[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3419804.3421449acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Facilitating the Co-Evolution of Semantic Descriptions in Standards and Models

Published: 19 October 2020 Publication History

Editorial Notes

The authors have requested minor, non-substantive changes to the VoR and, in accordance with ACM policies, a Corrected VoR was published on October 26, 2020. For reference purposes the VoR may still be accessed via the Supplemental Material section on this page.

Abstract

One of the main activities of the Interfaces and Architecture (IFA) working group within the Network Function Virtualisation (NFV) Industry Specification Group (ISG) at the European Telecommunications Standards Institute (ETSI) is the specification of requirements and information modelling of NFV descriptors and artefacts. The information elements are spread across 11 different NFV-IFA specifications covering the scope of functionality of the individual functional blocks and reference points.
Part of the work of the NFV-IFA working group is dedicated to producing a unified Information Model (IM) for NFV providing a consolidated view based on the different specifications. The IM has been helpful for the identification of gaps and inconsistencies in the specifications and in implementations of the specifications.
With the growing size of the IM and the corresponding specifications and the rapid release cycles resulting from the intense work within the ISG, the IM plays an important role in helping to ensure that the specifications are consistent.
Previous work outlined the foundations for facilitating the co-evolution of models and standards based on the NFV IM and models extracted from the related standardised specifications. It defined a methodology for consistency checking and alignment of the IM and the related specifications focusing on structural aspects.
This article refines the methodology to address semantic descriptions as well as further aspects related to the co-evolution of standards and models. We also report on our experiences with the application of a prototypical implementation of the methodology during the continued alignment and maintenance of the information model and the related standardised specifications with the NFV-IFA working group and how the feedback from the working group provided insights on how to refine the methodology even further.

Supplementary Material

3421449-VoR (3421449-vor.pdf)
Version of Record for "Facilitating the Co-Evolution of Semantic Descriptions in Standards and Models" by Makedonski et al., Proceedings of the 12th System Analysis and Modelling Conference (SAM '20).

