Good Practices in Requirements, Project and Risk Management in Educational IT Projects

Total Page:16

File Type:pdf, Size:1020Kb

Good Practices in Requirements, Project and Risk Management in Educational IT Projects Proceedings of the Federated Conference on ISBN 978-83-60810-51-4 Computer Science and Information Systems pp. 1017–1021 Good practices in requirements, project and risk management in educational IT projects Małgorzata Alicja Płotka Paweł Syty Faculty of Information Technology, Polish-Japanese Faculty of Applied Physics and Mathematics, Gdańsk Institute of Information Technology, University of Technology, ul. Brzegi 55, 80-045 Gdańsk, Poland ul. Narutowicza 11/12, 80-233 Gdańsk, Poland Email: [email protected] Email: [email protected] main experts. On the other hand, poor or inadequate project Abstract—One can find many learning aids and simulations management contributes to improper organisation of the of physical phenomena on the market – provided as a project team’s work. Then, even if project goals (require- standalone application or as part of an educational package. ments, tasks etc) are defined properly, the achievement of an However, only a few of them allow for the building of interactive experiments: experiments similar to those that objective may be hampered or impossible. should be conducted in physics laboratories at schools. Gdańsk All of these considerations have influenced the project de- University of Technology decided to fill this market niche by signers who are working on the “e-Experiments in physics” designing and constructing a set of virtual experiments – so project (see Section II), to make all reasonable endeavours called e-experiments. To avoid common problems that a lot of to prepare a product that fully satisfies the future users. Sets IT products brought to defeat, they prepared procedures in of activities were planned to achieve this goal. This paper accordance with the best practices of software engineering. The paper below describes the process of the e-experiments describes the software engineering process which they view development paying special attention to requirement, project as resulting in success. and risk management. Authors try to prove that by not The structure of work is as follows. After this short escaping from difficult matters such as carefully planning and introduction, Section II briefly discusses the IT project, risk analysis success can and will be achieved. which is the subject of this work, its aims and products. The third chapter discusses issues related to engineering I. INTRODUCTION requirements. Chapter IV provides a risk analysis, Chapter ANY surveys have been conducted to find out how V describes the project management method. Section VI Mmany IT projects end in defeat and to determine the discusses the current status of the project. The work ends factors which result in their failure. The most commonly with some brief conclusions. indicated reasons for IT project failure are: ineffective stakeholder engagement [1], a complete lack of executive II.THE PROJECT “E-EXPERIMENTS IN PHYSICS” support [1]–[6], ineffective user involvement [1]–[6], and In response to a call for innovative projects in frames of poor project management [1], [7]–[10] (lack of knowledge the European Social Fund, Human Capital Operational Pro- of project management methodologies and the competence gramme, announced by the Polish Ministry of National Edu- of management – inadequately trained and/or inexperienced cation [13], Gdańsk University of Technology proposed, in project managers; lack of top management involvement and cooperation with the Young Digital Planet SA (Gdańsk, support; inadequate risk management and weak project Poland) and L.C.G. Malmberg B.V. (Den Bosch, Nether- plans [11]). Another important reason is a lack of domain lands), project called "e-Experiments in physics," whose knowledge among project team members. main result is a product that addresses some identified prob- A lack of client/end-user commitment usually leads to lems with didactics of physics in secondary schools [14]– ‘challenges’ surrounding requirements that may increase the [17]. The product is a series of virtual experiments (so- risk of not fulfilling clients’ needs. This means that the soft- called e-experiments), carried out in electronic form (as ware does not satisfy the quality conditions specified in the computer