Seminar: So#ware Engineering of Embedded Systems

Size: px
Start display at page:

Download "Seminar: So#ware Engineering of Embedded Systems"

Transcription

1 Seminar: So#ware Engineering of Embedded Systems - Quality Assurance of Embedded Systems - Prof. Dr. Sabine Glesner Paula Herber, Nils Jähnig, Lydia Ma7ck, Marcus Mikulcak, Sebas;an Schlesinger Summer term 2014

2 (1) compact course: from 10:00 17:00 in MAR from 10:00 17:00 in MAR appointments with your advisors upon prior arrangement three mee;ngs (at least): 1. preliminary discussion (next week) 2. general concept and structure 3. discussion of the oral presenta;on(at least one week before the compact course) Arrange appointments with your advisiors using ! 2

3 (2) slides due to: to your advisor and berlin.de slides will be uploaded for all par;cipants wriwen presenta;on: a laptop will be provided for all presenta;ons supported formats: PDF, PPT, PPTX this slide set will be uploaded today 3

4 Criteria for Passing the Course talk: min + 10 min discussion wriwen presenta;on: 6 to 10 pages compulsory awendance for all appointments (this includes the whole compact course) 4

5 Seminar - Topics 1. Trace- Based Seman@cs and Refinements à Nils 2. Quality Assurance à Paula, Lydia 3. Correct Model Transforma@ons and MatLab Simulink Seman@cs à Sebas;an 4. Security and Maintainability of Matlab Simulink Models à Marcus 5

6 Trace- Based and Refinements Nils Jähnig berlin.de 6

7 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 7

8 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 8

9 Trace- Based So#ware Engineering and Refinements Where do the traces for the implementation come from? Trace-Based Semantics 9

10 Trace- Based So#ware Engineering and Refinements Topic 1: Trace-Based Coinductive Operational Semantics for While Infinite Traces 4 different approaches Proofs, that they are equivalent 10

11 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 11

12 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 12

13 Trace- Based So#ware Engineering and Refinements Refinements are often checked by model checkers è Only finite states Want to have infinite states? è Need a theorem proover 13

14 Trace- Based So#ware Engineering and Refinements Topic 2: A Generic Theorem Prover of CSP Refinement Builds on Isabelle/HOL Allows refinements of infinite state-systems Complete partial orders and Complete metric spaces 14

15 Trace- Based So#ware Engineering and Refinements Program refinement is complicated è Stepwise refinement 15

16 Trace- Based So#ware Engineering and Refinements Topic 3: A fully Verified Executable LTL Model Checker! Not Model Checking! Isabelle/HOL Verify specification Use refinement theories Generate Model Checker in ML 16

17 Quality Assurance for Embedded Systems Paula Herber berlin.de Lydia Ma7ck berlin.de 17

18 Embedded Systems = Control an (analog) technical environment with digital components ð Interac;on with hardware ð Oaen distributed, limited resources and real- ;me constraints ð Have to be efficient and safe During development of embedded systems: Increasing flexibility and op;miza;on Quality assurance: Sta;c techniques: Analysis and formal verifica;on Dynamic techniques: Test and simula;on 18

19 Quality Assurance of ES 1. Does the specifica;on meet the requirements? Is the result of the computa;on in the expected value range? Is signal a always eventually followed by signal b? Is there an overflow? Does signal a reach controller C within 5ms? 2. Does the implementa;on meet the specifica;on? Test case genera;on from specifica;on Compare output behavior Is the system specified correctly? Is the system implemented correctly? 19

20 Formal Goal: Show that a model of the system (specifica;on) sa;sfies given proper;es (requirements) 1. Construct a formal model of the system 2. Formalize desired proper;es 3. Verify requirements Requirements Requirements specification? Formal system model 20

21 HW/SW Co- HW/SW Co- design = integrated design of hardware and soaware components of embedded systems HW/SW Co- verifica@on Has to cope with various Models of Computa/on Combines verifica;on techniques from the hardware and from the soaware world Goal: comprehensive and systema;c verifica;on of hardware, soaware and their interplay 21

22 Major problem in embedded systems verifica;on: scalability Paradigm: divide & conquer Approaches: assume- guarantee, design- by- contract, modular verifica;on, How to decompose the system? How to compose proper;es? 22

