Data Privacy Validation and Verification in E-Health

Size: px
Start display at page:

Download "Data Privacy Validation and Verification in E-Health"

Transcription

1 Data Privacy Validation and Verification in E-Health Flora Amato 1, Francesco Moscato 2, Vincenzo Moscato 3, and Antonio Picariello 4 1 DIETI, University of Naples Federico II, Italy, flora.amato@unina.it 2 DiSciPol, University of Campania Luigi Vanvitelli, Italy, francesco.moscato@unicampania.it 3 DIETI, University of Naples Federico II, Italy, vmoscato@unina.it 4 DIETI, University of Naples Federico II, Italy, picus@unina.it Abstract. The few last years experienced the growth of new technologies able to remotely monitor health state of persons. This includes both (even complex) Medical devices and all kind of wearable device. Thus, the problem of assuring data privacy is more and more important in E- Health systems. Privacy requirements in Medical domains are not only defined by service providers or users, but Legal rules regulate the whole management and storage processes of health records. This is a discussion paper on the use of Model Driven techniques for E-Health systems for formal verification of privacy requirements. The whole approach is based on MetaMORP(h)OSY modeling profile in order to explicitly consider privacy requirements for data. This work discusses about a novel model transformation algorithm for the application of Model Checking techniques to privacy verification. Keywords: Privacy Model Driven Engineering E-Health. 1 Introduction The last few years saw Internet of Things (IoT), Smart Devices, Edge and Cloud computing as one of the main research topic in Computer Science and Engineering. In particular E-health is now an hot topic thanks to IoT and Smart devices applications used in health domain. E-Health allows for an increase of efficiency in health care, decreasing costs, sharing diagnostics and information about therapeutic interventions. It also improves quality and reduces delay of medical actions enabling fast second opinion requests and supporting for remote suggestions and training from specialists. E-Health inherits all problems both from Medical and Computer Science domains. In particular Data Privacy is an hard problem to deal with for it unfortunately adds legal requirements (and hence the Legal domain) to the others. The main problems with these new technologies is that they trigger several privacy issues because of the large amount of sensitive data on patients health condition.

2 2 F.Amato et al. In this scenario it is really difficult to verify if a computer system respects data privacy requirements because of the heterogeneity of elements to consider. This work discusses on how Model Driven Engineering (MDE)[30] enables formal, automatic verification of E-Health composite processes with regards to Data Privacy properties. In particular, we exploit MetaMORP(h)OSY framework in order to provide formal modeling profiles and methodologies in order to define models of E-Health Systems and to analyse privacy requirements with formal methods. Model Driven Engineering extends the scope of OMG s Model Driven Architecture (MDA)[31], MDE is wider in scope than MDA. It combines design, automatic generation of system components and requirements verification during all its life-cycle. MDE focuses on creating running components of a system by their abstract (and formal) representation, leaving verification and (some) implementation issues to automatic translators. Requirements on abstract models are easier to analyse and formal verification can be exploited as well during design phase. In order to reduce the introduction of implementation errors, MDE methodologies try to implement automatically components from design models. In this way, introduction of errors that may lead to unsatisfying requirement can be reduced producing systems correct by construction. In this paper we will use MetaMORP(h)OSY MDE framework, that is based on a Multi-Agent modeling paradigm. As we will describe in the following, this paradigm suites well the complexity of E-Health systems. Multi-Agent Systems[34] Models are promising formalisms for the analysis of complex services, where several actors executes actions pro-actively. E-Health systems have this properties for their nature of distributed and heterogeneous systems. It defines actors and system components by using a meta-formalism that extends Unified Modeling Language (UML). The main model is then analysed by means of formal models that are obtained from the UML model with model transformation algorithms. MetaMORP(h)OSY framework was introduced in [2]. In this paper we discuss results of[3]. We show how MetaMORP(h)OSY modeling profile is able to explicitly consider privacy requirements for data. A novel algorithm is described for implementing a horizontal model transformation [23] for the application of Model Checking techniques to privacy verification. 2 Data Privacy: Modelling and Verification In order to specialize MetaMORP(h)OSY methodology to manage verification of data privacy on E-Health systems, we must extend its modeling profiles. A sketch of this profile is reported in Fig.1. On the other hands, this new modelling profile specializes some beliefs too. Known Electronic Health Records (HealthRecord) and eventually their encrypted versions (EnCryptedHR) refers to some Patients and are stored onto DataSubProcessors. Patients may hide some records (HiddenRecord )to any agent able to read his data and can grant authorization (AccessGrant ) to ac-

3 Data Privacy Validation and Verification in E-Health 3 Fig. 1. E-Health Modelling Profile cess to data to any other agent. In particular, access to encrypted data must be coupled with the keys to manage encryption (EncryptKey and DecryptKey). As introduced in section 1, this work manages the verification of privacy requirements as a reachability problem. This also because MetaMORP(h)OSY includes some Observers for Analysis of timed reachability of Agents Goals. Anyway the basic Observer profile has been specialized as show in Fig.2. This new Observer, in fact, explicitly considers the Health records and the authorization granted to access records. Obviously, MetaMORP(h)OSY profile can be extended to manage different properties and architectures related to distributed data problems. For example, E-Health data management may lead to the use of public and private clouds, multi-provider clouds, etc. Requirements for multi-storage architectures can be easily integrated in the model. In particular, the application of Meta- MORP(h)OSY methodology to the case of multi-storage services from multiple parties, which leads to a composite cloud service, is deeply discussed in [24]. Finally, the main MetaMORP(h)OSY profile was defined for description of real-time system and it includes many elements to define time constraints and

