2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)最新文献

筛选
英文 中文
Translating AADL systems to Java programs 将AADL系统转换为Java程序
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843855
N. Benlahrache, F. Belala, Randa Ait Younes, Zoubida Belala
{"title":"Translating AADL systems to Java programs","authors":"N. Benlahrache, F. Belala, Randa Ait Younes, Zoubida Belala","doi":"10.1109/ICAASE.2016.7843855","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843855","url":null,"abstract":"ADLs are used to describe system architectures at a very high level of abstraction. The concrete ADLs are interested in generating code from an architectural description. AADL is a concrete language designed for embedded applications. It integrates a software and hardware specifications in its description. Several studies around AADL are devoted to the development of executable systems from their architectural descriptions, like Ocarina project. On the other hand, Java language is widely used and supported by the majority of platforms. In this paper, we present a tool called: AADL2Java, allowing Java code generation from an AADL specification. For this purpose, first we take advantage of the EMF framework to specify two meta-models depicting respectively the concepts of AADL and Java. Then, these two meta-models will be used to generate a Java structure of an AADL specification. AADL2Java tool forms an Eclipse plug-in, aiming to facilitate the automatic translation of AADL systems in Java program skeletons, which may be easily completed by the developer. This will reduce the gap between software architect and developer in the system design.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127602207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A formal model for business process decomposition based on resources consumption with security requirement 基于资源消耗和安全需求的业务流程分解的形式化模型
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843866
Mohammed Nassim Lacheheub, R. Maamri
{"title":"A formal model for business process decomposition based on resources consumption with security requirement","authors":"Mohammed Nassim Lacheheub, R. Maamri","doi":"10.1109/ICAASE.2016.7843866","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843866","url":null,"abstract":"Nowadays, a business process can be a very costly investment for companies because they need to purchase additional resources to ensure the smooth running of their business process. But the problem is that the additional resources are used only for very limited time lapse. Using cloud computing can be beneficial for companies to omit the problem of using additional resources for limited time lapse. Furthermore, cloud computing can have a relevant role in managing and constructing the business process for companies. Because it gives us the illusion to perceive the resources such as unlimited computer resources and it gives the possibility of using this resources in a pay per use manner. In the word of industry, outsourcing security management to a third party or exposing sensitive process in cloud computing can be considerate as one of the biggest problem with the deployment using cloud solution in the industry. The main contribution of this paper is to provide a new formal approach by splitting up the business process based on resource consumption and sensitive process. Moreover, this work allows the specification and analysis company requirements in resources consumption and security issues by simulating many parallel executions of business process. To determine which specific process should be assigned to the cloud computing and which should stay in company.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A theoretical approach for modelling Cloud Services Composition 云服务组合建模的理论方法
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843858
Zakaria Benzadri, N. Hameurlain, F. Belala, Chafia Bouanaka
{"title":"A theoretical approach for modelling Cloud Services Composition","authors":"Zakaria Benzadri, N. Hameurlain, F. Belala, Chafia Bouanaka","doi":"10.1109/ICAASE.2016.7843858","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843858","url":null,"abstract":"Cloud services are designed to provide remote and scalable access to applications and resources. They are inclined to be composed for creating more complex value-added services. Cloud Services Composition (CSC) has become an increasingly active area in both research topics and technological fields. An important and challenging issue in this area is how to model Cloud services for supporting services composition with all its facets. Relying heavily on mathematical definitions, formal methods may be applied in this context to provide a precise model of Cloud Services Composition. This paper investigates the use of Milner's bigraphs for modelling Cloud Services Composition. As its main result, we first present a meta-model for Cloud Services Composition. Then, we define a Bigraph model for Cloud Services Composition (BiG-CSC), which associates a formal semantic to the meta-model. Finally, a graphical environment based on the Eclipse Modelling Framework is proposed to validate our modelling methodology for Cloud Services Composition.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127287358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Net rewriting system for GSPN a RMS case study GSPN网络改写系统的RMS案例研究
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843860
Samir Tigane, L. Kahloul, Samir Bourekkache
{"title":"Net rewriting system for GSPN a RMS case study","authors":"Samir Tigane, L. Kahloul, Samir Bourekkache","doi":"10.1109/ICAASE.2016.7843860","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843860","url":null,"abstract":"The use of Petri Nets in the design of Reconfigurable Manufacturing Systems is an attractive field. Petri Nets allow modelling in an abstract way RMSs and to make specification, refinement, verification and validation of these systems. Moreover, the use of Stochastic Petri Nets allows the designer to catch more indispensable aspects (time and stochastic events) of RMSs, thus the designer can make performance evaluation. In order to study the reconfigurability, explicitly, in Petri nets, several works proposed extension for PN called reconfigurable Petri nets. However, these extensions do not deal yet with stochastic Petri nets. The objective of this paper is to present an extension of Stochastic Petri nets to deal with reconfigurability.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Petri net model for connectivity maintenance in VANET clustering-based routing algorithm 基于VANET聚类路由算法中连通性维护的Petri网模型
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843864
Ahmed Louazani, L. Sekhri
{"title":"Petri net model for connectivity maintenance in VANET clustering-based routing algorithm","authors":"Ahmed Louazani, L. Sekhri","doi":"10.1109/ICAASE.2016.7843864","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843864","url":null,"abstract":"Recently, wireless communications technologies have invaded several daily life fields such as Vehicular Ad-hoc Networks (VANETs). VANET networks are characterized by their high mobility. Clustering seems to be as one of the control schemes used to make this global topology less dynamic. In this sight, our paper introduces a clustering mechanism based for connectivity maintenance in VANET AODV-CV. A formal model using time Petri net as a mathematical tool is presented to prove some protocol's properties.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"401 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134447344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards formal checking of Web services substitutability 对Web服务可替代性的正式检查
