Formale Techniken in der Software-Entwicklung

Size: px
Start display at page:

Download "Formale Techniken in der Software-Entwicklung"

Transcription

1 Formale Techniken in der Software-Entwicklung Verfeinerungskonzepte für Zustandsdiagramme Christian Prehofer in Zusammenarbeit mit Christian Kroiß SS 2011

2 Überblick Vorlesung Block 3: Verfeinerung von Zustandsdiagrammen Motivation, Beispiel Verfeinerungskonzepte und Regeln 2 Literatur Cornel Klein, Christian Prehofer und Bernhard Rumpe, Feature Specification and Refinement with State Transition Diagrams, In: Fourth IEEE Workshop on Feature Interactions in Telecommunications Networks and Distributed Systems, IOS-Press, Christian Prehofer, Plug-and-Play Composition of Features and Feature Interactions with Statechart Diagrams, Sosym, 2004, Springer-Verlag

3 Refinement Concepts and Statecharts 3 Goal: Statecharts to describe behavior of objects Here, focus is on specification, less implementation Semantics is loose, i.e. all behavior which is compatible with the specification is permitted Behavior is modeled by traces on Input/Output Black-box view of a component Only consider stream of input and output events as behavior This is considered a trace of a system An automaton specifies many possible traces

4 Statecharts Statechart describes behavior of an object Transition by external function call or internal action called_function() [condition] / action This creates trace of input/output events Also internal and silent transitions possible

5 Example Statechart Model 5

6 Refinement on Statecharts Refinement of a statechart means to add behavior Or implementation detail 6 Refinement as system development process Start simple and add more details incrementally Semantic view on refinement Refinement can restrict behavior, but not invalidate all traces Establishes compatibility Refined statechart can be used in place of original one

7 arrived deliver() Waiting Verfeinerung Kompatibilität incoming() deliver() Plain Mail {reply_active} Reply Verfeinerung Hinzufügen von Details Weiterentwicklung /decrypt() {reply_inactive} {mail_wasencrypted()} / replycrypto() / Basic .deliver() Reply Done {else} /reply() arrived incoming() Waiting

8 8 Correct Graphical Refinement Rules 1. Addition of new states. New states may be introduced, since they are unreachable and therefore do not affect the behavior. 2. Removal of states. Likewise, states which are not reachable may be removed. 3. Refinement of states. A state may be partitioned into several ones, if all transitions leaving or ending in the state are partitioned accordingly. 4. Addition of transitions. If in a state s no transition exists for a certain input i, the behavior of the component sfor the input is completely unspecified. Therefore, an arbitrary set of transitions labeled with as source state and as input message can be added. 1. Note, that if an internal transition with the same source state exists and the precondition does not evaluate to false, the internal transition can always be taken and therefore no addition of transitions is allowed. 5. Removal of transitions. If in a state several transitions with the same input message exists, then one of them is chosen nondeterministically or some transition is taken. Therefore, these transitions may be removed, as long as there exists at least one transition labeled with this input or with 6. Removal of initial states. Initial states may be removed, as long as at least one initial state remains.

9 Feature-oriented Design with Statecharts Modularity for statechart diagrams Cross-cut complex statecharts into small parts (features) Modular composition of statecharts from features Graphical description of features Features & interactions are specified with partial statecharts Refinement rules for combining partial statechart diagrams Based on refinement concepts for statechart diagrams Interaction handlers ( adaptors ) as a glue for combining features Adaptors are represented graphically

10 Example Telecomunication: Features to be modeled 10

11 Basic Model of a Call 11

12 12 Adding new states Abandoning Phone Calls

13 13 State Refinement Subscriber / Phone Abstraction

14 Call Blockiging Features 14

15 Call blocking and Forwarding 15

16 Example: Features Features of an System (R. Hall, FIW 2000) Encryption of s Forwarding s Auto-reply Filtering of s Virus scanner... Feature Interactions Encryption and Forwarding forward only encrypted Encryption and Auto-reply Titel of sent in plain as reply

17 Feature-based Design with Statecharts Problem: Statecharts can get large and bulky Goal: Modular representation of features of a statechart Composition of statecharts from Features Object specification: statechart Feature: partial statechart Feature composition: statechart refinement Modular development of statecharts from features

