Modeling and Verification. Devoir Maison 6 : DSL

Size: px
Start display at page:

Download "Modeling and Verification. Devoir Maison 6 : DSL"

Transcription

1 Modeling and Verification Devoir Maison 6 : DSL Alexis Marechal & Levi Lucio April 20, 2009 Introduction In homework 3 we saw an introduction to BPMN. BPMN is a well known formalism to define a system behaviour, but it doesn t have formal semantics (you cannot execute a Business Process). On the other hand we saw in the course an in-depth description of Algebraic Petri Nets, that can be used to model the same systems, but also have formal semantics. The objective of the homework 3 was to give semantics to a particular Bussiness Process using a tranlation to APN. In this homework, we will study some elements of a generic way to achieve this translation. We could try to translate directly the Business Process defined with Intalio, but this can be a bit complicated. Instead we ll use the XText plugin, seen during the exercises session, to create a simple language that will allow us to create and translate Business Process. This task presents two major issues, we ll try to avoid them in this exercise. The first issue is data types. In BPMN there is no way to define precisely which data structures are used. In APN, on the other hand, data structures are clearly defined (including semantics) with ADTs. In order to simplify this exercise, we will only consider P/T Petri Nets and we won t care about the data handled. The second issue is that a BPMN activity doesn t have clear semantics, when we create a Business Process we suppose that any activity is simple and that we won t have any problem implementing it. We can t make this assumption if we want to define clear and formal semantics for our Business Process. In order to

2 by-pass this problem, we will consider that a BPMN activity only represents a state of our system, and it doesn t have any behaviour. In clear, a BPMN activity will be translated as a single place in our Petri Nets. If you check the Business Process that we used for the homework 3 (still available in the course website), and consider the first subprocess, you will notice that activities like Database request or decode PIN where complex, and thus were translated using more than one place/transition. On the other hand, the activity called verify PIN was extremely simple, and was translated as a single place. We will consider in the following exercises that all BPMN activites are like the last one. 2 Exercise : DSL creation During the exercises session we saw how to use xtext in order to create a DSL for Petri Nets. Create a DSL for BPMN using XText. Your DSL must allow a user to specify a Business Process that contains the elements defined in the table (given the restrictions stated in the introduction). Please note that, in order to simplify your work, we changed a bit the structure of the BPMN elements: in BPMN there is no difference between an In Gateway" and an Out Gateway". Creating this difference should make the translation into Petri Nets much easier. While creating your DSL try to keep in mind that you will have to generate code from your models like we saw during the exercises session, so try to think how would you translate the elements you are defining into P/T Petri Nets. 3 Exercice 2: Semantics definition by transformation We will now give semantics to the Business Process diagram you have expressed in your DSL. The semantics will be given by translation into a Petri Net and we will then produce the state space for the given Petri Net. We saw in the exrcises session how to translate Petri Nets to Java, using XPand. In this exercise we will use XPand to translate our Business Process to Petri Nets, using a Prolog syntax. The required prolog syntax includes three simple facts: inarc/3 define arcs going from places into transitions; 2

3 outarc/3 initial/ define arcs going from transitions into places; defines the initial state for the Petri Net. for example, the facts: inarc(p,t,). outarc(t,p2,). inarc(p5,t3,). outarc(t3,p,). inarc(p2,t4,). outarc(t4,p3,). inarc(p2,t2,). outarc(t2,p4,). inarc(p,t5,). outarc(t5,p5,). initial([(p,),(p2,0),(p3,0),(p4,0),(p5,0)]). define the Petri Net in figure. p t t5 p2 p5 t4 t2 t3 p3 p4 Figure : Petri Net Example From the course site you can download a file called semantic_tools.zip containing the following files: engine.pl: contains the prolog engine that will produce the state space for a petri net; petri_net.pl: contains a definition of the Petri Net you want to explore, you will have to override this file with your own results; 3

