Formale Techniken in der Software-Entwicklung
|
|
|
- Eugenia Atkinson
- 9 years ago
- Views:
Transcription
1 Formale Techniken in der Software-Entwicklung Verfeinerungskonzepte für Zustandsdiagramme Christian Prehofer in Zusammenarbeit mit Christian Kroiß SS 2011
2 Überblick Vorlesung Block 3: Verfeinerung von Zustandsdiagrammen Motivation, Beispiel Verfeinerungskonzepte und Regeln 2 Literatur Cornel Klein, Christian Prehofer und Bernhard Rumpe, Feature Specification and Refinement with State Transition Diagrams, In: Fourth IEEE Workshop on Feature Interactions in Telecommunications Networks and Distributed Systems, IOS-Press, Christian Prehofer, Plug-and-Play Composition of Features and Feature Interactions with Statechart Diagrams, Sosym, 2004, Springer-Verlag
3 Refinement Concepts and Statecharts 3 Goal: Statecharts to describe behavior of objects Here, focus is on specification, less implementation Semantics is loose, i.e. all behavior which is compatible with the specification is permitted Behavior is modeled by traces on Input/Output Black-box view of a component Only consider stream of input and output events as behavior This is considered a trace of a system An automaton specifies many possible traces
4 Statecharts Statechart describes behavior of an object Transition by external function call or internal action called_function() [condition] / action This creates trace of input/output events Also internal and silent transitions possible
5 Example Statechart Model 5
6 Refinement on Statecharts Refinement of a statechart means to add behavior Or implementation detail 6 Refinement as system development process Start simple and add more details incrementally Semantic view on refinement Refinement can restrict behavior, but not invalidate all traces Establishes compatibility Refined statechart can be used in place of original one
7 arrived deliver() Waiting Verfeinerung Kompatibilität incoming() deliver() Plain Mail {reply_active} Reply Verfeinerung Hinzufügen von Details Weiterentwicklung /decrypt() {reply_inactive} {mail_wasencrypted()} / replycrypto() / Basic .deliver() Reply Done {else} /reply() arrived incoming() Waiting
8 8 Correct Graphical Refinement Rules 1. Addition of new states. New states may be introduced, since they are unreachable and therefore do not affect the behavior. 2. Removal of states. Likewise, states which are not reachable may be removed. 3. Refinement of states. A state may be partitioned into several ones, if all transitions leaving or ending in the state are partitioned accordingly. 4. Addition of transitions. If in a state s no transition exists for a certain input i, the behavior of the component sfor the input is completely unspecified. Therefore, an arbitrary set of transitions labeled with as source state and as input message can be added. 1. Note, that if an internal transition with the same source state exists and the precondition does not evaluate to false, the internal transition can always be taken and therefore no addition of transitions is allowed. 5. Removal of transitions. If in a state several transitions with the same input message exists, then one of them is chosen nondeterministically or some transition is taken. Therefore, these transitions may be removed, as long as there exists at least one transition labeled with this input or with 6. Removal of initial states. Initial states may be removed, as long as at least one initial state remains.
