Engineering of Software-Intensive Systems: State of the Art and Research Challenges

  • Matthias Hölzl
  • Axel Rauschmayer
  • Martin Wirsing
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5380)


Software-intensive systems become more and more important in our everyday lives. But their increasing complexity makes it difficult to develop and maintain them. This chapter gives an overview of the state of the art of building software-intensive systems and outlines research challenges that have been identified by the InterLink working group “software-intensive systems and new computing paradigms”.


Sensor Network Wireless Sensor Network Multiagent System Resource Description Framework Intrusion Detection System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dedrick, J., Gurbaxani, V., Kraemer, K.L.: Information technology and economic performance: A critical review of the empirical evidence. ACM Comput. Surv. 35(1), 1–28 (2003)CrossRefGoogle Scholar
  2. 2.
    Information Technology for European Advancement (ITEA) Office Association: ITEA technology roadmap for software-intensive systems, 2nd edn. (May 2004),
  3. 3.
    Wirsing, M., Hölzl, M.: Software-intensive systems. Report of the Beyond-the-Horizon WG6 (2007)Google Scholar
  4. 4.
    Glass, R.L.: Guest editor’s introduction: The state of the practice of software engineering. IEEE Software 20(6), 20–21 (2003)CrossRefGoogle Scholar
  5. 5.
    Cusumano, M.A., MacCormack, A., Kemerer, C.F., Crandall, B.: Software development worldwide: The state of the practice. IEEE Software 20(6), 28–34 (2003)CrossRefGoogle Scholar
  6. 6.
    Lethbridge, T., Singer, J., Forward, A.: How software engineers use documentation: The state of the practice. IEEE Software 20(6), 35–39 (2003)CrossRefGoogle Scholar
  7. 7.
    Neill, C.J., Laplante, P.A.: Requirements engineering: The state of the practice. IEEE Software 20(6), 40–45 (2003)CrossRefGoogle Scholar
  8. 8.
    Ciolkowski, M., Laitenberger, O., Biffl, S.: Software reviews: The state of the practice. IEEE Software 20(6), 46–51 (2003)CrossRefGoogle Scholar
  9. 9.
    Birk, A., Heller, G., John, I., Schmid, K., von der Maßen, T., Müller, K.: Product line engineering: The state of the practice. IEEE Software 20(6), 52–60 (2003)CrossRefGoogle Scholar
  10. 10.
    Graaf, B., Lormans, M., Toetenel, H.: Embedded software engineering: The state of the practice. IEEE Software 20(6), 61–69 (2003)CrossRefGoogle Scholar
  11. 11.
    Baskerville, R., Ramesh, B., Levine, L., Pries-Heje, J., Slaughter, S.: Is internet-speed software development different? IEEE Software 20(6), 70–77 (2003)CrossRefGoogle Scholar
  12. 12.
    Reifer, D.J.: Is the software engineering state of the practice getting closer to the state of the art? IEEE Software 20(6), 78–83 (2003)CrossRefGoogle Scholar
  13. 13.
    Moore, G.E.: Cramming more components onto integrated circuits. Electronics 38(8), 114–117 (1965)Google Scholar
  14. 14.
    Kopp, C.: Moore’s Law and its Implications for Information Warfare. In: Sibilia, R. (ed.) Proceedings of the International AOC Electronic Warfare Conference, Alexandria, Virginia, USA, May 20-25, 2000, vol. 3, Association of Old Crows, AOC International AOC Electronic Warfare Conference (2000)Google Scholar
  15. 15.
    Coatta, T.: The (not so) hidden computer. Queue 4(3), 22–26 (2006)CrossRefGoogle Scholar
  16. 16.
    Benetti, S.: Intelligent co-operative systems in cars for road safety (July 2006)Google Scholar
  17. 17.
    Lee, E.A.: Cyber-physical systems—are computing foundations adequate? In: NSF Workshop on Cyber-Physical Systems (October 2006)Google Scholar
  18. 18.
    NSF Workshop on Cyber-Physical Systems: Web site of the nsf workshop on cyber-physical systems (October 2006) (last accessed 2008-01-20),
  19. 19.
    Ungerer, T., Robič, B., Šilc, J.: A survey of processors with explicit multithreading. ACM Comput. Surv. 35(1), 29–63 (2003)CrossRefGoogle Scholar
  20. 20.
    Bjerregaard, T., Mahadevan, S.: A survey of research and practices of network-on-chip. ACM Comput. Surv. 38(1), 1 (2006)CrossRefGoogle Scholar
  21. 21.
    Lyshevski, S.E.: MEMS and NEMS: Systems, Devices and Structures. CRC Press, Boca Raton (2002)Google Scholar
  22. 22.
    Gad-El-Hak, M. (ed.): The MEMS Handbook. CRC Press, Boca Raton (2001)zbMATHGoogle Scholar
  23. 23.
    Allen, J.J.: Micro Electro Mechanical System Design. CRC Press, Boca Raton (2005)CrossRefGoogle Scholar
  24. 24.
    Gad-El-Hak, M.: MEMS—Introduction and Fundamentals. CRC Press, Boca Raton (2006)Google Scholar
  25. 25.
    Memsnet: Web site of the project (2008) (last accessed 2008-01-10),
  26. 26.
    Venkatachalam, V., Franz, M.: Power reduction techniques for microprocessor systems. ACM Comput. Surv. 37(3), 195–237 (2005)CrossRefGoogle Scholar
  27. 27.
    Rad, R.M., Tehranipoor, M.: Evaluating area and performance of hybrid fpgas with nanoscale clusters and cmos routing. J. Emerg. Technol. Comput. Syst. 3(3), 15 (2007)CrossRefGoogle Scholar
  28. 28.
    Massoud, Y., Nieuwoudt, A.: Modeling and design challenges and solutions for carbon nanotube-based interconnect in future high performance integrated circuits. J. Emerg. Technol. Comput. Syst. 2(3), 155–196 (2006)CrossRefGoogle Scholar
  29. 29.
    Compton, K., Hauck, S.: Reconfigurable computing: a survey of systems and software. ACM Comput. Surv. 34(2), 171–210 (2002)CrossRefGoogle Scholar
  30. 30.
    Goldstein, S.C., Mowry, T.C.: Claytronics: A scalable basis for future robots. In: RoboSphere 2004, Moffett Field, CA (November 2004)Google Scholar
  31. 31.
    Kirby, B., Aksak, B., Goldstein, S.C., Hoburg, J.F., Mowry, T.C., Pillai, P.: A modular robotic system using magnetic force effectors. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems (IROS 2007) (October 2007)Google Scholar
  32. 32.
    Ravichandran, R., Gordon, G., Goldstein, S.C.: A scalable distributed algorithm for shape transformation in multi-robot systems. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems IROS 2007 (October 2007)Google Scholar
  33. 33.
    Tahoori, M.B.: Application-independent defect tolerance of reconfigurable nanoarchitectures. J. Emerg. Technol. Comput. Syst. 2(3), 197–218 (2006)CrossRefGoogle Scholar
  34. 34.
    Prodan, L., Udrescu, M., Boncalo, O., Vladutiu, M.: Design for dependability in emerging technologies. J. Emerg. Technol. Comput. Syst. 3(2), 6 (2007)CrossRefGoogle Scholar
  35. 35.
    Sekanina, L.: Evolutionary functional recovery in virtual reconfigurable circuits. J. Emerg. Technol. Comput. Syst. 3(2), 8 (2007)CrossRefGoogle Scholar
  36. 36.
    Tempesti, G., Mange, D., Mudry, P.A., Rossier, J., Stauffer, A.: Self-replicating hardware for reliability: The embryonics project. J. Emerg. Technol. Comput. Syst. 3(2), 9 (2007)CrossRefGoogle Scholar
  37. 37.
    Patwardhan, J., Dwyer, C., Lebeck, A.R.: A self-organizing defect tolerant simd architecture. J. Emerg. Technol. Comput. Syst. 3(2), 10 (2007)CrossRefGoogle Scholar
  38. 38.
    Milner, R., Stepney, S.: Nanotechnology: Computer science opportunities and challenges, Technical report, Submission by the UK Computing Research Committee to the Nanotechnology Working Group of the Royal Society and the Royal Academy of Engineering (August 2003)Google Scholar
  39. 39.
