Seminar: So#ware Engineering of Embedded Systems
|
|
- Gary Conley
- 8 years ago
- Views:
Transcription
1 Seminar: So#ware Engineering of Embedded Systems - Quality Assurance of Embedded Systems - Prof. Dr. Sabine Glesner Paula Herber, Nils Jähnig, Lydia Ma7ck, Marcus Mikulcak, Sebas;an Schlesinger Summer term 2014
2 (1) compact course: from 10:00 17:00 in MAR from 10:00 17:00 in MAR appointments with your advisors upon prior arrangement three mee;ngs (at least): 1. preliminary discussion (next week) 2. general concept and structure 3. discussion of the oral presenta;on(at least one week before the compact course) Arrange appointments with your advisiors using ! 2
3 (2) slides due to: to your advisor and berlin.de slides will be uploaded for all par;cipants wriwen presenta;on: a laptop will be provided for all presenta;ons supported formats: PDF, PPT, PPTX this slide set will be uploaded today 3
4 Criteria for Passing the Course talk: min + 10 min discussion wriwen presenta;on: 6 to 10 pages compulsory awendance for all appointments (this includes the whole compact course) 4
5 Seminar - Topics 1. Trace- Based Seman@cs and Refinements à Nils 2. Quality Assurance à Paula, Lydia 3. Correct Model Transforma@ons and MatLab Simulink Seman@cs à Sebas;an 4. Security and Maintainability of Matlab Simulink Models à Marcus 5
6 Trace- Based and Refinements Nils Jähnig berlin.de 6
7 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 7
8 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 8
9 Trace- Based So#ware Engineering and Refinements Where do the traces for the implementation come from? Trace-Based Semantics 9
10 Trace- Based So#ware Engineering and Refinements Topic 1: Trace-Based Coinductive Operational Semantics for While Infinite Traces 4 different approaches Proofs, that they are equivalent 10
11 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 11
12 Trace- Based So#ware Engineering and Refinements Specification a b c d Process Algebra e.g. CSP Refinement Implementation a c Programming Language 12
13 Trace- Based So#ware Engineering and Refinements Refinements are often checked by model checkers è Only finite states Want to have infinite states? è Need a theorem proover 13
14 Trace- Based So#ware Engineering and Refinements Topic 2: A Generic Theorem Prover of CSP Refinement Builds on Isabelle/HOL Allows refinements of infinite state-systems Complete partial orders and Complete metric spaces 14
15 Trace- Based So#ware Engineering and Refinements Program refinement is complicated è Stepwise refinement 15
16 Trace- Based So#ware Engineering and Refinements Topic 3: A fully Verified Executable LTL Model Checker! Not Model Checking! Isabelle/HOL Verify specification Use refinement theories Generate Model Checker in ML 16
17 Quality Assurance for Embedded Systems Paula Herber berlin.de Lydia Ma7ck berlin.de 17
18 Embedded Systems = Control an (analog) technical environment with digital components ð Interac;on with hardware ð Oaen distributed, limited resources and real- ;me constraints ð Have to be efficient and safe During development of embedded systems: Increasing flexibility and op;miza;on Quality assurance: Sta;c techniques: Analysis and formal verifica;on Dynamic techniques: Test and simula;on 18
19 Quality Assurance of ES 1. Does the specifica;on meet the requirements? Is the result of the computa;on in the expected value range? Is signal a always eventually followed by signal b? Is there an overflow? Does signal a reach controller C within 5ms? 2. Does the implementa;on meet the specifica;on? Test case genera;on from specifica;on Compare output behavior Is the system specified correctly? Is the system implemented correctly? 19