9 Feature-oriented Design with Statecharts Modularity for statechart diagrams Cross-cut complex statecharts into small parts (features) Modular composition of statecharts from features Graphical description of features Features & interactions are specified with partial statecharts Refinement rules for combining partial statechart diagrams Based on refinement concepts for statechart diagrams Interaction handlers ( adaptors ) as a glue for combining features Adaptors are represented graphically
10 Example Telecomunication: Features to be modeled 10
11 Basic Model of a Call 11
12 12 Adding new states Abandoning Phone Calls
13 13 State Refinement Subscriber / Phone Abstraction
14 Call Blockiging Features 14
15 Call blocking and Forwarding 15
16 Example: Features Features of an System (R. Hall, FIW 2000) Encryption of s Forwarding s Auto-reply Filtering of s Virus scanner... Feature Interactions Encryption and Forwarding forward only encrypted Encryption and Auto-reply Titel of sent in plain as reply
17 Feature-based Design with Statecharts Problem: Statecharts can get large and bulky Goal: Modular representation of features of a statechart Composition of statecharts from Features Object specification: statechart Feature: partial statechart Feature composition: statechart refinement Modular development of statecharts from features
18 Feature model with partial statecharts Example: 3 features which add states domaintenance() Error resume() entermaintenance() Mainten ance error() leavemaintenance() arrived deliver() Waiting incoming()
19 Classes of Features/Statecharts 1. Base features with a complete statechart includes an initial state. 2. State-oriented features with a partial statechart some states and transitions, but initial/final states not required E.g. feature MaintenanceMode with one new state Only reachable by new transitions from other features. 3. Transition-oriented features which define transitions No (persistent) state Interaction specification ( adaptors ) according to these classes Combination rules according to these classes
20 Combination of 2 Features Error error() resume() arrived deliver() Waiting incoming()
21 Composition as Semantic Refinement Use Chaos -Semantic based on external black box view Permit as many traces as possible If unspecified action occurs, anything is possible ( chaos ) Refinement shall adds specific details Reduces the number of possible traces Refinement steps for statechart diagrams Add new behavior, which was not specified before e.g. add new states and new transitions Eliminate transitions if alternatives exits Add internal or compatible behavior; do not change old behavior Need to abstract from new operations E.g. refine transition by statechart with internal transitions only Eliminate/restrict transitions for exceptional cases Conditional refinement
22 Combination of 3 Features error() Error entermaintenance() resume() entermaintenance() Mainten ance domaintenance() [ noerrors] / leavemaintenance() arrived deliver() Waiting incoming()
23 Feature Description (2) Forwarding and Auto-Reply Features Transitions with internal actions Feature Forwarding: forward() {forward_active} Forward /do_forward() {forward_inactive} Feature Reply: reply() {reply_active} Reply /do_reply() {reply_inactive}
24 Combination Rules for Features Combination by refinement of transitions Rules for adapting one feature to the other ( interaction handling ) Basic Decryption/Forwarding Refinement describes the internal behavior of a transition by a statecharts Basic Decryption: deliver() /decrypt() Plain Mail /deliver() Basic Forwarding: deliver() /forward() Fwd Mail /deliver()
25 Basic and Forwarding deliver() Transition Refinement [forward active] Forward /do_forward() [forward inactive] Fwd Mail /Basic .deliver() arrived deliver() incoming() Waiting
26 Combination of 3 Features (1) Basic , Forwarding and Decryption deliver() Forward /do_forward() Fwd Mail [forward_active] [forward_inactive] /decrypt() /Basic .deliver() Plain Mail incoming() arrived Waiting
27 Combination of 3 Features (2) Basic , Auto Reply und Decryption deliver() Plain Mail {reply_active} Reply {mail_wasencrypted()} / replycrypto() {else} /reply() /decrypt() {reply_inactive} / Basic .deliver() Reply Done arrived incoming() Waiting
28 Conclusions Cross-cutting state description diagrams Modularity concepts for statechart diagrams Supports flexible composition of features Classify different kinds of partial statechart diagrams Main benefit is graphical combination of features Compose just models of desired features Includes feature interactions Different variations or extensions of a software component are needed.
1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2
Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität
A Case Study in Using ACL2 for Feature-Oriented Verification
A Case Study in Using ACL2 for Feature-Oriented Verification Kathi Fisler and Brian Roberts WPI Computer Science Configurations of Features verify signature mailhost addressbook filter remail decrypt signing
UML-based Test Generation and Execution
UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA [email protected] ABSTRACT
Microsoft Outlook 2013
Microsoft Outlook 2013 1. Get started with Outlook 2013 Identifying new features of Outlook 2013 Connecting to email accounts Troubleshooting connection problems Connecting to Exchange accounts Connecting
User Guidance in Business Process Modelling
User Guidance in Business Process Modelling Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften vorgelegt von Diplom-Wirtschaftsinformatiker (FH) Matthias Born aus Albstadt genehmigt von
Über die Semantik von Modellierungssprachen
Über die Semantik von Modellierungssprachen und des UML-Standards Prof. Dr. Bernhard Rumpe Technische Universität Braunschweig http://www.sse.cs.tu-bs.de/ Seite 2 What is a model? And why do we need modeling
Chapter 8 Software Testing
Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Variation Management for Software Production Lines 1
Variation Management for Software Production Lines 1 Charles W. Krueger BigLever Software, Inc. 10500 Laurel Hill Cove Austin TX 78730 USA [email protected] Abstract. Variation in a software product
Advanced Topics in model-based Software Development
Advanced Topics in model-based Software Development Prof. Dr. Bernhard Rumpe Technische Universität Braunschweig http://www.sse-tubs.de/ Seite 1 Trends in software development Size and complexity of systems
RS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
Using UML Part Two Behavioral Modeling Diagrams
UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,
3.06. Understand the use of direct marketing to attract attention and to build brand
3.06 Understand the use of direct marketing to attract attention and to build brand Explain The Nature Of E-MAIL MARKETING TACTICS E-MAIL MARKETING SENDING PROMOTIONAL MESSAGES ACROSS COMPUTER NETWORKS
User Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS
MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS Lasted Edited: 2012-07-10 1 Send E-mail... 3 Create a new message... 3 Change the signature in the e-mail body,... 4 Change the sending out e-mail account...
