3,277 Hits in 6.4 sec

Interface protocol inference to aid understanding legacy software components

Kousar Aslam, Loek Cleophas, Ramon Schiffelers, Mark van den Brand
2020 Journal of Software and Systems Modeling  
In terms of component-based software engineering, it is necessary to completely understand the behavior of components in relation to their interfaces, i.e., their interface protocols, and to preserve this  ...  For this purpose, we present an approach to infer the interface protocols of software components from the behavioral models of those components, learned by a blackbox technique called active (automata)  ...  The authors would also like to express deep gratitude to Dennis Hendriks and Leonard Lensink for providing support on the design of experiments and implementation, Alexander Serebrenik for advice on results  ... 
doi:10.1007/s10270-020-00809-2 fatcat:lyb6dujhyrecrj3lzenkqlm2mu

Editorial to theme section on interplay of model-driven and component-based software engineering

Federico Ciccozzi, Antonio Cicchetti, Andreas Wortmann
2020 Journal of Software and Systems Modeling  
This theme section aims to disseminate the latest trends in the use and combination of Model-Driven Engineering (MDE) and Component-Based Software Engineering (CBSE).  ...  On the other hand, CBSE aims to deliver and then support the exploitation of reusable "off-the-shelf" software components that can be incorporated into larger applications.  ...  Acknowledgements We would like to thank all authors who submitted papers as well as the reviewers for their efforts and high-quality reviews.  ... 
doi:10.1007/s10270-020-00812-7 fatcat:josactxvlbgbrb7hhawjbr3x3e

Isolating faults in complex COTS‐based systems

Scott A. Hissam, David Carney
1999 Journal of Software Maintenance: Research and Practice  
These tools let the observer see the interplay between components. This interplay is not limited to software component interfaces, but includes hardware interfaces as well.  ...  Comments should be sent to: • isolation of the point of failure to a particular component pairing • identification of deviations from standards • understanding of component external interfaces (such understanding  ... 
doi:10.1002/(sici)1096-908x(199905/06)11:3<183::aid-smr191>;2-u fatcat:iqj7illigbgpba25flbprhykeu

Inferred designs

L. Perrochon, W. Mann
1999 IEEE Software  
Today's software systems evolve too quickly, include too much legacy code, and designers of complex component-based systems cannot always anticipate properties at the design phase.  ...  We call such designs inferred designs.  ...  Our inferred design is oriented to understanding a system of such components. Only recently have systems been monitored using techniques similar to complex event processing.  ... 
doi:10.1109/52.795101 fatcat:yl4lvmpkofffxjrrdjldv3xkpy

Software architecture

Richard N. Taylor
2009 Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium - ESEC/FSE '09  
The modern Web architecture emphasizes scalability of component interactions, generality of interfaces, independent deployment of components, and intermediary components to reduce interaction latency,  ...  enforce security, and encapsulate legacy systems.  ...  the interface protocols used for communication.  ... 
doi:10.1145/1595696.1595754 dblp:conf/sigsoft/Taylor09 fatcat:7wb7qgxcajeozcojke6tbyrn6y

A Design Approach to IoT Endpoint Security for Production Machinery Monitoring

Stefano Tedeschi, Christos Emmanouilidis, Jörn Mehnen, Rajkumar Roy
2019 Sensors  
The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits.  ...  This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while  ...  An understanding of the application context and system component interfaces, which may be exposed to security threats, is necessary to apply proposed concepts to a specific application target.  ... 
doi:10.3390/s19102355 fatcat:slzvsn5oibg7hbo7vmxnn2gboi

BalBoa: A component-based design environment for system models

F. Doucet, S. Shukla, M. Otsuka, R. Gupta
2003 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
A type-inference system maps all weakly-typed CIL interfaces to strongly typed C++ component implementations to produce an executable architectural model.  ...  A CIL component interface can be mapped to many different C++ component implementations.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their constructive comments and suggestions. The authors would also like to thank J.-P. Talpin, R. Jerjurikar, C.  ... 
doi:10.1109/tcad.2003.819385 fatcat:e4mpxyht2bg3jp6elhrhfd4v5u

The software bookshelf

P. J. Finnigan, R. C. Holt, I. Kalas, S. Kerr, K. Kontogiannis, H. A. Muller, J. Mylopoulos, S. G. Perelgut, M. Stanley, K. Wong
1997 IBM Systems Journal  
In this paper we introduce the concept of a software bookshelf as a means to capture, organize, and manage information about a legacy software system.  ...  Legacy software systems are typically complex, geriatric, and difficult to change, having evolved over decades and having passed through many developers.  ...  Acknowledgments The research reported in this paper was carried out within the context of a project jointly funded by IBM Canada and the Canadian Consortium for Software Engineering Research (CSER), an  ... 
doi:10.1147/sj.364.0564 fatcat:5lggfruid5dbzowajm7rb25ymm

