Tele Assistance System (TAS) Artifact is online

The second of the three artifacts that have been accepted at SEAMS'15 is online and enriching the Exemplars section of this website:

Tele Assistance System (TAS)
by Danny Weyns and Radu Calinescu, supported by M. Usman Iftikhar and Yifan Ruan.

"TAS is an exemplar of a service-based system (SBS). SBSs are widely used in e-commerce, online banking, e-health and many other applications. In these systems, services offered by third-party providers are dynamically composed into workflows delivering complex functionality. SBSs increasingly rely on self-adaptation to cope with the uncertainties associated with third-party services, as the loose coupling of services makes online reconfiguration feasible."

Further information about this artifact can be found in the corresponding SEAMS'15 paper:
D. Weyns and R. Calinescu: "Tele Assistance: A Self-Adaptive Service-Based System Examplar", in Proc. of SEAMS'15, 2015, IEEE. (Preprint)

Distributed Dependable Ensembles of Components (DEECo) Artifact is online

The first of the three artifacts that have been accepted at SEAMS'15 is online and enriching the Exemplars section of this website:

Distributed Dependable Ensembles of Components (DEECo)
by Michal Kit, Ilias Gerostathopoulos, Tomas Bures, Petr Hnetynka, and Frantisek Plasil.

"To develop self-adaptive cyber-physical systems (CPS) we advocate the use of component-based abstractions and related tools. DEECo is a component system (model and runtime platform) that provides the architecture abstractions of autonomous components and dynamic component groups (called ensembles) on top of which different adaptation techniques can be deployed. This makes DEECo a vehicle for seamless experiments with self-adaptive systems where the physical distribution and mobility of nodes, and the limited data availability play an important role."

Further information about this artifact can be found in the corresponding SEAMS'15 paper:
Michal Kit, Ilias Gerostathopoulos, Tomas Bures, Petr Hnetynka, and Frantisek Plasil: "An Architecture Framework for Experimentations with Self-Adaptive Cyber-Physical Systems", in Proc. of SEAMS'15, 2015, IEEE.

Report from the GI Dagstuhl Seminar 14433

The report from the GI Dagstuhl Seminar 14433 has been published and it is available online:

Report from the GI Dagstuhl Seminar 14433: Software Engineering for Self-Adaptive Systems edited by Thomas Vogel, Matthias Tichy, and Alessandra Gorla.

Abstract: Nowadays, software has become a key feature and driver for innovation of a wide range of products and services such as business applications, vehicles, or devices in various domains such as transportation, communication, energy, production, or health. Consequently, our daily lives highly depend on such software-intensive systems. This results in complex systems, which is even more stressed by integrating them to systems-of-systems or cyber-physical systems such as smart cities. Therefore, innovative ways of developing, deploying, maintaining, and evolving such software-intensive systems are required. In this direction, one promising stream of software engineering research is self-adaptation. Engineering self-adaptive systems is an open research challenge, particularly, for software engineering since it is usually software that controls the self-adaptation. This GI-Dagstuhl seminar focused on software engineering aspects of building self-adaptive systems cost-effectively and in a systematic and predictable manner. This includes typical software engineering disciplines such as requirements engineering, modeling, architecture, middleware, design, analysis, testing, validation, and verification as well as software evolution.

downloadDownload the Report

Game: self-adaptation applied to authorisation infrastructures

Chris Bailey and Rogério de Lemos from the University of Kent (UK) would be very grateful if you could get involved with the following game either by playing it, or disseminating it:

https://saaf-resource.kent.ac.uk/game/index.php

Basically, they need data, and the more data they get the better.

This is an academic project in which they are studying the effectiveness of self-adaptation in authorisation systems, more precisely, they are looking into insider threats. This game has been deployed for a while, and they see this game as a way of emulating insider threats. It has gone through several pilot studies, and now they feel it is time to release it to a wider audience.

The goal is to collect data related to how attacks are perpetrated, how these can be detected, and how the controller reacts to the perceived attacks.

Please, try to beat the computer, and be the top player - Chris and Rogério truly appreciate your “dishonesty”.

Good luck!

ps. If you have any questions, suggestions, or complaints, please contact Chris and  Rogério at: saaf (dot) experiment (at) gmail (dot) com