Using Scenarios to Identify and Trade-off Dependability Objectives in Design. Georgios Despotou; The University of York; York YO10 5DD UK

Size: px
Start display at page:

Download "Using Scenarios to Identify and Trade-off Dependability Objectives in Design. Georgios Despotou; The University of York; York YO10 5DD UK"

Transcription

1 Using Scenarios to Identify and Trade-off Dependability Objectives in Design Georgios Despotou; The University of York; York YO10 5DD UK John McDermid; The University of York; York YO10 5DD UK Tim Kelly; The University of York; York YO10 5DD UK Keywords: dependability, dependability cases, design tradeoffs, scenarios, requirements elicitation, rationale capture, network centric warfare Abstract Whilst there is no consensus on the exact definition of dependability, many agree that it is a composite term consisting of many different non-orthogonal attributes. These can be in conflict or in harmony. This characteristic of dependability inevitably results in compromises and trade-offs being made during the design process. During the evolution of a dependable system, it is important that stakeholders justify any trade-offs made. These decisions must be made with due consideration of the system s operational role and context. Scenarios can be used to capture, in descriptive form, the different aspects and context of the system s operation. Stakeholders can use scenarios to describe their views of intended system operation. Elaborating on the scenarios, stakeholders can elicit specific and more detailed dependability objectives (e.g. relating to safety, performance and availability). By providing a clear context, scenarios allow system stakeholders to reason about the acceptable bounds for each dependability objective. In the design of the system it can be hard to satisfy the dependability objectives of all scenarios. An understanding of the importance of each scenario (as elicited from the stakeholders), together with the bounds associated with scenario dependability objectives, can be used to support the process of trading-off one objective in favour of another during design. In this paper we describe this scenario-based approach to the identification and balancing of dependability objectives in design. Introduction Increasingly, developers of large scale and complex systems are often challenged to argue the dependability of their systems during operation. Consequently, the concept of dependability cases has arisen. Dependability cases communicate a clear and defensible argument that a system is acceptably dependable within a certain operational context. Dependability is a composite system property consisting of heterogeneous and non-orthogonal attributes. From a more general standpoint dependability has been described as a variable sized vector of attributes describing subjective desiderata according to the stakeholders particular requirements (reference 1). Scenarios are a means commonly used to capture tacit information and the rationale for eliciting requirements, by considering the anticipated use of the system. During the evolution of a dependability argument, scenarios form the necessary context, based on which better judgements about the evolution of the argument can be made. The dependability objectives of a system can be in conflict or in harmony, according to how the system is designed, leading to inevitable situations where trade-offs must be made. When making trade-offs a dependability objective may not be fully, but instead met partially, in favour of addressing another objective of more importance to the system. Throughout the development of the system, such decisions must be justified and recorded capturing at the same time the rationale for the decision. The paper presents an approach that fits within the dependability case framework for identification and balancing of dependability objectives. An example of the approach is provided by creating the dependability argument for a hypothetical Battlefield Communications System, whilst making balanced design decisions.

2 Fundamentals of the Dependability Case Framework Dependability cases are based on proven and widely used concepts of safety cases. Safety cases communicate an argument that a system is acceptably safe in a particular context. Safety cases ultimately address only one attribute (safety), whereas dependability addresses more attributes such as availability, safety and security. Our previous work (reference 2) defined the dependability case as being a clear and defensible argument that a system is acceptably dependable in a certain operational context, and identified the problems that appear when creating a multi-attribute argument. At the core of the proposed framework is the Goal Structuring Notation (GSN), a graphical notation (adopted widely in the safety domain) used to evolve and record the dependability arguments. The GSN explicitly represents the individual elements of any argument (requirements, claims, evidence and context) and the relationships that exist between these elements. It is not the scope of the paper to present the GSN (which is presented in detail in reference 3), although due to the nomenclature used in GSN, the terms objective and goal are considered to be identical and have been used interchangeably. The attributes of dependability are heterogeneous, non-orthogonal and can be interrelated to each other. Attempting to address all dependability attributes can result in competing objectives. For example it is a common problem for availability to be in conflict with safety (e.g. in civil aviation). As a consequence there will be situations where it is inevitable that some dependability objectives must be traded-off in favour of others. For each attribute different methods, practices and expertise exist that result in different types of arguments supported by different types of evidence. Hence, an initial observation of the work was that presenting and arguing about all the individual (attribute) objectives of a system within a single argument is ineffective, as it is difficult to appreciate when an objective has been systematically and sufficiently addressed. In order to resolve the issue of the attribute heterogeneity we have adopted a modular approach to structuring dependability arguments. Creating different modules of arguments is a GSN capability, which has been so far used to manage complex safety cases. The safety case for an overall system can be divided into a number of modules containing the separate arguments and evidence for different aspects of the system s safety. Further description of modular and compositional safety cases can be found in reference 4. In the same vein, we create individual arguments for each of the dependability attributes, encapsulating the appropriate types of argument and evidence. Figure 1 provides an example of the layout of the different argument modules. On the top of the figure is the Top Level Dependability Argument module. This is an argument justifying that the dependability objectives elicited are appropriate for the system s use. Constructing the top-level dependability argument will result in defining specific dependability objectives, each referring to a dependability attribute. This gives Spinal Safety Argument us the ability to argue over each attribute individually that the system meets its objectives. Also it is worth noting that all the attribute modules are put forward in the context of a trade-off argument, which provides an argument that all attributes are acceptable in the context of each other. For example, the system is acceptably safe and at the same time acceptably secure and in the same time acceptably fast. The Battlefield Communications System (BCS) We consider the example of a Battlefield Communications System (BCS) designed to allow collaboration between the elements within a battlefield. Types of such elements include the theatre headquarters, mechanised units and infantry companies. Such systems are at the heart of Network Centric Warfare (NCW). NCW requires integration Spinal Top Level Dependability Argument Spinal Security Argument Context Trade -off Argument Figure1 - Modular View of Dependability Spinal Performance Argument