programs). Physical phenomena represented by ISO 9001:2000/2008 definition of software quality [12]. the e-experiments were selected in such a way that every Having experience and knowledge deficiencies in the sub- branch of physics is adequately represented. The teachers, ject area of the project may lead to gaps (undefined require- even in well-equipped school physics labs, are not able to ments arising from lack of awareness of the domain of the conduct experiments with some branches of physics (e.g. problem) in software requirement specification or work on nuclear physics) – likewise the inability to demonstrate the unattainable objectives in subsequent project phases. Of behaviour of such a test system in the accelerating elevator, course the software developer is not expected to know ev- train or even on another planet. e-Experiments enable the erything. However, it is necessary to fill in the gaps. For this student freedom to experiment, allowing for a more and cre- purpose it may be helpful to use other sources of informa- ative research activity, thanks to “touch” the problem of per- tion such as documents, standards and the knowledge of do- forming the appropriate exercises using a computer, without The project “e-Experiments in physics” is co-financed by the European the fear of destroying any expensive equipment. Union within the European Social Fund. 978-83-60810-51-4/$25.00 c 2012 IEEE 1017 1018 PROCEEDINGS OF THE FEDCSIS. WROCŁAW, 2012 It should be noted that the e-experiments will not be experiments, based on their best knowledge and experience typical of all simulations that are widely available on the gained during their academic work as well as analysis of the Internet [18]. In contrast, the proposed e-experiments will be current curriculum in force at upper secondary school. as close as possible to reality, will also form part of the Additionally, at the request of the of the originator of the scheme design / build / execute / analyse / introduce the project, nationwide surveys of the teachers and students of results, where it is important to learn from mistakes. The physics in secondary schools were conducted, among other proposed solution involves the possibility of interference in things, to determine the order in which experiments should student performance, thus build e-experiments carried out in be built. The work of the subject matter experts is supported order to force her/ him to an activity and arouse their by a methodologist from one of the best secondary schools scientific curiosity and identification of the research in Poland. problems. We will enable students (and of course the B. Specification of Requirements teacher) to observe the behaviour of the system and its differing parameters, which would be quite impractical The software requirement specification consists of within the physical realm. References to the interdisciplinary scenarios of each e-experiment, description of tools nature of science will be indicated on the e-experiments, for necessary to build the experimental set, and prototypes of example, the results will be analysed using statistical the e-experiments in the form of C++ codes (numerical methods (mathematics) and developed using a spreadsheet engine). A preliminary version of the specification is (computing). Additionally, some e-experiments will be prepared by domain experts of GUT. In the next step the bordering on physical chemistry. Currently, these kind of methodologist reviews the preliminary version of the script references are rather sporadic. The idea described above has and proposes any amendments or modifications. not been previously used in similar solutions. Moreover an Subsequently, the documents drawn up are sent to YDP, to exercise book demonstrating its potential use within its verify the feasibility of the proposed solutions. The genre will be supplied to each e-experiment. scenarios are commented by YDP’s team leaders (at least In the project, Gdańsk University of Technology (further one of them acquired domain knowledge of a project subject referred as GUT) is responsible for the scenarios of the e- – in physics) and sent back to GUT. These two steps are experiments, numerical engine and the exercise books. repeated until any ambiguities are eradicated, and the final Young Digital Planet SA (YDP) is responsible for scenario is accepted by both partners. In the next step, YDP