4 4 F.Amato et al. Fig. 2. E-Health Observer Profile timed behaviours of agents. Some Observers (both at design and run time) exists that are able to check temporal behaviours of the systems. Previous works ([25, 28, 5]) describes them. Notice that we can use this part of the profile to model time-variant data-policies and storage behaviours, but this is out of the scope of this work. 3 Case Studies In this section we want to show how it is possible to use MetaMORP(h)OSY methodology and the modeling profile described in the previous section in order to define a protocol for managing and storing E-Health records. For Simplicity s sake, we will consider several simplifying assumptions. We consider the communication networks secure; we model data controllers, processors and subprocessors as a unique agent. The problem to solve is the storage of sensitive data (the health record) on a third-party storage server (eventually a cloud storage). Data outputted from the device is encrypted every time. The physician (thedoctor) can access to thepatient s record only if it is authorized by the patient, but thedoctor cannot own the decription key of thepatient. In addition, in order to manage emergencies, an encrypted version of the record has to be stored on the DataProvider too. In order to produce a MetaMORP(h)OSY model of these agents, we must define an Agent Diagram describing the structural view of the agents. The Agent Diagrams declare the structure, the plans, the goals and the beliefs of each agents. In the following we will omit the inner properties of each element in the diagrams for brevity.

5 Data Privacy Validation and Verification in E-Health 5 Fig. 3. thepatient s Agent Diagram Fig.3 depicts the Agent Diagram for thepatient. In order to describe each plan behavior, we must define proper Activity Diagrams that are compliant with the previously exposed modesling profile. Finally, Sequence diagrams constitute a mean to orchestrate agents execution in use cases. They simply declares events that agents assert during their execution. It is possible to verify CTL formulas by means of the Observer. For example: thedoctor.emergencyaccess.initialactivity EGtheDoctor.Read Goal Is true if in the case of Emergency, in any case the Read Goal is reachable and hence the doctor can, in any case, read the record in case of emergency. 4 Conclusions In this paper we have extet the MetaMORP(h)OSY modelling profile in order to explicitly consider privacy requirements for data. A novel algorithm is described

6 6 F.Amato et al. Fig. 4. Save Plan for implementing a horizontal model transformation for the application of Model Checking techniques to privacy verification and to express privacy in terms of a stete reachability problem following an MDE approach. As future works we are considering the introduction of further model transformation algorithms to support more complicated data privacy requirements and models. For example, the approach reported in [20] uses models based on Bayesan Models. Since MetaMORP(h)OSY already embeds Bayesan Observers, we will try to enhance our modelling and verification techniques to include more and more privacy models. References 1. Abdulla, P., Deneux, J., Stalmarck, G., Agren, H., Akerlund, O.: Designing safe, reliable systems using scade. In: Margaria, T., Steffen, B. (eds.) Leveraging Applications of Formal Methods, Lecture Notes in Computer Science, vol. 4313, pp Springer Berlin Heidelberg (2006) 2. Amato, F., Mazzocca, N., Moscato, F.: Model driven design and evaluation of security level in orchestrated cloud services. Journal of Network and Computer Applications 106, (2018) 3. Amato, F., Moscato, F.: A model driven approach to data privacy verification in e-health systems. Trans. Data Privacy 8(3), (2015) 4. Antón, A.I., Earp, J.B., Reese, A.: Analyzing website privacy requirements using a privacy goal taxonomy. In: Requirements Engineering, Proceedings. IEEE Joint International Conference on. pp IEEE (2002) 5. Aversa, R., Di Martino, B., Moscato, F.: Critical systems verification in metamorp (h) osy. In: Computer Safety, Reliability, and Security, pp Springer (2014) 6. Bauer, B.: Uml class diagrams revisited in the context of agent-based systems. In: Agent-Oriented Software Engineering II, pp Springer (2002) 7. Bauer, B., Mller, J.P., Odell, J.: Agent uml: A formalism for specifying multiagent software systems. Int. Journal of Software Engineering and Knowledge Engineering 11, (2000)

7 Data Privacy Validation and Verification in E-Health 7 8. Behrmann, G., David, A., Larsen, K.G., Pettersson, P., Yi, W.: Developing uppaal over 15 years. Software: Practice and Experience 41(2), (2011) 9. Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi- Agent Systems 8(3), (2004) 10. Commission, E.: Article 29 Working Party. data-protection/article-29/index_en.htm (2013), [Online; Last update: 06/08/2013] 11. Ding, Y., Klein, K.: Model-driven application-level encryption for the privacy of e- health data. In: Availability, Reliability, and Security, ARES 10 International Conference on. pp (Feb 2010) Dolin, R.H., Alschuler, L., Boyer, S., Beebe, C., Behlen, F.M., Biron, P.V., Shvo, A.S.: Hl7 clinical document architecture, release 2. Journal of the American Medical Informatics Association 13(1), (2006) 13. Farines, J., De Queiroz, M., da Rocha, V., Carpes, A., Vernadat, F., Cregut, X.: A model-driven engineering approach to formal verification of plc programs. In: Emerging Technologies Factory Automation (ETFA), 2011 IEEE 16th Conference on. pp. 1 8 (Sept 2011) Fernndez-Caballero, A., Gascuea, J.: Developing multi-agent systems through integrating prometheus, ingenias and icaro-t. In: Filipe, J., Fred, A., Sharp, B. (eds.) Agents and Artificial Intelligence, Communications in Computer and Information Science, vol. 67, pp Springer Berlin Heidelberg (2010) 15. Fredriksen, R., Kristiansen, M., Gran, B.A., Stølen, K., Opperud, T.A., Dimitrakos, T.: The coras framework for a model-based risk management process. In: Computer Safety, Reliability and Security, pp Springer (2002) 16. Fuxman, A., Pistore, M., Mylopoulos, J., Traverso, P.: Model checking early requirements specifications in tropos. In: Requirements Engineering, Proceedings. Fifth IEEE International Symposium on. pp IEEE (2001) 17. Gascuea, J.M., Navarro, E., Fernndez-Caballero, A.: Model-driven engineering techniques for the development of multi-agent systems. Engineering Applications of Artificial Intelligence 25(1), (2012). http: // 18. Hafer, T., Thomas, W.: Computation tree logic ctl* and path quantifiers in the monadic theory of the binary tree. In: Automata, Languages and Programming, pp Springer (1987) 19. Kalra, D.: Electronic health record standards (2006) 20. Liu, J., Xiong, L., Luo, J.: Semantic security: Privacy definitions revisited. Transactions on Data Privacy 6(3), (2013) 21. Lodderstedt, T., Basin, D., Doser, J.: Secureuml: A uml-based modeling language for model-driven security. In: UML 2002The Unified Modeling Language, pp Springer (2002) 22. Massacci, F., Prest, M., Zannone, N.: Using a security requirements engineering methodology in practice: the compliance with the italian data protection legislation. Computer Standards & Interfaces 27(5), (2005) 23. Mens, T., Gorp, P.V.: A taxonomy of model transformation. Electronic Notes in Theoretical Computer Science 152(0), (2006). science/article/pii/s , proceedings of the International Workshop on Graph and Model Transformation (GraMoT 2005), Graph and Model Transformation 2005

