Publications
129 results found
Tarr PL, Wolf AL, 2011, Engineering of Software, Publisher: Springer-Verlag New York Incorporated, ISBN: 9783642198229
Introduction to “Engineering of Software: The Continuing Contributions of Leon J . Osterweil” Peri L. Tarr and Alexander L. Wolf Peri L. Tarr is at IBM Thomas J. Watson Research Center, PO Box 704, Yorktown Heights, NY 10598 USA, ...
Konstantinidis A, Carzaniga A, Wolf AL, 2011, A Content-Based Publish/Subscribe Matching Algorithm for 2D Spatial Objects, ACM/IFIP/USENIX 12th International Middleware Conference, Publisher: Springer, Pages: 208-227, ISSN: 0302-9743
Diaz J, Perez J, Garbajosa J, et al., 2011, A Process for Documenting Variability Design Rationale of Flexible and Adaptive PLAs, Confederated International Workshops and Posters: EI2N plus NSF ICE, ICSP plus INBAST, ISDE, ORM, OTMA, SWWS plus MONET plus SeDeS, and VADER, Publisher: SPRINGER-VERLAG BERLIN, Pages: 612-+, ISSN: 0302-9743
- Author Web Link
- Cite
- Citations: 3
Cadar C, Pietzuch P, Wolf AL, 2010, Multiplicity computing: A vision of software engineering for next-generation computing platform applications, Pages: 81-85
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can view these technologies as forming levels within a new, global computing platform. We aim to open a new area of research, called multiplicity computing, that takes a radically different approach to the engineering of applications for this platform. Unlike other efforts, which are largely focused on innovations within specific levels, multiplicity computing embraces the platform as a virtually unlimited space of essentially redundant resources. This space is formed as a whole from the cross product of resources available at each level in the platform, offering a "multiplicity" of end-to-end resources. We seek to discover fundamentally new ways of exploiting the combinatorial multiplicity of computational, communication, and storage resources to obtain scalable applications exhibiting improved quality, dependability, and security that are both predictable and measurable. Copyright 2010 ACM.
Carzaniga A, Denaro G, Pezze M, et al., 2009, Toward Deeply Adaptive Societies of Digital Systems, 31st International Conference on Software Engineering New Ideas and Emerging Results Track, Pages: 331-334
Rutherford MJ, Carzaniga A, Wolf AL, 2008, Evaluating Test Suites and Adequacy Criteria using Simulation-Based Models of Distributed Systems, IEEE Transactions on Software Engineering, Vol: 34, Pages: 452-470
Osterweil LJ, Ghezzi C, Kramer J, et al., 2008, Determining the impact of software engineering research on practice, COMPUTER, Vol: 41, Pages: 39-+, ISSN: 0018-9162
- Author Web Link
- Cite
- Citations: 30
Wang Y, Carzaniga A, Wolf AL, 2008, Four Enhancements to Automated Distributed System Experimentation Methods, 30th International Conference on Software Engineering, Publisher: IEEE, Pages: 491-500, ISSN: 0270-5257
Wolf AL, 2007, Engineering software services for pervasive environments, Pages: 619-620
The International Workshop on the Engineering of Software Services for Pervasive Environments (ESSPE) brings together researchers interested in the software engineering challenges found at the convergence of software services and pervasive environments. This summary presents the motivation for the workshop and a brief review of the papers appearing in the proceedings. Copyright 2007 ACM.
Wolf AL, 2007, Engineering software services for pervasive environments: ESSPE '07 workshop summary, Pages: 619-620
The International Workshop on the Engineering of Software Services for Pervasive Environments (ESSPE) brings together researchers interested in the software engineering challenges found at the convergence of software services and pervasive environments. This summary presents the motivation for the workshop and a brief review of the papers appearing in the proceedings. © 2007 ACM.
Giacomoni J, Bennett JK, Carzaniga A, et al., 2007, Frame Shared Memory: Line-Rate Networking on Commodity Hardware, 3rd ACM/IEEE Symposium on Architectures for Networking and Communications Systems, Pages: 27-36
Arshad N, Heimbigner D, Wolf AL, 2007, Deployment and Dynamic Reconfiguration Planning for Distributed Software Systems, Software Quality Journal, Vol: 15, Pages: 265-281
Rutherford M J, Carzaniga A, Wolf A L, 2006, Simulation-Based Test Adequacy Criteria for Distributed Systems, Publisher: ACM Press, Pages: 231-241
Corradini F, Inverardi P, Wolf AL, 2006, On relating functional specifications to architectural specifications: A case study, SCIENCE OF COMPUTER PROGRAMMING, Vol: 59, Pages: 171-208, ISSN: 0167-6423
- Author Web Link
- Cite
- Citations: 7
Wang Y, Rutherford M J, Carzaniga A, et al., 2005, Automating experimentation on distributed testbeds, 20th IEEE/ACM International Conference on Automated Software Engineering, Publisher: ACM Press, Pages: 164-173
Osterweil L, Ghezzi C, Kramer J, et al., 2005, Editorial, ACM Transactions on Software Engineering and Methodology, Vol: 14, Pages: 381-382, ISSN: 1049-331X
Arshad N, Heimbigner D, Wolf AL, 2004, A planning based approach to failure recovery in distributed systems, Pages: 8-12
Failure recovery in distributed systems poses a difficult challenge because of the requirement for high availability. Failure scenarios are usually unpredictable so they can not easily be foreseen. In this research we propose a planning based approach to failure recovery. This approach automates failure recovery by capturing the state after failure, defining an acceptable recovered state as a goal and applying planning to get from the initial state to the goal state. By using planning, this approach can recover from a variety of failed states and reach any of several acceptable states: from minimal functionality to complete recovery.