technological tasks: coding, providing graphics and user estimates the time effort (man-hours) needed to implement interface to the application. Role of the third partner, L.C.G. the final scenario, and provides the result to GUT. When a Malmberg B.V. (MBG) is to provide substantial support. scenario contains alternate paths, YDP makes an estimation of each path. In this case, GUT decides what path will be III. REQUIREMENT MANAGEMENT implemented. Then, the developer’s project team at YDP starts implementing the final version of the scenario (using A. Gathering of Requirements the Adobe Air / Alchemy technology). The group of subject matter experts (domain experts) is All of these activities are repeated for each of the 23 e- engaged in work on gathering requirements – academic staff experiments planned to be carried out. and students of the Gdańsk University of Technology. At C. Verification – Do We Build Software Well? the head of
Recommended publications
  • V2I Deployment Coalition Technical Memorandum 4: Phase 1 Final Report
    V2I Deployment Coalition Technical Memorandum 4: Phase 1 Final Report January 2017 V2I Deployment Coalition Technical Memorandum 4: Phase 1 Final Report Table of Contents 1. Executive Summary ......................................................................................................................... 1 2. Synthesis of the Technical Memorandum ........................................................................................ 4 3. Overall Progress Advancing V2I Deployments .................................................................................. 6 3.1. Key Outcome: Engaging a Unified Coalition with Common Messages and Discussion ............... 6 3.2. Key Outcome: Narrowing of Initial Focus for V2I Deployments ................................................. 6 3.3. Key Outcome: Definitions of Research Activities to Support V2I Deployment ........................... 7 3.4. Key Outcome: V2I Standards Context Diagram and Supporting Description .............................. 8 3.5. Key Outcome: Creation of the SPaT Challenge .......................................................................... 8 3.6. Key Outcome: Creating a Forum for Collaboration between Infrastructure Owners/Operators and Original Equipment Manufacturers (IOOs and OEMs) ........................................................ 9 4. V2I DC Workshop 2 Summary ........................................................................................................ 11 4.1. TWG 1: Deployment Initiatives ..............................................................................................
    [Show full text]
  • Deleuze and the Animal
    DELEUZE CONNECTIONS Series Editor: Ian Buchanan DELEUZE CONNECTIONS ‘This book offers us a variety of perspectives both on the animals that we are, and on the animals that we will never be able to know or to become. It is a timely reminder of the Deleuze many processes and relations linking us to the “buzzing, blooming confusion” around us.’ Steven Shaviro, Wayne State University Deleuze and Explores the relationship between Deleuze and the concept of and the the animal in philosophy, aesthetics and ethics This is the first volume to address the animal in Deleuze’s work, despite becoming-animal the Animal being a key concept for Deleuze and Guattari. It shows the ambiguous idea of the animal as human and nonhuman life infiltrating all of Deleuze’s work. Animal In these 16 chapters Deleuze’s entire oeuvre is used in analysing television, film, music, art, drunkenness, mourning, virtual technology, protest, activism, animal rights and abolition. Each chapter questions the premise of the animal and critiques the centrality of the human. This collection creates new questions about what the age of the anthropocene means by Edited by Colin Gardner and Patricia MacCormack ‘animal’ and analyses and explores examples of the unclear boundaries between human and animal. Colin Gardner is Professor of Critical Theory and Integrative Studies at the University of California, Santa Barbara. Patricia MacCormack is Professor of Continental Philosophy at Anglia Ruskin University. Cover design: riverdesign.co.uk ISBN 978-1-4744-2274-1 Edinburgh 9781474 422741 Edited by Colin Gardner and Patricia MacCormack Deleuze and the Animal Deleuze Connections ‘It is not the elements or the sets which define the multiplicity.
