IEE Proceedings E Computers and Digital Techniques, 1986
ABSTRACT The paper describes the use of APL (a programming language) for the specification of a h... more ABSTRACT The paper describes the use of APL (a programming language) for the specification of a hardware architecture, the description of an initial implementation algorithm, its verification and controlled transformation to a logic design. Because of its power of expression, APL can be used effectively in each of these design domains. The APL interpreter turns any description into an executable prototype. Such a prototype is a powerful tool in the management and execution of a design; it clarifies design choices and assures the logical correctness of the product. This computer-aided-design process, which is illustrated by the design of the front end of a logic analyser, is useful for a variety of design situations, such as LSI/VLSI and computer design.
Proceedings of the ICTs for improving Patients Rehabilitation Research Techniques, 2013
ABSTRACT One of the biggest drivers behind IT-based homecare solutions is the increasing aging po... more ABSTRACT One of the biggest drivers behind IT-based homecare solutions is the increasing aging population. We are specifically interested in "service tailoring" for the homecare domain, where healthcare professionals (care-givers) do the tailoring of services to support elderly (care-receivers). Our goal is that, using our approach, care-givers can create or modify services with less IT skills, time and/or effort, and care-receivers get services that are better suited for their specific and personal needs. As a proof of concept, we developed a software prototype of our approach. The prototype was subsequently used in a real-world field test at a care institution in the Netherlands to validate the approach. The validation focused on the usability aspects of the approach in terms of effectiveness, efficiency, learnability and satisfaction. This paper describes the design of the field test and reflects on the outcome of the validation experiments.
2013 21st IEEE International Requirements Engineering Conference (RE), 2013
ABSTRACT In this paper we consider service-oriented applications composed of component services p... more ABSTRACT In this paper we consider service-oriented applications composed of component services provided by different, economically independent service providers. As in all composite applications, the component services are composed and configured to meet requirements for the composite application. However, in a field experiment of composite service-oriented applications wef found that, although the services as actually delivered by the service providers meet their requirements, there is still a mismatch across service providers due to unstated assumptions, and that this mismatch causes an incorrect composite application to be delivered to end-users. Identifying and analyzing these initially unstated assumptions turns requirements engineering for service-oriented applications into risk analysis. In this paper, we describe a field experiment with an experimental service-oriented homecare system, in which unexpected behavior of the system turned up unstated assumptions about the contributing service providers. We then present an assumptions-driven risk identification method that can help identifying these risks, and we show how we applied this method in the second iteration of the field experiment. The method adapts some techniques from problem frame diagrams to identify relevant assumptions on service providers. The method is informal, and takes the “view from nowhere” in that it does not result in a specification of the component services, but for every component service delivers a set of assumptions that the service must satisfy in order to contribute to the overall system requirements. We end the paper with a discussion of generalizability of this method.
2011 IEEE 15th International Enterprise Distributed Object Computing Conference, 2011
ABSTRACT A business web is a collection of enterprises designed to jointly satisfy a consumer nee... more ABSTRACT A business web is a collection of enterprises designed to jointly satisfy a consumer need. A model that shows the creation, distribution, and consumption of goods or services of economic value in a business web is called value model. The goal of a value model is to help the stakeholders build a shared understanding of the business case and assess the potential profitability of collaboration in the business web. The participating stakeholders in a business web are assumed to act trustfully in the collaboration and therefore trust is left entirely outside the picture. However the assumption that stakeholders act trustfully is often not useful in practice (since there are malicious actors). In this paper we consider business webs from a trust perspective and introduce an approach for measuring the trustworthiness of the stakeholders participating in a business web.
2012 IEEE 16th International Enterprise Distributed Object Computing Conference, 2012
ABSTRACT Two orchestrated processes interacting with each other have to maintain their own states... more ABSTRACT Two orchestrated processes interacting with each other have to maintain their own states. Messages are used to synchronize states between orchestrated processes. Server crash and network failure may result in loss of messages and therefore result in a state change performed by only one party. Thus, the states of the parties are no longer synchronized, resulting in state inconsistencies and in worst case deadlocks. In this paper, we propose a mechanism for guaranteed state synchronization of orchestrated processes with system and network failures. Our mechanism is based on interaction patterns and process transformations. The basic idea is to redesign the original processes into their state synchronization-enabled counterparts via process transformations that can be automated. The transformation mechanism is formalized based on Colored Petri Nets. We present the formal proof of the correctness of our mechanism and give the overhead analysis to illustrate its practicability.