18 Feature model with partial statecharts Example: 3 features which add states domaintenance() Error resume() entermaintenance() Mainten ance error() leavemaintenance() arrived deliver() Waiting incoming()

19 Classes of Features/Statecharts 1. Base features with a complete statechart includes an initial state. 2. State-oriented features with a partial statechart some states and transitions, but initial/final states not required E.g. feature MaintenanceMode with one new state Only reachable by new transitions from other features. 3. Transition-oriented features which define transitions No (persistent) state Interaction specification ( adaptors ) according to these classes Combination rules according to these classes

20 Combination of 2 Features Error error() resume() arrived deliver() Waiting incoming()

21 Composition as Semantic Refinement Use Chaos -Semantic based on external black box view Permit as many traces as possible If unspecified action occurs, anything is possible ( chaos ) Refinement shall adds specific details Reduces the number of possible traces Refinement steps for statechart diagrams Add new behavior, which was not specified before e.g. add new states and new transitions Eliminate transitions if alternatives exits Add internal or compatible behavior; do not change old behavior Need to abstract from new operations E.g. refine transition by statechart with internal transitions only Eliminate/restrict transitions for exceptional cases Conditional refinement

22 Combination of 3 Features error() Error entermaintenance() resume() entermaintenance() Mainten ance domaintenance() [ noerrors] / leavemaintenance() arrived deliver() Waiting incoming()

23 Feature Description (2) Forwarding and Auto-Reply Features Transitions with internal actions Feature Forwarding: forward() {forward_active} Forward /do_forward() {forward_inactive} Feature Reply: reply() {reply_active} Reply /do_reply() {reply_inactive}

24 Combination Rules for Features Combination by refinement of transitions Rules for adapting one feature to the other ( interaction handling ) Basic Decryption/Forwarding Refinement describes the internal behavior of a transition by a statecharts Basic Decryption: deliver() /decrypt() Plain Mail /deliver() Basic Forwarding: deliver() /forward() Fwd Mail /deliver()

25 Basic and Forwarding deliver() Transition Refinement [forward active] Forward /do_forward() [forward inactive] Fwd Mail /Basic .deliver() arrived deliver() incoming() Waiting

26 Combination of 3 Features (1) Basic , Forwarding and Decryption deliver() Forward /do_forward() Fwd Mail [forward_active] [forward_inactive] /decrypt() /Basic .deliver() Plain Mail incoming() arrived Waiting

27 Combination of 3 Features (2) Basic , Auto Reply und Decryption deliver() Plain Mail {reply_active} Reply {mail_wasencrypted()} / replycrypto() {else} /reply() /decrypt() {reply_inactive} / Basic .deliver() Reply Done arrived incoming() Waiting

28 Conclusions Cross-cutting state description diagrams Modularity concepts for statechart diagrams Supports flexible composition of features Classify different kinds of partial statechart diagrams Main benefit is graphical combination of features Compose just models of desired features Includes feature interactions Different variations or extensions of a software component are needed.

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2 Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität

More information

A Case Study in Using ACL2 for Feature-Oriented Verification

A Case Study in Using ACL2 for Feature-Oriented Verification A Case Study in Using ACL2 for Feature-Oriented Verification Kathi Fisler and Brian Roberts WPI Computer Science Configurations of Features verify signature mailhost addressbook filter remail decrypt signing

More information

UML-based Test Generation and Execution

UML-based Test Generation and Execution UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA [email protected] ABSTRACT

More information

Microsoft Outlook 2013

Microsoft Outlook 2013 Microsoft Outlook 2013 1. Get started with Outlook 2013 Identifying new features of Outlook 2013 Connecting to email accounts Troubleshooting connection problems Connecting to Exchange accounts Connecting

More information

User Guidance in Business Process Modelling

User Guidance in Business Process Modelling User Guidance in Business Process Modelling Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften vorgelegt von Diplom-Wirtschaftsinformatiker (FH) Matthias Born aus Albstadt genehmigt von

More information

Über die Semantik von Modellierungssprachen

Über die Semantik von Modellierungssprachen Über die Semantik von Modellierungssprachen und des UML-Standards Prof. Dr. Bernhard Rumpe Technische Universität Braunschweig http://www.sse.cs.tu-bs.de/ Seite 2 What is a model? And why do we need modeling