    [Show full text]
  • Contents Introduction
    Developers of Free/Libre and Open Source Software (FLOSS) are often referred to as a community or as a scene. But so far this seems mostly just a rough expression. This paper takes a closer look at FLOSS developers and their projects to find out how they work, what holds them together and how they interact. Community and social movement seem not to apply as descriptors. Looking at norms, values, structures, and conflict resolution, a hacker subculture appears which is compartmentalised into differently organised projects. By testing empirical findings against various theoretical approaches, ideas for further research are identified. Contents Introduction Boundaries Social processes Processes of social cohesion Summary of empirical findings Theoretical explanations Introduction This paper is intended as a first contribution to the description of developers of Free/Libre and Open Source Software (FLOSS) as a social whole. Most studies have investigated internal phenomena of the field or of individual projects, while the social whole has been largely overlooked or was treated only superficially. Although many studies repeat words such as "community" or "movement," there is usually no follow–up discussion of whether and to what extent these terms actually correspond to the FLOSS phenomenon. This article aims at understanding FLOSS with a more holistic approach. This implies not only an analysis of the field as a whole, but also of the interaction between various internal phenomena. The characteristics determining and shaping a social formation which will be discussed in this paper are processes of boundary– drawing, internal structures, and the cohesion of the field. The term social formation refers to the types of social connections between developers.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    OCTOBER 2010 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT SPAM COLLECTING Changing times Claudiu Musat and George Petre explain why spam feeds matter in the anti-spam fi eld and discuss the 3 NEWS importance of effective spam-gathering methods. Overall fall in fraud, but online banking page 21 losses rise National Cybersecurity Awareness Month NEW KIDS ON THE BLOCK Dip in Canadian Pharmacy spam New anti-malware companies and products seem to spring up with increasing frequency, many 3 VIRUS PREVALENCE TABLE reworking existing detection engines into new forms, as well as several that are working on their MALWARE ANALYSES own detection technology. John Hawes takes a 4 It’s just spam, it can’t hurt, right? quick look at a few of the up-and-coming products which he expects to see taking part in the VB100 13 Rooting about in TDSS comparatives in the near future. page 25 16 TECHNICAL FEATURE Anti-unpacker tricks – part thirteen VB100 CERTIFICATION ON WINDOWS SERVER 2003 21 FEATURE This month the VB test team put On the relevance of spam feeds 38 products through their paces on Windows Server 2003. John Oct 2010 25 REVIEW FEATURE Hawes has the details of the VB100 Things to come winners and those who failed to make the grade. 29 COMPARATIVE REVIEW page 29 Windows Server 2003 59 END NOTES & NEWS ISSN 1749-7027 COMMENT ‘Ten years ago the While mostly very tongue-in-cheek, a substantial amount of what he wrote was accurate. idea of malware He predicted that by 2010 the PC would no longer be the writing becoming most prevalent computing platform in the world, having a profi t-making been overtaken in number by pervasive computing devices – in other words, PDAs and web phones.
    [Show full text]
  • SDA Prospectus 2021
    BASE PROSPECTUS dated 16 March 2021 for the issuance of SINGLE DIGITAL ASSET TRACKER CERTIFICATES under the ISSUANCE PROGRAM of VALOUR STRUCTURED PRODUCTS, INC. (a company registered under the laws of the Cayman Islands) 1 IMPORTANT INFORMATION This base prospectus (the "Base Prospectus") contains information relating to Certificates (as defined below) to be issued under the programme (the "Programme"). Under the Base Prospectus, Valour Structured Products, Inc. (the "Issuer", "Valour" or the "Company") may, from time to time, offer Certificates to the public and apply for such Certificates to be admitted to trading on one or more regulated markets or multilateral trading facilities ("MTF’s") in Sweden and, subject to the prior completion of all relevant notification measures, certain other countries within the EEA as specified herein. The Certificates are not principal-protected and do not bear interest. Consequently, the value of, and any amounts payable under, the Certificates will be strongly influenced by the performance of the single Digital Asset (as defined herein) and, where the Settlement Currency is other than USD, the exchange rate between USD and the relevant Settlement Currency (e.g. SEK or EUR). As such, an investment in the Certificates is likely to be highly speculative and volatile. If the Certificates constitute a suitable investment for a prospective investor has to be assessed in light of each investor's own circumstances. Neither this Base Prospectus, nor any marketing material relating to the Certificates, constitute (or should be considered to constitute) investment, financial, tax or any other kind of advice to prospective investors. Each investor must make their own assessment as to the suitability (or otherwise) of a potential investment in the Certificates and should, in connection therewith, consult with their own independent professional advisors.