20 Formal Goal: Show that a model of the system (specifica;on) sa;sfies given proper;es (requirements) 1. Construct a formal model of the system 2. Formalize desired proper;es 3. Verify requirements Requirements Requirements specification? Formal system model 20
21 HW/SW Co- HW/SW Co- design = integrated design of hardware and soaware components of embedded systems HW/SW Co- verifica@on Has to cope with various Models of Computa/on Combines verifica;on techniques from the hardware and from the soaware world Goal: comprehensive and systema;c verifica;on of hardware, soaware and their interplay 21
22 Major problem in embedded systems verifica;on: scalability Paradigm: divide & conquer Approaches: assume- guarantee, design- by- contract, modular verifica;on, How to decompose the system? How to compose proper;es? 22
23 Topics HW/SW Co- Interval Property Checking Model Checking HW/SW Co- Designs Formalizing Interface Specifica;ons Symbolic Composi;onal Verifica;on Composi;onal Verifica;on of Probabilis;c Systems 23
24 Correct Model and MatLab Simulink Sebas;an Schlesinger berlin.de 24
25 Correct Model General Setting Syntax Meta Model Meta Model Transformation Language Syntactic Model Transformation Syntactic Model Semantics Interpretation Model Interpretation Model 25
26 Preserving Refactorings in Simulink Simulink Graph-based endogenous (inplace) Transformation (Refactoring) 2 Simulink Interpretation by suited Simulink Semantics 1 Result correctness 3 Transformation correctness 26
27 Topics for Correct Model So#ware Engineering and Simulink Topics for this seminar: 1. Opera;onal Simulink Seman;cs Bouissou, O., Chapoutot, A.: An Opera;onal Seman;cs for Simulink s Simula;on Engine, Model Transforma;ons Al- Batran, B. et al.: Seman;c Clone Detec;on for Model- Based Development of Embedded Systems, Verifica;on of Model Transforma;ons Giese, H., Lambers, L.: Towards Automa;c Verifica;on of Behavior Preserva;on for Model Transforma;on via Invariant Checking,
28 Security and Maintainability of Matlab Simulink Models Marcus Mikulcak berlin.de 28
29 Security and Maintainability So#ware Engineering of Matlab Simulink Models Matlab Simulink de facto standard for model- based development embedded systems in automo;ve and aerospace fields Graphical, model- based design early tes;ng due to abstrac;on from implementa;on details Quality and security assurance Numerous methods in tradi;onal soaware engineering S;ll a young research topic in model- based development 29
30 Flow in Java Topic 1: Controlling informa;on flow in Java Informa/on flow control: powerful tool to discover security leaks in soaware, offers: confiden/ality: guarantees for non- leakage of confiden;al data integrity: guarantees, that cri;cal computa;ons cannot be manipulated from the outside These proper;es can be defined and analyzed on program dependence graphs 30
31 Model- based Impact Analysis Topic 2: Change impact analysis in model- based development Impact analysis is concerned with the iden;fica;on of consequences of changes in soaware to ensure quality and maintainability Studied extensively for text- based programming languages, but model- based development poses different, as of yet unsolved challenges 31
32 Slicing Topic 3: Probabilis;c program slicing Program slicing is a common method in soaware change impact analysis: Which parts of a given piece of code influence a certain point of interest, such as a variable or a line Slices can grow very large due to interdependencies between parts of the code Idea: automa;cally extract probabili;es of condi;onal statements, etc., to decrease slice size 32
33 Topic Blocks 1. Trace- Based and Refinements à Nils 2. Quality Assurance à Paula, Lydia 3. Correct Model and MatLab Simulink à Sebas;an 4. Security and Maintainability of Matlab Simulink Models à Marcus 33
