Despite much progress, developing a pervasive computing application remains a challenge because of a lack of conceptual frameworks and supporting tools. This challenge involves coping with heterogeneous devices, overcoming the intricacies of distributed systems technologies, working out an architecture for the application, and encoding it into a program. Moreover, testing pervasive computing applications is problematic because it requires acquiring, testing and interfacing a variety of software and hardware entities. This process can rapidly become costly and time-consuming when the target environment involves many entities.
This thesis proposes a tool-based methodology for developing and testing pervasive computing applications. Our methodology first provides the DiaSpec design language that allows to define a taxonomy of area-specific building-blocks, abstracting over their heterogeneity. This language also includes a layer to define the architecture of an application. Our tool suite includes a compiler that takes DiaSpec design artifacts as input and generates a programming framework that supports the implementation and testing stages.
To address the testing phase, we propose an approach and a tool integrated in our tool-based methodology, namely DiaSim. Our approach uses the testing support generated by DiaSpec to transparently test applications in a simulated physical environment. The simulation of an application is rendered graphically in a 2D visualization tool.
We combined DiaSim with a domain-specific language for describing physical environment phenomena as differential equations, allowing a physically-accurate testing. DiaSim has been used to simulate various pervasive computing systems in different application areas. Our simulation approach has also been applied to an avionics system, which demonstrates the generality of our parameterized simulation approach.
Designing An Android Sensor Subsystem and Solving Common Sensor ProblemsJen Costillo
An application developer-focused introduction to the underlying sensor system design considerations and their impact on your Android application. Common problems discussed and solved.
Designing An Android Sensor Subsystem and Solving Common Sensor ProblemsJen Costillo
An application developer-focused introduction to the underlying sensor system design considerations and their impact on your Android application. Common problems discussed and solved.
Architecture-Driven Programming for Sense/Compute/Control ApplicationsDamien Cassou
Software architectures have long been used to design the structure of a software and to impose constraints on the software implementation. Existing approaches are capable of formally verifying properties on these constraints at the design stage. However, few approaches verify that a given implementation conforms to the software architecture constraints, and even fewer use these constraints to guide developers during implementation.
In this presentation, we propose a generative approach to enforce the software architecture constraints during implementation. Toward this goal, we focus on a specific application area, Sense/Compute/Control applications, which are applications that interact with a physical or virtual environment. Our work is based on a domain-specific architectural pattern dedicated to SCC applications. The data-flow of this pattern is restricted by interaction constraints. For specifying such constraints, we propose a dedicated language of behavioral contracts, adapted to our architectural pattern. These behavioral contracts are used for automatically generating a dedicated programming framework. This framework enforces the conformance of the resulting implementation with the software architecture constraints and provides guidance to developers.
It is mandatory for every medicine or pharma packaging to have a unique serial code or UID. Project is to build a web application that will provide tracking capabilities for the UID for pharma packaging of drugs. The track feature (TRACK n trace) will track the UID of each package by using vision based scanners, RFIDs, etc. and store the data into a local server. The server will be synced daily with a global server (we are looking for cloud based hosting platforms such as Windows Azure or amazon web services). We have to build the trace functionality (Track n TRACE) by building a web interface where a person with the UID can trace the shipment.
We have to keep historical records for as long as 10 years and build logic on basis of the UID state. We have to provide the details from the database as in when was this package manufactured, when was it shipped, etc. If the UID entered is faulty for example; it wasn’t ever manufactured or if it is over its expiration date then we have to generate corresponding errors and also maintain a log of such entries and send notification to the admins with details of IP, Geography or where the error generated.
This talk aims to summarize the typical challenges one encounters in testing mobile applications. At the ThoughtWorks Pune office we have developed multiple mobile applications across various platforms (mobile web, hybrid apps, native apps, apps for tablets etc.). In this talk we will bring together lessons learnt around mobile testing. This talk was done by Vikrant Chauhan and Dubinsky De Soares
Presentation at Android Builders Summit 2012.