    [Show full text]
  • Stephen M. Cabrinety Collection in the History of Microcomputing, Ca
    http://oac.cdlib.org/findaid/ark:/13030/kt529018f2 No online items Guide to the Stephen M. Cabrinety Collection in the History of Microcomputing, ca. 1975-1995 Processed by Stephan Potchatek; machine-readable finding aid created by Steven Mandeville-Gamble Department of Special Collections Green Library Stanford University Libraries Stanford, CA 94305-6004 Phone: (650) 725-1022 Email: [email protected] URL: http://library.stanford.edu/spc © 2001 The Board of Trustees of Stanford University. All rights reserved. Special Collections M0997 1 Guide to the Stephen M. Cabrinety Collection in the History of Microcomputing, ca. 1975-1995 Collection number: M0997 Department of Special Collections and University Archives Stanford University Libraries Stanford, California Contact Information Department of Special Collections Green Library Stanford University Libraries Stanford, CA 94305-6004 Phone: (650) 725-1022 Email: [email protected] URL: http://library.stanford.edu/spc Processed by: Stephan Potchatek Date Completed: 2000 Encoded by: Steven Mandeville-Gamble © 2001 The Board of Trustees of Stanford University. All rights reserved. Descriptive Summary Title: Stephen M. Cabrinety Collection in the History of Microcomputing, Date (inclusive): ca. 1975-1995 Collection number: Special Collections M0997 Creator: Cabrinety, Stephen M. Extent: 815.5 linear ft. Repository: Stanford University. Libraries. Dept. of Special Collections and University Archives. Language: English. Access Access restricted; this collection is stored off-site in commercial storage from which material is not routinely paged. Access to the collection will remain restricted until such time as the collection can be moved to Stanford-owned facilities. Any exemption from this rule requires the written permission of the Head of Special Collections.
    [Show full text]
  • Energy and Lipid Metabolism Gene Expression of D18 Embryos in Dairy
    Energy and lipid metabolism gene expression of D18 embryos in dairy cows is related to dam physiological status Damien Valour, Severine Degrelle, Andrew Ponter, Corinne Giraud-Delville, Evelyne Campion, C Guyader-Joly, Christophe Richard, Fabienne Constant, P Humblot, C Ponsart, et al. To cite this version: Damien Valour, Severine Degrelle, Andrew Ponter, Corinne Giraud-Delville, Evelyne Campion, et al.. Energy and lipid metabolism gene expression of D18 embryos in dairy cows is related to dam physiological status. Physiological Genomics, American Physiological Society, 2014, 46 (2), pp.39-56. 10.1152/physiolgenomics.00091.2013. hal-01019556 HAL Id: hal-01019556 https://hal.archives-ouvertes.fr/hal-01019556 Submitted on 27 May 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Physiol Genomics 46: 39–56, 2014. First published November 12, 2013; doi:10.1152/physiolgenomics.00091.2013. Energy and lipid metabolism gene expression of D18 embryos in dairy cows is related to dam physiological status D. Valour,1,2 S. A. Degrelle,1,2 A. A. Ponter,1,2 C. Giraud-Delville,1,2 E. Campion,1,2 C. Guyader-Joly,3 C. Richard,4 F.
    [Show full text]
  • IUNIVERSE of the MIND/ a Semiotic Theory of Culture
    IUNIVERSE OF THE MIND/ A Semiotic Theory of Culture YURI M. LOTMAN translated by ANNSHUKMAN Introduction by UMBERTO ECO INDIANA UNIVERSITY PRESS Bloomington and Indianapolis Copyright ©1990 by LB. Tauris Note: All translations of quotations are by Ann Shukman unless stated otherwise. All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage and retrieval system, without permission in writing from the publisher. The Association of American University Presses' Resolution on Permissions constitutes the only exception to this prohibition. Printed in Great Britain Library of Congress Cataloging-in-Publication Data Lotman, IU. M. (Iurii Mikhailovich). 1922- Universe of the mind: a semiotic theory of culture / Yuri Lotman; translated by Ann Shukman. p. em, Translated from the Russian. Includes bibliographical references and index. ISBN 0-253-33608-2 1. Semiotics. 2. Culture. L Title P99.L68 1990 302.2--dc20 1 2 3 4 5 95 94 93 92 91 Contents Introduction by Umberto Eco vii Preface 1 Notes to Preface 6 PART ONE THE TEXT AS A MEANING-GENERATING MECHANISM 1 Three functions of the text 11 2 Autocommunication: 'I' and 'Other' as addressees 20 3 Rhetoric as a mechanism for meaning-generation 36 4 Iconic rhetoric 54 5 The text as process of movement: author to audience, author to text 63 6 The symbol as plot-gene 82 7 The symbol in the cultural system 102 Notes to Part One 111 PART TWO THE SEMIOSPHERE 8 Semiotic space 123 9 The notion of boundary 131 10 Dialogue mechanisms 143 11 The semiosphere and the problem of plot 151 12 Symbolic spaces 171 1.