    Stepney, S., Braunstein, S.L., Clark, J.A., Tyrrell, A.M., Adamatzky, A., Smith, R.E., Addis, T.R., Johnson, C.G., Timmis, J., Welch, P.H., Milner, R., Partridge, D.: Journeys in non-classical computation II: initial journeys and waypoints. Parallel Algorithms Appl 21(2), 97–125 (2006)MathSciNetzbMATHGoogle Scholar
  40. 40.
    Feynman, R.P.: There’s plenty of room at the bottom—an invitation to enter a new field of physics. Engineering and Science (February 1960)Google Scholar
  41. 41.
    Drexler, K.E.: Molecular engineering: An approach to the development of general capabilities for molecular manipulation. Proc. Nat. Acad. Sci. USA 78(9), 5275–5278 (1981)CrossRefGoogle Scholar
  42. 42.
    Aaron, R., Herr, H., Ciombor, D., Hochberg, L., Donoghue, J., Briant, C., Morgan, J., Ehrlich, M.: Horizons in prosthesis development for the restoration of limb function. Journal of the American Academy of Orthopaedic Surgeons 14(10), 198–204 (2006)CrossRefGoogle Scholar
  43. 43.
    Su, F., Chakrabarty, K.: Yield enhancement of reconfigurable microfluidics-based biochips using interstitial redundancy. J. Emerg. Technol. Comput. Syst. 2(2), 104–128 (2006)CrossRefGoogle Scholar
  44. 44.
    Amos, M.: Theoretical and Experimental DNA Computation. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  45. 45.
    Head, T.: Formal language theory and dna: an analysis of the generative capacity of specific recombinant behaviors. Bull. Math. Biology 49(6), 737–759 (1987)MathSciNetzbMATHCrossRefGoogle Scholar
  46. 46.
    Adleman, L.: Molecular computation of solutions to combinatorial problems. Science 266(5187), 1021–1024 (1994)CrossRefGoogle Scholar
  47. 47.
    Hogg, T., Huberman, B.A.: Controlling smart matter. Smart Materials and Structures 7(R1) (1998)Google Scholar
  48. 48.
    Maclennan, B.J.: Replication, sharing, deletion, lists, and numerals: Progress on universally programmable intelligent matter (November 2002)Google Scholar
  49. 49.
    Rothemund, P.W.K., Papadakis, N., Winfree, E.: Algorithmic self-assembly of DNA Sierpinski triangles. In: Preliminary Proceedings of DNA Computing, 9th international Workshop on DNA-Based Computers, DNA 2003, 125 Madison, Wisconsin, USA, pp. 1–4 (June 2003)Google Scholar
  50. 50.
    Ben-Hur, A., Siegelmann, H.T.: Computation in gene networks. Chaos 14(1), 145–151 (2004)MathSciNetzbMATHCrossRefGoogle Scholar
  51. 51.
    Kobayashi, H., Kaern, M., Araki, M., Chung, K., Gardner, T.S., Cantor, C.R., Collins, J.J.: Programmable cells: interfacing natural and engineered gene networks. Proc. Natl. Acad. Sci. U S A 101(22), 8414–8419 (2004)CrossRefGoogle Scholar
  52. 52.
    Seelig, G., Soloveichik, D., Zhang, D.Y., Winfree, E.: Enzyme-free nucleic acid logic circuits. Science 314(5805), 1585–1588 (2006)CrossRefGoogle Scholar
  53. 53.
    Yokobayashi, Y., Weiss, R., Arnold, F.H.: Directed evolution of a genetic circuit. Proc. Natl. Acad. Sci. U S A 99(26), 16587–16591 (2002)CrossRefGoogle Scholar
  54. 54.
    Franois, P., Hakim, V.: Design of genetic networks with specified functions by evolution in silicon. Proc. Natl. Acad. Sci. U S A 101(2), 580–585 (2004)CrossRefGoogle Scholar
  55. 55.
    Weiss, R., Knight, T.: Engineered communications for microbial robotics. In: DNA: International Workshop on DNA-Based Computers. LNCS. Springer, Heidelberg (2000)Google Scholar
  56. 56.
    Weiss, R., Basu, S., Hooshangi, S., Kalmbach, A., Karig, D., Mehreja, R., Netravali, I.: Genetic circuit building blocks for cellular computation, communications, and signal processing. Natural Computing 2(1), 43–84 (2003)CrossRefGoogle Scholar
  57. 57.
    Gibbs, W.W.: Synthetic life. Scientific American 290(5), 74–81 (2004)Google Scholar
  58. 58. Web site (2007),
  59. 59.
    GEM: Web site of the international Genetically Engineered Machine competition (2007),
  60. 60.
    Carlson, R.: The pace and proliferation of biological technologies. Biosecur Bioterror 1(3), 203–214 (2003)CrossRefGoogle Scholar
  61. 61.
    Bruss, D., Erdélyi, G., Meyer, T., Riege, T., Rothe, J.: Quantum cryptography: A survey. ACM Comput. Surv. 39(2), 6 (2007)CrossRefGoogle Scholar
  62. 62.
    Van der Pyl, T., Karlson, A. (eds.): Quantum Information Processing & Communications in Europe. European Union, IST-FET (2005)Google Scholar
  63. 63.
    ERA-Pilot: Web site of the ERA-Pilot QIST Coordinated Action (2008) (last accessed 2008-01-07),
  64. 64.
    Meter, R.V., Oskin, M.: Architectural implications of quantum computing technologies. J. Emerg. Technol. Comput. Syst. 2(1), 31–63 (2006)CrossRefGoogle Scholar
  65. 65.
    Naur, P.: Computing versus human thinking. Commun. ACM 50(1), 85–94 (2007)CrossRefGoogle Scholar
  66. 66.
    Yilmaz, A., Javed, O., Shah, M.: Object tracking: A survey. ACM Comput. Surv. 38(4), 13 (2006)CrossRefGoogle Scholar
  67. 67.
    Lobo, J., Dias, J.: Fusing of image and inertial sensing for camera calibration. In: Proceedings of the IEEE Conference on Multisensor Fusion and Integration for Intelligent Systems, MFI (2000)Google Scholar
  68. 68.
    Clouqueur, T., Phipatanasuphorn, V., Ramanathan, P., Saluja, K.: Sensor deployment strategy for target detection. In: The First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA 2002) (September 2002)Google Scholar
  69. 69.
    Lyons, D.M., Hsu, D.F., Ma, Q., Wang, L.: Combinatorial fusion criteria for robot mapping. In: AINA, pp. 847–852. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  70. 70.
    Gechter, F., Chevrier, V., Charpillet, F.: A reactive agent-based problem-solving model: Application to localization and tracking. ACM Trans. Auton. Adapt. Syst. 1(2), 189–222 (2006)CrossRefGoogle Scholar
  71. 71.
    Nakamura, E.F., Loureiro, A.A.F., Frery, A.C.: Information fusion for wireless sensor networks: Methods, models, and classifications. ACM Comput. Surv. 39(3), 9 (2007)CrossRefGoogle Scholar
  72. 72.
    Ramachandran, U., Kumar, R., Wolenetz, M., Cooper, B., Agarwalla, B., Shin, J., Hutto, P., Paul, A.: Dynamic data fusion for future sensor networks. ACM Trans. Sen. Netw. 2(3), 404–443 (2006)CrossRefGoogle Scholar
  73. 73.
    Ganesan, D., Cristescu, R., Beferull-Lozano, B.: Power-efficient sensor placement and transmission structure for data gathering under distortion constraints. ACM Trans. Sen. Netw. 2(2), 155–181 (2006)CrossRefGoogle Scholar
  74. 74.
    Zhou, G., He, T., Krishnamurthy, S., Stankovic, J.A.: Models and solutions for radio irregularity in wireless sensor networks. ACM Trans. Sen. Netw. 2(2), 221–262 (2006)CrossRefGoogle Scholar
  75. 75.
    Kansal, A., Hsu, J., Zahedi, S., Srivastava, M.B.: Power management in energy harvesting sensor networks. Trans. on Embedded Computing Sys. 6(4), 32 (2007)CrossRefGoogle Scholar
  76. 76.
    Chakrabarti, A., Sabharwal, A., Aazhang, B.: Communication power optimization in a sensor network with a path-constrained mobile observer. ACM Trans. Sen. Netw. 2(3), 297–324 (2006)CrossRefGoogle Scholar
  77. 77.
