Techniques to Generate UTP-based Test Cases from Sequence Diagrams Using M2M (Model-to-Model) Transformation

Size: px
Start display at page:

Download "Techniques to Generate UTP-based Test Cases from Sequence Diagrams Using M2M (Model-to-Model) Transformation"

Transcription

1 Techniques to Generate UTP-based Test Cases from Sequence Diagrams Using M2M (Model-to-Model) Transformation Yongjin Seo Dept. of Computer Science & Engineering Chungnam National University Eun Young Cheon Dept. of Computer Science & Engineering Chungnam National University Jin-A Kim Satreci Abstract In order to conduct model based testing of sequence diagrams, test cases should be automatically generated from sequence diagrams. To this end, the scenarios expressed by the sequence diagrams are identified and paths that satisfy the test coverage are extracted to generate test information. However, since sequence diagrams express loop, optional, and alternative information using combined fragments, an automatic generation of test cases from sequence diagram is complicated. To solve this problem, in this paper, a model transformation process that transforms from sequence diagrams into activity diagrams is defined, the scenarios of sequence diagrams are represented in the form of control flows by the transform process. Next, test coverage is applied to generate test cases. The process to generate test cases from sequence diagrams is shown through case studies. Keywords model-based testing; model transformation; test case; UML testing profile I. INTRODUCTION Model-based testing is a testing technique that automatically generates test cases from behavioral models derived from requirements to verify whether a system operates in compliance with the requirements[1]. Model-based testing has advantages such as flexibility in the generation of test cases and easiness in the management of traceability between test cases and requirements. Meanwhile, behavioral models used in modelbased testing are those that show the intended behavior of systems under test (SUT) in standardized forms such as sequence diagrams, state diagrams, and Petri-nets[2]. However, if diverse behavioral models are used, the advantages of model-based testing cannot be magnified because each behavioral model uses a different generation method of test cases and the different method generates a different form of test cases. The biggest problem is that to express various viewpoint of software, diverse behavioral models should be used in general. For this reason, the advantages of model-based testing Hyeon Soo Kim Dept. of Computer Science & Engineering Chungnam National University hskim401@cnu.ac.kr enumerated above cannot be easily realized. To solve this problem, the same test case generation procedure and form should be provided regardless of the types of tests. In this paper, to provide such a method, UTP (UML Testing Profile)[3] based test cases are generated. UTP is intended to express test related information in the same method as UML (Unified Modeling Language)[4] and enables expressing test cases as models. Generating UTP-based test cases enables the application of methods of generating output models (UTP-based test cases) from input models (behavioral model). That is, we have the same test case generation procedure and form by using model transformation techniques[5]. In this study, a method of generating test cases from sequence diagrams is presented. A sequence diagram is a model that can effectively express an individual scenario and is utilized to realize a use case specification[4]. Sequence diagrams provide methods of describing the forms of interactions and information exchanges between objects. That is, sequence diagrams include information such as system operation scenarios and the kinds of information exchanged at each operation. These information are useful in the generation of system-level test cases. For this reason, in this study, test cases will be generated from sequence diagrams. Since multiple scenarios can be expressed by the combined fragments added in UML 2.0, a process to extract unit paths is additionally necessary. However, scenarios expressed by the combined fragments are not appropriate forms to extract paths. To solve this problem, in this study, a method is suggested that generates test cases after conducting an intermediate transformation from a sequence diagram to an activity diagram. Since this process is also implemented through a model transformation technique, the entire test generation procedure is not affected by this process. The process has advantages such as /16/$31.00 copyright 2016 IEEE ICIS 2016, June 26-29, 2016, Okayama, Japan

