Runtime model based approach to IoT application development Runtime model based approach to IoT application development Frontiers of Computer Science,

Slides:



Advertisements
Similar presentations
ANALYSIS MODEL. Analysis Model Actual system development start with this. Aims to structure the system independently of the actual implementation environment.
Advertisements

Auto-Generation of Test Cases for Infinite States Reactive Systems Based on Symbolic Execution and Formula Rewriting Donghuo Chen School of Computer Science.
Great Theoretical Ideas in Computer Science.
Lecture 8. MIPS Instructions #4 – Branch Instructions #2
Copyright © Texas Education Agency, Computer Programming Software Life Cycle.
Loops, and sub-routines Interrupts Can be very useful in control applications particularly when the microprocessor must perform two tasks apparently.
2 Motivation Distributed Systems Notoriously difficult to build without appropriate assistance. First ones were based on low-level message-passing mechanisms.
Sensor Network Platforms and Tools
NOKIA case A-Team. Story of NOKIA Vision and strategy Our vision is a world where everyone can be connected Nokia's strategy relies on growing, transforming,
Presenter : Shih-Tung Huang Tsung-Cheng Lin Kuan-Fu Kuo 2015/6/15 EICE team Model-Level Debugging of Embedded Real-Time Systems Wolfgang Haberl, Markus.
Supporting Mobile Sensors and Typed Data Exchange Through the JXTA p2p Framework Supporting Mobile Sensors and Typed Data Exchange Through the JXTA p2p.
Communication & Robotics Laboratory 1 Students: Jason Gorski, Aleksandra Krsteva, Yuanyuan Chen Faculty: Imad H. Elhajj Department of Computer Science.
Instruction set architecture Problems Prof. Sin-Min Lee Department of Mathematics and Computer Science.
Sam K.P. Ma Michael R. Lyu Department of Computer Science The Chinese University of Hong Kong A Web-based Customized Collaborative Learning Environment.
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
Use of Multimedia in Engineering. Mechatronics engineering is based on the combination from three basic engineering field that is mechaninal, electronics.
Chen Zhu GJL 210, ECE Department. Project Overview Webcam Motion Sensor Software Interface Sample Video Conclusion.
Business Systems Planning (IBM Corporation) Initial work on BSP began in the early 1970s. At first, it was for IBM internal use only; later it was made.
Introduction to Programming End Show. Resource Team R.P Ranjan-Lecturer, SPICTEC, Galle. W.M.A.S. Wijesekara-Centre manager,CRC Hali-Ela H.P.U.S Indra.
2005/05/25 Unified Modeling Lanauage 1 Introduction to Unified Modeling Language (UML) – Part One Ku-Yaw Chang Assistant Professor.
Aurora: A Conceptual Model for Web-content Adaptation to Support the Universal Accessibility of Web-based Services Anita W. Huang, Neel Sundaresan Presented.
Compositional Verification of Termination-Preserving Refinement of Concurrent Programs Hongjin Liang Univ. of Science and Technology of China (USTC) Joint.
Coupling and Cohesion Pfleeger, S., Software Engineering Theory and Practice. Prentice Hall, 2001.
Chapter 2: Software Process Omar Meqdadi SE 2730 Lecture 2 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Computer Programmer. 3 Tasks that are performed Write, update, and maintain computer programs or software tasks Correct computer program errors Test programs.
Building Tools by Model Transformations in Eclipse Oskars Vilitis, Audris Kalnins, Edgars Celms, Elina Kalnina, Agris Sostaks, Janis Barzdins Institute.
computer
ECE 001 Final Presentation: Escape from Maze and Biomedical Centrifuge Experiment Scott Trocchia The George Washington University Computer Engineering.
COMPUTER ORGANIZATIONS CSNB123. COMPUTER ORGANIZATIONS CSNB123 Why do you need to study computer organization and architecture? Computer science and IT.
Artificial Intelligence By Michelle Witcofsky And Evan Flanagan.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