    Kansal, A., Kaiser, W., Pottie, G., Srivastava, M., Sukhatme, G.: Reconfiguration methods for mobile sensor networks. ACM Trans. Sen. Netw. 3(4), 22 (2007)CrossRefGoogle Scholar
  78. 78.
    Karnik, A., Kumar, A.: Distributed optimal self-organization in ad hoc wireless sensor networks. IEEE/ACM Trans. Netw. 15(5), 1035–1045 (2007)CrossRefGoogle Scholar
  79. 79.
    Huang, C.F., Tseng, Y.C., Wu, H.L.: Distributed protocols for ensuring both coverage and connectivity of a wireless sensor network. ACM Trans. Sen. Netw. 3(1), 5 (2007)CrossRefGoogle Scholar
  80. 80.
    Lazos, L., Poovendran, R.: Stochastic coverage in heterogeneous sensor networks. ACM Trans. Sen. Netw. 2(3), 325–358 (2006)CrossRefGoogle Scholar
  81. 81.
    Cărbunar, B., Grama, A., Vitek, J., Cărbunar, O.: Redundancy and coverage detection in sensor networks. ACM Trans. Sen. Netw. 2(1), 94–128 (2006)CrossRefGoogle Scholar
  82. 82.
    Yoon, S., Veerarittiphan, C., Sichitiu, M.L.: Tiny-sync: Tight time synchronization for wireless sensor networks. ACM Trans. Sen. Netw. 3(2), 8 (2007)CrossRefGoogle Scholar
  83. 83.
    Farrugia, E., Simon, R.: An efficient and secure protocol for sensor network time synchronization. Journal of Systems and Software 79(2), 147–162 (2006)CrossRefGoogle Scholar
  84. 84.
    Lanese, I.: Synchronization Strategies for Global Computing Models. PhD thesis, Ph.D. school in Computer Science, University of Pisa, Pisa, Italy (2006)Google Scholar
  85. 85.
    Jindal, A., Psounis, K.: Modeling spatially correlated data in sensor networks. ACM Trans. Sen. Netw. 2(4), 466–499 (2006)CrossRefGoogle Scholar
  86. 86.
    Herbert, D., Sundaram, V., Lu, Y.H., Bagchi, S., Li, Z.: Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. ACM Trans. Auton. Adapt. Syst. 2(3), 8 (2007)CrossRefGoogle Scholar
  87. 87.
    Wang, D., Zhang, Q., Liu, J.: The self-protection problem in wireless sensor networks. ACM Trans. Sen. Netw. 3(4), 20 (2007)CrossRefGoogle Scholar
  88. 88.
    Salatian, A., Hunter, J.: Deriving trends in historical and real-time continuously sampled medical data. J. Intell. Inf. Syst. 13(1-2), 47–71 (1999)CrossRefGoogle Scholar
  89. 89.
    Combi, C., Chittaro, L.: Abstraction on clinical data sequences: an object-oriented data model and a query language based on the event calculus. Artificial Intelligence in Medicine 17(3), 271–301 (1999)CrossRefGoogle Scholar
  90. 90.
    Matuszek, C., Witbrock, M.J., Kahlert, R.C., Cabral, J., Schneider, D., Shah, P., Lenat, D.B.: Searching for common sense: Populating cyc from the web. In: Veloso, M.M., Kambhampati, S. (eds.) AAAI, pp. 1430–1435. AAAI Press / The MIT Press (2005)Google Scholar
  91. 91.
    Taylor, M.E., Matuszek, C., Klimt, B., Witbrock, M.J.: Autonomous classification of knowledge into an ontology. In: Wilson, D., Sutcliffe, G. (eds.) FLAIRS Conference, pp. 140–145. AAAI Press, Menlo Park (2007)Google Scholar
  92. 92.
    NASA: Intelligent data understanding subproject of the intelligent systems project (2008),
  93. 93.
    Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F., Cowan, J.: Extensible markup language (xml) 1.1, 2nd edn. W3C Recommendation (August 2006),
  94. 94.
    W3C Consortium: Extensible markup language (xml) web site (2008) (last accessed: 2008-01-19),
  95. 95.
    Object Management Group: Meta Object Facility (MOF) Specification Version 1.4 (April 2002) OMG Document: formal/02-04-03,
  96. 96.
    W3C Consortium: Resource description framework (rdf) web site (2008) (last accessed: 2008-01-19),
  97. 97.
    KIF: Knowledge interchange format—draft proposed american national standard (dpans) NCITS.T2/98-004 (1998),
  98. 98.
    Lenat, D.B., Guha, R.V.: The evolution of cycl, the cyc representation language. SIGART Bull. 2(3), 84–87 (1991)CrossRefGoogle Scholar
  99. 99.
    Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook: Theory, Implementation, and Applications, 2nd edn. Cambridge University Press, Cambridge (2007)zbMATHGoogle Scholar
  100. 100.
    McGuinness, D.L., van Harmelen, F.: Owl web ontology language: Overview. W3C Recommendation,
  101. 101.
    Bechhofer, S., et al.: Owl web ontology language: Reference. W3C Recommendation,
  102. 102.
    Berners-Lee, T., Connolly, D., Kagal, L., Scharf, Y., Hendler, J.: N3logic: A logical framework for the world wide web (2007),
  103. 103.
    Altheim, M., Anderson, B., Hayes, P., Menzel, C., Sowa, J.F., Tammet, T.: Scl: Simple common logic (2004),
  104. 104.
    Group, O.M.: Ontology definition metamodel (OMG adopted specification) OMG Document Number: ptc/2007-09-09 (2007),
  105. 105.
    Copeland, J.B.: Cyc: A case study in ontological engineering. Electronic Journal of Analytic Philosophy 5 (1997)Google Scholar
  106. 106.
    Cyc: The Cyc foundation.
  107. 107.
    Fellbaum, C. (ed.): WordNet—An Electronic Lexical Database. MIT Press, Cambridge (1998)zbMATHGoogle Scholar
  108. 108.
    Niles, I., Pease, A.: Towards a standard upper ontology. In: Proceedings of the 2nd International Conference on Formal Ontology in Information Systems, FOIS 2001 (2001)Google Scholar
  109. 109.
    Formica, A., Missikoff, M.: Inheritance processing and conflicts in structural generalization hierarchies. ACM Comput. Surv. 36(3), 263–290 (2004)CrossRefGoogle Scholar
  110. 110.
    Katifori, A., Halatsis, C., Lepouras, G., Vassilakis, C., Giannopoulou, E.: Ontology visualization methods—a survey. ACM Comput. Surv. 39(4), 10 (2007)CrossRefGoogle Scholar
  111. 111.
    Motik, B., Stojanovic, N., Stojanovic, L., Maedche, A.: User-driven ontology evolution management. In: Gómez-Pérez, A., Benjamins, V.R. (eds.) EKAW 2002. LNCS (LNAI), vol. 2473. Springer, Heidelberg (2002)Google Scholar
  112. 112.
    Klein, M., Fensel, D.: Ontology versioning on the semantic web. In: Int. Semantic Web Working Symp. (SWWS) (2001)Google Scholar
  113. 113.
  114. 114.
    Bernstein, A., Kaufmann, E., Göhring, A., Kiefer, C.: Querying ontologies: A controlled english interface for end-users. In: 4th Int. Semantic Web Conf. (ISWC) (2005)Google Scholar
  115. 115.
    Kuhn, T.: AceWiki: Collaborative Ontology Management in Controlled Natural Language. In: Proc. 3rd Semantic Wiki Wsh. CEUR Workshop Proceedings (2008)Google Scholar
  116. 116.
    Benjamins, V.R., Davies, J., Baeza-Yates, R., Mika, P., Zaragoza, H., Greaves, M., Gmez-Prez, J.M., Contreras, J., Domingue, J., Fensel, D.: Near-term prospects for semantic technologies. IEEE Intelligent Systems 23(1), 76–88 (2008)CrossRefGoogle Scholar
  117. 117.
    Alferes, J.J., Bailey, J., May, W., Schwertel, U. (eds.): PPSWR 2006. LNCS, vol. 4187. Springer, Heidelberg (2006)Google Scholar
  118. 118.
    Wyss, C.M., James, A., Hasselbring, W., Conrad, S., Höpfner, H.: Report on the engineering federated information systems 2003 workshop (efis 2003). SIGSOFT Softw. Eng. Notes 29(2), 1–3 (2004)CrossRefGoogle Scholar
  119. 119.
    Sohn, D.: Understanding drm. Queue 5(7), 32–39 (2007)CrossRefGoogle Scholar
  120. 120.
