2013. 5. 1. 이지완 A Degree Centrality-Based Approach to Prioritize Interactions of Component-Based Systems.

Slides:



Advertisements
Similar presentations
Systems Development Environment
Advertisements

Conceptualizing & Initializing the IT Project
Cognitive Engine Development for IEEE Lizdabel Morales April 16 th, 2007
Relationship Mining Network Analysis Week 5 Video 5.
FPGA Latency Optimization Using System-level Transformations and DFG Restructuring Daniel Gomez-Prado, Maciej Ciesielski, and Russell Tessier Department.
Process Improvement.
8.
Project Management Outline of Chapters 1-6. Chapter 1 – Project Management Concepts Definition of a project and its attributes Key constraints within.
Software Testing and Quality Assurance
Reporter : Mac Date : Multi-Start Method Rafael Marti.
The Impact of Spatial Correlation on Routing with Compression in WSN Sundeep Pattem, Bhaskar Krishnamachri, Ramesh Govindan University of Southern California.
Requirements Engineering Processes
Jump to first page 30/06/ Chapter 1 System Development Environment.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Galin, SQA from theory to implementation © Pearson Education Limited Chapter 13 CASE Tools and their Effect on Software Quality.
Software Verification and Validation (V&V) By Roger U. Fujii Presented by Donovan Faustino.
Methodology for Architectural Level Reliability Risk Analysis Lalitha Krothapalli CSC 532.
1 Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction Zequian shen, Kwan-Liu Ma, Tina Eliassi-Rad Department.
Quality Assurance for Component- Based Software Development Cai Xia (Mphil Term1) Supervisor: Prof. Michael R. Lyu 5 May, 2000.
Independent Verification and Validation (IV&V) Techniques for Object Oriented Software Systems SAS meeting July 2003.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Chapter 10 Information Systems Analysis and Design
Odyssey A Reuse Environment based on Domain Models Prepared By: Mahmud Gabareen Eliad Cohen.
Software Architecture in Practice Architectural description (The reduced version)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Social Networks: Agent-based Modelling and Social Network Analysis with PAJEK ESRC Research Methods Festival, Oxford, 17 th-20th July 2006, & Oxford Spring.
Presentation: A measure of betweenness centrality based on random walks M.E.J. Newman ELSEVIER Social Networks November 2004 A measure of betweenness centrality.
A Graph Based Algorithm for Data Path Optimization in Custom Processors J. Trajkovic, M. Reshadi, B. Gorjiara, D. Gajski Center for Embedded Computer Systems.
Hubba: Hub Objects Analyzer—A Framework of Interactome Hubs Identification for Network Biology 吳 信 宏, Hsin-Hung Wu Laboratory.
Approaches to Systems Development
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
NGMAST 2008 A Proactive and Distributed QoS Negotiation Approach for Heterogeneous environments Anis Zouari, Lucian Suciu, Jean Marie Bonnin, and Karine.
Chapter 3: Software Project Management Metrics
Using Social Network Analysis Methods for the Prediction of Faulty Components Gholamreza Safi.
GSAF: A Grid-based Services Transfer Framework Chunyan Miao, Wang Wei, Zhiqi Shen, Tan Tin Wee.
MHEDIC Structure and Accomplishments Naorah Lockhart, Liz Mellin, Paul Flaspohler, & Seth Bernstein.
Lecture 14 22/10/15. The Object-Oriented Analysis and Design  Process of progressively developing representation of a system component (or object) through.
CDU – School of Information Technology HIT241 Integration Management - Slide 1 HIT241 - Project Integration Management Introduction Project Integration.
Requirement Engineering with URN: Integrating Goals and Scenarios Jean-François Roy Thesis Defense February 16, 2007.
On the Benefits of Planning and Grouping Software Maintenance Requests CSMR – Oldenburg, Germany, March 2011 Gladston Aparecido Junio (PUC Minas, Brazil)
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
1 Minimum Interference Algorithm for Integrated Topology Control and Routing in Wireless Optical Backbone Networks Fangting Sun Mark Shayman University.
May 7-8, 2007ICVCI 2007 RTP Autonomic Approach to IT Infrastructure Management in a Virtual Computing Lab Environment H. Abdel SalamK. Maly R. MukkamalaM.
CASE Tools and their Effect on Software Quality
PROCESS ASSESSMENT AND IMPROVEMENT. Process Assessment  A formal assessment did not seem financially feasible at the onset of the company’s process improvement.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Visualization in Process Mining
Presented by Edith Ngai MPhil Term 3 Presentation
Presented by: Saurav Kumar Bengani
Trustworthiness Management in the Social Internet of Things
Hydra: Leveraging Functional Slicing for Efficient Distributed SDN Controllers Yiyang Chang, Ashkan Rezaei, Balajee Vamanan, Jahangir Hasan, Sanjay Rao.
Role of the Systems Analyst
E-Commerce Theories & Practices
MBI 630: Systems Analysis and Design
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
Chapter 1 (pages 4-9); Overview of SDLC
MBML_Efficient Testing Methodology for Machine Learning
University of Houston-Clear Lake
Centralities (4) Ralucca Gera,
Predict Failures with Developer Networks and Social Network Analysis
Chapter 20 Object-Oriented Analysis and Design
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
Introduction to Software Engineering
Upside Software Development Process
TDT4252 Modelling of Information Systems Advanced Course
Graph Homomorphism Revisited for Graph Matching
Quality Assurance for Component-Based Software Development
Methodology for Architectural Level Reliability Risk Analysis
Presentation transcript:

이지완 A Degree Centrality-Based Approach to Prioritize Interactions of Component-Based Systems

Outline Introduction Related work Interaction prioritization process Hotel reservation system – make reservation use case Conclusion and future works 2

Introduction It is desirable to prioritize requirements and testing activities –for a better management of the traditional large and complex software applications Similarly, a CBS consists of a large number of interactions between selected components. There is a need to prioritize the component interactions with potential advantages –integration testing process –reduction in the overall development cost of a CBS The contribution is the development of a ranking process –provides an in­ depth understanding of individual interactions among selected components of a CBS and uses it to prioritize system use case scenarios. 3

Related work-component integration The interaction between components plays a key role –requirements analysis and component selection of a CBS. Adapters and wrappers are the oldest component integration techniques. Vigder and Dean [8] presented the concept of wrappers to isolate the underlying components from other components in the system and glue these components by considering the elements of architecture during the integration process. Rine et al. [9] proposed the use of adapters to integrate components. Each component has an associated adapter and components request services from each other through their associated adapters. 4

Related work-use case prioritization Moisiadis [14] has proposed a set of usage metrics based on the frequency of an actor in each step in the use case, dependencies among the use cases and degree of satisfaction achieved –by a use case for a given set of business goals of a software application. Garcia et al. [6] presented a method for computing the criticality of use cases based on the criticality levels of a set of factors Similarly, Kundu and Samanta [15] proposed a new approach of prioritizing use cases by focusing on criticality of a scenario path The criticality of a scenario path is calculated –by first converting a use case scenario into a scenario graph –prioritizing scenarios based on the scenario prioritization metrics. 5

Interaction prioritization process To the best of our knowledge –none of the existing work presents a methodology to prioritize component interactions of a CBS. System analysts are interested in prioritization of component interactions to help identify which individual interactions are more important than other. To prioritize CBS interactions as follows: –Construct the Component Interaction Graph (CIG) for a use case of the CBS. –Calculate the degree centrality for the edges (interactions) in the CIG using equation (1). –Calculate the centrality of each use case scenario using equation (2). Prioritize the use case scenarios of the CBS based on the degree centrality values. 6

Interaction prioritization process Component Interaction Graph 7

Interaction prioritization process Component Interaction Graph 8

Interaction prioritization process Degree Centrality Measure for CIG –Centrality measures have been widely used in a number of disciplines sociology, biosciences and project scheduling –Degree centrality calculates the importance of a node in a network by considering the number of other nodes con­nected to it –However, the classical notion of degree centrality is a node-based measure. –So, authors define Edge Degree Centrality (EDC) 9

Interaction prioritization process Scenario Prioritization Measure –Centrality Measure(CM) Measures extent utilize the interactions of the scenario S c = (x 1, x 2, …, x n ) be a scenario in G G = component interaction graph 10

Hotel reservation system – make reservation use case 11

Hotel reservation system – make reservation use case 12

Conclusion and Future works Contribution –New technique to prioritize component interaction of a CBS Introduce notion –Component Interaction Graph –Edge Degree Centrality Potential to help system integrators in better understanding –Component interaction, planning the integration, testing and maintenance phases of a CBS development life cycle Future works –To extend interaction prioritization technique –To develop a CBS integration testing framework using interaction prioritization concept 13

Q&A 14

Proposal 이 논문의 개선 ( 안 ) – 랭킹 매커니즘의 개선 (maintenance view) –E.g. component interaction 한계점 Scenario1: A  B  F Scenario2: A  C  F S1 이 S2 보다 interaction 이 많다. 그러나 S2 가 CBS 시스템에서 더 중요한 역 할을 할 수 있다. –Naïve approach Give additional weight to important work(scenario) 15 A B E D FC