Post on 14-Feb-2017
2013
15
Proceedings of the 15th Korea Conference on
Software Engineering (KCSE 2013)
: 2013 1 30() ~ 2 1()
: ()
: , :
: SW, ,
, , ,
, , STA,
LG CNS, , ,
15 1
Vol. 15 No. 1
2013 .
,
, ,
15 (KCSE 2013) .
1 30 2 1
, , 80
.
, , 6
World Best Software(WBS) Software Visualization SW
, Cyber-Physical Systems(CPS) .
2 .
, SW , , , SW , SW
SPLE, SW, SW, SW, , , SW
.
,
.
.
: (), ()
: ()
: (), (), (), (ETRI),
(KAIST), (), (), (),
(), (), (NIPA SW),
(), (), (), (),
(), (), (),
()
: (KAIST)
: (), (KAIST), (KAIST), (),
(), (ETRI), (),
(), (), (),
(), (), (), (),
(), (), (), (),
(), (), (), (),
(), ()
T1: 1
Architecture for Cloud, Ucloud for Architecture
(KT)
Ucloud Academy Program
(KT)
T2:
(KAIST)
T3: 1
Combinatorial Test Design and Its Applications
(SUNY Korea)
T4: 2
(A journey to the Smart Working Era on the Cloud)
(LGCNS)
T5:
()
T6: 2
Towards Dependable and Secure Software: Requirements Engineering Approach
()
CMMI GP SP []
()
[]
, , , , , , (KAIST)
SW , []
(NIPA SW )
SI []
, (NIPA SW )
SW []
(NIPA SW )
(PBM)
, (KAIST), (SK C&C)
[]
(/KAIST), (/KAIST), (/KAIST),
(/KAIST)
[]
()
[]
, , (), ()
? []
(/KAIST)
[]
, ()
Needs
(), (TTA), , ()
Social Network Service(SNS) []
(/KAIST), (VMS Solutions/KAIST), (/KAIST),
(LG /KAIST), (/KAIST)
A []
, , (LG /KAIST)
AOP ISO/IEC 9126 []
, ()
, ()
, , (ETRI)
Development of Decommissioning Engineering System []
, (KAERI)
, , , , ()
UML 2.0 []
, (N3Soft)
[]
, ()
[]
, ()
SW SPLE
, , (KAIST)
[]
(/KAIST), , (LG /KAIST)
OSGi []
, ()
[]
, , , , ()
[]
, , , (KAIST), ()
SW
A Bug Triage and Localization Technique based on Bug Reports Classification []
Tao Zhang, ()
[]
, ()
. : []
()
[]
, , Matt Staats, Gregg Rothermel(KAIST)
[]
(LIG )
SW []
, ()
[]
(LIG )
, (KAIST)
TMMi []
, , (LIG )
(fault localization) []
, , (KAIST)
- []
, ()
BPEL []
, ()
, (KAIST)
[]
, , (), (), ()
[]
, Scott Uk-Jin Lee, Amna Al Dhaheri()
, , ()
(), (), ()
,
, , ()
[]
, ()
, ()
Specification By Example []
, , (NTS)
[]
, Matt Staats, , Gregg Rothermel(KAIST)
[]
, , ()
SW
, , , , , ()
A Method for Semantically Distributing Information Across Multiple Displays
(KAIST IT )
Hadoop MapReduce []
(), (), ()
[]
, , , ()
[]
(), (), ()
[]
, , ()
[]
, {}
-
, , , ()
[]
(), , (), , ()
[]
, , ()
SW
(KAIST)
- ECML XMI
(), (), , (ETRI), ()
, , , (KAIST)
UAV MANET []
, ()
TV IO []
, , , ()
SW
[]
, ()
MVC
, ()
[]
, , ()
[]
, ()
[]
, (), ()
, , (KAIST)
SW
[]
(), ()
:
RTOS []
, , (ETRI)
[]
, ()
CPS []
, ()
:
, , ()
, , (KAIST)
, , , ()
[]
, , , ()
KCSE 2013
1 30 ()
12:00-
13:00
: ()
: 1
13:00-
13:20
( ),
( )
13:20-
13:30 KCSE 2013 (KAIST)
: ()
: 1
13:30-
14:15 Software Visualization (NIPA SW)
14:15-
14:30
T1: 1
: ()
: 2
T2:
: ()
: 1
T3:
1
: ()
: 2
14:30-
15:45
Architecture for Cloud, Ucloud for
Architecture (KT)
Ucloud Academy Program
(KT)
(KAIST)
Combinatorial Test Design and Its
Applications
(SUNY Korea)
15:45-
16:00
A1: SW
: ()
: 2
A2:
1
: (KAIST)
: 1
A3: SW
1
: ()
: 2
A4: SW 1
: () :
3
16:00-
17:50
(KAIST)
- ECML XMI (), (), , (ETRI), ()
, , , (KAIST)
UAV MANET [] , ()
TV IO [] , , , ()
CMMI GP SP [] ()
[] , , , , , , (KAIST)
SW, [] (NIPA SW)
SI [] , (NIPA SW)
A Bug Triage and Localization Technique based on Bug Reports Classification [] Tao Zhang, ()
[] , ()
. : [] ()
[] , , Matt Staats, Gregg Rothermel(KAIST)
, , , , , (
)
A Method for Semantically Distributing Information Across Multiple Displays
(KAIST IT)
Hadoop MapReduce [] (), (), ()
[] , , , ()
[] (), (), ()
[ 18:05 ] [] , , ()
18:00-
19:00
1 31 ()
07:00-
09:00
T4: 2
: ()
: 2
T5:
: ()
: 1
T6:
2
: (KAIST)
: 2
09:00-
10:15
(A journey to
the Smart Working Era on the Cloud)
(LGCNS)
()
Towards Dependable and Secure Software:
Requirements Engineering Approach
()
10:15-
10:30
B1:
: ()
: 2
B2:
2
: ()
: 1
B3: SW
2
: (KAIST)
: 2
B4: SW
: ()
: 3
10:30-
11:45
, ()
, , (ETRI)
Development of Decommissioning Engineering System [] , (KAERI)
SW 101 [] (NIPA SW)
(PBM)
, (KAIST), (SK C&C)
[] (/KAIST), (/KAIST), (/KAIST), (/KAIST)
[] (LIG)
SW [] , ()
[] (LIG)
[] , ()
MVC
, ()
[] , , ()
11:45-
13:00
I1: World Best Software SW
: (NIPA SW) : 2
C1: 1 : () : 1
C2: SW 3
: () : 2
C3: : () : 3
13:00-
14:30
WBS SW
(NIPA SW)
WBS ()
SW ()
CI SW SW
()
[] ()
[] , , (), ()
? [] (/KAIST)
[] , ()
, (KAIST)
TMMi [] , , (LIG)
(fault localization) [] , , (KAIST)
- [] , ()
[] , ()
[] , (),
()
, , (KAIST)
14:30-
14:45
I2: SW Visualization
SW
: (NIPA SW) : 2
I3:
: () : 1
D1: SW 4
: () : 2
D2: SW : () : 3
14:45-
16:15
SW Visualization (NIPA SW)
()
() SW ()
Firmware SW(Daily Build + ) ()
IBM Rational ()
()
1%, ()
TMMi (LIG)
(STA )
ITscope : IT - ()
BPEL [] , ()
, (KAIST)
[] , , ,
, ()
[] , Scott Uk-Jin Lee,
Amna Al Dhaheri()
[] (), ()
: RTOS [] , , (ETRI)
[] , ()
CPS [] , ()
16:15-
16:30
: ()
: 2
16:30-
16:50 SW ( SW)
16:50-
17:30 SW (NIPA)
17:45-
21:00
, , : (NIPA SW)
: 1
2 1 ()
07:00-09:00
V1: Cyber-Physical Systems
: () : 2
E1: 2
: () : 1
E2: SW 5
: () : 2
E3:
: () : 3
09:00-10:30
CPS (ETRI)
Software-based Fault Detection and Recovery for Cyber-Physical Systems ()
IT
()
Needs
(), (TTA), , ()
Social Network Service(SNS) [] (/KAIST), (VMS Solutions/KAIST), (/KAIST), (LG/KAIST), (/KAIST)
A [] , , (LG/KAIST)
AOP ISO/IEC 9126 [] , ()
, , ()
(), (), ()
,
, , ()
[] , ()
: , , ()
, , (KAIST)
, , , (
)
[] , , , ()
10:30-10:45
F1: SW
: () : 2
F2: SW SPLE
: () : 1
F3: SW 6
: (KAIST) : 2
F4: SW 2
: () : 3
10:45-12:15
, , , , ()
UML 2.0 [] , (N3Soft)
[] , ()
[] , ()
, , (KAIST)
[] (/KAIST), , (LG/KAIST)
OSGi [] , ()
[] , , ,
, ()
[] , , , (KAIST),
()
[ 12:20 ]
, ()
Specification By Example [] , , (NTS)
[] , Matt Staats, ,
Gregg Rothermel(KAIST)
[] , , ()
[] , {}
-
, , , ()
[] (),
, (), , ()
[] , , ()
12:20-12:30 - :
() : 1
.