4 launch.pl: contains a script that produces a visual form of the Petri Net you are exploring and the state space of that Petri Net. From your XPand translation you will produce a file petri_net.pl that will replace the example given. You can then load the launch.pl script in the prolog interpreter and call the predicate launch. Two files will be created: petri_net.dot: contains the visual description of the Petri Net you have translated from your Business Process diagram; state_space.dot: contains the visual description of the state space of the Petri Net you have you have translated from your Business Process diagram. In order to obtain SWI Prolog you can go to the webpage The output in dot format can be read by an application called Graphviz that pretty prints diagrams. You can obtain Graphviz freely at 4 Exercise 3: example In order to test your implementation, you should provide a very small but fully functional example, i.e. a Business Process described using with your DSL that can be executed using the Prolog API. You should include in your solution the Busines Process specification and talk about your results in your final report. Figure 2: Business Process Example 4

5 Send your solutions by mail to and with the subject of the mail starting by TP and including the number of the devoir maison and you name. Example: TP_7_your_name_here. Deadline: 29th of may, noon, for the first version. 2nd of june, midnight, for the final version. 5

6 Activities (as simple places). Start events. End events. Exclusive in gateways. Exclusive out gateways. Inclusive in gateways. Inclusive out gateways. Control flows. Table : Elements of BPMN to be defined in the DSL. 6

BPMN by example. Bizagi Suite. Copyright 2014 Bizagi

BPMN by example. Bizagi Suite. Copyright 2014 Bizagi BPMN by example Bizagi Suite Recruitment and Selection 1 Table of Contents Scope... 2 BPMN 2.0 Business Process Modeling Notation... 2 Why Is It Important To Model With Bpmn?... 2 Introduction to BPMN...

More information

BPMN Business Process Modeling Notation

BPMN Business Process Modeling Notation BPMN (BPMN) is a graphical notation that describes the logic of steps in a business process. This notation has been especially designed to coordinate the sequence of processes and messages that flow between

More information

Dr. Jana Koehler IBM Zurich Research Laboratory

Dr. Jana Koehler IBM Zurich Research Laboratory Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography

More information

Notepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3

Notepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3 Notepad++ The COMPSCI 101 Text Editor for Windows The text editor that we will be using in the Computer Science labs for creating our Python programs is called Notepad++ and http://notepad-plus-plus.org

More information

WHITE PAPER. Peter Drucker. intentsoft.com 2014, Intentional Software Corporation

WHITE PAPER. Peter Drucker. intentsoft.com 2014, Intentional Software Corporation We know now that the source of wealth is something specifically human: knowledge. If we apply knowledge to tasks we already know how to do, we call it productivity. If we apply knowledge to tasks that

More information

RIC 2007 SNAP: Symbolic Nuclear Analysis Package. Chester Gingrich USNRC/RES 3/13/07

RIC 2007 SNAP: Symbolic Nuclear Analysis Package. Chester Gingrich USNRC/RES 3/13/07 RIC 2007 SNAP: Symbolic Nuclear Analysis Package Chester Gingrich USNRC/RES 3/13/07 1 SNAP: What is it? Standard Graphical User Interface designed to simplify the use of USNRC analytical codes providing:

More information

Interest Rates: Credit Cards and Annuities. Interest Rates: Credit Cards and Annuities 1/24

Interest Rates: Credit Cards and Annuities. Interest Rates: Credit Cards and Annuities 1/24 Interest Rates: Credit Cards and Annuities Interest Rates: Credit Cards and Annuities 1/24 Last Time Last time we discussed loans and saw how big an effect interest rates were on a loan, especially a home

More information

Model Decisions and Business Rules in System Architect. Larry Goldberg & Barbara von Halle Knowledge Partners International LLC

Model Decisions and Business Rules in System Architect. Larry Goldberg & Barbara von Halle Knowledge Partners International LLC Model Decisions and Business Rules in System Architect Larry Goldberg & Barbara von Halle Knowledge Partners International LLC Who is KPI? Solutions: Decision WorkBench Plug-in for System Architect STEP

More information

Budapest University of Technology and Economics Department of Measurement and Information Systems. Business Process Modeling

Budapest University of Technology and Economics Department of Measurement and Information Systems. Business Process Modeling Budapest University of Technology and Economics Department of Measurement and Information Systems Business Process Modeling Process, business process Workflow: sequence of given steps executed in order

