10 research outputs found

    The Train Benchmark: cross-technology performance evaluation of continuous model queries

    Get PDF
    In model-driven development of safety-critical systems (like automotive, avionics or railways), well- formedness of models is repeatedly validated in order to detect design flaws as early as possible. In many indus- trial tools, validation rules are still often implemented by a large amount of imperative model traversal code which makes those rule implementations complicated and hard to maintain. Additionally, as models are rapidly increas- ing in size and complexity, efficient execution of validation rules is challenging for the currently available tools. Checking well-formedness constraints can be captured by declarative queries over graph models, while model update operations can be specified as model transformations. This paper presents a benchmark for systematically assessing the scalability of validating and revalidating well-formedness constraints over large graph models. The benchmark defines well-formedness validation scenarios in the railway domain: a metamodel, an instance model generator and a set of well- formedness constraints captured by queries, fault injection and repair operations (imitating the work of systems engi- neers by model transformations). The benchmark focuses on the performance of query evaluation, i.e. its execution time and memory consumption, with a particular empha- sis on reevaluation. We demonstrate that the benchmark can be adopted to various technologies and query engines, including modeling tools; relational, graph and semantic databases. The Train Benchmark is available as an open- source project with continuous builds from https://github. com/FTSRG/trainbenchmark

    Property-Based Methods for Collaborative Model Development

    Get PDF
    Industrial applications of mo del-driven engineering to de- velop large and complex systems resulted in an increasing demand for collab oration features. However, use cases such as mo del di�erencing and merging have turned out to b e a di�cult challenge, due to (i) the graph- like nature of mo dels, and (ii) the complexity of certain op erations (e.g. hierarchy refactoring) that are common to day. In the pap er, we present a novel search-based automated mo del merge approach where rule-based design space exploration is used to search the space of solution candi- dates that represent con�ict-free merged mo dels. Our metho d also allows engineers to easily incorp orate domain-sp eci�c knowledge into the merge pro cess to provide b etter solutions. The merge pro cess automatically cal- culates multiple merge candidates to b e presented to domain exp erts for �nal selection. Furthermore, we prop ose to adopt a generic synthetic b enchmark to carry out an initial scalability assessment for mo del merge with large mo dels and large change sets

    Query-based access control for secure collaborative modeling using bidirectional transformations

    Get PDF
    Large-scale model-driven system engineering projects are carried out collaboratively. Engineering artifacts stored in model repositories are developed in either offline (checkout-modify-commit) or online (GoogleDoc-style) scenarios. Complex systems frequently integrate models and components developed by different teams, vendors and suppliers. Thus confidentiality and integrity of design artifacts need to be protected by access control policies. We propose a technique for secure collaborative modeling where (1) fine-grained access control for models can be defined by model queries, and (2) such access control policies are strictly enforced by bidirectional model transformations. Each collaborator obtains a filtered local copy of the model containing only those model elements which they are allowed to read; write access control policies are checked on the server upon submitting model changes. We illustrate the approach and carry out an initial scalability assessment using a case study of the MONDO EU project

    Deriving Effective Permissions for Modeling Artifacts from Fine-grained Access Control Rules

    Get PDF
    In case of collaborative modeling, complex systems are de- veloped by different stakeholders. To guarantee security, access control policies need to be enforced during the col- laboration. Levels of required confidentiality and integrity may vary across modeling artifacts, and even features of a single model element. Fine-grained rule-based access control was proposed to meet the needs of flexible and concise access control. Rule- based policies are inherently subject to conflicts between the rules; these conflicts should be interpreted in a consis- tent but also predictable way that caters to the preferences of the policy engineer. We propose a deterministic, parameterizable resolution strategy between conflicting rules to calculate effective ac- cess permissions for each fact in the model. Our approach is illustrated using a case study of the MONDO EU projec

    Visualization of Traceability Models with Domain-specific Layouting

    Get PDF
    Traceability models are often used to describe the correspondence between source and target models of model transformations. Although the visual representation of such models are important for transformation development and application, mostly ad-hoc solutions are present in industrial environments. In this paper we present a user interface component for visualizing traceability models inside transformation frameworks. As generic graph visualization methods fail to emphasize the underlying logical structure of our model, we used domain-specific layouts by customizing generic graph layout algorithms with data from the metamodels used during the transformation. This approach was evaluated, among others, with the traceability models generated by a BPEL verification transformation, which serves as our running example

    The treatment of gastric tumours in our practice: A five year survey

    No full text
    Between the 1 It of January, 1998 and the 3111 of December, 2002 we treated Ill patients for gastric cancer in the 2nd Department of Surgery, Semmelweis University, Budapest, Hungary. The majority of patients belonged to the advanced stages of the disease. In 65% of the cases a partial or total gastrectomy was performed. We combined the operation with D2 lymphnode dissection if a R0 resection was possible, in the other cases with D1 lymphadenectomy. Postoperative morbidity rate ranged to 15%, the mortality 5.4%. 74patients could be followed, 41 are dead and 33 still alive. According to the follow up examination the median survival time is 20.4 months at the moment. We observed a significantly shorter survival time, if vascular or lymphoid vessel invasion was present in the histologic specimen. The study has not been finished and the follow up will be continued
    corecore