23 Topics HW/SW Co- Interval Property Checking Model Checking HW/SW Co- Designs Formalizing Interface Specifica;ons Symbolic Composi;onal Verifica;on Composi;onal Verifica;on of Probabilis;c Systems 23

24 Correct Model and MatLab Simulink Sebas;an Schlesinger berlin.de 24

25 Correct Model General Setting Syntax Meta Model Meta Model Transformation Language Syntactic Model Transformation Syntactic Model Semantics Interpretation Model Interpretation Model 25

26 Preserving Refactorings in Simulink Simulink Graph-based endogenous (inplace) Transformation (Refactoring) 2 Simulink Interpretation by suited Simulink Semantics 1 Result correctness 3 Transformation correctness 26

27 Topics for Correct Model So#ware Engineering and Simulink Topics for this seminar: 1. Opera;onal Simulink Seman;cs Bouissou, O., Chapoutot, A.: An Opera;onal Seman;cs for Simulink s Simula;on Engine, Model Transforma;ons Al- Batran, B. et al.: Seman;c Clone Detec;on for Model- Based Development of Embedded Systems, Verifica;on of Model Transforma;ons Giese, H., Lambers, L.: Towards Automa;c Verifica;on of Behavior Preserva;on for Model Transforma;on via Invariant Checking,

28 Security and Maintainability of Matlab Simulink Models Marcus Mikulcak berlin.de 28

29 Security and Maintainability So#ware Engineering of Matlab Simulink Models Matlab Simulink de facto standard for model- based development embedded systems in automo;ve and aerospace fields Graphical, model- based design early tes;ng due to abstrac;on from implementa;on details Quality and security assurance Numerous methods in tradi;onal soaware engineering S;ll a young research topic in model- based development 29

30 Flow in Java Topic 1: Controlling informa;on flow in Java Informa/on flow control: powerful tool to discover security leaks in soaware, offers: confiden/ality: guarantees for non- leakage of confiden;al data integrity: guarantees, that cri;cal computa;ons cannot be manipulated from the outside These proper;es can be defined and analyzed on program dependence graphs 30

31 Model- based Impact Analysis Topic 2: Change impact analysis in model- based development Impact analysis is concerned with the iden;fica;on of consequences of changes in soaware to ensure quality and maintainability Studied extensively for text- based programming languages, but model- based development poses different, as of yet unsolved challenges 31

32 Slicing Topic 3: Probabilis;c program slicing Program slicing is a common method in soaware change impact analysis: Which parts of a given piece of code influence a certain point of interest, such as a variable or a line Slices can grow very large due to interdependencies between parts of the code Idea: automa;cally extract probabili;es of condi;onal statements, etc., to decrease slice size 32

33 Topic Blocks 1. Trace- Based and Refinements à Nils 2. Quality Assurance à Paula, Lydia 3. Correct Model and MatLab Simulink à Sebas;an 4. Security and Maintainability of Matlab Simulink Models à Marcus 33

34 Topics Overview (1) Block 1: (Trace- Based Seman;cs and Refinements): 1. Trace- Based Coinduc/ve Opera/onal Seman/cs for While 2. A Generic Theorem Prover for CSP Refinement 3. A Fully Verified Executable LTL Model Checker 34

35 Topics Overview (2) Block 2: (Quality Assurance ) HW/SW Co- Verifica/on 1. Interval Property Checking 2. Model Checking HW/SW Co- Designs 3. Formalizing Interface Specifica/ons Composi/onal Verifica/on 1. Symbolic Composi/onal Verifica/on 2. Composi/onal Verifica/on of Probabilis/c Systems 35

36 Topics Overview (3) Block 3: (Correct Model Transforma;ons and Matlab Simulink Seman;cs) 1. Opera/onal Simulink Seman/cs 2. Model Transforma/ons 3. Verifica/on of Model Transforma/on Block 4: (Security and Maintainability of Matlab Simulink Models) 1. Controlling informa/on flow in Java 2. Change impact analysis in model- based development 3. Probabilis/c program slicing 36