    [Show full text]
  • Critical Success Factors for the Application of Agile Methodology in IT Telecommunication Projects: a Mixed Method Research Approach
    Critical Success Factors for the Application of Agile Methodology in IT Telecommunication Projects: A Mixed Method Research Approach Submitted for the Degree of Doctor of Business Administration 2020 Ahmed Adel Abdel Fattah Mohamed © Ahmed Mohamed, 2020 Doctor of Business Administration. This thesis is copyright material and no quotation from it may be published without proper acknowledgement. Page 1 of 307 Abstract This research project reflects an In-depth analysis of the critical success factors associated with the application of Agile project management methodology in the IT telecommunication domain in the region of the Middle East and Africa. The agile project management approach has proven to be effective in the area of IT telecommunications. The agile project management approach in the field of digital services and managed services are essential for the success of the project. The goal of this research project was to determine the critical success factors linked to people and organisational factors and the perceived success of software development initiatives in the two realms of managed services and digital services. This research is an explanatory study with a more in-depth emphasis on the contribution of five critical variables (Team Size, Team Communication, Team Performance, Customer Involvement, and Management Involvement) to the performance of agile projects. The researcher used the sequential explanatory mixed approach as a technique. Random sampling was extended to survey operators with a cross-sectional time horizon. Purposive sampling was extended to the interviewees to reach a consensus and answer the three research questions. A total of a hundred and ten study participants replied to the survey, and five interviewees contributed to the study.
    [Show full text]
  • A Semiotic Theory of Culture
    UNIVERSE OF THE MIND UNIVERSE OF THE MIND A Semiotic Theory of Culture YURI M. LOTMAN translated by ANN SHUKMAN Introduction by UMBERTO ECO I.B. TAURIS & CO. LTD Publishers London . New York Published by LB. Tauris & Co Ltd 110 Gloucester Avenue London NW1 8JA Copyright ©1990 by I.B. Tauris Note: All translations of quotations are by Ann Shukman unless stated otherwise. All rights reserved. Except for brief quotations in a review, this book, or any part thereof, must not be reproduced in any form without written permission from the publisher. Printed and bound in Great Britain by Redwood Press Limited, Melksham, Wiltshire British Library Cataloguing in Publication Data Lotman, Yuri M. Universe of the mind: a semiotic theory of culture. - (The second World) I. Culture I. Title II. Series 306 ISBN 1-85043-212-0 Contents Introduction by Umberto Eco vii Preface 1 Notes to Preface 6 PART ONE THE TEXT AS A MEANING-GENERATING MECHANISM 1 Three functions of the text 11 2 Autocommunication: T and 'Other' as addressees 20 3 Rhetoric as a mechanism for meaning-generation 36 4 Iconic rhetoric 54 5 The text as process of movement: author to audience, author to text 63 6 The symbol as plot-gene 82 7 The symbol in the cultural system 102 Notes to Part One 111 PART TWO THE^SEMIOSPHERE 8 Semiotic space 123 9 The notion of boundary 131 10 Dialogue mechanisms 143 11 The semiosphere and the problem of plot 151 12 Symbolic spaces 171 1. Geographical space in Russian medieval texts 171 vi Contents 2.