KCSE 2013
T1: 1
- : 1 30 () 14:30-15:45
- : 2
- : Architecture for Cloud, Ucloud for Architecture
- : (KT Cloud VPC)
- :
IT , ,
1:1 .
.
- .
. 2012 SSD
. KT
- :
1993 ()
1993~ KT
- HAN/B-ISDN
-
- RFID/USN
- BcN (BcN : Broadband Convergence Network)
- KT-MBA
Cloud Cloud VPC
- : Ucloud Academy Program
- : (KT Cloud Cloud)
- :
IT , CEO .
() .
.
. ,
kt . kt
ucloud academy .
- :
1996 University of Iowa,
2006 IE Business School, MBA
1997~ KT
- , IR, ,
Cloud Cloud Cloud
T2:
- : 1 30 () 14:30-15:45
- : 1
- :
- : (KAIST)
- :
. ,
, ,
.
- :
2011.8.10~12: , SERA 2011 (Software Engineering Research,
Management and Applications)
2009.3 ~ : KAIST
2003 ~ : MSE
2001.10 ~ 2009.2: ,
2001.8.28 ~ 31: , FORTE 2001 (Formal Techniques for Networked and
Distributed Systems)
1995.9 ~1996.9: (NIST)
1993.12 ~ 2001.10: (KT)
: , 2012.
T3: 1 - : 1 30 () 14:30-15:45
- : 2
- : Combinatorial Test Design and Its Applications
- : (SUNY Korea)
- :
Combinatorial test design is a test-case selection technique where each test case (called
configuration) is a value combination of test input parameters. The main rationale behind this
design is that software faults are often caused by unintended or unexpected interactions between
test input values. Since its rebirth as a software black-box testing technique, combinatorial test
design has been applied to various problems in the Software Engineering discipline and the cost-
effectiveness of the technique has been empirically proven by a large stack of studies carried out
over the last two decades.
In this tutorial, I will introduce a number of combinatorial test design techniques that use different
strategies or coverage criteria for the value selection process, with the special focus given to the t-
wise interaction coverage design. Two natural extensions to the base design will then be presented.
The extensions are to improve test effectiveness by prioritizing test cases generated or to reduce
the size of test suites while preserving test strength. Researches on the application of the
techniques to address various problems in Software Engineering will also be presented to raise
understanding of actual use-cases. The application areas may include fault characterization, software
performance enhancement, web application testing, and GUI testing.
- :
Professor Ilchul Yoon received B.S. in Computer Science at Sogang University, M.S. in Computer
Science at Korea Advanced Institute of Science and Technology, and Ph.D. in Computer Science at
University of Maryland, College Park. As an assistant professor in the department of Computer
Science, he is working for State University of New York, Korea, which is the first foreign university
established on Korean soil. His research interests lie in the fields of software compatibility testing,
interaction test design, and software process. He also has interests in distributed high-performance
computing researches, and participated in the peer-review processes of major conferences in the
discipline.
T4: 2 - : 1 31 () 09:00-10:15
- : 2
- : (A journey to the Smart Working Era on the Cloud)
- : (LG CNS )
- :
12 Chasm
. / Commodity
.
, IaaS SW SaaS
(PC)
.
.
- :
97 ~ 02 : LG-EDS( LG CNS) . SI / SM
03 ~ 05 : LG CNS
05 ~ 09 : LG CNS
10 ~ : LG CNS
: , ,
LG CNS
T5: - : 1 31 () 09:00-10:15
- : 1
- :
- : ()
- :
.
. IT
.
,
, .
- :
1982. ()
1985. ()
1993. Illinois Institute of Technology ()
1985.
1986~1988 ,
1988. ()
1992.
19972004,
2001~2005.
2000. 2007 ()
2002.
1993,
T6: 2 - : 1 31 () 09:00-10:15
- : 2
- : Towards Dependable and Secure Software: Requirements Engineering Approach
- : ()
- :
Engineering a dependable software system that meets our needs is a challenging task and requires
a variety of analysis and development techniques. Dependability has to be engineered into a system
in its early stage of design and development task to build comprehensive understanding of its
nature and purposeful behavior within the context of people, technology and the process. Among
many dependability attributes, we focus on the security attribute and its certification and
accreditation process that aggregates evidences for multi-dimensional analysis to assure its level of
acceptance. Security breaches most often occur due to a cascading effect of failure among security
constraints that collectively contribute to overall secure system behavior in a socio-technical
environment. Therefore, during security certification activities, analysts must systematically take into
account the nexus of causal chains that exist among security constraints imposed by regulatory
requirements. Numerous regulatory requirements specified in natural language documents or listed
in spreadsheets/databases do not facilitate such analysis. We present a step-wise methodology to
discover and understand the multi-dimensional correlations among regulatory requirements for the
purpose of understanding the potential for risk due to non-compliance during system operation.
Our lattice algebraic computational model helps estimate the collective adequacy of diverse security
constraints imposed by regulatory requirements and their interdependencies with each other in a
bounded scenario of investigation. Abstractions and visual metaphors combine human intuition
with metrics available from the methodology to improve the understanding of risk based on the
level of compliance with regulatory requirements. In addition, a problem domain ontology that
classifies and categorizes regulatory requirements from multiple dimensions of a socio-technical
environment promotes a common understanding among stakeholders during certification and
accreditation activities. A preliminary empirical investigation of our theoretical propositions has
been conducted in the domain of The United States Department of Defense Information Technology
Security Certification and Accreditation Process (DITSCAP). This work contributes a novel approach
to understand the level of compliance with regulatory requirements in terms of the potential for risk
during system operation. This work has been partially supported by the grants from Space and
Naval Warfare Systems Center (SPAWAR) US Department of Navy, Department of Defense, and
National Science Foundation.
- :
Dr. Seok-Won Lee is currently the Head of Graduate School of Software and Associate Professor of
Information & Computer Engineering at Ajou University since 2012. He has been an Assistant
Professor of Information Security at the University of Texas at San Antonio, a Visiting Professor at
the University of Nebraska Lincoln and an Assistant Professor of Software Engineering and a
Director of Knowledge-intensive Software Engineering (NiSE) research group at the Univ. of North
Carolina at Charlotte (2003- 2010). Prior to joining to the UNC Charlotte, he was affiliated with
Science Applications International Corporation (SAIC) and IBM T.J. Watson Research Center as senior
research scientists. He received his M.Sc. in Computer Science from University of Pittsburgh, and
Ph.D. in Information Technology from George Mason University. His areas of specialization include
software engineering with specific expertise in ontological requirements engineering and domain
modeling, and knowledge engineering with specific expertise in knowledge acquisition, machine
learning and knowledge-based systems. He serves as chairs, organizers, editors and the program
committee members for numerous journals, conferences, and workshops in software requirements
engineering, secure software engineering and other related areas such as information security and
assurance, critical infrastructure protection, service-oriented computing, visual analytics and self-
adaptive software systems. He has published more than 100 refereed articles. He is a professional
member of IEEE, ACM and AAAI.
(Programmer Behavior Metrics, PBM)
2 517-10
2 517-10
SK C&C
25-1
starsir@kaist.ac.kr symin@kaist.ac.kr hg.min@sk.com
: LOC(Line of Codes)
,
, , ,
.
.
. : (Programmer Behavior), (Programmer Behavior Metrics, PBM),
(Programmer Behavior Measurement System, PBMS), Gamification in programming
1.
,
.
,
.
2.
Shneiderman Mayer
[3], Mohan God
[4]. ,
.
Practical Software Measurement (PSM)
, , ,
[5], ISO 9126 (Metric)
[6].
, Causal Model
[7,10,11,12].
( ,
) (, )
[8]. [9]
,
(PBMS)
(), , , ,
(Quest) .
[ 1] PBM
3.
(Programmer
Behavior, PB)
,
(Programmer Behavior
Metrics, PBM) . , LOC
(Programmer Explicit Behavior),
, ,
(Programmer Implicit Behavior)
[ 1].
[ 2] Attributes and Measures In PBM
2013 15 1
-1-
[ 2] ,
,
.
PBM
, ()
[ 1].
[ 1] PBM
( / )
4. PBMS (PBMS, Programmer
Behavior Measurement System)
(, , )
. PBMS
PBM [ 3][ 4].