8 8 F.Amato et al. 24. Moscato, F.: Model driven engineering and verification of composite cloud services in metamorp(h)osy. In: Intelligent Networking and Collaborative Systems (INCoS), 2014 International Conference on. pp (Sept 2014) Moscato, F., Venticinque, S., Aversa, R., Di Martino, B.: Formal modeling and verification of real-time multi-agent systems: The remm framework. Studies in Computational Intelligence 162, (2008) 26. Moscato, F., Aversa, R., Martino, B.D., Fortis, T.F., Munteanu, V.I.: An analysis of mosaic ontology for cloud resources annotation. In: IEEE Proc. of FedCSIS 2011 Conference. pp (2011) 27. Moscato, F., Martino, B.D., Aversa, R.: Enabling model driven engineering of cloud services by using mosaic ontology. Scalable Computing: Practice and Experience 13(1) (2012) 28. Moscato, F., Venticinque, S., Aversa, R., Di Martino, B.: Formal modeling and verification of real-time multi-agent systems: The remm framework. In: Badica, C., Mangioni, G., Carchiolo, V., Burdescu, D. (eds.) Intelligent Distributed Computing, Systems and Applications, Studies in Computational Intelligence, vol. 162, pp Springer Berlin / Heidelberg (2008) 29. Moscato, F., Vittorini, V., Amato, F., Mazzeo, A., Mazzocca, N.: Solution workflows for model-based analysis of complex systems. IEEE T. Automation Science and Engineering 9(1), (2012) 30. Schmidt, D.C.: Model-driven engineering. COMPUTER-IEEE COMPUTER SOCIETY- 39(2), 25 (2006) 31. Soley, R., et al.: Model driven architecture. OMG white paper 308, 308 (2000) 32. Toval, A., Olmos, A., Piattini, M.: Legal requirements reuse: a critical success factor for requirements quality and personal data protection. In: Requirements Engineering, Proceedings. IEEE Joint International Conference on. pp IEEE (2002) 33. Trencansky, I., Cervenka, R.: Agent modeling language (aml): A comprehensive approach to modeling mas. Whitestein Series in Software Agent Technologies and Autonomic Computing 29, (2005) 34. Wooldridge, M.: Agent-based software engineering. In: IEE Proceedings on Software Engineering. pp (1997)

An Ontology for Modelling Security: The Tropos Approach

An Ontology for Modelling Security: The Tropos Approach An Ontology for Modelling Security: The Tropos Approach Haralambos Mouratidis 1, Paolo Giorgini 2, Gordon Manson 1 1 University of Sheffield, Computer Science Department, UK {haris, g.manson}@dcs.shef.ac.uk

More information

AOSE Agent-Oriented Software Engineering: A Review and Application Example TNE 2009/2010. António Castro

AOSE Agent-Oriented Software Engineering: A Review and Application Example TNE 2009/2010. António Castro AOSE Agent-Oriented Software Engineering: A Review and Application Example TNE 2009/2010 António Castro NIAD&R Distributed Artificial Intelligence and Robotics Group 1 Contents Part 1: Software Engineering

More information

MULTI-AGENT BASED SOFTWARE ENGINEERING MODELS: A REVIEW

MULTI-AGENT BASED SOFTWARE ENGINEERING MODELS: A REVIEW MULTI-AGENT BASED SOFTWARE ENGINEERING MODELS: A REVIEW 1 Okoye, C. I, 2 John-Otumu Adetokunbo M, and 3 Ojieabu Clement E. 1,2 Department of Computer Science, Ebonyi State University, Abakaliki, Nigeria

More information

On the use of the Goal-Oriented Paradigm for System Design and Law Compliance Reasoning

On the use of the Goal-Oriented Paradigm for System Design and Law Compliance Reasoning On the use of the Goal-Oriented Paradigm for System Design and Law Compliance Reasoning Mirko Morandini 1, Luca Sabatucci 1, Alberto Siena 1, John Mylopoulos 2, Loris Penserini 1, Anna Perini 1, and Angelo

More information

ST Tool. A CASE tool for security aware software requirements analysis

ST Tool. A CASE tool for security aware software requirements analysis ST Tool A CASE tool for security aware software requirements analysis Paolo Giorgini Fabio Massacci John Mylopoulos Nicola Zannone Departement of Information and Communication Technology University of

More information

Using Agent-Based Methodologies in Healthcare Information Systems

Using Agent-Based Methodologies in Healthcare Information Systems BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 2 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0033 Using Agent-Based Methodologies