2 enabling the automation of test case generation, making test case preparation easy, and increasing the reusability of test cases. II. RELATED STUDIES Papers [6] and [7] suggest ways to derive the scenarios of sequence diagrams and to generate test cases from the scenarios in order to generate scenario-based test cases from UML sequence diagrams. Paper [6] defines Concurrent Control Flow Graphs that reflect parallelism in order to identify the scenarios of sequence diagrams. Based on the foregoing, the grammar necessary to extract possible paths is defined to derive the subsets of CCFGs that correspond to individual paths. Although this method has an advantage of being capable of deriving the scenarios of sequence diagrams considering the parallelism of sequence diagrams, it has a disadvantage that many overlapping paths may occur in one test case as a results so that test cases may become complicated. In addition, since test cases appear in the form of CCFGs, information applied to actual test cases should be additionally derived. Meanwhile, paper [7] defines Sequence Diagram Graphs (SDGs) in the form of state diagrams to express the scenarios of sequence diagrams. SDGs define each state as a set of messages, objects that sent messages, and objects that receive the messages. Based on the foregoing, test algorithms are presented to derive test cases from SDGs. This method has a disadvantage of determining iterative flows and branching flows with only messages constraints without considering the combined fragments of sequence diagrams. In addition, papers [6] and [7] require efforts to additionally prepare individual scenario expression models in order to generate scenario based test cases from sequence diagrams. Unlike the existing methods, in this study, the activity diagram in UML 2.0 is used to express the scenarios of sequence diagrams and the scenarios are automatically expressed as activity diagrams through M2M transformation. In addition, test cases are expressed as UTP models so that the entire process to generate test cases is implemented through M2M transformation. III. MODEL TRANSFORMATION FOR THE GENERATION OF TEST CASES FROM SEQUENCE DIAGRAMS In this paper, a model transformation process as shown in Fig. 1 is proposed to automatically generate test cases from sequence diagrams. Fig. 1. Model Transformation Process for Test Case Generation A sequence diagram is transformed into an activity diagram. The activity diagram expresses scenarios included in the sequence diagram. The activity diagram is fragmented so that the fragmented activity diagram has a unit activity. Each fragmented activity diagram is utilized as a test scenario. The fragmented activity diagram is transformed into UTP-based test cases. To implement the above process, the model transformation rules necessary in each stage should be defined. In the case of the first and third stages, the rules can be defined by mapping between model elements, and in the case of the second stage the transformation rules are defined by fragmentation algorithms. A. Sequence diagram activity diagram transformation In this section, the rules for transforming a sequence diagram into an activity diagram are presented. The reason why sequence diagrams are transformed into activity diagrams is that extracting single paths from a sequence diagram is not easy. The rules for transformation of a sequence diagram into an activity diagram are as shown in Table 1. TABLE I. TRANSFORMATION RULES FROM SEQUENCE DIAGRAM TO ACTIVITY DIAGRAM # Source Target R1 InteractionFragment Activity R2 R3 R4 Incoming Message (from Actor) Outgoing Message (to Actor) SendEvent & RecieveEvent <<Control>> <<Observe>> ControlFlow R5 CombinedFrament (loop) Decision R6 CombinedFrament (alt/opt) Decision Table 1 shows the mapping relationships between the elements of sequence diagrams as source models and the elements of activity diagrams as target models. Fig. 2 shows how each element is mapped in actual diagrams. In addition, the diagram shown in Fig. 2(a) is transformed into the diagram shown in Fig. 2(b) through the transformation rules. On reviewing Fig. 2, it can be seen that the combined fragments of the sequence diagram are transformed into the DecisionNodes (R5, R6) of the activity diagram and that the control flow of the activity diagram is determined by the kinds of combined fragments. In addition, not all the messages of the sequence diagram were expressed in the activity diagram but only useful messages were represented as the nodes of the activity diagram (R2, R3). That is, only those messages that occurred between system under test (SUT) and external elements (user, external systems, etc.) were expressed in the activity diagram. In addition, messages were represented as stereotypes according to their directions. Messages coming in from external elements can be utilized as test data (R2). Messages going out to external elements can be utilized as log messages and test verdicts for identifying test results (R3). B. Activity diagram fragmentation This section performs the process that fragments the activity diagram so that the fragmented activity diagram has a single path. The reasons why activity diagrams are fragmented are as follows. First, a test case can verify only single behavior. Therefore, in order to generate such a test case, the complicated execution paths of software should be separated into multiple unit paths. Second reason is to simplify the test case generation process. The second and third stages in Fig. 1 are stages for test cases generation. As mentioned earlier, the two stages have

3 different forms of transformation rules. Combining different forms of transformation rules into one and implementing it is very difficult problem. Since the fragmented diagram has only sequential flows, this makes the test case generation process simpler. For such reasons, the unit paths of an activity diagram are derived through the fragmentation. Fig 3 shows a fragmentation method for an activity diagram. Fig. 2. Activity Diagram Fragmentation Algorithm The algorithm shown in Fig. 3 generates activity diagrams that have unit paths by pruning some paths in activity diagrams. That is, this algorithm removes the and ControlFlow of remaining paths so that only one path is left out of many paths. By using this method, unit paths can be extracted using only those DecisionNodes that constitute activity diagrams. Therefore, to implement this method, prospective paths to be removed should be derived first from all DecisionNodes of activity diagrams. Since prospective paths to be removed vary with the activities of DecisionNodes, the activities of DecisionNodes should be identified before extracting the prospective paths to be removed. Lines 7~17 are subjected to this process when their DecisionNodes have branching flows. In the case of DecisionNodes that have branching flows, each path that contains the OutgoingEdge of them becomes a prospective path to be removed. Line 5 is subjected to this process when its DecisionNode has iterative flows. In cases where a DecisionNode has iterative flows, the paths are divided into those that circulate in the iterative statement (TrueEdge) and those that do not do so (FalseEdge). However, since the paths should pass the FalseEdge even when they circulate in the iterative statement, paths that include any False Edge are not included in prospective paths to be removed. Since the number of paths is derived through combinations with other DecisionNodes instead, empty sets are included in prospective paths to be removed in order to meet the number of cases. Based on the foregoing, individual DecisionNode D can be expressed as shown by Eq. 1. (1) Where, n refers to the kinds of DecisionNodes. Selection refers to branching and iteration refers to repetition. Path refers to a set of prospective paths to be removed. refers to the ControlFlow where a prospective path to be removed begins and refers to the ControlFlow where the prospective path ends. Lines 5 and 17 indicate the addition of prospective paths to be removed derived from individual DecisionNodes based on the above contents. When all prospective paths to be removed have been extracted from all DecisionNodes, sets of prospective paths to be removed are composed through the content of line 20. The on line 20 operates in the following manner. (2) In Eq. 2, refers to sets consisting of subsets of Paths of size k. The reason why prospective paths to be removed are derived in a separate method when DecisionNodes have branching flows is that those DecisionNodes may have two or more OutgoingEdges. If a DecisionNode has three Outgoing Edges, two prospective paths to be removed should be removed at a time. If simply calculated with, accurate results cannot be obtained in situations mentioned above. Therefore, the method as shown by Eq. 2 is used. Fragmented activity diagrams can be obtained by applying the sets of prospective paths to be removed obtained through line 20 to activity diagrams. To help the understanding of the algorithm operation, the fragmentation process is explained through the activity diagram in Fig. 4. First, two DecisionNodes exist in the relevant activity diagram and this can be expressed by Eq. 1 as follows: Since the first DecisionNode has iterative flows and is included in the TrueEdge, prospective paths to be removed are. Since the second DecisionNode has branching flows, paths that include OutgoingEdges were included in prospective paths to be removed. Thereafter, combinations of prospective paths to be removed are composed. By Eq. 2, the example in Fig. 4 is calculated as follows: By applying the derived results to the activity diagram shown in Fig. 4, four paths can be obtained. The paths can be expressed as follows in the order of ControlFlows:

4 Since and out of the above results have the same path, it can be seen that three paths are finally derived. In this way, fragmented activity diagrams can be obtained through the algorithm shown in Fig. 3. Fig. 3. Example Activity Diagram Since test cases are expressed as TestContext Operations in UTP, the number of test cases can be expressed through the number of Operations in the TestContext. Since those test cases that are generated through sequence diagrams are mainly used in tests in the system-level, the SUT are systems or single applications. Since this is equally applied to all applications, the transformation rules were defined in the form such as R10. TABLE III. TRANSFORMATION RULE FROM ACTIVITY DIAGRAM TO TEST CASE # Source Target R7 Activity InteractionFragment R8 R9 <<Control>> <<Observe>> Incoming Message (from TestContext) Outgoing Message (to TestContext) R10 - TestContext SUT C. Activity diagram UTP test case transformation In this section, model transformation rules for generation of test cases from the fragmented activity diagrams generated as explained in section B are presented. The test cases generated here conform to UTP. To prepare UTP-based test cases, the UTP elements listed in Table 2 are used. UTP Element TABLE II. TEST CASE ELEMENTS OF UTP Description The behavioral models are prepared based on the Test Behavior package of UTP and the operations of test cases as the Operations of TestContext are described. The model on the bottom of Fig. 5(b) corresponds to behavioral models. This model should include the time point of test data inputs and contents for test judgment. The behavioral models are composed in sequence diagrams mainly with interactions between TestContext and SUT. Among the nodes of activity diagrams, <<Control>> stereotyped nodes correspond input values and are expressed as messages from TestContext to SUT (R8). Among the nodes of activity diagrams, <<Observe>> stereotyped nodes correspond output values and are expressed as messages from SUT to TestContext (R9). Based on the contents as such, transformation rules for generation of UTP-based test cases from activity diagrams can be expressed as shown in Table 3 and examples of transformation can be seen through Fig. 5. Fig. 4. Transformation Example from Activity Diagram to Test Case TestContext SUT A test context acts as a grouping mechanism for a set of test cases The system under test (SUT) is a part of a test context. It refers to a system, subsystem, or component that is being tested. TestCase A specification of one specific case to test the system UTP-based test cases are described through structural models and behavioral models. The structural models are prepared based on the Test Architecture package of UTP and the following information are described; the number of test cases, Systems Under Tests (SUT), the form of test data, etc. The model on the top of Fig. 5(b) corresponds to structural models. IV. APPLICATION EXAMPLES In this section, examples of generation of test cases from actual cases through the transformation rules presented in section III are introduced. The target application [8] is a system that has functions to monitor and control the distributed entities. The target system has a total of 64 sequence diagrams and a total of 160 test cases were derived from the sequence diagrams. In this study, the behavior of the system that must be identified to

5 conduct system tests with the derived test cases were figured out and test environments for the tests were constructed. The environments where the tests were conducted are as shown in Fig. 6. Among diverse test cases, those test cases that were derived from the sequence diagram in Fig. 7 are as shown in Fig. 9. Fig. 7 shows a sequence diagram related to the control function to execute the entities and the activity diagrams derived from the sequence diagram are as shown in Fig. 8. A UTP-based test case derived through one path in the activity diagram in Fig. 8. V. CONCLUSION In this study, model transformation processes to generate test cases from sequence diagrams and model transformation rules for execution of model transformation were proposed. Unlike the existing studies, the complication of test case generation was reduced through intermediate transformation from sequence diagrams into activity diagrams and test case generation through model transformation was enabled by using test cases in the form of UTP. In this study, the fact that test cases were generated through the presented model transformation rules was identified through case studies. Future studies are to present transformation rules for application of diverse test coverages to activity diagrams and implement tools to automate the generation of test cases from sequence diagrams. Fig. 5. Sequence Diagram of Target System (Execution managed object)

