Filters








10 Hits in 7.9 sec

An Evaluation of the Graphical Modeling Framework (GMF) Based on the Development of the CORAS Tool [chapter]

Fredrik Seehusen, Ketil Stølen
2011 Lecture Notes in Computer Science  
We present an evaluation of the Graphical Modeling Framework (GMF) based on our experiences in developing an editor for the risk modeling language CORAS using GMF.  ...  Our main hypothesis is that GMF shortens development time and results in more reliable and maintainable systems than alternative approaches which are not based on code generation.  ...  The research on which this paper reports has been carried out within the DIGIT (180052/S10) and the EMERGENCY projects (187799/S10), funded by the Research Council of Norway, the MASTER and the NESSoS  ... 
doi:10.1007/978-3-642-21732-6_11 fatcat:k3vwxua4xjfvxpwi5xjkswrmha

Eugenia: towards disciplined and automated development of GMF-based graphical model editors

Dimitrios S. Kolovos, Antonio García-Domínguez, Louis M. Rose, Richard F. Paige
2015 Journal of Software and Systems Modeling  
We present Eugenia, an open-source tool that implements the proposed approach, illustrate its functionality with an example, evaluate it through an empirical study, and report on the community's response  ...  EMF and GMF are powerful frameworks for implementing tool support for modelling languages in Eclipse.  ...  The authors would also like to thank Adolfo Sanchez-Barbudo Herrera and Horacio Hoyos Rodriguez for their help with the evaluation experiments discussed in Section 5.  ... 
doi:10.1007/s10270-015-0455-3 fatcat:q7vobjzjvzfklhg2ctcadhn6ym

Supporting Security Engineering at Design Time with Adequate Tooling

Jorn Eichler, Andreas Fuchs, Nico Lincke
2012 2012 IEEE 15th International Conference on Computational Science and Engineering  
tools based on our experiences.  ...  We sketch the language and implementation requirements for our modeling tools, design and implementation considerations, and report on pitfalls and remaining issues with regard to the development of modeling  ...  An early implementation of SecEML has been based on GMF/GEF to provide a graphical representation of the security analysis and design models.  ... 
doi:10.1109/iccse.2012.34 dblp:conf/cse/EichlerFL12 fatcat:s7bhcvfhwncclkbig42o76pona

A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications [chapter]

Waheed Ahmad, Bugra M. Yildiz, Arend Rensink, Mariëlle Stoelinga
2017 Lecture Notes in Computer Science  
This paper presents a state-of-the-art MDEbased framework for HW-SW co-design of dataflow applications, based on synchronous dataflow (SDF) graph formalism.  ...  The framework also contains model transformations that cast these models into priced timed-automata models, the input language of the well-known model checker uppaal cora.  ...  This research is funded by the EU FP7 project SEN-SATION (318490) and NWO project BEATS (612.001.303). The authors are grateful to Kim Sunesen from Recore Systems B.V. for providing the case study.  ... 
doi:10.1007/978-3-319-51738-4_1 fatcat:2fhm3v5zdfgm7l4lnk5ii26o5i

Hazard analysis of human–robot interactions with HAZOP–UML

Jérémie Guiochet
2016 Safety Science  
In this paper we present a method which is based on an adaptation of a hazard identification technique, HAZOP (Hazard Operability), coupled with a system description notation, UML (Unified Modeling Language  ...  One major challenge is thus to develop methods that can be applied at the very beginning of the development process, to identify hazards induced by robot tasks and their interactions with humans.  ...  of the European Community.  ... 
doi:10.1016/j.ssci.2015.12.017 fatcat:gdsththbnver3juwat2c4x3axm

Hazard analysis of human--robot interactions with HAZOP--UML [article]

Jérémie Guiochet
2016 arXiv   pre-print
In this paper we present a method which is based on an adaptation of a hazard identification technique, HAZOP (Hazard Operability), coupled with a system description notation, UML (Unified Modeling Language  ...  One major challenge is thus to develop methods that can be applied at the very beginning of the development process, to identify hazards induced by robot tasks and their interactions with humans.  ...  of the European Community.  ... 
arXiv:1602.03139v1 fatcat:6i3h5pfrhbbepdknseuu5uho3a

Automated analysis of security requirements through risk-based argumentation

Yijun Yu, Virginia N.L. Franqueira, Thein Than Tun, Roel J. Wieringa, Bashar Nuseibeh
2015 Journal of Systems and Software  
In this paper, we integrate the formal and informal assessment of security by proposing a unified meta-model and an automated tool for supporting security argumentation called OpenRISA.  ...  A formal analysis of the evolving threats is difficult due to a number of practical considerations such as incomplete knowledge about the design, limited information about attacks, and constraints on organisational  ...  We would like to thank our colleague Paul Piwek for feedback on earlier draft of the paper.  ... 
doi:10.1016/j.jss.2015.04.065 fatcat:qqzoirbikjborkastcqfw4wmqq

Modelling And Reasoning About Trust Relationships In The Development Of Trustworthy Information Systems

Michail Pavlidis
2014
Therefore, the addition of system components inevitably is based on assumptions of their future behaviour.  ...  When a system component is modelled as part of a requirements engineering model it creates an uncertainty about its future behaviour, thus undermining the accuracy of the system model and eventually the  ...  In addition, the Eclipse Graphical Modelling Framework (GMF) was used to create our graphical editor. GMF builds on top of EMF and the Graphical Editing (Figure 5 .2).  ... 
doi:10.15123/pub.4435 fatcat:d2kf2gvqdrb4jotcjxptlmy7ra

Modeling Large Social Networks in Context

Qirong Ho
2018
Towards the goal of rich analysis on societal-scale networks, this thesis provides (1) modeling and algorithmic techniques for incorporating network context into existing network analysis algorithms based  ...  A thorough analysis of a social network should consider both the graph and the associated side information, yet we also expect the algorithm to execute in a reasonable amount of time on even the largest  ...  Furthermore, MF can be re-interpreted in a probabilistic setting, as seen in the work of Singh & Gordon [156] , who have developed a probabilistic MF framework for an arbitrary number of relational matrices  ... 
doi:10.1184/r1/6720683.v1 fatcat:rr6jq6ssbjefrkq4fpybc7sppa

Further immunohistochemical (IHC) characterisation of devil facial tumour disease 1 (DFT1) in the Tasmanian Devil (Sarcophilus harrisii)

DA Hayes
2019
It was incomprehensible in 2002 to foresee how sectioning and staining the first of an extraordinary number of Tasmanian devil tumours would influence my professional life as a medical scientist.  ...  I was a co-author on two initial papers by Richmond Loh et al. describing the immunohistochemistry and pathology of DFTD followed by a broader paper by Stephen Pyecroft et al. integrating the histopathology  ...  Acknowledgments DECLARATION OF INTERESTS The authors declare no competing financial interests.  ... 
doi:10.25959/100.00031712 fatcat:6kmrn4qiqrdm3ist7y66z7loni