More information

A Modeling Method to Develop Goal Oriented Adaptive Agents in Modeling and Simulation for Smart Grids

A Modeling Method to Develop Goal Oriented Adaptive Agents in Modeling and Simulation for Smart Grids A Modeling Method to Develop Goal Oriented Adaptive Agents in Modeling and Simulation for Smart Grids Hyo-Cheol Lee, Hee-Soo Kim and Seok-Won Lee Knowledge-intensive Software Engineering (NiSE) Lab. Ajou

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

Component Based Mechatronics Modelling Methodology

Component Based Mechatronics Modelling Methodology Component Based Mechatronics Modelling Methodology R.Sell, M.Tamre Department of Mechatronics, Tallinn Technical University, Tallinn, Estonia ABSTRACT There is long history of developing modelling systems

More information

School of Computing, National University of Singapore 3 Science Drive 2, Singapore ABSTRACT

School of Computing, National University of Singapore 3 Science Drive 2, Singapore ABSTRACT NUROP CONGRESS PAPER AGENT BASED SOFTWARE ENGINEERING METHODOLOGIES WONG KENG ONN 1 AND BIMLESH WADHWA 2 School of Computing, National University of Singapore 3 Science Drive 2, Singapore 117543 ABSTRACT

More information

Distributed Robotics: Building an environment for digital cooperation. Artificial Intelligence series

Distributed Robotics: Building an environment for digital cooperation. Artificial Intelligence series Distributed Robotics: Building an environment for digital cooperation Artificial Intelligence series Distributed Robotics March 2018 02 From programmable machines to intelligent agents Robots, from the

More information

Advances and Perspectives in Health Information Standards

Advances and Perspectives in Health Information Standards Advances and Perspectives in Health Information Standards HL7 Brazil June 14, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied

More information

Structural Analysis of Agent Oriented Methodologies

Structural Analysis of Agent Oriented Methodologies International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 613-618 International Research Publications House http://www. irphouse.com Structural Analysis

More information

Model-Driven Engineering of Embedded Real-Time Systems

Model-Driven Engineering of Embedded Real-Time Systems Model-Driven Engineering of Embedded Real-Time Systems Federico Ciccozzi 1 Mälardalen University, Mälardalen Real-Time Research Center federico.ciccozzi@mdh.se 1 Introduction 1.1 Research Topic Model-Based

More information

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Avner Hatsek, Ohad Young, Erez Shalom, Yuval Shahar Medical Informatics Research Center Department of Information

More information

Robot Ontology Standards

Robot Ontology Standards Robot Ontology Standards Tamas Haidegger*, P. Galambos Óbuda University, Antal Bejczy Center for Intelligent Robotics Austrian Center for Medical Innovation and Technology (ACMIT) Introduction Óbuda University

More information

Co-evolution of agent-oriented conceptual models and CASO agent programs

Co-evolution of agent-oriented conceptual models and CASO agent programs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Co-evolution of agent-oriented conceptual models and CASO agent programs

More information

Pervasive Services Engineering for SOAs

Pervasive Services Engineering for SOAs Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au

More information

A game-based model for human-robots interaction

A game-based model for human-robots interaction A game-based model for human-robots interaction Aniello Murano and Loredana Sorrentino Dipartimento di Ingegneria Elettrica e Tecnologie dell Informazione Università degli Studi di Napoli Federico II,

More information

arxiv: v1 [cs.ai] 20 Feb 2015

arxiv: v1 [cs.ai] 20 Feb 2015 Automated Reasoning for Robot Ethics Ulrich Furbach 1, Claudia Schon 1 and Frieder Stolzenburg 2 1 Universität Koblenz-Landau, {uli,schon}@uni-koblenz.de 2 Harz University of Applied Sciences, fstolzenburg@hs-harz.de

More information

Towards an MDA-based development methodology 1

Towards an MDA-based development methodology 1 Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,

More information

A User Interface Level Context Model for Ambient Assisted Living

A User Interface Level Context Model for Ambient Assisted Living not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,

More information

A User-Friendly Interface for Rules Composition in Intelligent Environments

A User-Friendly Interface for Rules Composition in Intelligent Environments A User-Friendly Interface for Rules Composition in Intelligent Environments Dario Bonino, Fulvio Corno, Luigi De Russis Abstract In the domain of rule-based automation and intelligence most efforts concentrate

More information

Agent-Oriented Approach to Develop Context-Aware Applications: A Case Study on Communities of Practice

Agent-Oriented Approach to Develop Context-Aware Applications: A Case Study on Communities of Practice Agent-Oriented Approach to Develop Context-Aware Applications: A Case Study on Communities of Practice Luiz Olavo Bonino da Silva Santos 1, Renata Silva Souza Guizzardi 2, and Marten van Sinderen 2 1 University

More information

The role of testing in verification and certification Kerstin Eder

The role of testing in verification and certification Kerstin Eder The role of testing in verification and certification Kerstin Eder Design Automation and Verification, Microelectronics [and Trustworthy Systems Laboratory] Verification and Validation for Safety in Robots,

More information

IMPLEMENTING MULTIPLE ROBOT ARCHITECTURES USING MOBILE AGENTS

IMPLEMENTING MULTIPLE ROBOT ARCHITECTURES USING MOBILE AGENTS IMPLEMENTING MULTIPLE ROBOT ARCHITECTURES USING MOBILE AGENTS L. M. Cragg and H. Hu Department of Computer Science, University of Essex, Wivenhoe Park, Colchester, CO4 3SQ E-mail: {lmcrag, hhu}@essex.ac.uk

