{"title":"VULCAN: A Tool for Automatically Generating Code from Design Patterns","authors":"G. Frederick, P. Bond, S. Tilley","doi":"10.1109/SYSTEMS.2008.4519012","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4519012","url":null,"abstract":"This paper presents a prototype tool called VULCAN that aims to assist with the creation of high quality code through the use of design patterns. This tool comes in the form of a plug-in for the popular Eclipse software development environment. VULCAN facilitates high quality code creation through the automatic generation of design pattern code templates, customized with user input, and integrated into pre-existing projects. This paper also provides a description of the tool VULCAN and its implementation. By automating the design pattern generation process through the application of a practical and easily usable tool, the adoption of a model-driven engineering approach using design patterns can be substantially mitigated, resulting in improved system quality.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114547539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching and Using Service-Oriented Architecture (SOA) in an Academic Environment","authors":"Scott R. Tilley, Kenny Wong, Spencer Smith","doi":"10.1109/SYSTEMS.2008.4519023","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4519023","url":null,"abstract":"This paper reports on the activities and results from the 4th International Symposium on Software Engineering Course Projects (SWECP 2007), which was held on October 25, 2007 in Toronto, Canada as part of the IBM GASCON 2007 conference. The symposium focused on lessons learned from teaching and using service-oriented architecture (SOA) in an academic context. There are many challenges inherent in teaching the central tenets of SOA from a systems perspective to a diverse group of students. There are also many practical problems related to experimenting with the underlying technologies such as Web services in course projects. Commented summaries from two invited presentations are used to illustrate some of these issues.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126273723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Henke, M. Tichy, T. Schneider, J. Bocker, W. Schafer
{"title":"System Architecture and Risk Management for Autonomous Railway Convoys","authors":"C. Henke, M. Tichy, T. Schneider, J. Bocker, W. Schafer","doi":"10.1109/SYSTEMS.2008.4518986","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4518986","url":null,"abstract":"The RailCab project envisions autonomous railway vehicles which drive in convoy without mechanical coupling. The RailCabs can dynamically and autonomously build and dissolve convoys. This enables an on-demand use of these vehicles while retaining the cost and ecological advantages of public transport. The development of such system has to be rigorous with respect to safety issues in order to avoid loss of lives and other damages. In this paper we present an overview about the system architecture of the RailCab prototype on the test track as well as the actions to be taken to ensure safe operation.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Evolution of Systems Engineering","authors":"G. Rebovich","doi":"10.1109/SYSTEMS.2008.4518992","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4518992","url":null,"abstract":"The 21st century is an exciting time for the field of systems engineering. Advances in our understanding of the traditional discipline are being made. At the same time new modes of systems engineering are emerging to address the engineering challenges of systems-of-systems (SoS) and enterprise systems. Even at this early point in their evolution, these new modes are evincing their own principles, processes and practices. Some are different in degree than engineering at the system level while others are different in kind. While it is impossible to predict how the traditional and new forms of systems engineering will evolve, it is clear even now that there is a long and robust future for all three. Increases in technology complexity have led to new challenges in architecture, networks, hardware and software engineering, and human systems integration. At the same time, the scale at which systems are engineered is exceeding levels that could have been imagined only a short time ago. As a consequence, all three forms of systems engineering will be needed to solve the engineering problems of the future, sometimes separately but increasingly in combination. This paper defines three modes of systems engineering, discusses the challenge space each addresses, describes how they differ from and complement each other. It asks and starts to answer the question of how to enable the development of enterprise systems engineering in a defense department.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Process Model for the Systems Development Requiring Simultaneous Consideration of the SE Process and Safety Requirements","authors":"Jae-Han Yoon, Jae-Chon Lee, Tae-Hyun Kim, S. Hong","doi":"10.1109/SYSTEMS.2008.4519022","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4519022","url":null,"abstract":"We are concerned with the development of complex large-scale systems with safety-critical requirements. Therefore, we have to study how to satisfy both the systems engineering (SE) and safety requirements. To do so, we developed an integrated process model for the systems development by integrating the standard SE process from ISO/IEC 15288 and the hazard analysis techniques for systems safety. Based on the concepts of the systems life cycle, the processes and associated activities, the model was designed to have hierarchical structure with three levels and was represented by the enhanced functional flow block diagrams (EFFBD's). The three levels are called the life cycle view, the process view, and the activity view from the top downwards. Note that the interface between the processes of SE and safety was realized in the process views that are at the second level of the model. In addition, the traceability between each level can be easily maintained. A database schema was obtained to reflect the integrated process and the model was implemented by a tool COREreg. To verify the developed model, a set of actions have been carried out, including timeline analysis, unaddressed leaf-level requirements check, and traceability check. The confirmed traceability can be useful later when the requirement changes in which case a modification of the existing model would be easy. As a result, the integrated process model specifies the required processes and activities of SE and safety, respectively, and also the interface/interaction between them. All the processes and activities are carried out concurrently and iteratively.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115696187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Barry, M. Koehler, T. Bergin-Hill, M. McMahon, M. Tierney, G. Jacyna
