Essays about: "conformance"
Showing result 1 - 5 of 49 essays containing the word conformance.
-
1. Method and Tooling for Automated Conformance Checking between Architecture - design and Implementation
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Many software and/or automotive companies use UML models to write the requirements and later they are implemented by coding. Involving multiple engineers from different teams makes the whole process complex and cumbersome. READ MORE
-
2. A comparative study on anapproach to print Industrial Toolsvia Additive Manufacturing for Volume Production from Technical, Economic, and Environmental aspects
University essay from KTH/ProduktionsutvecklingAbstract : The thesis explores a path to use Additive Manufacturing as an approach for volume production of Industrial Technique Business Area Tools, addressing the challenges of manufacturing complexity, low volume demand, and quality control for both Atlas Copco Industrial Technique industrial tools (Tool 1 & Tool 2). This study is done in cooperation with Atlas Copco Industrial Technique, comparing the technological, economic, and environmental performance of AM versus the current manufacturing approach from a round bar. READ MORE
-
3. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols
University essay from Uppsala universitet/DatalogiAbstract : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. READ MORE
-
4. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE
-
5. Detection of performance anomalies through Process Mining
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Anomaly detection in computer systems operating within complex environments,such as cyber-physical systems (CPS), has become increasingly popularduring these last years due to useful insights this process can provide aboutcomputer systems’ health conditions against known reference nominal states.As performance anomalies lead degraded service delivery, and, eventually,system-wide failures, promptly detecting such anomalies may trigger timelyrecovery responses. READ MORE