More information

The PASSI and Agile PASSI MAS meta-models

The PASSI and Agile PASSI MAS meta-models The PASSI and Agile PASSI MAS meta-models Antonio Chella 1, 2, Massimo Cossentino 2, Luca Sabatucci 1, and Valeria Seidita 1 1 Dipartimento di Ingegneria Informatica (DINFO) University of Palermo Viale

More information

GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS

GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS 1 A. SOUJANYA, 2 SIDDHARTHA GHOSH 1 M.Tech Student, Department of CSE, Keshav Memorial Institute of Technology(KMIT), Narayanaguda, Himayathnagar,

More information

Negotiation Process Modelling in Virtual Environment for Enterprise Management

Negotiation Process Modelling in Virtual Environment for Enterprise Management Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 Negotiation Process Modelling in Virtual Environment

More information

REAL-TIME SYSTEMS SAFETY CONTROL CONSIDERING HUMAN MACHINE INTERFACE

REAL-TIME SYSTEMS SAFETY CONTROL CONSIDERING HUMAN MACHINE INTERFACE REAL-TIME SYSTEMS SAFETY CONTROL CONSIDERING HUMAN MACHINE INTERFACE José Machado and Eurico Seabra Mechanical Engineering Department, University of Minho, Campus of Azurém, 4800-058 Guimarães, Portugal

More information

Extending Telecom Service Design Activities for Early Verification

Extending Telecom Service Design Activities for Early Verification Extending Telecom Service Design Activities for Early Verification Iyas Alloush 1,2 Supervisor of the thesis: A/Prof.Siegfried Rouvrais 1,3 Director of the thesis: Prof. Yvon Kermarrec 1,2 1: Telecom Bretagne,

More information

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN Proceedings of the Annual Symposium of the Institute of Solid Mechanics and Session of the Commission of Acoustics, SISOM 2015 Bucharest 21-22 May A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS

More information

ACTIVE, A PLATFORM FOR BUILDING INTELLIGENT OPERATING ROOMS

ACTIVE, A PLATFORM FOR BUILDING INTELLIGENT OPERATING ROOMS ACTIVE, A PLATFORM FOR BUILDING INTELLIGENT OPERATING ROOMS D. GUZZONI 1, C. BAUR 1, A. CHEYER 2 1 VRAI Group EPFL 1015 Lausanne Switzerland 2 AIC SRI International Menlo Park, CA USA Today computers are

More information

Adopting Standards For a Changing Health Environment

Adopting Standards For a Changing Health Environment Adopting Standards For a Changing Health Environment November 16, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied Informatics

More information

Defining Process Performance Indicators by Using Templates and Patterns

Defining Process Performance Indicators by Using Templates and Patterns Defining Process Performance Indicators by Using Templates and Patterns Adela del Río Ortega, Manuel Resinas, Amador Durán, and Antonio Ruiz Cortés Universidad de Sevilla, Spain {adeladelrio,resinas,amador,aruiz}@us.es

More information

A Conceptual Modeling Method to Use Agents in Systems Analysis

A Conceptual Modeling Method to Use Agents in Systems Analysis A Conceptual Modeling Method to Use Agents in Systems Analysis Kafui Monu 1 1 University of British Columbia, Sauder School of Business, 2053 Main Mall, Vancouver BC, Canada {Kafui Monu kafui.monu@sauder.ubc.ca}

More information

Meta-models, Environment and Layers: Agent-Oriented Engineering of Complex Systems

Meta-models, Environment and Layers: Agent-Oriented Engineering of Complex Systems Meta-models, Environment and Layers: Agent-Oriented Engineering of Complex Systems Ambra Molesini ambra.molesini@unibo.it DEIS Alma Mater Studiorum Università di Bologna Bologna, 07/04/2008 Ambra Molesini

More information

SENG609.22: Agent-Based Software Engineering Assignment. Agent-Oriented Engineering Survey

SENG609.22: Agent-Based Software Engineering Assignment. Agent-Oriented Engineering Survey SENG609.22: Agent-Based Software Engineering Assignment Agent-Oriented Engineering Survey By: Allen Chi Date:20 th December 2002 Course Instructor: Dr. Behrouz H. Far 1 0. Abstract Agent-Oriented Software

More information

Communication: A Specific High-level View and Modeling Approach

Communication: A Specific High-level View and Modeling Approach Communication: A Specific High-level View and Modeling Approach Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria kaindl@ict.tuwien.ac.at

More information

What s RRI / WG1? - toward horizontal dynamic manufacturing -

What s RRI / WG1? - toward horizontal dynamic manufacturing - What s RRI / WG1? - toward horizontal dynamic manufacturing - 22 th, Mar. 2017 Robot Revolution Initiative (RRI) Deputy Secretary-general (Industrial IoT Specialist) Yutaka Manchu 2017 Copyright Robot

More information

PhD Student: Antonio Ken Iannillo

PhD Student: Antonio Ken Iannillo PhD in Information Technology and Electrical Engineering PhD Student: XXX Cycle Training and Research Activities Report First Year Tutor: Domenico Cotroneo 1. Information This report is on the training

More information

Exploring Computing Environment Possibilities for Risk Oriented Testing

Exploring Computing Environment Possibilities for Risk Oriented Testing ISSN: 0974-6471, Vol. 10, No. (3) 2017, Pg. 674-682 Oriental Journal of Computer Science and Technology Journal Website: www.computerscijournal.org Exploring Computing Environment Possibilities for Risk

More information

Software Agent Reusability Mechanism at Application Level

Software Agent Reusability Mechanism at Application Level Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands

Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands INTELLIGENT AGENTS Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands Keywords: Intelligent agent, Website, Electronic Commerce