Based on the experience of working with ODM companies and SoC vendors, this session would discuss how to figure out the performance hotspot of certain Android devices and then improve in various areas including graphics and boot time. This session consists of the detailed components which seem to be independent from each other in traditional view. However, the situation changes a lot in Android system view since everything is coupled in a mass. Three frequently mentioned items in Android engineering are selected as the entry points: 2D/3D graphics, runtime, and boot time. Audience: Developers who work on Android system integration and platform enablement.
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs
Learn how you can enhance and extend your existing infrastructure to create an automated, end-to-end IT platform supporting on-demand middleware and application environments, application release pipelines, Continuous Delivery, Private/ hybrid development platform and PaaS and more.
Architecture-Driven Programming for Sense/Compute/Control ApplicationsDamien Cassou
Software architectures have long been used to design the structure of a software and to impose constraints on the software implementation. Existing approaches are capable of formally verifying properties on these constraints at the design stage. However, few approaches verify that a given implementation conforms to the software architecture constraints, and even fewer use these constraints to guide developers during implementation.
In this presentation, we propose a generative approach to enforce the software architecture constraints during implementation. Toward this goal, we focus on a specific application area, Sense/Compute/Control applications, which are applications that interact with a physical or virtual environment. Our work is based on a domain-specific architectural pattern dedicated to SCC applications. The data-flow of this pattern is restricted by interaction constraints. For specifying such constraints, we propose a dedicated language of behavioral contracts, adapted to our architectural pattern. These behavioral contracts are used for automatically generating a dedicated programming framework. This framework enforces the conformance of the resulting implementation with the software architecture constraints and provides guidance to developers.
It is mandatory for every medicine or pharma packaging to have a unique serial code or UID. Project is to build a web application that will provide tracking capabilities for the UID for pharma packaging of drugs. The track feature (TRACK n trace) will track the UID of each package by using vision based scanners, RFIDs, etc. and store the data into a local server. The server will be synced daily with a global server (we are looking for cloud based hosting platforms such as Windows Azure or amazon web services). We have to build the trace functionality (Track n TRACE) by building a web interface where a person with the UID can trace the shipment.
We have to keep historical records for as long as 10 years and build logic on basis of the UID state. We have to provide the details from the database as in when was this package manufactured, when was it shipped, etc. If the UID entered is faulty for example; it wasn’t ever manufactured or if it is over its expiration date then we have to generate corresponding errors and also maintain a log of such entries and send notification to the admins with details of IP, Geography or where the error generated.
This talk aims to summarize the typical challenges one encounters in testing mobile applications. At the ThoughtWorks Pune office we have developed multiple mobile applications across various platforms (mobile web, hybrid apps, native apps, apps for tablets etc.). In this talk we will bring together lessons learnt around mobile testing. This talk was done by Vikrant Chauhan and Dubinsky De Soares
Presentation at Android Builders Summit 2012.
Based on the experience of working with ODM companies and SoC vendors, this session would discuss how to figure out the performance hotspot of certain Android devices and then improve in various areas including graphics and boot time. This session consists of the detailed components which seem to be independent from each other in traditional view. However, the situation changes a lot in Android system view since everything is coupled in a mass. Three frequently mentioned items in Android engineering are selected as the entry points: 2D/3D graphics, runtime, and boot time. Audience: Developers who work on Android system integration and platform enablement.
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs
Learn how you can enhance and extend your existing infrastructure to create an automated, end-to-end IT platform supporting on-demand middleware and application environments, application release pipelines, Continuous Delivery, Private/ hybrid development platform and PaaS and more.
Dev ops for cross platform mobile modeveast 12Sanjeev Sharma
Mobile Apps are not stand alone applications running on a mobile device anymore. Apps today are complex systems with back-ends hosted on clouds, with application servers, databases, API calls to external systems, and of course a powerful app running on a mobile device. Mobile App development and deployment is further complicated with todays need for supporting multiple mobile devices, with multiple OSes, multiple versions of the OSes, multiple form factors and varied network, CPU, GPU and memory specs.