3 and coordination between all battle, control and decision making systems so that appropriate tactics and resources are used to achieve the mission goal (reference 5). Even at first glance the NCW paradigm demands a large number of communication links between the elements of the battlefield. This requires a communication infrastructure that can be used by all the elements that make up the overall battlefield system. Among the main services of the BCS are: analogue and digital voice services, data messaging and (battlefield) data sharing between the battlefield elements, and automatic unit position reporting and route planning. The BCS is a system that consists of many subsystems that are either functioning on their own right (e.g. network routers) or are integrated within other platforms (e.g. digital transmitters within vehicles). The BCS consists of a collection of systems including terminals, radios, digital encryption devices, antenna masts and microwave dishes. It is obvious that a system with such complexity and diversity of systems and technologies used can have different interpretations for dependable operation, especially in a military environment. Scenarios as a Means of Objectives Elicitation Figure 3 presents an example top-level dependability goal structure, which captures the principal goals to be addressed during the initial phase of the argument evolution. The top-level dependability goal can be as simple as dependable. The top-level dependability goal GD is stated in the context of the anticipated operational role of the system. Arguing over the anticipated scenarios of the system operation allows us to further decompose the goal taking into account the expected modes of operation of the system. In this example we have identified as possible scenarios within the operational role, the use of the BCS during a battlefield Search and Rescue (SR) mission, and the Routine Battlefield Reconnaissance. Scenarios can even be used to describe the qualities necessary for a scenario describing the disassembly and transportation of the BCS (e.g. ease of dismounting components). Our approach in defining the dependability objectives has its basis on identifying the behaviour of the system that is required, in order for it to achieve the scenarios that the stakeholders envision. In different situations the system may have to demonstrate that it achieves different dependability objectives. Scenarios provide an effective means for capturing information and presenting them in a structured form, so that they can be used methodically during the design and the evolution of the dependability argument. In the case of the BCS, scenarios are means of facilitating the stakeholders to describe and share discussions concerning the envisaged use of the system. We use scenarios to identify what the system is expected to do, to elicit any constraints and most importantly to identify the rationale underlying the application of the constraints (i.e. capturing the reasons why constraints are necessary). Scenarios are often referenced during the development of a dependability argument, as they provide the argument s context. G_SR GD dependable SGD Argument over anticipated scenarios dependable for a 'Search and Rescue' mission S_Roles System's operational role Scenarios System scenarios G_BR depdnable for 'Routine Battlefield Reconnaissance' Figure 2 Top Level Dependability Claim We have used two types of scenarios to define the operational context of the dependability argument; super-scenarios and micro-scenarios. Elicitation of both types of scenarios consists of several steps, the aim of which is to elicit the rationale for the top dependability argument. Super-scenarios are based on the concept of operations, and identify the overall use of the system with an aim to identify the attributes that the system should achieve in order to successfully accomplish the scenario. Micro-scenarios are inspired by work of the Software Engineering Institute (SEI) to elicit Quality Attribute requirements for software architectures (reference 6). Their main use is to elicit specific dependability requirements for the system, which in combination with the super-scenarios will provide clear and unambiguous dependability objectives for the system designers. In contrast to super-scenarios they are more attribute-oriented (rather than operational oriented), and they make explicit references to entities of the system (assets, sub-systems etc). The Search and Rescue (SR) mission and the Routine Battlefield Reconnaissance are two of the possible anticipated scenarios. Out of the two, the SR scenario will be used to illustrate further development of the top-level dependability claim based on the application of scenarios.

4 Table 1 shows the steps for eliciting the super-scenario as well as the purpose of each step and an example of the BCS Search and Rescue scenario. Each of the steps has a contribution in facilitating the creation of the dependability argument, as it is described in the middle column of the table. Table 1 Super Scenario Steps S - Scenario Steps Purpose/Outcome BCS Example 1) State participant stakeholders. Identification of the stakeholders involved/affected by the scenario. Rescue team, people/entities to be collected, mission commander. 2) Describe end objective of the Helps identify when a scenario will Deployment of a team within a scenario. be successful. radius of 100km in a possibly hostile environment, trace, recovery and safe return with the object(s). 3) Identify utility of the scenario. Description of what is the benefit for introducing the scenario to the system. 4) Describe participant top-level system functions. 5) Identify constraints on scenario and functions. Highlights the motive for the scenario. Together with step 2 helps capturing the rationale for eliciting the acceptability criteria for the dependability goals. Associates the system operation with the mission (end-objective). Helps identify the concept of the system. Capture of the rationale of the constraints with respect to the mission/scenario objectives. Rescue of life or recovery of an object of great importance. Combined losses lees than if the mission would not take place. Deployment Start-up - Update of digital map - Team location update Command Mission state update Transmission of data. Rescue team should be sent ASAP to maximise chances of the object s survival. All communications should not be done in a way that the team s location can be traced by enemy. System should be operational within a 100 km radius. As show in table 1, the scenario engages the stakeholders to define the operational context of the scenario and elicit the required attributes. For example when describing the end objective of the scenario, the stakeholders identify the radius (performance objective) within which the system needs to operate. Furthermore, by describing the utility of the scenario we can understand that if the number of anticipated SR team casualties is more than the lives saved, this may be considered unacceptable. Certainly there are occasions when such decisions will have to be made by subjective judgement. For example, when the SR team needs to collect an object of great importance. Whereas in the former case the decision could be based on a comparison between the expected losses against the lives to be saved, in the latter there cannot be a straightforward comparison. The justification for accepting the mission risk depends solely on the importance of the object to the stakeholders involved. The description of the end objective in combination with the identification of utility reveals further objectives such as the requirement that the SR team cannot be traced easily. Identification of the operational context, taking into account the functions of the system that will be used during the scenario, allows us to determine more detailed objectives. For example we conclude that since the SR team will use the BCS to transmit its location, this should be done with acceptable security so that enemy units cannot discover the team s location. Following the conclusions from defining the super scenario (table 1) we can further decompose the G_SR goal, by adopting the strategy of arguing over the attributes that are required for the scenario to complete. As such, possible sub-goals denote that the system should be acceptably secure, safe and available (Figure 4). However, only identifying the overall properties that the system should demonstrate during operation, is not enough to evolve a clear dependability argument. Micro-scenarios are employed to elicit further detail for each attribute of concern, by describing the specific behaviour the system should demonstrate with respect to each attribute. Table 2 presents the steps of a micro-scenario concerned with the availability attribute that was previously identified for the search and rescue (SR) scenario of the BCS.

5 Table 2 Micro-scenario Steps µ Scenario Steps Purpose/Outcome BCS Example 1) Identify stimulus. Identification of a trigger for the attribute, which needs to be considered when it arrives at the system. Failure of systems providing necessary functions for SR scenario. 2) Identify operational context of stimulus. 3) Categorise µ scenarios according to S-scenarios. Relates to S-scenario by examining the impact of the stimulus on the scenario. Provides more specific grounds for targets and limits. Identification of the attribute (different attribute possibly means different type of argument and evidence) as described by the S- scenario. Facilitates the elicitation of argument strategies. Identify goals descending from different scenarios but refer to the same attribute. 4) Identify appropriate response. Mitigation of the effect, maintaining the operational objectives. 5) State impact of scenario on the system. Indicate what are the effects of the scenario on the system. Brainstorming for designers. SR team must be able to communicate when required as it may be critical. All critical services during the mission should be available to the team. Maintain provision of service, discover different source for the same service. Additional resources and systems required to replace the ones failed. Micro-scenarios provide the way forward for the argument. Strategies SAvail and SSafe (in figure 4) are based on the description of the micro-scenarios, since both make arguments over the different stimuli (for each attribute) for this system. Thus, for safety the argument is made over the identified situations leading to loss of life and for availability over the identified situations leading to service disruption, resulting in the goals SerAvail and TimelyDeployment shown in Figure 4. It is worth noting that one of the identified situations in the micro-scenario that can lead to loss of life (safety), is concerned with the timely operation of the system. Therefore, a safety concern about the operation of the system in the particular context (SR Scenario) resulted in a performance objective, something that without the use of the scenarios may not have been explicitly identified. Furthermore, GSN provides traceability, making it easier to follow the argument to its origin and find the rationale for any goals/decisions throughout its development. Following the argument we can see that the for the SR scenario (which has been referenced as context), it is important that the SR team can be deployed quickly. Example values for this goal are one hour, but under no circumstances should the system take more than two hours to be ready to support the SR team. Passing the limit value of acceptability for the timely performance objective means that the risk the SR team itself is exposed to, is greater than the probability of actually coming back with more survivors than possible losses. Therefore the deployment performance of the system cannot successfully satisfy the requirements for the SR scenario. The creation of a dependability case is a process that takes place in parallel with the design, recording any design assumptions and conclusions made during the construction of the argument. Scenarios provide a means of eliciting the rationale needed for creating a system s top-level dependability argument. Starting from a general dependability goal, scenarios offer the necessary context for refining the goal into specific objectives and specifying the context for their acceptability (target and limit criteria). In order to effectively incorporate these criteria within the argument GSN structure we have introduced the target and limit symbols, which also provide a context in which trade-offs can be discussed. Those additions to GSN are discussed in the following section.