6 Fig. 6. Activity Diagram of Target System Fig. 7. Test Case of Target System ACKNOWLEDGMENT This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(No. NRF-2013R1A1A ). This research was supported by NSL(National Space Lab) program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology ( ). REFERENCES [1] M. Utting, B. Legeard, Practical model-based testing: a tools approach, Morgan Kaufmann, [2] H. S. Chae, "Model-based Test - Concepts and Issues, Communications of KIISE, Vol. 31, No. 4, pp , Apr [3] OMG, UML Testing Profile (UTP), /1.2/PDF, [4] OMG, Unified Modeling Language (UML), UML/2.5/PDF, [5] T. Mens, P. V. Gorp, "A taxonomy of model transformation," Electronic Notes in Theoretical Computer Science, Vol. 152, pp , Mar [6] V. Garousi, L.C. Briand, Y. Labiche, "Control flow analysis of UML 2.0 sequence diagrams," Model Driven Architecture Foundations and Applications, Springer Berlin Heidelberg, [7] M. Sarma, D. Kundu, R. Mall, "Automatic Test Case Generation from UML Sequence Diagrams," Proc. of the 15th International Conference on Advanced Computing and Communications, pp , [8] B. Min, H. S. Kim, S. Kuk, S. W. Park, C. Kim, Dynamic Reconfigurable Integrated Management and Monitoring System for Heterogeneous Distributed Computing Systems, 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp , 2012.

Applying 4+1 View Architecture with UML 2. White Paper

Applying 4+1 View Architecture with UML 2. White Paper Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was

More information

Utilizing Domain-Specific Modelling for Software Testing

Utilizing Domain-Specific Modelling for Software Testing Utilizing Domain-Specific Modelling for Software Testing Olli-Pekka Puolitaival, Teemu Kanstrén VTT Technical Research Centre of Finland Oulu, Finland {olli-pekka.puolitaival, teemu.kanstren}@vtt.fi Abstract

More information

Model-based Testing: Next Generation Functional Software Testing

Model-based Testing: Next Generation Functional Software Testing Model-based Testing: Next Generation Functional Software Testing By Dr. Bruno Legeard Model-based testing (MBT) is an increasingly widely-used technique for automating the generation and execution of tests.

More information

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom of Saudi

More information

Evaluation of a Use-Case-Driven Requirements Analysis Tool Employing Web UI Prototype Generation

Evaluation of a Use-Case-Driven Requirements Analysis Tool Employing Web UI Prototype Generation Evaluation of a Use-Case-Driven Requirements Analysis Tool Employing Web UI Prototype Generation SHINPEI OGATA Course of Functional Control Systems, Graduate School of Engineering Shibaura Institute of

More information

Chapter 4 Software Lifecycle and Performance Analysis

Chapter 4 Software Lifecycle and Performance Analysis Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and

More information

Survey of Web Testing Techniques

Survey of Web Testing Techniques Survey of Web Testing Techniques Sonal Anand M.Tech (Computer Science) USIT, GGSIPU New Delhi, India Anju Saha Assistant Professor USIT, GGSIPU New Delhi, India ABSTRACT This paper presents a survey of

More information

How To Test On A Model Driven Test On An Embedded System

How To Test On A Model Driven Test On An Embedded System Applying Model Driven Techniques to Mobile Testing Sang-Yong Byun Division of Computer Engineering, JeJu National University, Korea byunsy@jejunu.ac.kr Abstract Mobile Embedded Testing is the most important

More information

UML TUTORIALS THE USE CASE MODEL

UML TUTORIALS THE USE CASE MODEL UML TUTORIALS THE USE CASE MODEL www.sparxsystems.com.au Sparx Systems 2004 Page 1/5 describes the proposed functionality of the new system. A Use Case represents a discrete unit of interaction between

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

CIM to PIM Transformation: A criteria Based Evaluation

CIM to PIM Transformation: A criteria Based Evaluation ISSN:2229-6093 CIM to PIM Transformation: A criteria Based Evaluation Abdelouahed KRIOUILE *, Taoufiq GADI, Youssef BALOUKI Univ Hassan 1, LAVETE Laboratory, 26000 Settat, Maroc * E-mail of the corresponding

More information

Integrating Performance Characterization with Software Development

Integrating Performance Characterization with Software Development International Journal of Basic & Applied Sciences IJBAS-IJENS Vol: 11 No: 02 7 Integrating Performance Characterization with Software Development Abstract- The importance of integrating performance considerations

More information

Standard for Software Component Testing

Standard for Software Component Testing Standard for Software Component Testing Working Draft 3.4 Date: 27 April 2001 produced by the British Computer Society Specialist Interest Group in Software Testing (BCS SIGIST) Copyright Notice This document

More information

Towards Model-based Acceptance Testing for Scrum

Towards Model-based Acceptance Testing for Scrum Towards Model-based Acceptance Testing for Scrum Renate Löffler, Baris Güldali, Silke Geisen Software Quality Lab (s-lab) Universität Paderborn Warburger Str. 100, Paderborn, Deutschland [rloeffler bguldali

More information

Visual Analysis Tool for Bipartite Networks

Visual Analysis Tool for Bipartite Networks Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan misue@cs.tsukuba.ac.jp Abstract. To find hidden features

