Modeling Visibility in Hierarchical Systems Debmalya Biswas INRIA, France K. Vidyasankar Memorial University, Canada.

Slides:



Advertisements
Similar presentations
COSC2007 Data Structures II Chapter 10 Trees I. 2 Topics Terminology.
Advertisements

Discrete Event Control
1 Ivan Marsic Rutgers University LECTURE 15: Software Complexity Metrics.
Sorting Comparison-based algorithm review –You should know most of the algorithms –We will concentrate on their analyses –Special emphasis: Heapsort Lower.
Modeling & Simulation. System Models and Simulation Framework for Modeling and Simulation The framework defines the entities and their Relationships that.
Modeling Main issues: What do we want to build How do we write this down ©2008 John Wiley & Sons Ltd. vliet.
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
A SLA evaluation Methodology in Service Oriented Architectures V.Casola, A.Mazzeo, N.Mazzocca, M.Rak University of Naples “Federico II”, Italy Second University.
6/1/2015Ch.31 Defining Enterprise Architecture Bina Ramamurthy.
Chapter Chapter 13-2 Chapter 13 Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using Rea Creating Database Tables.
Sorting Heapsort Quick review of basic sorting methods Lower bounds for comparison-based methods Non-comparison based sorting.
Dynamic policies through context-sensitive situations Opher Etzion IBM Research Laboratory in Haifa.
Lists A list is a finite, ordered sequence of data items. Two Implementations –Arrays –Linked Lists.
Social Networks: Advertising, Pricing and All That Zvi Topol & Itai Yarom.
Chapter 12 Trees. Copyright © 2005 Pearson Addison-Wesley. All rights reserved Chapter Objectives Define trees as data structures Define the terms.
WebDynpro for ABAP Short introduction.
XML –Query Languages, Extracting from Relational Databases ADVANCED DATABASES Khawaja Mohiuddin Assistant Professor Department of Computer Sciences Bahria.
Information Theory and Security
Two Discrete Optimization Problems Problem: The Transportation Problem.
1 Requirements Analysis and Design Engineering Southern Methodist University CSE 7313.
WMS systems manage and coordinate several independent subtasks. The coordination problems get even more serious when the subtasks are performed on separate.
UML’s StateChart FSM, EFSM in UML Concurrent states Tool support.
E-Science Meeting April Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
Trees. Introduction to Trees Trees are very common in computer science They come in different forms They are used as data representation in many applications.
DATABASEMODELSDATABASEMODELS  A database model ◦ defines the logical design of data. ◦ Describes the relationships between different parts of data.
AXML Transactions Debmalya Biswas. 16th AprSEIW Transactions A transaction can be considered as a group of operations encapsulated by the operations.
Created on 29/10/2008yahaya.wordpress.com1 Trees Another common nonlinear data structure is the tree. We have already seen an example of a tree when we.
Copyright 2002 Prentice-Hall, Inc. Chapter 2 Object-Oriented Analysis and Design Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Binary Trees. Binary Tree Finite (possibly empty) collection of elements A nonempty binary tree has a root element The remaining elements (if any) are.
Modeling Shari L. Pfleeger and Joanne M. Atlee, Software Engineering: Theory and Practice, 4 th edition, Prentice Hall, Hans Van Vliet, Software.
© Pearson Education Limited, Chapter 7 Entity-Relationship modeling Transparencies.
Requirements Analysis and Design Engineering Southern Methodist University CSE 7313.
Advanced Accounting Information Systems Day 7 Database Modeling.
Database Design – Lecture 18 Client/Server, Data Warehouse and E-Commerce Database Design.
I.H. TorosluESSW Workshop Budapest May 20, A Semantic based Privacy Framework for Web Services Arif Tumer, Asuman Dogac, Hakki Toroslu Middle East.
Chapter 4-1. Chapter 4-2 Chapter 4: Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using REA Creating Database Tables.
Chapter 2 : Entity-Relationship Model Entity Sets Relationship Sets Design Issues Mapping Constraints Keys E-R Diagram Extended E-R Features Design of.
Trees CS 105. L9: Trees Slide 2 Definition The Tree Data Structure stores objects (nodes) hierarchically nodes have parent-child relationships operations.
Ch 8. Graphical Models Pattern Recognition and Machine Learning, C. M. Bishop, Revised by M.-O. Heo Summarized by J.W. Nam Biointelligence Laboratory,
(c) Addison Wesley Copyright © 2000 by Addison Wesley Version 1.0
Algorithmic Detection of Semantic Similarity WWW 2005.
System Testing Beyond unit testing. 2 System Testing Of the three levels of testing, system level testing is closest to everyday experience We evaluate.
UML’s StateChart FSM, EFSM in UML Concurrent states Tool support.
Foundation of Computing Systems
M180: Data Structures & Algorithms in Java Trees & Binary Trees Arab Open University 1.
An Optimal Certificate Dispersal Algorithm for Mobile Ad Hoc Networks Nagoya Institute of Technology Hua Zheng Shingo Omura Jiro Uchida Koichi Wada.
Data Structures Lakshmish Ramaswamy. Tree Hierarchical data structure Several real-world systems have hierarchical concepts –Physical and biological systems.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
BINARY TREES Objectives Define trees as data structures Define the terms associated with trees Discuss tree traversal algorithms Discuss a binary.
Modeling Shari L. Pfleeger and Joanne M. Atlee, Software Engineering: Theory and Practice, 4 th edition, Prentice Hall, Hans Van Vliet, Software.
1 Functional Modeling Lecture # Recap We had talked about object-oriented static modeling in quite detail We had developed a OO static model of.
CSC 213 – Large Scale Programming. Trees  Represent hierarchical relationships  Parent-child basis of this abstract data type  Real-world example:
Lecture # 14 Chapter # 5 The Relational Data Model and Relational Database Constraints Database Systems.
1 Visual Computing Institute | Prof. Dr. Torsten W. Kuhlen Virtual Reality & Immersive Visualization Till Petersen-Krauß | GUI Testing | GUI.
What is a Tree? Formally, we define a tree T as a set of nodes storing elements such that the nodes have a parent-child relationship, that satisfies the.
Use Case Diagrams A Detailed Description. Use Case Diagrams Use case diagrams describe relationships between users and use cases A use case is a (usually.
A Context Framework for Ambient Intelligence
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Main issues: • What do we want to build • How do we write this down
Binding and Execution of Web Service Compositions
Entity-Relationship Model
UML’s StateChart FSM, EFSM in UML Concurrent states Tool support.
Air France Reservations Phone Number
Entity-Relationship Model
Secure Electronic Transaction (SET) University of Windsor
Entity – Relationship Model
Week nine-ten: Trees Trees.
Systems Analysis and Design I
Data Models in DBMS A model is a representation of reality, 'real world' objects and events, associations. Data Model can be defined as an integrated collection.
Presentation transcript:

Modeling Visibility in Hierarchical Systems Debmalya Biswas INRIA, France K. Vidyasankar Memorial University, Canada

Dec 2006DASI, Italy2 Hierarchical Systems Rooted trees Nodes represent entities Edges represent binary relationships between entities Motivational scenario – Hierarchical Web Services Compositions

Dec 2006DASI, Italy3 Web Services Composition Composition relates to dealing with the assembly of autonomous components so as to deliver a new service out of the existing services.

Dec 2006DASI, Italy4 Hierarchical Composition Hierarchical composition refers to the ability to form a composite service by combining already existing services, which themselves might be composed of other composite/primitive services. Composite Travel & Shipping Service Composite Travel Booking Service Shipping Service Flight Booking ServiceHotel Booking Service

Dec 2006DASI, Italy5 Hierarchical Systems Rooted trees Nodes represent entities Edges represent binary relationships between entities Motivational scenario – Hierarchical Web Services Compositions Nodes are services Edges are parent-child relationship of a service invoking another service

Dec 2006DASI, Italy6 Need for Nontrivial Visibility Not just between parent and children Arbitrary visibility, without any restriction, may not be acceptable In dynamic and heterogeneous environments, trust, autonomy, etc. force selective visibility Very important in large scale systems with hundreds of entities

Dec 2006DASI, Italy7 Fig. courtesy of “Y. Brave, M. Heymann. Control of Discrete Event Systems Modeled as Hierarchical State Machines. In proceedings of 30 th Conference on Decision & Control, 91.”