6 G_SR dependable for 'Search and Rescue' scenario S_GR Argument over attributes of concern Sc_Attr Attributes of concern in scenarios G_Att_Sec secure for SR mission G_Att_Avail available for SR mission G_Att_Safe safe for SR mission C_AvailRisk SAvail SSafe C_SafeRisk Causes of communications Argument over situations of service disruption Argument over situations leading to loss of life People at risk SerAvail TimelyDeployment Disruption of critical services has been addressed Simulation of not deploying the system in timely manner has been addressed SRScenario SSerAvail STimelyDeployment SysFuncAlloc Definition of SR mission critical services Argument over availability of critical services Argument over deployment (time) characteristics of the involved systems System participating during the SR mission TargetPickLocAvail TargetSysDeploy Service should be 100% available for the duration of the mission LimitPickLocAvail Service should not be disrupted for more than 5 mins PickLocServAvail 'Pick up location' services are acceptably available SysDeploy All involved systems are operational in a timely manner Operational within 1 hr from notfication of mission LimitSysDeploy Operational within 2hrs from notification Figure 4 Top Level Dependability Argument

7 Capturing Targets and Limits within the Dependability Case It is common that systems for which developers are required to provide assurance of their dependable operation are by their nature complex in structure and are often deployed in complex and dynamic operational environments. An eventuality that almost certainly appears in the construction of systems of such scale is that a design will not achieve all its dependability objectives in their entirety, resulting in trade-offs between the dependability objectives. A concept introduced to facilitate trade-off is the definition of the bounds of compromise for each dependability objective, by identifying its acceptability criteria. When identifying a dependability objective, we implicitly identify a target requirement that the system should satisfy. For example consider the typical requirement of 99.9% percent availability. For this target requirement the defined dependability objective would be a system of acceptable availability, with an acceptability criterion of 99.9% of the total operational time. The Top Level Dependability Argument includes justification of the target criterion associated with a dependability goal, which is set according to the operational needs of the system. Apart from the target acceptability criterion we also define the limit of acceptability. We define the limit as being the minimum condition that must be met so that the system will acceptably satisfy the objectives of the anticipated operation (scenarios). Targets and limits in combination define the bounds within which we can trade an objective in favour of another resulting in an overall acceptable system. The amount by which the target and limit differ is a decision of the stakeholders involved that will eventually determine the region within which we can trade an objective. For example, for a critical scenario the limit may be close to the target allowing less flexibility. The concept is similar to the ALARP principle, used in the safety domain, as a means of trading-off safety against cost. ALARP defines the tolerable risk as the risk where additional spending on risk reduction would be in disproportion to the actual obtainable reduction of risk (reference 7). A risk target after which the risk is unacceptable for the system describes what is meant by tolerable risk. The concept of the bounds has been introduced in GSN, presented as the context symbol with a bar on the top or bottom indicating whether it s a target or limit respectively. Figure 4 shows an example of the notation by presenting a performance objective of the BCS with its associated acceptability criteria. Design Alternatives and Dependability Goals So far we have discussed how scenarios can be used to elicit dependability objectives and support development of the dependability argument. Looking now at system development from a designer s perspective we will demonstrate how the development process of the system interacts with the development of the argument. So far the top-level dependability argument provided the objectives required to be met by the system. At the same time construction of the argument requires references to design decisions, such as the definition of the top-level functions, perceived conceptual design (identification of platforms Figure5) and the allocation of functions to each of the platforms and subsystems. After this stage, explicit decisions need to be made about the design of the system. According to what are the specified objectives, designers can employ a number of methods to define possible designs. Elicitation of designs is not within the scope of the paper, but we acknowledge that during every design decision designers may be faced with the challenge of selecting between several possible design alternatives. Each of the design alternatives features different characteristics that might have different impact on the dependability objectives. Balancing these objectives is a subjective and qualitative decision, which needs to be done by assessing the importance of each of the objectives for the system, and assessing each alternative with respect to the objectives. Considering the BCS example, for reasons of simplicity we define two main platforms being: a) the base headquarters (HQ) and b) the SR team. Figure 6 shows the subsystems that each of the two main platforms comprises of. Based on this information, we define two possible design alternatives in the context of goals/objectives SysDeploy and PickLocServAvail (Figure 4). The former refers to the timely deployment of the BCS so that it can support the SR mission within one hour from notification. The latter refers to the availability of the BCS service that allows the SR team to request the HQ to be picked up by providing the pick up location. Both goals have been defined in the context of a target and a limit that have been elicited using the scenarios.

8 HQ - Terminals - DSP module - Network connection - Network router - Antenna mast RF SR-Team - Receiver - Signal Processing - Positioning module - Terminal Alt 1: Redundant design by duplicating all services. Alt 2: Redundant critical services. Use of hot stand-by components. Figure 5 Overview of the BCS systems As it is depicted in figure 5 two alternatives have been considered each with a bias to the two identified goals. Alternative 1 provides redundancy by duplicating every service and with that all the systems that provide the services. This would require additional systems on both platforms (HQ and SR Team). At a first glance it is noticeable that alternative 1 has a very positive impact on the availability objective PickLocServAvail. Providing additional systems that have the same functionality will make a more available system than without redundancy, as it reduces the probability of loss of service due to both systems failing simultaneously. However, the decision to provide redundancy for all services consequently increases the total number of systems participating and therefore increases the time the BCS will need to deploy and set-up for operation. The effect becomes greater when considering the start-up (system and personnel) procedures and the overhead due to the synchronisation of the extra sub-systems. On the other hand, Alternative 2 does not provide redundancy for all services but instead focuses on those that are considered to be the most critical, and for the rest uses systems that can be replaced very easily (e.g. a plug-in rack for the DS Processor). Alternative 2 has an obvious negative impact on objective PickLocServAvail since there may be a disruption of service for a few minutes where the service is provided by a single system. Nevertheless, it has a positive impact on SysDeploy as there are fewer systems to deploy, and the stand-by systems can be positioned immediately after the BCS has started operating, utilising better the personnel that will set-up the BCS. The two alternatives have their relative advantages and disadvantages. The contrast between the two alternatives can be seen when trying to evaluate them against the dependability objectives. In order to make a decision, we need to take into account the context of the goals as identified by the scenarios. Although the final decision is subject to the stakeholders it is important to recognise that this decision has to be justified by an argument. This stage is another instance where scenarios can be usefully utilised to help making the decision. In this example, alternative 2 was selected. The justification for the selection resides in the scenarios. Losing the service for five minutes will have less risk of failing the mission than starting from the beginning with a considerable delay. We assume that both alternatives are within the limits of acceptability. If they were not, then the system would fail to successfully demonstrate acceptable behaviour for the anticipated SR scenario. Still, there is a possibility that the stakeholders may reach an impasse if the design cannot meet its objectives, eventually leading to acceptance of the system as it is. Such a case implies that bounds defining the acceptability are automatically re-evaluated. Although it was clear in the above example as to why the final design decision was made, when a system has to satisfy more dependability objectives decisions will often be less straightforward requiring a systematic process for making and arguing the necessary trade-offs. The authors have defined such a process that can be used within the dependability case framework. However it is outside the scope of the paper to present it. Even though the BCS is a hypothetical system, it is not far from reality. The scenario-based approach gave the required input to make the appropriate trade-off(s) and select the most suitable design. Summary Dependability is a composite term consisting of many different non-orthogonal attributes, which can be in conflict or in harmony. This results in trade-offs that need to be made but also justified by the system stakeholders. Dependability cases, building on the existing well-established concept of safety cases must communicate the argument that a system is acceptably dependable for its operation. In this paper we present an approach based on scenarios to construct and evolve a dependability argument using GSN, eliciting the dependability objectives for the