DevOps - the new and growing movement addresses these development and deployment challenges. The goal of DevOps is to align Dev and Ops by introducing a set of principles and practices such as continuous integration and continuous delivery. Mobile apps take the need for these practices up a level due to their inherent distributed nature. Multi-platform mobile apps need even more care in applying DevOps principles as there are multiple platforms to be targeted, each with its own requirements, quirks, and nuanced needs.
This talk will introduce attendees to the basic practices of DevOps and then take a look at the DevOps challenges specific to cross-platform Mobile apps and present Best Practices to address them.
Online performance modeling and analysis of message-passing parallel applicat...MOCA Platform
Although the evolution of hardware is improving at an incredible rate, the advances in
parallel software have been hampered for many reasons. Developing an efficient parallel
application is still not an easy task. Our thesis is that many performance problems and their reasons can be quickly located and explained with automated techniques that work on unmodified parallel applications. This work identifies main obstacles for such diagnosis and presents a two-step approach for addressing them. In this approach, the application is automatically modeled and diagnosed during its execution.
First, we introduce an online performance modeling technique that enables automated discovery of causal execution flows through communication and computational activities in message-passing parallel programs. Second, we present a systematic approach to online performance analysis. The automated
analysis uses online model to quickly identify the most important performance problems,
and correlate them with application source code. Our technique is able to discover causal
dependences between the problems, infer their root causes in some scenarios and explain
them to developers. In this work, we focus on diagnosing scientific MPI parallel applications and their communication and computational problems although the approach can be extended to support other classes of activities and programming models.
We have evaluated our approach on a variety of scientific parallel applications. In all scenarios, our online performance modeling technique proved effective for low-overhead capturing of program’s behavior and facilitated performance understanding. With our automated, model-based performance analysis approach, we were able to easily identify the most severe performance problems during application execution, and locate their root causes without previous knowledge of application internals.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Thesis defense
1. Developing and Testing
Pervasive Computing Applications:
A Tool-Based Methodology
Julien Bruneau
Supervisor: Charles Consel
Phoenix Research Group
INRIA Bordeaux
3. In our everyday life:
• Growing number of
networked entities
2
4. In our everyday life:
• Growing number of
networked entities
• Growing importance
of the digital world
Digital world
2
5. In our everyday life:
• Growing number of
networked entities
• Growing importance
of the digital world
Pervasive computing
has become a reality
Digital world
2
7. Actuators
Physical
environment
Application
! May impact people safety
ValidatingSensors
the application
behavior is necessary !!
4
8. Actuators
Physical
environment
Application
Sensors
Validation of the application behavior
• Verification
- Static analysis of the application code
5
9. Actuators
Physical
environment
Application
Sensors
Validation of the application behavior
• Verification Do not take into
account the
- Static analysis of the application code environment
5
10. Actuators
Physical
environment
Application
Sensors
Validation of the application behavior
• Verification
- Static analysis on the application
• Testing
- At deployment time
- Using simulation 6
11. Actuators
Physical
environment
Application
Sensors
Testing at deployment time: Simulation:
+ Accurate - May be inaccurate
- Time consuming + Fast
- Expensive + Inexpensive
- Not always possible 7
+ Simulation of any scenarios
30. Emulated Abstraction of the actions
Actuators provided by the actuators
Simulated
Physical
Environment
Application
Emulated
Sensors
Abstraction of the
information sensed