More information

The BPM to UML activity diagram transformation using XSLT

The BPM to UML activity diagram transformation using XSLT The BPM to UML activity diagram transformation using XSLT Ondřej Macek 1 and Karel Richta 1,2 1 Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University,

More information

Automated Model Based Testing for an Web Applications

Automated Model Based Testing for an Web Applications Automated Model Based Testing for an Web Applications Agasarpa Mounica, Lokanadham Naidu Vadlamudi Abstract- As the development of web applications plays a major role in our day-to-day life. Modeling the

More information

A Contribution to Expert Decision-based Virtual Product Development

A Contribution to Expert Decision-based Virtual Product Development A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,

More information

A Framework of Model-Driven Web Application Testing

A Framework of Model-Driven Web Application Testing A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China

More information

An Automated Model Based Approach to Test Web Application Using Ontology

An Automated Model Based Approach to Test Web Application Using Ontology An Automated Model Based Approach to Test Web Application Using Ontology Hamideh Hajiabadi, Mohsen Kahani hajiabadi.hamideh@stu-mail.um.ac.ir, kahani@um.ac.ir Computer Engineering Department, Ferdowsi

More information

Keywords:-Workflow Model, Workflow Architecture, Workflow Application Development, Waterfall Model, Workflow Modelling Tools.

Keywords:-Workflow Model, Workflow Architecture, Workflow Application Development, Waterfall Model, Workflow Modelling Tools. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Eineeri Research Paper Available online at: www.ijarcsse.com A New Approach in

More information

Sequence Diagrams. Massimo Felici. Massimo Felici Sequence Diagrams c 2004 2011

Sequence Diagrams. Massimo Felici. Massimo Felici Sequence Diagrams c 2004 2011 Sequence Diagrams Massimo Felici What are Sequence Diagrams? Sequence Diagrams are interaction diagrams that detail how operations are carried out Interaction diagrams model important runtime interactions

More information

TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization

TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization Negar Koochakzadeh Vahid Garousi Software Quality Engineering Research Group University of Calgary, Canada Acknowledging funding and

More information

UML-based Test Generation and Execution

UML-based Test Generation and Execution UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA jeanhartmann@siemens.com ABSTRACT

More information

i. Node Y Represented by a block or part. SysML::Block,

i. Node Y Represented by a block or part. SysML::Block, OMG SysML Requirements Traceability (informative) This document has been published as OMG document ptc/07-03-09 so it can be referenced by Annex E of the OMG SysML specification. This document describes

More information

Object Oriented Programming. Risk Management

Object Oriented Programming. Risk Management Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling

More information

Communication Diagrams

Communication Diagrams Communication Diagrams Massimo Felici Realizing Use cases in the Design Model 1 Slide 1: Realizing Use cases in the Design Model Use-case driven design is a key theme in a variety of software processes

More information

Model Driven Testing AGEDIS Architecture Interfaces and Tools

Model Driven Testing AGEDIS Architecture Interfaces and Tools Model Driven Testing AGEDIS Architecture Interfaces and Tools Alan Hartman Kenneth Nagin IBM Haifa Research Laboratory Haifa University Campus Haifa 31905 ISRAEL {hartman, nagin}@il.ibm.com Page 1 of 11

More information

A New Cognitive Approach to Measure the Complexity of Software s

A New Cognitive Approach to Measure the Complexity of Software s , pp.185-198 http://dx.doi.org/10.14257/ijseia.2014.8.7,15 A New Cognitive Approach to Measure the Complexity of Software s Amit Kumar Jakhar and Kumar Rajnish Department of Computer Science and Engineering,

More information

Test Driven Mobile Applications Development

Test Driven Mobile Applications Development , 23-25 October, 2013, San Francisco, USA Test Driven Mobile Applications Development Haeng Kon Kim Abstract Mobile applications testing is the most important factor in its software development. Mobile

More information

A UML Introduction Tutorial

A UML Introduction Tutorial A UML Introduction Tutorial 1/27/08 9:55 PM A UML Introduction Tutorial In this tutorial you will learn about the fundamentals of object oriented modelling, the Unified Modelling Language and the software

More information

Experiences in Test Automation for Multi-Client System with Social Media Backend

Experiences in Test Automation for Multi-Client System with Social Media Backend Experiences in Test Automation for Multi-Client System with Social Media Backend Tuomas Kekkonen, Teemu Kanstrén, Jouni Heikkinen VTT Technical Research Centre of Finland Oulu, Finland {tuomas.kekkonen,

More information

Business Modeling with UML

Business Modeling with UML Business Modeling with UML Hans-Erik Eriksson and Magnus Penker, Open Training Hans-Erik In order to keep up and be competitive, all companies Ericsson is and enterprises must assess the quality of their

More information

Mapping from Business Processes to Requirements Specification

Mapping from Business Processes to Requirements Specification Extended abstract 1/5 Mapping from Business Processes to Requirements Specification Svatopluk Štolfa, Ivo Vondrák Department of Computer Science, VŠB - Technical University of Ostrava, 17.listopadu 15,