9 system and justifying reconciliations between conflicting dependability objectives. Goal Structuring Notation provides a useful tool for explicitly identifying and tracing the rationale (that underlies every design decision). Defining scenarios that assist the elicitation of the dependability argument is proving to be a propitious means for constructing a dependability case. References 1. Prasad D., Dependable Systems Integration using Measurement Theory and Decision Analysis. PhD Thesis, Department of Computer Science, University of York, UK, Despotou G., Kelly T., Extending the Safety Case Concept to Address Dependability. In proceedings of the 22 nd International System Safety Conference, System Safety Society, Kelly T. P., Arguing Safety A Systematic Approach to Managing Safety Cases. PhD Thesis, Department of Computer Science, University of York, UK, Kelly T., Managing Complex Safety Cases. In Proceedings of the 11 th Safety Critical Systems Symposium, Springer-Verlag, Network Centric Warfare. Department of Defence Report to US Congress ( 6. Bass L., Clements P., Kazman R., Software Architecture in Practice 2 nd Edition. pp Addison-Wesley (ISBN: ), International Electrotechnical Commission. IEC Functional Safety of Electrical/ Electronic/ Programmable Electronic Safety Related Systems. IEC Biographies Georgios Despotou BEng (Hons), MSc, MIEE. Research Student, Department of Computer Science, The University of York, York, YO10 5DD, United Kingdom. Phone: , Fax: georgios.despotou@cs.york.ac.uk Georgios Despotou is a research student in the high integrity systems engineering (HISE) group, under the defence and aerospace research partnership (DARP). He received a BEng (Hons) in the joint degree of Computer Systems Engineering from the University of Hull in 2001 and in 2003, a Masters of Science in Software Engineering from the University of York, where he is currently a PhD student. Current research activities involve Dependability Cases and software and systems architectures for high assurance systems. Prof. J.A. McDermid, Ph.D. Professor of Software Engineering, Department of Computer Science, The University of York, York, YO10 5DD, United Kingdom, Phone: , Fax: john.mcdermid@cs.york.ac.uk Prof. John McDermid has been Professor of Software Engineering at the University of York since 1987 where he runs the High Integrity Systems Engineering group. HISE studies a broad range of issues in systems, software and safety engineering, and works closely with the UK aerospace industry. Professor McDermid is the Director of the Rolls-Royce funded University Technology Centre (UTC) in Systems and Software Engineering and the BAE SYSTEMS-funded Dependable Computing System Centre (DCSC). He is author or editor of six books, and has published about 280 papers.

10 Dr Tim Kelly MA, PhD. Lecturer, Department of Computer Science, The University of York, York, YO10 5DD, United Kingdom. Phone: , Fax: Dr Tim Kelly is a Lecturer in software and safety engineering within the Department of Computer Science at the University of York. He is also Deputy Director of the Rolls-Royce Systems and Software Engineering University Technology Centre (UTC) at York. His expertise lies predominantly in the areas of safety case development and management. His doctoral research focussed upon safety argument presentation, maintenance, and reuse using the Goal Structuring Notation (GSN). Tim has provided extensive consultative and facilitative support in the production of acceptable safety cases for companies from the medical, aerospace, railways and power generation sectors. Before commencing his work in the field of safety engineering, Tim graduated with first class honours in Computer Science from the University of Cambridge. He has published a number of papers on safety case development in international journals and conferences and has been an invited panel speaker on software safety issues.

Software Safety Assurance What Is Sufficient?

Software Safety Assurance What Is Sufficient? Software Safety Assurance What Is Sufficient? R.D. Hawkins, T.P. Kelly Department of Computer Science, The University of York, York, YO10 5DD UK Keywords: Software, Assurance, Arguments, Patterns. Abstract

More information

The Costs, Benefits, and Risks Associated With Pattern -Based and Modular Safety Case Development

The Costs, Benefits, and Risks Associated With Pattern -Based and Modular Safety Case Development The Costs, Benefits, and Risks Associated With Pattern -Based and Modular Safety Case Development Dr Tim Kelly, MA PhD; University of York; York Simon Bates, MEng; University of York; York K e y w o r

More information

Deriving Safety Requirements as Part of System Architecture Definition. Weihang Wu, M.Sc.; Tim Kelly, Ph.D.; University of York; York, UK

Deriving Safety Requirements as Part of System Architecture Definition. Weihang Wu, M.Sc.; Tim Kelly, Ph.D.; University of York; York, UK Deriving Safety Requirements as Part of System Architecture Definition Weihang Wu, M.Sc.; Tim Kelly, Ph.D.; University of York; York, UK Keywords: safety requirements, Use Case Maps, architectural design

More information

Using Scenarios in Architecture Evaluations Rick Kazman

Using Scenarios in Architecture Evaluations Rick Kazman Using Scenarios in Architecture Evaluations Rick Kazman When we analyze software architectures, we always want to do so with respect to an explicit or assumed set of quality attributes: modifiability,

More information

Functional Hazard Assessment in Product-Lines A Model-Based Approach

Functional Hazard Assessment in Product-Lines A Model-Based Approach Functional Hazard Assessment in Product-Lines A Model-Based Approach Ibrahim Habli, Tim Kelly, Richard Paige Department of Computer Science, University of York, York, United Kingdom {Ibrahim.Habli, Tim.Kelly,

More information

Research on software systems dependability at the OECD Halden Reactor Project

Research on software systems dependability at the OECD Halden Reactor Project Research on software systems dependability at the OECD Halden Reactor Project SIVERTSEN Terje 1, and ØWRE Fridtjov 2 1. Institute for Energy Technology, OECD Halden Reactor Project, Post Box 173, NO-1751

More information

INTEGRATION OF AUTONOMOUS SYSTEM COMPONENTS USING THE JAUS ARCHITECTURE

INTEGRATION OF AUTONOMOUS SYSTEM COMPONENTS USING THE JAUS ARCHITECTURE INTEGRATION OF AUTONOMOUS SYSTEM COMPONENTS USING THE JAUS ARCHITECTURE Shane Hansen Autonomous Solutions, Inc. Phone: (435) 755-2980 Fax: (435) 752-0541 shane@autonomoussolutions.com www.autonomoussolutions.com

More information

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation Chapter 2 Software Processes Lecture 1 Software process descriptions When we describe and discuss processes, we usually talk about the activities in these processes such as specifying a data model, designing

More information

Functional requirements and acceptance testing

Functional requirements and acceptance testing Functional requirements and acceptance testing Lecture 3 Software Engineering TDDC88/TDDC93 autumn 2007 Department of Computer and Information Science Linköping University, Sweden Message from the course

More information

9. WORKSHOP 1: What is a Capability System Model?

9. WORKSHOP 1: What is a Capability System Model? DSTO-GD-0734 9. WORKSHOP 1: What is a Capability System Model? Dr Michael Ryan University of New South Wales Abstract In the current Defence acquisition system, the Capability System is described principally