Suppor&ng the Design of Safety Cri&cal Systems Using AADL

Suppor&ng the Design of Safety Cri&cal Systems Using AADL Suppor&ng the Design of Safety Cri&cal Systems Using AADL T. Correa, L. B. Becker, J.- M. Farines, J.- P. Bodeveix, M. Filali, F. Vernadat IRIT LAAS UFSC Agenda Introduc&on Proposed Approach Verifica&on

More information

So#ware- based CyberSecurity. Michael Butler Gennaro Parlato Electronic and So.ware Systems (ESS)

So#ware- based CyberSecurity. Michael Butler Gennaro Parlato Electronic and So.ware Systems (ESS) So#ware- based CyberSecurity Michael Butler Gennaro Parlato Electronic and So.ware Systems (ESS) Security is mul;- faceted Confiden;ality Authen;ca;on Authorisa;on / Access Control Trust / Reputa;on Anonymity

More information

So#ware quality assurance - introduc4on. Dr Ana Magazinius

So#ware quality assurance - introduc4on. Dr Ana Magazinius So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something

More information

ARTIST Methodology and Tooling. Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015

ARTIST Methodology and Tooling. Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015 ARTIST Methodology and Tooling Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015 Motivation: From SaaP to SaaS So#ware as a Product based Company So#ware as a Service based Company : Cloud Computing

More information

Data Warehousing. Yeow Wei Choong Anne Laurent

Data Warehousing. Yeow Wei Choong Anne Laurent Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes

More information

CS 5150 So(ware Engineering Evalua4on and User Tes4ng

CS 5150 So(ware Engineering Evalua4on and User Tes4ng Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Evalua4on and User Tes4ng William Y. Arms Usability: The Analyze/Design/Build/Evaluate Loop Analyze requirements Design User

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi

More information

Understanding and Detec.ng Real- World Performance Bugs

Understanding and Detec.ng Real- World Performance Bugs Understanding and Detec.ng Real- World Performance Bugs Gouliang Jin, Linhai Song, Xiaoming Shi, Joel Scherpelz, and Shan Lu Presented by Cindy Rubio- González Feb 10 th, 2015 Mo.va.on Performance bugs

More information

UQ pipeline implementa,on and so0ware integra,on

UQ pipeline implementa,on and so0ware integra,on UQ pipeline implementa,on and so0ware integra,on michael aivazis psaap review 28 29 october 2009 Table of contents 1. Introduc,on people, computa,onal resources 2. Overview of the UQ pipeline problem scope

More information

HOLACONF - Cloud Forward 2015 Conference From Distributed to Complete Computing HAMZA. in collaboration SAHLI with

HOLACONF - Cloud Forward 2015 Conference From Distributed to Complete Computing HAMZA. in collaboration SAHLI with HOLACONF - Cloud Forward Conference From Distributed to Complete Computing HAMZA in collaboration SAHLI with Pr. Faiza BELALA and Dr. Chafia BOUANAKA LIRE Laboratory, Constantine II University-Abdelhamid

More information

SBML SBGN SBML Just my 2 cents. Alice C. Villéger COMBINE 2010

SBML SBGN SBML Just my 2 cents. Alice C. Villéger COMBINE 2010 SBML SBGN SBML Just my 2 cents Alice C. Villéger COMBINE 2010 Disclaimer Fuzzy talk work in progress last minute slides Someone else has been working on very similar stuff and should really have been talking

More information

Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE!

Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE! Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE! Simple Showcase 2 Cloud compu1ng has been envisioned as the next- genera1on architecture

More information

Open Standards, the Cloud, and Grey Literature

Open Standards, the Cloud, and Grey Literature Open Standards, the Cloud, and Grey Literature Panagio8s Stathopoulos, pstath@ekt.gr Na8onal Documenta8on Centre / Na8onal Hellenic Research Founda8on, hdp:// www.ekt.gr Athens, Greece Agenda The Na8onal

More information

CS 5150 So(ware Engineering System Architecture: Introduc<on

CS 5150 So(ware Engineering System Architecture: Introduc<on Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc

More information

Research at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014

Research at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research at the Department of Computer Science and Software Engineering Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research Areas Ar%ficial intelligence Robo%cs Data mining Image