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
Mailbox control panel. User guide
Mailbox control panel User guide Close this window Mailbox control panel user guide Mailbox control panels enable you to configure your settings for a specific mailbox with ease, with features ranging
The Electronic Stamp Mail Server and Client Project Part 3: Software Design Specifications. SDS Final November 3, 2003
The Electronic Stamp Mail Server and Client Project Part 3: Software Design Specifications by SDS Final November 3, 2003 1 This Software Design Specification was prepared and provided as a deliverable
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
SL1100 InMail Quick Reference Sheet for Multiline Display Telephone
SL1100 InMail Quick Reference Sheet for Multiline Display Telephone SL1100 InMail Quick Reference Sheet for Multiline Display Telephone Using Dial Pad Dial the voice mail pilot number Enter your mailbox
Configuring Mozilla Thunderbird to Access Your SAS Email Account
Configuring Mozilla Thunderbird to Access Your SAS Email Account 1. When you launch Thunderbird for the first time, the Import Wizard will appear: If Thunderbird detects that another email program was
Using Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
PL/SQL Overview. Basic Structure and Syntax of PL/SQL
PL/SQL Overview PL/SQL is Procedural Language extension to SQL. It is loosely based on Ada (a variant of Pascal developed for the US Dept of Defense). PL/SQL was first released in ١٩٩٢ as an optional extension
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Towards an Integration of Process Modeling and Project Planning
Towards an Integration of Process Modeling and Project Planning Michael Gnatz, Martin Deubler, Michael Meisinger Technische Universität München Institut für Informatik Boltzmannstr. 3, 85748 Garching (gnatzm
Test Design Strategies
Test Design Strategies Louise Tamres, CSQE ASQ Software Division Webinar 18 July 2008 1 Objectives Translate requirements into test cases Improve communication by producing models Identify incomplete requirements
Microsoft Outlook 2013 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2013 Part 1: Introduction to Outlook Fall 2014, Version 1.0 Table of Contents Introduction...3 Starting Outlook...3
Modeling Stochastic Inventory Policy with Simulation
Modeling Stochastic Inventory Policy with Simulation 1 Modeling Stochastic Inventory Policy with Simulation János BENKŐ Department of Material Handling and Logistics, Institute of Engineering Management
Modelling and Verification of Business Processes
Modelling and Verification of Business Processes Costin Bădică Department of Computer Science King s College London, WC2R 2LS, UK [email protected] Chris Fox Department of Computer Science University
Document Management Solutions
Document Management Solutions Label Printing Software LabelsAnywhere.com is Colorflex s cost-effective, web based, demand print solution. Print high quality labels from anywhere and at anytime with a simple
Automated Program Behavior Analysis
Automated Program Behavior Analysis Stacy Prowell [email protected] March 2005 SQRL / SEI Motivation: Semantics Development: Most engineering designs are subjected to extensive analysis; software is
Variability in Service-Oriented Systems: An Analysis of Existing Approaches
Variability in -Oriented Systems: An Analysis of Existing Approaches Holger Eichelberger and Christian Kröher and Klaus Schmid 1 Software Systems Engineering, Institute of Computer Science, University
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
Getting Started with University Gmail
Getting Started with University Gmail USER GUIDE V1.0 User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission
Architecture. Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/
Architecture Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/ Some slides were adapted from L. Osterweil, B. Meyer, and P. Müller material Reda Bendraou LI386-S1
Secure Email A Guide for Users
Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT
25.1 Translational Frameworks (MDA with transformations)
Literature TU Dresden Fakultät für Informatik Institut für Software- und Multimediatechnik 25. From Code Frameworks to Model-Driven Architecture (MDA) and Component-Based Software Development (CBSD) Prof.
Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology
Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 [email protected],
µfup: A Software Development Process for Embedded Systems
µfup: A Software Development Process for Embedded Systems Leif Geiger, Jörg Siedhof, Albert Zündorf University of Kassel, Software Engineering Research Group, Department of Computer Science and Electrical
The Entity-Relationship Model
The Entity-Relationship Model 221 After completing this chapter, you should be able to explain the three phases of database design, Why are multiple phases useful? evaluate the significance of the Entity-Relationship
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
Enhancing ECA Rules for Distributed Active Database Systems
Enhancing ECA Rules for Distributed Active Database Systems 2 Thomas Heimrich 1 and Günther Specht 2 1 TU-Ilmenau, FG Datenbanken und Informationssysteme, 98684 Ilmenau Universität Ulm, Abteilung Datenbanken
Menouer Boubekeur, Gregory Provan
Software Requirements Menouer Boubekeur, Gregory Provan Lectures Introduction to UML Introduction to Requirements Analysis Advanced techniques for Requirement Analysis M. Boubekeur, CSL, University College
Release Notes for Cisco IronPort Email Security Plug-in 7.3.1
Release Notes for Cisco IronPort Email Security Plug-in 7.3.1 Revised: September 18, 2013 Contents These release notes contain information critical to installing and running the Cisco IronPort Email Security
Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net
Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Peigen Li, Ke Shi, Jie Zhang Intelligent Manufacturing Lab School of Mechanical Science and Engineering Huazhong University of Science
CHAPTER 20 TESING WEB APPLICATIONS. Overview
CHAPTER 20 TESING WEB APPLICATIONS Overview The chapter describes the Web testing. Web testing is a collection of activities whose purpose is to uncover errors in WebApp content, function, usability, navigability,
Housekeeping & Maintenance Work Orders
Property Management System Functional Specification Housekeeping & Maintenance Work Orders Subject: Author(s): Status: Last Updated: Maintenance Work Orders - Crete Jeff Stivers Complete 5/1/2001 12:00
i. Node Y Represented by a block or part. SysML::Block,
OMG SysML Requirements Traceability (informative) This document has been published as OMG document ptc/07-03-09 so it can be referenced by Annex E of the OMG SysML specification. This document describes
Veri cation and Validation of Simulation Models
of of Simulation Models mpressive slide presentations Faculty of Math and CS - UBB 1st Semester 2010-2011 Other mportant Validate nput- Hypothesis Type Error Con dence nterval Using Historical nput of
The SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
Email -- Reading and Printing Email
Email -- Reading and Printing Email Checking for New Email By default, webmail checks for new email automatically. If you want to manually check for new email, click the Check Email button. Or, click the
Tool Support for Software Variability Management and Product Derivation in Software Product Lines
Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,
Digital Cable TV. User Guide
Digital Cable TV User Guide T a b l e o f C o n T e n T s DVR and Set-Top Box Basics............... 2 Remote Playback Controls................ 4 What s on TV.......................... 6 Using the OK Button..................