More information

Abstract. Table 1- Initial Definitions. Direct evidence

Abstract. Table 1- Initial Definitions. Direct evidence Role Activity Diagrams for safety process definition Steven Dawkins; Department of Computer Science; University of York, York, England. Keywords : process, evidence, safety arguments Abstract As more integrated

More information

QUICKLOOK PROJECT PROPOSAL

QUICKLOOK PROJECT PROPOSAL QUICKLOOK PROJECT PROPOSAL Version 1.06 By Tactical Science Solutions, Inc. in support of the Tactical Satellite-3 design effort February 15, 2007 Group: Tactical Science Solutions, Inc. Authors: David

More information

SWE 211 Software Processes

SWE 211 Software Processes SWE 211 Software Processes These slides are designed and adapted from slides provided by Software Engineering 9 /e Addison Wesley 2011 by Ian Sommerville 1 Outlines Software process models Process activities

More information

COPYRIGHTED MATERIAL RELIABILITY ENGINEERING AND PRODUCT LIFE CYCLE 1.1 RELIABILITY ENGINEERING

COPYRIGHTED MATERIAL RELIABILITY ENGINEERING AND PRODUCT LIFE CYCLE 1.1 RELIABILITY ENGINEERING 1 RELIABILITY ENGINEERING AND PRODUCT LIFE CYCLE 1.1 RELIABILITY ENGINEERING Reliability has a broad meaning in our daily life. In technical terms, reliability is defined as the probability that a product

More information

Agility. David S. Alberts Kathy Conley. April 2015 Approved for public release; distribution is unlimited. Log: H IDA Document NS D-5499

Agility. David S. Alberts Kathy Conley. April 2015 Approved for public release; distribution is unlimited. Log: H IDA Document NS D-5499 INSTITUTE FOR DEFENSE ANALYSES Agility C2 Approach Autonomy David S. Alberts Kathy Conley April 2015 Approved for public release; distribution is unlimited. Log: H 15-000491 IDA Document NS D-5499 INSTITUTE

More information

Product Line Potential Analysis

Product Line Potential Analysis Product Line Potential Analysis Claudia Fritsch and Ralf Hahn Robert Bosch GmbH Corporate Research and Development P.O. Box 94 03 50, D-60461 Frankfurt, Germany {Claudia.Fritsch Ralf.Hahn}@de.bosch.com

More information

Abstract. 1 Introduction

Abstract. 1 Introduction TRACE supervision system for dispatching and passenger information M. Renkema, H. Vas Visser Railverkeerssystemen, Holland Railconsult, Utrecht, The Netherlands Abstract This paper describes the TRACE

More information

Methodological approaches based on business rules

Methodological approaches based on business rules Revista Informatica Economică nr.3(47)/2008 23 Methodological approaches based on business rules Anca Ioana ANDREESCU, Adina UŢĂ Academy of Economic Studies, Bucharest, România Business rules and business

More information

Product Line Engineering Lecture PL Architectures I

Product Line Engineering Lecture PL Architectures I Product Line Engineering Lecture PL Architectures I Dr. Martin Becker martin.becker@iese.fraunhofer.de 0 Schedule - Lectures 1 Schedule - Exercises 2 Product Line Scoping --- Requirements Engineering ---

More information

Tech deficit. June 2014

Tech deficit. June 2014 Tech deficit June 2014 Executive Summary Breaking into new markets, meeting customer requirements and increasing profitability are key objectives for all companies. Efficient and adaptable technology is

More information

Automotive Systems Engineering und Functional Safety: The Way Forward

Automotive Systems Engineering und Functional Safety: The Way Forward Automotive Systems Engineering und Functional Safety: The Way Forward Dr. Simon Burton Albert Habermann Vector Informatik GmbH Ingersheimer Strasse 24 70499 Stuttgart, Germany +49 711 80670 1529 albert.habermann@vector.com

More information

Reliability Analysis Techniques: How They Relate To Aircraft Certification

Reliability Analysis Techniques: How They Relate To Aircraft Certification Reliability Analysis Techniques: How They Relate To Aircraft Certification Mark S. Saglimbene, Director Reliability, Maintainability and Safety Engr., The Omnicon Group, Inc., Key Words: R&M in Product

More information

Knowledge in Planning Scheduling and Control. Abstract

Knowledge in Planning Scheduling and Control. Abstract Knowledge in Planning Scheduling and Control. Track: Operations Planning, Scheduling and Control. Jane Guinery, Dr Sarah Crawford, Dr Bart MacCarthy Management and Human Factors Group, University of Nottingham

More information

Chapter 16 Software Reuse. Chapter 16 Software reuse

Chapter 16 Software Reuse. Chapter 16 Software reuse Chapter 16 Software Reuse 1 Topics covered The reuse landscape Application frameworks Software product lines COTS product reuse 2 Software reuse In most engineering disciplines, systems are designed by

More information

version NDIA CMMI Conf 3.5 SE Tutorial RE - 1

version NDIA CMMI Conf 3.5 SE Tutorial RE - 1 Requirements Engineering SE Tutorial RE - 1 What Are Requirements? Customer s needs, expectations, and measures of effectiveness Items that are necessary, needed, or demanded Implicit or explicit criteria

More information

Software Processes 1

Software Processes 1 Software Processes 1 Topics covered Software process models Process activities Coping with change 2 The software process A structured set of activities required to develop a software system. Many different

More information

Designed-in Logic to Ensure Safety of Integration and Field Engineering of Large Scale CBTC Systems

Designed-in Logic to Ensure Safety of Integration and Field Engineering of Large Scale CBTC Systems Designed-in Logic to Ensure Safety of Integration and Field Engineering of Large Scale CBTC Systems Fenggang Shi, PhD; Thales Canada Transportation Solutions; Toronto, Canada Keywords: safety engineering,

More information

SESA Transportation Working Group

SESA Transportation Working Group SESA Transportation Working Group Presentation: Establishment of Software Safety Requirements in a Later Phase of Project Life Cycle Why Software Prevalence of Software in transport systems Functionality

More information

The ORP Process When developing new opportunities Shell Exploration and Production (EP) uses the Opportunity Realization

The ORP Process When developing new opportunities Shell Exploration and Production (EP) uses the Opportunity Realization Summary This rapport describes the development of the Logistic Concept modelling tool for the Shell Exploration and Production division, and more specifically, for the Logistics and Infrastructure group

More information

Chapter 16 Software Reuse. Chapter 16 Software reuse

Chapter 16 Software Reuse. Chapter 16 Software reuse Chapter 16 Software Reuse 1 Topics covered What is software reuse? Benefit and problems with reuse. The reuse landscape Application frameworks Software product lines COTS product reuse 2 Software reuse

More information

Rational Software White Paper TP 174

Rational Software White Paper TP 174 Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP 174 Table of Contents Abstract... 1 Introduction... 1 Level 2, Repeatable... 2 Requirements Management...

More information

SOFTWARE DEVELOPMENT STANDARD

SOFTWARE DEVELOPMENT STANDARD SFTWARE DEVELPMENT STANDARD Mar. 23, 2016 Japan Aerospace Exploration Agency The official version of this standard is written in Japanese. This English version is issued for convenience of English speakers.

