EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Web based Development in the Lively Kernel

Download or read book Web based Development in the Lively Kernel written by Jens Lincke and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 70 pages. Available in PDF, EPUB and Kindle. Book excerpt: The World Wide Web as an application platform becomes increasingly important. However, the development of Web applications is often more complex than for the desktop. Web-based development environments like Lively Webwerkstatt can mitigate this problem by making the development process more interactive and direct. By moving the development environment into the Web, applications can be developed collaboratively in a Wiki-like manner. This report documents the results of the project seminar on Web-based Development Environments 2010. In this seminar, participants extended the Web-based development environment Lively Webwerkstatt. They worked in small teams on current research topics from the field of Web-development and tool support for programmers and implemented their results in the Webwerkstatt environment.

Book Web Information Systems and Technologies

Download or read book Web Information Systems and Technologies written by Tim A. Majchrzak and published by Springer. This book was released on 2018-06-18 with total page 277 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes revised selected papers from the 13th International Conference on Web Information Systems and Technologies, WEBIST 2017, held in Porto, Portugal, in April 2017. The purpose of the WEBIST series of conferences is to bring together researches, engineers and practitioners interested in technological advances and business applications of web-based information systems. The 12 full papers presented in this volume were carefully reviewed and selected from originally 77 paper submissions. They contribute to the understanding of relevant trends of current research on Web information systems and technologies, comprising unified interfaces, Progressive Web Apps (PWAs) as well as a mobile device taxonomy, XML and open data processing, the history of Web engineering, web development for end-users, access control, Web platform assessment, rule engines, and scientific blogging.

Book Explorative authoring of Active Web content in a mobile environment

Download or read book Explorative authoring of Active Web content in a mobile environment written by Calmez, Conrad and published by Universitätsverlag Potsdam. This book was released on 2013 with total page 148 pages. Available in PDF, EPUB and Kindle. Book excerpt: Developing rich Web applications can be a complex job - especially when it comes to mobile device support. Web-based environments such as Lively Webwerkstatt can help developers implement such applications by making the development process more direct and interactive. Further the process of developing software is collaborative which creates the need that the development environment offers collaboration facilities. This report describes extensions of the webbased development environment Lively Webwerkstatt such that it can be used in a mobile environment. The extensions are collaboration mechanisms, user interface adaptations but as well event processing and performance measuring on mobile devices.

Book Quantitative Modeling and Analysis of Service oriented Real time Systems Using Interval Probabilistic Timed Automata

Download or read book Quantitative Modeling and Analysis of Service oriented Real time Systems Using Interval Probabilistic Timed Automata written by Krause, Christian and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 54 pages. Available in PDF, EPUB and Kindle. Book excerpt: One of the key challenges in service-oriented systems engineering is the prediction and assurance of non-functional properties, such as the reliability and the availability of composite interorganizational services. Such systems are often characterized by a variety of inherent uncertainties, which must be addressed in the modeling and the analysis approach. The different relevant types of uncertainties can be categorized into (1) epistemic uncertainties due to incomplete knowledge and (2) randomization as explicitly used in protocols or as a result of physical processes. In this report, we study a probabilistic timed model which allows us to quantitatively reason about nonfunctional properties for a restricted class of service-oriented real-time systems using formal methods. To properly motivate the choice for the used approach, we devise a requirements catalogue for the modeling and the analysis of probabilistic real-time systems with uncertainties and provide evidence that the uncertainties of type (1) and (2) in the targeted systems have a major impact on the used models and require distinguished analysis approaches. The formal model we use in this report are Interval Probabilistic Timed Automata (IPTA). Based on the outlined requirements, we give evidence that this model provides both enough expressiveness for a realistic and modular specifiation of the targeted class of systems, and suitable formal methods for analyzing properties, such as safety and reliability properties in a quantitative manner. As technical means for the quantitative analysis, we build on probabilistic model checking, specifically on probabilistic time-bounded reachability analysis and computation of expected reachability rewards and costs. To carry out the quantitative analysis using probabilistic model checking, we developed an extension of the Prism tool for modeling and analyzing IPTA. Our extension of Prism introduces a means for modeling probabilistic uncertainty in the form of probability intervals, as required for IPTA. For analyzing IPTA, our Prism extension moreover adds support for probabilistic reachability checking and computation of expected rewards and costs. We discuss the performance of our extended version of Prism and compare the interval-based IPTA approach to models with fixed probabilities.