[ 3] Software Architecture in PBMS
[ 4] (Client Side)
,
Event-Driven Architecture , RESTful,
JSON, AJAX
.
9 16
JAVA 2 .
1 118,066 ,
186 .
LOC
,
[ 5].
[ 5]
(LOC ,
Checkstyle )
5.
(PBM)
( )
.
38
[ 6] Causal Model
. ,
( )
,
.
( ) .
.
.
[ 6] Causal Model
2013 15 1
-2-
[1] Norman E. Fenton, Shari Lawrence Pfleeger, Software Metrics(A Rigorous & Practical Approach), 2 edition, PWS, 1997
[2] Mihaly Csikszentmihalyi, Flow: The Psychology of Optimal Experience, Harper Perennial Modern Classics; 1ST edition, July 1, 2008
[3] Ben Shneiderman and Richard Mayer, Syntactic/Semantic Interactions in Programmer Behavior: A Model and Experimental Results, International Journal of Computer and Information Sciences, Vol. 8, No. 3, 1979
[4] Andrew Mohan, Nicolas God, Programming Style Changes in Evolving Source Code, Proceedings of the 12th IEEE International Workshop on Program Comprehension, IEEE, 2004
[5] John McGarry, David Card, Chery Jones, Beth Layman, Elizabeth Clark, Joseph Dean, Fred Hall, Practical Software Measurement: Objective Information for Decision Makers, Addison-Wesley Professional 1 edition, Oct. 27, 2001
[6] ISO/IEC 9126(9126-1, 2, 3, and 4), Wikipedia, http://en.wikipedia.org/wiki/ISO/IEC_9126
[7] Judea Pearl, Causality: Models, Reasoning, and Inference, Cambridge University Press, 2000
[8] Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Baddoo, Hugh Robinson, What Do We Know about Developer Motivations?, July/August 2008, IEEE SOFTWARE, 92-94, 2008, IEEE
[9] , (Gamification)
,
2011.09.15 [10] Norman Fenton, Paul Krause, Martin Neil, Software
Measurement: Uncertainty and Causal Modeling, IEEE, July/August, 2002
[11] John D. Sterman, System Dynamics Modeling: Tools For Learning in a Complex World, CALIFORNIA MANAGEMENT REVIEW VOL. 43, NO. 4, SUMMER 2001
[12] Tarek K. Abdel-Hamid, Stuart E. Madnick, Lessons Learned from Modeling the Dynamics of Software Development, Communication of the ACM, Volume 32, Number 12, December 1989
[13] Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, second Edition, Addison-Wesley, 2003
2013 15 1
-3-
(Programmer Behavior Metrics, PBM)
(1), (2), (3)
2 517-10 (1) starsir@kaist.ac.kr, (2) symin@kaist.ac.kr
25-1, SK C&C (3) hg.min@sk.com
: LOC,
,
.
, (
), ,
.
,
(PBMS)
.
.
: (Programmer Behavior),
(Programmer Behavior
Metrics, PBM), (Programmer
Behavior Measurement),
(Programmer Behavior Measurement System, PBMS), Gamification in programming
1.
,
.
()
/ ,
.
. LOC
[1]
(Programmer Explicit
Behaviors) .
,
, (flow)[2]
.
(Programmer Implicit Behaviors) .
. 1
, 3
.
4 (PBMS)
, 5 1
1
.
2.
.
2.1
Shneiderman Mayer
, ,
,
[3].
,
, --
.
.
Mohan God
(application)
(individuals
interpretations) ,
, , ,
[4].
(coding standards) (coding
convention) ,
.
2013 15 1
-4-
2.2
,
. Practical Software Measurement (a.k.a.
PSM)[5] (attribute),
(base measure), (derived
measure), (indicator) ,
[ 1].
[ 1] Practical Software Measurement [5]
PSM .
.
.
.
ISO 9126 Quality Model[6]
, , ,
, , .
.
2.3
,
.
.
,
.
[ 2] ,
, Causal Model
[7,10,11,12]. 5
1 Causal
Model .
[ 2] Nave Model vs. Causal Model [7]
2.4
.
,
.
[ 3] ,
.
, ,
,
[8].
[ 3] Developer Motivators [8]
(mechanics)
(gamification) [9].
,
(PBMS)
(), , ,
, , (Quest)
.
2013 15 1
-5-
3.
,
.
3.1
.
()
.
,
.
,
. [ 4]
(programmer behavior metrics, PBM)
.
[ 4] PBM
,
.
3.2 (Measures)
PSM
[5], , , ,
.
( Eclipse
) ,
(
Subversion )
.
,
,
( )
.
,
, (, )
. LOC ,
,
.
[ 6] [ 7] ,
.
[ 5] Attributes and Measures In PBM ()
[ 6] Measurement Information Model ()
3.3 (PBM)
[ 1] , PBM
. ,
2013 15 1
-6-
()
. ,
,
.
, ,
PBM .
,
.
[ 1] PBM
4. PBMS
4.1 Context Diagram
PBMS(Programmer Behavior Measurement
System)
. [ 7] PBMS
.
PBMS ()
,
, ,
. (Code Collector)
(subversion)
(uploaded) .
(Analyzer)
(PSM)
. (Controller)
( )
.
,
.
.
[ 7] Context Diagram in PBMS
4.2 S/W Architecture Quality Attributes
PBMS ,
, .
Len Bass, Paul Clements, Rick Kazman
[13] .
,
.
Event-Driven
. Event-Driven
4.3 .
, ,
Eclipse
.
Log4J .
.
.
, PBMS
,
PBMS .
PBMS ()
.
,
, ,
. 15
.
, PBMS
2013 15 1
-7-
, .
,
,
.
[ 8] PBMS
, [ 9]
.
[ 8] PBMS
[ 9]
4.3 S/W Architecture Runtime View
PBMS Runtime View
.
.
[ 10] , Event-Driven
. ,
Event-Driven
.
1) (Eclipse)
. ,
( )
,
(Apache ActiveMQ)
.
2)
PBMS
.
,
.
3)
(PBM) .
[ 10] Event-Driven
Event-Driven
,
.
[ 11] RESTful, AJAX
. (Eclipse)
REST
.
AJAX/JSON
.
[ 11] RESTful, AJAX
1) PBMS
2013 15 1
-8-
.
. AJAX
.
2) PBMS JSON
.
/
.
, .
, 3rd Party
.
5.
PBMS
. 2012 11
12 2 ,
1 .
.
5.1
,
.
.
,
9 , (2 ),
(3 ), (2 ), (2 )
.
16 JAVA
, 4
10 8 ~ 14 6
.
5.2 PBMS
[ 12] PBMS .
, ()
.
,
[ 13].
, , ,
15 .
/
.
,
( ) .
[ 12] PBMS
[ 13]
5.3
.
, ,
.
, 1, 2
.
2013 15 1
-9-
, [ 14] ,
(Quest)
.
[ 14]
,
.
,
, .
[ 15]
[ 14]
(marker)
(tooltip) . [ 15]
, ( ,
) .
PBMS
.
5.4
1 16 118,066
, 186
. LOC(Line of
Code)
,
Checkstyle .
[ 16] [ 17] ,
LOC LOC
,
.
[ 16] LOC
[ 17]
. ,
2013 15 1
-10-
[ 18] , 5 14
1000 7 ~ 15
. [ 19] ,
.
[ 18]
[ 19]
,
,
.
5.5 Causal Model
(PBM)
( )
.
38
[ 20]
Causal Model .
+-0.6
.
LOC
. [ 20] ,
,
( )
.
,
. 1
,
.
[ 20] Causal Model
6.
6.1
(PBMS)
.
,
, ,
,
.
(LOC, )
.
6.2
. (flow)
.
(
) , .
.
.
.