More information

MODELING OF LOGISTICS IN COMPUTER ASSISTED EXERCISES

MODELING OF LOGISTICS IN COMPUTER ASSISTED EXERCISES Sławomir BYŁEŃ MODELING OF LOGISTICS IN COMPUTER ASSISTED EXERCISES Abstract: A command post exercise, supported by a computer simulation, is one of the primary training tools available to the Polish Armed

More information

Architecture Practice: a fundamental discipline for information systems

Architecture Practice: a fundamental discipline for information systems Association for Information Systems AIS Electronic Library (AISeL) ACIS 2002 Proceedings Australasian (ACIS) December 2002 Architecture Practice: a fundamental discipline for information systems Pin Chen

More information

Analyzing Software Architectures for Modifiability

Analyzing Software Architectures for Modifiability Analyzing Software Architectures for Modifiability PerOlof Bengtsson *, Nico Lassing **, Jan Bosch * and Hans van Vliet ** * Department of Software Engineering and Computer Science University of Karlskrona/Ronneby

More information

A Model-Driven Approach to Assuring Process Reliability

A Model-Driven Approach to Assuring Process Reliability 19th International Symposium on Software Reliability Engineering A Model-Driven Approach to Assuring Process Reliability Ibrahim Habli, Tim Kelly Department of Computer Science University of York York,

More information

Deliverable: D 4.1 Gap analysis against ISO 26262

Deliverable: D 4.1 Gap analysis against ISO 26262 (ITEA 2 13017) Enabling of Results from AMALTHEA and others for Transfer into Application and building Community around Deliverable: D 4.1 Gap analysis against ISO 26262 Work Package: 4 Safety Task: 4.1

More information

Chapter 2: Project Methodologies and Processes

Chapter 2: Project Methodologies and Processes Chapter 2: Project Methodologies and Processes True/False 1. A methodology provides a systematic way to plan, manage, and execute projects. Ref: INTRODUCTION 2. The Project Management Body of Knowledge

More information

5.3 Supply Management within the MES

5.3 Supply Management within the MES Technical 6x9 / Manufacturing Execution Sytems (MES): Design, Planning, and Deployment / Meyer / 0-07-162383-3 / Chapter 5 Core Function Production Flow-Oriented Planning 85 Customer data (e.g., customer

More information

Risk Management Using Spiral Model for Information Technology

Risk Management Using Spiral Model for Information Technology Risk Management Using Spiral Model for Information Technology Rajendra Ganpatrao Sabale, Dr. A.R Dani Student of Ph.D., Singhania University, Pacheri Bari, Dist. Jhunjhunu( Rajasthan), India International

More information

Analysis and design of production and control structures

Analysis and design of production and control structures Analysis and design of production and control structures M.J. Verweij and A.J.R. Zwegers Department of Technology Management Eindhoven University of Technology, Pav. U21 P.O. Box 513, 5600 MB Eindhoven,

More information

Public Private Partnerships: Airwave

Public Private Partnerships: Airwave Public Private Partnerships: Airwave REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 730 Session 2001-2002: 11 April 2002 LONDON: The Stationery Office 0.00 Ordered by the House of Commons to be printed

More information

Introduction to Business Research 3

Introduction to Business Research 3 Synopsis Introduction to Business Research 3 1. Orientation By the time the candidate has completed this module, he or she should understand: what has to be submitted for the viva voce examination; what

More information

Actionable enterprise architecture management

Actionable enterprise architecture management Enterprise architecture White paper June 2009 Actionable enterprise architecture management Jim Amsden, solution architect, Rational software, IBM Software Group Andrew Jensen, senior product marketing

More information

Contract-Based Justification for COTS Component within Safety- Critical Applications

Contract-Based Justification for COTS Component within Safety- Critical Applications Contract-Based Justification for COTS Component within Safety- Critical Applications Fan Ye, Tim Kelly Department of Computer Science University of York York, YO10 5DD, United Kingdom {fan.ye, tim.kelly}@cs.york.ac.uk

More information

ENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER

ENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER ENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER Document No. Title P05PE Australian Engineering Stage 1 Competency Standards

More information

Integrated Product Developmenta Key to Affordability

Integrated Product Developmenta Key to Affordability Integrated Product Developmenta Key to Affordability Gunnar Holmberg Future Products and Technology Saab AB (publ.) Abstract Integrated Product Development (IPD) has been a major approach to improve performance

More information

Determining amphibious command and control staffing requirements using business process modelling and simulation

Determining amphibious command and control staffing requirements using business process modelling and simulation 22nd International Congress on Modelling and Simulation, Hobart, Tasmania, Australia, 3 to 8 December 2017 mssanz.org.au/modsim2017 Determining amphibious command and control staffing requirements using

More information

Usine Logicielle. Position paper

Usine Logicielle. Position paper Philippe Mils: Contact : Thales Resear & Technology Usine Logicielle Project Coordinator philippe.mils@thalesgroup.com Abstract Usine Logicielle Position paper Usine Logicielle is a project operated in

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 10 CHAPTER 2 LITERATURE SURVEY This chapter provides the related work that has been done about the software performance requirements which includes the sub sections like requirements engineering, functional

More information

PMBOK Guide Fifth Edition Pre Release Version October 10, 2012

PMBOK Guide Fifth Edition Pre Release Version October 10, 2012 5.3.1 Define Scope: Inputs PMBOK Guide Fifth Edition 5.3.1.1 Scope Management Plan Described in Section 5.1.3.1.The scope management plan is a component of the project management plan that establishes

More information

Design of an Integrated Model for Development of Business and Enterprise Systems

Design of an Integrated Model for Development of Business and Enterprise Systems International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 5, May 2015, PP 50-57 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Design

More information

Architecture-Centric Procurement

Architecture-Centric Procurement Architecture-Centric Procurement SATURN Conference April 29 May 3, 2013 Minneapolis, MN John Bergey Larry Jones Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-2612 Presentation

More information

Architectural Design. Objectives

Architectural Design. Objectives Architectural Design Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 11 Slide 1 Objectives To introduce architectural design and to discuss its importance To explain the architectural design

More information

Safety Cases for Advanced Control Software: Safety Case Patterns

Safety Cases for Advanced Control Software: Safety Case Patterns Safety Cases for Advanced Control Software: Safety Case Patterns Robert Alexander, Tim Kelly, Zeshan Kurd, John McDermid Department of Computer Science University of York 15 th October 2007 REPORT DOCUMENTATION

More information

Challenge H: For an even safer and more secure railway

Challenge H: For an even safer and more secure railway The application of risk based safety analysis has been introduced to the Railway system with the publication of the dedicated standard EN 50 126 in 1999. In the railway sector the application of these

More information

COLLECTIVE LOGISTICS SUPPORT FOR NATO-LED OPERATIONS

COLLECTIVE LOGISTICS SUPPORT FOR NATO-LED OPERATIONS 152 Military Art and Science COLLECTIVE LOGISTICS SUPPORT FOR NATO-LED OPERATIONS Roman DUFEK* dufek.roman@hq.nato.int Miroslav PECINA** miroslav.pecina@unob.cz *NATO International Staff, Defence Policy

More information

GE/GN8640. Risk Evaluation and Assessment. Guidance on Planning an Application of the Common Safety Method on. Rail Industry Guidance Note

GE/GN8640. Risk Evaluation and Assessment. Guidance on Planning an Application of the Common Safety Method on. Rail Industry Guidance Note GN Published by: Block 2 Angel Square 1 Torrens Street London EC1V 1NY Copyright 2014 Rail Safety and Standards Board Limited GE/GN8640 Method on Risk Evaluation and Assessment Issue One; June 2014 Rail