More information

Automatic Test Data Generation-Achieving Optimality Using Ant-Behaviour

Automatic Test Data Generation-Achieving Optimality Using Ant-Behaviour Automatic Test Data Generation-Achieving Optimality Using Ant-Behaviour Sumesh Agarwal, Shubham Gupta, and Nitish Sabharwal Abstract Software Testing is an important element in the Software Development

More information

Optimizations. Optimization Safety. Optimization Safety. Control Flow Graphs. Code transformations to improve program

Optimizations. Optimization Safety. Optimization Safety. Control Flow Graphs. Code transformations to improve program Optimizations Code transformations to improve program Mainly: improve execution time Also: reduce program size Control low Graphs Can be done at high level or low level E.g., constant folding Optimizations

More information

Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010)

Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010) Electronic Communications of the EASST Volume 34 (2010) Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010) Position Paper: m2n A Tool for Translating

More information

Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach

Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach Hibiki Saito*, Shingo Takada Dept. of Information and Computer Science Keio University Yokohama, Japan Haruto Tanno,

More information

System testing from UML diagrams

System testing from UML diagrams System testing from UML diagrams Eliane Martins Institute of Computer State University of Campinas (Unicamp) eliane@ic.unicamp.br 52nd. Ifip WG 10.4 Meeting Uphall, Scotland Jul 2, 2007 Harpia Goal: Development

More information

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications Germán Harvey Alférez Salinas Department of Computer Information Systems, Mission College,

More information

A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles

A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles MICHAL KÖKÖRČENÝ Department of Information Technologies Unicorn College V kapslovně 2767/2, Prague, 130 00

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Agile Model-Based Systems Engineering (ambse)

Agile Model-Based Systems Engineering (ambse) Agile Model-Based Systems Engineering (ambse) Bruce Powel Douglass, Ph.D. Chief Evangelist, Global Technology Ambassador IBM Rational Bruce.Douglass@us.ibm.com Twitter: @BruceDouglass Yahoo: tech.groups.yahoo.com/group/rt-uml/

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,

More information

Different Approaches to White Box Testing Technique for Finding Errors

Different Approaches to White Box Testing Technique for Finding Errors Different Approaches to White Box Testing Technique for Finding Errors Mohd. Ehmer Khan Department of Information Technology Al Musanna College of Technology, Sultanate of Oman ehmerkhan@gmail.com Abstract

More information

Quick Guide Business Process Modeling Notation (BPMN)

Quick Guide Business Process Modeling Notation (BPMN) Quick Guide Business Process Modeling Notation (BPMN) IDM Technical Team January 2007 Quick Guide: BPMN 2 of 14 The scope of this document is to provide a quick guide to the concepts and usage of the Business

More information

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization KanwalpreetKaur #, Satwinder Singh * #Research Scholar, Dept of Computer Science and

More information

A UML 2 Profile for Business Process Modelling *

A UML 2 Profile for Business Process Modelling * A UML 2 Profile for Business Process Modelling * Beate List and Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology and Interactive Systems Vienna University

More information

Modeling and Design of Intelligent Agent System

Modeling and Design of Intelligent Agent System International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,

More information

UML Modeling of Network Topologies for Distributed Computer System

UML Modeling of Network Topologies for Distributed Computer System Journal of Computing and Information Technology - CIT 17, 2009, 4, 327 334 doi:10.2498/cit.1001319 327 UML Modeling of Network Topologies for Distributed Computer System Vipin Saxena and Deepak Arora Department

More information

Web-based Dynamic Scheduling Platform for Grid Computing

Web-based Dynamic Scheduling Platform for Grid Computing IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 67 Web-based Dynamic Scheduling Platform for Grid Computing Oh-han Kang, and Sang-seong Kang, Dept. of Computer

More information

Generating Edit Operations for Profiled UML Models

Generating Edit Operations for Profiled UML Models Generating Edit Operations for Profiled UML Models Timo Kehrer, Michaela Rindt, Pit Pietsch, Udo Kelter Software Engineering Group University of Siegen {kehrer,mrindt,pietsch,kelter}@informatik.uni-siegen.de

More information

Development of Software Requirement Analysis Tool for NPP Software Fields Based on Software Inspection and Formal Method

Development of Software Requirement Analysis Tool for NPP Software Fields Based on Software Inspection and Formal Method Development of Software Requirement Analysis Tool for NPP Software Fields Based on Software Inspection and Formal Method Seo Ryong Koo*, Han Seong Son*, Poong Hyun Seong*, Junbeom Yoo**, and Sung Deok

More information

FPGA area allocation for parallel C applications

FPGA area allocation for parallel C applications 1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University

More information

A Research and Practice of Agile Unified Requirement Modeling

A Research and Practice of Agile Unified Requirement Modeling 2009 International Symposium on Intelligent Ubiquitous Computing and Education A Research and Practice of Agile Unified Requirement Modeling Huang ShuiYuan, Duan LongZhen, Xie Jun, Tao JunCai, Chen GuiXiang

More information

Proceedings of the International MultiConference of Engineers and Computer Scientists 2013 Vol I, IMECS 2013, March 13-15, 2013, Hong Kong