2013 15 1
-11-
[1] Norman E. Fenton, Shari Lawrence Pfleeger, Software Metrics(A Rigorous & Practical Approach), 2 edition, PWS, 1997
[2] Mihaly Csikszentmihalyi, Flow: The Psychology of Optimal Experience, Harper Perennial Modern Classics; 1ST edition, July 1, 2008
[3] Ben Shneiderman and Richard Mayer, Syntactic/Semantic Interactions in Programmer Behavior: A Model and Experimental Results, International Journal of Computer and Information Sciences, Vol. 8, No. 3, 1979
[4] Andrew Mohan, Nicolas God, Programming Style Changes in Evolving Source Code, Proceedings of the 12th IEEE International Workshop on Program Comprehension, IEEE, 2004
[5] John McGarry, David Card, Chery Jones, Beth Layman, Elizabeth Clark, Joseph Dean, Fred Hall, Practical Software Measurement: Objective Information for Decision Makers, Addison-Wesley Professional 1 edition, Oct. 27, 2001
[6] ISO/IEC 9126(9126-1, 2, 3, and 4), Wikipedia, http://en.wikipedia.org/wiki/ISO/IEC_9126
[7] Judea Pearl, Causality: Models, Reasoning, and Inference, Cambridge University Press, 2000
[8] Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Baddoo, Hugh Robinson, What Do We Know about Developer Motivations?, July/August 2008, IEEE SOFTWARE, 92-94, 2008, IEEE
[9] , (Gamification)
,
2011.09.15 [10] Norman Fenton, Paul Krause, Martin Neil, Software
Measurement: Uncertainty and Causal Modeling, IEEE, July/August, 2002
[11] John D. Sterman, System Dynamics Modeling: Tools For Learning in a Complex World, CALIFORNIA MANAGEMENT REVIEW VOL. 43, NO. 4, SUMMER 2001
[12] Tarek K. Abdel-Hamid, Stuart E. Madnick, Lessons Learned from Modeling the Dynamics of Software Development, Communication of the ACM, Volume 32, Number 12, December 1989
[13] Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, second Edition, Addison-Wesley, 2003
2013 15 1
-12-
: S/W Architecture Runtime View
2013 15 1
-13-
, ,
373-1 {siner7, hmkoo, iko}@kaist.ac.kr
:
.
,
(Network-Centric War, NCW)
(System of System) .
.
,
.
: , , ,
1.
,
(Network-Centric War, NCW)
[1]. NCW
,
(SOA)[2,3]
(SOC)
. SOA
,
,
.
,
,
,
.
, ,
,
.
.
:
.
,
,
.
:
.
.
,
[4].
(Context-dependent):
.
2013 15 1
-14-
.
(Flexibility) (Real-time):
.
,
.
.
.
.
,
.
,
.
.
,
.
. 2
. 3
4
Match-Making
. 5
. 6
.
2.
(Mission Planning)
[5,6,7]. [5]
,
.
,
.
,
.
[2] C4ISR(Command & Control, Computer, Communication, Surveillance, Reconnaissance)
.
3 (meta/domain/ application)
, (Semantic)
.
.
.
3.
.
.
. / ,
, [8]. 1
(Mission Description Model)
.
(Syntactic)
.
(Semantic)
.
.
2013 15 1
-15-
[ 1]
(Mission Statement)
()
(Who), (When), (Where),
(What), (Why)
,
(How)
.
(Purpose)
(Desired effect) (Intention)
(Constraint) .
(Enemy Situation)
.
,
.
(Friendly Situation)
.
,
.
.
(Environment information)
(: , ) (: ,
)
,
()
.
,
.
,
.
.
4.
4.1 2 (Task), (Service),
(Resource) 3
.
.
2013 15 1
-16-
(Restate)
.
.
[ 2]
(UJTL: Universal Joint Task List)
, (What)
[9].
(SoS)
3
4 ((SN), (ST),
(OP) (ST))
.
[ 3] [9]
.
, , , , ,
,
(Decomposer).
(Match Making)
,
.
.
,
.
(Capability)
.
.
(DOTMLPF) (Way)
(Mean)
(Desired Effect)
(Ability)[8] .
(Optimality) .
()
,
(: :, , ),
.
Optimality Evaluation (Requirement, Service) =
[ 4]
2013 15 1
-17-
4
n R
C .
.
.
.
.
4.2
5
.
4.
3 .
(service Repository)
.
.
(Mission Profile)
.
, (Preference)
.
(Context information)
.
3 DB
(Mission Context Manager)
4 .
,
(Mediation) .
(Synchronization) .
(Aggregation)
.
(Mapping)
(Interpretation).
(Mission Analyzer)
.
:
.
.
:
.
(Execution
manager)
.
,
.
(Reasoner)
(Service Match-Maker)
2013 15 1
-18-
(Decision Maker)
.
(Service Performer)
(Execution Path)
Information Manager
.
(Service Match Maker)
.
.
[ 5]
, ,
. 5 , ,
.
(Sub Class) (capability)
.
.
. PCC(Sea
Platform (Instance)) Anti-Surface
Warfare Capability
Gun(Anti-Ship Weapon )
PCC Anti-Surface
Warfare
.
Anti-Surface Warfare
PCC
. , ,
(Protg)
,
5
. 6 ,
.
A) Mission B) Task C) Resource
[ 6] (Mission), (Task), (Resource)
2013 15 1
-19-
5.
. [5]
,
1 .
[ 1]
Who Joint group of Navy and Marine Forces
Where
landing beaches north, south - road leading from the north beach to the
seaport - road leading from the south beach to the
airport
Why capturing a seaport and airport to allow for the introduction of follow-on forces
When Before Amphibious operation
What Destroy Enemy force and Block follow forces
7
10 .
[ 7]
T2 T3
T1 T10
( ) (
)
.
,
.
2 3
.
.
[ 2]
1 2 3
T1
T2
T3
T4 -
T5 -
T6 -
T7 -
T8
T9
T10 - -
[ 3]
, , ,
, , , , ,
, , ,
, , , , ,
, ,
, , ,
, ,
, ,
T10
.
.
=
= {, , }
. 4
T10
. (History Data)
,
. T10
.
2013 15 1
-20-
[ 4] 10
90% 95% )
55% 95%
95% 80% -
[ 5]
1 (3)
2 , , ,
3 , ,
4 ,
5 ,
6 , , (2)
7 , , (1)
8 , , (2)
9 , , (1)
10
5 .
2, 3 ,
. 6
.
[ 6]
1 (3)
2 , , ,
3 , ,
4 , , ,
5 ,
6 , , (2)
7 , , (1)
8 , , (2)
9 , , (1)
10
( )
,
.
6.
.
.
( )
.
.
NP-Hard [9]
.
Acknowledgement
.
[1] Albert D.D., Garstka, J.J, Stein, F.P, Network Centric Warfare : Developing and Leveraging Information
Superiority, CCRP Publ, 2nd Edition Aug 1999
[2] Zhang, Y., Liu, X., Wang, Z., & Chen, L. A Service-Oriented Method for System-of-Systems
Requirements Analysis and Architecture Design.
Journal of Software, 7(2), 358365. 2012
[3] D. Russell, N. Looker, L. Liu, and J. Xu, "Service-Oriented Integration of Systems for Military
Capability," in Proc. of IEEE International
Symposium on Object / component / service-oriented
Real-time distributed Computing, Orlando, Florida,
May 2008 [4]
Lee Whitt Wht is C4I Software Hard to Develop?
12 ICCRT June 2007
[5] Levchuk, G.M., Y. N. Levchuk, Jie Luo, K.R. Pattipati, and D.L. Kleinman, Normative Design of
Organizations - Part I: Mission Planning, in IEEE
Transactions on Systems, Man, and Cybernetics, Vol.
2013 15 1
-21-
32, No. 3, May 2002, pp. 346-359.
[6] Lamia Belfares, Walid Klibi, Nassirou Lo, Adel Guitouni. Multi-objectives Tabu Search based
algorithm for progressive resource allocation.
European Journal of Operational Research 177
(2007) 17791799
[7] Luohao Tang, Cheng Zhu, Weiming Zhang, Jincai
Huang Multi-Platform Coordinated Mission
Planning Under Uncertainties in Proc. of IEEE 11th International Conference on Hybrid Intelligent
Systems, 2011.12.
[8] FM 101-5 Staff Organization and Operations, Headquarters, Department of the Army, 1997,
www.dtic.mil/doctrine/jel/service_pubs/101_5.pdf
[9] CJCS, Universal Joint Task List, p. A-1, 2005 [10] , (
793 2006 )
2013 15 1
-22-
MVC *
,
99 {yjseo082, hskim401}@cnu.ac.kr
:
(Time-to-Market)
.
.
. ,
,
.
(Best Practice)
, .
,
.
.
,
.
: , MVC ,
1.
,
.
.
(Software Distribution Platform)
[1].
,
.
* 2010 () (No. 2010-0025329)
(AppStore), (PlayStore),
(Market Place)
.
,
.
, ,
.
.
,
.
(Time-to-Market)
[27]. ,
.
.
,
.
.
. ,
. PC
[2].
, P2P ,
. ,
.
.
,
.
2013 15 1
-23-
.
.
.
,
. ,
.
[3]
.
[3] [4]
.
,
.
. ,
.
.
.
.
MVC ,
. MVC
.
2. MVC
.
MVC
.
MVC .
MVC , MVC
.
2.1 MVC ? MVC [5]
,
.
, MVC
.
(Processing), (Output),
(Input), (Model), (View),
(Controller) .
[ 1] .
[ 1] MVC
,
.
