able to evaluate its reusability as well as the coupling of its components. In order to do that, the designer defines the system in terms of its components, their dependencies, the properties they fulfill, and the properties each component requires to other components. Besides, some auxiliary functions are used to define the relations between properties and the cost associated with their modification. Putting together all this information the different ways to perform a modification can be systematically generated and studied. We have applied our methodology to a medium-size system. Specifically, we dealt with an on-line intelligent tutoring system allowing users to learn the programming language Haskell. (C) 2004 Elsevier B.V. All rights reserved.
To facilitate modular development, the use of state machines has been proposed to specify the protocol (i.e., the sequence of messages) that each port of a component can engage in. The protocol conformance checking pr...
详细信息
To facilitate modular development, the use of state machines has been proposed to specify the protocol (i.e., the sequence of messages) that each port of a component can engage in. The protocol conformance checking problem consists of determining whether the actual behavior of a component conforms to the protocol specifications on its ports. In this paper, we consider this problem in the context of the model-driven development (MDD) of embedded systems based on UML 2, in which UML 2 state machines are used to specify component behavior. We provide a definition of conformance which slightly extends those found in the literature and reduce the conformance check to a state space exploration. We describe a tool implementing the approach using the Java PathFinder software model checker and the MDD tool IBM Rational RoseRT, discuss its application to three case studies, and show how the tool repeatedly allowed us to find unexpected conformance errors with encouraging performance. We conclude that the approach is promising for supporting the modular development of embedded components in the context of industrial applications of MDD.
The context of this work is performance evaluation of IT systems based on load testing. It typically consists in generating a flow of requests on a system under test, and to measure response times, request throughput,...
详细信息
The context of this work is performance evaluation of IT systems based on load testing. It typically consists in generating a flow of requests on a system under test, and to measure response times, request throughput, or computing resource usage. A quick overview of available load testing platforms shows that there exist hundreds of such platforms, including in the open source domain. However, many testers still tend to develop their own ad hoc load testing tooling. Why? This paper starts by looking for possible answers to this question, in order to introduce the CLIF load injection framework, which intends not to be yet another load testing platform. based on the Fractal component model, the CLIF open source project aims at addressing key issues such as flexibility, adaptation, and scalability. We give here details about CLIF's architecture and associated tools as well as some feedback from a bunch of practical utilizations.
Cyberinfrastructure science and engineering gateways have become an important modality to connect science and engineering communities and cyberinfrastructure. The use of cyberinfrastructure through gateways is fundame...
详细信息
Cyberinfrastructure science and engineering gateways have become an important modality to connect science and engineering communities and cyberinfrastructure. The use of cyberinfrastructure through gateways is fundamental to the advancement of science and engineering. However, learning science gateway technologies and developing science gateways remain a significant challenge, given that science gateway technologies are still actively evolving and often include a number of sophisticated components. A geosciences gateway must be designed to accommodate legacy methods that geoscientists use in conventional computational tools. The research described in this paper establishes an open-source toolkit-SimpleGrid for learning and developing science gateways based on a service-oriented architecture using a component-based approach that allows flexible separation and integration of the components between geocomputation applications and cyberinfrastructure. The design and implementation of SimpleGrid is based on the National Science Foundation TeraGrid-a key element of the U.S. and world cyberinfrastructure. This paper illustrates our experience of using SimpleGrid and a spatial interpolation method in a tutorial to teach TeraGrid science gateways. (C) 2009 Elsevier Ltd. All rights reserved.
In this work a platform-aware model-driven engineering process for building component-based embedded software systems using annotated analysis models is described. The process is supported by a framework, called MICOB...
详细信息
In this work a platform-aware model-driven engineering process for building component-based embedded software systems using annotated analysis models is described. The process is supported by a framework, called MICOBS, that allows working with different component technologies and integrating different tools that, independently of the component technology, enable the analysis of non-functional properties based on the principles of composability and compositionality. An actor, called Framework Architect, is responsible for this integration. Three other actors take a relevant part in the analysis process. The component Provider supplies the components, while the component Tester is in charge of their validation. The latter also feeds MICOBS with the annotated analysis models that characterize the extra-functional properties of the components for the different platforms on which they can be deployed. The Application Architect uses these components to build new systems, performing the trade-off between different alternatives. At this stage, and in order to verify that the final system meets the extra-functional requirements, the Application Architect uses the reports generated by the integrated analysis tools. This process has been used to support the validation and verification of the on-board application software for the Instrument Control Unit of the Energetic Particle Detector of the Solar Orbiter mission.
暂无评论