SESSION 2.1 PROGRAMME OF ASSESSMENT TASKS IN GET GRADES R-9.
TM Copyright © 2009 NMQA Ltd. Behaviour Driven Testing with.
Network Computing Laboratory A programming framework for Stream Synthesizing Service.
Message Broker
WHAT IS COMPUTER SCIENCE? Phil Sands K-12 Outreach Coordinator for Computer Science.
Semi-Automatic Generation of Device-Adapted User Interfaces Stina Nylander Swedish Institute of Computer Science.
Accessing XML Documents Using DOM ©NIITeXtensible Markup Language/Lesson 8/Slide 1 of 23 Objectives In this lesson, you will learn to: * Use XML DOM objects.
Copyright © 2009 – Curt Hill Standard Template Library An Introduction.
SensorWare: Distributed Services for Sensor Networks Rockwell Science Center and UCLA.
Forwarding Programming in Protocol- Oblivious Instruction Set Author : Jingzhou Yu, Xiaozhong Wang, Jian Song, Yuanming Zheng, Haoyu Song Conference: 2014.
Kandemir224/MAPLD Reliability-Aware OS Support for FPGA-Based Systems M. Kandemir, G. Chen, and F. Li Department of Computer Science & Engineering.
Slide no 1 Cognitive Systems in FP6 scope and focus Colette Maloney DG Information Society.
SUBMITTED By: Tasneem Sutarwala (55) Submitted to:- MRS.RUTVI UMRIGAR.
EU-Russia Call Dr. Panagiotis Tsarchopoulos Computing Systems ICT Programme European Commission.
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
XGRouter: high-quality global router in X-architecture with particle swarm optimization Frontiers of Computer Science, 2015, 9(4):576–594 Genggeng LIU,
Done By: Huraiz AlGaoud. The mouse Mouse: It is a handheld pointing device that lets you select or move items on your screen. Mouse pad: provides a smooth.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Coupling and Cohesion Pfleeger, S., Software Engineering Theory and Practice. Prentice Hall, 2001.
A study on the root canal morphology of primary molars by high-resolution computed tomography Yin-Lin Wang, Hsiao-Hua Chang, Ching-I Kuo, Ssu-Kuang Chen,
Debuggers. Errors in Computer Code Errors in computer programs are commonly known as bugs. Three types of errors in computer programs –Syntax errors –Runtime.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
PREPARED BY G.VIJAYA KUMAR ASST.PROFESSOR
Computer Programming Software Life Cycle.
Capabilities for Industrial Use SHORT, EN,
CSCI-100 Introduction to Computing
The Rational Unified Process (RUP) An Architecture-Centric Process

Distributed Event Processing With Java Shared Object Spaces
Software Design Lecture : 8
Invisible Computing Angie, Collin, Nick, Will.
Copyright 2007 Oxford Consulting, Ltd
SAMES: deadline-constraint scheduling in MapReduce
Coordination and Robotics

Internal components of a computer.

An Unusual Cause of Life-Threatening Upper Gastrointestinal Bleeding
But wait… There are cool IoT devices too!
Presentation transcript:

Runtime model based approach to IoT application development Runtime model based approach to IoT application development Frontiers of Computer Science, 2015, 9(4):540–553 Xing CHEN, Aipeng LI, Xue’e ZENG, Wenzhong GUO, Gang HUANG

Problems & Ideas Problems: IoT application development is done very close to the operating system and requires programmers to focus on low-level system issues. Ideas: A runtime model based approach to IoT application development. – The management of sensor devices is abstracted as runtime models. – A customized model is constructed according to the personalized application scenario and the synchronization between the customized model and sensor device runtime models is ensured through model transformation.

Main Contributions Developers can focus on the management task logic without handling different types of low-level management interface. The difference of performance of using management interfaces and using the runtime model is small and completely acceptable for IoT system management.