More information

BP2SAN From Business Processes to Stochastic Automata Networks

BP2SAN From Business Processes to Stochastic Automata Networks BP2SAN From Business Processes to Stochastic Automata Networks Kelly Rosa Braghetto Department of Computer Science University of São Paulo kellyrb@ime.usp.br March, 2011 Contents 1 Introduction 1 2 Instructions

More information

How To Set Up A Net Integration Firewall

How To Set Up A Net Integration Firewall Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2

More information

MAXIMUS Telephone Enrollment- Phase I Call Center Script

MAXIMUS Telephone Enrollment- Phase I Call Center Script Hello, is (First Name) there? (Full Name)? Hi, Mr./Ms. (Last Name). This is (Representative Name) calling from California Health Care Options. I m calling about your Medi-Cal benefits. Did you get the

More information

Business Process Modelling. CA4 Business Process Modelling 1

Business Process Modelling. CA4 Business Process Modelling 1 Business Process Modelling CA4 Business Process Modelling 1 Historical View of BP Modelling Work Process Flow (early to mid 1900s) + Frank Gilbreth & his 'Flow Process Charts' (= flowcharts) + First structured

More information

03 - Lexical Analysis

03 - Lexical Analysis 03 - Lexical Analysis First, let s see a simplified overview of the compilation process: source code file (sequence of char) Step 2: parsing (syntax analysis) arse Tree Step 1: scanning (lexical analysis)

More information

University of Pisa. MSc in Computer Engineering. Business Processes Management. Lectures

University of Pisa. MSc in Computer Engineering. Business Processes Management. Lectures University of Pisa MSc in Computer Engineering Business Processes Management Large and complex organizations are a tangible manifestation of advanced technology, more than machinery itself. (J.K. Galbraith)

More information

Engineering Process Software Qualities Software Architectural Design

Engineering Process Software Qualities Software Architectural Design Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical

More information

Social Security Number

Social Security Number Social Security Number CHAPTER 4 To be eligible to receive FSA funds, each student must provide a correct Social Security number (SSN). To confirm the student s SSN for schools, the Department conducts

More information

Chapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system.

Chapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system. Chapter 1 Introduction to ios Development Objectives: Touch on the history of ios and the devices that support this operating system. Understand the different types of Apple Developer accounts. Introduce

More information

HOW IT WORKS GET STARTED ACCESS FROST MOBILE VIEW ACCOUNT BALANCE VIEW ACCOUNT ACTIVITY MAKE TRANSFERS PAY BILLS LOG OUT SAFETY & SECURITY CONTACT US

HOW IT WORKS GET STARTED ACCESS FROST MOBILE VIEW ACCOUNT BALANCE VIEW ACCOUNT ACTIVITY MAKE TRANSFERS PAY BILLS LOG OUT SAFETY & SECURITY CONTACT US WHAT IS FROST MOBILE? HOW IT WORKS GET STARTED ACCESS FROST MOBILE VIEW ACCOUNT BALANCE VIEW ACCOUNT ACTIVITY MAKE TRANSFERS PAY BILLS LOG OUT SAFETY & SECURITY CONTACT US MEMBER FDIC WHAT IS FROST MOBILE?

More information

BPCMont: Business Process Change Management Ontology

BPCMont: Business Process Change Management Ontology BPCMont: Business Process Change Management Ontology Muhammad Fahad DISP Lab (http://www.disp-lab.fr/), Université Lumiere Lyon 2, France muhammad.fahad@univ-lyon2.fr Abstract Change management for evolving

More information

How To Design An Information System

How To Design An Information System Information system for production and mounting of plastic windows MARCEL, MELIŠ Slovak University of Technology - Faculty of Material Sciences and Technology in Trnava, Paulínska 16 street, Trnava, 917

More information

08 BPMN/1. Software Technology 2. MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard

08 BPMN/1. Software Technology 2. MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard Software Technology 2 08 BPMN/1 2 ntro Sequence of (three?) lessons on BPMN and technologies related

More information

The ADOxx Metamodelling Platform Workshop "Methods as Plug-Ins for Meta-Modelling" in conjunction with "Modellierung 2010", Klagenfurt