Proceedings of the International MultiConference of Engineers and Computer Scientists 2013 Vol I, IMECS 2013, March 13-15, 2013, Hong Kong , March 13-15, 2013, Hong Kong Risk Assessment for Relational Database Schema-based Constraint Using Machine Diagram Kanjana Eiamsaard 1, Nakornthip Prompoon 2 Abstract Information is a critical asset

More information

Towards an automated testing framework to manage variability using the UML Testing Profile

Towards an automated testing framework to manage variability using the UML Testing Profile Automation of Software Test (AST 09) May 18, Vancouver, Canada Towards an automated testing framework to manage variability using the UML Testing Profile Beatriz Pérez Lamancha Software Testing Centre

More information

Software Requirements Specification of A University Class Scheduler

Software Requirements Specification of A University Class Scheduler Software Requirements Specification of A University Class Scheduler Deanna M. Needell Jeff A. Stuart Tamara C. Thiel Sergiu M. Dascalu Frederick C. Harris, Jr. Department of Computer Science University

More information

A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang

A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow

More information

Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone

Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone Young Jae Lee Dept. of Multimedia, Jeonju University #45, Backma-Gil, Wansan-Gu,Jeonju, Jeonbul, 560-759,

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

The Software Process. The Unified Process (Cont.) The Unified Process (Cont.)

The Software Process. The Unified Process (Cont.) The Unified Process (Cont.) The Software Process Xiaojun Qi 1 The Unified Process Until recently, three of the most successful object-oriented methodologies were Booch smethod Jacobson s Objectory Rumbaugh s OMT (Object Modeling

More information

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute

More information

Modeling Systems - External and Internal Behavior Models

Modeling Systems - External and Internal Behavior Models Systematically Combining Specifications of Internal and External System Behavior Using Statecharts Martin Glinz Department of Informatics, University of Zurich Winterthurerstrasse 190 CH-8057 Zurich, Switzerland

More information

Service Level Agreements based on Business Process Modeling

Service Level Agreements based on Business Process Modeling Service Level Agreements based on Business Process Modeling Holger Schmidt Munich Network Management Team University of Munich, Dept. of CS Oettingenstr. 67, 80538 Munich, Germany Email: schmidt@informatik.uni-muenchen.de

More information

From Workflow Design Patterns to Logical Specifications

From Workflow Design Patterns to Logical Specifications AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software

More information

Sample Testing Using Cleanroom

Sample Testing Using Cleanroom Information and Software Technology 42 (2000) 801 807 www.elsevier.nl/locate/infsof Improving software quality using statistical testing techniques D.P. Kelly*, R.S. Oshana Raytheon Company, 13500 N. Central

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

More information

Use-Case Analysis. ! What is it? ! From where did it come? ! Now part of UML

Use-Case Analysis. ! What is it? ! From where did it come? ! Now part of UML Use-Case Analysis Use-Case Analysis! What is it?! An informal, user-friendly, technique useful for functional requirements analysis and specification! From where did it come?! Ivar Jacobson, a Swedish

More information

Scenario-based Requirements Engineering and User-Interface Design

Scenario-based Requirements Engineering and User-Interface Design Scenario-based Requirements Engineering and User-Interface Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria kaindl@ict.tuwien.ac.at

More information

TDDC88 Lab 2 Unified Modeling Language (UML)

TDDC88 Lab 2 Unified Modeling Language (UML) TDDC88 Lab 2 Unified Modeling Language (UML) Introduction What is UML? Unified Modeling Language (UML) is a collection of graphical notations, which are defined using a single meta-model. UML can be used

More information

On the Use of Model Transformations for the Automation of the 4SRS Transition Method

On the Use of Model Transformations for the Automation of the 4SRS Transition Method On the Use of Model Transformations for the Automation of the 4SRS Transition Method Sofia Azevedo 1, Ricardo J. Machado 1, and Rita Suzana Pitangueira Maciel 2 1 Universidade do Minho, Portugal {sofia.azevedo,rmac}@dsi.uminho.pt

More information

Functional Modeling with Data Flow Diagrams

Functional Modeling with Data Flow Diagrams Functional Modeling with Data Flow Diagrams Amasi Elbakush 5771668 Teaching Assistant : Daniel Alami Utrecht University 1 Introduction Data Flow Diagrams (DFDs) are a visual representation of the flow

More information

Reverse Engineering from Exploratory Testing to Specification-based Testing

Reverse Engineering from Exploratory Testing to Specification-based Testing , pp. 197-208 http://dx.doi.org/10.14257/ijseia.2014.8.11.18 Reverse Engineering from Exploratory Testing to Specification-based Testing Dea-Kwang Kim and Lee-Sub Lee* Department of Computer Engineering,

More information

Aspect Oriented Strategy to model the Examination Management Systems

Aspect Oriented Strategy to model the Examination Management Systems Aspect Oriented Strategy to model the Examination Management Systems P.Durga 1, S.Jeevitha 2, A.Poomalai 3, Prof.M.Sowmiya 4 and Prof.S.Balamurugan 5 Department of IT, Kalaignar Karunanidhi Institute of

More information

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting petemcbreen@acm.org All rights reserved. You have permission to copy and distribute the document as long as you make no changes