    Zheng, D., Liu, Y., Zhao, J., Saddik, A.E.: A survey of rst invariant image watermarking algorithms. ACM Comput. 39(2), 5 (2007)CrossRefGoogle Scholar
  121. 121.
    Garfinkel, S.: Database Nation: The Death of Privacy in the 21st Century. O’Reilly, Sebastopol (2000)Google Scholar
  122. 122.
    Turmo, J., Ageno, A., Català, N.: Adaptive information extraction. ACM Comput. Surv. 38(2), 4 (2006)CrossRefGoogle Scholar
  123. 123.
    Ceglar, A., Roddick, J.F.: Association mining. ACM Comput. Surv. 38(2), 5 (2006)CrossRefGoogle Scholar
  124. 124.
    Mena, E., Illarramendi, A., Royo, J.A., Gon, A.: A software retrieval service based on adaptive knowledge-driven agents for wireless environments. ACM Trans. Auton. Adapt. Syst. 1(1), 67–90 (2006)CrossRefGoogle Scholar
  125. 125.
    Zobel, J., Moffat, A.: Inverted files for text search engines. ACM Comput. Surv. 38(2), 6 (2006)CrossRefGoogle Scholar
  126. 126.
    Chakrabarti, D., Faloutsos, C.: Graph mining: Laws, generators, and algorithms. ACM Comput. Surv. 38(1), 2 (2006)CrossRefGoogle Scholar
  127. 127.
    Truran, M., Goulding, J., Ashman, H.: Autonomous authoring tools for hypertext. ACM Comput. Surv. 39(3), 8 (2007)CrossRefGoogle Scholar
  128. 128.
    Jensen, E.C., Beitzel, S.M., Chowdhury, A., Frieder, O.: Repeatable evaluation of search services in dynamic environments. ACM Trans. Inf. Syst. 26(1), 1 (2007)CrossRefGoogle Scholar
  129. 129.
    Geng, L., Hamilton, H.J.: Interestingness measures for data mining: A survey. ACM Comput. Surv. 38(3), 9 (2006)CrossRefGoogle Scholar
  130. 130.
    Zhao, H.: Semantic matching across heterogeneous data sources. Commun. ACM 50(1), 45–50 (2007)CrossRefGoogle Scholar
  131. 131.
    Carpenter, B.: Better, faster, more secure. Queue 4(10), 42–48 (2007)CrossRefGoogle Scholar
  132. 132.
    Biskupski, B., Dowling, J., Sacha, J.: Properties and mechanisms of self-organizing manet and p2p systems. ACM Trans. Auton. Adapt. Syst. 2(1), 1 (2007)CrossRefGoogle Scholar
  133. 133.
    Jelenković, P.R., Momčilović, P., Squillante, M.S.: Scalability of wireless networks. IEEE/ACM Trans. Netw. 15(2), 295–308 (2007)CrossRefGoogle Scholar
  134. 134.
    Qiao, D., Choi, S., Shin, K.G.: Interference analysis and transmit power control in ieee 802.11a/h wireless lans. IEEE/ACM Trans. Netw. 15(5), 1007–1020 (2007)CrossRefGoogle Scholar
  135. 135.
    Sharma, G., Mazumdar, R., Shroff, N.B.: Delay and capacity trade-offs in mobile ad hoc networks: a global perspective. IEEE/ACM Trans. Netw. 15(5), 981–992 (2007)CrossRefGoogle Scholar
  136. 136.
    Santi, P.: Topology control in wireless ad hoc and sensor networks. ACM Comput. Surv. 37(2), 164–194 (2005)CrossRefGoogle Scholar
  137. 137.
    Uludag, S., Lui, K.S., Nahrstedt, K., Brewster, G.: Analysis of topology aggregation techniques for qos routing. ACM Comput. Surv. 39(3), 7 (2007)CrossRefGoogle Scholar
  138. 138.
    Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Comput. Surv. 36(4), 335–371 (2004)CrossRefGoogle Scholar
  139. 139.
    Venugopal, S., Buyya, R., Ramamohanarao, K.: A taxonomy of data grids for distributed data sharing, management, and processing. ACM Comput. Surv. 38(1), 3 (2006)CrossRefGoogle Scholar
  140. 140.
    Watanabe, K., Nakajima, Y., Enokido, T., Takizawa, M.: Ranking factors in peer-to-peer overlay networks. ACM Trans. Auton. Adapt. Syst. 2(3), 11 (2007)CrossRefGoogle Scholar
  141. 141.
    Alves, A., Arkin, A., Askary, S., Barreto, C., Bloch, B., Curbera, F., Ford, M., Goland, Y., Guzar, A., Kartha, N., Liu, C.K., Khalaf, R., Knig, D., Marin, M., Mehta, V., Thatte, S., van der Rijn, D., Yendluri, P., Yiu, A.: Web Services Business Process Execution Language Version 2.0. Technical report, WS-BPEL TC OASIS (April 2007),
  142. 142.
    Misra, J., Cook, W.R.: Computation orchestration: A basis for wide-area computing. Journal of Software and Systems Modeling (to appear, 2006)Google Scholar
  143. 143.
    Cook, W.R., Patwardhan, S., Misra, J.: Workflow patterns in orc. In: Ciancarini, P., Wiklicky, H. (eds.) COORDINATION 2006. LNCS, vol. 4038, pp. 82–96. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  144. 144.
    Sivasubramanian, S., Szymaniak, M., Pierre, G., van Steen, M.: Replication for web hosting systems. ACM Comput. Surv. 36(3), 291–334 (2004)CrossRefGoogle Scholar
  145. 145.
    Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42–81 (2005)zbMATHCrossRefGoogle Scholar
  146. 146.
    Elnozahy, E.N.M., Alvisi, L., Wang, Y.M., Johnson, D.B.: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34(3), 375–408 (2002)CrossRefGoogle Scholar
  147. 147.
    Bruni, R., Melgratti, H., Montanari, U.: Theoretical foundations for compensations in flow composition languages. In: Proc. of POPL 2005, pp. 209–220. ACM Press, New York (2005)Google Scholar
  148. 148.
    Bruni, R., Melgratti, H., Montanari, U.: Composing transactional services (manuscript 2006)Google Scholar
  149. 149.
    Garcia-Molina, H., Salem, K.: Sagas. In: SIGMOD 1987: Proc. of ACM SIGMOD Int. Conf. on Management of Data, pp. 249–259. ACM Press, New York (1987)CrossRefGoogle Scholar
  150. 150.
    Pleisch, S., Schiper, A.: Approaches to fault-tolerant and transactional mobile agent execution—an algorithmic view. ACM Comput. Surv. 36(3), 219–262 (2004)CrossRefGoogle Scholar
  151. 151.
    Soundararajan, G., Amza, C.: Reactive provisioning of backend databases in shared dynamic content server clusters. ACM Trans. Auton. Adapt. Syst. 1(2), 151–188 (2006)CrossRefGoogle Scholar
  152. 152.
    Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. In: USENIX 2006: Proceedings of the 7th conference on USENIX Symposium on Operating Systems Design and Implementation, Berkeley, CA, USA, p. 15. USENIX Association (2006)Google Scholar
  153. 153.
    Dix, A., Finlay, J., Abowd, G., Beale, R.: Human Computer Interaction, 3rd edn. Prentice-Hall, Englewood Cliffs (2004)zbMATHGoogle Scholar
  154. 154.
    Canny, J.: The future of human-computer interaction. Queue 4(6), 24–32 (2006)CrossRefGoogle Scholar
  155. 155.
    McTear, M.F.: Spoken dialogue technology: enabling the conversational user interface. ACM Comput. Surv. 34(1), 90–169 (2002)CrossRefGoogle Scholar
  156. 156.
    Oviatt, S., Seneff, S.: Introduction to mobile and adaptive conversational interfaces. ACM Trans. Comput.-Hum. Interact. 11(3), 237–240 (2004)CrossRefGoogle Scholar
  157. 157.
    Oviatt, S., Darves, C., Coulston, R.: Toward adaptive conversational interfaces: Modeling speech convergence with animated personas. ACM Trans. Comput.-Hum. Interact. 11(3), 300–328 (2004)CrossRefGoogle Scholar
  158. 158.
    Lemon, O., Gruenstein, A.: Multithreaded context for robust conversational interfaces: Context-sensitive speech recognition and interpretation of corrective fragments. ACM Trans. Comput.-Hum. Interact. 11(3), 241–267 (2004)CrossRefGoogle Scholar
  159. 159.