,
.
. ,
.
. ,
.
,
.
2.2 MVC
MVC
.
MVC
.
MVC ,
.
MVC
.
iOS,
(Android), (Windows
Phone) .
2013 15 1
-24-
2.2.1 iOS[6-7]
MVC
,
. iOS MVC
. MVC
iOS MVC
. MVC , MVP(Model-
View-Presenter) .
(Presenter) ,
. MVC
. MVP iOS
[ 2] .
[ 2] iOS
iOS Composite
MVC
[5].
2.2.2 [8]
MVC
.
MVC
.
GUI .
, Composite
. ,
(Activity)
.
, iOS
UIViewController .
(Layout)
,
. ,
,
.
iOS
MVC .
2.2.3 [9]
MVC MVVM(Model-View-
ViewModel) . MVVM
.
,
. MVVM [ 3]
, Command
.
[ 3] MVVM
MVVM
,
. , MVC
MVVM ,
.
MVC
.
,
MVC
.
MVC .
MVC
.
, .
.
, , ,
.
,
2013 15 1
-25-
.
3.
. ,
.
3.1
,
.
,
.
,
.
3.1.1
. .
.
, ,
. ,
.
.
iOS, ,
.
.
. ,
. ,
.
.
.
.
3.1.2
(Flexibility) .
, MDA(Model-driven
Architecture) [10] . MDA
OMG(Object Management Group)
, ,
(PIM)
, (PSM)
.
,
. ,
.
3.2
.
,
,
,
.
(Testability) (Robustness)
.
,
. ,
.
[11].
.
. ,
. [12]
. ,
,
.
.
.
2013 15 1
-26-
[ 4]
4.
MVC ,
, , .
[ 4] .
. ,
.
4.1
4.1.1
. .
.
.
.
.
. ,
, .
2.2
.
.
.
MDA
.
PIM ,
PIM PSM
.
.
.
.
.
.
.
.
.
,
.
2013 15 1
-27-
, ,
. ,
,
, , ,
.
.
,
. ,
. .
,
.
GUI ,
. ,
,
. ,
.
GUI
.
.
GUI
4.1.2
.
(Validation Rule)
,
. , 4.1
.
?
.
.
(UI, )
.
,
.
.
. MVC
Closed Model [13] . Closed Model
.
. Closed Model
.
. ,
,
.
,
.
.
4.1.3
.
,
.
.
.
.
.
2013 15 1
-28-
, .
.
.
.
GUI .
GUI
.
.
.
.
. ,
.
.
.
.
.
.
,
.
.
?
?.
.
.
4.2
4.1
.
,
.
4.2.1
(Portability) .
, .
JVM
.
.
.
HTML5, CSS,
JavaScript
. ,
.
. WAC(Wholesale Application
Community)
API
[14]. , OpenAppMkt[15]
.
.
.
,
.
. ,
Appcelerator[16], PhoneGap[17], Rhodes[18]
.
. ,
,
.
.
2013 15 1
-29-
.
MDA
. , MDA
,
.
,
.
,
MDA .
[19-21] MVC
.
[22] MVC
(
, ) MDA
, UML [23-
25]. [26]
, (
), .
,
.
[19-21]
. [22] [26]
MDA ,
MDA .
MDA ,
. ,
PIM .
MDA
.
4.2.2
TDD(Test-driven Development)
. [27]
. TDD
,
.
TDD
.
,
. ,
,
.
.
, [27]
.
TDD
. ,
. OCUnit UIAutomation
[7],
JUnit Monkey Runner [8].
OCUnit JUnit
, UIAutomation Monkey Runner
.
Record and Playback
Squish[28], TestDroid[29] ,
GHUnit[30], Robotium[31] .
, .
,
. [32] GUI
,
[33] [34]
. [35]
iOS ,
.
TDD
.
TDD
.
.
5.
.
.
. ,
.
.
, .
2013 15 1
-30-
PIM
.
, ,
.
. , ,
.
PIM PSM
. ,
,
.
.
.
. ,
PIM PSM
.
.
,
.
:
.
.
:
PIM ,
. , ,
,
.
MDA :
.
.
: PIM PSM .
.
, MDA
. , MDA
GUI
,
.
.
,
.
6.
.
,
.
,
.
.
.
MVC
, , ,
.
5 ,
.
.
, MDA
. ,
. ,
, ,
.
[1] List of mobile software distribution platforms, http://en.wikipedia.org/wiki/List_of_mobile_software
_distribution_platforms
[2] A. Holzer, J. Ondrus, "Mobile application market: a developers perspective," Telematics and Informatics, vol. 28, no. 1, pp 22-31, 2010.
[3] R. Bareiss, T. Sedano, Improving Mobile Application Development, MSE workshop of MobiCASE 2011.
[4] T. Wasserman, Software Engineering Issues for Mobile Application Development," http://works.bepress.com/tony_wasserman/4.
2013 15 1
-31-
[5] F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, Pattern-Oriented Software Architecture Volume 1: A System of Patterns, Willey, 1996.
[6] Apple, Concepts in Objective-C Programming, 2012.
[7] Apple, iOS App Programming Guide, 2012.
[8] Android Developer, http://developer.android.com/develop/index.html
[9] Microsoftware, XAML concepts for Windows Phone, http://msdn.microsoft.com/en-us/library/windowsphone/develop/jj206948(v=vs.105).aspx.
[10] OMG, Developing in OMGs Model Driven Architecture, ftp://ftp.omg.org/pub/docs/omg/01-12-01.pdf
[11] B. Pettichord, Design for Testability, in Proc. of Pacific Northwest Software Quality Conference, Oct 2002.
[12] , , , iOS
GUI
, [13] S. Alpaev, Applied MVC Patterns Aptterm
language, VIkingPLoP 2005 conference, 2005 [14] WAC, http://www.wacapps.net/wac-apis
[15] OpenAppMkt, http://openappmkt.com
[16] Appcelerator, http://www.appcelerator.com
[17] PhoneGap, http://phonegap.com
[18] Rhomobile, Rhodes Developer Reference, http://docs.rhomobile.com/rhodes/introduction
[19] Woo Yeol Kim, Hyun Seung Son, Robert Young Chul Kim, Design of Code Template for Automatic Code Generation of Heterogeneous Smartphone Application, Advanced Communication and Networking Communication in Computer and Information Science, Volume 199, 2011
[20] Woo Yeol Kim, Hyun Seung Son, Robert Young Chul Kim, Adapting Model Transformation Approach for Android Smartphone Application, Advanced Communication and Networking Communication in Computer and Information Science, Volume 199, 2011
[21] , , , ,
, :
, vol. 16, no. 11, 2010. [22] , ,
MDA ,
2010
, vol. 37, no. 2(A), pp 40-41, 2010. [23] , , , ,
UML ,
2011 , 2011.06 [24] , , , , iOS
UML , 2011
, 2011.06 [25] , , , 7
UML , 2011
, 2011.06 [26] S. Roychoudhury, V. Kulkarni, Mobile-
Enabling Enterprise Business Applications using Model-Driven Engineering Techniques, MSE workshop of MobiCASE 2011.
[27] P. Abrahamsson, A. Hanhineva, et al, "Mobile-D: An agile approach for mobile application
development," in OOPSLA 2004, Poster session,
Vancouver, Canada, 2004.
[28] Squish, http://www.froglogic.com/squish/ gui-testing/
[29] TestDroid, http://testdroid.com/
[30] GHUnit, GHUnit Reference, http://gabriel.github.com/gh-unit/
[31] Robotium, http://code.google.com/p/robotium/
[32] C. Hu, I. Neamtiu, Automating GUI Testing for Android Applications, in Proc. of the 6th Int. Workshop on Automation of Software Test, pp 77-83, 2011.
[33] , , , , Record-
Playback
, 2011
, vol. 38, no.
1(B), pp 171-174, 2011. [34] , , , ,
, 2011 , vol. 38, no. 1(A), pp 198-201, 2011.
[35] , , ,
iOS GUI
, 2012 , vol. 39, no. 2(B), pp 61-63, 2012.
2013 15 1
-32-
, ,
373-1
{jinlooks, sungwon.kang, younghun.han}@kaist.ac.kr
: (Source)
(Target)
.
,
(Heterogeneous)
. , (Semantic
Information)
.
,
.
,
.
(Text)
, (Word Matching)
.
.
,
. 1
: , ,
, ,
1.
[8].
(Source) (Target)
.
[8, 12],
(Heterogeneous)
.
[8],
(Semantic Information)
.
,
.
,
. ,
,
.
(Automatic Schema Matching)
,
[3, 4, 5, 6, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19,
21]
(Mapping Cardinality) , [8]
.