The ADOxx Metamodelling Platform Workshop Methods as Plug-Ins for Meta-Modelling in conjunction with Modellierung 2010, Klagenfurt The ADOxx Metamodelling Platform Workshop "Methods as Plug-Ins for Meta-Modelling" in conjunction with "Modellierung 2010", Klagenfurt Dr. Harald Kühn 24.03.2010 Agenda 1 Overview 2 Deployment and Integration

More information

Chapter 13: Program Development and Programming Languages

Chapter 13: Program Development and Programming Languages Understanding Computers Today and Tomorrow 12 th Edition Chapter 13: Program Development and Programming Languages Learning Objectives Understand the differences between structured programming, object-oriented

More information

Support and Compatibility

Support and Compatibility Version 1.0 Frequently Asked Questions General What is Voiyager? Voiyager is a productivity platform for VoiceXML applications with Version 1.0 of Voiyager focusing on the complete development and testing

More information

Efficient BPMN: from Anti-Patterns to Best Practices

Efficient BPMN: from Anti-Patterns to Best Practices Efficient BPMN: from Anti-Patterns to Best Practices Architecture Made Simple Kristina Bigelienė, No Magic Europe About Speaker Kristina Bigelienė kristina.bigeliene@nomagic.com Solution Architect for

More information

Model-Driven Development - From Frontend to Code

Model-Driven Development - From Frontend to Code Model-Driven Development - From Frontend to Code Sven Efftinge sven@efftinge.de www.efftinge.de Bernd Kolb bernd@kolbware.de www.kolbware.de Markus Völter voelter@acm.org www.voelter.de -1- Model Driven

More information

FileMaker. Installation and New Features Guide. for FileMaker Pro 15 and FileMaker Pro 15 Advanced

FileMaker. Installation and New Features Guide. for FileMaker Pro 15 and FileMaker Pro 15 Advanced FileMaker Installation and New Features Guide for FileMaker Pro 15 and FileMaker Pro 15 Advanced 2007-2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California

More information

Wave Analytics Data Integration

Wave Analytics Data Integration Wave Analytics Data Integration Salesforce, Spring 16 @salesforcedocs Last updated: April 28, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Organization of DSLE part. Overview of DSLE. Model driven software engineering. Engineering. Tooling. Topics:

Organization of DSLE part. Overview of DSLE. Model driven software engineering. Engineering. Tooling. Topics: Organization of DSLE part Domain Specific Language Engineering Tooling Eclipse plus EMF Xtext, Xtend, Xpand, QVTo and ATL Prof.dr. Mark van den Brand GLT 2010/11 Topics: Meta-modeling Model transformations

More information

K-SITE RULES: Integrating Business Rules in the mainstream software engineering practice

K-SITE RULES: Integrating Business Rules in the mainstream software engineering practice K-SITE RULES: Integrating Business Rules in the mainstream software engineering practice José L. Martínez-Fernández (2), José C. González (1,2), Pablo Suárez (2) (1) DAEDALUS Data, Decisions and Language,

More information

Identifying Gas Ultrasonic Measurement. Problems Using Advanced Techniques. John Lansing CEESI

Identifying Gas Ultrasonic Measurement. Problems Using Advanced Techniques. John Lansing CEESI Identifying Gas Ultrasonic Measurement Problems Using Advanced Techniques John Lansing CEESI Gas Ultrasonic Meter Benefits :! The benefits of gas USM diagnostics are well known :! USM technology has reduced

More information

Human-Readable BPMN Diagrams

Human-Readable BPMN Diagrams Human-Readable BPMN Diagrams Refactoring OMG s E-Mail Voting Example Thomas Allweyer V 1.1 1 The E-Mail Voting Process Model The Object Management Group (OMG) has published a useful non-normative document

More information

Wave Analytics Data Integration Guide

Wave Analytics Data Integration Guide Wave Analytics Data Integration Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 6, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Generate Android App

Generate Android App Generate Android App This paper describes how someone with no programming experience can generate an Android application in minutes without writing any code. The application, also called an APK file can

More information

2) Remove all the certificates listed by following steps 3-5.