More information

STRUCTURAL AND QUANTITATIVE PERSPECTIVES ON BUSINESS PROCESS MODELLING AND ANALYSIS

STRUCTURAL AND QUANTITATIVE PERSPECTIVES ON BUSINESS PROCESS MODELLING AND ANALYSIS STRUCTURAL AND QUANTITATIVE PERSPECTIVES ON BUSINESS PROCESS MODELLING AND ANALYSIS Henry M. Franken, Henk Jonkers and Mark K. de Weger* Telematics Research Centre * University of Twente P.O. Box 589 Centre

More information

Implementation of Service-Oriented Architecture for an Integrated Simulation, Training and Experimental Environment

Implementation of Service-Oriented Architecture for an Integrated Simulation, Training and Experimental Environment Implementation of Service-Oriented Architecture for an Integrated, Training and Experimental Environment Jason Keir; Christopher Millmore Virtual Environments & Laboratory (VESL) School of ITEE j.keir@adfa.edu.au

More information

Introduction to Software Product Lines Patrick Donohoe Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213

Introduction to Software Product Lines Patrick Donohoe Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Introduction to Software Product Lines Patrick Donohoe Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2014 by Carnegie Mellon University Copyright 2014 Carnegie Mellon University

More information

Performing Hazard and Safety Analysis of Object Oriented Systems. R. D. Hawkins; Department of Computer Science, University of York; York, UK

Performing Hazard and Safety Analysis of Object Oriented Systems. R. D. Hawkins; Department of Computer Science, University of York; York, UK Performing Hazard and Safety Analysis of Object Oriented Systems R. D. Hawkins; Department of Computer Science, University of York; York, UK J. A. McDermid; Department of Computer Science, University of

More information

IEC Is it pain or gain?

IEC Is it pain or gain? IEC 61508 Is it pain or gain? Clive Timms, Director, C&C Technical Support Services Ltd. Introduction IEC 61508 (Ref. 1) provides designers and operators with the first generic internationally accepted

More information

This course book preview is provided as an opportunity to see the quality of the course material and to help you determine if the course matches your

This course book preview is provided as an opportunity to see the quality of the course material and to help you determine if the course matches your This course book preview is provided as an opportunity to see the quality of the course material and to help you determine if the course matches your needs. The preview is provided in a PDF form that cannot

More information

Success of Agile Environment in Complex Projects

Success of Agile Environment in Complex Projects Edith Cowan University Research Online Australian Information Warfare and Security Conference Conferences, Symposia and Campus Events 2010 Success of Agile Environment in Complex Projects Abbass Ghanbary

More information

A RFBSE model for capturing engineers useful knowledge and experience during the design process

A RFBSE model for capturing engineers useful knowledge and experience during the design process A RFBSE model for capturing engineers useful knowledge and experience during the design process Hao Qin a, Hongwei Wang a*, Aylmer Johnson b a. School of Engineering, University of Portsmouth, Anglesea

More information

The Systems and Software Product Line Engineering Lifecycle Framework

The Systems and Software Product Line Engineering Lifecycle Framework Revised January 27, 2013 Contact Information: info@biglever.com www.biglever.com 512-426-2227 The Systems and Software Product Line Engineering Lifecycle Framework Report ##200805071r4 Mainstream forces

More information

Introduction and Revision of IEC 61508

Introduction and Revision of IEC 61508 Introduction and Revision of IEC 61508 Ron Bell OBE, BSc, CEng FIET Engineering Safety Consultants Ltd Collingham House 10-12 Gladstone Road Wimbledon London, SW19 1QT UK Abstract Over the past twenty-five

More information

Methodology for the LCC-Analysis and the optimal migration of the railway operations control on the example of ETCS

Methodology for the LCC-Analysis and the optimal migration of the railway operations control on the example of ETCS Computers in Railways X 255 Methodology for the LCC-Analysis and the optimal migration of the railway operations control on the example of ETCS M. Obrenovic, B. Jaeger & K. Lemmer German Aerospace Center,

More information

Explore Comparative Analysis Software Development Life Cycle Models

Explore Comparative Analysis Software Development Life Cycle Models Explore Comparative Analysis Software Development Life Cycle Models Anshu Mishra Assistant Professor, Department of Information Science and Engineering Jyothy Institute of Technology, Bangalore Abstract-The

More information

Safety Standards a New Approach

Safety Standards a New Approach Safety Standards a New Approach John Knight University of Virginia Charlottesville, VA USA Abstract Safety standards provide great value, but despite their benefits, standards and the culture that goes

More information

Practical Risk Management: Framework and Methods

Practical Risk Management: Framework and Methods New SEI Course! Practical Risk Management: Framework and Methods September 23-24, 2009 Arlington, VA Register at: www.sei.cmu.edu/products/courses/p78.html 1 13 th International Software Product Line Conference

More information

NOT PROTECTIVELY MARKED JOB DESCRIPTION

NOT PROTECTIVELY MARKED JOB DESCRIPTION JOB DESCRIPTION APPENDIX C Before completing this form, please read the BTP Guide to writing job descriptions for Police Staff roles Appendix B to the SOP. A. POST DETAILS: Job Title: Business Analyst

More information

NOT PROTECTIVELY MARKED JOB DESCRIPTION

NOT PROTECTIVELY MARKED JOB DESCRIPTION JOB DESCRIPTION APPENDIX C Before completing this form, please read the BTP Guide to writing job descriptions for Police Staff roles Appendix B to the SOP. A. POST DETAILS: Job Title: Business Analyst

More information

THE ROADMAP FOR DELIVERING HIGH PERFORMING AVIATION FOR EUROPE. European ATM Master Plan

THE ROADMAP FOR DELIVERING HIGH PERFORMING AVIATION FOR EUROPE. European ATM Master Plan THE ROADMAP FOR DELIVERING HIGH PERFORMING AVIATION FOR EUROPE European ATM Master Plan Executive Summary for ANSPs Edition 2015 EUROPEAN ATM MASTER PLAN EXECUTIVE VIEW EDITION 2015 EUROPEAN ATM MASTER

More information

When Recognition Matters WHITEPAPER OCTAVE RISK ASSESSMENT WITH OCTAVE.

When Recognition Matters WHITEPAPER OCTAVE RISK ASSESSMENT WITH OCTAVE. When Recognition Matters WHITEPAPER OCTAVE RISK ASSESSMENT WITH OCTAVE www.pecb.com CONTENT 3 4 4 5 5 6 6 6 7 8 8 Introduction About OCTAVE History OCTAVE ALLEGRO RoadMap Steps How to use OCTAVE? Preparing

More information

Why?: Documenting the Missing Interrogative Using an Essential Logic Model

Why?: Documenting the Missing Interrogative Using an Essential Logic Model Why?: Documenting the Missing Interrogative Using an Essential Logic Model R.J.Collins Abstract This paper describes a diagramming convention called an Essential Logic Model (ELM). An ELM tells the story

More information

Prioritising safety in unmanned aircraft system traffic management

Prioritising safety in unmanned aircraft system traffic management White paper: drones Prioritising safety in unmanned aircraft system traffic Drones are proliferating throughout the world s airspace, making them impossible to ignore. As their numbers rise, the importance

More information

18C044-0C WHITE PAPER REFERENCE CCS ARCHITECTURE BASED ON ERTMS. Date: Introduction