Service based Software Specification
Service based Software Specification Christian Salzmann 1, Bernhard Schätz [salzmann schaetz]@in.tum.de Software & Systems Engineering Technische Universität München Arcisstrasse 21 80290 München, Germany
Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions
Announcements SE 1: Software Requirements Specification and Analysis Lecture 4: Basic Notations Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 Send your group
Official Email List Procedure
Approval Date: May 24, 2013 Parent Policy: Information Technology Use and Management Policy Official Email List Procedure Office of Administrative Responsibility: Approver: Scope: President (Information
Getting Started 2. How to Use Voice Mail 4
Getting Started 2 How to Use Voice Mail 4 Voice Mail Messages 4 Retrieving Voice Mail Messages 4 Reply to a Voice Mail Message 5 Listening Options 5 Forward a Voice Mail Message 6 Record and Send a Voice
HTTPS Traffic Classification
HTTPS Traffic Classification Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment Jérôme François Inria Nancy Grand Est, France [email protected] NMLRG - IETF95 April 7th, 2016
Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow
Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces
The Software Development Process
Systeme hoher Qualität und Sicherheit Universität Bremen WS 2015/2016 Lecture 03 (26.10.2015) The Software Development Process Christoph Lüth Jan Peleska Dieter Hutter Your Daily Menu Models of software
Email management with Policy Patrol
Policy Patrol 10 Technical Documentation October 28, 2014 Policy Patrol includes many email management features, including customized auto replies, automated follow-up, auto forwarding/copying and list
How To Design Software
The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time The design process and design methods Design strategies
Semantic Web. Semantic Web: Resource Description Framework (RDF) cont. Resource Description Framework (RDF) W3C Definition:
Semantic Web: The Semantic Web is an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. Tim Berners-Lee, James
Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox
Chapter 4 Getting the Data
Chapter 4 Getting the Data prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data Mining Part II:
EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements
2009 IEEE/ACM International Conference on Automated Software Engineering EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements Alberto Sardinha, Ruzanna Chitchyan, Nathan Weston, Phil
Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE
Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Thomas Eichelmann 1, 2, Woldemar Fuhrmann 3, Ulrich Trick 1, Bogdan Ghita 2 1 Research Group for Telecommunication Networks,
Business Analyst Interview Questions And Answers
Business Analyst Interview Questions And Answers What Does A Business Analyst Do 2013 All Rights Reserved http://www.whatdoesabusinessanalystdo.com (1) Question: Tell me the importance of a flow chart?
An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications
An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications Germán Harvey Alférez Salinas Department of Computer Information Systems, Mission College,
Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header
Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox
Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500
Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...
Improving the Quality of Requirements with Scenarios
Improving the Quality of Requirements with Scenarios Martin Glinz Summary The classical notion of requirements quality is problematic in practice. Hence the importance of some qualities, in particular
Formal Verification Toolkit for Requirements and Early Design Stages
Formal Verification Toolkit for Requirements and Early Design Stages Julia M. Badger 1 and Sheena Judson Miller 2 1 NASA Johnson Space Center, Houston, TX 77058, USA 2 Barrios Technology, Houston, TX 77058,
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
Corporate Office DX. Supervisor s User Guide
Corporate Office DX Supervisor s User Guide Comdial strives to design the features in our communications systems to be fully interactive with one another. However, this is not always possible, as the combinations
Applying SOA to OSS. for Telecommunications. IBM Software Group
IBM Software Group Applying SOA to OSS for Telecommunications Kevin Twardus Manager of Industry Architecture and Standards IBM Software Group Communications Sector IBM Corporation The Details of SOA depends
Stewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
Evaluation paradigm selection according to Common Criteria for an incremental product development
Evaluation paradigm selection according to Common Criteria for an incremental product development Andreas Daniel Sinnhofer [email protected] Wolfgang Raschke [email protected] Christian Kreiner
Advanced Testing Techniques
9 March, 2010 ISSN 1866-5705 www.testingexperience.com free digital version print version 8,00 printed in Germany Advanced Testing Techniques Conferences Special istockphoto.com/nwphotoguy istockphoto.com/esemelwe
Creating a New Search
Getting Started The information search feature in AVImark allows the user to create and save queries to find specific information in the program. The Information Search in version 2010.4 and later now
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
Secure Email Information for Sending and Receiving for both DIDD Staff and Providers or Other Outside entities.
Secure Email Information for Sending and Receiving for both DIDD Staff and Providers or Other Outside entities. Secure Email Overview... 2 Secure Email Tracking Possibilities... 2 DIDD sending a Secure
Microsoft Outlook 2010 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2010 Part 1: Introduction to Outlook Spring 2015, Version 1.4 Table of Contents Introduction...3 Starting Outlook...3
Consistency of Business Process Models and Object Life Cycles
Consistency of Business Process Models and bject Life Cycles Ksenia Ryndina 1,2,JochenM.Küster 1, and Harald Gall 2 1 IBM Zurich Research Laboratory, Säumerstr. 4 8803 Rüschlikon, Switzerland {ryn,jku}@zurich.ibm.com
Empowered by Innovation. User s Guide. P/N 1770082 July 2006 Printed in U.S.A.
Empowered by Innovation User s Guide P/N 1770082 July 2006 Printed in U.S.A. This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers and service personnel,