More information

ABET General Outcomes. Student Learning Outcomes for BS in Computing

ABET General Outcomes. Student Learning Outcomes for BS in Computing ABET General a. An ability to apply knowledge of computing and mathematics appropriate to the program s student outcomes and to the discipline b. An ability to analyze a problem, and identify and define

More information

Procurement and Supply Chain Management Online Training

Procurement and Supply Chain Management Online Training Procurement and Supply Chain Management Online Training From Text Document to On line Training Course An Update PSO, Copenhagen 1 Outline of presenta3on Contents of online Training Now The Learning Approach

More information

Introduc)on to the IoT- A methodology

Introduc)on to the IoT- A methodology 10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy

More information

Code Generation for High-Assurance Java Card Applets

Code Generation for High-Assurance Java Card Applets Code Generation for High-Assurance Java Card Applets Alessandro Coglio Kestrel Institute 3260 Hillview Avenue, Palo Alto, CA 94304, USA Ph. +1-650-493-6871 Fax +1-650-424-1807 http://www.kestrel.edu/ coglio

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

Automated Program Behavior Analysis

Automated Program Behavior Analysis Automated Program Behavior Analysis Stacy Prowell sprowell@cs.utk.edu March 2005 SQRL / SEI Motivation: Semantics Development: Most engineering designs are subjected to extensive analysis; software is

More information

CS 5150 So(ware Engineering Steps in the So(ware Development Process

CS 5150 So(ware Engineering Steps in the So(ware Development Process Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Steps in the So(ware Development Process William Y. Arms So(ware Process Fundamental Assump1on: Good processes lead to good

More information

Lean Six Sigma and Project Management triangles and (virtuous) circles

Lean Six Sigma and Project Management triangles and (virtuous) circles Lean Six Sigma and Project Management triangles and (virtuous) circles APM, Holiday Inn Stevenage, 9 th May 2011 Elisabeth Goodman and John Riddell info@riverrhee.com hnp://www.riverrhee.com +44 (0) 7876

More information

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) NSF Webinar on NSF Solicita9on 14-571 NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein,

More information

XML, Seman9c Web and Content Analy9cs

XML, Seman9c Web and Content Analy9cs XML, Seman9c Web and Content Analy9cs XML Prague Pre- conference 2014 Felix Sasaki DFKI / W3C Fellow 1 What do you need to follow this session? Ideal: a computer with internet access, to be able to provide

More information

Why is it important to study sogware engineering?

Why is it important to study sogware engineering? Last 7me CS 521/621 Course Overview: Sta7c and Dynamic Analyses What did we talk about? Why is it important to study sogware engineering? Just like cars US automobile industry used to be very complacent

More information

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

A wiki is nothing more than a website that is op-mized for easy edi-ng,

A wiki is nothing more than a website that is op-mized for easy edi-ng, Welcome to Collabora-on Tools 105, Using Wikis and Online Project Management Tools in Poverty Law. We re going to spend the next 90 minutes discussing what exactly these tools are, how they re being used

More information

TRANSLATING TECHNOLOGY INTO BUSINESS. Let s make money from Big Data!

TRANSLATING TECHNOLOGY INTO BUSINESS. Let s make money from Big Data! TRANSLATING TECHNOLOGY INTO BUSINESS Let s make money from Big Data! JUNE, 2014 About Transla.ng Technology into Business B Spot helps clients transform technology ideas into business concepts. As part

More information

The LCC Network Integrated Data Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011

The LCC Network Integrated Data Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011 The LCC Network Integrated Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011 Analysis A Common Challenge Work Environments Tools Ques&ons Needs Decision Tools

More information

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on

More information

So#ware Development. Overview. Hans- Pe4er Halvorsen, M.Sc. h4p://home.hit.no/~hansha/?page=so#ware_development

So#ware Development. Overview. Hans- Pe4er Halvorsen, M.Sc. h4p://home.hit.no/~hansha/?page=so#ware_development h4p://home.hit.no/~hansha/?page=so#ware_development So#ware Development Overview B. Lund. (2013). Lunch. Available: h4p://www.lunchstriper.no, h4p://www.dagbladet.no/tegneserie/lunch/ Hans- Pe4er Halvorsen,

More information

Arizona and the Unmanned Aircraft Systems (UAS) FAA Test Range. UAS Test Range Selection Discussion. March 6, 2012. Confiden)al, All Rights Reserved.