More information

Scenario-based Evaluation of Software Architecture Styles from the Security Viewpoint

Scenario-based Evaluation of Software Architecture Styles from the Security Viewpoint International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-04 E-ISSN: 347-693 Scenario-based Evaluation of Software Architecture Styles from the Security Viewpoint

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software

More information

An Overview of Distributed Databases

An Overview of Distributed Databases International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview

More information

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Sunghwan Moon, Jaekwon Kim, Taeyoung Kim, Jongsik Lee Department of Computer and Information Engineering,

More information

Layered Approach to Development of OO War Game Models Using DEVS Framework

Layered Approach to Development of OO War Game Models Using DEVS Framework Layered Approach to Development of OO War Game Models Using DEVS Framework Chang Ho Sung*, Su-Youn Hong**, and Tag Gon Kim*** Department of EECS KAIST 373-1 Kusong-dong, Yusong-gu Taejeon, Korea 305-701

More information

Different Approaches using Change Impact Analysis of UML Based Design for Software Development

Different Approaches using Change Impact Analysis of UML Based Design for Software Development Different Approaches using Change Impact Analysis of UML Based Design for Software Development Ali Tariq Bhatti 1, Muhammad Murad Haider 2, Zill-e-Subhan 2 1 North Carolina A&T State University, Greensboro

More information

Efficient Data Replication Scheme based on Hadoop Distributed File System

Efficient Data Replication Scheme based on Hadoop Distributed File System , pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,

More information

BPMN Business Process Modeling Notation

BPMN Business Process Modeling Notation BPMN (BPMN) is a graphical notation that describes the logic of steps in a business process. This notation has been especially designed to coordinate the sequence of processes and messages that flow between

More information

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016

More information

Chapter 19. Activity Diagrams

Chapter 19. Activity Diagrams Use a sequence diagram if you want to emphasize the time ordering of messages. Use a collaboration diagram if you want to emphasize the organization of the objects involved in the interaction. Lay out

More information

Design of automatic testing tool for railway signalling systems software safety assessment

Design of automatic testing tool for railway signalling systems software safety assessment Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research

More information

Mastering increasing product complexity with Collaborative Systems Engineering and PLM

Mastering increasing product complexity with Collaborative Systems Engineering and PLM Mastering increasing product complexity with Collaborative Systems Engineering and PLM Thierry Ambroisine Dassault Systèmes 10 rue Marcel Dassault, 78140 Vélizy Villacoublay, France thierry.ambroisine@3ds.com

More information

Using UML Part Two Behavioral Modeling Diagrams

Using UML Part Two Behavioral Modeling Diagrams UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,

More information

What is a life cycle model?

What is a life cycle model? What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Personalized e-learning a Goal Oriented Approach

Personalized e-learning a Goal Oriented Approach Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,

More information

Review of Mobile Applications Testing with Automated Techniques

Review of Mobile Applications Testing with Automated Techniques Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is

More information

Synthesizing Object Life Cycles from Business Process Models

Synthesizing Object Life Cycles from Business Process Models Synthesizing Object Life Cycles from Business Process Models Rik Eshuis and Pieter Van Gorp Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {h.eshuis,p.m.e.v.gorp}@tue.nl

More information

Applying MDA in Developing Intermediary Service for Data Retrieval

Applying MDA in Developing Intermediary Service for Data Retrieval Applying MDA in Developing Intermediary Service for Data Retrieval Danijela Boberić Krstićev University of Novi Sad Faculty of Sciences Trg Dositeja Obradovića 4, Novi Sad Serbia +381214852873 dboberic@uns.ac.rs

More information

A JDF-enabled Workflow Simulation Tool

A JDF-enabled Workflow Simulation Tool A JDF-enabled Workflow Simulation Tool Claes Buckwalter Keywords: Workflow, software framework, simulation, JDF Abstract: Job Definition Format (JDF) is a relatively young industry standard that specifies

More information

Application of UML in Real-Time Embedded Systems

Application of UML in Real-Time Embedded Systems Application of UML in Real-Time Embedded Systems Aman Kaur King s College London, London, UK Email: aman.kaur@kcl.ac.uk Rajeev Arora Mechanical Engineering Department, Invertis University, Invertis Village,

More information

Testing. Chapter. A Fresh Graduate s Guide to Software Development Tools and Technologies. CHAPTER AUTHORS Michael Atmadja Zhang Shuai Richard

Testing. Chapter. A Fresh Graduate s Guide to Software Development Tools and Technologies. CHAPTER AUTHORS Michael Atmadja Zhang Shuai Richard A Fresh Graduate s Guide to Software Development Tools and Technologies Chapter 3 Testing CHAPTER AUTHORS Michael Atmadja Zhang Shuai Richard PREVIOUS CONTRIBUTORS : Ang Jin Juan Gabriel; Chen Shenglong

More information

SDE exit point program in Budapest Distributed Service Systems

SDE exit point program in Budapest Distributed Service Systems SDE exit point program in Budapest Distributed Service Systems 1. semester 2. semester Development of Distributed Software (5 ECTS) Service-Oriented Integration (5 ECTS) Analysis of Distributed Systems

More information