, [8] ,
. (Text)
, (Word
Matching)
.
.
,
.
. 2
. 3
. 4
. 5
.
2.
(Field Level
Translation) (Message Level
2013 15 1
-33-
Translation) [8].
,
,
.
,
.
, Yang et
al. [21]
. ,
(Homogeneous)
, 1:1 1:n
.
,
(Heterogeneous Schema Integration),
(Data Warehousing), (E-Commerce),
(Semantic Query
Processing) , SemInt [9, 10, 11], Learning Source Description (LSD) [5, 6], Semantic Knowledge Articulation Tool (SKAT) [15, 16], TransScm [14], DIKE
[17, 18, 19], ARTEMIS [3, 4], Cupid [13]
.
Li et al. [9] SemInt . SemInt
(Relational) DBMS
(Element)
. , SemInt
(Schema-level) . ,
. , SemInt 1:1
[9, 10, 11]. Doan et al. [5] LSD
. LSD (Global Schema)
, -(Machine-Learning)
. ,
LSD , 1:1
[5, 6]. Mitra et al.
[15] SKAT . SKAT
(Ontology)
First-order Logic .
, SKAT
, 1:1 1:n
[15, 16]. Milo Zohar [14] TransScm
. TransScm
Labeled Graph , Edge
Edge
. , TransScm 1:1
[14]. Palopoli et al. [17] DIKE
. DIKE
. ,
DIKE 1:1
[17, 18, 19]. Castano et al. [3]
ARTEMIS . ARTEMIS
, MOMIS (Mediator envirOment for Multiple
Information Sources)[1, 2] . MOMIS
(Mediator),
. ARTEMIS
1:1
[3, 4]. Cupid [13] Microsoft Research
, Cupid
Tree . Cupid
Tree ,
,
1:1 [13].
. [8],
,
, 7
. ,
.
3.
. 1
. 1 ,
3 .
:
1)
.
,
.
2013 15 1
-34-
1.
2.
3.
2013 15 1
-35-
2) (Field Mapping
Description Table) .
1 ,
.
3) (Field Data
Conversion Function) .
2
(Pseudo Code) .
.
[8] 2
3
1 . 2 3
,
2 3
.
3.1 Recommending field mapping
2 1
. 1 4
Step : (1) (Word Grouping),
(2) (Preparation), (3) (Mapping
Analysis), (4) (Composing & Recommendation).
Step 1) :
,
.
Step 2) : Step 3 4
Substep .
Substep 1: .
Substep 2: .
Substep 3: .
Substep 4:
(: Field, this, that, be, ) .
Step 3) :
. S1
=
T1 =
, .
-1) (Name Matching):
,
.
Name Matching = {
-2) (Similarity Matching):
(Synonym)
(Aggregation Relationship),
.
Similarity Matching = {
, Speed Velocity
, , Kilometer, Mile, Hour, Minute
.
-3) (Mapping Establishment):
1 2 ,
.
Mapping Establishment = {
Rahm Bernstein [20] ,
(Data Matching Technology) (Structure)
, (Constraint) ,
(Linguistic) .
-
(Sub-Schema)
.
.
(Linguistic Atom)
.
(Data Set)
[8]. ,
. ,
,
.
Step 4) :
.
. , S
T , S = {T}
1:1 . 3
2013 15 1
-36-
. 1:1 , S
T . n:1
, 1:1
S T n:1
. 1:n
, S T .
n:m , 1:n
S T
, n:m .
3.2 Creating field mapping description table
2
. ,
.
(Template),
,
, , , ,
, [8].
3.3 Generating field data conversion function
3
.
,
[8].
4.
.
.
[8]
.
1:1, 1:n, n:1, n:m
.
1:1, 1:n, n:1, n:m
. 4
.
,
(VMF Position Report Link-16
Enemy Identification )[7] .
VMF Position Report Link-16 Enemy
Identification 12 VMF
14 Link-16
. 5
.
, (Recommendation
Coverage), (Recommendation Accuracy),
(False Recommendation)
.
,
. ,
.
(False Positive Recommendation)
(False Negative Recommendation) .
(Irrelevant)
,
,
. 1
.
1. 1st case study 2nd case study
False positive recommendation
0% 26.32%
False negative recommendation
0% 0%
Recommendation coverage
100% 100%
Recommendation accuracy
100% 73.68%
, 12
. , 5
,
. , ,
.
, 19
, 14 (73.68%)
.
,
,
. ,
.
2013 15 1
-37-
(a) The recommended field mapping cardinalities
(b) A field mapping recommendation in a n:1 mapping cardinality
4.
5.
.
[8]
.
,
,
. ,
.
2013 15 1
-38-
(a) The recommended field mapping cardinalities
(b) A field mapping recommendation in a 1:n mapping cardinality
5.
,
,
.
,
, .
,
,
.
,
.
2013 15 1
-39-
[1] Bergamaschi, S., Castano, S., Vincini, M., Semantic integration of semi-structured and structured data
sources, ACM SIGMOD Record, Vol. 28, No.1,
pp.5459, 1999.
[2] Bergamaschi, S., Castano, S., Vincini, M., Beneventano, D., Semantic integration of
heterogeneous information sources, Data
Knowledge Engineering, Vol. 36, No.3, pp.215249,
2001.
[3] Castano, S., De, Antonellis V., A schema analysis and reconciliation tool environment, In: Proceeding
of International Database Engineering Application
Symposium (IDEAS), IEEE Computer Society, New
York, pp.5362, 1999. [4] Castano, S., De, Antonellis V., De, Capitani di
Vemercati, S., Global viewing of heterogeneous data sources, IEEE Transaction on Data Knowledge Engineering, Vol. 13, No.2, pp.277297, 2001.
[5] Doan, A. H., Domingos, P., Levy, A., Learning source descriptions for data integration, In:
Proceeding of Web DB Workshop, pp. 8192, 2000, [6] Doan, A. H., Domingos, P., Halevy, A., Reconciling
schemas of disparate data sources: a machine-
learning approach, In: Proceeding of ACM
SIGMOD Conference, pp. 509520, 2001
[7] DoD (Department of Defense), Interface Standard Data forwarding between Tactical Data Links
(TDLs), MIL-STD- 6020, Appendix D-Link-16 and
VMF, USA, 2005.
[8] Kim, Jingyu, Kang, Sungwon, Lee, J., and Choi, B. W., A semantic translation method for data
communication protocols, Journal of Systems and
Software, Vol. 85, Issue 12, pp.2876-2898, 2012.
[9] Li, W., Clifton, C., Semantic integration in heterogeneous database using neural networks, In:
Proceeding of 20th
International Conference On Very
Large Data Bases, pp. 112, 1994.
[10] Li, W., Clifton, C., SemInt: a tool for identifying attributes correspondences in heterogeneous
databases using neural network, Data Knowledge
Engineering, Vol. 33, No.1, pp.4984, 2000.
[11] Li, W., Clifton, C., Liu, S., Database integration using neural network: implementation and
experiences, Knowledge Information Systems, Vol.
2, No.1, pp.7396, 2000.
[12] Lv, Y., Yu, H.b., Wang, T.R., Yang, Z.j., Fieldbus Interoperation Technologies, Proceedings of the 5th
World Congress on Intelligent Control and
Automation, pp. 3620-3623, 2004.
[13] Madhavan, J., Bernstein, P. A., Rahm, E., Generic schema matching with Cupid, In: Proceeding of the
27th International Conference On Very Large Data
Bases, pp.4958, 2001.
[14] Milo, T., Zohar, S., Using schema matching to
simplify heterogeneous data translation, In:
Proceeding of 24th International Conference On
Very Large Data Bases, pp. 122133, 1998.
[15] Mitra, P., Wiederhold, G., Jannink, J., Semi-automatic integration of knowledge sources, In:
Proceeding of Fusion 99, Sunnyvale, USA, 1999.
[16] Mitra, P., Wiederhold, G., Kersten, M., A graph-oriented model for articulation of ontology
interdependencies, In: Proceeding of Extending
DataBase Technologies, Lecture Notes in Computer
Science, vol. 1777. Springer, Berlin Heidelberg New
York, pp. 86100, 2000.
[17] Palopoli, L., Sacca, D., Ursino, D., Semi-automatic, semantic discovery of properties from database
schemas, In: Proceeding of International Database
Engineering and Applications Symposium. (IDEAS),
IEEE Computer Society, pp. 244253, 1998.
[18] Palopoli., L., Sacca, D., Ursino, D., An automatic technique for detecting type conflicts in database
schemas In: Proceeding of the 7th International
Conference On Information and Knowledge
Management (CIKM), pp. 306313, 1998.