More information

Ontology-based Context Aware for Ubiquitous Home Care for Elderly People

Ontology-based Context Aware for Ubiquitous Home Care for Elderly People Ontology-based Aware for Ubiquitous Home Care for Elderly People Kurnianingsih 1, 2, Lukito Edi Nugroho 1, Widyawan 1, Lutfan Lazuardi 3, Khamla Non-alinsavath 1 1 Dept. of Electrical Engineering and Information

More information

AOSE Technical Forum Group

AOSE Technical Forum Group AOSE Technical Forum Group AL3-TF1 Report 30 June- 2 July 2004, Rome 1 Introduction The AOSE TFG activity in Rome was divided in two different sessions, both of them scheduled for Friday, (2nd July): the

More information

FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS

FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS Meriem Taibi 1 and Malika Ioualalen 1 1 LSI - USTHB - BP 32, El-Alia, Bab-Ezzouar, 16111 - Alger, Algerie taibi,ioualalen@lsi-usthb.dz

More information

Human-Computer Interaction based on Discourse Modeling

Human-Computer Interaction based on Discourse Modeling Human-Computer Interaction based on Discourse Modeling Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria kaindl@ict.tuwien.ac.at

More information

Development of an Intelligent Agent based Manufacturing System

Development of an Intelligent Agent based Manufacturing System Development of an Intelligent Agent based Manufacturing System Hong-Seok Park 1 and Ngoc-Hien Tran 2 1 School of Mechanical and Automotive Engineering, University of Ulsan, Ulsan 680-749, South Korea 2

More information

Keeping up with the times Tensions between workflow, status quo, and technology

Keeping up with the times Tensions between workflow, status quo, and technology Keeping up with the times Tensions between workflow, status quo, and technology OMG Healthcare and Business Process Modeling Workshop 20 March, 2017 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7 Director,

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

38050 Povo (Trento), Italy Tel.: Fax: e mail: url:

38050 Povo (Trento), Italy Tel.: Fax: e mail: url: CENTRO PER LA RICERCA SCIENTIFICA E TECNOLOGICA 38050 Povo (Trento), Italy Tel.: 39 0461 314312 Fax: 39 0461 302040 e mail: prdoc@itc.it url: http://www.itc.it COORDINATION SPECIFICATION IN MULTI AGENT

More information

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS Vicent J. Botti Navarro Grupo de Tecnología Informática- Inteligencia Artificial Departamento de Sistemas Informáticos y Computación

More information

SPQR RoboCup 2016 Standard Platform League Qualification Report

SPQR RoboCup 2016 Standard Platform League Qualification Report SPQR RoboCup 2016 Standard Platform League Qualification Report V. Suriani, F. Riccio, L. Iocchi, D. Nardi Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti Sapienza Università

More information

Multi-Agent Planning

Multi-Agent Planning 25 PRICAI 2000 Workshop on Teams with Adjustable Autonomy PRICAI 2000 Workshop on Teams with Adjustable Autonomy Position Paper Designing an architecture for adjustably autonomous robot teams David Kortenkamp

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Increasing Reliability in the Development of Intelligent Environments

Increasing Reliability in the Development of Intelligent Environments Increasing Reliability in the Development of Intelligent Environments Juan Carlos AUGUSTO a;1 a University of Ulster and Computer Science Research Institute, UK Abstract. Little is reported in the literature

More information

A Model-Driven Approach to Systems-of-Systems Engineering

A Model-Driven Approach to Systems-of-Systems Engineering A Model-Driven Approach to Systems-of-Systems Engineering The Australian National University September 2008 Outline 1 An application domain 2 Advantages of MDE Limitations of MDE 3 One sentence An application

More information

Automatic Generation of Web Interfaces from Discourse Models

Automatic Generation of Web Interfaces from Discourse Models Automatic Generation of Web Interfaces from Discourse Models Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria kaindl@ict.tuwien.ac.at

More information

Verification and Validation for Safety in Robots Kerstin Eder

Verification and Validation for Safety in Robots Kerstin Eder Verification and Validation for Safety in Robots Kerstin Eder Design Automation and Verification Trustworthy Systems Laboratory Verification and Validation for Safety in Robots, Bristol Robotics Laboratory

More information

Intelligent Agents. Introduction to Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 23.

Intelligent Agents. Introduction to Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 23. Intelligent Agents Introduction to Planning Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University last change: 23. April 2012 U. Schmid (CogSys) Intelligent Agents last change: 23.

More information

Improved Model Generation of AMS Circuits for Formal Verification

Improved Model Generation of AMS Circuits for Formal Verification Improved Generation of AMS Circuits for Formal Verification Dhanashree Kulkarni, Satish Batchu, Chris Myers University of Utah Abstract Recently, formal verification has had success in rigorously checking

More information

Detecticon: A Prototype Inquiry Dialog System

Detecticon: A Prototype Inquiry Dialog System Detecticon: A Prototype Inquiry Dialog System Takuya Hiraoka and Shota Motoura and Kunihiko Sadamasa Abstract A prototype inquiry dialog system, dubbed Detecticon, demonstrates its ability to handle inquiry

More information

Knowledge Management for Command and Control

Knowledge Management for Command and Control Knowledge Management for Command and Control Dr. Marion G. Ceruti, Dwight R. Wilcox and Brenda J. Powers Space and Naval Warfare Systems Center, San Diego, CA 9 th International Command and Control Research

More information

CARMA: Complete Autonomous Responsible Management Agent (System)

CARMA: Complete Autonomous Responsible Management Agent (System) University of Technology, Sydney Faculty of Engineering and Information Technology CARMA: Complete Autonomous Responsible Management Agent (System) Submitted by: Haydn Mearns BE (Soft.) 2012 Principal

More information

A Logic for Social Influence through Communication

A Logic for Social Influence through Communication A Logic for Social Influence through Communication Zoé Christoff Institute for Logic, Language and Computation, University of Amsterdam zoe.christoff@gmail.com Abstract. We propose a two dimensional social