2) Remove all the certificates listed by following steps 3-5. HOW TO SETUP THE NEW DIGITAL SIGNATURE COMPONENT (Version 3.0) Updated on: 8 April 2014 STEP 1: Uninstall the Java Certificate 1) Select the Security tab as shown in the diagram below and Click on 2) Remove

More information

Redpaper Axel Buecker Kenny Chow Jenny Wong

Redpaper Axel Buecker Kenny Chow Jenny Wong Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single

More information

Gates, Plexers, Decoders, Registers, Addition and Comparison

Gates, Plexers, Decoders, Registers, Addition and Comparison Introduction to Digital Logic Autumn 2008 Gates, Plexers, Decoders, Registers, Addition and Comparison karl.marklund@it.uu.se ...open up a command shell and type logisim and press enter to start Logisim.

More information

JAVA WEB START OVERVIEW

JAVA WEB START OVERVIEW JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start

More information

POOSL IDE Installation Manual

POOSL IDE Installation Manual Embedded Systems Innovation by TNO POOSL IDE Installation Manual Tool version 3.4.1 16-7-2015 1 POOSL IDE Installation Manual 1 Installation... 4 1.1 Minimal system requirements... 4 1.2 Installing Eclipse...

More information

Windows Family Safety Filter

Windows Family Safety Filter Protecting Your Kids with Family Safety Keeping your kids safe online can be complicated, but Windows Live Family Safety helps make it easier for you. Family Safety provides a website and a free program

More information

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large

More information

Office 365 deploym. ployment checklists. Chapter 27

Office 365 deploym. ployment checklists. Chapter 27 Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of

More information

Process Modeling using BPMN 2.0

Process Modeling using BPMN 2.0 Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes

More information

Software Quality Exercise 1

Software Quality Exercise 1 Software Quality Exercise Model Checking Information. Dates Release: 7.0.0.5pm Deadline: 07.0.0.5pm Discussion:.0.0. Formalities While this exercise can be solved and handed in in groups of three, every

More information

BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS

BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS Gabriel Cozgarea 1 Adrian Cozgarea 2 ABSTRACT: Business Process Modeling Notation (BPMN) is a graphical standard in which controls and activities can

More information

G Cloud 6 CDG Service Definition for Forgerock Software Services

G Cloud 6 CDG Service Definition for Forgerock Software Services G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform

More information

Using ZeroShell as a NetBalancer, QoS server & Captive Portal.

Using ZeroShell as a NetBalancer, QoS server & Captive Portal. Using ZeroShell as a NetBalancer, QoS server & Captive Portal. (Among other things) By Jose Menendez orallo at gmail dot com Acknowledgments: Let me start this document by thanking all the people that

More information

Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis**

Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** AUTOMATYKA 2011 Tom 15 Zeszyt 2 Antoni Ligêza*, Tomasz Maœlanka*, Krzysztof Kluza*, Grzegorz Jacek Nalepa* Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** 1. Introduction Design, analysis

More information

Setting Up Your Android Development Environment. For Mac OS X (10.6.8) v1.0. By GoNorthWest. 3 April 2012

Setting Up Your Android Development Environment. For Mac OS X (10.6.8) v1.0. By GoNorthWest. 3 April 2012 Setting Up Your Android Development Environment For Mac OS X (10.6.8) v1.0 By GoNorthWest 3 April 2012 Setting up the Android development environment can be a bit well challenging if you don t have all

More information

Set internet safety parental controls with Windows

Set internet safety parental controls with Windows How to Microsoft lets parents set up internet safety settings on a Windows computer for their kids, using Family Safety. Family Safety provides a website and a free program that you install on the computers

More information

Kirsten Sinclair SyntheSys Systems Engineers

Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use

More information

Entity / Activity Table for Causeway Cash Receipts System

Entity / Activity Table for Causeway Cash Receipts System Entity / Activity Table for Causeway Cash System Entity Activity 1 Sends checks and remittance advices (together) 2 Mailroom Clerk Endorses checks 3 Mailroom Clerk Processes remittance - writes amount

More information

Group for Programming & Software Engineering (PSE ), master thesis

Group for Programming & Software Engineering (PSE ), master thesis Group for Programming & Software Engineering (PSE ), master thesis 22 th September 2015 23.09.2015 1 PSE, at the core of computer science OO Programming and programming languages Making new programming