[19] Palopoli, L., Sacca, D., Terracina, G., Ursino, D., A unified graph-based framework for deriving nominal
inter scheme properties, type conflicts and object
cluster similarities, In: Proceeding of the 4th IFCIS
International Conference On Cooperative
Information Systems (CoopIS), IEEE Computer
Society, pp.3445, 1999.
[20] Rahm, E., Bernstein, P. A., A survey of approaches to automatic schema matching, The VLDB Journal,
Vol. 10, pp.334-350, 2001.
[21] Yang, W., Li, J., Wang, K., Transforming Hetero-geneous Messages Automatically in Web Service
Composition, Proceedings of 8th Asia-Pacific Web
Conference (APWeb 2006), Lecture Notes in
Computer Science (LNCS), Vol. 3841, pp. 145-156,
2006.
2013 15 1
-40-
BPEL
,
410
jspark@selab.cbnu.ac.kr, jehong@chungbuk.ac.kr
: . . . WS-BPEL . : , WS-BPEL, 1. . . . , . , . , . WS-BPEL(Web Service Business Process Execution Language)[1] (Mutant) . BPEL
Juan Jose Dominguez-Jimenez[2], Panya Boonyakuls- rirung[3], Estero-Botaro[4]
. BPEL . . . , . 2.
BPEL XML XML . XML 1 . 1 . .
1 XML
? (0 or 1) * (0 or more) + (1 or more)
> < . < > .
& & AND = &eq
2.1.
.
. . .
2.2.
.
2013 15 1
-41-
. ifelse else . . . .
2.3.
. . . . .
2.4. . . .
2.5. . . . . .
SW . SW , . , .
3.
2 BPEL . > < .
[ ] $itemsShipped > bpel:getVariableProperty() [ ] $itemsShipped < bpel:getVariableProperty()
4.
. BPEL . , BPEL . . Acknowledgement () -(No. 2011-0020523) (2011-0010396)
[1]
[2]
http://en.wikipedia.org/wiki/Business_Process_Execution_Language Dominguez-Jimenez, J.J. et al. , "GAmera: An Automatic Mutant Generation System for WS-BPEL Compositions", Seventh IEEE European Conference on, 2009
[3] Panya Boonyakulsrirung et al. , "A weak mutation testing framework for WS-BPEL", Computer Science and Software Engineering (JCSSE), 2011
[4] A. Estero-Botaro, F. Palomo-Lozano, and I. Medina-Bulo, Mutation operators for WS-BPEL 2.0, the 21th International Conference on Software & Systems Engineering and their Applications, 2008
2013 15 1
-42-
,
, ,
1 {atang34, ldalove, jbyoo}@konkuk.ac.kr
:
.
.
.
.
(Safety Critical System) ,
.
.
.
: , , , ,
1.
.
()
, (
, )
.
, (Translator),
(Code Generator), (Compiler).
. (Safety Critical System)
.
.
,
.
,
PLC(Programmable Logic Controller)
, FPGA(Field-Programmable Gate
Array) .
PLC FPGA PLC
C FPGA
Verilog . C
C Compiler
, Verilog
.
.
, FBD(Function Block
Diagram) Verilog FBDtoVerilog
FBD C FBDtoC
[1]. FBD PLC
function block
PLC
. FBDtoC
FBDtoVerilog
FBD C Verilog .
.
.
.
.
4
, 3
. , FBDtoC
FBDtoVerilog
.
. 2
2013 15 1
-43-
. 3 2
. 4 2
. 5
.
2.
.
,
. (, , )
(, , )
(, )
.
4
[ 1]. [ 1]
3 (, ,
) , ~
4 .
[ 1] 4
: safety
.
:
rule
.
:
,
.
:
proof proof
.
[ 1] ~
3 (correctness,
soundness, safety) [ 2].
[ 2]
Safety - Proof-Carrying Code(PPC)
. PPC
safety police
, safety
police .
Safety - Typed Assembly Language(TAL)
. TAL
coding rule . ,
type type
type checking
.
.
Correctness - Theorem proving, Model checking
correctness
.
.
Soundness Testing, Simulation, Translation validation, Credible compilation
, , proof
soundness
.
2013 15 1
-44-
3.
3.1 Correctness Property 3.1.1 Theorem proving
Theorem proving
(correctness)
.
,
[
3].
[ 3] Theorem proving
Theorem proving (Denotational
semantic) ,
, .
hoares logic, first-order logic, higher-order
logic .
. ,
. (, ,
)
. ,
,
.
.
. FBDtoC FBDtoVerilog ,
,
.
Theorem proving natural
sematic Mini_ML CAM
[2]. Natural semantic
(Axiom)
(Interface Rule)
. Natural semantic
P .
P .
P .
natural semantic dynamic
semantic translation ,
.
[ 4] Natural semantic
[ 4] natural semantic
. T ,
t semantic value . L1 semantic
domain SD(L1) value L2
semantic domain SD(L2) Value .
Theorem proving
. Abstract interpretation
Source-to-Source
[3], basic block abstract interpretation
register allocation
[4], logical framework
[5].
3.2 Soundness Property
3.2.1 Testing & Simulation
Testing & Simulation
(test case)
.
,
,
.
2013 15 1
-45-
[ 5] Individual modules Integrated modules Equivalence [6]
.
.
(test case) (Soundness)
.
.
theorem proving
.
. .
.
. FBDtoC FBDtoVerilog
, FBD
.
.
, .
(Development Lifecycle)
.
.
.
(ex: Simulink [7],
Stateflow [8]) ,
.
Testing & Simulation
numerical
equivalence testing(comparative testing back-to-
back testing) [6].
[ 6] Numerical equivalence [6]
[ 5] [ 6] numerical
equivalence testing
.
Numerical equivalence
(Test vectors)
(Result vectors) .
.
(Compiler Optimization)
[9], [10].
scheme equivalence trace
. [ 7] trace
. [ 7]
P trace , T1, . . . , Tk
. P
Mi Ti( ) Mi , Mi+1 Mi
.
2013 15 1
-46-
[ 7] Trace [9]
3.2.2 Translation validation
.
. Translation validation
Credible compilation
.
Translation validation black box
.
theorem proving, symbolic execution, simulation &
testing .
.
proof (Soundness)
.
proof
,
. FBDtoC FBDtoVerilog
FBDtoC FBDtoVerilog
.
[ 8] Translation validation [11]
Translation validation 1998
[11]. Translation validation
proof proof . [ 8]
.
proof analyzer
, analyzer
proof ,
Proof Script ,
Counter Example . Counter Example
. Counter Example
. Proof checker theorem proving,
model checking, simulation
.
3.2.3 Credible compilation
Translation validation Proof
credible compilation
[12], [13]. Credible compilation
Proof proof
.
,
.
translation validation .
[ 9] Credible compilation
Credible compilation
.
proof proof checker
2013 15 1
-47-
. [ 9]
.
[ 10] [12] [ 11] [12]
.
1) : [ 10] [ 11]
, 5
x 1 y 2
. 5 x +
y 3 .
2) :
x + y 3
.
Proof checker
proof .
3.3 Safety Property
3.3.1 Proof-carrying code
Proof-carrying code(PCC)
. PCC
,
Spec safety policy
verified condition
. ,
. Code
producer native code safety proof
. Code consumer safety policy
safety proof .
, safety
policy
. safety policy
,
. , safety proof
. FBDtoC
FBDtoVerilog safety policy
safety policy .
[ 12] PCC [14]
Proof carrying code(PCC)
spec (H/W spec,
Standard )
[14], [15]. [ 12]
. [ 12] safety policy
safety rule interface
. PCC
safety policy .
3.3.2 Typed-Assembly Language
TAL type
type safety . Typing
rule Memory safety, control flow safety, type
safety . TAL
bytecode .
,
theorem proving
rule .
2013 15 1
-48-
FBDtoC FBDtoVerilog , FBDtoC
FBDtoVerilog assembly language
.
TAL Strong typed assembly
languages F TAL
[16]. [ 13] Strong typed
assembly languages F TAL
.
[ 13] F TAL
F TAL
, , ,
type type
.
6 F code
code . CPS
(Continuation-passing style)
code .
[ 14] ,,
[ 15] .
[ 16] .
type . Type
.
Code1
(fix f(n:int):int: if0(n; 1; n f(n 1))) 6
Code2
(fix f (n:int; k:(int) void): if0(n, k(1),
let x = n 1 in f(x, (y:int): let z = n y in k(z))))
(6; (n:int): halt[int]n)
[ 14] [16]
[ 15] [16]
[ 16] [16]
4.
register
stack, loop error
. Register allocation error
[17], [18], [19]. Loop distribution,
loop fusion, loop tiling, and loop interchange
loop [20], [21], [22]. Heap
stack allocation
safety [23], [24], [25] .