Arizona and the Unmanned Aircraft Systems (UAS) FAA Test Range. UAS Test Range Selection Discussion. March 6, 2012. Confiden)al, All Rights Reserved. Arizona and the Unmanned Aircraft Systems (UAS) FAA Test Range UAS Test Range Selection Discussion March 6, 2012 Confiden)al, All Rights Reserved. Discussion Points Federal Government Authoriza)on Bills

More information

Development of global specification for dynamically adaptive software

Development of global specification for dynamically adaptive software Development of global specification for dynamically adaptive software Yongwang Zhao School of Computer Science & Engineering Beihang University zhaoyw@act.buaa.edu.cn 22/02/2013 1 2 About me Assistant

More information

Some Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo

Some Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo Some Security Challenges of Cloud Compu6ng Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo Cloud Compu6ng: the Next Big Thing Tremendous momentum ahead: Prediction

More information

Contact Center Rou,ng Strategies for Improving Customer Experience

Contact Center Rou,ng Strategies for Improving Customer Experience Contact Center Rou,ng Strategies for Improving Customer Experience an ebook from Genesys 1 The Contact Center Reality A finite number of available associates A variable volume of contacts A limited amount

More information

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal

More information

FTC Data Security Standard

FTC Data Security Standard FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls

More information

Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014

Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Karima Bourquard Director of Interoperability IHE- Europe Tes0ng and Cer0fica0on Objec0ves To design

More information

Towards Reconstruc/ng Architectural Models of So8ware Tools by Run/me Analysis

Towards Reconstruc/ng Architectural Models of So8ware Tools by Run/me Analysis Towards Reconstruc/ng Architectural Models of So8ware Tools by Run/me Analysis Ian Peake, Jan Olaf Blech, Lasith Fernando RMIT University Melbourne, Australia Our Approach Tradi/onal Requirements Model

More information

Remote Monitoring of Enterprise Systems

Remote Monitoring of Enterprise Systems Remote Monitoring of Enterprise Systems A Step Towards Effec1ve Management of Cloud Based Services Johnson L Fisher, Director, IS Opera5ons May 28, 2015 Agenda Overview Current State Facility and Service

More information

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network

More information

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements OpAuditTM from is the first compliance management product on the market to successfully track manual controls and technical controls in the same workflow-based system. This ingenious solution gathers &

More information

Introduc)on to the MapReduce Paradigm and Apache Hadoop. Sriram Krishnan sriram@sdsc.edu

Introduc)on to the MapReduce Paradigm and Apache Hadoop. Sriram Krishnan sriram@sdsc.edu Introduc)on to the MapReduce Paradigm and Apache Hadoop Sriram Krishnan sriram@sdsc.edu Programming Model The computa)on takes a set of input key/ value pairs, and Produces a set of output key/value pairs.

More information

Cluster on Data Protec/on, Security and Privacy in Cloud. Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA)

Cluster on Data Protec/on, Security and Privacy in Cloud. Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA) Cluster on Data Protec/on, Security and Privacy in Cloud Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA) Context Increase impact of EU- funded projects on Cloud working in

More information

How To Use A Webmail On A Pc Or Macodeo.Com

How To Use A Webmail On A Pc Or Macodeo.Com Big data workloads and real-world data sets Gang Lu Institute of Computing Technology, Chinese Academy of Sciences BigDataBench Tutorial MICRO 2014 Cambridge, UK INSTITUTE OF COMPUTING TECHNOLOGY 1 Five

More information

Security testing the Internet-of-things

Security testing the Internet-of-things Security testing the Internet-of-things Lindholmen Software Development Day 2014-10-16 Emilie Lundin Barse Informa(on Security Consultant, Combitech emilie.barse@combitech.se Contents State of security

More information

Formal Verification of Software

Formal Verification of Software Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

Copernicus Space Component Ground Segment and Opera4ons Concept

Copernicus Space Component Ground Segment and Opera4ons Concept Copernicus Space Component Ground Segment and Opera4ons Concept G. Kohlhammer, P. Bargellini, E. Monjoux Ground Segment and Mission Opera=ons Department, Earth Observa=on Programmes Directorate, European

More information

What will I learn as an Computer Engineering student?

