The Changing Nature of Feature Interaction Ken Turner University of Stirling Lydie du Bousquet IMAG Glenn Bruns Bell Labs, Lucent Technologies Luigi Logrippo.

Slides:



Advertisements
Similar presentations
Object-Oriented Application Frameworks Much of the cost and effort stems from the continuous re- discovery and re-invention of core concepts and components.
Advertisements

M-learning thru M-devices- Is it real learning?. Real challenges? Mobility – a fad, trend or a culture? Learning – have we change our learning behaviour?
C MU U sable P rivacy and S ecurity Laboratory Sensor-Based Interactions Kami Vaniea.
Introduction to Software Testing Chapter 9.3 Challenges in Testing Software Test Criteria and the Future of Testing Paul Ammann & Jeff Offutt
1 Luigi Logrippo SITE Feature Interactions as Inconsistencies
Future Internet and Multidisciplinary Research Peter Ljungstrand Interactive Institute Chalmers University of Technology TA2 project.
Java.  Java is an object-oriented programming language.  Java is important to us because Android programming uses Java.  However, Java is much more.
Context and Intent In Call Processing Tom Gray, Ramiro Liscano, Barry Wellman, Anabel Quan Haase, T. Radhakrishnan, Yongseok Choi.
Chapter 15 The Third Component: Powerful Networks.
Principles of Marketing
Testing Components in the Context of a System CMSC 737 Fall 2006 Sharath Srinivas.
Instructor: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Software Systems.
1 Computer Systems & Architecture Lesson 1 1. The Architecture Business Cycle.
Principles of Marketing
BPT 3113 – Management of Technology
 Network Management  Network Administrators Jobs  Reasons for using Network Management Systems  Analysing Network Data  Points that must be taken.
Quantum theory and Consciousness This is an interactive discussion. Please feel free to interrupt at any time with your questions and comments.
Objectives Know why companies use distribution channels and understand the functions that these channels perform. Learn how channel members interact and.
COMPARING THE POLITICAL SYSTEM THROUGH SYSTEMS THEORY
Chapter 1- Introduction
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
Achieving Better Reliability With Software Reliability Engineering Russel D’Souza Russel D’Souza.
LAYING OUT THE FOUNDATIONS. OUTLINE Analyze the project from a technical point of view Analyze and choose the architecture for your application Decide.
Telecom Expense Management Overview Fortune Consulting
Introduction to Software Testing Chapter 9.3 Challenges in Testing Software Test Criteria and the Future of Testing Paul Ammann & Jeff Offutt
Professional English Information Systems and Technologies Professional English Information Systems and Technologies.
Learning Goals Know why companies use distribution channels and understand the functions that these channels perform. Learn how channel members interact.
Architecture Business Cycle
1 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM L E C T U R E
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Semantic-enabled Voice and Data Integration: Telecommunication.
FIW Panel on New Features Asymmetric Demand: Pragmatic vs Semantic Interaction Prof. B. Cohen City University and Boxer Research Ltd.
Module 4: Systems Development Chapter 12: (IS) Project Management.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Basic Concepts Software Architecture. What is Software Architecture? Definition: – A software architecture is the set of principal design decisions about.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
 Architecture and Description Of Module Architecture and Description Of Module  KNOWLEDGE BASE KNOWLEDGE BASE  PRODUCTION RULES PRODUCTION RULES 
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Definition of Technology Technology Components Salient Features of Technology Classification of Technology Concept of Technology Management Nature of.
IT Job Roles & Responsibilities Shannon Ciriaco Unit 2:
IT job research By Megan McGonigle Sources: - responsibilites-explainedhttp://targetcourses.co.uk/study-areas/computer-science-and-it/it-job-roles-and-
Collaborative Data Management Computer Science Department Stanford University.
1 © 2002, Cisco Systems, Inc. All rights reserved. A. Clemm; FIW03 panel Feature interaction in service provisioning Alexander Clemm FIW’03.
1 Representing New Voice Services and Their Features Ken Turner University of Stirling 11th June 2003.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Introduction to the Field of Organizational Behavior.
Smart Call By S. Alex Raj S.Mahesh.
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
Training Workshop on Development of Core Statistical indicators for ICTs Tunisian Experience in ICT indicators Collection. Tunisian presentation June 2005.
1 Luigi Logrippo SITE Feature Interactions as Inconsistencies
How conscious experience and working memory interact Bernard J. Baars and Stan Franklin Soft Computing Laboratory 김 희 택 TRENDS in Cognitive Sciences vol.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
1 Logic issues in policy languages Luigi Logrippo Université du Québec en Outaouais and University of Ottawa Canada.
Communication Methods
DIGITAL ETIQUETTE Teachers Students Quiz What is Digital Etiquette? What is Digital Etiquette? Social Networking Social Networking Cyber Bullying Cyber.
System A system is a set of elements and relationships which are different from relationships of the set or its elements to other elements or sets.
Common Sense Inference Let’s distinguish between: Mathematical inference about common sense situations Example: Formalize theory of behavior of liquids.
Interconnection and Access Presentation by Dale N. Hatfield Chief, Office of Engineering and Technology Federal Communications Commission June 6, 2000.
Electronic Business: Concept and Applications Department of Electrical Engineering Gadjah Mada University.
Chapter 17 Consumer Behavior and Promotion Strategy Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
1 A First Look at Interpersonal Relationships Looking Out, Looking In 12 th Edition  Chapter Summary Why We Communicate The Process of Communication Principles.
Decision Support and Business Intelligence Systems (9 th Ed., Prentice Hall) Chapter 12: Artificial Intelligence and Expert Systems.
Aria Telecom Solutions Pvt. Ltd.
CGS 2545: Database Concepts Fall 2010
MANAGEMENT INFORMATION SYSTEMS
Validating Access Control Policies with Alloy
Chapter 1 – Sociology: A Unique Way to View the World
From Laws to Programs: A Logical Design Approach
Feature Interactions as Inconsistencies
Presentation transcript:

The Changing Nature of Feature Interaction Ken Turner University of Stirling Lydie du Bousquet IMAG Glenn Bruns Bell Labs, Lucent Technologies Luigi Logrippo Université du Québec Mark Ryan University of Birmingham 29th June 2005 Is FI Dead?

Panel Questions

FI - An Outdated Problem? FI research and the FIW conference arose from an immediate and specific technological need: dealing with FI in a very specific telephony architecture (IN) Much FI work was targeted to this need However researchers have been saying all along that this is a general problem

The Death of FI? Is feature interaction dead, rendered obsolete by new kinds of services? Does FI exist in VoIP, IVR, Web, Grid? Is feature interaction meaningful in modern communications systems? Are features an old-fashioned IN concept? Will feature interaction be replaced by new concepts such as policy conflict? Are policies replacing features?

The New Face of FI Is service creation/analysis of greater interest to industry? Create effective services, forget analysis? How can non-functional feature interactions be considered? Are known interactions all just behavioural? Will feature interaction become an issue for endpoints, not the core network? Will networks become simple carriers? Will new techniques alter the nature of FI? What about model-driven architecture, AOP?

Lydie du Bousquet IMAG

FI - A Problem in Telephony Telephone - a safety critical system Widely used POTS + additional features: Developed independently Competitive context Types of interaction: Functional (specification vs. software) Time delay Ergonomics (user vs. software/spec)

FI Meaningful Elsewhere ? FI with car/plane embedded control systems ? Yes maybe (Renault?) FI in classical software development? “Service” is not traditional Components (COTS), Aspects, … FI in web services? Becoming critical/commercial Is there a “basic service” and additional features? FI in ubiquitous software systems? Too soon: not much used and no “basic service” FI in augmented reality ? Too soon: not much used and no “basic service”

Glenn Bruns Bell Labs, Lucent Technologies

Features Understanding “features” as “call processing features in telecommunication systems” is much too narrow Work in Aspect-Oriented Programming should open our eyes to the broad scope that is possible for this field The challenge is to find the fundamental concepts and to see how they are instantiated in different kinds of systems

Economics At Lucent, “fast” trumps “better” This attitude probably makes sense from a business point of view How much does a undesired feature interaction cost?

Culture System DevelopmentComputer Science design analyze hard soft architect systems engineer software developer tester theory, analysis design, application

Answers to the Questions Feature Interaction is not dead – it is being resuscitated Policy Conflict provides a new application area for FI “Traditional” FIs will remain an issue Service Creation has always been of more interest to industry than FI New approaches such as self-provisioning will make things interesting

Luigi Logrippo Université du Québec en Outaouais

Will there still be FI in VoIP? Consider the following situations: a phone can be simultaneously free and busy you can dial a new call when hearing busy you can connect to someone in a blacklist anyone can dial in to an existing conversation an event under the same preconditions can yield different results If all this and more should be tolerated in VoIP, then there is no point looking for FI

The New Importance of Intention Since features are freely programmable in VoIP, there is no technological reason to worry about any of these situations some users may want it that way; who knows... FI must be taken to be the undesirable effects of feature composition What is undesirable depends on user intentions

Intentions, Policies and Their Inconsistencies Some intentions are explicitly stated: these are the policies Some are implicit: expectations about system behavior FIs are inconsistencies that can occur in specific situations among: user policies user intentions

Resolution in context (Tom Gray) Application will be 'embedded' in the larger enterprise or social context. Resolution must be done within the rules or expectations of that context a call from a boss is important a cold call from a salesman is not for a lawyer, a call from a judge's office requires immediate attention The designer must be aware of the sociological expectations that surround the human activity that application is supporting This requires much customization

The World of Web Services: FIs Galore with A Vengeance! A phone can ring wrongly without much harm, but the purchase of an expensive item can’t be cancelled as easily! Forwarding loops: much worse in effects and prevention, e.g. loops of subcontracts can lead to disastrous economic effects Contract interactions: policies of different users clash, making certain contracts impossible, perhaps for futile reasons How to keep user in the loop for meaningful resolution Security gaps in access control

Infinite loops FIs Companies A, B and C have policies where each of them uses the next in a loop as suppliers of parts in excess of inventory This can start a chain reaction with potentially disastrous effects! Send 1000 hockey pucks Send 800 pucks Send 600 pucks Send 400 pucks Send 400 Examples by Tom Gray

Mark Ryan University of Birmingham