Refine
Year of publication
- 2016 (17) (remove)
Document Type
- Monograph/Edited Volume (17) (remove)
Language
- English (17) (remove)
Is part of the Bibliography
- yes (17)
Keywords
- virtual machines (2)
- virtuelle Maschinen (2)
- Armut (1)
- Authentizität (1)
- Cloud-Sicherheit (1)
- Cloud-Speicher (1)
- Discrimination Networks (1)
- FRP (1)
- Forschungskolleg (1)
- Functional Lenses (1)
Institute
- Hasso-Plattner-Institut für Digital Engineering gGmbH (7)
- Department Erziehungswissenschaft (2)
- Department Linguistik (2)
- Bürgerliches Recht (1)
- Institut für Mathematik (1)
- Institut für Romanistik (1)
- Institut für Umweltwissenschaften und Geographie (1)
- Wirtschafts- und Sozialwissenschaftliche Fakultät (1)
- Wirtschaftswissenschaften (1)
Design and Implementation of service-oriented architectures imposes a huge number of research questions from the fields of software engineering, system analysis and modeling, adaptability, and application integration. Component orientation and web services are two approaches for design and realization of complex web-based system. Both approaches allow for dynamic application adaptation as well as integration of enterprise application.
Commonly used technologies, such as J2EE and .NET, form de facto standards for the realization of complex distributed systems. Evolution of component systems has lead to web services and service-based architectures. This has been manifested in a multitude of industry standards and initiatives such as XML, WSDL UDDI, SOAP, etc. All these achievements lead to a new and promising paradigm in IT systems engineering which proposes to design complex software solutions as collaboration of contractually defined software services.
Service-Oriented Systems Engineering represents a symbiosis of best practices in object-orientation, component-based development, distributed computing, and business process management. It provides integration of business and IT concerns.
The annual Ph.D. Retreat of the Research School provides each member the opportunity to present his/her current state of their research and to give an outline of a prospective Ph.D. thesis. Due to the interdisciplinary structure of the research school, this technical report covers a wide range of topics. These include but are not limited to: Human Computer Interaction and Computer Vision as Service; Service-oriented Geovisualization Systems; Algorithm Engineering for Service-oriented Systems; Modeling and Verification of Self-adaptive Service-oriented Systems; Tools and Methods for Software Engineering in Service-oriented Systems; Security Engineering of Service-based IT Systems; Service-oriented Information Systems; Evolutionary Transition of Enterprise Applications to Service Orientation; Operating System Abstractions for Service-oriented Computing; and Services Specification, Composition, and Enactment.
Writing-between-worlds
(2016)
Transmorphic
(2016)
Defining Graphical User Interfaces (GUIs) through functional abstractions can reduce the complexity that arises from mutable abstractions. Recent examples, such as Facebook's React GUI framework have shown, how modelling the view as a functional projection from the application state to a visual representation can reduce the number of interacting objects and thus help to improve the reliabiliy of the system. This however comes at the price of a more rigid, functional framework where programmers are forced to express visual entities with functional abstractions, detached from the way one intuitively thinks about the physical world.
In contrast to that, the GUI Framework Morphic allows interactions in the graphical domain, such as grabbing, dragging or resizing of elements to evolve an application at runtime, providing liveness and directness in the development workflow. Modelling each visual entity through mutable abstractions however makes it difficult to ensure correctness when GUIs start to grow more complex. Furthermore, by evolving morphs at runtime through direct manipulation we diverge more and more from the symbolic description that corresponds to the morph. Given that both of these approaches have their merits and problems, is there a way to combine them in a meaningful way that preserves their respective benefits?
As a solution for this problem, we propose to lift Morphic's concept of direct manipulation from the mutation of state to the transformation of source code. In particular, we will explore the design, implementation and integration of a bidirectional mapping between the graphical representation and a functional and declarative symbolic description of a graphical user interface within a self hosted development environment. We will present Transmorphic, a functional take on the Morphic GUI Framework, where the visual and structural properties of morphs are defined in a purely functional, declarative fashion. In Transmorphic, the developer is able to assemble different morphs at runtime through direct manipulation which is automatically translated into changes in the code of the application. In this way, the comprehensiveness and predictability of direct manipulation can be used in the context of a purely functional GUI, while the effects of the manipulation are reflected in a medium that is always in reach for the programmer and can even be used to incorporate the source transformations into the source files of the application.
This edited volume provides insight into how digital badges may enhance formal and informal education by focusing on technical design issues including organizational requirements, instructional design, and deployment. It features current research exploring the theoretical foundation and empirical evidence of the utilization of digital badges as well as case studies that describe current practices and experiences in the use of digital badges for motivation, learning, and instruction in K-12, higher education, workplace learning, and further education settings.