34 Topics Overview (1) Block 1: (Trace- Based Seman;cs and Refinements): 1. Trace- Based Coinduc/ve Opera/onal Seman/cs for While 2. A Generic Theorem Prover for CSP Refinement 3. A Fully Verified Executable LTL Model Checker 34
35 Topics Overview (2) Block 2: (Quality Assurance ) HW/SW Co- Verifica/on 1. Interval Property Checking 2. Model Checking HW/SW Co- Designs 3. Formalizing Interface Specifica/ons Composi/onal Verifica/on 1. Symbolic Composi/onal Verifica/on 2. Composi/onal Verifica/on of Probabilis/c Systems 35
36 Topics Overview (3) Block 3: (Correct Model Transforma;ons and Matlab Simulink Seman;cs) 1. Opera/onal Simulink Seman/cs 2. Model Transforma/ons 3. Verifica/on of Model Transforma/on Block 4: (Security and Maintainability of Matlab Simulink Models) 1. Controlling informa/on flow in Java 2. Change impact analysis in model- based development 3. Probabilis/c program slicing 36
Suppor&ng the Design of Safety Cri&cal Systems Using AADL
Suppor&ng the Design of Safety Cri&cal Systems Using AADL T. Correa, L. B. Becker, J.- M. Farines, J.- P. Bodeveix, M. Filali, F. Vernadat IRIT LAAS UFSC Agenda Introduc&on Proposed Approach Verifica&on
More informationSo#ware- based CyberSecurity. Michael Butler Gennaro Parlato Electronic and So.ware Systems (ESS)
So#ware- based CyberSecurity Michael Butler Gennaro Parlato Electronic and So.ware Systems (ESS) Security is mul;- faceted Confiden;ality Authen;ca;on Authorisa;on / Access Control Trust / Reputa;on Anonymity
More informationSo#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
More informationARTIST Methodology and Tooling. Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015
ARTIST Methodology and Tooling Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015 Motivation: From SaaP to SaaS So#ware as a Product based Company So#ware as a Service based Company : Cloud Computing
More informationData Warehousing. Yeow Wei Choong Anne Laurent
Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes
More informationCS 5150 So(ware Engineering Evalua4on and User Tes4ng
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Evalua4on and User Tes4ng William Y. Arms Usability: The Analyze/Design/Build/Evaluate Loop Analyze requirements Design User
More informationStatic Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
More informationMission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
More informationUnderstanding and Detec.ng Real- World Performance Bugs
Understanding and Detec.ng Real- World Performance Bugs Gouliang Jin, Linhai Song, Xiaoming Shi, Joel Scherpelz, and Shan Lu Presented by Cindy Rubio- González Feb 10 th, 2015 Mo.va.on Performance bugs
More informationUQ pipeline implementa,on and so0ware integra,on
UQ pipeline implementa,on and so0ware integra,on michael aivazis psaap review 28 29 october 2009 Table of contents 1. Introduc,on people, computa,onal resources 2. Overview of the UQ pipeline problem scope
More informationHOLACONF - Cloud Forward 2015 Conference From Distributed to Complete Computing HAMZA. in collaboration SAHLI with
HOLACONF - Cloud Forward Conference From Distributed to Complete Computing HAMZA in collaboration SAHLI with Pr. Faiza BELALA and Dr. Chafia BOUANAKA LIRE Laboratory, Constantine II University-Abdelhamid
More informationSBML SBGN SBML Just my 2 cents. Alice C. Villéger COMBINE 2010
SBML SBGN SBML Just my 2 cents Alice C. Villéger COMBINE 2010 Disclaimer Fuzzy talk work in progress last minute slides Someone else has been working on very similar stuff and should really have been talking
More informationCloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE!
Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE! Simple Showcase 2 Cloud compu1ng has been envisioned as the next- genera1on architecture
More informationOpen Standards, the Cloud, and Grey Literature
Open Standards, the Cloud, and Grey Literature Panagio8s Stathopoulos, pstath@ekt.gr Na8onal Documenta8on Centre / Na8onal Hellenic Research Founda8on, hdp:// www.ekt.gr Athens, Greece Agenda The Na8onal
More informationCS 5150 So(ware Engineering System Architecture: Introduc<on
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc
More informationResearch at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014
Research at the Department of Computer Science and Software Engineering Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research Areas Ar%ficial intelligence Robo%cs Data mining Image
More informationABET General Outcomes. Student Learning Outcomes for BS in Computing
ABET General a. An ability to apply knowledge of computing and mathematics appropriate to the program s student outcomes and to the discipline b. An ability to analyze a problem, and identify and define
More informationProcurement and Supply Chain Management Online Training
Procurement and Supply Chain Management Online Training From Text Document to On line Training Course An Update PSO, Copenhagen 1 Outline of presenta3on Contents of online Training Now The Learning Approach
More informationIntroduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
More informationCode Generation for High-Assurance Java Card Applets
Code Generation for High-Assurance Java Card Applets Alessandro Coglio Kestrel Institute 3260 Hillview Avenue, Palo Alto, CA 94304, USA Ph. +1-650-493-6871 Fax +1-650-424-1807 http://www.kestrel.edu/ coglio
More informationFounda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
More informationAutomated Program Behavior Analysis
Automated Program Behavior Analysis Stacy Prowell sprowell@cs.utk.edu March 2005 SQRL / SEI Motivation: Semantics Development: Most engineering designs are subjected to extensive analysis; software is
More informationCS 5150 So(ware Engineering Steps in the So(ware Development Process
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Steps in the So(ware Development Process William Y. Arms So(ware Process Fundamental Assump1on: Good processes lead to good
More informationLean Six Sigma and Project Management triangles and (virtuous) circles
Lean Six Sigma and Project Management triangles and (virtuous) circles APM, Holiday Inn Stevenage, 9 th May 2011 Elisabeth Goodman and John Riddell info@riverrhee.com hnp://www.riverrhee.com +44 (0) 7876
More informationNSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)
NSF Webinar on NSF Solicita9on 14-571 NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein,
More informationXML, Seman9c Web and Content Analy9cs
XML, Seman9c Web and Content Analy9cs XML Prague Pre- conference 2014 Felix Sasaki DFKI / W3C Fellow 1 What do you need to follow this session? Ideal: a computer with internet access, to be able to provide
More informationWhy is it important to study sogware engineering?
Last 7me CS 521/621 Course Overview: Sta7c and Dynamic Analyses What did we talk about? Why is it important to study sogware engineering? Just like cars US automobile industry used to be very complacent
More informationHOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company
HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless
More informationAdversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
More informationModel Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
More informationA wiki is nothing more than a website that is op-mized for easy edi-ng,
Welcome to Collabora-on Tools 105, Using Wikis and Online Project Management Tools in Poverty Law. We re going to spend the next 90 minutes discussing what exactly these tools are, how they re being used
More informationTRANSLATING TECHNOLOGY INTO BUSINESS. Let s make money from Big Data!
TRANSLATING TECHNOLOGY INTO BUSINESS Let s make money from Big Data! JUNE, 2014 About Transla.ng Technology into Business B Spot helps clients transform technology ideas into business concepts. As part
More informationThe LCC Network Integrated Data Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011
The LCC Network Integrated Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011 Analysis A Common Challenge Work Environments Tools Ques&ons Needs Decision Tools
More informationDiscovering Computers Fundamentals, 2010 Edition. Living in a Digital World
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on
More informationSo#ware Development. Overview. Hans- Pe4er Halvorsen, M.Sc. h4p://home.hit.no/~hansha/?page=so#ware_development
h4p://home.hit.no/~hansha/?page=so#ware_development So#ware Development Overview B. Lund. (2013). Lunch. Available: h4p://www.lunchstriper.no, h4p://www.dagbladet.no/tegneserie/lunch/ Hans- Pe4er Halvorsen,
More informationArizona and the Unmanned Aircraft Systems (UAS) FAA Test Range. UAS Test Range Selection Discussion. March 6, 2012. Confiden)al, All Rights Reserved.