26 by the sensors
47. Emulated entities Simulated people Physical layout Physical properties
Simulation scenario
Emulated entities Physical layout
- Set of instances - Locations
- Location - Graphical representation
Simulated people Physical properties
- Properties - Evolution
- Behavior
42
48. actions
Simulated
Physical
Emulated
Environment
Entities
sources
Application
Evolution of the physical properties:
Defined with well-known Ordinary/Partial Differential Equations
43
49. Simulated environment
stimuli actions
Emulated
Entities
rces Application sources Approximated
physical model
lated Stimulus reads
ties Producers data
ons
Integration of a continuous model into our simulation model
Logs of
measurements
effects
+ Physically-accurate simulation
44
50. Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
Continuous model of the temperature in a building
The temperature of a room is influenced by:
- Heat transfer with neighbor areas
- HVAC systems
- Occupants 45
51. pants of room i is denoted Occupants(i). We only
additional parameter to incorporate this aspect of buil
Temperature Model j (W),
H Heat dissipation of occupant number
j
Thus, the final equation can be expressed as:
dTi 1 X Tk - Ti
=
dt Ci Rik
k2Neighbors(i)
1
+ ⇤ (Bh(i) ⇤ Pi - Bc(i) ⇤ Qi )
Ci
1 X
+ ⇤ Hj
Ci
j2Occupants(i)
Other heat sources, such as equipment, appliances, a
were neglected for simplicity but will be included at a l
46
52. pants of room i is denoted Occupants(i). We only
additional parameter to incorporate this aspect of buil
Temperature Model j (W),
H Heat dissipation of occupant number
j
Thus, the final equation can be expressed as:
dTi 1 X Tk - Ti
=
dt Ci Rik
k2Neighbors(i)
1
+ ⇤ (Bh(i) ⇤ Pi - Bc(i) ⇤ Qi )
Ci
1 X
+ ⇤ Hj
Ci
j2Occupants(i)
Heat transfer with neighbor areas
Other heat sources, such as equipment, appliances, a
were neglected for simplicity but will be included at a l
46
53. pants of room i is denoted Occupants(i). We only
additional parameter to incorporate this aspect of buil
Temperature Model j (W),
H Heat dissipation of occupant number
j
Thus, the final equation can be expressed as:
dTi 1 X Tk - Ti
=
dt Ci Rik
k2Neighbors(i)
1
+ ⇤ (Bh(i) ⇤ Pi - Bc(i) ⇤ Qi )
Ci
1 X
+ ⇤ Hj
Ci
j2Occupants(i)
HVAC
Other heat sources, such as equipment, appliances, a
were neglected for simplicity but will be included at a l
47
54. pants of room i is denoted Occupants(i). We only
additional parameter to incorporate this aspect of buil
Temperature Model j (W),
H Heat dissipation of occupant number
j
Thus, the final equation can be expressed as:
dTi 1 X Tk - Ti
=
dt Ci Rik
k2Neighbors(i)
1
+ ⇤ (Bh(i) ⇤ Pi - Bc(i) ⇤ Qi )
Ci
1 X
+ ⇤ Hj
Ci
j2Occupants(i)
Occupants
Other heat sources, such as equipment, appliances, a
were neglected for simplicity but will be included at a l
48
55. Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
Simulation of the continuous model using Acumen
- DSL for simulating continuous and discrete systems
- Collaborative work with Prof. Walid Taha
49
56. DiaSim Acumen
updates variables in the
continuous model
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
reads periodically the
continuous model
50
57. DiaSim Acumen
Heater is OFF
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
51
58. DiaSim Acumen
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature T = 19.1
52
59. DiaSim Acumen
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
T = 19.1
52
60. DiaSim Acumen
Heat
Heat Heater
Regulator
Temperature
19.1 Sensor
temperature
52
61. DiaSim Acumen
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature T = 18.8
53
62. DiaSim Acumen
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
T = 18.8
53
63. DiaSim Acumen
Heat
Heat Heater
Regulator
Temperature
18.8 Sensor
temperature
53
64. DiaSim Acumen
Heat.on()
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
53
65. DiaSim Acumen
Hi = 1
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
53
66. DiaSim Acumen
Heater is ON
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature T = 19.2
54
67. DiaSim Acumen
Heater is ON
Heat
Heat Heater
Regulator
Temperature
Sensor
temperature
T = 19.2
54
68. DiaSim Acumen
Heater is ON
Heat
Heat Heater
Regulator
Temperature
19.2 Sensor
temperature
54
69. ion with diasim
mulated environment
stimuli actions
Emulated
Entities
es Application sources Approximated
physical model
ated Stimulus reads
ies Producers data
