Introduction Journée RdP France - 20 Juin 2004

Size: px
Start display at page:

Download "http://www.lip6.fr/cpn-ami Introduction Journée RdP France - 20 Juin 2004"

Transcription

1 CPN-AMI (towards 2.6) Fabrice Kordon LIP6-SRC Université P. & M. Curie Paris cedex Introduction CPN-AMI A Petri net based CASE environment Available on the web since 1997 Approach An integration framework (FrameKit) Integration of tolls from research institutes & collaborative work LIP6/SRC many structural tools University of Torino and genova GreatSPN modules Technical University of Helsinki PROD Bell Labs dot University Humbolt zu Berlin LoLA Technische Universität München PEP modules

2 3 Architecture User Interface: Macao Macintosh (classic & OS X) Sun/Solaris (ß) Being ported to Windows driver Tool server: FrameKit driver Sun/Solaris PC/Linux Tools 4 Our Petri net Dialect: AMI-Net Subset of well formed nets + syntactic constraints Support of P/T nets Support of color classes and domains ++, --, <>, all Objective: unification of input models New feature in version 2.6 Extensions to integrate symbolic elements Static subclasses Local symmetries Automated computation Objective To support analysis on the symbolic reachability graph class C is 1..2; var x in C; wait_left C get_left ok_left C thinking C <C.ALL> prepare wait_right C <x++1> get_right go_to_eat eating C ok_right C + <x++1> realease forks C <C.ALL>

3 5 5

4 5 5

5 5 5

6 5 5

7 5 5

8 6 Verification techniques: current direction (1) We are our own users We need improvements to work on larger problems Validation of real systems, experimentation of future work Exploitation of the symbolic reachability graph (SRG, ESRG) Automatic computation of static classes (analysis of symmetries) Developed and integrated into CPN-AMI GreatSPN already computes SRG Integrated in CPN-AMI 2.6 for SRG Modifications as a cooperative work with Unic. Torino : ESRG Model checker for SRG/ESRG Under development Able to support atomic formulae LTL model checking 7 Verification techniques: Enhanced state space representation techniques Data Decision Diagrams Approach similar to the one of BDDs......but on non boolean data Join development with LaBRI (Univ. Bordeaux) Suitable for enhanced Petri nets Queuing network Self modifying nets Etc... Availability of higher order models See next topic

9 8 current direction (1) Domain specific modeling languages More adapted Allow domain specific tricks (semantical) Allow extraction of various views Translation to verification languages or state space representation (PN, DDD, etc..) 8 current direction (1) Domain specific modeling languages More adapted Allow domain specific tricks (semantical) Allow extraction of various views Translation to verification languages or state space representation (PN, DDD, etc..) Model Analysis

10 9 9 LfP

11 9 LfP Architectural and behavioral desc. Assertions (properties to be verified) directives ADL capabilities 9 generator LfP Architectural and behavioral desc. Assertions (properties to be verified) directives ADL capabilities

12 9 generator LfP Architectural and behavioral desc. Assertions (properties to be verified) directives ADL capabilities LfP mapping 9 generator LfP Architectural and behavioral desc. Assertions (properties to be verified) directives ADL capabilities LfP mapping Programs

13 9 generator LfP Architectural and behavioral desc. Assertions (properties to be verified) directives ADL capabilities LfP mapping Configuration, deployment Programs Execution env. 9 generator LfP Architectural and behavioral desc. Assertions (properties to be verified) directives ADL capabilities LfP mapping Configuration, deployment Programs Execution env.

14 10 Conclusion Ongoing work in the context of institutional projects MORSE LIP6 - LaBRI Aonix - Sagem More to come soon CPN-AMI 2.6 At least partial support of SRG and ESRG Second semester 2003 FrameKit 1.5 Macao for Windows Preliminary version

A Classification of Model Checking-based Verification Approaches for Software Models

A Classification of Model Checking-based Verification Approaches for Software Models A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software

More information

CosyVerif: An Open Source Extensible Verication Environment

CosyVerif: An Open Source Extensible Verication Environment CosyVerif: An Open Source Extensible Verication Environment Étienne André, Lom Hillah, Francis Hulin-Hubard, Fabrice Kordon, Yousra Lembachar, Alban Linard, Laure Petrucci ENS Cachan, Univ. Paris 6, Univ.