{"title":"Optimization of Heterogeneous Simulations of Complex Enterprise Systems","authors":"P. Barry, M. Koehler, T. Bergin-Hill, M. McMahon, M. Tierney, G. Jacyna","doi":"10.1109/SYSTEMS.2008.4518996","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4518996","url":null,"abstract":"Attempting to optimize the design of a complex enterprise system is extremely difficult at best. The interconnections and human elements inherent in these systems make determining the impact of design elements and changes to these elements challenging. We suggest that a combination of sophisticated modeling and simulation techniques, including the use of agent- based models, and biologically inspired optimization techniques can be used to address the aforementioned difficulties. Finally, we discuss visualization techniques for these types of systems that enhance the ability of subject matter experts and decision-makers to understand the results.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114155973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Qutayri, H. Barada, S. Al-Mehairi, J. Nuaimi
{"title":"A Framework for an End-to-End Secure Wireless Smart Home System","authors":"M. Al-Qutayri, H. Barada, S. Al-Mehairi, J. Nuaimi","doi":"10.1109/SYSTEMS.2008.4519036","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4519036","url":null,"abstract":"This paper describes a complete framework for an end- to-end smart home monitoring and control system. The communication with all components of the system is done using a variety of wireless technologies. The system incorporates security features at both ends that prevent unauthorized access as well as assign privileges to the users. The complete prototype smart home system was implemented and it supports three main services: monitoring the status of devices, controlling their settings through configurations that are device dependent, and periodic notification of the status of devices. The prototype system has a modular structure that enables the incorporation of additional components and services.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126743311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality Attributes - Architecting Systems to Meet Customer Expectations","authors":"P. Croll","doi":"10.1109/SYSTEMS.2008.4518988","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4518988","url":null,"abstract":"This paper addresses the use of quality attributes as a mechanism for making objective decisions about architectural tradeoffs and for providing reasonably accurate predictions about how well candidate architectures will meet customer expectations. Typical quality attributes important to many current systems of interest include: performance, dependability, security, and safety. This paper begins with an examination of how quality attributes and architectures are related, including some the seminal work in the area, and a survey of the current standards addressing product quality and evaluation. The implications for both the customer and the system developer of employing a quality- attribute-based approach to architecture definition and trade-off are then briefly explored. The paper also touches on the relationship of an architectural quality-attribute-based approach to engineering process and process maturity. Lastly the special concerns of architecting for system assurance are addressed.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surmounting Data Overflow Problems in the Collection of Information for High Speed Communications Systems","authors":"P. Hershey, C. B. Silio","doi":"10.1109/SYSTEMS.2008.4519055","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4519055","url":null,"abstract":"High speed communications systems using optical media are capable of transporting and delivering data at faster rates than electronic components can economically process them. The result is data overflow in which performance information that is critical for effective enterprise system monitoring and management may be lost, thereby leaving the communications system vulnerable to quality of service degradation and the service provider unable to meet customer service level agreements. Service providers seek a solution to this problem that minimizes the amount of high-speed, high-cost electronics required to comprehensively recognize such information. This paper addresses the challenge of surmounting data overflow problems in the collection of information for high speed communications systems by introducing a new procedure to transform finite state recognizers into new machines that can recognize bit-level information as it passes a monitoring point while operating slower than bit-rate for implementation in reconfigurable hardware, such as RAM and field programmable gate arrays. This is accomplished by mapping N-bit sets from the input stream into new symbols that can be processed at rate I/N while also generating N-bit output symbols. The process is illustrated by an implementation example, and a time versus space tradeoff analysis is presented.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122025465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three Challenges in Program Redocumentation for Distributed Systems","authors":"S. Tilley","doi":"10.1109/SYSTEMS.2008.4519041","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2008.4519041","url":null,"abstract":"There are a number of pressing research challenges in redocumenting distributed systems that could be the focus of attention in the next few years. This paper presents an overview of three of these challenges, categorized according to their scale and scope: in-the-small, in-the-large, and in-the-many (borrowing a classification mechanism from programming language research from a number of years ago). These challenges have been identified based on experience gained from over 15 years of research into program redocumentation via reverse engineering. The impact of these challenges on software development for distributed systems is also discussed.","PeriodicalId":403208,"journal":{"name":"2008 2nd Annual IEEE Systems Conference","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}