66 research outputs found

    A Model-Driven Methodology Approach for Developing a Repository of Models

    Get PDF
    International audienceTo cope with the growing complexity of embedded system design, several development approaches have been proposed. The most popular are those using models as main artifacts to be constructed and maintained. The wanted role of models is to ease, systematize and standardize the approach of the construction of software-based systems. In order to enforce reuse and to interconnect the process of models’ specification and the system development with models, we promote a model-based approach coupled with a repository of models. In this paper, we propose a Model-Driven Engineering methodological approach for the development of a repository of models and an operational architecture for development tools. In particular, we show the feasibility of our own approach by reporting some preliminary prototype providing a model-based repository of security and dependability (S&D) pattern models

    Beta decay of the Tz=-2 nucleus 64Se and its descendants

    Get PDF
    International audience; The beta decay of the Tz=-2 nucleus 64Se has been studied in a fragmentation reaction at RIKEN-Nishina Center. 64Se is the heavies Tz=-2 nucleus that decays to bound states in the daughter nucleus and the heaviest case where the mirror reaction 64Zn(3He,t)64Ga on the Tz=+2 64Zn stable target exists and can be compared. Beta-delayed gamma and proton radiation is reported for the 64Se and 64As cases. New levels have been observed in 64As, 64Ge (N=Z), 63Ge and 63Ga. The associated T1/2 values have been obtained

    Large expert-curated database for benchmarking document similarity detection in biomedical literature search

    Get PDF
    Document recommendation systems for locating relevant literature have mostly relied on methods developed a decade ago. This is largely due to the lack of a large offline gold-standard benchmark of relevant documents that cover a variety of research fields such that newly developed literature search techniques can be compared, improved and translated into practice. To overcome this bottleneck, we have established the RElevant LIterature SearcH consortium consisting of more than 1500 scientists from 84 countries, who have collectively annotated the relevance of over 180 000 PubMed-listed articles with regard to their respective seed (input) article/s. The majority of annotations were contributed by highly experienced, original authors of the seed articles. The collected data cover 76% of all unique PubMed Medical Subject Headings descriptors. No systematic biases were observed across different experience levels, research fields or time spent on annotations. More importantly, annotations of the same document pairs contributed by different scientists were highly concordant. We further show that the three representative baseline methods used to generate recommended articles for evaluation (Okapi Best Matching 25, Term Frequency-Inverse Document Frequency and PubMed Related Articles) had similar overall performances. Additionally, we found that these methods each tend to produce distinct collections of recommended articles, suggesting that a hybrid method may be required to completely capture all relevant articles. The established database server located at https://relishdb.ict.griffith.edu.au is freely available for the downloading of annotation data and the blind testing of new methods. We expect that this benchmark will be useful for stimulating the development of new powerful techniques for title and title/abstract-based search engines for relevant articles in biomedical research.Peer reviewe

    Applying Fusion/UML to the Invoice Problem

    No full text
    In this paper, we use the Fusion Object-Oriented (OO) analysis method to create graphical OO models of the Invoicing Case Study proposed by Henri Habrias. The OO models are expressed in the Unified Modeling Language (UML). The UML models we produced were analyzed by transforming them to Z specifications. 1 Introduction In this paper we use an integrated informal Object-Oriented (OO) and formal modeling technique to model and analyze the Invoicing case study proposed for the Invoice'98 Workshop. The technique is a result of research carried out by the Methods Integration Research Group (MIRG) at Florida Atalnatic University. Figure 1 outlines the process we followed in developing the OO models. The Informal OO Modeling activity involved developing graphical OO models according to the Fusion OO analysis process [2]. Rather than use the (out-dated) notation presented in [2], we used the newer Unified Modeling Language (UML) [8] where possible. The Formalization activity involved producin..

    The tearing mode in the long wavelenght limit

    No full text
    Available from CEN Saclay, Service de Documentation, 91191 Gif-Sur-Yvette Cedex (France) / INIST-CNRS - Institut de l'Information Scientifique et TechniqueSIGLEFRFranc

    The tearing mode in the long wavelenght limit

    Get PDF
    Available from CEN Saclay, Service de Documentation, 91191 Gif-Sur-Yvette Cedex (France) / INIST-CNRS - Institut de l'Information Scientifique et TechniqueSIGLEFRFranc

    Dynamic Secure Aspect Modeling with UML: From Models to Code

    No full text
    Abstract. Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticipate undesirable emergent behavior. In this work, we propose an approach to develop and analyze security-critical specifications and implementations using aspect-oriented modeling. Since we focus on the dynamic views of a system, our work is complementary to existing approaches to security aspects mostly concerned with static views. Our approach includes a link to implementations in so far as the code which is constructed from the models can be analyzed automatically for satisfaction of the security requirements stated in the UML diagrams. We present tool support for our approach.
    corecore