More information

Formal Verification and Linear-time Model Checking

Formal Verification and Linear-time Model Checking Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging

More information

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may

More information

The Model Checker SPIN

The Model Checker SPIN The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(

More information

Formal Verification by Model Checking

Formal Verification by Model Checking Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

BENEFITS OF MODELING WITH A FORMAL LANGUAGE. Emmanuel Gaudin emmanuel.gaudin@pramadev.com

BENEFITS OF MODELING WITH A FORMAL LANGUAGE. Emmanuel Gaudin emmanuel.gaudin@pramadev.com BENEFITS OF MODELING WITH A FORMAL LANGUAGE Emmanuel Gaudin emmanuel.gaudin@pramadev.com PragmaDev French software editor based in Paris Dedicated to the development of RTDS: a modeling and testing tool

More information

HECTOR a software model checker with cooperating analysis plugins. Nathaniel Charlton and Michael Huth Imperial College London

HECTOR a software model checker with cooperating analysis plugins. Nathaniel Charlton and Michael Huth Imperial College London HECTOR a software model checker with cooperating analysis plugins Nathaniel Charlton and Michael Huth Imperial College London Introduction HECTOR targets imperative heap-manipulating programs uses abstraction

More information

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs. CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express

More information

Natural Language to Relational Query by Using Parsing Compiler

Natural Language to Relational Query by Using Parsing Compiler Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Fundamentals of LoadRunner 9.0 (2 Days)

Fundamentals of LoadRunner 9.0 (2 Days) Fundamentals of LoadRunner 9.0 (2 Days) Quality assurance engineers New users of LoadRunner who need to load test their applications and/or executives who will be involved in any part of load testing.

More information

A Logic Approach for LTL System Modification

A Logic Approach for LTL System Modification A Logic Approach for LTL System Modification Yulin Ding and Yan Zhang School of Computing & Information Technology University of Western Sydney Kingswood, N.S.W. 1797, Australia email: {yding,yan}@cit.uws.edu.au

More information

Access Control Based on Dynamic Monitoring for Detecting Software Malicious Behaviours

Access Control Based on Dynamic Monitoring for Detecting Software Malicious Behaviours Access Control Based on Dynamic Monitoring for Detecting Software Malicious Behaviours K. Adi, L. Sullivan & A. El Kabbal Computer Security Research Laboratory http://w3.uqo.ca/lrsi NCAC'05 1 Motivation

More information

2015-11-16. Project Proposal PDT401: Automatic deployment of operating system, drivers and software using MDT, Chocolatey and Powershell.

2015-11-16. Project Proposal PDT401: Automatic deployment of operating system, drivers and software using MDT, Chocolatey and Powershell. 2015-11-16 Project Proposal PDT401: Automatic deployment of operating system, drivers and software using MDT, Chocolatey and Powershell. Gus Johansson Thomas Rovala Table of contents 1 Introduction...

More information

Planning and Administering Windows Server 2008 Servers

Planning and Administering Windows Server 2008 Servers Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge

More information

Frameworx 13.5 Implementation Conformance Certification Report

Frameworx 13.5 Implementation Conformance Certification Report Frameworx 13.5 Implementation Conformance Certification Report PT TELEKOMUNIKASI INDONESIA BROADBAND INTERNET SERVICE Resource Management November 2014 Version 1.0 Table of Contents List of Figures...