2013 15 1
-49-
1 FBDtoC & FBDtoVerilog
Theorem Proving
& Correctne
ss ( ) Formal
Testing &
Simulation & Soundness (input)
Translation validation
& Soundness (proof) Proof
Certifying
Compiler & Soundness (proof)
Proof
PCC Safety ,
(safety
policy) Safety policy
TAL Safety ,
(rule)
,
.
,
.
[26], [27] .
Model checking
[28], [29], [30], [31]. Theorem proving model
checking [31].
FBD verilog c
[29] .
[32], [33].
5.
4
,
3 .
, , , FBDtoC
FBDtoVerilog .
1 .
FBDtoC FBDtoVerilog FBDtoC
FBDtoVerilog
. ,
,
, ,
.
.
.
.
.
FBDtoC FBDto-
Verilog .
,
.
Acknowledge
(KETEP-2010-
T1001-01038), 2012 ()
(2012-0003619),
,
.
[1]
[2]
[3]
[4]
[5]
Junbeom Yoo, Jong-Hoon Lee, Sehun Jeong and Sungdeok Cha, "FBDtoVerilog: A Vendor-Independent Translation from FBDs into Verilog Programs," The Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 2011), pp.48-51, July 7-9, Miami Beach, USA, 2011. J. Despeyroux, Proof of translation in natural semantics, 1986. P. Cousot and R. Cousot, "Systematic Design of Program Transformation Frameworks by Abstract Interpretation," ACM SIGPLAN Notices, vol. 1, no. 37, pp. 178-190, 2002. S. M. Timothy, Verifying the correctness of compiler Transformations on Basic Block using Abstract Interpretation, In Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM'91, pp. 106-115, 1991. J. Hannan and F. Pfenning, "Compiler Verification in LF," Logic in Computer Science, 1992. LICS'92., Proceedings of the Seventh
2013 15 1
-50-
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
Annual IEEE Symposium on, pp. 407-418, 1992. M. Staats and M. Heimdahl, "Partial translation verification for untrusted code-generators," Formal Methods and Software Engineering, pp. 226-237, 2008. The MathWorks, Inc: Stateflow product page. www.mathworks.com/products/stateflow The MathWorks, Inc: Simulink product page. www.mathworks.com/products/simulink A. Kanade, A. Sanyal and U. Khedker, "A PVS based Framework for Validating Compiler Optimizations," Software Engineering and Formal Methods, 2006. SEFM 2006. Fourth IEEE International Conference on, pp. 108-117, 2006. A. Kanade, A. Sanyal and U. Khedker, "Structuring optimizing transformations and proving them sound," Electronic Notes in Theoretical Computer Science, vol. 3, no. 176, pp. 79-95, 2007. A. Pnueli, M. Siegel and E. Singerman, "Translation validation," Tools and Algorithms for the Construction and Analysis of Systems, pp. 151-166, 1998. M. Rinard, Credible compilation, MIT Laboratory for Computer Science, Technical Report MIT-LCS-TR-776, 1999. M. Rinard and D. Marinov, "Credible Compilation with Pointers," s, in: Proceedings of the FLoC Workshop on Run-Time Result Verification, Trento, 1999. G. C. Necula, "Proof-carrying code," Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 106-119, 1997. G. C. Necula, "Compiling with Proofs," Carnegie Mellon University, 1998. G. Morrisett, K. Crary, N. Glew and D. Walke, "Stack-based typed assembly language," Types in Compilation, pp. 28-52, 1998. Y. Huang, B. Childers and M. Soffa, "Catching and Identifying Bugs in Register Allocation," Static Analysis, pp. 281-300, 2006. M. Poletto and V. Sarkar, "Linear Scan Register Allocation," ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 21, no. 5, pp. 895-913, 1999. A. Ohori, "Register Allocation by Proof Transformation," Science of Computer Programming, vol. 50, no. 1, pp. 161-187, 2004. L. Zuck, A. Pnueli, B. Goldberg, C. Barrett, Y. Fang and Y. Hu, "Translation and Run-Time Validation of Loop Transformations," Formal Methods in System Design, vol. 27, no. 3, pp. 335-360, 2005.
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
L. Zuck, A. Pnueli, Y. Fang and B. Goldberg, "VOC: A Translation Validator for Optimizing Compilers," j. ucs, vol. 9, no. 3, pp. 223-247, 2003. B. Goldberg, "Translation Validation of Loop Optimizations and Software Pipelining in the TVOC Framework," Static Analysis, pp. 6-21, 2011. X. Feng, Z. Shao, A. Vaynberg, S. Xiang and Z. Ni, "Modular Verification of Assembly Code with Stack-Based Control Abstractions," ACM SIGPLAN Notices, vol. 41, no. 6, pp. 401-414, 2006. L. Jia, F. Spalding, D. Walker and N. Glew, "Certifying compilation for a language with stack allocation," Logic in Computer Science, 2005. LICS 2005. Proceedings. 20th Annual IEEE Symposium on, pp. 407-416, 2005. G. Morrisett, K. Crary, N. Glew and D. Walke, "Stack-based typed assembly language," Types in Compilation, pp. 28-52, 1998. S. Lerner, T. Millstein and C. Chambers, "Automatically Proving the Correctness of Compiler Optimizations," ACM SIGPLAN Notices, vol. 5, no. 38, pp. 220-231, 2003. D. Lacey, N. D. Jones, E. Van Wyk and C. C. Frederiksen, "Proving Correctness of Compiler Optimizations by Temporal Logic," ACM SIGPLAN Notices, vol. 37, no. 1, pp. 283-294, 2002. M. Staats and M. Heimdahl, "Partial translation verification for untrusted code-generators," Formal Methods and Software Engineering, pp. 226-237, 2008. Dong-Ah Lee, Junbeom Yoo and Jang-Soo Lee, "Equivalence Checking between Function Block Diagrams and C Programs using HW-CBMC," The 30th International Conference on Computer Safety, Reliability and Security (SAFECOMP 2011), LNCS 6894, pp.397-408, Sept. 19-21, Naples, Italy, 2011 S. Jorges, T. Margaria and B. Steffen, "Assuring property conformance of code generators via model checking," Formal aspects of computing, vol. 23, no. 5, pp. 589-606, 2011. S. Owre, S. Rajan, J. Rushby, N. Shankar and M. Srivas, "PVS: Combining specification, proof checking, and model checking," Computer Aided Verification, pp. 411-414, 1996. Unknown Authors, Compiler Optimization Verification and Maintenance. M. A. Dave, "Compiler Verification - A Bibliography," ACM SIGSOFT Software Engineering Notes, vol. 28, no. 6, pp. 2-2, 2003.
2013 15 1
-51-
* " IT " (NIPA-2012-(H0301-12-
4014))
*
, , , ,
2 {sjbaek, pjs50, kaluas , cks.egg, yeom}@pusan.ac.kr
: ,
.
,
.
,
.
,
.
.
.
,
.
: , ,
1.
.
.
,
[1].
.
.
.
.
,
, , CO
.
.
.
.
, CO
.
, ,
.
,
.
.
,
.
. RFID
.
,
2013 15 1
-52-
,
.
. 2
, 3
. 4
. 5
. 6
.
2.
.
.
,
.
(APC: Agricultural Products Center)
.
,
,
.
SMS .
. A
A B
B
.
.
.
.
,
, .
.
.
2.1 RFID/USN
RFID(Radio Frequency Identification)
USN(Ubiquitous Sensor Network)
[2].
RFID/USN .
.
.
. ,
,
.
2.2
RFID
DBMS(Database Management System)
[3].
,
.
RFID
,
.
.
2.3
.
,
.
.
.
,
.
RFID
. , ,
.
2013 15 1
-53-
3.
.
.
.
3.1
. -
-- - [4].
, ,
, .
.
,
.
(Precooling)
.
,
3~5 .
.
.
,
.
, ,
.
.
3.2
.
, CO .
/
.
.
1
,
/
,
/
CO , CO
, ,
,
, CO
,
1
.
.
.
3.3
.
RFID
/
, ,
RFID RFID
. RFID
,
.
2 .
2013 15 1
-54-
2 RFID
/
RFID
/
RFID RFID
, /
RFID
RFD /,
1. RFID RFID
2. RFID RFID
3. RFID
4.
5. /
/
.
,
.
,
.
.
.
,
.
.
.
.
.
, CO .
4.
4.1
,
.
, , ,
.
1 .
1
,
, ,
.
.
,
.
,
, .
, , CO
. RFID
,
,
/ .
,
2013 15 1
-55-
.
, ,
.
.
,
.
.
xml
.
2
2
.
.
.
. ,
.
,
.
.
.