1,709 research outputs found

    Metamodel for Tracing Concerns across the Life Cycle

    Get PDF
    Several aspect-oriented approaches have been proposed to specify aspects at different phases in the software life cycle. Aspects can appear within a phase, be refined or mapped to other aspects in later phases, or even disappear.\ud Tracing aspects is necessary to support understandability and maintainability of software systems. Although several approaches have been introduced to address traceability of aspects, two important limitations can be observed. First, tracing is not yet tackled for the entire life cycle. Second, the traceability model that is applied usually refers to elements of specific aspect languages, thereby limiting the reusability of the adopted traceability model.We propose the concern traceability metamodel (CTM) that enables traceability of concerns throughout the life cycle, and which is independent from the aspect languages that are used. CTM can be enhanced to provide additional properties for tracing, and be instantiated to define\ud customized traceability models with respect to the required aspect languages. We have implemented CTM in the tool M-Trace, that uses XML-based representations of the models and XQuery queries to represent tracing information. CTM and M-Trace are illustrated for a Concurrent Versioning System to trace aspects from the requirements level to architecture design level and the implementation

    Transparent code authentication at the processor level

    Get PDF
    The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system. The technique proposed tightly integrates the authentication mechanism into the processor core. The authentication latency is hidden behind the memory access latency, thereby allowing seamless on-the-fly authentication of instructions. In addition, the proposed authentication method supports seamless encryption of code (and static data). Consequently, while providing the software users with assurance for authenticity of programs executing on their hardware, the proposed technique also protects the software manufacturers’ intellectual property through encryption. The performance analysis shows that, under mild assumptions, the presented technique introduces negligible overhead for even moderate cache sizes

    Dagstuhl News January - December 2006

    Get PDF
    "Dagstuhl News" is a publication edited especially for the members of the Foundation "Informatikzentrum Schloss Dagstuhl" to thank them for their support. The News give a summary of the scientific work being done in Dagstuhl. Each Dagstuhl Seminar is presented by a small abstract describing the contents and scientific highlights of the seminar as well as the perspectives or challenges of the research topic

    Wide Angle Polarization Analysis with Neutron Spin Filters

    Get PDF
    AbstractWe report substantial improvements in a compact wide angle neutron spin filter system that was recently employed on the Multi- Axis Crystal Spectrometer at the Center for Neutron Research at the U.S. National Institute of Standards and Technology. The apparatus consists of a cylindrical 3He polarizer cell and wide-angle 3He analyzer cells, a vertical solenoid to provide a uniform magnetic field, and a shielded radio-frequency solenoid for the polarizer cell. Nuclear magnetic resonance is employed to reverse the polarization in the polarizer cell and monitor the 3He polarization in all cells. The first experiment using this apparatus was carried out with cylindrical analyzer cells with limited angular coverage due to low polarizations in fused quartz cells. We present results for aluminosilicate glass analyzer cells that cover 110 ∘ and have long relaxation times (100h to 400h). Using two 100W diode bars spectrally narrowed with chirped volume Bragg gratings, we have obtained 65% - 80% 3He polarization in these cells. The 3He polarization has been measured by neutron transmission and electron paramagnetic resonance. Additional progress includes an improved holding field solenoid and decreased spin-flip losses

    Safe-guarded multi-agent control for mechatronic systems: implementation framework and design patterns

    Get PDF
    This thesis addresses two issues: (i) developing an implementation framework for Multi-Agent Control Systems (MACS); and (ii) developing a pattern-based safe-guarded MACS design method.\ud \ud The Multi-Agent Controller Implementation Framework (MACIF), developed by Van Breemen (2001), is selected as the starting point because of its capability to produce MACS for solving complex control problems with two useful features:\ud ‱ MACS is hierarchically structured in terms of a coordinated group of elementary and/or composite controller-agents;\ud ‱ MACS has an open architecture such that controller-agents can be added, modified or removed without redesigning and/or reprogramming the remaining part of the MACS

    How harmful are survey translations? A test with Schwartz's human values instrument

    Get PDF
    One major challenge in international survey research is to ensure the equivalence of translated survey instruments across different cultures. In this study, we examine empirically the extent to which equivalence of survey instruments to measure human values can be established across cultures sharing the same language as opposed to cultures having a different language. We expect cultures using the same language to exhibit higher levels of equivalence. Our examination made use of a short (i.e., a 21-item) survey instrument to measure Schwartz’s human values based on data from the second and the third rounds of the European Social Survey (ESS). The empirical results support our expectations
    • 

    corecore