Qos Based Optimization Of Runtime Management Of Sensing Cloud Applications
Download Qos Based Optimization Of Runtime Management Of Sensing Cloud Applications full books in PDF, epub, and Kindle. Read online free Qos Based Optimization Of Runtime Management Of Sensing Cloud Applications ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads.
Author |
: Gotin, Manuel |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 258 |
Release |
: 2022-06-30 |
ISBN-10 |
: 9783731511472 |
ISBN-13 |
: 3731511479 |
Rating |
: 4/5 (72 Downloads) |
Synopsis QoS-Based Optimization of Runtime Management of Sensing Cloud Applications by : Gotin, Manuel
IoT applications perceive and interact with the environment via smart devices and cloud services. When operating such applications one is faced with the challenge of configuring the smart devices and the cloud services in a manner, which achieves a high data quality at low operational costs. This work supports IoT operators with IoT collection strategies and cost optimization functions for data qualities, which are influenced by the interplay of smart device and cloud service configurations.
Author |
: Ananieva, Sofia |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 310 |
Release |
: 2022-12-06 |
ISBN-10 |
: 9783731512417 |
ISBN-13 |
: 3731512416 |
Rating |
: 4/5 (17 Downloads) |
Synopsis Consistent View-Based Management of Variability in Space and Time by : Ananieva, Sofia
Developing variable systems faces many challenges. Dependencies between interrelated artifacts within a product variant, such as code or diagrams, across product variants and across their revisions quickly lead to inconsistencies during evolution. This work provides a unification of common concepts and operations for variability management, identifies variability-related inconsistencies and presents an approach for view-based consistency preservation of variable systems.
Author |
: Walter, Maximilian |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 350 |
Release |
: 2024-07-03 |
ISBN-10 |
: 9783731513629 |
ISBN-13 |
: 3731513625 |
Rating |
: 4/5 (29 Downloads) |
Synopsis Context-based Access Control and Attack Modelling and Analysis by : Walter, Maximilian
This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.
Author |
: Heinrich, Robert |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 154 |
Release |
: 2023-06-05 |
ISBN-10 |
: 9783731512943 |
ISBN-13 |
: 3731512947 |
Rating |
: 4/5 (43 Downloads) |
Synopsis Architecture-based Evolution of Dependable Software-intensive Systems by : Heinrich, Robert
This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.
Author |
: Seifermann, Stephan |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 412 |
Release |
: 2022-12-09 |
ISBN-10 |
: 9783731512462 |
ISBN-13 |
: 3731512467 |
Rating |
: 4/5 (62 Downloads) |
Synopsis Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements by : Seifermann, Stephan
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Author |
: Koch, Sandro Giovanni |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 398 |
Release |
: 2024-04-25 |
ISBN-10 |
: 9783731513414 |
ISBN-13 |
: 3731513412 |
Rating |
: 4/5 (14 Downloads) |
Synopsis A Reference Structure for Modular Model-based Analyses by : Koch, Sandro Giovanni
In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.
Author |
: Scheerer, Max |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 472 |
Release |
: 2023-10-23 |
ISBN-10 |
: 9783731513209 |
ISBN-13 |
: 373151320X |
Rating |
: 4/5 (09 Downloads) |
Synopsis Evaluating Architectural Safeguards for Uncertain AI Black-Box Components by : Scheerer, Max
Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.
Author |
: Pilipchuk, Roman |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 366 |
Release |
: 2023-01-27 |
ISBN-10 |
: 9783731512127 |
ISBN-13 |
: 3731512122 |
Rating |
: 4/5 (27 Downloads) |
Synopsis Architectural Alignment of Access Control Requirements Extracted from Business Processes by : Pilipchuk, Roman
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
Author |
: Klare, Heiko |
Publisher |
: KIT Scientific Publishing |
Total Pages |
: 596 |
Release |
: 2022-03-24 |
ISBN-10 |
: 9783731511328 |
ISBN-13 |
: 3731511320 |
Rating |
: 4/5 (28 Downloads) |
Synopsis Building Transformation Networks for Consistent Evolution of Interrelated Models by : Klare, Heiko
Complex software systems are described with multiple artifacts, such as code, design diagrams and others. Ensuring their consistency is crucial and can be automated with transformations for pairs of artifacts. We investigate how developers can combine independently developed and reusable transformations to networks that preserve consistency between more than two artifacts. We identify synchronization, compatibility and orchestration as central challenges, and we develop approaches to solve them.
Author |
: Jean-Michel Bruel |
Publisher |
: Springer Nature |
Total Pages |
: 221 |
Release |
: 2020-01-18 |
ISBN-10 |
: 9783030393069 |
ISBN-13 |
: 3030393062 |
Rating |
: 4/5 (69 Downloads) |
Synopsis Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment by : Jean-Michel Bruel
This book constitutes revised selected papers of the Second International Workshop on Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment, DEVOPS 2019, held at the Château de Villebrumier, France, in May 2019. The 15 papers presented in this volume were carefully reviewed and selected from 19 submissions. They cover a wide range of problems arising from DevOps and related approaches: current tools, rapid development-deployment processes, modeling frameworks, anomaly detection in software releases, DevDataOps, microservices, and related topics.