More information

Chapter 8 Software Testing

Chapter 8 Software Testing Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Variation Management for Software Production Lines 1

Variation Management for Software Production Lines 1 Variation Management for Software Production Lines 1 Charles W. Krueger BigLever Software, Inc. 10500 Laurel Hill Cove Austin TX 78730 USA [email protected] Abstract. Variation in a software product

More information

Advanced Topics in model-based Software Development

Advanced Topics in model-based Software Development Advanced Topics in model-based Software Development Prof. Dr. Bernhard Rumpe Technische Universität Braunschweig http://www.sse-tubs.de/ Seite 1 Trends in software development Size and complexity of systems

More information

RS MDM. Integration Guide. Riversand

RS MDM. Integration Guide. Riversand RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.

More information

Using UML Part Two Behavioral Modeling Diagrams

Using UML Part Two Behavioral Modeling Diagrams UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,

More information

3.06. Understand the use of direct marketing to attract attention and to build brand

3.06. Understand the use of direct marketing to attract attention and to build brand 3.06 Understand the use of direct marketing to attract attention and to build brand Explain The Nature Of E-MAIL MARKETING TACTICS E-MAIL MARKETING SENDING PROMOTIONAL MESSAGES ACROSS COMPUTER NETWORKS

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS

MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS Lasted Edited: 2012-07-10 1 Send E-mail... 3 Create a new message... 3 Change the signature in the e-mail body,... 4 Change the sending out e-mail account...

More information

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris

More information

Mailbox control panel. User guide

Mailbox control panel. User guide Mailbox control panel User guide Close this window Mailbox control panel user guide Mailbox control panels enable you to configure your settings for a specific mailbox with ease, with features ranging

More information

The Electronic Stamp Mail Server and Client Project Part 3: Software Design Specifications. SDS Final November 3, 2003

The Electronic Stamp Mail Server and Client Project Part 3: Software Design Specifications. SDS Final November 3, 2003 The Electronic Stamp Mail Server and Client Project Part 3: Software Design Specifications by SDS Final November 3, 2003 1 This Software Design Specification was prepared and provided as a deliverable

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

SL1100 InMail Quick Reference Sheet for Multiline Display Telephone

SL1100 InMail Quick Reference Sheet for Multiline Display Telephone SL1100 InMail Quick Reference Sheet for Multiline Display Telephone SL1100 InMail Quick Reference Sheet for Multiline Display Telephone Using Dial Pad Dial the voice mail pilot number Enter your mailbox

More information

Configuring Mozilla Thunderbird to Access Your SAS Email Account

Configuring Mozilla Thunderbird to Access Your SAS Email Account Configuring Mozilla Thunderbird to Access Your SAS Email Account 1. When you launch Thunderbird for the first time, the Import Wizard will appear: If Thunderbird detects that another email program was

More information

Using Voltage SecureMail

Using Voltage SecureMail Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.

More information

PL/SQL Overview. Basic Structure and Syntax of PL/SQL

PL/SQL Overview. Basic Structure and Syntax of PL/SQL PL/SQL Overview PL/SQL is Procedural Language extension to SQL. It is loosely based on Ada (a variant of Pascal developed for the US Dept of Defense). PL/SQL was first released in ١٩٩٢ as an optional extension

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Towards an Integration of Process Modeling and Project Planning

Towards an Integration of Process Modeling and Project Planning Towards an Integration of Process Modeling and Project Planning Michael Gnatz, Martin Deubler, Michael Meisinger Technische Universität München Institut für Informatik Boltzmannstr. 3, 85748 Garching (gnatzm

More information

Test Design Strategies

Test Design Strategies Test Design Strategies Louise Tamres, CSQE ASQ Software Division Webinar 18 July 2008 1 Objectives Translate requirements into test cases Improve communication by producing models Identify incomplete requirements

More information

Microsoft Outlook 2013 Part 1: Introduction to Outlook

Microsoft Outlook 2013 Part 1: Introduction to Outlook CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2013 Part 1: Introduction to Outlook Fall 2014, Version 1.0 Table of Contents Introduction...3 Starting Outlook...3