18C044-0C WHITE PAPER REFERENCE CCS ARCHITECTURE BASED ON ERTMS. Date: Introduction 18C044-0C WHITE PAPER REFERENCE CCS ARCHITECTURE BASED ON ERTMS Date: 12-07-2018 Introduction In 1989, the European Union, together with the railway organisations, decided to develop a standard European

More information

A UAV MISSION HIERARCHY C. E. NEHME M.L. CUMMINGS J. W. CRANDALL

A UAV MISSION HIERARCHY C. E. NEHME M.L. CUMMINGS J. W. CRANDALL A UAV MISSION HIERARCHY C. E. NEHME M.L. CUMMINGS J. W. CRANDALL MASSACHUSETTS INSTITUTE OF TECHNOLOGY* PREPARED FOR CHARLES RIVER ANALYTICS HAL2006-09 DEC, 2006 \ http://halab.mit.edu e-mail: halab@mit.edu

More information

QUALITY MANAGEMENT FOR MOBILE COMMUNICATION SOFTWARE

QUALITY MANAGEMENT FOR MOBILE COMMUNICATION SOFTWARE QUALITY MANAGEMENT FOR MOBILE COMMUNICATION SOFTWARE Vedran Gornik, Bernard Kaurić, Mario Musa SIEMENS d.d., PSE Heinzelova 70A, HR-10000 Zagreb, Croatia Tel: +385 1 6105 428 Fax: +385 1 6105 266 E-mail:

More information

Version History. Version Date Details 1 09/12/2010 New Standard Approved by Council

Version History. Version Date Details 1 09/12/2010 New Standard Approved by Council Document Title: RCS004 Emergency Medical Services [EMS] Dispatcher Education and Training Standard V1 Page: 1 of 22 Document Owner: PD Approved by: Council Approval Date: 9 th December 2010 Version History

More information

LIFE CYCLE ASSET MANAGEMENT. Project Reviews. Good Practice Guide GPG-FM-015. March 1996

LIFE CYCLE ASSET MANAGEMENT. Project Reviews. Good Practice Guide GPG-FM-015. March 1996 LIFE YLE Good Practice Guide ASSET MANAGEMENT Project Reviews March 1996 Department of Energy Office of Field Management Office of Project and Fixed Asset Management ontents 1. INTRODUTION...1 2. PROJET

More information

Enterprise Architecture: an ideal discipline for use in Supply Chain Management

Enterprise Architecture: an ideal discipline for use in Supply Chain Management Enterprise Architecture: an ideal discipline for use in Supply Chain Management Richard Freggi Senior Supply Chain Architect (TOGAF 9.1 certified level 2) HP Inc. Content Understanding Supply Chain Management

More information

WNR Approach: An Extension to Requirements Engineering Lifecycle

WNR Approach: An Extension to Requirements Engineering Lifecycle WNR Approach: An Extension to Requirements Engineering Lifecycle Ahmad Abdollahzadeh Barforoush, Abbas Rasoolzadegan, Reza Gorgan Mohammadi Information Technology and Computer Engineering Faculty Amirkabir

More information

Decision Analysis Making the Big Decisions

Decision Analysis Making the Big Decisions Decision Analysis Making the Big Decisions Endeavor Management 2700 Post Oak Blvd. P + 713.877.8130 Suite 1400 F + 713.877.1823 Houston, Texas 77056 www.endeavormgmt.com Overview You probably face a lot

More information

Lectures 2 & 3. Software Processes. Software Engineering, COMP201 Slide 1

Lectures 2 & 3. Software Processes. Software Engineering, COMP201 Slide 1 Lectures 2 & 3 Software Processes Software Engineering, COMP201 Slide 1 What is a Process? When we provide a service or create a product we always follow a sequence of steps to accomplish a set of tasks

More information

In recent times, the approach to integration of systems at Scottish Power may be summarized as

In recent times, the approach to integration of systems at Scottish Power may be summarized as Using the CIM for integrating Field, Work, Control and Asset Management Systems at Scottish Power Eric Bell, Scottish Power Greg Robinson, Xtensible Solutions Abstract Scottish Power s OASIS Program is

More information

Software Architecture. ATAM Case study (Architecture evaluation)

Software Architecture. ATAM Case study (Architecture evaluation) Software Architecture BITS Pilani ATAM Case study (Architecture evaluation) Viswanathan Hariharan Introduction Software projects come in different colours and shapes Small improvement Functionality enhancements

More information

SPOK e.notify. Enabling Sophisticated, Efficient Incident Management

SPOK e.notify. Enabling Sophisticated, Efficient Incident Management SM SPOK e.notify Enabling Sophisticated, Efficient Incident Management ENABLING SOPHISTICATED, EFFICIENT INCIDENT MANAGEMENT ARE YOU PREPARED FOR AN EMERGENCY? In an emergency, minutes can be the difference

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 Friday 30 th September 2016 - Morning Answer any THREE questions

More information

Testing: The critical success factor in the transition to ICD-10

Testing: The critical success factor in the transition to ICD-10 Testing: The critical success factor in the transition to ICD-10 The U.S. adopted the International Classification of Diseases, 9th Edition, Clinical Modification (ICD-9-CM) in 1979. During the subsequent

More information

Merger and Acquisition Integration

Merger and Acquisition Integration 4G M&A Integration Linking Behaviour to Bottom Line Performance Merger and Acquisition Integration Acquisitions vary widely in ambition and scope, ranging from relatively small bolt-on transactions to

More information

COURSE DESCRIPTION NEXT GENERATION AND CONVERGED BILLING. Format: Classroom (Live on Web Available) Duration: 2 Days

COURSE DESCRIPTION NEXT GENERATION AND CONVERGED BILLING. Format: Classroom (Live on Web Available) Duration: 2 Days COURSE DESCRIPTION NEXT GENERATION AND CONVERGED BILLING Format: Classroom (Live on Web Available) Duration: 2 Days COURSE SUMMARY HIGHLIGHTS Highly focused and in-depth training from the experts - including

More information

Objectives. The software process. Topics covered. Waterfall model. Generic software process models. Software Processes

Objectives. The software process. Topics covered. Waterfall model. Generic software process models. Software Processes Objectives Software Processes To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software

More information

Operational Requirements Document (ORD)

Operational Requirements Document (ORD) Operational Requirements Document (ORD) A. Purpose This Appendix sets the requirements and establishes procedures for preparation of an Operational Requirements Document (ORD). It also prescribes procedures

More information

Multi-UAV Collaborative Sensor Management for UAV Team Survivability

Multi-UAV Collaborative Sensor Management for UAV Team Survivability Multi-UAV Collaborative Sensor Management for UAV Team Survivability Craig Stoneking, Phil DiBona, and Adria Hughes Lockheed Martin Advanced Technology Laboratories 3 Executive Campus, 6 th Floor Cherry

More information

Probabilistic Macro-Architectural Decision Framework

Probabilistic Macro-Architectural Decision Framework Probabilistic Macro-Architectural Decision Framework Plamen Petrov, University of Robert L. Nord, Carnegie Mellon University Ugo Buy, University of Presented at the 2 nd International Workshop on Software

More information

The Illusion of Certainty

The Illusion of Certainty The Illusion of Certainty Grady Campbell CMU Software Engineering Institute 4301 Wilson Blvd., Suite 200 Arlington, VA 22203 703-908-8223 ghc@sei.cmu.edu Abstract Acquisition policy and, even more so,

More information