Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Physical Sciences and Mathematics (8)
- Computer and Systems Architecture (6)
- Systems Architecture (5)
- Other Computer Engineering (3)
-
- Software Engineering (3)
- Robotics (2)
- Aerospace Engineering (1)
- Artificial Intelligence and Robotics (1)
- Education (1)
- Electrical and Computer Engineering (1)
- Higher Education (1)
- OS and Networks (1)
- Other Aerospace Engineering (1)
- Space Vehicles (1)
- Systems Engineering and Multidisciplinary Design Optimization (1)
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Computer Engineering
Early Reliability Assessment Of Component-Based Software System Using Coloredpetri Net, Amir Hosseinzadeh Mokarram, Ayaz Isazadeh, Habib Izadkhah
Early Reliability Assessment Of Component-Based Software System Using Coloredpetri Net, Amir Hosseinzadeh Mokarram, Ayaz Isazadeh, Habib Izadkhah
Turkish Journal of Electrical Engineering and Computer Sciences
Assessment of reliability in the early stages of software development from architectural models is one of the major challenges that many studies have addressed in this field in the last decade. The main drawbacks of existing methods are the following: 1) considering equal impact for all parts of the software architecture on system reliability, and 2) inability to determine the contribution of each part of the software in the system failure. This paper introduces the extended version of the colored petri net as an underlying verifiable model to evaluate the reliability of a software system. The proposed model enhances reliability …
Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan
Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan
Research Collection School Of Computing and Information Systems
This paper shares our insights on exploring theexperiential learning model and risk management process todesign an undergraduate software architecture course. The keychallenge for undergraduate students to appreciate softwarearchitecture design is usually their limited experience in thesoftware industry. In software architecture, the high-level designprinciples are heuristics lacking the absoluteness of firstprinciples which for inexperienced undergraduate students, thisis a frustrating divergence from what they used to value. From aneducator's perspective, teaching software architecture requirescontending with the problem of how to express this level ofabstraction practically and also make the learning realistic. Inthis paper, we propose a model adapting the concepts ofexperiential learning …
Teaching Adult Learners On Software Architecture Design Skills, Eng Lieh Ouh, Yunghans Irawan
Teaching Adult Learners On Software Architecture Design Skills, Eng Lieh Ouh, Yunghans Irawan
Research Collection School Of Computing and Information Systems
Software architectures present high-level views ofsystems, enabling developers to abstract away the unnecessarydetails and focus on the overall big picture. Designing a softwarearchitecture is an essential skill in software engineering and adultlearners are seeking this skill to further progress in their career.With the technology revolution and advancements in this rapidlychanging world, the proportion of adult learners attendingcourses for continuing education are increasing. Their learningobjectives are no longer to obtain good grades but the practicalskills to enable them to perform better in their work and advancein their career. Teaching software architecture to upskill theseadult learners requires contending with the problem of …
An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon
An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon
Honors Theses
The setup of a software project can greatly influence how efficiently software can be built. In this paper, I will be discussing my experiences with various software projects and their setups. These experiences will be used as a basis to draw conclusions on the strengths and weaknesses of specific project setups in certain situations.
Because of the complexity of building software, there isn’t a project setup that works optimally for solving every type of software-based problem. The best approach is to know what variations would best fit the situation and make design decisions from there.
A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza
A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza
Computer Science Faculty Publications
This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare. Next, diagrams detailing the expected functionality of infusion pumps in two of the architectures are analyzed. The STRIDE Threat Model is then used to decompose each to determine possible security issues and how they can be addressed. Finally, a comparison of the major security issues in each architecture is presented to help determine which is most adaptable to meet the security needs of cyber-physical systems in healthcare.
A Software Framework For Task Based Performance Evaluation, Justin J. Mackenzie
A Software Framework For Task Based Performance Evaluation, Justin J. Mackenzie
Electronic Thesis and Dissertation Repository
It is difficult to objectively measure performance of complex tasks such as a surgical operation and surgical simulators require the ability to evaluate performance whether to predict surgical outcome, determine competence, provide learning feedback, etc. With no standard software framework for collecting, analyzing and evaluating performance data for complex tasks in simulations, it is investigated whether a solution can be implemented that allows for custom data collection schemes, all while being general enough to be used across many simulation platforms and can be used in a simple simulator.It is also investigated whether the implemented framework can perform its functionality while …
Software Architecture And Development For Controlling A Hubo Humanoid Robot, Manas Ajit Paldhe
Software Architecture And Development For Controlling A Hubo Humanoid Robot, Manas Ajit Paldhe
Open Access Theses
Due to their human-like structure, humanoid robots are capable of doing some complex tasks. Since a humanoid robot has a large number of actuators and sensors, controlling it is a difficult task. For various tasks like balancing, driving a car, and interacting with humans, real-time response of the robot is essential. Efficiently controlling a humanoid robot requires a software that guarantees real-time interface and control mechanism so that real-time response of the robot is possible. Addition- ally, to reduce the development effort and time, the software should be open-source, multi-lingual and should have high-level constructs inbuilt in it.
Currently Robot …
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Jeremy Straub
No abstract provided.