Book Model driven engineering of adaptation engines for self adaptive software

Download or read book Model driven engineering of adaptation engines for self adaptive software written by Thomas Vogel and published by Universitätsverlag Potsdam. This book was released on 2013 with total page 74 pages. Available in PDF, EPUB and Kindle. Book excerpt: The development of self-adaptive software requires the engineering of an adaptation engine that controls and adapts the underlying adaptable software by means of feedback loops. The adaptation engine often describes the adaptation by using runtime models representing relevant aspects of the adaptable software and particular activities such as analysis and planning that operate on these runtime models. To systematically address the interplay between runtime models and adaptation activities in adaptation engines, runtime megamodels have been proposed for self-adaptive software. A runtime megamodel is a specific runtime model whose elements are runtime models and adaptation activities. Thus, a megamodel captures the interplay between multiple models and between models and activities as well as the activation of the activities. In this article, we go one step further and present a modeling language for ExecUtable RuntimE MegAmodels (EUREMA) that considerably eases the development of adaptation engines by following a model-driven engineering approach. We provide a domain-specific modeling language and a runtime interpreter for adaptation engines, in particular for feedback loops. Megamodels are kept explicit and alive at runtime and by interpreting them, they are directly executed to run feedback loops. Additionally, they can be dynamically adjusted to adapt feedback loops. Thus, EUREMA supports development by making feedback loops, their runtime models, and adaptation activities explicit at a higher level of abstraction. Moreover, it enables complex solutions where multiple feedback loops interact or even operate on top of each other. Finally, it leverages the co-existence of self-adaptation and off-line adaptation for evolution.

Book Selected Papers of the International Workshop on Smalltalk Technologies

Download or read book Selected Papers of the International Workshop on Smalltalk Technologies written by Michael Haupt and published by Universitätsverlag Potsdam. This book was released on 2010 with total page 48 pages. Available in PDF, EPUB and Kindle. Book excerpt: The goal of the IWST workshop series is to create and foster a forum around advancements of or experience in Smalltalk. The workshop welcomes contributions to all aspects, theoretical as well as practical, of Smalltalk-related topics.

Book Understanding Cryptic Schemata in Large Extract transform load Systems

Download or read book Understanding Cryptic Schemata in Large Extract transform load Systems written by Alexander Albrecht and published by Universitätsverlag Potsdam. This book was released on 2013 with total page 28 pages. Available in PDF, EPUB and Kindle. Book excerpt: Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workflows populate those systems with data from various data sources by specifying and executing a DAG of transformations. Over time, hundreds of individual workflows evolve as new sources and new requirements are integrated into the system. The maintenance and evolution of large-scale ETL systems requires much time and manual effort. A key problem is to understand the meaning of unfamiliar attribute labels in source and target databases and ETL transformations. Hard-to-understand attribute labels lead to frustration and time spent to develop and understand ETL workflows. We present a schema decryption technique to support ETL developers in understanding cryptic schemata of sources, targets, and ETL transformations. For a given ETL system, our recommender-like approach leverages the large number of mapped attribute labels in existing ETL workflows to produce good and meaningful decryptions. In this way we are able to decrypt attribute labels consisting of a number of unfamiliar few-letter abbreviations, such as UNP_PEN_INT, which we can decrypt to UNPAID_PENALTY_INTEREST. We evaluate our schema decryption approach on three real-world repositories of ETL workflows and show that our approach is able to suggest high-quality decryptions for cryptic attribute labels in a given schema.

Book MDE Settings in SAP

    Book Details:
  • Author : Regina Hebig
  • Publisher : Universitätsverlag Potsdam
  • Release : 2012
  • ISBN : 3869561920
  • Pages : 74 pages

Download or read book MDE Settings in SAP written by Regina Hebig and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 74 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Industrial Case Study on the Integration of SysML and AUTOSAR with Triple Graph Grammars

