04-28-11 | 1 › Matthias Galster, University of Groningen, NL › Armin Eberlein, American University of Sharjah, UAE Identifying Potential Core Assets in.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Retail Store. Retail Store Solution.
Advertisements

Guidebook for Risk Analysis Tools and Management Practices to Control Transportation Project Costs Keith R. Molenaar, PhD Stuart D. Anderson, PhD, PE Transportation.
ALGORITHMS - PART 2 CONDITIONAL BRANCH CONTROL STRUCTURE
Justification-based TMSs (JTMS) JTMS utilizes 3 types of nodes, where each node is associated with an assertion: 1.Premises. Their justifications (provided.
Vodacom Microsoft Hosted Lync
Mike Pluke1 Universal Communications Identifier (UCI) and the power of profiles Mike Pluke Castle Consulting Ltd. ETSI TC HF & STF265.
ESI Phone System Training Adcom/Valentine Systems
Lecture # 2 : Process Models
Student Version.
SharePoint slide libraries II: Use slides in the slide library MICROSOFT ® OFFICE SHAREPOINT ® SERVER 2007 TRAINING ADVANTAGE TALENT, INC. “Professionals.
Feature requests for Case Manager By Spar Nord Bank A/S IBM Insight 2014 Spar Nord Bank A/S1.
| 1 › Department of Mathematics and Computing Science, Software Engineering and Architecture Group / Matthias Galster Describing Variability in.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Component-specific usability testing Dr Willem-Paul Brinkman Lecturer Department of Information Systems and Computing Brunel University
1 Location-Based Services Using GSM Cell Information over Symbian OS Final Year Project LYU0301 Mok Ming Fai (mfmok1) Lee Kwok Chau (leekc1)
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
14-Jul-15 State Machines Abbreviated lecture. 2 What is a state machine? A state machine is a different way of thinking about computation A state machine.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Network security policy: best practices
Telephone Training M3904 Telephone Set IT Support Center
Segmentation Analysis
Sales Force Automation and Automated Customer Service Centers
Automatic Gender Identification using Cell Phone Calling Behavior Presented by David.
ClearPath Hosted MVP Web Portal 1. Log In Page Users are able to access the Web Portal by using their assigned user name and password. Access Web Browser.
SECTION 2: Digital Value Chain, E-Business Models Teemu Hakolahti
Coordinating COTS Applications via a Business Event Layer Presented By: Maria Baron Written By: Lemahieu, Snoeck, Goethals, De Backer, Haesen, Vandenbulcke.
DEVELOPMENT OF PERFORMANCE MEASUREMENT SYSTEM ACCORDING TO BUSINESS ENVIRONMENT: AN SME PERSPECTIVE Lina Kloviene, Kaunas University of Technology, 2013.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
1SSPD Back to Jackson Consider how JSP views programming- –Describe structure I/O datastreams –Combine to produce a program structure –List operations.
Auto Technologies Inc. Auto Technologies Call Cap Telemanagement System “ATTS”
Defining Digital Forensic Examination & Analysis Tools Brian Carrier.
1 CMPT 275 Software Engineering Requirements Analysis Phase Requirements Analysis Activity (Identifying Objects, Scenarios) Janice Regan,
SWE © Solomon Seifu ELABORATION. SWE © Solomon Seifu Lesson 10 Use Case Design.
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
a guidance to conversion
“A.T.T.S.” Never Miss A Call! Automated Tracking Telemanagement System.
 cognovís 2008 ]project-open[ meets XoTCL ]po[ dynfields XoDynfields ]po[ contacts XoTCL ]po[ projects ]po[ categories OpenACS XoDynfields.
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Technology and Science, Osaka University Dependence-Cache.
| 1 › Matthias Galster, University of Groningen, NL › Armin Eberlein, American University of Sharjah, UAE Facilitating Software Architecting by.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
An Object-Oriented Approach to Programming Logic and Design Fourth Edition Chapter 4 Looping.
Program #2 Cell Phone Usage ….Let’s start with understanding the problem!
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
13-Nov-1513-Nov-1513-Nov-15 State Machines. What is a state machine? A state machine is a different way of thinking about computation A state machine.
PSTN SERVICES. Lecture Overview POTS Integrated Services Digital Network Business Services Service Provider services.
Introduction to soarchitect. agenda SOA background and overview transaction recorder summary.
Model View Controller MVC Web Software Architecture.
Database Management Supplement 1. 2 I. The Hierarchy of Data Database File (Entity, Table) Record (info for a specific entity, Row) Field (Attribute,
Conceptual design Tells the customer what the system will do Tells the customer what the system will do Answers: Answers: Where will the data come from?
Intermediate 2 Computing Unit 2 - Software Development.
Chapter More on Classes Intro to Computer Science CS1510, Section 2 Dr. Sarah Diesburg.
1 CA202 Spreadsheet Application Focusing on Specific Data using Filters Lecture # 5.
Federal Land Manager Environmental Database (FED) Overview and Update June 6, 2011 Shawn McClure.
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
Aksel Thomsen Erik Sommer
Systems Design: Activity Based Costing
Chapter 25: Architecture and Product Lines
Unit4 Customer Portal Submitting & Managing Cases.
Unit4 Partner Portal for Case Creator
Service Oriented Architecture for Cloud Based Travel Reservation Software as a Service Comp 684 – Rayna Burgess.
Handling Data Using Spreadsheets
Activity Based Costing
Probabilistic Databases
State Machines 6-Apr-196-Apr-19.
State Machines 8-May-19.
Systems Design: Activity Based Costing
State Machines 16-May-19.
Observe, Absorb and Adapt
Connect Client Training
Presentation transcript:

| 1 › Matthias Galster, University of Groningen, NL › Armin Eberlein, American University of Sharjah, UAE Identifying Potential Core Assets in Service- based Systems to Support the Transition to Service-oriented Product Lines

| 2 Research problem ›Different instances of a SOA system can be treated as product line To handle different instances To support variability management ›But: how to make the transition from individual products to a product line?

| 3 Research question ›What services should be included in what instance of a service-based system so that value can be maximized stability is maintained

Background and related work ›Product lines and service-oriented systems, e.g., Service-oriented PL architectures Feature analysis to identify services for SO systems ›Transition to PL and identifying core assets, e.g., Core assets as foundation for new PL architecture Components reused on PL Feature orientation | 4

Proposed approach | 5

Step 1: determine available services ›What services are still available? ›S’ v with S’ v = S \ S v ›S: set of all services ›S v : set of services already assigned to an instance v

Step 2: prioritize available services ›S’ v is sorted in decreasing order ›If services have the same value  order is chosen randomly

Step 3: select services (I) ›Trade-off between stability and accumulated added value ›stability v (i) = 1 – [i / (M + i)](1) ›AAV v (i) =  k=1..i value(s k )(2)

Step 3: select services (II) Definition: I = number of services in S ’ v Input: S ’ v (sorted), S v, M = sizeOf( S v ) Output: S ’’ v (resulting list of services; initialized empty) copy S v into S ’’ v k = 0 /* counter for added services is 0 */ for i = 1 to I add S ’ v (i) to S ’’ v k = k + 1 /* service is added */ calculate stability v of S ’’ v using (1) calculate AAV v of S ’’ v using (2) normalize stability v and AAV v endfor Determine i so that ( i, AAV v ( i )) and ( i, stability v ( i )) are closest to each other to represent the best compromise (trade-off)

Step 4: determine core asset services ›S ca = S’’ 1  S’’ 2  S’’ 3  …  S’’ V (3) ›S ca : services that could form basis for a product line

Case study ›“Exploratory” case study No proposition ›Identification of web services that could form the foundation for a service-based product line Web services of telecom company

Case study settings – services ServiceDescriptionValue s1s1 Display name and number of caller20 s2s2 Alerts incoming calls when on the phone15 s3s3 Takes messages when call is not answered17 s4s4 Forwards incoming calls to pager, cell phone, voice mail or any other phone number12 s5s5 Intercepts calls from pre-selected numbers and routes them to a standard recording5 s6s6 Provides a second phone number on existing line, with distinctive ring12 s7s7 Prompts anonymous callers to unblock phone number or say their name5 s8s8 Lets restrict selected outbound calls10 s9s9 Shows names and numbers of incoming callers when on the phone0 s 10 Prevents own name / number from being shown when calling somebody with call display0 s 11 Allows to trace last incoming call in the event of threatening, harassing, or obscene phone calls0 s 12 Lets add a third party to call4 s 13 Lets monitor a busy line to get in touch with caller when line is free4