Arizona and the Unmanned Aircraft Systems (UAS) FAA Test Range UAS Test Range Selection Discussion March 6, 2012 Confiden)al, All Rights Reserved. Discussion Points Federal Government Authoriza)on Bills
More informationDevelopment of global specification for dynamically adaptive software
Development of global specification for dynamically adaptive software Yongwang Zhao School of Computer Science & Engineering Beihang University zhaoyw@act.buaa.edu.cn 22/02/2013 1 2 About me Assistant
More informationSome Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo
Some Security Challenges of Cloud Compu6ng Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo Cloud Compu6ng: the Next Big Thing Tremendous momentum ahead: Prediction
More informationContact Center Rou,ng Strategies for Improving Customer Experience
Contact Center Rou,ng Strategies for Improving Customer Experience an ebook from Genesys 1 The Contact Center Reality A finite number of available associates A variable volume of contacts A limited amount
More informationGyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
More informationFTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationQuality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014
Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Karima Bourquard Director of Interoperability IHE- Europe Tes0ng and Cer0fica0on Objec0ves To design
More informationTowards Reconstruc/ng Architectural Models of So8ware Tools by Run/me Analysis
Towards Reconstruc/ng Architectural Models of So8ware Tools by Run/me Analysis Ian Peake, Jan Olaf Blech, Lasith Fernando RMIT University Melbourne, Australia Our Approach Tradi/onal Requirements Model
More informationRemote Monitoring of Enterprise Systems
Remote Monitoring of Enterprise Systems A Step Towards Effec1ve Management of Cloud Based Services Johnson L Fisher, Director, IS Opera5ons May 28, 2015 Agenda Overview Current State Facility and Service
More informationAn Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network
More informationPervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements
OpAuditTM from is the first compliance management product on the market to successfully track manual controls and technical controls in the same workflow-based system. This ingenious solution gathers &
More informationIntroduc)on to the MapReduce Paradigm and Apache Hadoop. Sriram Krishnan sriram@sdsc.edu
Introduc)on to the MapReduce Paradigm and Apache Hadoop Sriram Krishnan sriram@sdsc.edu Programming Model The computa)on takes a set of input key/ value pairs, and Produces a set of output key/value pairs.
More informationCluster on Data Protec/on, Security and Privacy in Cloud. Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA)
Cluster on Data Protec/on, Security and Privacy in Cloud Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA) Context Increase impact of EU- funded projects on Cloud working in
More informationHow To Use A Webmail On A Pc Or Macodeo.Com
Big data workloads and real-world data sets Gang Lu Institute of Computing Technology, Chinese Academy of Sciences BigDataBench Tutorial MICRO 2014 Cambridge, UK INSTITUTE OF COMPUTING TECHNOLOGY 1 Five
More informationSecurity testing the Internet-of-things
Security testing the Internet-of-things Lindholmen Software Development Day 2014-10-16 Emilie Lundin Barse Informa(on Security Consultant, Combitech emilie.barse@combitech.se Contents State of security
More informationFormal Verification of Software
Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification
More informationDivision of Mathematical Sciences
Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree
More informationCopernicus Space Component Ground Segment and Opera4ons Concept
Copernicus Space Component Ground Segment and Opera4ons Concept G. Kohlhammer, P. Bargellini, E. Monjoux Ground Segment and Mission Opera=ons Department, Earth Observa=on Programmes Directorate, European
More informationWhat will I learn as an Computer Engineering student?
What will I learn as an Computer Engineering student? Department of Electrical and Computer Engineering Tu8s School of Engineering Trying to decide on a major? Most college course descrip?ons are full
More informationScalus A)ribute Workshop. Paris, April 14th 15th
Scalus A)ribute Workshop Paris, April 14th 15th Content Mo=va=on, objec=ves, and constraints Scalus strategy Scenario and architectural views How the architecture works Mo=va=on for this MCITN Storage
More informationProject Management Introduc1on
Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?
