Honolulu, 23 rd of May 2011PESOS 20111 Evaluating the Compatibility of Conversational Service Interactions Sam Guinea and Paola Spoletini.

Slides:



Advertisements
Similar presentations
Analyzing Regression Test Selection Techniques
Advertisements

Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Seyedehmehrnaz Mireslami, Mohammad Moshirpour, Behrouz H. Far Department of Electrical and Computer Engineering University of Calgary, Canada {smiresla,
Semantics Static semantics Dynamic semantics attribute grammars
Using the Iteration Space Visualizer in Loop Parallelization Yijun YU
www.brainybetty.com1 MAVisto A tool for the exploration of network motifs By Guo Chuan & Shi Jiayi.
SOFTWARE TESTING. INTRODUCTION  Software Testing is the process of executing a program or system with the intent of finding errors.  It involves any.
Towards Twitter Context Summarization with User Influence Models Yi Chang et al. WSDM 2013 Hyewon Lim 21 June 2013.
1 ECE 453 – CS 447 – SE 465 Software Testing & Quality Assurance Instructor Kostas Kontogiannis.
Describing Process Specifications and Structured Decisions Systems Analysis and Design, 7e Kendall & Kendall 9 © 2008 Pearson Prentice Hall.
1 Software Design Introduction  The chapter will address the following questions:  How do you factor a program into manageable program modules that can.
Copyright Irwin/McGraw-Hill Data Modeling Prepared by Kevin C. Dittman for Systems Analysis & Design Methods 4ed by J. L. Whitten & L. D. Bentley.
A survey of techniques for precise program slicing Komondoor V. Raghavan Indian Institute of Science, Bangalore.
Graphs Graphs are the most general data structures we will study in this course. A graph is a more general version of connected nodes than the tree. Both.
A university for the world real R © 2009, Chapter 15 The Business Process Execution Language Chun Ouyang Marlon Dumas Petia Wohed.
What is Software Design?  Introduction  Software design consists of two components, modular design and packaging.  Modular design is the decomposition.
1 Towards formal manipulations of scenarios represented by High-level Message Sequence Charts Loïc Hélouet Claude Jard Benoît Caillaud IRISA/PAMPA (INRIA/CNRS/Univ.
Parallel algorithms for expression evaluation Simultaneous substitution method (SimSub)
Automated Extraction and Parameterization of Motions in Large Data Sets SIGGRAPH’ 2004 Lucas Kovar, Michael Gleicher University of Wisconsin-Madison.
Business Process Orchestration
PZ03CX Programming Language design and Implementation -4th Edition Copyright©Prentice Hall, PZ03CX - Language semantics Programming Language Design.
FLEX* - REVIEW.
Software Engineering, COMP201 Slide 1 Protocol Engineering Protocol Specification using CFSM model Lecture 30.
1 COMP541 State Machines Montek Singh Feb 6, 2007.
Similar Sequence Similar Function Charles Yan Spring 2006.
1 Efficient Discovery of Conserved Patterns Using a Pattern Graph Inge Jonassen Pattern Discovery Arwa Zabian 13/07/2015.
Computer vision: models, learning and inference
Reverse Engineering State Machines by Interactive Grammar Inference Neil Walkinshaw, Kirill Bogdanov, Mike Holcombe, Sarah Salahuddin.
Chapter 6 Supplement Knowledge Engineering and Acquisition Chapter 6 Supplement.
1 Software testing. 2 Testing Objectives Testing is a process of executing a program with the intent of finding an error. A good test case is in that.
Semantic Matching Fausto Giunchiglia work in collaboration with Pavel Shvaiko The Italian-Israeli Forum on Computer Science, Haifa, June 17-18, 2003.
Describing Process Specifications and Structured Decisions Systems Analysis and Design, 7e Kendall & Kendall 9 © 2008 Pearson Prentice Hall.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Methodology: Conceptual Databases Design
Hybrid Transformation Modeling Integrating a Declarative with an Imperative Model Transformation Language Pieter Van Gorp
May 11, 2005WWW Chiba, Japan1 Thresher: Automating the Unwrapping of Semantic Content from the World Wide Web Andrew Hogue GoogleMIT CSAIL.
Using Polynomial Approximation as Compression and Aggregation Technique in Wireless Sensor Networks Bouabdellah KECHAR Oran University.
1 Representing New Voice Services and Their Features Ken Turner University of Stirling 11th June 2003.
Hassen Grati, Houari Sahraoui, Pierre Poulin DIRO, Université de Montréal Extracting Sequence Diagrams from Execution Traces using Interactive Visualization.
Learning the Structure of Related Tasks Presented by Lihan He Machine Learning Reading Group Duke University 02/03/2006 A. Niculescu-Mizil, R. Caruana.
Structured Design (Yourdon) ( based on Pressman’s Chapter 14 – 5th edition or Chapter th edition) copyright © 1996, 2001, 2005 R.S. Pressman &
SOFTWARE DESIGN. INTRODUCTION There are 3 distinct types of activities in design 1.External design 2.Architectural design 3.Detailed design Architectural.
1 Outline:  Optimization of Timed Systems  TA-Modeling of Scheduling Tasks  Transformation of TA into Mixed-Integer Programs  Tree Search for TA using.
Chapter 3 Response Charts.
AI Lecture 17 Planning Noémie Elhadad (substituting for Prof. McKeown)
TTCN-3 and ASN.1 interworking Analysis of backward compatibility in ASN.1 Géza Horváth TTCN-3 User Conference – 9 June 2011.
DeepDive Model Dongfang Xu Ph.D student, School of Information, University of Arizona Dec 13, 2015.
Author: Haoyu Song, Murali Kodialam, Fang Hao and T.V. Lakshman Publisher/Conf. : IEEE International Conference on Network Protocols (ICNP), 2009 Speaker:
Conceptualization Relational Model Incomplete Relations Indirect Concept Reflection Entity-Relationship Model Incomplete Relations Two Ways of Concept.
SOFTWARE TESTING. Introduction Software Testing is the process of executing a program or system with the intent of finding errors. It involves any activity.
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
Andrey Karaulov, Alexander Strabykin Institute for System Programming Russian Academy of Sciences SYRCoSE: Spring Young Researchers Colloquium on Software.
/ PSWLAB Evidence-Based Analysis and Inferring Preconditions for Bug Detection By D. Brand, M. Buss, V. C. Sreedhar published in ICSM 2007.
Parallel Programming in Chess Simulations Part 2 Tyler Patton.
Université Toulouse I 1 CADUI' June FUNDP Namur Implementation Techniques for Petri Net Based Specifications of Human-Computer Dialogues.
Distributed cooperation and coordination using the Max-Sum algorithm
Learning to analyse tonal music Pl á cido Rom á n Illescas David Rizo Jos é Manuel I ñ esta Pattern recognition and Artificial Intelligence group University.
ISA Kim Hye mi. Introduction Input Spectrum data (Protein database) Peptide assignment Peptide validation manual validation PeptideProphet.
Fault Tree Analysis Using Binary Decision Diagrams
Software Testing.
Activity Diagram.
Lecture 9- Design Concepts and Principles
Programming Fundamentals
Requirements To Design In This Iteration
Lecture 9- Design Concepts and Principles
Correcting Error in Message Passing Systems
Introduction to Artificial Intelligence Lecture 9: Two-Player Games I
1.3 Modeling with exponentially many constr.
CH 4 - Language semantics
Connecting the Dots Between News Article
Presentation transcript:

Honolulu, 23 rd of May 2011PESOS Evaluating the Compatibility of Conversational Service Interactions Sam Guinea and Paola Spoletini

Agenda Introduction Interaction Sequence Charts –Describing BPEL interactions Compatibility Evaluation The Future of ISC 2

Introduction Open World Assumption –System depends on the functional and qualitative evolution of partner services Self-adaptation is a way to cope with these evolutions –Substitute a service with a compatible alternative Conversational services impose: –a specific interaction protocol and –specific data types 3

Innovative Contributions Interaction Sequence Charts –derived from Message Sequence Charts –describe an isolated service’s interaction with the outside world (protocol and data types) Compatibility Evaluation Algorithm –uses ISCs to determine protocol compatibility –uses Fuzzy techniques for data types (FXPath) –provides a report indicating where the mismatches are 4 Tool support: Graphical Design-time tool Automatic ISC extraction for BPEL 2.0 processes Tool support: Algorithm fully implemented FXPath manually integrated

Approach overview 5 Process adaptation Data type adapter

Seven basic constructs –Receive –Send –Or –And –Loop –Parallel Loop –Terminate 6 Interaction Sequence Charts Partner name Data type Importance level Preference

7 Expressing BPEL Interactions

Compatibility evaluation Measures: –Structural coherence –Data type similarity Algorithm structure 1.ISC pruning: isolate a partner’s interactions 2.Graph construction: build a minimal structure 3.Iterative comparison: a.Graph structure compatibility b.Fuzzy analysis of data similarities 8

Isolating P’s interactions Delete basic interactions that do not involve P Remove sequential structures that do not contain basic interactions Omit And branches that contain no interactions Reduce And structures with a single branch to a path Collapse Or branches into one (highest preference level) 9 Flatten out Or structures, and generate all the possible combinations of Or branches

Graph construction 10

Graph construction The nodes are enumerated following the temporal sequence and a specific ordering of And branches The degree of importance is spread onto the structural arcs Redundant nodes are removed The candidate’s graph is built using the same procedure but reversing the direction of interaction edges 11

Analysis procedure a.Structural comparison –Graphs with the same size have to be identical –If the sizes do not match, nodes that are not strictly necessary can be deleted b.Data type comparison –Structural similarity: cost of transforming one message into the other by means of Tree Edit Operations –Content similarity: Wordnet 12

Tele-Radiology 13

Tele-Radiology 14 Privacy => minimize the number of partners managing sensitive data Get rid of partner EM Strong vs. weak interpretation for Loops Data analysis

The Future of ISC Continue to validate the algorithm Close the loop –Process adaptation and Data type adapters Extend beyond BPEL Refine ISCs with properties inferred from history of interactions –Refined meaning of compatibility with actual partner –What am I looking for in a new partner? 15