More information

MS 20247C Configuring and Deploying a Private Cloud

MS 20247C Configuring and Deploying a Private Cloud MS 20247C Configuring and Deploying a Private Cloud Description: Days: 5 Prerequisites: This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center

More information

From Workflow Design Patterns to Logical Specifications

From Workflow Design Patterns to Logical Specifications AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software

More information

Introducing Formal Methods. Software Engineering and Formal Methods

Introducing Formal Methods. Software Engineering and Formal Methods Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended

More information

Introduction and Overview

Introduction and Overview Introduction and Overview Definitions. The general design process. A context for design: the waterfall model; reviews and documents. Some size factors. Quality and productivity factors. Material from:

More information

Software Modeling and Verification

Software Modeling and Verification Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system

More information

Software Verification: Infinite-State Model Checking and Static Program

Software Verification: Infinite-State Model Checking and Static Program Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

Configuring and Deploying a Private Cloud. Day(s): 5. Overview

Configuring and Deploying a Private Cloud. Day(s): 5. Overview Configuring and Deploying a Private Cloud Day(s): 5 Course Code: M20247 Overview This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012

More information

Frameworx 13.5 Implementation Conformance Certification Report

Frameworx 13.5 Implementation Conformance Certification Report Frameworx 13.5 Implementation Conformance Certification Report PT TELEKOMUNIKASI INDONESIA BROADBAND INTERNET PRODUCTS BROADBAND SERVICE September 2014 Version 1.0 1 Table of Contents List of Figures...

More information

Software Design Document (SDD) Template

Software Design Document (SDD) Template (SDD) Template Software design is a process by which the software requirements are translated into a representation of software components, interfaces, and data necessary for the implementation phase.

More information

Proposal for a Vehicle Tracking System (VTS)

Proposal for a Vehicle Tracking System (VTS) Proposal for a Vehicle Tracking System (VTS) 2 Executive Summary Intelligent Instructions is an IT product development and consulting company. At Intelligent Instructions, we focus on the needs of the

More information

Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days

Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days Course Summary: This five-day instructor-led course provides students with the knowledge and skills to implement, monitor,

More information

MS-10750: Monitoring and Operating a Private Cloud with System Center 2012. Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

MS-10750: Monitoring and Operating a Private Cloud with System Center 2012. Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery MS-10750: Monitoring and Operating a Private Cloud with System Center 2012 This course describes the various components of System Center and how to deploy, monitor and manage a service and prepackaged

More information

Planning and Administering Windows Server 2008 Servers 70-646

Planning and Administering Windows Server 2008 Servers 70-646 Hands-On Planning and Administering Windows Server 2008 Servers 70-646 Course Description This Hands-On course provides students with the knowledge and skills to implement, monitor, and maintain Windows

More information

HPE PC120 ALM Performance Center 12.0 Essentials

HPE PC120 ALM Performance Center 12.0 Essentials HPE PC120 ALM Performance Center 12.0 Essentials Overview This five-day course introduces students to ALM Performance Center 12.0 and the Virtual User Generator (VuGen) application, which is a scripting

More information

Session 12 Evolving IT Architectures: From Mainframes to Client-Server to Network Computing

Session 12 Evolving IT Architectures: From Mainframes to Client-Server to Network Computing Session 12 Evolving IT Architectures: From Mainframes to Client- to Network Computing S. Madnick, 1998 12/ 1 Outline Stages of System Architectures Components: Data Management,, Mainframe era PC era Stages

More information

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments March 13, 2015 Abstract To provide redundancy and disaster recovery, most organizations deploy multiple data

More information

The GreatSPN Tool: Recent Enhancements

The GreatSPN Tool: Recent Enhancements The GreatSPN Tool: Recent Enhancements Soheib Baarir LIP6 Univ. Pierre et Marie Curie Paris souheib.baarir@lip6.fr Massimiliano De Pierro Università di Torino Torino depierro@di.unito.it M. Beccuti Univ.

More information

Software Engineering using Formal Methods

Software Engineering using Formal Methods Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model

More information

Audience. At Course Completion. Prerequisites. Course Outline. Take This Training

Audience. At Course Completion. Prerequisites. Course Outline. Take This Training Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Course 5054A: Two days; Instructor-Led Preliminary Course Syllabus Note: You are viewing a Preliminary Course Syllabus.