More information

Modeling Stochastic Inventory Policy with Simulation

Modeling Stochastic Inventory Policy with Simulation Modeling Stochastic Inventory Policy with Simulation 1 Modeling Stochastic Inventory Policy with Simulation János BENKŐ Department of Material Handling and Logistics, Institute of Engineering Management

More information

Modelling and Verification of Business Processes

Modelling and Verification of Business Processes Modelling and Verification of Business Processes Costin Bădică Department of Computer Science King s College London, WC2R 2LS, UK [email protected] Chris Fox Department of Computer Science University

More information

Document Management Solutions

Document Management Solutions Document Management Solutions Label Printing Software LabelsAnywhere.com is Colorflex s cost-effective, web based, demand print solution. Print high quality labels from anywhere and at anytime with a simple

More information

Automated Program Behavior Analysis

Automated Program Behavior Analysis Automated Program Behavior Analysis Stacy Prowell [email protected] March 2005 SQRL / SEI Motivation: Semantics Development: Most engineering designs are subjected to extensive analysis; software is

More information

Variability in Service-Oriented Systems: An Analysis of Existing Approaches

Variability in Service-Oriented Systems: An Analysis of Existing Approaches Variability in -Oriented Systems: An Analysis of Existing Approaches Holger Eichelberger and Christian Kröher and Klaus Schmid 1 Software Systems Engineering, Institute of Computer Science, University

More information

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

Getting Started with University Gmail

Getting Started with University Gmail Getting Started with University Gmail USER GUIDE V1.0 User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission

More information

Architecture. Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/

Architecture. Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/ Architecture Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/ Some slides were adapted from L. Osterweil, B. Meyer, and P. Müller material Reda Bendraou LI386-S1

More information

Secure Email A Guide for Users

Secure Email A Guide for Users Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT

More information

25.1 Translational Frameworks (MDA with transformations)

25.1 Translational Frameworks (MDA with transformations) Literature TU Dresden Fakultät für Informatik Institut für Software- und Multimediatechnik 25. From Code Frameworks to Model-Driven Architecture (MDA) and Component-Based Software Development (CBSD) Prof.

More information

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 [email protected],

More information

µfup: A Software Development Process for Embedded Systems

µfup: A Software Development Process for Embedded Systems µfup: A Software Development Process for Embedded Systems Leif Geiger, Jörg Siedhof, Albert Zündorf University of Kassel, Software Engineering Research Group, Department of Computer Science and Electrical

More information

The Entity-Relationship Model

The Entity-Relationship Model The Entity-Relationship Model 221 After completing this chapter, you should be able to explain the three phases of database design, Why are multiple phases useful? evaluate the significance of the Entity-Relationship

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Enhancing ECA Rules for Distributed Active Database Systems

Enhancing ECA Rules for Distributed Active Database Systems Enhancing ECA Rules for Distributed Active Database Systems 2 Thomas Heimrich 1 and Günther Specht 2 1 TU-Ilmenau, FG Datenbanken und Informationssysteme, 98684 Ilmenau Universität Ulm, Abteilung Datenbanken

More information

Menouer Boubekeur, Gregory Provan

Menouer Boubekeur, Gregory Provan Software Requirements Menouer Boubekeur, Gregory Provan Lectures Introduction to UML Introduction to Requirements Analysis Advanced techniques for Requirement Analysis M. Boubekeur, CSL, University College

More information

Release Notes for Cisco IronPort Email Security Plug-in 7.3.1

Release Notes for Cisco IronPort Email Security Plug-in 7.3.1 Release Notes for Cisco IronPort Email Security Plug-in 7.3.1 Revised: September 18, 2013 Contents These release notes contain information critical to installing and running the Cisco IronPort Email Security

More information

Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net

Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Peigen Li, Ke Shi, Jie Zhang Intelligent Manufacturing Lab School of Mechanical Science and Engineering Huazhong University of Science

More information

CHAPTER 20 TESING WEB APPLICATIONS. Overview

CHAPTER 20 TESING WEB APPLICATIONS. Overview CHAPTER 20 TESING WEB APPLICATIONS Overview The chapter describes the Web testing. Web testing is a collection of activities whose purpose is to uncover errors in WebApp content, function, usability, navigability,