    [Show full text]
  • SBD2000.Pdf (1.418Mb)
    Cornell’s Research Serves the Region 2000 SmaLL BUSiNeSS DeVeLOpmenT Office of the Vice Provost for Research (Formerly 3D/EYE, Inc.) PuBLISHED BY Office of the Vice Provost for Research Cornell University 312 Day Hall Ithaca, NY 14853-2801 Editor: Tina Snead Copyeditor: Lesley Yorke Design: Eclat New York, Inc. 2 contents Foreword 6 Office of Economic Development (OED) 7 Cornell Center for Advanced Technology (CAT) in Biotechnology 8 Cornell Research Foundation, Inc. (CRF) 8 Cornell Business and Technology Park (CBTP) 9 Business Innovation Center (BIC) 9 Companies in the Greater Ithaca Region Acquisition Systems, LLC 12 Advanced BioAnalytical Services, Inc. (ABS) 13 Advanced Plastic and Material Testing, Inc. 14 Agave BioSystems 15 Alltech, Inc. 16 AnAerobics, Inc. 17 Animal Ultrasound Services, Inc. (AUS) 18 Animusic 19 Applied Pulsed Power, Inc. (APP) 20 Bionexus, Ltd. 21 BioWorks, Inc. 22 C-MOLD 23 The CBORD Group, Inc. 24 Concept Systems, Inc. (CSI) 25 Conceptual Reality Presentations, Inc. (CRPInc) 26 Cummins Nursery, Inc. 27 Data Description, Inc. 28 DatapointLabs 29 DATU, Inc. 30 DeHan Engineering Numerics 31 Digicomp Research Corporation 32 DLtech, Inc. 33 Eloquent Technology, Inc. (ETI) 34 Environmental Associates, Ltd. 35 Etron, Inc. 36 Fingerlakes Aquaculture, LLC 37 FleaData, Inc. 38 Fracture Analysis Consultants, Inc. (FAC) 39 Genex Cooperative, Inc. 40 3 contents GrammaTech, Inc. 41 H & I Agritech, Inc. 42 Harvester Technology, Inc. (HTI) 43 Impact-Echo Consultants, Inc. 44 Impact-Echo Instruments, LLC 45 IMR Test Labs 46 Innovative Dynamics, Inc. (IDI) 47 Insights International, Inc. 48 InterLex Associates, Inc. 49 International Food Network, Inc. 50 kahani.com, Inc.
    [Show full text]
  • Runtime Verification Using Valour
    Kalpa Publications in Computing Volume 3, 2017, Pages 10–18 RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools Runtime Verification using Valour∗ Shaun Azzopardi1, Christian Colombo1, Jean-Paul Ebejer2, Edward Mallia1, and Gordon J. Pace1 1 Department of Computer Science, University of Malta, Malta. 2 Centre for Molecular Medicine and Biobanking, University of Malta, Malta. Abstract In this paper we give an overview of Valour, a runtime verification tool which has been developed in the context of a project to act as a backend verification tool for financial transaction software. A Valour script is written by the user and is then compiled into a verification system. Although, developed as part of a project, the tool has been designed as a stand-alone general-purpose verification engine with a particular emphasis on event consumption. The strong points of Valour when compared to other runtime verification tools is its focus on scalability and robustness. 1 Introduction When adopting runtime verification technologies to improve the dependability of real-life sys- tems, one major challenge is that the technology is deployed post-deployment, and thus, de- pendability of the runtime verification tool is essential. Given that the verification tools will be used at runtime and interacting with the actual system users would expect that the dependabil- ity of the combined verification tool and system-under-scrutiny should not be any lower than that of the original system. In order to convince users to adopt such tools, the confidence in the reliability of the runtime verification tool has to far exceed that of the system-under-scrutiny1.
    [Show full text]