Dec 2006DASI, Italy8 Visibility For a pair of providers X-Y in the hierarchy, we would like to capture if X can see Y, i.e., if X has visibility over Y. In a general setting, X has visibility over Y if − X wishes to see Y: X may be interested in Y due to functional (get input, send output/notification) or non-functional (transactions, monitoring, end-user interaction) requirements. − Y does not have any objections to X seeing it: Security, privacy, confidentiality, etc. issues play an important role in determining the visibility allowed by a provider. − Remaining nodes in the hierarchy do not have any objections to X seeing Y: Contractual agreements between Y and another node Z may have a bearing on X seeing Y.

Dec 2006DASI, Italy9 E-shopping scenario

Dec 2006DASI, Italy10 E-shopping scenario (contd.) The store S has visibility over its parent and all its children. It does not have visibility over (its descendents) the courier companies C-A and C-B used for the shipment.

Dec 2006DASI, Italy11 E-shopping scenario (contd.) The courier company C-B has visibility of all its ancestors, namely, S-B, S and U, to keep them informed of the delivery status – strong visibility.

Dec 2006DASI, Italy12 E-shopping scenario (contd.) However, the bonus air miles processing unit B has visibility over only the card company H and customer U. It is only concerned with the customer's credit card number and the purchase amount without any need to know the context, namely, the goods purchased and the store. - weak visibility

Dec 2006DASI, Italy13 E-shopping scenario (contd.) Partial visibility

Dec 2006DASI, Italy14 Spheres of Visibility (SoV) In the SoV of X, in addition to the nodes visible to X, we capture their "type of visibility". Let V [X,Y] denotes the type of visibility X has over Y. If V [X,Y] has some edges, then X has a partial strong reference to Y. If V [X,Y] is H[X,Y], that is, it has all the nodes and edges in the path from X to Y, then X has a strong reference to Y. X has a weak visibility (or weak reference) to any node Y that is visible to X.

Dec 2006DASI, Italy15 Coherence For each pair of nodes X and Z, for every node Y in the path from X to Z, Coherence: the strength of visibility of X over Y is at least as much as the strength used for visibility of X over Z. X Y Z

Dec 2006DASI, Italy16 Correlation For each pair of nodes X and Z, for every node Y in the path from X to Z, Coherence: the strength of visibility of X over Y is at least as much as the strength used for visibility of X over Z. Correlation: the strength of visibility of Y over Z is at least as much as the strength used for visibility of X over Z. X Y Z

Dec 2006DASI, Italy17 Coherence – Correlation We show that the two properties, the SoV’s of all the nodes in a hierarchy H are (i) coherent and (ii) correlated, are orthogonal, i.e., independent of each other.

Dec 2006DASI, Italy18 Sphere of Noticeability (SoN) SoN(X) captures: Which nodes have visibility over X? What type (strength) of visibility they have of X? An obvious application of SoN is for change management. For example, a provider X notifying the providers, who have visibility over X, when there is some change in the provider URI (provider details), metrics used to compute the service (service details), log format (execution details), etc.

Dec 2006DASI, Italy19 Relationship - SoV and SoN Weak reference, partial strong reference, strong reference, coherence, correlation properties for SoN can be defined analogous to those for SoV. Property: In a hierarchy H, a Visibility assignment is coherent if and only if the corresponding Noticeability assignment is correlated, and vice versa.

Dec 2006DASI, Italy20 THANK YOU References D. Biswas, K. Vidyasankar, “Modeling Visibility in Hierarchical Systems”, In proc. of ER 06, LNCS 4215, pp D. Biswas, K. Vidyasankar, “Spheres of Visibility”, In proc. of the 3 rd IEEE European Conf. on Web Services (ECOWS) 05, pp Contact: