There are always some crosscutting behaviors and features in the softwarearchitecture model described by conventional architecture description languages. They tangle and scatter in different design elements of softwa...
详细信息
ISBN:
(纸本)9781424439362
There are always some crosscutting behaviors and features in the softwarearchitecture model described by conventional architecture description languages. They tangle and scatter in different design elements of softwarearchitecture and thus lead to difficulties in comprehension, evolution and reusability of softwarearchitecture model. Aiming at these problems, this paper proposes an aspect-oriented architecture description language AC2-ADL based on the temporal logic language XYZ/E. In AC2-ADL, crosscutting behaviors and their crosscutting influences can be explicitly represented by introducing new structural elements. And then, this paper expounds the process to model aspect-oriented softwarearchitecture using AC2-ADL through case study. By AC2-ADL and the process introduced to model softwarearchitecture, not only the design efficiency can be improved, but also the model built is easier to comprehend, reuse and evolve.
A novel multi-objective optimization based particle swarm optimization algorithm is presented to solve the global optimization problem for based services selecting in Web services composition technology. This algorith...
详细信息
A novel multi-objective optimization based particle swarm optimization algorithm is presented to solve the global optimization problem for based services selecting in Web services composition technology. This algorithm takes Web services selection as a multi-objective constrained optimization problem with constraints. It introduces multi-objective PSO intelligent theory to optimize multi parameters simultaneously, and produces a set of constraints to meet the Pareto optimal solution. The experiments show that the algorithm is a feasible and efficient method for Web services selection.
This work presents a study undertaken to characterise the FINISTERRAE supercomputer, one of the biggest NUMA systems in Europe. The main objective was to determine the performance effect of bus contention and cache co...
详细信息
This work presents a study undertaken to characterise the FINISTERRAE supercomputer, one of the biggest NUMA systems in Europe. The main objective was to determine the performance effect of bus contention and cache coherency as well as the suitability of porting strategies regarding irregular codes in such a complex architecture. Results show that: (1) cores which share a socket can be considered as independent processors in this context; (2) for big data sizes, the effect of sharing a bus degrades the final performance but masks the cache coherency effects; (3) the NUMA factor (remote to local memory latency ratio) is an important factor on irregular codes and (4) the default kernel allocation policy is not optimal in this system. These results allow us to understand the behaviour of thread-to-core mappings and memory allocation policies.
NASA's exploration mission is to send humans to the Moon and Mars, in which the purpose is to learn how to live and work safely in those harsh environments. A critical aspect of living in an extreme environment is...
详细信息
ISBN:
(纸本)9781563479793
NASA's exploration mission is to send humans to the Moon and Mars, in which the purpose is to learn how to live and work safely in those harsh environments. A critical aspect of living in an extreme environment is habitation, and within that habitation element there are key systems which monitor the habitation environment to provide a safe and comfortable living and working space for humans. Expandable habitats are one of the options currently being considered due to their potential mass and volume efficiencies. This paper discusses a joint project between the National Science Foundation (NSF), ILC Dover, and NASA in which an expandable habitat was deployed in the extreme environment of Antarctica to better understand the performance and operations over a one-year period. This project was conducted through the Innovative Partnership Program (IPP) where the NSF provided the location at McMurdo Station in Antarctica and support at the location, ILC Dover provided the inflatable habitat, and NASA provided the instrumentation and data system for monitoring the habitat. The outcome of this project provided lessons learned in the implementation of an inflatable habitat and the systems that support that habitat. These lessons learned will be used to improve current habitation capabilities and systems to meet the objectives of exploration missions to the moon and Mars.
The Incremental Commitment Model (ICM) is a new generation process model that focuses on the incremental growth of success critical stakeholder satisfaction, system definition and stakeholder commitment. ICM has been ...
详细信息
ISBN:
(纸本)9789746152969
The Incremental Commitment Model (ICM) is a new generation process model that focuses on the incremental growth of success critical stakeholder satisfaction, system definition and stakeholder commitment. ICM has been introduced in system engineering, but not softwareengineering. In the Fall 2008, ICM will be used as a process model to develop software system in University of Southern California (USC) softwareengineering graduate course. Hence, two significant different software process modeling tools are selected to create the electronic process guidelines for this course. This paper reports our comparative experiences between an adaptability tolerance framework, Eclipse Process Framework Composer (EPFC) and a precision oriented process definition language, Little-JIL in order to create ICM electronic guide. In addition, the paper provides a tool comparison analysis by using Humphrey and Kellner's criteria and a target group experimental result. The evaluation identifies some research challenges and areas for future research work.
Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of ...
详细信息
ISBN:
(纸本)9781605582917
Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the target machine collapses and network performance degrades. In this framework, nodes in an intermediate network share information about their local traffc observations, improving their global traffc perspective. In our proposal, we add to each node the ability of learning independently, therefore reacting dierently according to its situation in the network and local traffc conditions. In particular, this frees the administrator from having to guess and manually set the parameters distinguishing attacks from non-attacks: now such thresholds are learned and set from experience or past data. We expect that our framework provides a faster detection and more accuracy in front of distributed flooding attacks than if staticlters or single-machine adaptive mechanisms areused. We show simulations where indeed we observe a high rate of stopped attacks with minimum disturbance to the legitimate users. Copyright 2008 ACM.
Change is an essential characteristic of software development, as software systems must respond to evolving requirements, platforms, and other environmental pressures. In this paper, we discuss the concept of software...
详细信息
Change is an essential characteristic of software development, as software systems must respond to evolving requirements, platforms, and other environmental pressures. In this paper, we discuss the concept of software evolution from several perspectives. We examine how it relates to and differs from software maintenance. We discuss insights about software evolution arising from Lehmanpsilas laws of software evolution and the staged lifecycle model of Bennett and Rajlich. We compare software evolution to other kinds of evolution, from science and social sciences, and we examine the forces that shape change. Finally, we discuss the changing nature of software in general as it relates to evolution, and we propose open challenges and future directions for software evolution research.
softwarearchitecture design is an important stage in the whole software development lifecycle. Yet non-functional requirements (NFRs) have been afflicted architects for a long time and how to efficiently design and a...
详细信息
softwarearchitecture design is an important stage in the whole software development lifecycle. There are so many various concerns at architecture level which relate to all kinds of stakeholders and describe the all f...
详细信息
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users state their needs. Appropriate componen...
详细信息
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users state their needs. Appropriate components may not exist, the users may not know if a component exists until a one matching their requirements is generated, or the users may adjust their requirements. For complex systems governed by a community of interest, we introduce a Fusion architecture coupled with Contract Templates (FACT). The Fusion architecture assists with syntactic and semantic unification of user directives. Contract Templates provide a standardized mechanism to collect heterogeneous systems within domains of interest. Based upon specific analysis of each component, Contract Templates attach connectors to generate integrated systems to which queries can be directed. A case study demonstrates how FACT enables military analysts to direct the use of simulation software for the experimentation of command and control behaviors within missions.
暂无评论