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Security Certification of Third- Parties Applications

Security Certification of Third- Parties Applications Security Certification of Third- Parties Applications Stanislav Dashevskyi dashevskyi@fbk.eu Advisors: Fabio Massacci, Antonino Sabetta Agenda Introduction Third-party code in web applications Third-party

More information

Combining Software and Hardware Verification Techniques

Combining Software and Hardware Verification Techniques Formal Methods in System Design, 21, 251 280, 2002 c 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Combining Software and Hardware Verification Techniques ROBERT P. KURSHAN VLADIMIR

More information

Software Active Online Monitoring Under. Anticipatory Semantics

Software Active Online Monitoring Under. Anticipatory Semantics Software Active Online Monitoring Under Anticipatory Semantics Changzhi Zhao, Wei Dong, Ji Wang, Zhichang Qi National Laboratory for Parallel and Distributed Processing P.R.China 7/21/2009 Overview Software

More information

Data Decision Diagrams for Petri Nets Analysis

Data Decision Diagrams for Petri Nets Analysis Data Decision Diagrams for Petri Nets Analysis Jean-Michel Couvreur 1, Emmanuelle Encrenaz 2, Emmanuel Paviot-Adet 2, Denis Poitrenaud 2, and Pierre-André Wacrenier 1 1 LaBRI, Université Bordeaux 1, Talence,

More information

WebSphere Business Modeler

WebSphere Business Modeler Discovering the Value of SOA WebSphere Process Integration WebSphere Business Modeler Workshop SOA on your terms and our expertise Soudabeh Javadi Consulting Technical Sales Support WebSphere Process Integration

More information

SARA: A tool for service levels aware contracts

SARA: A tool for service levels aware contracts Universita del Salento Database and Information systems lab SARA: A tool for service levels aware contracts Prof. M. Bochicchio, Prof.ssa Antonella Longo, Ing. S. Giacovelli Contents The scenario SARA:

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006

2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006 www.peaksolutions.com 2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006 Course 2933A: Five days; Instructor-Led Introduction This five-day instructor-led

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Total Exploration & Production: Field Monitoring Case Study

Total Exploration & Production: Field Monitoring Case Study Total Exploration & Production: Field Monitoring Case Study 1 Summary TOTAL S.A. is a word-class energy producer and provider, actually part of the super majors, i.e. the worldwide independent oil companies.

More information

Moving Enterprise Applications into VoiceXML. May 2002

Moving Enterprise Applications into VoiceXML. May 2002 Moving Enterprise Applications into VoiceXML May 2002 ViaFone Overview ViaFone connects mobile employees to to enterprise systems to to improve overall business performance. Enterprise Application Focus;

More information

Algorithmic Software Verification

Algorithmic Software Verification Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Tool Support for Model Checking of Web application designs *

Tool Support for Model Checking of Web application designs * Tool Support for Model Checking of Web application designs * Marco Brambilla 1, Jordi Cabot 2 and Nathalie Moreno 3 1 Dipartimento di Elettronica e Informazione, Politecnico di Milano Piazza L. Da Vinci,

More information

ICECCS 08/Workshop «UML&AADL 2008», April, 2, 2008

ICECCS 08/Workshop «UML&AADL 2008», April, 2, 2008 Contract-based approach to analyze software components Abdelhafid Zitouni Lionel SEINTURIER Mahmoud BOUFAIDA Laboratory LIRE LIFL-INRIA ADAM Laboratory LIRE University of Constantine University of Lille

More information

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that

More information

OntoPIM: How to Rely on a Personal Ontology for Personal Information Management

OntoPIM: How to Rely on a Personal Ontology for Personal Information Management OntoPIM: How to Rely on a Personal Ontology for Personal Information Management Vivi Katifori 2, Antonella Poggi 1, Monica Scannapieco 1, Tiziana Catarci 1, and Yannis Ioannidis 2 1 Dipartimento di Informatica

More information

Mining the Software Change Repository of a Legacy Telephony System

Mining the Software Change Repository of a Legacy Telephony System Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,

More information

Design by Contract beyond class modelling

Design by Contract beyond class modelling Design by Contract beyond class modelling Introduction Design by Contract (DbC) or Programming by Contract is an approach to designing software. It says that designers should define precise and verifiable

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

NE-10750A Monitoring and Operating a Private Cloud with System Center 2012

NE-10750A Monitoring and Operating a Private Cloud with System Center 2012 NE-10750A and Operating a with System Center 2012 Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 16 June 2012 200 Microsoft System Center 2012 Delivery Method