More information

Housekeeping & Maintenance Work Orders

Housekeeping & Maintenance Work Orders Property Management System Functional Specification Housekeeping & Maintenance Work Orders Subject: Author(s): Status: Last Updated: Maintenance Work Orders - Crete Jeff Stivers Complete 5/1/2001 12:00

More information

i. Node Y Represented by a block or part. SysML::Block,

i. Node Y Represented by a block or part. SysML::Block, OMG SysML Requirements Traceability (informative) This document has been published as OMG document ptc/07-03-09 so it can be referenced by Annex E of the OMG SysML specification. This document describes

More information

Veri cation and Validation of Simulation Models

Veri cation and Validation of Simulation Models of of Simulation Models mpressive slide presentations Faculty of Math and CS - UBB 1st Semester 2010-2011 Other mportant Validate nput- Hypothesis Type Error Con dence nterval Using Historical nput of

More information

The SPES Methodology Modeling- and Analysis Techniques

The SPES Methodology Modeling- and Analysis Techniques The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT

More information

Email -- Reading and Printing Email

Email -- Reading and Printing Email Email -- Reading and Printing Email Checking for New Email By default, webmail checks for new email automatically. If you want to manually check for new email, click the Check Email button. Or, click the

More information

Tool Support for Software Variability Management and Product Derivation in Software Product Lines

Tool Support for Software Variability Management and Product Derivation in Software Product Lines Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,

More information

Digital Cable TV. User Guide

Digital Cable TV. User Guide Digital Cable TV User Guide T a b l e o f C o n T e n T s DVR and Set-Top Box Basics............... 2 Remote Playback Controls................ 4 What s on TV.......................... 6 Using the OK Button..................

More information

Service based Software Specification

Service based Software Specification Service based Software Specification Christian Salzmann 1, Bernhard Schätz [salzmann schaetz]@in.tum.de Software & Systems Engineering Technische Universität München Arcisstrasse 21 80290 München, Germany

More information

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions Announcements SE 1: Software Requirements Specification and Analysis Lecture 4: Basic Notations Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 Send your group

More information

Official Email List Procedure

Official Email List Procedure Approval Date: May 24, 2013 Parent Policy: Information Technology Use and Management Policy Official Email List Procedure Office of Administrative Responsibility: Approver: Scope: President (Information

More information

Getting Started 2. How to Use Voice Mail 4

Getting Started 2. How to Use Voice Mail 4 Getting Started 2 How to Use Voice Mail 4 Voice Mail Messages 4 Retrieving Voice Mail Messages 4 Reply to a Voice Mail Message 5 Listening Options 5 Forward a Voice Mail Message 6 Record and Send a Voice

More information

HTTPS Traffic Classification

HTTPS Traffic Classification HTTPS Traffic Classification Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment Jérôme François Inria Nancy Grand Est, France [email protected] NMLRG - IETF95 April 7th, 2016

More information

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces

More information

The Software Development Process

The Software Development Process Systeme hoher Qualität und Sicherheit Universität Bremen WS 2015/2016 Lecture 03 (26.10.2015) The Software Development Process Christoph Lüth Jan Peleska Dieter Hutter Your Daily Menu Models of software

More information

Email management with Policy Patrol

Email management with Policy Patrol Policy Patrol 10 Technical Documentation October 28, 2014 Policy Patrol includes many email management features, including customized auto replies, automated follow-up, auto forwarding/copying and list

More information

How To Design Software

How To Design Software The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time The design process and design methods Design strategies

More information

Semantic Web. Semantic Web: Resource Description Framework (RDF) cont. Resource Description Framework (RDF) W3C Definition:

Semantic Web. Semantic Web: Resource Description Framework (RDF) cont. Resource Description Framework (RDF) W3C Definition: Semantic Web: The Semantic Web is an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. Tim Berners-Lee, James

More information

Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header. Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox

More information

Chapter 4 Getting the Data

Chapter 4 Getting the Data Chapter 4 Getting the Data prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data Mining Part II:

More information

EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements

EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements 2009 IEEE/ACM International Conference on Automated Software Engineering EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements Alberto Sardinha, Ruzanna Chitchyan, Nathan Weston, Phil

More information

Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE

Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Thomas Eichelmann 1, 2, Woldemar Fuhrmann 3, Ulrich Trick 1, Bogdan Ghita 2 1 Research Group for Telecommunication Networks,

More information

Business Analyst Interview Questions And Answers

Business Analyst Interview Questions And Answers Business Analyst Interview Questions And Answers What Does A Business Analyst Do 2013 All Rights Reserved http://www.whatdoesabusinessanalystdo.com (1) Question: Tell me the importance of a flow chart?

