Academia.eduAcademia.edu

Model consistency

description19 papers
group7 followers
lightbulbAbout this topic
Model consistency refers to the property of a statistical or mathematical model whereby the estimates produced converge to the true parameter values as the sample size increases. It ensures that the model's predictions become increasingly accurate and reliable with larger datasets, thereby validating the model's effectiveness in representing the underlying phenomena.
lightbulbAbout this topic
Model consistency refers to the property of a statistical or mathematical model whereby the estimates produced converge to the true parameter values as the sample size increases. It ensures that the model's predictions become increasingly accurate and reliable with larger datasets, thereby validating the model's effectiveness in representing the underlying phenomena.

Key research themes

1. How can automated and semi-automated approaches improve consistency management in industrial continuous model-based development?

This theme addresses the practical challenges and desired advancements in achieving consistency among models and other development artifacts within industrial continuous model-based development (MBD) settings. It is crucial because consistency management is a major impediment to adopting more iterative and agile modeling practices that aim to shorten development cycles. Understanding current industrial practices and how automation and migration pathways can facilitate more effective consistency management can inform tool support and methodological improvements.

Key finding: The study of thirteen industrial MBD settings reveals that immature modeling practices hinder the adoption of shorter development cycles, with consistency management being a major challenge. The findings identify that... Read more
Key finding: The proposed XRTSDIC framework introduces an extensible and flexible approach for real-time detection of software design inconsistencies that supports multiple modeling tools, rule languages, and visualization techniques. Its... Read more
Key finding: By utilizing dynamic logic to define a uniform semantic framework for UML diagrams, including class, state machine, and sequence diagrams, this work enables precise formal reasoning about model consistency. The approach... Read more

2. What methodologies and algorithms mitigate state space explosion in model checking for eventual properties through divide-and-conquer and parallelization?

Model checking eventual properties often suffers from state space explosion, limiting practical verification of complex systems. This theme investigates divide-and-conquer based methods that partition the model checking problem into smaller, manageable subproblems, enabling more efficient analysis. The exploration of designing sequential and parallel tools based on these partitions furthers the scalability and running performance of model checking, especially leveraging multi-core architectures for eventual properties represented in temporal logic.

Key finding: The presented divide-and-conquer technique partitions the reachable state space into layered subspaces, enabling equivalence between checking the original eventual property and solving multiple smaller model checking... Read more
Key finding: Building on the divide-and-conquer approach, this work develops a parallel model checking tool leveraging a master-worker pattern on Maude, significantly improving running performance for eventual properties. Experimental... Read more
Key finding: For the related class of conditional stable properties relevant to self-stabilizing systems, this research presents both sequential and parallel tools implementing divide-and-conquer model checking. It demonstrates that the... Read more

3. How can application-centric consistency models in geo-replicated storage systems guarantee invariant preservation with low latency under eventual consistency?

This theme explores consistency models that extend eventual consistency by explicitly considering application-specific invariants to improve correctness guarantees in geo-replicated distributed storage while maintaining low latency. The focus lies on methodologies enabling safe operation execution under weak coordination or repair-based invariant restoration. Middleware implementations demonstrate practical trade-offs in latency and correctness, bridging the gap between strong consistency and eventual consistency for large-scale cloud applications.

Key finding: The paper proposes Explicit Consistency, a consistency model defined by application invariants rather than execution order, allowing operations to execute locally under causal consistency while preserving invariants via a... Read more
Key finding: Confirming the feasibility of Explicit Consistency, this work details static analysis identifying unsafe operations and methods for invariant violation avoidance or repair. It proves that the approach permits local operation... Read more
Key finding: This study extends causally consistent models with temporal constraints, proposing Timed Causal Consistency to achieve convergence—a key property ensuring replicas eventually stabilize to the same state. It analyzes how... Read more

All papers in Model consistency

Among several alternative viewpoints for building software quality metrics, evaluating the consistency between different models in a software specification or implementation appears to be fruitful. An obvious difficulty is that different... more
We compare the forms and properties of different macroscopic behavioral relationships on which different static and dynamic traffic assignment models have been based, namely, travel time-flow functions, travel time-occupancy functions,... more
This paper addresses the realization of a consistent modeling chain from requirements modeling to function modeling and eventually system modeling intended to support early system simulation. Therefor, a prototypical software support has... more
Business analysts and domain experts are often sketching the behaviors of a software system using high-level models that are technology-and platform-independent. The developers will refine and enrich these high-level models with technical... more
Summary Business goals often conflict. Conflicting goals can come from within an organisation, or may appear as external threats: goals may be friendly or hostile. Relationships between goals therefore need to go beyond conventional... more
Secure software engineering entails that security concerns needs to be considered from the early phases of development, as early as the requirements engineering phase. Misuse cases is a well-known security analysis and specifications... more
Secure software engineering is concerned with developing software systems that will continue delivering its intended functionality despite a multitude of harmful software technologies that can attack these systems from anywhere and at... more
Security is a crucial requirement in software systems which need to be addressed as early as the requirements phase. The technique of misuse case modeling has been introduced slightly over a decade ago to elicit and specify functional... more
Business analysts and domain experts are often sketching the behaviors of a software system using high-level models that are technology-and platform-independent. The developers will refine and enrich these high-level models with technical... more
In this paper we investigate the problem of verification of business processes specified with ArchiMate language. The proposed solution employs model checking techniques. As a verification platform the state of the art symbolic model... more
Abstract: In a model assessment framework different quality aspects can be exami-ned. In our approach we consider consistency and perceived semantic quality. The former can be supported by constraints and the later by queries. Consistency... more
The paper proposes a reuse-based approach to determining security requirements. Development for reuse involves identifying security threats and associated security requirements during application development and abstracting them into a... more
The paper proposes a reuse-based approach to determining security requirements. Development for reuse involves identifying security threats and associated security requirements during application development and abstracting them into a... more
by ang ang and 
1 more
Use cases have proven helpful for eliciting, communicating and documenting requirements. But whereas functional requirements are well supported, use cases provide less support for working with extra-functional requirements, such as... more
In this paper we investigate the problem of verification of business processes specified with ArchiMate language. The proposed solution employs model checking techniques. As a verification platform the state of the art symbolic model... more
In this paper, we propose a new location service for Ad hoc mobile networks. The network area is divided into non-overlapping zones. Using a hash function, a node identifier is mapped to a set of zones, in which the location information... more
by Huy Tran and 
1 more
Business analysts and domain experts are often sketching the behaviors of a software system using high-level models that are technology- and platform-independent. The developers will refine and enrich these high-level models with... more
Abstract The paper proposes a reuse-based approach to determining security requirements. Development for reuse involves identifying security threats and associated security requirements during application development and abstracting them... more
Secure software development should begin at the early stages of the development life cycle. Misuse case modeling is a technique that stems from traditional use case modeling, which facilitates the elicitation and modeling functional... more
In a use case driven development process, a use case model is utilized by a development team to construct an object-oriented software system. The large degree of informality in use case models, coupled with the fact that use case models... more
Download research papers for free!