More information

SCADE System 17.0. Technical Data Sheet. System Requirements Analysis. Technical Data Sheet SCADE System 17.0 1

SCADE System 17.0. Technical Data Sheet. System Requirements Analysis. Technical Data Sheet SCADE System 17.0 1 SCADE System 17.0 SCADE System is the product line of the ANSYS Embedded software family of products and solutions that empowers users with a systems design environment for use on systems with high dependability

More information

NSI Policy Supplement for XML Retail Accounting Reports Certification/Verification. May 7, 2007 Revision 1.1

NSI Policy Supplement for XML Retail Accounting Reports Certification/Verification. May 7, 2007 Revision 1.1 NSI Policy Supplement for XML Retail Accounting Reports Certification/Verification May 7, 2007 Revision 1.1 Table of Contents 1. Overview... 3 1.1 Introduction... 3 1.2 Scope... 3 1.2.1 Scope of certification

More information

Engineering Process Software Qualities Software Architectural Design

Engineering Process Software Qualities Software Architectural Design Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical

More information

MODEL CHECKING OF SERVICES WORKFLOW RECONFIGURATION: A PERSPECTIVE ON DEPENDABILITY

MODEL CHECKING OF SERVICES WORKFLOW RECONFIGURATION: A PERSPECTIVE ON DEPENDABILITY MODEL CHECKING OF SERVICES WORKFLOW RECONFIGURATION: A PERSPECTIVE ON DEPENDABILITY 1 Juan Carlos Polanco Aguilar 1 Koji Hasebe 1 Manuel Mazzara 2 Kazuhiko Kato 1 1 University of Tsukuba Department of

More information

A framework for secure migration processes of legacy systems to the cloud

A framework for secure migration processes of legacy systems to the cloud A framework for secure migration processes of legacy systems to the cloud A framework for secure migration processes of legacy systems to the cloud 1. Introduction 2. SMiLe2Cloud 3. Conclusions 1. Introduction

More information

Components for Operating System Design

Components for Operating System Design Components for Operating System Design Alan Messer and Tim Wilkinson SARC, City University, London, UK. Abstract Components are becoming used increasingly in the construction of complex application software.

More information

Software Architecture & Composition. Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA

Software Architecture & Composition. Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA 1 Software Architecture & Composition Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA http://adam.lille.inria.fr April 2009 2 Scientific context Future applications

More information

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

SSL VPN A look at UCD through the tunnel

SSL VPN A look at UCD through the tunnel SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within

More information

Development of global specification for dynamically adaptive software

Development of global specification for dynamically adaptive software Development of global specification for dynamically adaptive software Yongwang Zhao School of Computer Science & Engineering Beihang University zhaoyw@act.buaa.edu.cn 22/02/2013 1 2 About me Assistant

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases

More information

Outline SSS6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory

Outline SSS6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Outline SSS6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Duration: Four consecutive Saturdays About this Course This instructor-led course provides the knowledge and skills

More information

Course Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion.

Course Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion. Key Data Course #: 2553A Number of Days: 3 Format: Instructor-Led This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and

More information

Business Process Modeling Information Systems in Industry (372-1-4207 )

Business Process Modeling Information Systems in Industry (372-1-4207 ) Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline

More information

At Course Completion After completing this course, students will be able to: Take This Training. On This Page Introduction.

At Course Completion After completing this course, students will be able to: Take This Training. On This Page Introduction. Course 3938B: Updating Your Skills from Microsoft Exchange 2000 Server or Microsoft Exchange Server 2003 to Microsoft Exchange Server 2007 Course 3938: Three days; Instructor-Led Take This Training On

More information

Software Quality Exercise 1

Software Quality Exercise 1 Software Quality Exercise Model Checking Information. Dates Release: 7.0.0.5pm Deadline: 07.0.0.5pm Discussion:.0.0. Formalities While this exercise can be solved and handed in in groups of three, every

More information

Development of dynamically evolving and self-adaptive software. 1. Background

Development of dynamically evolving and self-adaptive software. 1. Background Development of dynamically evolving and self-adaptive software 1. Background LASER 2013 Isola d Elba, September 2013 Carlo Ghezzi Politecnico di Milano Deep-SE Group @ DEIB 1 Requirements Functional requirements