This paper proposes an extension of the UML 2.0 profiling mechanism. This extension facilitates a... more This paper proposes an extension of the UML 2.0 profiling mechanism. This extension facilitates a language designer to introduce composite concepts as separate conceptual and notational elements in a modelling language. Composite concepts are compositions of existing concepts. To facilitate the introduction of composite concepts, the notion of stereotype is extended. This extension defines how a composite concept can be
IEE Proceedings E Computers and Digital Techniques, 1986
ABSTRACT The paper describes the use of APL (a programming language) for the specification of a h... more ABSTRACT The paper describes the use of APL (a programming language) for the specification of a hardware architecture, the description of an initial implementation algorithm, its verification and controlled transformation to a logic design. Because of its power of expression, APL can be used effectively in each of these design domains. The APL interpreter turns any description into an executable prototype. Such a prototype is a powerful tool in the management and execution of a design; it clarifies design choices and assures the logical correctness of the product. This computer-aided-design process, which is illustrated by the design of the front end of a logic analyser, is useful for a variety of design situations, such as LSI/VLSI and computer design.
Proceedings of the ICTs for improving Patients Rehabilitation Research Techniques, 2013
ABSTRACT One of the biggest drivers behind IT-based homecare solutions is the increasing aging po... more ABSTRACT One of the biggest drivers behind IT-based homecare solutions is the increasing aging population. We are specifically interested in "service tailoring" for the homecare domain, where healthcare professionals (care-givers) do the tailoring of services to support elderly (care-receivers). Our goal is that, using our approach, care-givers can create or modify services with less IT skills, time and/or effort, and care-receivers get services that are better suited for their specific and personal needs. As a proof of concept, we developed a software prototype of our approach. The prototype was subsequently used in a real-world field test at a care institution in the Netherlands to validate the approach. The validation focused on the usability aspects of the approach in terms of effectiveness, efficiency, learnability and satisfaction. This paper describes the design of the field test and reflects on the outcome of the validation experiments.
2013 21st IEEE International Requirements Engineering Conference (RE), 2013
ABSTRACT In this paper we consider service-oriented applications composed of component services p... more ABSTRACT In this paper we consider service-oriented applications composed of component services provided by different, economically independent service providers. As in all composite applications, the component services are composed and configured to meet requirements for the composite application. However, in a field experiment of composite service-oriented applications wef found that, although the services as actually delivered by the service providers meet their requirements, there is still a mismatch across service providers due to unstated assumptions, and that this mismatch causes an incorrect composite application to be delivered to end-users. Identifying and analyzing these initially unstated assumptions turns requirements engineering for service-oriented applications into risk analysis. In this paper, we describe a field experiment with an experimental service-oriented homecare system, in which unexpected behavior of the system turned up unstated assumptions about the contributing service providers. We then present an assumptions-driven risk identification method that can help identifying these risks, and we show how we applied this method in the second iteration of the field experiment. The method adapts some techniques from problem frame diagrams to identify relevant assumptions on service providers. The method is informal, and takes the “view from nowhere” in that it does not result in a specification of the component services, but for every component service delivers a set of assumptions that the service must satisfy in order to contribute to the overall system requirements. We end the paper with a discussion of generalizability of this method.
2011 IEEE 15th International Enterprise Distributed Object Computing Conference, 2011
ABSTRACT A business web is a collection of enterprises designed to jointly satisfy a consumer nee... more ABSTRACT A business web is a collection of enterprises designed to jointly satisfy a consumer need. A model that shows the creation, distribution, and consumption of goods or services of economic value in a business web is called value model. The goal of a value model is to help the stakeholders build a shared understanding of the business case and assess the potential profitability of collaboration in the business web. The participating stakeholders in a business web are assumed to act trustfully in the collaboration and therefore trust is left entirely outside the picture. However the assumption that stakeholders act trustfully is often not useful in practice (since there are malicious actors). In this paper we consider business webs from a trust perspective and introduce an approach for measuring the trustworthiness of the stakeholders participating in a business web.
2012 IEEE 16th International Enterprise Distributed Object Computing Conference, 2012
ABSTRACT Two orchestrated processes interacting with each other have to maintain their own states... more ABSTRACT Two orchestrated processes interacting with each other have to maintain their own states. Messages are used to synchronize states between orchestrated processes. Server crash and network failure may result in loss of messages and therefore result in a state change performed by only one party. Thus, the states of the parties are no longer synchronized, resulting in state inconsistencies and in worst case deadlocks. In this paper, we propose a mechanism for guaranteed state synchronization of orchestrated processes with system and network failures. Our mechanism is based on interaction patterns and process transformations. The basic idea is to redesign the original processes into their state synchronization-enabled counterparts via process transformations that can be automated. The transformation mechanism is formalized based on Colored Petri Nets. We present the formal proof of the correctness of our mechanism and give the overhead analysis to illustrate its practicability.
This paper proposes an extension of the UML 2.0 profiling mechanism. This extension facilitates a... more This paper proposes an extension of the UML 2.0 profiling mechanism. This extension facilitates a language designer to introduce composite concepts as separate conceptual and notational elements in a modelling language. Composite concepts are compositions of existing concepts. To facilitate the introduction of composite concepts, the notion of stereotype is extended. This extension defines how a composite concept can be
Uploads
Papers by M. Sinderen