More informationFormal Verification Coverage: Computing the Coverage Gap between Temporal Specifications
Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering
More informationA Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept
More informationRESTful or RESTless Current State of Today's Top Web APIs
RESTful or RESTless Current State of Today's Top Web APIs Frederik Buelthoff, Maria Maleshkova AIFB, Karlsruhe Ins-tute of Technology (KIT), Germany [1] Growing Number of Web APIs Challenges Scalability
More informationSoftware Verification for Space Applications Part 2. Autonomous Systems. G. Brat USRA/RIACS
Software Verification for Space Applications Part 2. Autonomous Systems G. Brat USRA/RIACS Main Objectives Implement a sustained and affordable human and robotic program to explore the solar system and
More informationBest Prac*ces in Corporate Card Expense Management May 2012
Proprietary & Confiden0al Not to be distributed without the express wri9en consent of BMO Financial Group Best Prac*ces in Corporate Card Expense Management May 2012 Agenda Industry Trends and Best Prac0ces
More informationMTD Keystone s Multiple Service Platforms
MTD s Multiple Service Platforms uses the Microso/ Office pla5orm and is an MS Access applica:on with integra:on to the common Microso/ Office applica:ons, namely Excel, Word, and Outlook. may be installed
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationIntroducing BRAD - the New Standard for Print on Demand
Presenta0on materials and video replay will be provided within one week. Have ques0ons? Use the ques0ons panel during the Q&A recap at the end of the call. we ll field them as we go and Introducing BRAD
More informationExchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
More informationTool Support for Model Checking of Web application designs *
Tool Support for Model Checking of Web application designs * Marco Brambilla 1, Jordi Cabot 2 and Nathalie Moreno 3 1 Dipartimento di Elettronica e Informazione, Politecnico di Milano Piazza L. Da Vinci,
More informationSoftware Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
More informationThe Energy Efficiency Gap: Sources, Magnitude, Solu:ons
The Energy Efficiency Gap: Sources, Magnitude, Solu:ons Louis- Gaëtan Giraudet (Ecole des Ponts ParisTech, CIRED) Madrid January 20, 2015 Today s Talk The Energy efficiency gap: An overview Example #1:
More informationFlumill: fra sterke mari(me tradisjoner via olje og gass (l ledende fornybar teknologi
Flumill: fra sterke mari(me tradisjoner via olje og gass (l ledende fornybar teknologi Presenta(on Oppstartkonferransen for VINN Agder 25 september 2014 The Flumill Technology represents a Step Change
More informationJSR proposal: Enhanced Hybrid APIs
JSR proposal: Enhanced Hybrid APIs Introduc;on HTML5 is not the future of apps. While developers dream of 'write once run everywhere' the fragmented support for and limited APIs within HTML5 make this
More informationData Integra*on in a Networked World. Karl Aberer EPFL karl.aberer@epfl.ch h@p://lsir.epfl.ch/ h@p://www.mics.ch/
Data Integra*on in a Networked World Karl Aberer EPFL karl.aberer@epfl.ch h@p://lsir.epfl.ch/ h@p://www.mics.ch/ Overview Mo*va*on: Seman*c Interoperability Peer- to- peer Data Integra*on Mapping Discovery
More informationCryptographic aspects of Bitcoin
Cryptographic aspects of Bitcoin Stefan Dziembowski University of Warsaw Digital vs. paper currencies Paper: Digital: 16fab13fc6890 Very useful if is also digital. A tradi@onal ways of paying digitally
More informationModel Checking based Software Verification
Model Checking based Software Verification 18.5-2006 Keijo Heljanko Keijo.Heljanko@tkk.fi Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24
More informationAn Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
More informationDatavetenskapligt Program (kandidat) Computer Science Programme (master)
Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer
More informationPROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
More informationTowards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder
Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder Matt Department of Computer Science and Engineering University of Minnesota staats@cs.umn.edu Abstract We present
More informationCMMI for High-Performance with TSP/PSP
Dr. Kıvanç DİNÇER, PMP Hace6epe University Implemen@ng CMMI for High-Performance with TSP/PSP Informa@on Systems & SoFware The Informa@on Systems usage has experienced an exponen@al growth over the past
More informationThe ProB Animator and Model Checker for B
The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,
More informationArgand Energy Monitoring Systems
Argand Energy Monitoring Solu,ons All your u/li/es & renewables Real- /me & web- enabled Supported by our experts Savings with confidence Our driving philosophy Everything we do is focused on helping clients
More informationThe Halting Problem is Undecidable
185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine
More informationPARADIGM SHIFT FROM LARGE RELEASES TO CONTINUOUS DEPLOYMENT OF SOFTWARE. DESIGNING A REFERENCE MODEL FOR CONTINUOUS DEPLOYMENT.
PARADIGM SHIFT FROM LARGE RELEASES TO CONTINUOUS DEPLOYMENT OF SOFTWARE. DESIGNING A REFERENCE MODEL FOR CONTINUOUS DEPLOYMENT. PhD Student Teemu Karvonen Supervisors: Markku Oivo and Pasi Kuvaja XP2015
More informationONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
More informationMining the Cloud.! Building and supporting a Virtual Research Infrastructure!