    Zhai, S., Bellotti, V.: Introduction to sensing-based interaction. ACM Trans. Comput.-Hum. Interact. 12(1), 1–2 (2005)CrossRefGoogle Scholar
  160. 160.
    Hinckley, K., Pierce, J., Horvitz, E., Sinclair, M.: Foreground and background interaction with sensor-enhanced mobile devices. ACM Trans. Comput.-Hum. Interact. 12(1), 31–52 (2005)CrossRefGoogle Scholar
  161. 161.
    Liao, C., Guimbretière, F., Hinckley, K., Hollan, J.: Papiercraft: A gesture-based command system for interactive paper. ACM Trans. Comput.-Hum. Interact. 14(4), 1–27 (2008)CrossRefGoogle Scholar
  162. 162.
    Second Life: Second life web site (last accessed: 2008-06-19),
  163. 163.
    Chan, H.C., Teo, H.H.: Evaluating the boundary conditions of the technology acceptance model: An exploratory investigation. ACM Trans. Comput.-Hum. Interact. 14(2), 9 (2007)CrossRefGoogle Scholar
  164. 164.
    Bickmore, T.W., Picard, R.W.: Establishing and maintaining long-term human-computer relationships. ACM Trans. Comput.-Hum. Interact. 12(2), 293–327 (2005)CrossRefGoogle Scholar
  165. 165.
    Crowley, J.L.: Social perception. Queue 4(6), 34–43 (2006)CrossRefGoogle Scholar
  166. 166.
    McGrenere, J., Baecker, R.M., Booth, K.S.: A field evaluation of an adaptable two-interface design for feature-rich software. ACM Trans. Comput.-Hum. Interact. 14(1), 3 (2007)CrossRefGoogle Scholar
  167. 167.
    Dey, A.K., Mankoff, J.: Designing mediation for context-aware applications. ACM Trans. Comput.-Hum. Interact. 12(1), 53–80 (2005)CrossRefGoogle Scholar
  168. 168.
    Edwards, W.K.: Putting computing in context: An infrastructure to support extensible context-enhanced collaborative applications. ACM Trans. Comput.-Hum. Interact. 12(4), 446–474 (2005)CrossRefGoogle Scholar
  169. 169.
    Sears, A., Hanson, V.L., Myers, B.: Introduction to special issue on computers and accessibility. ACM Trans. Comput.-Hum. Interact. 14(3), 11 (2007)CrossRefGoogle Scholar
  170. 170.
    Harper, S., Bechhofer, S.: Sadie: Structural semantics for accessibility and device independence. ACM Trans. Comput.-Hum. Interact. 14(2), 10 (2007)CrossRefGoogle Scholar
  171. 171.
    Jay, C., Glencross, M., Hubbold, R.: Modeling the effects of delayed haptic and visual feedback in a collaborative virtual environment. ACM Trans. Comput.-Hum. Interact. 14(2), 8 (2007)CrossRefGoogle Scholar
  172. 172.
    Berstel, J., Reghizzi, S.C., Roussel, G., Pietro, P.S.: A scalable formal method for design and automatic checking of user interfaces. ACM Trans. Softw. Eng. Methodol. 14(2), 124–167 (2005)CrossRefGoogle Scholar
  173. 173.
    Thimbleby, H.: User interface design with matrix algebra. ACM Trans. Comput.-Hum. Interact. 11(2), 181–236 (2004)CrossRefGoogle Scholar
  174. 174.
    Sommerville, I.: Software Engineering, 8th edn. Addison-Wesley, Reading (2007)zbMATHGoogle Scholar
  175. 175.
    Stanford Encyclopedia of Philosophy: Emergent Properties (last accessed 2008-09-21),
  176. 176.
    Holland, J.H.: Adaptation in Natural and Artificial Systems, 2nd edn. MIT Press, Cambridge (1992)Google Scholar
  177. 177.
    Bedau, M.A., Humphreys, P. (eds.): Emergence: Contemporary Readings in Philosophy and Science. MIT Press, Cambridge (2008)Google Scholar
  178. 178.
    Gros, C.: Complex and Adaptive Dynamical Systems: A Promer. Springer Complexity. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  179. 179.
    Hirsch, M.W., Smale, S., Devaney, R.L.: Differential Equations, Dynamical Systems & an Introduction to Chaos. Pure and Applied Mathematics, vol. 60. Elsevier, Amsterdam (2004)zbMATHGoogle Scholar
  180. 180.
    Nicolis, G., Nicolis, C.: Foundations of Complex Systems: Nonlinear Dynamics, Statistical Physics, Information and Prediction. World Scientific, Singapore (2007)zbMATHCrossRefGoogle Scholar
  181. 181.
    Hirsch, D., Kramer, J., Magee, J., Uchitel, S.: Modes for software architectures. In: Gruhn, V., Oquendo, F. (eds.) EWSA 2006. LNCS, vol. 4344. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  182. 182.
    Laird, J.E.: Extending the Soar Cognitive Architecture. In: Wang, P., Goertzel, B., Franklin, S. (eds.) Proceedings of the First Artificial General Intelligence Conference. Frontiers in Artificial Intelligence and Applications, vol. 171 (February 2008)Google Scholar
  183. 183.
    Santa Fe Institute: Web Site (last accessed 2008-09-20),
  184. 184.
    Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  185. 185.
    Staab, S., Studer, R. (eds.): Handbook on Ontologies. International Handbooks on Information Systems. Springer, Heidelberg (2004)zbMATHGoogle Scholar
  186. 186.
    Turner, R.M.: Adaptive Reasoning for Real-World Problems: A Schema-Based Approach. Lawrence Erlbaum Associates, Mahwah (1994)Google Scholar
  187. 187.
    Bishop, C.M.: Pattern Recognition and Machine Learning (Information Science and Statistics). Springer, Heidelberg (2006)zbMATHGoogle Scholar
  188. 188.
    Weber, W.: Ambient intelligence: industrial research on a visionary concept. In: ISLPED 2003: Proceedings of the 2003 international symposium on Low power electronics and design, pp. 247–251. ACM, New York (2003)Google Scholar
  189. 189.
    Babaoglu, O., Jelasity, M., Montresor, A., Fetzer, C., Leonardi, S., van Moorsel, A., van Steen, M.: Self-star Properties in Complex Information Systems: Conceptual and Practical Foundations. LNCS. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  190. 190.
    Cantrill, B.: Hidden in plain sight. Queue 4(1), 26–36 (2006)CrossRefGoogle Scholar
  191. 191.
    Patil, S., de Veciana, G.: Managing resources and quality of service in heterogeneous wireless systems exploiting opportunism. IEEE/ACM Trans. Netw. 15(5), 1046–1058 (2007)CrossRefGoogle Scholar
  192. 192.
    Lorenz, D.H., Orda, A., Raz, D., Shavitt, Y.: Efficient qos partition and routing of unicast and multicast. IEEE/ACM Trans. Netw. 14(6), 1336–1347 (2006)CrossRefGoogle Scholar
  193. 193.
    Movsichoff, B.A., Lagoa, C.M., Che, H.: End-to-end optimal algorithms for integrated qos, traffic engineering, and failure recovery. IEEE/ACM Trans. Netw. 15(4), 813–823 (2007)CrossRefGoogle Scholar
  194. 194.
    Xue, G., Sen, A., Zhang, W., Tang, J., Thulasiraman, K.: Finding a path subject to many additive qos constraints. IEEE/ACM Trans. Netw. 15(1), 201–211 (2007)CrossRefGoogle Scholar
  195. 195.
    Hirsch, D., Tuosto, E.: Coordinating application level QoS with SHReQ. Journal of Software and Systems Modelling (to appear, 2006)Google Scholar
  196. 196.
    Hirsch, D., Tuosto, E.: SHReQ: A framework for coordinating application level QoS. In: Bernhard, K., Bernhard, B. (eds.) Proceedings of SEFM 2005, 3rd IEEE International Conference on Software Engineering and Formal Methods, pp. 425–434. IEEE, Los Alamitos (2005)Google Scholar
  197. 197.
    Allman, E.: Complying with compliance. Queue 4(7), 18–21 (2006)CrossRefGoogle Scholar
  198. 198.
    Cannon, J.C., Byers, M.: Compliance deconstructed. Queue 4(7), 30–37 (2006)CrossRefGoogle Scholar
  199. 199.