More information

A Conceptual Modeling Method to Use Agents in Systems Analysis

A Conceptual Modeling Method to Use Agents in Systems Analysis A Conceptual Modeling Method to Use Agents in Systems Analysis Kafui Monu University of British Columbia, Sauder School of Business, 2053 Main Mall, Vancouver BC, Canada {Kafui Monu kafui.monu@sauder.ubc.ca}

More information

Extending Gaia with Agent Design and Iterative Development

Extending Gaia with Agent Design and Iterative Development Extending Gaia with Agent Design and Iterative Development Jorge Gonzalez-Palacios 1 and Michael Luck 2 1 University of Southampton jlgp02r@ecs.soton.ac.uk 2 King s College London michael.luck@kcl.ac.uk

More information

Principles of Compositional Multi-Agent System Development

Principles of Compositional Multi-Agent System Development Principles of Compositional Multi-Agent System Development Frances M.T. Brazier, Catholijn M. Jonker, Jan Treur 1 (in: Proc. of the IFIP 98 Conference IT&KNOWS 98, J. Cuena (ed.), Chapman and Hall, 1998)

More information

Ontologies, Knowledge Representation, Artificial Intelligence Hype or Prerequisites for Interoperability?

Ontologies, Knowledge Representation, Artificial Intelligence Hype or Prerequisites for Interoperability? 1 Ontologies, Knowledge Representation, Artificial Intelligence Hype or Prerequisites for Interoperability? B. Blobel ehealth Competence Center, University Hospital Regensburg, Regensburg, Germany Abstract

More information

Visualizing Sensor Data: Towards an Experiment and Validation Platform

Visualizing Sensor Data: Towards an Experiment and Validation Platform Visualizing Sensor Data: Towards an Experiment and Validation Platform Claudia C. Gutiérrez Rodriguez and Anne-Marie Déry-Pinna I3S CNRS - University of Nice - Sophia Antipolis 930 route des colles BP

More information

Issues and Challenges in Coupling Tropos with User-Centred Design

Issues and Challenges in Coupling Tropos with User-Centred Design Issues and Challenges in Coupling Tropos with User-Centred Design L. Sabatucci, C. Leonardi, A. Susi, and M. Zancanaro Fondazione Bruno Kessler - IRST CIT sabatucci,cleonardi,susi,zancana@fbk.eu Abstract.

More information

Towards Verification of a Service Orchestration Language. Tan Tian Huat

Towards Verification of a Service Orchestration Language. Tan Tian Huat Towards Verification of a Service Orchestration Language Tan Tian Huat 1 Outline Background of Orc Motivation of Verifying Orc Overview of Orc Language Verification using PAT Future Works 2 Outline Background

More information

Mobile Tourist Guide Services with Software Agents

Mobile Tourist Guide Services with Software Agents Mobile Tourist Guide Services with Software Agents Juan Pavón 1, Juan M. Corchado 2, Jorge J. Gómez-Sanz 1 and Luis F. Castillo Ossa 2 1 Dep. Sistemas Informáticos y Programación Universidad Complutense

More information

Global Journal on Technology

Global Journal on Technology Global Journal on Technology Vol 5 (2014) 73-77 Selected Paper of 4 th World Conference on Information Technology (WCIT-2013) Issues in Internet of Things for Wellness Human-care System Jae Sung Choi*,

More information

Privacy, Technology and Economics in the 5G Environment

Privacy, Technology and Economics in the 5G Environment Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y

More information

Séminaire Supélec/SCEE

Séminaire Supélec/SCEE Séminaire Supélec/SCEE Models driven co-design methodology for SDR systems LECOMTE Stéphane Directeur de thèse PALICOT Jacques Co-directeur LERAY Pierre Encadrant industriel GUILLOUARD Samuel Outline Context

More information

Introduction to adoption of lean canvas in software test architecture design

Introduction to adoption of lean canvas in software test architecture design Introduction to adoption of lean canvas in software test architecture design Padmaraj Nidagundi 1, Margarita Lukjanska 2 1 Riga Technical University, Kaļķu iela 1, Riga, Latvia. 2 Politecnico di Milano,

More information

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems AMADEOS Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

More information

Realising the Flanders Research Information Space

Realising the Flanders Research Information Space Realising the Flanders Research Information Space Peter Spyns & Geert Van Grootel published in Meersman R., Dillon T., Herrero P. et al., (Eds.): (eds.), Proceedings of the OTM 2011 Workshops, LNCS 7046,

More information

Agent Oriented Software Engineering

Agent Oriented Software Engineering Agent Oriented Software Engineering Multiagent Systems LS Sistemi Multiagente LS Ambra Molesini ambra.molesini@unibo.it Alma Mater Studiorum Universitá di Bologna Academic Year 2006/2007 Ambra Molesini

More information

R3ST for Requirements Recovery of Legacy Runtime Code

R3ST for Requirements Recovery of Legacy Runtime Code R3ST for Requirements Recovery of Legacy Runtime Code Eko K. Budiardjo, Elviawaty M. Zamzami, and Wahyudianto, Member, IACSIT Abstract In reality, we often find that proven and workable software, exist

More information

The HL7 RIM in the Design and Implementation of an Information System for Clinical Investigations on Medical Devices

The HL7 RIM in the Design and Implementation of an Information System for Clinical Investigations on Medical Devices The HL7 RIM in the Design and Implementation of an Information System for Clinical Investigations on Medical Devices Daniela Luzi, Mariangela Contenti, Fabrizio Pecoraro To cite this version: Daniela Luzi,

More information

Modeling Supervisory Control of Autonomous Mobile Robots using Graph Theory, Automata and Z Notation