Model Learning: A Survey on Foundation, Tools and Applications [article]

Shahbaz Ali and Hailong Sun and Yongwang Zhao
2018 arXiv   pre-print
Model-based testing and formal verification techniques can be employed to enhance the reliability of software systems.  ...  The quality and correct functioning of software components embedded in electronic systems are of utmost concern especially for safety and mission-critical systems.  ...  Acknowledgement We would like to gratitude Mr. Markus Frohme TU Dortmund for valuable discussions and generous sup-  ... 
arXiv:1901.01910v1 fatcat:ttfnf3elxfhjvdvtid5tzsmfbm

Component-based perspective on software mismatch detection and resolution

A. Egyed, N. Medvidovic, C. Gacek
2000 IEE Proceedings - Software  
An explicit architectural model allows for mismatches to be detected at the level of component interfaces, behaviors, and interaction protocols.  ...  Quite the contrary, the same general process can be used when other styles and ADLs are coupled to aid in software modeling and analysis [9] .  ... 
doi:10.1049/ip-sen:20000915 fatcat:7r2jqmf52rgx7pznbl7pvklrme

Praise for Object-Oriented Reengineering Patterns [chapter]

2003 Object-Oriented Reengineering Patterns  
Consider applying Present the Right Interface to legacy components to provide a good interface for legacy services to the prototype.  ...  Present the Right Interface, on the other hand, introduces a new, more suitable interface to a legacy component. Be sure to Deprecate Obsolete Interfaces.  ...  A.3.2 Adapter Intent Convert the interface of a class into another interface clients expect. Adapter lets classes work together that couldn't otherwise because of incompatible interfaces.  ... 
doi:10.1016/b978-155860639-5/50000-6 fatcat:yfchb4mlyvfj3l5w422zp3y47q

Results of a Survey to Identify Differences between Interdisciplinary and Transdisciplinary Research Process

Tom Kollman, Atila Ertas
2010 Transdisciplinary Journal of Engineering & Science  
Interfaces and protocols Similar to the reservation protocol designed within the TCP/IP suite, this component, the QScout, is intended for QoS delivery.  ...  agents for bandwidth management in high-speed communications environments can aide in the movement of legacy systems to future-oriented infrastructures.  ...  User Interface Applications Standards and Protocols Speed Size and transfer rate Documentation Security Control  ... 
doi:10.22545/2010/0002 fatcat:lktnfqcjyzc5ji5mlonrlmve3i

Agent-Oriented Middleware for Integrating Customer Network Services [chapter]

Stefan Poslad, Jeremy Pitt, Abe Mamdani, Robert Hadingham, Philip Buckle
1999 Software Agents for Future Communication Systems  
services quickly (this was one of the driving forces which drove Plain Old telephone Services (POTS) to be re-organized into Intelligent Network (IN) services);  to integrate existing (legacy?)  ...  In: Software Agents for Future Communication Systems, Hayzelden A, Bigham J Eds., Springer-Verlag, ISBN 3-540-65578-6, 1999, pp 221-242. 226  to enable value-added resellers to be able to introduce new  ...  interface to non-agent software.  ... 
doi:10.1007/978-3-642-58418-3_9 fatcat:qtcm5sbdkndsherbtvjk3xdbqa

Flood decision support system on agent grid: method and implementation

J. Luo, L. Xu, J.-P. Jamont, L. Zeng, Z. Shi
2007 Enterprise Information Systems  
agent technology for legacy system integration.  ...  Additionally, we developed a toolkit for programmers to visually develop software agents which makes the development process easier.Besides, the MWAC model proposed is for sensor network to save power  ...  From software engineering perspective, the reusable classes are main components of new software and Behaviors are the basic components to build agents.  ... 
doi:10.1080/17517570601092184 fatcat:rxwgyisb2ncvhjyb7e7zoq2xkm

Leveraging SDN layering to systematically troubleshoot networks

Brandon Heller, James McCauley, Kyriakos Zarifis, Peyman Kazemian, Colin Scott, Nick McKeown, Scott Shenker, Andreas Wundsam, Hongyi Zeng, Sam Whitlock, Vimalkumar Jeyakumar, Nikhil Handigol
2013 Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking - HotSDN '13  
This position paper advocates a more structured troubleshooting approach that leverages architectural layering in Software-Defined Networks (SDNs).  ...  Our goals are to explain the overall picture, show how the pieces fit together to enable a systematic workflow, and highlight the questions that remain.  ...  must gather this state from every node, understand multiple vendor-specific and protocol-specific formats (different protocol configs), understand the composition of each protocol config (the precedence  ... 
doi:10.1145/2491185.2491197 dblp:conf/sigcomm/HellerSMSWZWJHMZK13 fatcat:22ootmrqtzeopbg5f6n5cjbe3u
« Previous Showing results 1 — 15 out of 3,277 results