2,568 research outputs found

    An active-architecture approach to COTS integration

    Get PDF
    Commercial off-the-shelf (COTS) software products are increasingly used as standard components within integrated information systems. This creates challenges since both their developers and source code are not usually available, and the ongoing development of COTS cannot be predicted. The ArchWare Framework approach recognises COTS products as part of the ambient environment of an information system and therefore an important part of development is incorporating COTS as effective system components. This integration of COTS components, and the composition of components, is captured by an active architecture model which changes as the system evolves. Indeed the architecture modelling language used enables it to express the monitoring and evolution of a system. This active architecture model is structured using control system principles. By modelling both integration and evolution it can guide the system’s response to both predicted and emergent changes that arise from the use of COTS products.Publisher PDFPeer reviewe

    Context-Aware Information Retrieval for Enhanced Situation Awareness

    No full text
    In the coalition forces, users are increasingly challenged with the issues of information overload and correlation of information from heterogeneous sources. Users might need different pieces of information, ranging from information about a single building, to the resolution strategy of a global conflict. Sometimes, the time, location and past history of information access can also shape the information needs of users. Information systems need to help users pull together data from disparate sources according to their expressed needs (as represented by system queries), as well as less specific criteria. Information consumers have varying roles, tasks/missions, goals and agendas, knowledge and background, and personal preferences. These factors can be used to shape both the execution of user queries and the form in which retrieved information is packaged. However, full automation of this daunting information aggregation and customization task is not possible with existing approaches. In this paper we present an infrastructure for context-aware information retrieval to enhance situation awareness. The infrastructure provides each user with a customized, mission-oriented system that gives access to the right information from heterogeneous sources in the context of a particular task, plan and/or mission. The approach lays on five intertwined fundamental concepts, namely Workflow, Context, Ontology, Profile and Information Aggregation. The exploitation of this knowledge, using appropriate domain ontologies, will make it feasible to provide contextual assistance in various ways to the work performed according to a user’s taskrelevant information requirements. This paper formalizes these concepts and their interrelationships

    A make/buy/reuse feature development framework for product line evolution

    Get PDF

    Software Evolution for Industrial Automation Systems. Literature Overview

    Get PDF

    Addressing Software-Based, Platform Interoperability Risks in Defense Systems by Using Distressed Debt Financial Strategies: A Technical Debt Mitigation Concept

    Get PDF
    This concept paper explores an innovative approach to detecting and managing software vulnerabilities in cyber-physical defense systems. Software-based vulnerabilities that hinder or preclude the maintainability and evolvability of combat systems are a pernicious form of technical debt that threaten all cyber-physical systems. The risks associated with technical debt across increasingly interdependent DoD cyber-physical systems will accelerate if left unchecked. Without changes in acquisition and maintenance practices, we can foresee cascading, potentially catastrophic cross-system failures. To illustrate the risk and possible solutions, we focus on the software embedded in combat systems that are subject to ongoing modernization efforts that extend their applicability to evolving operations. Our research revealed that software vulnerabilities in critical combat systems can threaten the reliability and readiness of those systems. These vulnerabilities provide an opportunity for the defense acquisition communities to create a new capability within their organizations, an Acquisition Technical Debt Team (ATDT) to help detect, manage, and mitigate technical debt. We explore risk classification by including interoperability into risk evaluation schemas. We then apply common distressed debt management models to suggest when and how the ATDT might help manage and mitigate technical debt to help rehabilitate an ailing system.Prepared for the Naval Postgraduate School, Monterey, CA 93943.Naval Postgraduate SchoolApproved for public release; distribution is unlimited.Approved for public release; distribution is unlimited

    Theater Battle Management Core System Systems Engineering Case Study

    Get PDF
    The Theater Battle Management Core System (TBMCS) is an integrated air command and control (C2) system that performs standardized, secure, automated air battle planning and execution management for Air Force, multi-service, and allied commanders in theaters of operation worldwide. TBMCS provides the means to plan, direct, and control all theater air operations and to coordinate with land, maritime, and special operations elements. It is deployed at C2 nodes at national, force and wing/unit-level elements. TBMCS operates in support of planners and decision makers at, and below, the level of Joint Force Air Component Commander. The system is modular and scalable for air, land, or sea transport and the deployed configurations can be tailored to meet a particular contingency

    Netcentric Warfare Revisited (NCW): It's Origin and Its Future ... Revisited

    Get PDF
    Chris Gunderson is a Research Associate at the Naval Postgraduate School. He is the principal investigator of the Open Enterprise Information System (OEIS) research initiative. This project sponsored by the Undersecretary of Defense for Intelligence and executed in the Northern Virginia. The project objective is to help the government improve its flawed information technology acquisition process through four key activities: Establish a collaborative network of government, industry, and academic experts who have succeeded at some aspect of OEIS; Study Internet successful stories and distill the lessons learned; Embed lessons learned into familiar government acquisition artifacts; Work with early adopting pilot projects to verify, validate, refine, and document best practicesIt has been a decade since Cebrowski and Gartska, and Alberts, Gartska, and Klein published their watershed Network‐Centric Warfare (NCW) Naval Institute Proceedings article and book, respectively. Through the lens of hindsight, this paper examines how their theories and predictions have held up. The authors find that the tenets of NCW have proven valid. Despite pro forma policy to the contrary, the US Defense community has substantially eschewed Cebrowski et al. in actual practice. Ironically, Al Qaeda has implemented the principles and achieved an advantage from them. Meanwhile, lessons learned in the 21st Century suggest two subtle improvements to the original NCW theory. First, success at NCW requires instantiating “smart push” of valued information at the right time (VIRT) as a key tactic. Second, success at NCW requires rapid, agile, “network‐centric” acquisition conducted literally within the commercial ecosystem of the World Wide Web

    Orion FSW V and V and Kedalion Engineering Lab Insight

    Get PDF
    NASA, along with its prime Orion contractor and its subcontractor s are adapting an avionics system paradigm borrowed from the manned commercial aircraft industry for use in manned space flight systems. Integrated Modular Avionics (IMA) techniques have been proven as a robust avionics solution for manned commercial aircraft (B737/777/787, MD 10/90). This presentation will outline current approaches to adapt IMA, along with its heritage FSW V&V paradigms, into NASA's manned space flight program for Orion. NASA's Kedalion engineering analysis lab is on the forefront of validating many of these contemporary IMA based techniques. Kedalion has already validated many of the proposed Orion FSW V&V paradigms using Orion's precursory Flight Test Article (FTA) Pad Abort 1 (PA-1) program. The Kedalion lab will evolve its architectures, tools, and techniques in parallel with the evolving Orion program

    Panel on future challenges in modeling methodology

    Get PDF
    This panel paper presents the views of six researchers and practitioners of simulation modeling. Collectively we attempt to address a range of key future challenges to modeling methodology. It is hoped that the views of this paper, and the presentations made by the panelists at the 2004 Winter Simulation Conference will raise awareness and stimulate further discussion on the future of modeling methodology in areas such as modeling problems in business applications, human factors and geographically dispersed networks; rapid model development and maintenance; legacy modeling approaches; markup languages; virtual interactive process design and simulation; standards; and Grid computing
    • 

    corecore