Behavioural Models
(2016)
This textbook introduces the basis for modelling and analysing discrete dynamic systems, such as computer programmes, soft- and hardware systems, and business processes. The underlying concepts are introduced and concrete modelling techniques are described, such as finite automata, state machines, and Petri nets. The concepts are related to concrete application scenarios, among which business processes play a prominent role.
The book consists of three parts, the first of which addresses the foundations of behavioural modelling. After a general introduction to modelling, it introduces transition systems as a basic formalism for representing the behaviour of discrete dynamic systems. This section also discusses causality, a fundamental concept for modelling and reasoning about behaviour. In turn, Part II forms the heart of the book and is devoted to models of behaviour. It details both sequential and concurrent systems and introduces finite automata, state machines and several different types of Petri nets. One chapter is especially devoted to business process models, workflow patterns and BPMN, the industry standard for modelling business processes. Lastly, Part III investigates how the behaviour of systems can be analysed. To this end, it introduces readers to the concept of state spaces. Further chapters cover the comparison of behaviour and the formal analysis and verification of behavioural models.
The book was written for students of computer science and software engineering, as well as for programmers and system analysts interested in the behaviour of the systems they work on. It takes readers on a journey from the fundamentals of behavioural modelling to advanced techniques for modelling and analysing sequential and concurrent systems, and thus provides them a deep understanding of the concepts and techniques introduced and how they can be applied to concrete application scenarios.
Intonation Units Revisited
(2016)
Intonation units have been notoriously difficult to identify in natural talk. Problems include fuzzy boundaries, lack of exhaustivity, and the potential circularity involved when studying their interface with other language-organizational dimensions. This volume advocates a way to resolve such problems: the cesura approach. Cesuras, or breaks in the flow of talk, are created by discontinuities in the prosodic-phonetic parameters of speech that cluster to various extents at certain points in time. Using conversation-analytic and interactional-linguistic methodology, the volume identifies the parameters creating cesuras in talk-in-interaction and proposes ways to notate them depending on the researcher s goal. It also offers a way to study the role of cesuras at the prosody-syntax interface non-circularly, which leads to new insights concerning language variation and change. The volume will thus be of major import to anyone working with natural spoken language, its chunks, its various dimensions, and its variation and change."
Touring Katutura!
(2016)
Guided sightseeing tours of the former township of Katutura have been offered in Windhoek since the mid-1990s. City tourism in the Namibian capital had thus become, at quite an early point in time, part of the trend towards utilising poor urban areas for purposes of tourism – a trend that set in at the beginning of the same decade. Frequently referred to as “slum tourism” or “poverty tourism”, the phenomenon of guided tours around places of poverty has not only been causing some media sensation and much public outrage since its emergence; in the past few years, it has developed into a vital field of scientific research, too. “Global Slumming” provides the grounds for a rethinking of the relationship between poverty and tourism in world society.
This book is the outcome of a study project of the Institute of Geography at the School of Cultural Studies and Social Science of the University of Osnabrueck, Germany. It represents the first empirical case study on township tourism in Namibia. It focuses on four aspects:
1. Emergence, development and (market) structure of township tourism in Windhoek
2. Expectations/imaginations, representations as well as perceptions of the township and its inhabitants from the tourist’s perspective
3. Perception and assessment of township tourism from the residents’ perspective
4. Local economic effects and the poverty-alleviating impact of township tourism
The aim is to make an empirical contribution to the discussion around the tourism-poverty nexus and to an understanding of the global phenomenon of urban poverty tourism.
Causes, Time, and Truth
(2016)
We need causation, time, and truth in order to know how things in the broadest sense of the term hang together in the broadest sense of the term. The essays try to say something clarifying about those three classical questions of traditional metaphysics. Not dogmatic answers are offered, but guiding perspectives and possible justifiable ways of dealing with such fundamental
Complexity in software systems is a major factor driving development and maintenance costs. To master this complexity, software is divided into modules that can be developed and tested separately. In order to support this separation of modules, each module should provide a clean and concise public interface. Therefore, the ability to selectively hide functionality using access control is an important feature in a programming language intended for complex software systems.
Software systems are increasingly distributed, adding not only to their inherent complexity, but also presenting security challenges. The object-capability approach addresses these challenges by defining language properties providing only minimal capabilities to objects. One programming language that is based on the object-capability approach is Newspeak, a dynamic programming language designed for modularity and security. The Newspeak specification describes access control as one of Newspeak’s properties, because it is a requirement for the object-capability approach. However, access control, as defined in the Newspeak specification, is currently not enforced in its implementation.
This work introduces an access control implementation for Newspeak, enabling the security of object-capabilities and enhancing modularity. We describe our implementation of access control for Newspeak. We adapted the runtime environment, the reflective system, the compiler toolchain, and the virtual machine. Finally, we describe a migration strategy for the existing Newspeak code base, so that our access control implementation can be integrated with minimal effort.