More information

INTRODUCTION TO BUSINESS PROCESS MODELING NOTATION BPMN 1.2 AND BPMN 2.0

INTRODUCTION TO BUSINESS PROCESS MODELING NOTATION BPMN 1.2 AND BPMN 2.0 INTRODUCTION TO BUSINESS PROCESS MODELING NOTATION BPMN 1.2 AND BPMN 2.0 Email: {goliva,gerosa}@ime.usp.br / Twitter: @golivax Agenda 2 Introduction to Business Processes BPMN 1.2 Introduction Elements

More information

CSC 120: Computer Science for the Sciences (R section)

CSC 120: Computer Science for the Sciences (R section) CSC 120: Computer Science for the Sciences (R section) Radford M. Neal, University of Toronto, 2015 http://www.cs.utoronto.ca/ radford/csc120/ Week 2 Typing Stuff into R Can be Good... You can learn a

More information

1/20/2016 INTRODUCTION

1/20/2016 INTRODUCTION INTRODUCTION 1 Programming languages have common concepts that are seen in all languages This course will discuss and illustrate these common concepts: Syntax Names Types Semantics Memory Management We

More information

SAML single sign-on configuration overview

SAML single sign-on configuration overview Chapter 34 Configurin guring g Clarizen Configure the Clarizen Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with Clarizen. Configuration also specifies how the application

More information

Integers are positive and negative whole numbers, that is they are; {... 3, 2, 1,0,1,2,3...}. The dots mean they continue in that pattern.

Integers are positive and negative whole numbers, that is they are; {... 3, 2, 1,0,1,2,3...}. The dots mean they continue in that pattern. INTEGERS Integers are positive and negative whole numbers, that is they are; {... 3, 2, 1,0,1,2,3...}. The dots mean they continue in that pattern. Like all number sets, integers were invented to describe

More information

FileMaker 12. ODBC and JDBC Guide

FileMaker 12. ODBC and JDBC Guide FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

High-level Petri Nets

High-level Petri Nets High-level Petri Nets Model-based system development Aarhus University, Denmark Presentation at the Carl Adam Petri Memorial Symposium, Berlin, February 4, 2011 1 Concurrent systems are very important

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

VDM vs. Programming Language Extensions or their Integration

VDM vs. Programming Language Extensions or their Integration VDM vs. Programming Language Extensions or their Integration Alexander A. Koptelov and Alexander K. Petrenko Institute for System Programming of Russian Academy of Sciences (ISPRAS), B. Communisticheskaya,

More information

Securing PHP Based Web Application Using Vulnerability Injection

Securing PHP Based Web Application Using Vulnerability Injection International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing

More information

The Subnet Training Guide

The Subnet Training Guide The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP

More information

Using Speccy to Report on Your Computer Components

Using Speccy to Report on Your Computer Components Using Speccy to Report on Your Computer Components Ronald Ross rross@spkaa.com Today we re going to have a look at what I consider to be a useful Windows reporting utility. I ll be talking about Speccy,

More information

Introducing Formal Methods. Software Engineering and Formal Methods

Introducing Formal Methods. Software Engineering and Formal Methods Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended

More information

Service Description and Expectations. September 2010

Service Description and Expectations. September 2010 Service Description and Expectations September 2010 If no custom design features are requested, the package includes the following elements: Service Element Pages: Up to 5 Included Design Consultation:

More information

Structural Detection of Deadlocks in Business Process Models

Structural Detection of Deadlocks in Business Process Models Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de

More information

easyobject modern web applications made easy Project presentation

easyobject modern web applications made easy Project presentation easyobject modern web applications made easy Project presentation version 1.0 - December 2012 par Cédric Françoys http://www.cedricfrancoys.be/easyobject This document is released under the Attribution-NonCommercial-ShareAlike

More information

WoPeD - An Educational Tool for Workflow Nets

WoPeD - An Educational Tool for Workflow Nets WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany freytag@dhbw-karlsruhe.de Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany m.saenger09@web.de

More information

Unipass Securemail Client. User Guide v1.2

Unipass Securemail Client. User Guide v1.2 Unipass Securemail Client User Guide v1.2 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team 28/06/2015 Contents

More information

This walk-through was created using Windows XP as a guide, however alternate versions of the Windows OS will be very similar in procedure as well.