What will I learn as an Computer Engineering student? What will I learn as an Computer Engineering student? Department of Electrical and Computer Engineering Tu8s School of Engineering Trying to decide on a major? Most college course descrip?ons are full

More information

Scalus A)ribute Workshop. Paris, April 14th 15th

Scalus A)ribute Workshop. Paris, April 14th 15th Scalus A)ribute Workshop Paris, April 14th 15th Content Mo=va=on, objec=ves, and constraints Scalus strategy Scenario and architectural views How the architecture works Mo=va=on for this MCITN Storage

More information

Project Management Introduc1on

Project Management Introduc1on Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?

More information

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering

More information

A Framework for the Semantics of Behavioral Contracts

A Framework for the Semantics of Behavioral Contracts A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept

More information

RESTful or RESTless Current State of Today's Top Web APIs

RESTful or RESTless Current State of Today's Top Web APIs RESTful or RESTless Current State of Today's Top Web APIs Frederik Buelthoff, Maria Maleshkova AIFB, Karlsruhe Ins-tute of Technology (KIT), Germany [1] Growing Number of Web APIs Challenges Scalability

More information

Software Verification for Space Applications Part 2. Autonomous Systems. G. Brat USRA/RIACS

Software Verification for Space Applications Part 2. Autonomous Systems. G. Brat USRA/RIACS Software Verification for Space Applications Part 2. Autonomous Systems G. Brat USRA/RIACS Main Objectives Implement a sustained and affordable human and robotic program to explore the solar system and

More information

Best Prac*ces in Corporate Card Expense Management May 2012

Best Prac*ces in Corporate Card Expense Management May 2012 Proprietary & Confiden0al Not to be distributed without the express wri9en consent of BMO Financial Group Best Prac*ces in Corporate Card Expense Management May 2012 Agenda Industry Trends and Best Prac0ces

More information

MTD Keystone s Multiple Service Platforms

MTD Keystone s Multiple Service Platforms MTD s Multiple Service Platforms uses the Microso/ Office pla5orm and is an MS Access applica:on with integra:on to the common Microso/ Office applica:ons, namely Excel, Word, and Outlook. may be installed

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

Introducing BRAD - the New Standard for Print on Demand

Introducing BRAD - the New Standard for Print on Demand Presenta0on materials and video replay will be provided within one week. Have ques0ons? Use the ques0ons panel during the Q&A recap at the end of the call. we ll field them as we go and Introducing BRAD

More information

Exchange of experience from a SuccessFactors LMS Implementa9on

Exchange of experience from a SuccessFactors LMS Implementa9on Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking

More information

Tool Support for Model Checking of Web application designs *

Tool Support for Model Checking of Web application designs * Tool Support for Model Checking of Web application designs * Marco Brambilla 1, Jordi Cabot 2 and Nathalie Moreno 3 1 Dipartimento di Elettronica e Informazione, Politecnico di Milano Piazza L. Da Vinci,

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

The Energy Efficiency Gap: Sources, Magnitude, Solu:ons

The Energy Efficiency Gap: Sources, Magnitude, Solu:ons The Energy Efficiency Gap: Sources, Magnitude, Solu:ons Louis- Gaëtan Giraudet (Ecole des Ponts ParisTech, CIRED) Madrid January 20, 2015 Today s Talk The Energy efficiency gap: An overview Example #1:

More information

Flumill: fra sterke mari(me tradisjoner via olje og gass (l ledende fornybar teknologi

Flumill: fra sterke mari(me tradisjoner via olje og gass (l ledende fornybar teknologi Flumill: fra sterke mari(me tradisjoner via olje og gass (l ledende fornybar teknologi Presenta(on Oppstartkonferransen for VINN Agder 25 september 2014 The Flumill Technology represents a Step Change

More information

JSR proposal: Enhanced Hybrid APIs

JSR proposal: Enhanced Hybrid APIs JSR proposal: Enhanced Hybrid APIs Introduc;on HTML5 is not the future of apps. While developers dream of 'write once run everywhere' the fragmented support for and limited APIs within HTML5 make this

