The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
UML Interactions represent one of the three UML behaviors. They describe the interwork of parts of a system based on message exchange. UML Interactions can reside on any level of abstraction and they seem sufficiently elaborated for high-level specifications used for sketching the communication among parts of a system. The UML Interactions metamodel, however, reveals some deficiencies for precise...
Industrial Cyber Physical Systems (CPSs) are naturally complex. Manual configuration of CPS product lines is error-prone and inefficient, which warrants the need for automated support of product configuration activities such as decision inference and decision ordering. A fully automated solution is often impossible for CPSs since some decisions must be made manually by configuration engineers and...
Information Systems Development faces many recurrent issues that must be addressed in every project. A lot of common requirements and features repeatedly appear on different projects challenging the development team. Exchanging solutions and the expertise gained over the evaluation of such solutions among projects can prevent the development teams from reinventing the wheel. The MDArte framework has...
Content Management Systems (CMS) are popular web application platforms used in multiple domains. CMS allow non-technical users to manage the content and features of websites with web modules that abstract functionality without requiring particular software programming background. However, without the development of specific web modules, a CMS usually cannot support complex scenarios or specific business...
The Model-Driven Architecture (MDA) is based on an understanding of a hierarchy of levels that are placed on top of each other and that are connected with instantiation. For practical MDA use, it is important to be clear about the kinds of objects that reside on the different levels and the relations between them as well as relations to objects outside of the MDA domain. This article aims at enhancing...
Because of the thin set of well-formedness rules associated to Templates in UML, ill-formed elements may result from bindings to templates. Although such ill-formedness is generally detected by some UML validation rule, the problem is poorly reported because it is not normally imputed to the binding. Typically, such problems are detected as non-compilable code in the template instances. A set of well-formedness...
Enterprise Modeling Languages (EMLs) are generally perceived as conceptual modeling languages having a formal syntax and informal semantics. The non-formality of semantics is mainly caused by the materiality of the addressed domain (enterprises and its related aspects) and the resulting personal interpretation of syntactical constructs. However, EMLs may also explicitly define invariant interpretations...
State machines are a common technique to describe state dependent systems such as communication protocols. Although such state machines typically incorporate events to switch between states, a description based on a pure event-based system is quite challenging. In this work, we describe the factors that complicate state machines on event basis and present solutions. These solutions are developed especially...
A key open question in the area of software modeling is which costs and benefits it brings to software development and maintenance. For answering this question, better empirical studies into software modeling are needed. In this paper I focus on what I believe are the pitfalls in- and prospects for such types of studies. This paper is an abstract for an invited keynote at the Modeling in Software...
Software-intensive systems have become increasingly ubiquitous, large, and complex, with dissemination in several application domains and tightly dependent upon different technologies. Such systems are usually centered in a software platform so that increasing attention has been paid to influence and interdependency in relationships among all the involved players, forming software ecosystems (SECO)...
The perception of risk is a driver for security analysts' decision making. However, security analysts may have conflicting views of a risk based on personal, system and environmental factors. This difference in perception and opinion, may impact effective decision making. In this paper, we propose a model that highlights areas contributing to the perception of risk in a socio-technical environment...
The User Requirements Notation (URN) supports the elicitation, specification, and analysis of integrated goal and scenario models. The analysis of the goal and scenario models focuses on one snapshot in time and does not allow the model to change over time. While several models may be created that represent different stages of a system, managing several, slightly different model copies is a space-consuming,...
Self-adaptive systems are able to manage themselves autonomously. A common approach to engineer these systems is to use the MAPE control loop based on these four steps: Monitoring, Analysis, Planning, and Execution. Existing research pays little attention to the modeling of self-adaptive systems with multiple MAPE control loops, and is lacking in considering the formal specification and verification...
Much like semantic service specification, semantic specification of tasks in business processes is needed, e.g., for their formal verification. In addition to the specification of the pure effects of some procedural code, however, business context plays a major role for semantic task specification. Open questions are how to include the business context of a task in its semantic specification, and...
While the term "vulnerability" is widespread in the protection of the critical infrastructures, there is still a gap between its meanings according to the different perspectives from which the security problem is viewed. Cyber and physical notions of vulnerability are different notwithstanding the scientific community has underlined the importance to deal with these two aspects in a unified...
The application of Model Driven Engineering in an industrial context implies working with large models, hence the need for collaborative modeling. Each developer focuses on a part of the large model and may manipulate it independently. As each part evolves rapidly and concurrently due to changes made by different designers, inconsistencies may occur. This work aims to provide support for dealing with...
Natural language is currently the basis of the majority of system specifications, even if it has several drawbacks. In particular, natural language is inherently ambiguous. In this article, we propose a way to complete the natural language text of requirements by giving a formal syntax to this text. We introduce and use an example to illustrate our ideas.
The design and development of major products, systems or infrastructures entail conceptualisation, elicitation and articulation of a large body of requirements that is often captured as a narrative and presented in wordy documents and spreadsheets. Whilst the requirements are generally classified in terms of behavioural, functional and non-functional categories, the current methods in vogue in infrastructure...
To provide assistance functions in context of surgical interventions, the use of medical workflows plays an important role. Workflow models can be used to assess the progress of an on-going surgery, enabling tailored (i.e., context sensitive) support for the medical practitioner. Subsequently, this provides opportunities to prevent malpractices, to enhance the patient's outcome and to preserve a high...
In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software development context, we rely on an analyzable form of use case specifications and augment such functional descriptions with timed automata, capturing timing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.