A Model Driven approach for Applicationspecific Mismatch Detection
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 5
Abstract
Several large-scale systems are developed in modules that are assembled together to deliver a desired functionality. The modules developed in isolation may not implement the desired requirements. It creates several problems either at design-time, deployment-time or at run-time. Existing research defines a class of such problems as mismatches. A mismatch may cause malfunctioning or crash of a system. Therefore, a mismatch needs to be detected and resolved. The paper describes a model-driven generic framework to detect mismatches across a variety of systems. A case-study of a large-scale system has been demonstrated to illustrate the application of the framework. An evaluation of the framework illustrates that it is highly re-usable, requires comparatively less efforts and detects a large variety of mismatches.
Authors and Affiliations
Amit Raj
A Survey on Cloud Computing Security, Challenges and Threats
Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like n...
A comparative study of wireless mesh and adhoc network : A Cross layer design approach
Due to Wi-Fi marketing 802.11 becomes a universal solution for wireless connectivity. A wireless network is that in which the performance of a network depends on the layering structure of protocol. A wireless network is...
DERIVATION OF CUSTOMER INTELLIGENCE FROM CUSTOMER KNOWLEDGE MANAGEMENT
In today’s world, knowledge has turned into a main element of the financial management. In fact, knowledge is the most essential strategic asset and the capacity to pick up and extend it, spread and apply it can remain t...
ON THE DESIGN OF PROJECTIVE BINARY EDWARDS ELLIPTIC CURVES OVER GF (P) BENEFITING FROM MAPPING ELLIPTIC CURVES COMPUTATIONS TO VARIABLE DEGREE OF PARALLEL DESIGN
Finding multiplicative inverse (Modular Inversion) operation is the most time-consuming operation in Elliptic Curve Crypto-system (ECC) operations which affects the performance of ECC. Moreover, several factors that affe...
Trust Negotiations Using Cryptographic Approach
Security involves , any person or an organization has certain entities or attributes which cannot be disclosed directly to any other organization or third person , so the main idea of our project is to safe guard or encr...