    Buscemi, M., Montanari, U.: Cc-pi: A constraint-based language for specifying service level agreements. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 18–32. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  200. 200.
    Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2008)Google Scholar
  201. 201.
    Schneier, B.: Secrets and Lies—Digital Security in a Networked World. John Wiley & Sons, Inc., Chichester (2000)Google Scholar
  202. 202.
    Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Inc., Chichester (2003)zbMATHGoogle Scholar
  203. 203.
    Cymru, T.: Cybercrime: an epidemic. Queue 4(9), 24–35 (2006)CrossRefGoogle Scholar
  204. 204.
    Geer, D.E.: Playing for keeps. Queue 4(9), 42–48 (2006)CrossRefGoogle Scholar
  205. 205.
    Kaufman, C., Perlman, R., Speciner, M.: Network security: private communication in a public world, 2nd edn. Prentice-Hall, Inc., Upper Saddle River (2002)Google Scholar
  206. 206.
    Neville-Neil, G.V.: Building secure web applications. Queue 5(5), 22–26 (2007)CrossRefGoogle Scholar
  207. 207.
    Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv. 39(1), 3 (2007)CrossRefGoogle Scholar
  208. 208.
    Kolan, P., Dantu, R.: Socio-technical defense against voice spamming. ACM Trans. Auton. Adapt. Syst. 2(1), 2 (2007)CrossRefGoogle Scholar
  209. 209.
    Shyu, M.L., Quirino, T., Xie, Z., Chen, S.C., Chang, L.: Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems. ACM Trans. Auton. Adapt. Syst. 2(3), 9 (2007)CrossRefGoogle Scholar
  210. 210.
    Merwe, J.V.D., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput. Surv. 39(1), 1 (2007)CrossRefGoogle Scholar
  211. 211.
    Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)CrossRefGoogle Scholar
  212. 212.
    Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)CrossRefGoogle Scholar
  213. 213.
    Zhang, G., Baumeister, H., Koch, N., Knapp, A.: Aspect-Oriented Modeling of Access Control in Web Applications. In: Proc. 6th Int. Wsh. Aspect Oriented Modeling (WAOM 2005), Chicago (2005)Google Scholar
  214. 214.
    Bhatti, R., Bertino, E., Ghafoor, A.: An integrated approach to federated identity and privilege management in open systems. Commun. ACM 50(2), 81–87 (2007)CrossRefGoogle Scholar
  215. 215.
    Geer, D.E.: The evolution of security. Queue 5(3), 30–35 (2007)CrossRefGoogle Scholar
  216. 216.
    Boyle, M., Greenberg, S.: The language of privacy: Learning from video media space analysis and design. ACM Trans. Comput.-Hum. Interact. 12(2), 328–370 (2005)CrossRefGoogle Scholar
  217. 217.
    Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system (February 2001) (last accessed 2008-01-19),
  218. 218.
    Drepper, U.: Security enhancements in red hat enterprise linux (beside selinux) (December 2005) (last accessed 2008-01-19),
  219. 219.
    Ford, R.: Open vs. closed: which source is more secure? Queue 5(1), 32–38 (2007)CrossRefGoogle Scholar
  220. 220.
    Hoepman, J.H., Jacobs, B.: Increased security through open source. Commun. ACM 50(1), 79–83 (2007)CrossRefGoogle Scholar
  221. 221.
    Thayer, R.H.: Software system engineering: A tutorial. IEEE Computer 35(4), 68–73 (2002)CrossRefGoogle Scholar
  222. 222.
    White, S., Alford, M.W., Holtzman, J., Kuehl, C.S., McCay, B., Oliver, D., Owens, D., Tully, C., Willey, A.: Systems engineering of computer-based systems, state of practice working group. IEEE Computer 26(11), 54–65 (1993)CrossRefGoogle Scholar
  223. 223.
    IEEE: Std. 1220-1998. Standard for Application and Management of the System Engineering Process. IEEE Press, Piscataway, N.J (1998)Google Scholar
  224. 224.
    George, W., Beeler, J., Gardner, D.: A requirements primer. Queue 4(7), 22–26 (2006)CrossRefGoogle Scholar
  225. 225.
    Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005, vol. 3655, pp. 237–272. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  226. 226.
    Donzelli, P., Basili, V.R.: A practical framework for eliciting and modeling system dependability requirements: Experience from the nasa high dependability computing project. Journal of Systems and Software 79(1), 107–119 (2006)CrossRefGoogle Scholar
  227. 227.
    Cantor, M., Roose, G.: Hardware/software codevelopment using a model-driven systems development (mdsd) approach. IBM developerWorks (December 2005) (last accessed 2008-01-20),
  228. 228.
    Cantor, M., Roose, G.: Hardware/software codevelopment using a model-driven systems development (mdsd) approach—part ii: Illustrating the solution. IBM developerWorks (Febuary 2006) (last accessed 2008-01-20),
  229. 229.
    Unrau, R.C.: Development techniques for using simulation to remove risk in software/hardware integration (2008) (last accessed 2008-01-20),
  230. 230.
    Robinson, W.N., Pawlowski, S.D., Volkov, V.: Requirements interaction management. ACM Comput. Surv. 35(2), 132–190 (2003)CrossRefGoogle Scholar
  231. 231.
    Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language User Guide, 2nd edn. Addison-Wesley, Reading (2005)Google Scholar
  232. 232.
    Mellor, S.J., Kendall, S., Uhl, A., Weise, D.: MDA Distilled. Addison Wesley Longman Publishing Co., Inc., Redwood City (2004)Google Scholar
  233. 233.
    Object Management Group: Model Driven Architecture (OMG) (Last visited, June 2008),
  234. 234.
    Paige, R.F., Brooke, P.J., Ostroff, J.S.: Metamodel-based model conformance and multiview consistency checking. ACM Trans. Softw. Eng. Methodol. 16(3), 11 (2007)CrossRefGoogle Scholar
  235. 235.
    Beck, K.: Extreme Programming Explained—Embracing Change. Addison-Wesley Professional, Reading (2003)Google Scholar
  236. 236.
    Cockburn, A.: Agile Software Development—The Cooperative Game, 2nd edn. Addison-Wesley, Reading (2006)Google Scholar
  237. 237.
    Highsmith, J.: Agile Software Development Ecosystems. Addison-Wesley, Reading (2003)Google Scholar
  238. 238.
    Nerur, S., Balijepally, V.: Theoretical reflections on agile development methodologies. Commun. ACM 50(3), 79–83 (2007)CrossRefGoogle Scholar
  239. 239.
    Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. The SEI Series in Software Engineering. Addison-Wesley Professional, Reading (2001)Google Scholar
  240. 240.
    Czarnecki, K., Eisenecker, U.: Generative Programming: Methods, Tools and Applications. Addison-Wesley Professional, Reading (2000)Google Scholar
  241. 241.
    Greenfield, J., Short, K.: Software Factories: Assembling Applications with Patterns, Frameworks, Models and Tools. Wiley, Chichester (2004)Google Scholar
  242. 242.
    Evans, E.: Domain-Driven Design: Tackling Complexity in the Heart of Software. Addison-Wesley Professional, Reading (2004)Google Scholar
  243. 243.
    Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Longman, Amsterdam (1995)zbMATHGoogle Scholar
  244. 244.
    Fowler, M.: Patterns of Enterprise Application Architecture. Addison-Wesley Longman, Amsterdam (2002)Google Scholar
  245. 245.
    Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., Stal, M., Sommerlad, P., Stal, M.: Pattern-Oriented Software Architecture. A System of Patterns, vol. 1. John Wiley & Sons, Chichester (1996)zbMATHGoogle Scholar
  246. 246.
    Schmidt, D., Stal, M., Rohnert, H., Buschmann, F.: Pattern-Oriented Software Architecture. Patterns for Concurrent and Networked Objects, vol. 2. John Wiley & Sons, Chichester (2000)zbMATHGoogle Scholar
  247. 247.
    Kircher, M., Jain, P.: Pattern-Oriented Software Architecture. Patterns for Resource Management, vol. 3. Wiley, Chichester (2004)Google Scholar
  248. 248.
    Buschmann, F., Henney, K., Schmidt, D.C.: Pattern-Oriented Software Architecture. A Pattern Language for Distributed Computing, vol. 4. Wiley, Chichester (2007)Google Scholar
  249. 249.
    Buschmann, F., Henney, K., Schmidt, D.C.: Pattern Oriented Software Architecture. On Patterns and Pattern Languages, vol. 5. Wiley, Chichester (2007)Google Scholar
  250. 250.
    Gay, D., Levis, P., Culler, D.: Software design patterns for tinyos. Trans. on Embedded Computing Sys. 6(4), 22 (2007)CrossRefGoogle Scholar
  251. 251.
    Binder, R.: Testing Object-Oriented Systems: Models, Patterns and Tools. Addison-Wesley Professional, Reading (2000)Google Scholar
  252. 252.
    Rothermel, G., Elbaum, S., Malishevsky, A.G., Kallakuri, P., Qiu, X.: On test suite composition and cost-effective regression testing. ACM Trans. Softw. Eng. Methodol. 13(3), 277–331 (2004)CrossRefGoogle Scholar
  253. 253.
    Kaufmann, M., Manolis, P., Moore, J.S.: Computer-Aided Reasoning: An Approach. Kluwer Academic Publishers, Dordrecht (2000)Google Scholar
  254. 254.
    Owre, S., Rushby, J.M., Shankar, N.: PVS: A prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS (LNAI), vol. 607, pp. 748–752. Springer, Heidelberg (1992)Google Scholar
  255. 255.
    McDonald, J., Anton, J.: Specware - producing software correct by construction (2001)Google Scholar
  256. 256.
    Bertot, Y., Castéran, P., Huet, G., Paulin-Mohring, C.: Interactive Theorem Proving and Program Development. Springer, Heidelberg (2004)zbMATHCrossRefGoogle Scholar
  257. 257.
    Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle/HOL: A Proof Assistant for Higher-Order Logic. Springer, Heidelberg (2002)zbMATHCrossRefGoogle Scholar
  258. 258.
    Russinoff, D., Kaufmann, M., Smith, E., Summers, R.: Formal verification of floating-point rtl at amd using the acl2 theorem prover. In: Simonov, N. (ed.) Proceedings of the 17th IMACS World Congress on Scientific Computing (July 2005)Google Scholar
  259. 259.
    Holzmann, G.J.: The Spin Model Checker: Primer and Reference Manual. Addison-Wesley Professional, Reading (2004)Google Scholar
  260. 260.
    Spin: Web site of the SPIN Model Checker (2008) (last visited: 2008-01-24),
  261. 261.
    Edmund, M., Clarke, O.G., Peled, D.A.: Model Checking. MIT Press, Cambridge (2000)Google Scholar
  262. 262.
    Henzinger, T., Jhala, R., Majumdar, R., Sutre, G.: Software verification with blast. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003, vol. 2648, pp. 235–239. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  263. 263.
    Fraser, G., Wotawa, F.: Improving model-checkers for software testing. qsic 0, 25–31 (2007)Google Scholar
  264. 264.
    Fraser, G., Wotawa, F.: Using ltl rewriting to improve the performance of model-checker based test-case generation. In: A-MOST, pp. 64–74. ACM, New York (2007)CrossRefGoogle Scholar
  265. 265.
    Fraser, G., Wotawa, F.: Redundancy based test-suite reduction. In: Dwyer, M.B., Lopes, A. (eds.) FASE 2007. LNCS, vol. 4422, pp. 291–305. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  266. 266.
    Ren, S., Yu, Y., Chen, N., Tsai, J.J.P., Kwiat, K.: The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems. ACM Trans. Auton. Adapt. Syst. 2(3), 10 (2007)CrossRefGoogle Scholar
  267. 267.
    Papadopoulos, P., Bruno, G., Katz, M.: Beyond beowulf clusters. Queue 5(3), 36–43 (2007)CrossRefGoogle Scholar
  268. 268.
    Erl, T.: Service-Oriented Architecture—Concepts, Technology and Design. Prentice Hall Service-Oriented Computing Series. Prentice-Hall, Englewood Cliffs (2005)Google Scholar
  269. 269.
    Edwards, D., Simmons, S., Wilde, N.: An approach to feature location in distributed systems. Journal of Systems and Software 79(1), 57–68 (2006)CrossRefGoogle Scholar
  270. 270.
    Babaoglu, O., Canright, G., Deutsch, A., Caro, G.A.D., Ducatelle, F., Gambardella, L.M., Ganguly, N., Jelasity, M., Montemanni, R., Montresor, A., Urnes, T.: Design patterns from biology for distributed computing. ACM Trans. Auton. Adapt. Syst. 1(1), 26–66 (2006)CrossRefGoogle Scholar
  271. 271.
    Banâtre, J.P., Fradet, P., Radenac, Y.: A generalized higher-order chemical computation model. Electr. Notes Theor. Comput. Sci. 135(3), 3–13 (2006)zbMATHCrossRefGoogle Scholar
  272. 272.
    Agha, G.: Computing in pervasive cyberspace. Commun. ACM 51(1), 68–70 (2008)CrossRefGoogle Scholar
  273. 273.
    Agha, G.: Actors: a model of concurrent computation in distributed systems. MIT Press, Cambridge (1986)Google Scholar
  274. 274.
    Agha, G.A., Mason, I.A., Smith, S.F., Talcott, C.L.: A foundation for actor computation. J. Funct. Program. 7(1), 1–72 (1997)MathSciNetzbMATHCrossRefGoogle Scholar
  275. 275.
    Wooldridge, M.: An introduction to multi-agent systems. J. Artificial Societies and Social Simulation 7(3) (2004)Google Scholar
  276. 276.
    Durfee, E.H., Yokoo, M., Huhns, M.N., Shehory, O. (eds.): 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, IFAAMAS, May 14-18 (2007)Google Scholar
  277. 277.
    Talcott, C.L.: A formal framework for interactive agents. Electron. Notes Theor. Comput. Sci. 203(3), 95–106 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  278. 278.
    Poslad, S.: Specifying protocols for multi-agent systems interaction. ACM Trans. Auton. Adapt. Syst. 2(4), 15 (2007)CrossRefGoogle Scholar
  279. 279.
    Penserini, L., Perini, A., Susi, A., Mylopoulos, J.: High variability design for software agents: Extending tropos. ACM Trans. Auton. Adapt. Syst. 2(4), 16 (2007)CrossRefGoogle Scholar
  280. 280.
    Giorgini, P., Mouratidis, H., Zannone, N.: Modelling Security and Trust with Secure Tropos. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Vision. Idea Group (2007)Google Scholar
  281. 281.
    Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services: Concepts, Architectures and Applications. Springer, Heidelberg (2004)zbMATHCrossRefGoogle Scholar
  282. 282.
    Paurobally, S., Tamma, V., Wooldrdige, M.: A framework for web service negotiation. ACM Trans. Auton. Adapt. Syst. 2(4), 14 (2007)CrossRefGoogle Scholar
  283. 283.
    Busi, N., Gorrieri, R., Guidi, C., Lucchi, R., Zavattaro, G.: Choreography and Orchestration: a synergic approach for system design. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005, vol. 3826, pp. 228–240. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  284. 284.
    Foster, H., Uchitel, S., Kramer, J., Magee, J.: Ws-engineer: A tool for model-based verification of web service compositions and choreography. In: IEEE International Conference on Software Engineering (ICSE 2006), Shanghai, China (May 2006)Google Scholar
  285. 285.
    van Breugel, F., Koshkina, M.: Models and verification of BPEL (2006),
  286. 286.
    Project, N.: Web-site of the NESSI technology platform (2007),
  287. 287.
    BIONETS project: Web site of the BIONETS project (last accessed: 2008-06-19),
  288. 288.
    CASCADAS project: Web site of the CASCADAS project (last accessed: 2008-06-19),
  289. 289.
    ONTOGRID project: Web site of the ONTOGRID project (last accessed: 2008-06-19),
  290. 290.
    SIMS project: Web site of the SIMS project (last accessed: 2008-06-19),
  291. 291.
    SODIUM project: Web site of the SODIUM project (last accessed: 2008-06-19),
  292. 292.
    PLASTIC project: Web site of the PLASTIC project (last accessed: 2008-06-19),
  293. 293.
    SENSORIA: Software Engineering for Service-Oriented Overlay Computers,
  294. 294.
    ONE project: Web site of the ONE project (last accessed: 2008-06-19),
  295. 295.
    ASTRO project: Web site of the ASTRO project (last accessed: 2008-06-19),
  296. 296.