Case study settings – initial SOA instances ServiceCustomer 1 (S 1 )Customer 2 (S 2 )Customer 3 (S 3 ) s1s1  s2s2  s3s3  s4s4 s5s5  s6s6 s7s7 s8s8 s9s9  s 10  s 11  s 12  s 13 

Case study: step 1 – identify services ›S’ 1 = S \ S 1 = S \ {s 3, s 9, s 10, s 11, s 13 } = {s 1, s 2, s 4, s 5, s 6, s 7, s 8, s 12 } “inverse” of columns from previous slide ›S’ 2 = S \ S 2 = S \ {s 2, s 3, s 5, s 9, s 10, s 11, s 12 } = {s 1, s 4, s 6, s 7, s 8, s 13 } ›S’ 3 = S \ S 3 = S \ {s 1, s 3, s 9, s 11 } = {s 2, s 4, s 5, s 6, s 7, s 8, s 10, s 12, s 13 }

Case study: step 2 – prioritize services ›Available services are ranked based on value Rank S’1S’1 S’2S’2 S’3S’3 1s1s1 s1s1 s2s2 2s2s2 s4s4 s4s4 3s4s4 s6s6 s6s6 4s6s6 s8s8 s8s8 5s8s8 s7s7 s5s5 6s5s5 s 13 s7s7 7s7s7 -s s s 10

Case study: step 3 – select services (I) ›Trade-off analysis for instance 1

Case study: step 3 – select services (II) ›Illustration of the algorithm for instance from previous slide i (number of added services)Added serviceIncrease in AAV (normalized)Decrease in stability 1s1s1 norm (20) = 0 norm (0.84) = s 1, s 2 norm ( ) = 0.24 norm (0.71) = s 1, s 2, s 4 norm ( ) = 0.43 norm (0.63) = s 1, s 2, s 4, s 6 norm ( ) = 0.62 norm (0.54) = s 1, s 2, s 4, s 6, s 8 norm ( ) = 0.78 norm (0.50) = s 1, s 2, s 4, s 6, s 8, s 5 norm ( ) = 0.86 norm (45) = s 1, s 2, s 4, s 6, s 8, s 5, s 7 norm ( ) = 0.94 norm (0.42) = s 1, s 2, s 4, s 6, s 8, s 5, s 7, s 12 norm ( ) = 1 norm (0.38) = 0.00

Case study: step 3 – select services (III) ›Trade-off analyses for instances 2 and 3

Case study: step 4 – determine services ›S’’ 1 = S 1  {s 1, s 2, s 4 } = {s 3, s 9, s 10, s 11, s 13 }  {s 1, s 2, s 4 } = {s 1, s 2, s 3, s 4, s 9, s 10, s 11, s 13 } ›S’’ 2 = S 2  {s 1, s 4, s 6 } = {s 2, s 3, s 5, s 9, s 10, s 11, s 12 }  {s 1, s 4, s 6 } = {s 1, s 2, s 3, s 4, s 5, s 6, s 9, s 10, s 11, s 12 } ›S’’ 3 = S 3  {s 2, s 4, s 6 } = {s 1, s 3, s 9, s 11 }  {s 2, s 4, s 6 }= {s 1, s 2, s 3, s 4, s 6, s 9, s 11 }

Case study: step 4 – determine services -S ca = S’’ 1  S’’ 2  S’’ 3 -S ca = {s 1, s 2, s 3, s 4, s 9, s 11 } see services in bold on previous slide

Case study: discussion of results ›Investigating how SOA instances diverge from the PL is important ›Method is light-weight ›Trade-0ff between value and stability ›Threats to validity

Limitations ›No effort or resource constraints ›No interface problems ›Simplified trade-off algorithm ›Interpretation of stability

Conclusions and future work ›SO PL help manage versions of SOA ›Trade-off analysis between value and stability to ensure homogenity between SOA systems / instances ›Future work More comprehensive evaluation Inclusion of types of variability Inclusion of more complex definitions for stability

| 24 Thank you for your attention

Case study: threats to validity ›External validity More evaluations are needed ›Internal validity See limitations (simplifications made in method) ›Assumptions Price correlates with value No value for services which are free of charge Backup