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843853
Sofiane Bourouz, N. Zeghib
{"title":"Towards formal checking of Web services substitutability","authors":"Sofiane Bourouz, N. Zeghib","doi":"10.1109/ICAASE.2016.7843853","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843853","url":null,"abstract":"Web services are considered as one of the emerging technologies in the development, deployment and integration of Internet applications, and this, thanks to their features of universal interoperability and their ability to be reused and composed with other web services. Their substitution is one of the most challenging topics in service computing area. In this paper, we investigate a context-independent substitutability of Web services. We use Open Colored Petri Nets (OCNets) as a formal modeling framework of web services and we propose an approach for verifying the substitutability which proceeds in two steps. First, we compare the structures of OCNets' interfaces while deducting the type of the relation between them. After that, we generate the services automata of the OCNets, and we compare their behaviors by using the algorithm WS Behavioral Substitutability Checking.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115497464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology-based approach for arranging new objects by humanoid robots 基于本体的人形机器人新物体排列方法
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843861
Elhabib Abdelillah Ouhiba, Mohammed Amine Belfedhal, A. Khiat, Chihab Eddine Zoua
{"title":"Ontology-based approach for arranging new objects by humanoid robots","authors":"Elhabib Abdelillah Ouhiba, Mohammed Amine Belfedhal, A. Khiat, Chihab Eddine Zoua","doi":"10.1109/ICAASE.2016.7843861","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843861","url":null,"abstract":"The robots are programmed in order to achieve arduous works, perform missions and interact with their environment. However, to realize these tasks the robots must rely not only on their internal knowledge but also on its representation. In this paper, we describe an ontology-based approach to resolve the problem of “Object Arrangement”. The proposed solution is also useful to reason, adapt and communicate with its environment (robots and human). It uses the local and global arrangement algorithms on the three following ontologies: (1) SUMO as the Foundation Ontology, (2) the environment Ontology and (3) the Robot Ontology. The local arrangement algorithm interrogates, the environment and the robot ontologies, to arrange the object if its semantic exists in the environment. Otherwise, it employs the global arrangement algorithm which interrogates the Foundation Ontology SUMO to capture the semantics of the new object; then the local arrangement algorithm is operated in order to arrange it. The experiment is achieved by implementing our personal humanoid robot (Knowledge-based for Humanoid Advanced robots First Generation K.H.A.1) in LITIO laboratory, Oran, Algeria. Finally, the experimental study shows promising results of the proposed approach.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAPMA: Clone agent to protect mobile agents in dynamic environments CAPMA:克隆代理以保护动态环境中的移动代理
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843865
Nardjes Bouchemal, R. Maamri
{"title":"CAPMA: Clone agent to protect mobile agents in dynamic environments","authors":"Nardjes Bouchemal, R. Maamri","doi":"10.1109/ICAASE.2016.7843865","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843865","url":null,"abstract":"Mobile agents' paradigm is increasingly being used on the global Internet, distributed systems and ambient intelligence environment. Indeed, they can provide many advantages to the development of dynamic applications. More recently, mobile agent paradigm is of the best prevalent alternatives bringing most of suitable characteristics of pervasive environments, where people are surrounded by intelligent interfaces merged in daily life objects. Yet, the success of dynamic environment based mobile agents and multi agent systems will depend on how secure it can be made. Certainly, their use poses many security threats, because they are exposed to different malicious hosts' and nodes attacks. The aim of this paper is to propose CAPMA, Clone agent to protect mobile agents. The approach is based on adaptability concept and a clone agent, which is a prototype of the mobile agent with no critical code and sensitive data. The idea minimizes damages on the mobile agent.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ROUTIL: P2P routing protocol based on interest links ROUTIL:基于兴趣链路的P2P路由协议
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843852
Lyes Badis, M. Amad, D. Aïssani, Kahina Bedjguelal, Aldja Benkerrou
{"title":"ROUTIL: P2P routing protocol based on interest links","authors":"Lyes Badis, M. Amad, D. Aïssani, Kahina Bedjguelal, Aldja Benkerrou","doi":"10.1109/ICAASE.2016.7843852","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843852","url":null,"abstract":"The social media has changed our way of communication and sharing data in the Internet. They are based on the collaboration of the members to provide and exchange information. Their efficiency motivates researchers to design novel architectures based on the social behavior of the users. We study in this paper the combination of the social computing and the P2P systems. We propose ROUTIL: a P2P routing algorithm that enriches the DHT (Distributed Hashing Table) with social links. The idea of our algorithm is to link the users with similar interest in order to give a secure and performant service. Performance evaluations of the proposed solution show that results are globally satisfactory.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116736679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Transformation and validation of BPMN models to Petri nets models using GROOVE 基于GROOVE的BPMN模型到Petri网模型的转换与验证
2016 International Conference on Advanced Aspects of Software Engineering (ICAASE) Pub Date : 2016-10-01 DOI: 10.1109/ICAASE.2016.7843859
Said Meghzili, A. Chaoui, M. Strecker, E. Kerkouche
{"title":"Transformation and validation of BPMN models to Petri nets models using GROOVE","authors":"Said Meghzili, A. Chaoui, M. Strecker, E. Kerkouche","doi":"10.1109/ICAASE.2016.7843859","DOIUrl":"https://doi.org/10.1109/ICAASE.2016.7843859","url":null,"abstract":"BPMN is a language for business process modeling. It is simple and has the ability to represent the behavior of complex systems such as: synchronization, parallelism and choice. However, The semantics of the BPMN language is not formal.","PeriodicalId":407176,"journal":{"name":"2016 International Conference on Advanced Aspects of Software Engineering (ICAASE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信