Modeling Supervisory Control of Autonomous Mobile Robots using Graph Theory, Automata and Z Notation Modeling Supervisory Control of Autonomous Mobile Robots using Graph Theory, Automata and Z Notation Javed Iqbal 1, Sher Afzal Khan 2, Nazir Ahmad Zafar 3 and Farooq Ahmad 1 1 Faculty of Information Technology,

More information

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS Nuno Sousa Eugénio Oliveira Faculdade de Egenharia da Universidade do Porto, Portugal Abstract: This paper describes a platform that enables

More information

Developing and Distributing a CubeSat Model-Based Systems Engineering (MBSE) Reference Model

Developing and Distributing a CubeSat Model-Based Systems Engineering (MBSE) Reference Model Developing and Distributing a CubeSat Model-Based Systems Engineering (MBSE) Reference Model Dave Kaslow International Council on Systems Engineering (INCOSE) Space Systems Working Group (SSWG) INCOSE

More information

A Unified Model for Physical and Social Environments

A Unified Model for Physical and Social Environments A Unified Model for Physical and Social Environments José-Antonio Báez-Barranco, Tiberiu Stratulat, and Jacques Ferber LIRMM 161 rue Ada, 34392 Montpellier Cedex 5, France {baez,stratulat,ferber}@lirmm.fr

More information

Introduction to Systems Engineering

Introduction to Systems Engineering p. 1/2 ENES 489P Hands-On Systems Engineering Projects Introduction to Systems Engineering Mark Austin E-mail: austin@isr.umd.edu Institute for Systems Research, University of Maryland, College Park Career

More information

Master of Science in Computer Engineering, February Thesis: Process Based Matchmaking of Services

Master of Science in Computer Engineering, February Thesis: Process Based Matchmaking of Services Akın Günay, Ph.D. Contact Information Education Address: School of Computing and Communications, Lancaster University Lancaster LA1 4WA, United Kingdom E-mail: a.gunay@lancaster.ac.uk Phone: +44 7746 184969

More information

Agent Oriented Software Engineering

Agent Oriented Software Engineering Agent Oriented Software Engineering Ambra Molesini 1 Massimo Cossentino 2 1 Alma Mater Studiorum Università di Bologna (Italy) ambra.molesini@unibo.it 2 Italian National Research Council - ICAR Institute

More information

A FRAMEWORK FOR PERFORMING V&V WITHIN REUSE-BASED SOFTWARE ENGINEERING

A FRAMEWORK FOR PERFORMING V&V WITHIN REUSE-BASED SOFTWARE ENGINEERING A FRAMEWORK FOR PERFORMING V&V WITHIN REUSE-BASED SOFTWARE ENGINEERING Edward A. Addy eaddy@wvu.edu NASA/WVU Software Research Laboratory ABSTRACT Verification and validation (V&V) is performed during

More information

Using Reactive Deliberation for Real-Time Control of Soccer-Playing Robots

Using Reactive Deliberation for Real-Time Control of Soccer-Playing Robots Using Reactive Deliberation for Real-Time Control of Soccer-Playing Robots Yu Zhang and Alan K. Mackworth Department of Computer Science, University of British Columbia, Vancouver B.C. V6T 1Z4, Canada,

More information

Towards filling the gap between AOSE methodologies and infrastructures: requirements and meta-model

Towards filling the gap between AOSE methodologies and infrastructures: requirements and meta-model Towards filling the gap between AOSE methodologies and infrastructures: requirements and meta-model Fabiano Dalpiaz, Ambra Molesini, Mariachiara Puviani and Valeria Seidita Dipartimento di Ingegneria e

More information

SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS

SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS Sami Syrjälä and Seppo Kuikka Institute of Automation and Control Department of Automation Tampere University of Technology Korkeakoulunkatu

More information

15: Ethics in Machine Learning, plus Artificial General Intelligence and some old Science Fiction

15: Ethics in Machine Learning, plus Artificial General Intelligence and some old Science Fiction 15: Ethics in Machine Learning, plus Artificial General Intelligence and some old Science Fiction Machine Learning and Real-world Data Ann Copestake and Simone Teufel Computer Laboratory University of

More information

Towards the definition of a Science Base for Enterprise Interoperability: A European Perspective

Towards the definition of a Science Base for Enterprise Interoperability: A European Perspective Towards the definition of a Science Base for Enterprise Interoperability: A European Perspective Keith Popplewell Future Manufacturing Applied Research Centre, Coventry University Coventry, CV1 5FB, United

More information

Design Science Research Methods. Prof. Dr. Roel Wieringa University of Twente, The Netherlands

Design Science Research Methods. Prof. Dr. Roel Wieringa University of Twente, The Netherlands Design Science Research Methods Prof. Dr. Roel Wieringa University of Twente, The Netherlands www.cs.utwente.nl/~roelw UFPE 26 sept 2016 R.J. Wieringa 1 Research methodology accross the disciplines Do

More information

Separation of Concerns in Software Engineering Education

Separation of Concerns in Software Engineering Education Separation of Concerns in Software Engineering Education Naji Habra Institut d Informatique University of Namur Rue Grandgagnage, 21 B-5000 Namur +32 81 72 4995 nha@info.fundp.ac.be ABSTRACT Separation

More information

Industry 4.0: the new challenge for the Italian textile machinery industry

Industry 4.0: the new challenge for the Italian textile machinery industry Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has

More information

Model-Based Systems Engineering Methodologies. J. Bermejo Autonomous Systems Laboratory (ASLab)

Model-Based Systems Engineering Methodologies. J. Bermejo Autonomous Systems Laboratory (ASLab) Model-Based Systems Engineering Methodologies J. Bermejo Autonomous Systems Laboratory (ASLab) Contents Introduction Methodologies IBM Rational Telelogic Harmony SE (Harmony SE) IBM Rational Unified Process

More information