More information

Data Integra*on in a Networked World. Karl Aberer EPFL karl.aberer@epfl.ch h@p://lsir.epfl.ch/ h@p://www.mics.ch/

Data Integra*on in a Networked World. Karl Aberer EPFL karl.aberer@epfl.ch h@p://lsir.epfl.ch/ h@p://www.mics.ch/ Data Integra*on in a Networked World Karl Aberer EPFL karl.aberer@epfl.ch h@p://lsir.epfl.ch/ h@p://www.mics.ch/ Overview Mo*va*on: Seman*c Interoperability Peer- to- peer Data Integra*on Mapping Discovery

More information

Cryptographic aspects of Bitcoin

Cryptographic aspects of Bitcoin Cryptographic aspects of Bitcoin Stefan Dziembowski University of Warsaw Digital vs. paper currencies Paper: Digital: 16fab13fc6890 Very useful if is also digital. A tradi@onal ways of paying digitally

More information

Model Checking based Software Verification

Model Checking based Software Verification Model Checking based Software Verification 18.5-2006 Keijo Heljanko Keijo.Heljanko@tkk.fi Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24

More information

An Econocom Group company. Your partner in the transi4on towards Mobile IT

An Econocom Group company. Your partner in the transi4on towards Mobile IT An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets

More information

Datavetenskapligt Program (kandidat) Computer Science Programme (master)

Datavetenskapligt Program (kandidat) Computer Science Programme (master) Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer

More information

PROJECT PORTFOLIO SUITE

PROJECT PORTFOLIO SUITE ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.

More information

Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder

Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder Matt Department of Computer Science and Engineering University of Minnesota staats@cs.umn.edu Abstract We present

More information

CMMI for High-Performance with TSP/PSP

CMMI for High-Performance with TSP/PSP Dr. Kıvanç DİNÇER, PMP Hace6epe University Implemen@ng CMMI for High-Performance with TSP/PSP Informa@on Systems & SoFware The Informa@on Systems usage has experienced an exponen@al growth over the past

More information

The ProB Animator and Model Checker for B

The ProB Animator and Model Checker for B The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,

More information

Argand Energy Monitoring Systems

Argand Energy Monitoring Systems Argand Energy Monitoring Solu,ons All your u/li/es & renewables Real- /me & web- enabled Supported by our experts Savings with confidence Our driving philosophy Everything we do is focused on helping clients

More information

The Halting Problem is Undecidable

The Halting Problem is Undecidable 185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine

More information

PARADIGM SHIFT FROM LARGE RELEASES TO CONTINUOUS DEPLOYMENT OF SOFTWARE. DESIGNING A REFERENCE MODEL FOR CONTINUOUS DEPLOYMENT.

PARADIGM SHIFT FROM LARGE RELEASES TO CONTINUOUS DEPLOYMENT OF SOFTWARE. DESIGNING A REFERENCE MODEL FOR CONTINUOUS DEPLOYMENT. PARADIGM SHIFT FROM LARGE RELEASES TO CONTINUOUS DEPLOYMENT OF SOFTWARE. DESIGNING A REFERENCE MODEL FOR CONTINUOUS DEPLOYMENT. PhD Student Teemu Karvonen Supervisors: Markku Oivo and Pasi Kuvaja XP2015

More information

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,

More information

Mining the Cloud.! Building and supporting a Virtual Research Infrastructure!

Mining the Cloud.! Building and supporting a Virtual Research Infrastructure! ! Mining the Cloud.! Building and supporting a Research Infrastructure! Gary Wroblewski Applica2on Coordinator/Mgr. Technical Services The Herbert H. and Grace A. Dow College of Health Professions Central

More information

The Business School s Publishing Company s Online Catalog of Digital Content For Sale

The Business School s Publishing Company s Online Catalog of Digital Content For Sale The Business School s Publishing Company s Online Catalog of Digital Content For Sale abcd Digital Publishing Collabora>ve LIGHTNING TALK December 4, 2014 William Reilly Harvard Business School Publishing

More information

Application of Supply Chain Concepts to the Analysis Process

Application of Supply Chain Concepts to the Analysis Process Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative

More information

Data Mining. Supervised Methods. Ciro Donalek donalek@astro.caltech.edu. Ay/Bi 199ab: Methods of Computa@onal Sciences hcp://esci101.blogspot.