! Mining the Cloud.! Building and supporting a Research Infrastructure! Gary Wroblewski Applica2on Coordinator/Mgr. Technical Services The Herbert H. and Grace A. Dow College of Health Professions Central
More informationThe Business School s Publishing Company s Online Catalog of Digital Content For Sale
The Business School s Publishing Company s Online Catalog of Digital Content For Sale abcd Digital Publishing Collabora>ve LIGHTNING TALK December 4, 2014 William Reilly Harvard Business School Publishing
More informationApplication of Supply Chain Concepts to the Analysis Process
Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative
More informationData Mining. Supervised Methods. Ciro Donalek donalek@astro.caltech.edu. Ay/Bi 199ab: Methods of Computa@onal Sciences hcp://esci101.blogspot.
Data Mining Supervised Methods Ciro Donalek donalek@astro.caltech.edu Supervised Methods Summary Ar@ficial Neural Networks Mul@layer Perceptron Support Vector Machines SoLwares Supervised Models: Supervised
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More informationLayered Approach to Development of OO War Game Models Using DEVS Framework
Layered Approach to Development of OO War Game Models Using DEVS Framework Chang Ho Sung*, Su-Youn Hong**, and Tag Gon Kim*** Department of EECS KAIST 373-1 Kusong-dong, Yusong-gu Taejeon, Korea 305-701
More informationLocales Domain Maps Layouts Distribu?ons Chapel Standard Layouts and Distribu?ons User defined Domain Maps. Chapel: Domain Maps
Locales Domain Maps Layouts Distribu?ons Chapel Standard Layouts and Distribu?ons User defined Domain Maps Chapel: Domain Maps 14 Domains are first class index sets Specify the size and shape of arrays
More informationCS 5150 So(ware Engineering So(ware Development in Prac9ce
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering So(ware Development in Prac9ce William Y. Arms Overall Aim of the Course We assume that you are technically proficient. You
More informationModel-Based Development of Safety-Critical Systems
Model-Based Development of Safety-Critical Systems Matthias Regensburger (regensbu@in.tum.de) Christian Buckl (buckl@in.tum.de) 08.05.2007 1 Overview Motivation Approach: Template Based Development Models
More informationSeven Steps to Client Success Understanding the Flow of ediscovery
Seven Steps to Client Success Understanding the Flow of ediscovery Seven Steps to Client Success An Overview of Electronic Discovery Understanding Electronic Discovery Defini&ons and Descrip&ons Understanding
More informationSo#ware Defined Radio (SDR) Architecture and Systems Issues
So#ware Defined Radio (SDR) Architecture and Systems Issues Workshop on Spacecra# Flight So#ware (FSW 09) 2009 11 6 Kenneth J. Peters Jet Propulsion Laboratory, California Ins9tute of Technology Speaker
More informationIntroduction to the Analysis and Management Framework
Introduction to the Analysis and Management Framework Project Team: Don Kranz, Tom Gullion, Neal Saito, Gary Marchiny Project Monitor: Steve Husty 1 Agenda Problem Space The NASA IV&V AMF N Tier Architectures
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationIns+tuto Superior Técnico Technical University of Lisbon. Big Data. Bruno Lopes Catarina Moreira João Pinho
Ins+tuto Superior Técnico Technical University of Lisbon Big Data Bruno Lopes Catarina Moreira João Pinho Mo#va#on 2 220 PetaBytes Of data that people create every day! 2 Mo#va#on 90 % of Data UNSTRUCTURED
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationLeading a New Genera,on in Global Merchant Banking. Investor Presenta,on. Copyright 2015 Emergis Global Holdings GP S.à.r.l. 1
Leading a New Genera,on in Global Merchant Banking Investor Presenta,on 1 DISCLAIMER The informa,on contained in this presenta,on is for informa,on only. It does not represent all informa,on related to
More information