Download or read book Industrial Case Study on the Integration of SysML and AUTOSAR with Triple Graph Grammars written by Giese, Holger and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 66 pages. Available in PDF, EPUB and Kindle. Book excerpt: During the overall development of complex engineering systems different modeling notations are employed. For example, in the domain of automotive systems system engineering models are employed quite early to capture the requirements and basic structuring of the entire system, while software engineering models are used later on to describe the concrete software architecture. Each model helps in addressing the specific design issue with appropriate notations and at a suitable level of abstraction. However, when we step forward from system design to the software design, the engineers have to ensure that all decisions captured in the system design model are correctly transferred to the software engineering model. Even worse, when changes occur later on in either model, today the consistency has to be reestablished in a cumbersome manual step. In this report, we present in an extended version of [Holger Giese, Stefan Neumann, and Stephan Hildebrandt. Model Synchronization at Work: Keeping SysML and AUTOSAR Models Consistent. In Gregor Engels, Claus Lewerentz, Wilhelm Schäfer, Andy Schürr, and B. Westfechtel, editors, Graph Transformations and Model Driven Enginering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday, volume 5765 of Lecture Notes in Computer Science, pages 555-579. Springer Berlin / Heidelberg, 2010.] how model synchronization and consistency rules can be applied to automate this task and ensure that the different models are kept consistent. We also introduce a general approach for model synchronization. Besides synchronization, the approach consists of tool adapters as well as consistency rules covering the overlap between the synchronized parts of a model and the rest. We present the model synchronization algorithm based on triple graph grammars in detail and further exemplify the general approach by means of a model synchronization solution between system engineering models in SysML and software engineering models in AUTOSAR which has been developed for an industrial partner. In the appendix as extension to [19] the meta-models and all TGG rules for the SysML to AUTOSAR model synchronization are documented.

Book Covering Or Complete

    Book Details:
  • Author : Jana Bauckmann
  • Publisher : Universitätsverlag Potsdam
  • Release : 2012
  • ISBN : 3869562129
  • Pages : 40 pages

Download or read book Covering Or Complete written by Jana Bauckmann and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 40 pages. Available in PDF, EPUB and Kindle. Book excerpt: Data dependencies, or integrity constraints, are used to improve the quality of a database schema, to optimize queries, and to ensure consistency in a database. In the last years conditional dependencies have been introduced to analyze and improve data quality. In short, a conditional dependency is a dependency with a limited scope defined by conditions over one or more attributes. Only the matching part of the instance must adhere to the dependency. In this paper we focus on conditional inclusion dependencies (CINDs). We generalize the definition of CINDs, distinguishing covering and completeness conditions. We present a new use case for such CINDs showing their value for solving complex data quality tasks. Further, we define quality measures for conditions inspired by precision and recall. We propose efficient algorithms that identify covering and completeness conditions conforming to given quality thresholds. Our algorithms choose not only the condition values but also the condition attributes automatically. Finally, we show that our approach efficiently provides meaningful and helpful results for our use case.

Book The JCop language specification   Version 1 0  April 2012

Download or read book The JCop language specification Version 1 0 April 2012 written by Malte Appeltauer and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 60 pages. Available in PDF, EPUB and Kindle. Book excerpt: Program behavior that relies on contextual information, such as physical location or network accessibility, is common in today's applications, yet its representation is not sufficiently supported by programming languages. With context-oriented programming (COP), such context-dependent behavioral variations can be explicitly modularized and dynamically activated. In general, COP could be used to manage any context-specific behavior. However, its contemporary realizations limit the control of dynamic adaptation. This, in turn, limits the interaction of COP's adaptation mechanisms with widely used architectures, such as event-based, mobile, and distributed programming. The JCop programming language extends Java with language constructs for context-oriented programming and additionally provides a domain-specific aspect language for declarative control over runtime adaptations. As a result, these redesigned implementations are more concise and better modularized than their counterparts using plain COP. JCop's main features have been described in our previous publications. However, a complete language specification has not been presented so far. This report presents the entire JCop language including the syntax and semantics of its new language constructs.

Book Proceedings of the 4th Many Core Applications Research Community  MARC  Symposium

Download or read book Proceedings of the 4th Many Core Applications Research Community MARC Symposium written by Peter Tröger and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 96 pages. Available in PDF, EPUB and Kindle. Book excerpt: In continuation of a successful series of events, the 4th Many-core Applications Research Community (MARC) symposium took place at the HPI in Potsdam on December 8th and 9th 2011. Over 60 researchers from different fields presented their work on many-core hardware architectures, their programming models, and the resulting research questions for the upcoming generation of heterogeneous parallel systems.

Book An Abstraction for Version Control Systems

Download or read book An Abstraction for Version Control Systems written by Matthias Kleine and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 88 pages. Available in PDF, EPUB and Kindle. Book excerpt: Version Control Systems (VCS) allow developers to manage changes to software artifacts. Developers interact with VCSs through a variety of client programs, such as graphical front-ends or command line tools. It is desirable to use the same version control client program against different VCSs. Unfortunately, no established abstraction over VCS concepts exists. Instead, VCS client programs implement ad-hoc solutions to support interaction with multiple VCSs. This thesis presents Pur, an abstraction over version control concepts that allows building rich client programs that can interact with multiple VCSs. We provide an implementation of this abstraction and validate it by implementing a client application.