Data Mining. Supervised Methods. Ciro Donalek donalek@astro.caltech.edu. Ay/Bi 199ab: Methods of Computa@onal Sciences hcp://esci101.blogspot. Data Mining Supervised Methods Ciro Donalek donalek@astro.caltech.edu Supervised Methods Summary Ar@ficial Neural Networks Mul@layer Perceptron Support Vector Machines SoLwares Supervised Models: Supervised

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

Layered Approach to Development of OO War Game Models Using DEVS Framework

Layered Approach to Development of OO War Game Models Using DEVS Framework Layered Approach to Development of OO War Game Models Using DEVS Framework Chang Ho Sung*, Su-Youn Hong**, and Tag Gon Kim*** Department of EECS KAIST 373-1 Kusong-dong, Yusong-gu Taejeon, Korea 305-701

More information

Locales Domain Maps Layouts Distribu?ons Chapel Standard Layouts and Distribu?ons User defined Domain Maps. Chapel: Domain Maps

Locales Domain Maps Layouts Distribu?ons Chapel Standard Layouts and Distribu?ons User defined Domain Maps. Chapel: Domain Maps Locales Domain Maps Layouts Distribu?ons Chapel Standard Layouts and Distribu?ons User defined Domain Maps Chapel: Domain Maps 14 Domains are first class index sets Specify the size and shape of arrays

More information

CS 5150 So(ware Engineering So(ware Development in Prac9ce

CS 5150 So(ware Engineering So(ware Development in Prac9ce Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering So(ware Development in Prac9ce William Y. Arms Overall Aim of the Course We assume that you are technically proficient. You

More information

Model-Based Development of Safety-Critical Systems

Model-Based Development of Safety-Critical Systems Model-Based Development of Safety-Critical Systems Matthias Regensburger (regensbu@in.tum.de) Christian Buckl (buckl@in.tum.de) 08.05.2007 1 Overview Motivation Approach: Template Based Development Models

More information

Seven Steps to Client Success Understanding the Flow of ediscovery

Seven Steps to Client Success Understanding the Flow of ediscovery Seven Steps to Client Success Understanding the Flow of ediscovery Seven Steps to Client Success An Overview of Electronic Discovery Understanding Electronic Discovery Defini&ons and Descrip&ons Understanding

More information

So#ware Defined Radio (SDR) Architecture and Systems Issues

So#ware Defined Radio (SDR) Architecture and Systems Issues So#ware Defined Radio (SDR) Architecture and Systems Issues Workshop on Spacecra# Flight So#ware (FSW 09) 2009 11 6 Kenneth J. Peters Jet Propulsion Laboratory, California Ins9tute of Technology Speaker

More information

Introduction to the Analysis and Management Framework

Introduction to the Analysis and Management Framework Introduction to the Analysis and Management Framework Project Team: Don Kranz, Tom Gullion, Neal Saito, Gary Marchiny Project Monitor: Steve Husty 1 Agenda Problem Space The NASA IV&V AMF N Tier Architectures

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

Ins+tuto Superior Técnico Technical University of Lisbon. Big Data. Bruno Lopes Catarina Moreira João Pinho

Ins+tuto Superior Técnico Technical University of Lisbon. Big Data. Bruno Lopes Catarina Moreira João Pinho Ins+tuto Superior Técnico Technical University of Lisbon Big Data Bruno Lopes Catarina Moreira João Pinho Mo#va#on 2 220 PetaBytes Of data that people create every day! 2 Mo#va#on 90 % of Data UNSTRUCTURED

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Leading a New Genera,on in Global Merchant Banking. Investor Presenta,on. Copyright 2015 Emergis Global Holdings GP S.à.r.l. 1

Leading a New Genera,on in Global Merchant Banking. Investor Presenta,on. Copyright 2015 Emergis Global Holdings GP S.à.r.l. 1 Leading a New Genera,on in Global Merchant Banking Investor Presenta,on 1 DISCLAIMER The informa,on contained in this presenta,on is for informa,on only. It does not represent all informa,on related to

More information