ns
Logs of
measurements
effects
55
70. ion with diasim
mulated environment
stimuli actions
Emulated
Entities
es Application sources Approximated
physical model
ated Stimulus reads
ies Producers data
ns
Other means to simulate accurately the physical environment can be
Logs of
achieved using the simulation programming framework
measurements
effects
55
71. Simulated values read
from a log database
actions
Emulated
Entities
sources
Application
Other means to simulate accurately the physical environment can be
achieved using the simulation programming framework
56
73. Emulated entities Simulated people Physical layout Physical properties
Simulation scenario
Integration in the
tool suite
• 2D graphical renderer
based on Siafu
• Rendering of the
physical properties
• Time-control
- Play
- Pause
- Slow down
- Speed up
58
75. Validation
Simulation of a school building
• 110 simulated entities
• 200 simulated people
• 6 pervasive computing applications
- Newscast
- Anti-intrusion
- Access control
- Light management
- Fire management
- Heat regulation
60
76. Validation
Simulation of a school building
• 110 simulated entities
• 200 simulated people
• 6 pervasive computing applications
➡ Executed on a 3-year old laptop
✓ Scalability
✓ Performance
61
77. Usability
• Used as part of labs
• In Bordeaux and Grenoble
• Students with modest knowledge in
Software Engineering
62
78. Usability
Used as a testing platform in our research group
DiaSuite
“A Tool Suite to Prototype Pervasive Computing Applications”,
Damien Cassou, Julien Bruneau and Charles Consel, PERCOM 2010, Demo
63
79. Usability
Used as a testing platform in our research group
Pantagruel
“A Visual, Open-Ended Approach to Prototyping Ubiquitous
Computing Applications”,
Zoe Drey and Charles Consel, PERCOM 2010, Demo
64
80. Conclusion
✓ Area-specific simulator
- Parameterized by a high-level description of the entities
✓ Transparent and hybrid simulation
- Generation of a programming abstraction layer
✓ Testing a wide range of scenarios
- Generation of a simulation support
- Physically-accurate simulation
- Hybrid environment support
65
81. Perspectives
• Validation of our simulation approach
- Comparison with a valid simulator
(e.g., EnergyPlus)
- Comparison with a real deployment
• Simulation of the non-functional extensions of DiaSpec
- Prevention of access conflicts to resources
(DAIS 2011)
- Error handling (OOPSLA 2010)
- Performance (FASE 2011)
66
82. Perspectives
• Enhancing the system monitoring
- Specification of interesting simulation events
- Interfacing a 3D simulator
(e.g., Blender)
• Complementing our simulation approach
- Simulation of human behavior (e.g., Golaem)
- Network simulation (e.g., ns2, Tossim)
67
83. Simulation
DiaSim: A Simulator for Pervasive Computing Applications
Software: Practice and Experience, 2012
Julien Bruneau and Charles Consel
DiaSim: A Parameterized Simulator for Pervasive Computing Applications
Mobiquitous, 2009
Julien Bruneau, Wilfried Jouve, and Charles Consel
Virtual Testing for Smart Buildings
International Conference on Intelligent Environments, 2012
Julien Bruneau, Charles Consel, Marcia O’Malley, Walid Taha, and Wail Masry Hannourah
Tool-based development methodology
Towards a Tool-based Development Methodology for Pervasive Computing Applications
IEEE Transactions on Software Engineering, 2011
Damien Cassou, Julien Bruneau, Charles Consel, and Emilie Balland
DiaSuite: A Tool Suite to Develop Sense/Compute/Control Applications
Science of Computer Programming, 2012
Benjamin Bertran, Julien Bruneau, Damien Cassou, Nicolas Loriant, Charles Consel, and Emilie Balland
Demonstrations and Posters
PerCom 2009 (demo), ICPS 2009 (demo), PerCom 2010 (demo),
Mobiquitous 2010 (poster), SPLASH 2010 (poster)
68
Editor's Notes
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Orchestration of networked entities\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Need to specify the impact of sensors and actuators on the physical environment\n
Need to specify the impact of sensors and actuators on the physical environment\n
Simulation impacted the DiaSpec design as we needed to add information about sensors and actuators\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Physical layout = graphical representations, locations/rooms and walls\n
Physical layout = graphical representations, locations/rooms and walls\n