More information

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications Germán Harvey Alférez Salinas Department of Computer Information Systems, Mission College,

More information

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox

More information

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500 Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...

More information

Improving the Quality of Requirements with Scenarios

Improving the Quality of Requirements with Scenarios Improving the Quality of Requirements with Scenarios Martin Glinz Summary The classical notion of requirements quality is problematic in practice. Hence the importance of some qualities, in particular

More information

Formal Verification Toolkit for Requirements and Early Design Stages

Formal Verification Toolkit for Requirements and Early Design Stages Formal Verification Toolkit for Requirements and Early Design Stages Julia M. Badger 1 and Sheena Judson Miller 2 1 NASA Johnson Space Center, Houston, TX 77058, USA 2 Barrios Technology, Houston, TX 77058,

More information

Formal Verification by Model Checking

Formal Verification by Model Checking Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking

More information

Corporate Office DX. Supervisor s User Guide

Corporate Office DX. Supervisor s User Guide Corporate Office DX Supervisor s User Guide Comdial strives to design the features in our communications systems to be fully interactive with one another. However, this is not always possible, as the combinations

More information

Applying SOA to OSS. for Telecommunications. IBM Software Group

Applying SOA to OSS. for Telecommunications. IBM Software Group IBM Software Group Applying SOA to OSS for Telecommunications Kevin Twardus Manager of Industry Architecture and Standards IBM Software Group Communications Sector IBM Corporation The Details of SOA depends

More information

Stewart Secure Email User Guide. March 13, 2015

Stewart Secure Email User Guide. March 13, 2015 Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...

More information

Evaluation paradigm selection according to Common Criteria for an incremental product development

Evaluation paradigm selection according to Common Criteria for an incremental product development Evaluation paradigm selection according to Common Criteria for an incremental product development Andreas Daniel Sinnhofer [email protected] Wolfgang Raschke [email protected] Christian Kreiner

More information

Advanced Testing Techniques

Advanced Testing Techniques 9 March, 2010 ISSN 1866-5705 www.testingexperience.com free digital version print version 8,00 printed in Germany Advanced Testing Techniques Conferences Special istockphoto.com/nwphotoguy istockphoto.com/esemelwe

More information

Creating a New Search

Creating a New Search Getting Started The information search feature in AVImark allows the user to create and save queries to find specific information in the program. The Information Search in version 2010.4 and later now

More information

Software Modeling and Verification

Software Modeling and Verification Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system

More information

Secure Email Information for Sending and Receiving for both DIDD Staff and Providers or Other Outside entities.

Secure Email Information for Sending and Receiving for both DIDD Staff and Providers or Other Outside entities. Secure Email Information for Sending and Receiving for both DIDD Staff and Providers or Other Outside entities. Secure Email Overview... 2 Secure Email Tracking Possibilities... 2 DIDD sending a Secure

More information

Microsoft Outlook 2010 Part 1: Introduction to Outlook

Microsoft Outlook 2010 Part 1: Introduction to Outlook CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2010 Part 1: Introduction to Outlook Spring 2015, Version 1.4 Table of Contents Introduction...3 Starting Outlook...3

More information

Consistency of Business Process Models and Object Life Cycles

Consistency of Business Process Models and Object Life Cycles Consistency of Business Process Models and bject Life Cycles Ksenia Ryndina 1,2,JochenM.Küster 1, and Harald Gall 2 1 IBM Zurich Research Laboratory, Säumerstr. 4 8803 Rüschlikon, Switzerland {ryn,jku}@zurich.ibm.com

More information

Empowered by Innovation. User s Guide. P/N 1770082 July 2006 Printed in U.S.A.

Empowered by Innovation. User s Guide. P/N 1770082 July 2006 Printed in U.S.A. Empowered by Innovation User s Guide P/N 1770082 July 2006 Printed in U.S.A. This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers and service personnel,

More information