Problem Frames 8 - Variant frames. Variants Model Operator Description Connection Control.

Slides:



Advertisements
Similar presentations
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Advertisements

From use cases to classes (in UML). A use case for writing use cases Use case: writing a use case Actors: analyst, client(s) Client identifies and write.
LACP Project Proposal.
CS0004: Introduction to Programming Visual Studio 2010 and Controls.
Use Case & Use Case Diagram
Methods: Deciding What to Design In-Young Ko iko.AT. icu.ac.kr Information and Communications University (ICU) iko.AT. icu.ac.kr Fall 2005 ICE0575 Lecture.
Expert System Human expert level performance Limited application area Large component of task specific knowledge Knowledge based system Task specific knowledge.
1 Model View Controller. 2 Outline Review Definitions of MVC Why do we need it? Administiriva Changing the display Event flow Dragging at interactive.
Knowledge Management for Temporal Abstractions Michael Ramati.
Model Domains and Real Worlds Book: Problem Frames: Analyzing and structuring software development problems Author: Michael Jackson Presenter: Ryan Waggoner.
Interface Guidelines & Principles Responsiveness.
1 Institute for Software Research, International Methods of Software Development Problem Frames 1 (This lecture is largely based on material graciously.
Chapter 1 and 2 Computer System and Operating System Overview
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
EXPERT SYSTEMS Part I.
7M822 Software Requirements A Use Case Approach 14 September 2010.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Collecting primary data through observation
UW CSE 503 ▪ Software Engineering ▪ Spring 2004 ▪ Rob DeLine1 CSE 503 – Software Engineering Lecture 2: Jackson Problem Frames Rob DeLine 31 Mar 2004 Thanks.
I want to test a wound treatment or educational program but I have no funding or resources, How do I do it? Implementing & evaluating wound research conducted.
SECURITY REQUIREMENT FROM PROBLEM FRAMES PERPECTIVE Fabricio Braz 01/25/08.
Use Cases Why use ‘em? How do they work? UC diagrams Using them later in the software development cycle.
Requirements Elicitation. Requirement: a feature or constraint that the system must satisfy Requirements Elicitation: specification of the system that.
Languages and Environments Higher Computing Unit 2 – Software Development.
CS499 Use Cases References From Alistair Cockburn Writing Effective Use Cases (Book) - Use Case.
Security Policy What is a security policy? –Defines what it means for a system to be secure Formally: Partition system into –Secure (authorized) states.
المحاضرة الثالثة. Software Requirements Topics covered Functional and non-functional requirements User requirements System requirements Interface specification.
Btec National Diploma Level 31 IT Systems Troubleshooting and Repair Identify and select remedies.
October 2002J. B. Wordsworth: J2ISDPPS1 Information Systems Development Problem Frames: Problems and Subproblems.
Interaction Modeling. Introduction (1) Third leg of the modeling tripod. It describes interaction within a system. The class model describes the objects.
System Specification Specify system goals Develop scenarios Define functionalities Describe interface between the agent system and the environment.
Requirement Engineering. Review of Last Lecture Problems with requirement Requirement Engineering –Inception (Set of Questions) –Elicitation (Collaborative.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
University of Toronto Department of Computer Science © Steve Easterbrook. This presentation is available free for non-commercial use with attribution.
Section 4.2 AQA Computing A2 © Nelson Thornes 2009 Types of Operating System Unit 3 Section 4.1.
1 Institute for Software Research, International Methods of Software Development Problem Frames 2 (This lecture is largely based on material graciously.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
NDT: Update Duplex Mismatch Detection Rich Carlson Winter Joint Tech February 15, 2005.
©Ian Sommerville 2000Software Engineering, 6th edition. Chapter 19Slide 1 Chapter 19 Verification and Validation.
1 Introduction to Software Testing. Reading Assignment P. Ammann and J. Offutt “Introduction to Software Testing” ◦ Chapter 1 2.
Chapter 3 System Performance and Models Introduction A system is the part of the real world under study. Composed of a set of entities interacting.
Problem Frames 7 - Model domains and real worlds.
Storage Systems CSE 598d, Spring 2007 Rethink the Sync April 3, 2007 Mark Johnson.
Chapter 2: Software Maintenance Omar Meqdadi SE 3860 Lecture 2 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
1 End User Support Introduction Identify and select remedies.
Elevator Example.
Software Quality Assurance and Testing Fazal Rehman Shamil.
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
EFFECTIVE INVESTIGATIONS  DESCRIBE WHAT HAPPENED  IDENTIFY CAUSE OF INCIDENT  IDENTIFY CONTROLS  DEFINE TRENDS  DEMONSTRATE CONCERNS.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Problems and Frames IV Heuristics. Heuristics? Serving or helping to find out or discover; Guidelines; But connotations of trial and error.
AP Statistics Section Statistical significance is valued because it points to an effect that is __________ to occur simply by chance. Carrying out.
OCR A Level F453: The function and purpose of translators Translators a. describe the need for, and use of, translators to convert source code.
LonWorks Introduction Hwayoung Chae.
Unit 1 The Science of Biology Part 1- What is Science?
Introduction to Computer Programming Concepts M. Uyguroğlu R. Uyguroğlu.
1 Ivan Marsic Rutgers University LECTURE 13: Problem Frames Part II: Modeling & Recombination.
Transaction processing systems
Server Upgrade HA/DR Integration
Classifications of Software Requirements
Chapter 4 – Requirements Engineering
Click to edit Master subtitle style
Use Case Model Use case diagram.
Introduction to robotics
The Object-Oriented Thought Process Chapter 05
Chapter 1 Introduction(1.1)
by Xiang Mao and Qin Chen
Professor John Canny Spring 2004 March 5
Error Checking continued
Presentation transcript:

Problem Frames 8 - Variant frames

Variants Model Operator Description Connection Control

Operator Commanded Behavior is the operator variant of Controlled Behavior Control machine Operator C B E4RM!E2 C3 Commanded Behavior Control machine Control Domain C CD!C2 C3 Required Behavior CM!C1 Control Domain CM!C1 CD!C2

Commanded Information Answering machine Operator C B Y4 Op!E5 C2 Commanded Information Display AM!E3 RW!C1 C Real World E5

Commanded Workpiece? Weird machine Operator B B E3 Op!E5 Y4 Commanded Behavior User US!E3 WM!E1 X Work Pieces E5 WP!Y2

Concern of operator variant Reject commands that are not sensible or not viable Carry out commands that are sensible and viable

Description variant Model variant makes a lexical domain that describes part of a domain Description variant makes a lexical domain that describes part of the requirement Description domain is a set of rules that machine will interpret A virtual machine!

Regulated One Way Lights Regulated Controller C ER!{Phase,Duration}ER!{Char} LU! {Go(I),Stop(I)} Conformity to regime Light Units RC! {Rpule(I),Gpulse(I)} Encoded regime LU! {Go(I),Stop(I)}

Device Failure Detection Failure Detector C Report AD failure ICU Patients Patient Constraints C Failure Report C Analog devices

Description Concern Must design description Requirements defines how to interpret description How does machine get new description? –Often there is another machine that edits it

Connection variants Connection domain is between the machine and the domain that the requirements are about (the remote domain) New domains Changes specification of machine Does not change requirements

Library controller Members and candidates Library staff c Membership rules Library controller Members and candidates Membership rules

Payroll System Payroll forms Output C C d a b c Requirements for payroll

Connection concerns Loss of information Errors

Control variants For each shared event, –Which domain controls type? –Which domain controls time? –Which domain controls who participates? Reading a file –Machine controls time and participants –Workpiece controls the value (type of event)

Control variant Usage analyzer ISP Software a a: IS! {ISPOpen,ISPClose,ISPWrite} Usage analyzer Logfiles a a: UA! {OpenLF, ReadLF} LF! {LogRecord(Read)}

Conclusions Most variants add a domain Variants have their own concerns

Particular Concerns Problem Frames: Ch. 9

Concerns Questions to ask Crucial in understanding the problem Frame concerns Variant concerns Particular concerns

Particular Concerns Concerns about a particular problem, not about a particular problem frame. Overrun Initialization Reliability Identities Completeness

Overrun A domain’s ability or inability to respond to each externally controlled event before the next event occurs. Occurs when there is a mismatch of speeds at a domain interface. –Machine too fast –Machine too slow

Strategies for slow machines Simple inhibition - the machine inhibits the shared events whenever it is not ready Ignoring - the machine ignores shared events whenever it is not ready Buffering - the machine buffers shared events whenever it is not ready, and participates later

Initialization Machine has initial state Problem has initial state –only start machine when domain is in proper state –machine sets state of the domain –machine learns state of the domain Model has initial state

Reliability What happens when domain violates its description? Importance depends on –Likelihood of failure –Cost of failure

Reliability Separate problem of normal operation from problem of reliability Detection Diagnosis Repair

Identities Identities concern is when the machine has an interface of shared phenomena with a set of individuals that –are not connected into any structure that identifies them and –do not identify themselves.

Identities Add a structure that identifies individuals Model –must be initialized –must be maintained

Completeness Does the machine do everything it is supposed to? Does a finite-state machine define what happens for every possible event? Does the description cover a large enough span?

Increasing Description Scope Widen participation –X can do Y What else can it do? Can anything else do Y? Complementary events –For each event, can the opposite event happen?

Particular Concerns Probably more A way to discover questions to ask Knowledge of experts