This walk-through was created using Windows XP as a guide, however alternate versions of the Windows OS will be very similar in procedure as well. Important!: If you are working from a computer within your office environment, it may be advisable to have your local IT/Helpdesk personnel validate that this software meets acceptable standards prior

More information

White Paper. Java Security. What You Need to Know, and How to Protect Yourself. 800.266.7798 www.inductiveautomation.com

White Paper. Java Security. What You Need to Know, and How to Protect Yourself. 800.266.7798 www.inductiveautomation.com White Paper Java Security What You Need to Know, and How to Protect Yourself Java Security: What You Need to Know, and How to Protect Yourself Ignition HMI, SCADA and MES software by Inductive Automation

More information

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë 14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected

More information

Why are Business Process Models often too complex? Do s and Don ts for Business Process Modelers

Why are Business Process Models often too complex? Do s and Don ts for Business Process Modelers Why are Business Process Models often too complex? Do s and Don ts for Business Process Modelers Version 1.0 This document developed by Dr. Juergen Pitschke, BCS-Dr. Juergen Pitschke, www.enterprise-design.eu

More information

POWER WAVE SOFTWARE SOLUTIONS TECHNOLOGY TOOLS THAT ENABLE SMART BUSINESS DECISIONS

POWER WAVE SOFTWARE SOLUTIONS TECHNOLOGY TOOLS THAT ENABLE SMART BUSINESS DECISIONS POWER WAVE SOFTWARE SOLUTIONS TECHNOLOGY TOOLS THAT ENABLE SMART BUSINESS DECISIONS Power Wave Manager Set-Up Tool IFY CheckPoint Weld Production Monitoring Tool WeldScore Process Analysis Tool Weld Sequencer

More information

A-LINE S GUIDE TO GOOGLE MY BUSINESS. Using Google s My Business, Maps and Google+ to increase your organization s visibility online.

A-LINE S GUIDE TO GOOGLE MY BUSINESS. Using Google s My Business, Maps and Google+ to increase your organization s visibility online. A-LINE S GUIDE TO GOOGLE MY BUSINESS Using Google s My Business, Maps and Google+ to increase your organization s visibility online. A-LINE s Strategic Guide to Google My Business When it comes to reaching

More information

Automation Testing in Mobile Applications Swati Hajela

Automation Testing in Mobile Applications Swati Hajela Automation Testing in Mobile Applications Swati Hajela Test Engineer QAI's International Software Testing Conference 2012 Agenda Overview Objectives of the Research Paper Challenges : Mobile Application

More information

Android: Setup Hello, World: Android Edition. due by noon ET on Wed 2/22. Ingredients.

Android: Setup Hello, World: Android Edition. due by noon ET on Wed 2/22. Ingredients. Android: Setup Hello, World: Android Edition due by noon ET on Wed 2/22 Ingredients. Android Development Tools Plugin for Eclipse Android Software Development Kit Eclipse Java Help. Help is available throughout

More information

Introduction to Fractions

Introduction to Fractions Section 0.6 Contents: Vocabulary of Fractions A Fraction as division Undefined Values First Rules of Fractions Equivalent Fractions Building Up Fractions VOCABULARY OF FRACTIONS Simplifying Fractions Multiplying

More information

Circles and Diamonds and Squares, Oh My! Demystifying the BPMN Standard

Circles and Diamonds and Squares, Oh My! Demystifying the BPMN Standard Circles and Diamonds and Squares, Oh My! Demystifying the BPMN Standard BPMN standards can be confusing, but once you understand their purpose and how to use them, they can be lifesavers. This paper, based

More information

15 minutes is not much so I will try to give some crucial guidelines and basic knowledge.

15 minutes is not much so I will try to give some crucial guidelines and basic knowledge. 1 Presentation. Good morning ladies and gentlemen, dear colleagues. First of all I would like to thank the committee for this invitation and letting me speak about one of my favourite topics: the internet.

