Incremental delivery (ID) is a software development paradigm which advocates that systems be delivered to end users in usable, useful and semi-independent increments. ID differs from the traditional development paradi...
详细信息
An aerodynamic shape optimization method that treats the design of complex aircraft configurations subject to high fidelity computational fluid dynamics (CFD), geometric constraints and multiple design points is descr...
详细信息
An aerodynamic shape optimization method that treats the design of complex aircraft configurations subject to high fidelity computational fluid dynamics (CFD), geometric constraints and multiple design points is described. The design process will be greatly accelerated through the use of both control theory and distributed memory computer architectures. Control theory is employed to derive the adjoint differential equations whose solution allows for the evaluation of design gradient information at a fraction of the computational cost required by previous design methods [5, 4, 24, 18]. The resulting problem is implemented on parallel distributed memory architectures using a domain decomposition approach, an optimized communication schedule, and the MPI (Message Passing Interface) standard for portability and efficiency. The final result achieves very rapid aerodynamic design based on a higher order CFD method. In order to facilitate the integration of these high fidelity CFD approaches into future multi-disciplinary optimization (MDO) applications, new methods must be developed which are capable of simultaniously addressing complex geometries, multiple objective functions, and geometric design constraints. In our earlier studies [8,9,10,11, 19,15, 20,21,22, 23,1], we coupled the adjoint based design formulations with unconstrained optimization algorithms and showed that the approach was effective for the aerodynamic design of airfoils, wings, wing-bodies, and complex aircraft configurations. In many of the results presented in these earlier works, geometric constraints were satisfied either by a projection into feasible space or by posing the design space parameterization such that it automatically satisfied constraints. Furthermore, with the exception of reference [9] where the second author initially explored the use of multipoint design in conjunction with adjoint formulations, our earlier works have focused on single point design efforts. Here we demonstrate that
We describe the application of model checking tools to analyze a real-time software challenge in the design of Lucent Technologies' 5ESS telephone switching system. We use two tools: COSPAN for checking real-time ...
详细信息
ISBN:
(纸本)0897919149
We describe the application of model checking tools to analyze a real-time software challenge in the design of Lucent Technologies' 5ESS telephone switching system. We use two tools: COSPAN for checking real-time properties, and TPWB for checking probabilistic specifications. We report on the feedback given by the tools, and based on our experience, discuss the advantages and the limitations of the approach used.
Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specific policy (usually t...
ISBN:
(纸本)9780897919111
Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specific policy (usually the closed policy). As a consequence, although different policy choices are possible in theory, in practice only a specific policy can be actually applied within a given system. However, protection requirements within a system can vary dramatically, and no single policy may simultaneously satisfy them *** this paper we present a flexible authorization manager (FAM) that can enforce multiple access control policies within a single, unified system. FAM is based on a language through which users can specify authorizations and access control policies to be applied in controlling execution of specific actions on given objects. We formally define the language and properties required to hold on the security specifications and prove that this language can express all security specifications. Furthermore, we show that all programs expressed in this language (called FAM/CAM-programs) are also guaranteed to be consistent (i.e., no conflicting access decisions occur) and CAM-programs are complete (i.e., every access is either authorized or denied). We then illustrate how several well-known protection policies proposed in the literature can be expressed in the FAM/CAM language and how users can customize the access control by specifying their own policies. The result is an access control mechanism which is flexible, since different access control policies can all coexist in the same data system, and extensible, since it can be augmented with any new policy a specific application or user may require.
Most of the existing interoperability solutions access the functionality of tools through APIs, message interfaces, and command-line options. The inadequacy of those interfaces and lack of access to the source code of...
详细信息
The current trend of constructing new systems from collections of pre-existing third-party software and commercial off-the-shelf (COTS) products presents serious challenges to existing integration technology. We prese...
详细信息
The current trend of constructing new systems from collections of pre-existing third-party software and commercial off-the-shelf (COTS) products presents serious challenges to existing integration technology. We present a flexible integration framework which has general applicability for pre-existing third-party and COTS software (often highly interactive, with graphical user interface, and without source code access), supports users by allowing them to easily change the way software interacts (thus supporting system evolution and component reusability), and is easily programmable by end-users. Specifically we describe the Tool Integration Language (TIL) and the Tool Integration Server System (TISS) which provide flexible integration mechanisms for our framework and show how they can be used to integrate a set of existing applications and COTS.
One of the biggest risks in software requirements engineering is the risk of overemphasizing one quality attribute requirement (e.g., performance) at the expense of others at least as important (e.g., evolvability and...
详细信息
One of the biggest risks in software requirements engineering is the risk of overemphasizing one quality attribute requirement (e.g., performance) at the expense of others at least as important (e.g., evolvability and portability). The paper describes an exploratory knowledge based tool for identifying potential conflicts among quality attributes early in the software/ system life cycle. The Quality Attribute Risk and Conflict Consultant (QARCC) examines the quality attribute tradeoffs involved in software architecture and process strategies. It operates in the context of the USC CSE WinWin system, a groupware support system for determining software and system requirements as negotiated win conditions. We have developed and experimented with an initial QARCC 1 prototype. We are using the results of the experiment to develop an improved QARCC 2 tool. From our initial experimentation, we concluded that QARCC can alert users, developers, customers, and other stakeholders to conflicts among their software quality requirements and can help them identify additional, potentially important quality requirements. We also concluded that QARCC needs further refinement to avoid overloading users with insignificant quality conflict suggestions. We are now refining the knowledge base to address more detailed quality attributes in a more selective fashion.
暂无评论