References

[1]
Manar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, and Andrew Stevenson. 2012. Near-miss model clone detection for simulink models. In Proceedings of the 6th International Workshop on Software Clones (IWSC '12). IEEE Press, Zurich, Switzerland, 78--79.
[2]
Antoniol, Canfora, Casazza, and De Lucia. 2000. Information retrieval models for recovering traceability links between code and documentation. In Proceedings 2000 International Conference on Software Maintenance. 40--49. https://doi.org/10.1109/ICSM.2000.883003
[3]
M. Balint, T. Girba, and R. Marinescu. 2006. How Developers Copy. In Program Comprehension, 2006. ICPC 2006. 14th IEEE International Conference on. 56--68. https://doi.org/10.1109/ICPC.2006.25
[4]
I.D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. 1998. Clone detection using abstract syntax trees. In, International Conference on Software Maintenance, 1998. Proceedings. 368--377. https://doi.org/10.1109/ICSM.1998.738528
[5]
L. Berardinelli, S. Biffl, E. Maetzler, T. Mayerhofer, and M. Wimmer. 2015. Model-basedco-evolution of production systems and their libraries with AutomationML. In 2015 IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA). 1--8. https://doi.org/10.1109/ETFA.2015.7301483
[6]
Markus Borg, Per Runeson, and Anders ArdÃű. 2014. Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability. Empirical Software Engineering 19, 6 (Dec. 2014), 1565--1616. https://doi.org/10.1007/s10664-013-9255-y
[7]
J. Cleland-Huang, J. H. Hayes, and J. M. Domel. 2009. Model-based traceability. In 2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering. 6--10. https://doi.org/10.1109/TEFSE.2009.5069575
[8]
J. Cleland-Huang, R. Settimi, E. Romanova, B. Berenbach, and S. Clark. 2007. Best Practices for Automated Traceability. Computer 40, 6 (2007), 27--35. https://doi.org/10.1109/MC.2007.195
[9]
J. David, M. Koegel, H. Naughton, and J. Helming. 2009. Traceability ReARMed. In Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International, Vol. 1. 340--348. https://doi.org/10.1109/COMPSAC.2009.52
[10]
Florian Deissenboeck, Benjamin Hummel, Elmar Juergens, Michael Pfaehler, and Bernhard Schaetz. 2010. Model clone detection in practice. In Proceedings of the 4th International Workshop on Software Clones (IWSC '10). Association for Computing Machinery, Cape Town, South Africa, 57--64. https://doi.org/10.1145/1808901.1808909
[11]
Florian Deissenboeck, Benjamin Hummel, Elmar JÃijrgens, Bernhard SchÃd'tz, Stefan Wagner, Jean-FranÃğois Girard, and Stefan Teuchert. 2008. Clone detection in automotive model-based development. In Proceedings of the 30th international conference on Software engineering (ICSE '08). Association for Computing Machinery, Leipzig, Germany, 603--612. https://doi.org/10.1145/1368088.1368172
[12]
StÃl'phane Ducasse, Nicolas Anquetil, Muhammad Usman Bhatti, Andre Cavalcante Hora, Jannik Laval, and Tudor Girba. 2011. MSE and FAMIX 3.0: an Interex-change Format and Source Code Model Family. (Nov. 2011). http://hal.inria.fr/hal-00646884
[13]
B. Ens, D. Rea, R. Shpaner, H. Hemmati, J. E. Young, and P. Irani. 2014. ChronoTwigger: A Visual Analytics Tool for Understanding Source and Test Co-evolution. In 2014 Second IEEE Working Conference on Software Visualization. 117--126. https://doi.org/10.1109/VISSOFT.2014.28
[14]
I. Galvao and A. Goknil. 2007. Survey of Traceability Approaches in Model-Driven Engineering. In 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007). 313--313. https://doi.org/10.1109/EDOC.2007.42
[15]
O. C. Z. Gotel and C. W. Finkelstein. 1994. An analysis of the requirements traceability problem. In Proceedings of IEEE International Conference on Requirements Engineering. 94--101. https://doi.org/10.1109/ICRE.1994.292398
[16]
Benjamin Hummel, Elmar Juergens, and Daniela Steidl. 2011. Index-based model clone detection. In Proceedings of the 5th International Workshop on Software Clones (IWSC '11). Association for Computing Machinery, Waikiki, Honolulu, HI, USA, 21--27. https://doi.org/10.1145/1985404.1985409
[17]
Elmar Juergens, Florian Deissenboeck, Martin Feilkas, Benjamin Hummel, Bernhard Schaetz, Stefan Wagner, Christoph Domann, and Jonathan Streit. 2010. Can clone detection support quality assessments of requirements specifications?. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2 (ICSE '10). Association for Computing Machinery, Cape Town, South Africa, 79--88. https://doi.org/10.1145/1810295.1810308
[18]
Miryung Kim, Vibha Sazawal, and David Notkin. 2005. An empirical study of code clone genealogies. In Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE-13. Lisbon, Portugal, 187. https://doi.org/10.1145/1081706.1081737
[19]
J. Krinke. 2001. Identifying similar code with program dependence graphs. In Proceedings of the Eighth Working Conference on Reverse Engineering. 301--309. https://doi.org/10.1109/WCRE.2001.957835
[20]
Philip Makedonski and Jens Grabowski. 2019. Facilitating the Co-evolution of Standards and Models. In System Analysis and Modeling. Languages, Methods, and Tools for Industry 4.0, Pau Fonseca i Casas, Maria-Ribera Sancho, and Edel Sherratt (Eds.). Springer International Publishing, Cham, 219--232.
[21]
S. Maro, A. Anjorin, R. Wohlrab, and J. SteghÃűfer. 2016. Traceability maintenance: Factors and guidelines. In 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE). 414--425.
[22]
R. M. Parizi, S. P. Lee, and M. Dabbagh. 2014. Achievements and Challenges in State-of-the-Art Software Traceability Between Test and Code Artifacts. IEEE Transactions on Reliability 63, 4 (Dec. 2014), 913--926. https://doi.org/10.1109/TR.2014.2338254
[23]
Chanchal Kumar Roy and James R. Cordy. 2007. A Survey on Software Clone Detection Research. School of Computing TR 2007-541, Queen's University 115 (2007).
[24]
Stefan Winkler and Jens von Pilgrim. 2010. A survey of traceability in requirements engineering and model-driven development. Software & Systems Modeling 9, 4 (Sept. 2010), 529--565. https://doi.org/10.1007/s10270-009-0145-0
[25]
Liguo Yu. 2007. Understanding component co-evolution with a study on Linux. Empirical Software Engineering 12, 2 (April 2007), 123--141. https://doi.org/10.1007/s10664-006-9000-x
[26]
Yakun Zhang, Wensheng Dou, Jiaxin Zhu, Liang Xu, Zhiyong Zhou, Jun Wei, Dan Ye, and Bo Yang. 2020. Learning to detect table clones in spreadsheets. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020). Association for Computing Machinery, Virtual Event, USA, 528--540. https://doi.org/10.1145/3395363.3397384

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAM '20: Proceedings of the 12th System Analysis and Modelling Conference
October 2020
156 pages
ISBN:9781450381406
DOI:10.1145/3419804
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. duplication
  2. maintenance
  3. model evolution
  4. semantics
  5. standards
  6. traceability
  7. validation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • European Telecommunications Standards Institute (ETSI)

Conference

SAM '20
Sponsor:
SAM '20: 12th System Analysis and Modelling Conference
October 19 - 20, 2020
Virtual Event, Canada

Acceptance Rates

SAM '20 Paper Acceptance Rate 16 of 26 submissions, 62%;
Overall Acceptance Rate 36 of 59 submissions, 61%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 50
    Total Downloads
  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media