Book Theories and Intricacies of Information Security Problems

Download or read book Theories and Intricacies of Information Security Problems written by Anne V. D. M. Kayem and published by Universitätsverlag Potsdam. This book was released on 2013 with total page 60 pages. Available in PDF, EPUB and Kindle. Book excerpt: Keine Angaben

Book Cyber physical Systems with Dynamic Structure

Download or read book Cyber physical Systems with Dynamic Structure written by Basil Becker and published by Universitätsverlag Potsdam. This book was released on 2012 with total page 40 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cyber-physical systems achieve sophisticated system behavior exploring the tight interconnection of physical coupling present in classical engineering systems and information technology based coupling. A particular challenging case are systems where these cyber-physical systems are formed ad hoc according to the specific local topology, the available networking capabilities, and the goals and constraints of the subsystems captured by the information processing part. In this paper we present a formalism that permits to model the sketched class of cyber-physical systems. The ad hoc formation of tightly coupled subsystems of arbitrary size are specified using a UML-based graph transformation system approach. Differential equations are employed to define the resulting tightly coupled behavior. Together, both form hybrid graph transformation systems where the graph transformation rules define the discrete steps where the topology or modes may change, while the differential equations capture the continuous behavior in between such discrete changes. In addition, we demonstrate that automated analysis techniques known for timed graph transformation systems for inductive invariants can be extended to also cover the hybrid case for an expressive case of hybrid models where the formed tightly coupled subsystems are restricted to smaller local networks.

Book Cache Conscious Column Organization in In memory Column Stores

Download or read book Cache Conscious Column Organization in In memory Column Stores written by David Schwalb and published by Universitätsverlag Potsdam. This book was released on 2013 with total page 100 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cost models are an essential part of database systems, as they are the basis of query performance optimization. Based on predictions made by cost models, the fastest query execution plan can be chosen and executed or algorithms can be tuned and optimised. In-memory databases shifts the focus from disk to main memory accesses and CPU costs, compared to disk based systems where input and output costs dominate the overall costs and other processing costs are often neglected. However, modelling memory accesses is fundamentally different and common models do not apply anymore. This work presents a detailed parameter evaluation for the plan operators scan with equality selection, scan with range selection, positional lookup and insert in in-memory column stores. Based on this evaluation, a cost model based on cache misses for estimating the runtime of the considered plan operators using different data structures is developed. Considered are uncompressed columns, bit compressed and dictionary encoded columns with sorted and unsorted dictionaries. Furthermore, tree indices on the columns and dictionaries are discussed. Finally, partitioned columns consisting of one partition with a sorted and one with an unsorted dictionary are investigated. New values are inserted in the unsorted dictionary partition and moved periodically by a merge process to the sorted partition. An efficient attribute merge algorithm is described, supporting the update performance required to run enterprise applications on read-optimised databases. Further, a memory traffic based cost model for the merge process is provided.

Book HPI Future SOC Lab   proceedings 2011

Download or read book HPI Future SOC Lab proceedings 2011 written by Meinel, Christoph and published by Universitätsverlag Potsdam. This book was released on 2013 with total page 92 pages. Available in PDF, EPUB and Kindle. Book excerpt: Together with industrial partners Hasso-Plattner-Institut (HPI) is currently establishing a “HPI Future SOC Lab,” which will provide a complete infrastructure for research on on-demand systems. The lab utilizes the latest, multi/many-core hardware and its practical implementation and testing as well as further development. The necessary components for such a highly ambitious project are provided by renowned companies: Fujitsu and Hewlett Packard provide their latest 4 and 8-way servers with 1-2 TB RAM, SAP will make available its latest Business byDesign (ByD) system in its most complete version. EMC² provides high performance storage systems and VMware offers virtualization solutions. The lab will operate on the basis of real data from large enterprises. The HPI Future SOC Lab, which will be open for use by interested researchers also from other universities, will provide an opportunity to study real-life complex systems and follow new ideas all the way to their practical implementation and testing. This technical report presents results of research projects executed in 2011. Selected projects have presented their results on June 15th and October 26th 2011 at the Future SOC Lab Day events.