More information

Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012

Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012 Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012 OVERVIEW About this Course This course describes private cloud configuration and deployment with Microsoft System Center

More information

Translation Protégé Knowledge for Executing Clinical Guidelines. Jeong Ah Kim, BinGu Shim, SunTae Kim, JaeHoon Lee, InSook Cho, Yoon Kim

Translation Protégé Knowledge for Executing Clinical Guidelines. Jeong Ah Kim, BinGu Shim, SunTae Kim, JaeHoon Lee, InSook Cho, Yoon Kim Translation Protégé Knowledge for Executing Clinical Guidelines Jeong Ah Kim, BinGu Shim, SunTae Kim, JaeHoon Lee, InSook Cho, Yoon Kim Agenda 1. 1. Motivation 2. 2. How to to translate 3. 3. Implementation

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,

More information

Opportunities and Challenges in Software Engineering for the Next Generation Automotive

Opportunities and Challenges in Software Engineering for the Next Generation Automotive Opportunities and Challenges in Software Engineering for the Next Generation Automotive Cyber Physical Systems Electro Mobility Technische Universität München Institut für Informatik Cyber Physical Systems

More information

Heterogeneous Database Replication Gianni Pucciani

Heterogeneous Database Replication Gianni Pucciani LCG Database Deployment and Persistency Workshop CERN 17-19 October 2005 Heterogeneous Database Replication Gianni Pucciani A.Domenici andrea.domenici@iet.unipi.it F.Donno flavia.donno@cern.ch L.Iannone

More information

Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led

Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led Course Description During this five-day course, students will learn how to design an Active

More information

M6430a Planning and Administering Windows Server 2008 Servers

M6430a Planning and Administering Windows Server 2008 Servers M6430a Planning and Administering Windows Server Servers Course 6430A: Five days; Instructor-Led Introduction This five-day instructor-led course provides students with the knowledge and skills to implement,

More information

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory

More information

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Modellistica Medica Maria Grazia Pia INFN Genova Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Lezione 20-21 The Unified Process Dynamic dimension Two dimensions Content

More information

Rich Traceability. by Jeremy Dick Quality Systems and Software Ltd. Abstract

Rich Traceability. by Jeremy Dick Quality Systems and Software Ltd. Abstract www.telelogic.com Rich Traceability by Jeremy Dick Quality Systems and Software Ltd. Abstract Creating traceability through the use of links between paragraphs of documents, or between objects in a requirements

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Context-Bounded Model Checking of LTL Properties for ANSI-C Software. Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole

Context-Bounded Model Checking of LTL Properties for ANSI-C Software. Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole Context-Bounded Model Checking of LTL Properties for ANSI-C Software Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole Model Checking C Model checking: normally applied to formal state transition

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Configuring and Deploying a Private Cloud with System Center 2012

Configuring and Deploying a Private Cloud with System Center 2012 Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This course describes private cloud configuration

More information

To introduce software process models To describe three generic process models and when they may be used

To introduce software process models To describe three generic process models and when they may be used Software Processes Objectives To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software

More information

A Manifesto for Semantic Model Differencing

A Manifesto for Semantic Model Differencing A Manifesto for Semantic Model Differencing ME-10, October 2010 Shahar Maoz, Jan Oliver Ringert, Bernhard Rumpe Lehrstuhl Informatik 3 () http://www.se-rwth.de/ Seite 2 One slide abstract Existing approaches

More information

Software Engineering. Software Processes. Based on Software Engineering, 7 th Edition by Ian Sommerville

Software Engineering. Software Processes. Based on Software Engineering, 7 th Edition by Ian Sommerville Software Engineering Software Processes Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To introduce software process models To describe three generic process models and when

More information

Erlang Testing and Tools Survey

Erlang Testing and Tools Survey Erlang Training and Consulting Ltd Erlang Testing and Tools Survey Aniko Nagyné Víg and Tamás Nagy Victoria, British Columbia, Canada, 27 Sept 2008 Agenda 1 What we are doing and why Goals and tasks Market

More information

Model Checking of Software

Model Checking of Software Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving

More information