More information

Web Application Development Using UML

Web Application Development Using UML Web Application Development Using UML Dilip Kothamasu West Chester University West Chester, PA - 19382 dk603365@wcupa.edu Zhen Jiang Department of Computer Science Information Assurance Center West Chester

More information

BIG DATA, MAPREDUCE & HADOOP

BIG DATA, MAPREDUCE & HADOOP BIG, MAPREDUCE & HADOOP LARGE SCALE DISTRIBUTED SYSTEMS By Jean-Pierre Lozi A tutorial for the LSDS class LARGE SCALE DISTRIBUTED SYSTEMS BIG, MAPREDUCE & HADOOP 1 OBJECTIVES OF THIS LAB SESSION The LSDS

More information

United States Naval Academy Electrical and Computer Engineering Department. EC262 Exam 1

United States Naval Academy Electrical and Computer Engineering Department. EC262 Exam 1 United States Naval Academy Electrical and Computer Engineering Department EC262 Exam 29 September 2. Do a page check now. You should have pages (cover & questions). 2. Read all problems in their entirety.

More information

The Five Steps to Scaling Your Business Development

The Five Steps to Scaling Your Business Development The Five Steps to Scaling Your Business Development Using Web Services. What is an API? Biz Dev 2.0 caterina fake flickr Executive Summary Business has always been about connections. Whether it s communication

More information

Introduction to the course, Eclipse and Python

Introduction to the course, Eclipse and Python As you arrive: 1. Start up your computer and plug it in. 2. Log into Angel and go to CSSE 120. Do the Attendance Widget the PIN is on the board. 3. Go to the Course Schedule web page. Open the Slides for

More information

The power of IBM SPSS Statistics and R together

The power of IBM SPSS Statistics and R together IBM Software Business Analytics SPSS Statistics The power of IBM SPSS Statistics and R together 2 Business Analytics Contents 2 Executive summary 2 Why integrate SPSS Statistics and R? 4 Integrating R

More information

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4 Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in

More information

Joomla Admin Protection

Joomla Admin Protection Joomla Admin Protection We congratulate you on installation of our plug-in that will not only help you to protect your website but will also make your work with CMS much easier and secure. Our plug-in

More information

Introduction. It would appear that. we have reached the. limits of what it is. possible to achieve with. computer technology, although one should be

Introduction. It would appear that. we have reached the. limits of what it is. possible to achieve with. computer technology, although one should be Introduction It would appear that we have reached the limits of what it is possible to achieve with computer technology, although one should be careful with such statements, as they tend to sound pretty

More information

Aplicando enfoque MDE a aplicaciones WEB-SOA

Aplicando enfoque MDE a aplicaciones WEB-SOA Aplicando enfoque MDE a aplicaciones WEB-SOA María Consuelo Franky lfranky@javeriana.edu.co Dpto. Ingeniería de Sistemas Universidad Javeriana Bogotá - 2010 http://sophia.javeriana.edu.co/~lfranky/ 1 Temario

More information

Access NSF Frequently Asked Questions

Access NSF Frequently Asked Questions Access NSF FAQs What is Access NSF? What do I need to use Access NSF? Where can I go for help with Access NSF? What is the difference between Access NSF and RLS? Will RLS still be available? What is the

More information

Using FGAG to export ETS data for Visualization

Using FGAG to export ETS data for Visualization Using FGAG to export ETS data for Visualization Cezary Szczegielniak, Markus A. Wischy cezary.szczegielniak@tuhh.de, markus.wischy@siemens.com Siemens AG, CT SE 2, Corporate Technology, Software & Engineering

More information

Learning Links Understanding the Power of NSLDS

Learning Links Understanding the Power of NSLDS Learning Links The webinar will begin at 10:30 a.m. CDT / 11:30 a.m. ET / 8:30 a.m. PT The audio portion of our presentation will not be heard until we get started. September 21, 2011 Learning Links September

More information

Profiling and Testing with Test and Performance Tools Platform (TPTP)

Profiling and Testing with Test and Performance Tools Platform (TPTP) Profiling and Testing with Test and Performance Tools Platform (TPTP) 2009 IBM Corporation and Intel Corporation; made available under the EPL v1.0 March, 2009 Speakers Eugene Chan IBM Canada ewchan@ca.ibm.com

More information

3PlayMedia. Closed Captioning, Transcription, and Subtitling

3PlayMedia. Closed Captioning, Transcription, and Subtitling Closed Captioning, Transcription, and Subtitling 1 Introduction This guide shows you the basics of how to quickly create high quality transcripts, closed captions, translations, and interactive transcripts

More information