    AOSD project: Web site of the AOSD project (last accessed: 2008-06-19),
  297. 297.
    MUSIC project: Web site of the MUSIC project (last accessed: 2008-06-19),
  298. 298.
    WSDIAMOND project: Web site of the WS-DIAMOND project (last accessed: 2008-06-19),
  299. 299.
    SECSE project: Web site of the SECSE project (last accessed: 2008-06-19),
  300. 300.
    INFRAWEBS project: Web site of the INFRAWEBS project (last accessed: 2008-06-19),
  301. 301.
    DIP project: Web site of the DIP project (last accessed: 2008-06-19),
  302. 302.
    AMIGO project: Web site of the AMIGO project (last accessed: 2008-06-19),
  303. 303.
    WS2 project: Web site of the WS2 project (last accessed: 2008-06-19),
  304. 304.
    ESFORS project: Web site of the ESFORS project (last accessed: 2008-06-19),
  305. 305.
    S3MS project: Web site of the S3MS project (last accessed: 2008-06-19),
  306. 306.
    TRUSTCOM project: Web site of the TRUSTCOM project (last accessed: 2008-06-19),
  307. 307.
    ATHENA project: Web site of the ATHENA project,
  308. 308.
    DEDISYS project: Web site of the DEDISYS project (last accessed: 2008-06-19),
  309. 309.
    di Nitto, E., Traverso, P., Sassen, A.M., Zwegers, A. (eds.): At your service: An overview of results of projects in the field of service engineering of the IST programme. MIT Press, Cambridge (2008)Google Scholar
  310. 310.
    Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C.V., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997, vol. 1241, pp. 220–242. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  311. 311.
    Elrad, T., Filman, R.E., Bader, A.: Aspect-oriented programming: Introduction. Commun. ACM 44(10), 29–32 (2001)CrossRefGoogle Scholar
  312. 312.
    Elrad, T., Aksit, M., Kiczales, G., Lieberherr, K., Ossher, H.: Discussing aspects of aop. Commun. ACM 44(10), 33–38 (2001)CrossRefGoogle Scholar
  313. 313.
    Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001, vol. 2072, pp. 327–353. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  314. 314.
    Lieberherr, K., Orleans, D., Ovlinger, J.: Aspect-oriented programming with adaptive methods. Commun. ACM 44(10), 39–41 (2001)CrossRefGoogle Scholar
  315. 315.
    Bergmans, L., Aksit, M.: Composing crosscutting concerns using composition filters. Commun. ACM 44(10), 51–57 (2001)CrossRefGoogle Scholar
  316. 316.
    Aksit, M., Bergmans, L., Vural, S.: An object-oriented language-database integration model: The composition-filters approach. In: Lehrmann Madsen, O. (ed.) ECOOP 1992, vol. 615, pp. 372–395. Springer, Heidelberg (1992)CrossRefGoogle Scholar
  317. 317.
    Ossher, H., Tarr, P.: Using multidimensional separation of concerns to (re)shape evolving software. Commun. ACM 44(10), 43–50 (2001)CrossRefGoogle Scholar
  318. 318.
    Tarr, P., Ossher, H., Harrison, W., Stanley, M., Sutton, J.: N degrees of separation: multi-dimensional separation of concerns. In: ICSE 1999: Proceedings of the 21st international conference on Software engineering, pp. 107–119. IEEE Computer Society Press, Los Alamitos (1999)Google Scholar
  319. 319.
    Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.): MODELS 2007. LNCS, vol. 4735. Springer, Heidelberg (2007)Google Scholar
  320. 320.
    Smith, B.C.: Reflection and semantics in lisp. In: POPL 1984: Proceedings of the 11th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pp. 23–35. ACM, New York (1984)Google Scholar
  321. 321.
    Maes, P.: Concepts and experiments in computational reflection. SIGPLAN Not. 22(12), 147–155 (1987)CrossRefGoogle Scholar
  322. 322.
    Kiczales, G., des Rivières, J., Bobrow, D.G.: The Art of the Metaobject Protocol. MIT Press, Cambridge (1991)Google Scholar
  323. 323.
    Sullivan, G.T.: Aspect-oriented programming using reflection and metaobject protocols. Commun. ACM 44(10), 95–97 (2001)CrossRefGoogle Scholar
  324. 324.
    Sullivan, G.T.: Dynamic partial evaluation. In: Danvy, O., Filinski, A. (eds.) PADO 2001, vol. 2053, pp. 238–256. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  325. 325.
    Costanza, P., Hirschfeld, R.: Reflective layer activation in contextl. In: SAC 2007, pp. 1280–1285. ACM, New York (2007)CrossRefGoogle Scholar
  326. 326.
    Costanza, P., Hirschfeld, R.: Language constructs for context-oriented programming: an overview of contextl. In: DLS 2005: Proceedings of the 2005 symposium on Dynamic languages, pp. 1–10. ACM, New York (2005)Google Scholar
  327. 327.
    Krishnamurthi, S., Fisler, K.: Foundations of incremental aspect model-checking. ACM Trans. Softw. Eng. Methodol. 16(2), 7 (2007)CrossRefGoogle Scholar
  328. 328.
    Misra, A., Karsai, G., Sztipanovits, J.: Model-integrated development of complex applications. In: SAST 1997: Proceedings of the 5th International Symposium on Assessment of Software Tools (SAST 1997), Washington, DC, USA, p. 14. IEEE Computer Society Press, Los Alamitos (1997)Google Scholar
  329. 329.
    Karsai, G., Ledeczi, A., Neema, S., Sztipanovits, J.: The model-integrated computing toolsuite: Metaprogrammable tools for embedded control system design. In: Proc. of the IEEE Joint Conference CCA, ISIC and CACSD, Munich, Germany, pp. 50–55 (October 2006)Google Scholar
  330. 330.
    Finkelstein, A., Kramer, J., Nuseibeh, B., Finkelstein, L., Goedicke, M.: Viewpoints: a framework for integrating multiple perspectives in system development. International Journal of Software Engineering and Knowledge Engineering 2(1), 31–57 (1992)CrossRefGoogle Scholar
  331. 331.
    Finkelstein, A.: Relating viewpoints. In: ACM SIGSOFT 1996 Workshop - Viewpoints 1996, p. 157. ACM Press, New York (1996)Google Scholar
  332. 332.
    Tekinerdogan, B., Hofmann, C., Aksit, M.: Modeling traceability of concerns in architectural views. In: AOM 2007: Proceedings of the 10th international workshop on Aspect-oriented modeling, pp. 49–56. ACM, New York (2007)Google Scholar
  333. 333.
    Odersky, M., Spoon, L., Venners, B.: Programming in Scala: A comprehensive step-by-step guide. PrePrint Edition Version 4. Artima Developer (August 2008),
  334. 334.
    Research, M.: F#: A succinct, type-inferred, expressive, efficient functional and object-oriented language for the .net platform (2008) (last accessed: 2008-09-22),
  335. 335.
    Mernik, M., Heering, J., Sloane, A.M.: When and how to develop domain-specific languages. ACM Comput. Surv. 37(4), 316–344 (2005)CrossRefGoogle Scholar
  336. 336.
    Robillard, M.P., Murphy, G.C.: Representing concerns in source code. ACM Trans. Softw. Eng. Methodol. 16(1), 3 (2007)CrossRefGoogle Scholar
  337. 337.
    Bacon, D.F.: Realtime garbage collection. Queue 5(1), 40–49 (2007)CrossRefGoogle Scholar
  338. 338.
    Ashley-Rollman, M.P., De Rosa, M., Srinivasa, S.S., Pillai, P., Goldstein, S.C., Campbell, J.D.: Declarative programming for modular robots. In: Workshop on Self-Reconfigurable Robots/Systems and Applications at IROS 2007 (October 2007)Google Scholar
  339. 339.
    Ashley-Rollman, M.P., Goldstein, S.C., Lee, P., Mowry, T.C., Pillai, P.: Meld: A declarative approach to programming ensembles. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems IROS 2007 (October 2007)Google Scholar
  340. 340.
    Armstrong, J., Virding, R., Wikström, C., Williams, M.: Concurrent Programming in Erlang, 2nd edn. Prentice Hall, Englewood Cliffs (1996)zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Matthias Hölzl
    • 1
  • Axel Rauschmayer
    • 1
  • Martin Wirsing
    • 1
  1. 1.Institut für InformatikLudwig-Maximilians-Universität MünchenGermany

Personalised recommendations