Scalable Correct Memory Ordering Via Relativistic Programming, Josh Triplett, Philip William Howard, Paul E. Mckenney, Jonathan Walpole
Scalable Correct Memory Ordering Via Relativistic Programming, Josh Triplett, Philip William Howard, Paul E. Mckenney, Jonathan Walpole
Computer Science Faculty Publications and Presentations
We propose and document a new concurrent programming model, relativistic programming. This model allows readers to run concurrently with writers, without blocking or using expensive synchronization. Relativistic programming builds on existing synchronization primitives that allow writers to wait for current readers to finish with minimal reader overhead. Our methodology models data structures as graphs, and reader algorithms as traversals of these graphs; from this foundation we show how writers can implement arbitrarily strong ordering guarantees for the visibility of their writes, up to and including total ordering.
Agents And Service-Oriented Computing For Autonomic Computing: A Research Agenda, Frances M.T. Brazier, Jeffrey O. Kephart, H. Van Dyke Parunak, Michael N. Huhns
Agents And Service-Oriented Computing For Autonomic Computing: A Research Agenda, Frances M.T. Brazier, Jeffrey O. Kephart, H. Van Dyke Parunak, Michael N. Huhns
Faculty Publications
Autonomic computing is the solution proposed to cope with the complexity of today's computing environments. Self-management, an important element of autonomic computing, is also characteristic of single and multiagent systems, as well as systems based on service-oriented architectures. Combining these technologies can be profitable for all - in particular, for the development of autonomic computing systems.
Web-Scale Workflow: Integrating Distributed Services, M. Brian Blake, Michael N. Huhns
Web-Scale Workflow: Integrating Distributed Services, M. Brian Blake, Michael N. Huhns
Faculty Publications
Modular applications, components, and services are all ways of describing the product of an organization's efforts to embody its capabilities in autonomous software modules. In fact, the integration of services using well-established workflow paradigms could amplify an organization's capabilities with the creation of a full-blown, inter-organizational system of systems. This is the essence of Web-scale workflows. Considering the recent popularity and acceptance of service-oriented technologies, the application of such distributed systems is only limited by imagination, but it's also important to understand existing research challenges and their implications to various Web-scale workflow domains.
Architectural Assertions: Checking Architectural Constraints At Run-Time, Hyotaeg Jung, Carlos E. Rubio-Medrano, Eric Wong, Yoonsik Cheon
Architectural Assertions: Checking Architectural Constraints At Run-Time, Hyotaeg Jung, Carlos E. Rubio-Medrano, Eric Wong, Yoonsik Cheon
Departmental Technical Reports (CS)
The inability to express architectural concepts and constraints explicitly in implementation code invites the problem of architectural drift and corrosion. We propose runtime checks as a solution to mitigate this problem. The key idea of our approach is to express architectural constraints or properties in an assertion language and use the runtime assertion checker of the assertion language to detect any violations of the constraints. The architectural assertions are written in terms of architectural concepts such as components, connectors, and configurations, and thus they can be easily mapped to or traced back to the original high-level constraints written in an …
Philosophical Agents, John R. Rose, Michael N. Huhns
Philosophical Agents, John R. Rose, Michael N. Huhns
Faculty Publications
Abstraction is the technique we use to deal with complexity. What is the proper kind and level of abstraction for complex software agents? We think it would be reasonable to endow agents with a philosophy. Then, by understanding their philosophies, we can use them more effectively. To endow agents with ethical principles, developers need an architecture that supports explicit goals, principles and capabilities, as well as laws and ways to sanction or punish miscreants. All of the ethical approaches described in this article are single-agent in orientation and encode other agents implicitly.
Adaptation Space: Surviving Non-Maskable Failures, Crispin Cowan, Lois Delcambre, Anne-Francoise Le Meur, Ling Liu, David Maier, Dylan Mcnamee, Michael Miller, Calton Pu, Perry Wagle, Jonathan Walpole
Adaptation Space: Surviving Non-Maskable Failures, Crispin Cowan, Lois Delcambre, Anne-Francoise Le Meur, Ling Liu, David Maier, Dylan Mcnamee, Michael Miller, Calton Pu, Perry Wagle, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Some failures cannot be masked by redundancies, because an unanticipated situation occurred, because fault-tolerance measures were not adequate, or because there was a security breach (which is not amenable to replication). Applications that wish to continue to offer some service despite nonmaskable failure must adapt to the loss of resources. When numerous combinations of non-maskable failure modes are considered, the set of possible adaptations becomes complex. This paper presents adaptation spaces, a formalism for navigating among combinations of adaptations. An adaptation space describes a collection of possible adaptations of a software component or system, and provides a uniform way of …
Porting Chorus To The Pa-Risc: Overall Evaluation, Jonathan Walpole, Marion Hakanson, Jon Inouye, Ravi Konuru
Porting Chorus To The Pa-Risc: Overall Evaluation, Jonathan Walpole, Marion Hakanson, Jon Inouye, Ravi Konuru
Computer Science Faculty Publications and Presentations
This document is part of a series of reports describing the design decisions made in porting the Chorus Operating System kernel to the Hewlett-Packard 9000 Series 800 workstation. This document summarizes the matches and mis-matches between Chorus and the PA-RISC and outlines the general lessons learned during the project.
This document is intended for people who are interested in (a) the separation of machinedependent micro-kernel code from machine-independent micro-kernel code, (b) the interaction between operating system design and the PA-RISC architecture, and (c) the portability ofthe Chorus operating system.
The first report in the series, Porting Chorus to the PA-RISe: …