Garlan D, Kramer J, Wolf A, 2004, Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managing Systems, WOSS '04, Co-located with the 12th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE-12: Forward
Cook JE, Du ZD, Liu CB, et al., 2004, Discovering models of behavior for concurrent workflows, COMPUTERS IN INDUSTRY, Vol: 53, Pages: 297-319, ISSN: 0166-3615
- Author Web Link
- Cite
- Citations: 52
Carzaniga A, Rutherford M J, Wolf A L, 2004, A Routing Scheme for Content-Based Networking, Publisher: IEEE Press, Pages: 918-928
Wolf AL, 2004, Is security engineering really just good software engineering?
These days, if you say that you are doing research in the area of computer security you instantly receive attention. Sadly, the same cannot be said of software engineering. But are the two areas really so different? Both seem to be concerned with issues that range from the finely technical to the broadly social and that force us to make difficult tradeoffs among cost, performance, quality, and usability. Both seem to require that we conduct our research in an interdisciplinary context. In the end we realize that fully solving the security problem for ever larger and more complex systems is as intractable as fully solving the traditional software engineering problem. In this talk I will attempt to relate the challenges of security engineering and software engineering, and will argue that security engineering is more of a software engineering problem than many people would like to admit.
Ryan ND, Wolf AL, 2004, Using event-based translation to support dynamic protocol evolution, 26th International Conference on Software Engineering (ICSE 2004), Publisher: IEEE COMPUTER SOC, Pages: 408-417, ISSN: 0270-5257
- Author Web Link
- Cite
- Citations: 4
Caporuscio M, Carzaniga A, Wolf AL, 2003, Design and evaluation of a support service for mobile, wireless publish/subscribe applications, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol: 29, Pages: 1059-1071, ISSN: 0098-5589
- Author Web Link
- Cite
- Citations: 64
Carzaniga A, Wolf AL, 2003, Forwarding in a content-based network, SIGCOMM 2003 Conference, Publisher: ASSOC COMPUTING MACHINERY, Pages: 163-174, ISSN: 0146-4833
- Author Web Link
- Cite
- Citations: 78
Knight JC, Hill J, Varner P, et al., 2003, Willow system demonstration, Pages: 123-125
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modem critical applications. Extensive damage can arise from environmental factors, malicious actions and so on, and in most cases it is impractical to mask the effects of such damage using typical redundancy techniques. Reconfiguration is required of both the application and the underlying computing and communications fabric. Such reconfiguration is difficult to achieve because it requires communication with a significant number of nodes both to determine the problem and to effect a repair In this demonstration we present an approach to the implementation of such reconfiguration. The approach to reactive control includes formal description of the error states, synthesis of the implementation, a novel new communications mechanism for communication between the error detection system and the application, and a system for coordinating the effects of independent actions.
Carzaniga A, Rosenblum DS, Wolf AL, 2003, Design and evaluation of a wide-area event notification service, Pages: 283-334
The components of a loosely coupled system are typically designed to operate by generating and responding to asynchronous events. An event notification service is an application-independent infrastructure that supports the construction of event-based systems, whereby generators of events publish event notifications to the infrastructure and consumers of events subscribe with the infrastructure to receive relevant notifications. The two primary services that should be provided to components by the infrastructure are notification selection (i.e., determining which notifications match which subscriptions) and notification delivery (i.e., routing matching notifications from publishers to subscribers). Numerous event notification services have been developed for local-area networks, generally based on a centralized server to select and deliver event notifications. Therefore, they suffer from an inherent inability to scale to wide-area networks, such as the Internet, where the number and physical distribution of the service's clients can quickly overwhelm a centralized solution. The critical challenge in the setting of a wide-area network is to maximize the expressiveness in the selection mechanism without sacrificing scalability in the delivery mechanism. This paper presents SIENA, an event notification service that we have designed and implemented to exhibit both expressiveness and scalability. We describe the service's interface to applications, the algorithms used by networks of servers to select and deliver event notifications, and the strategies used to optimize performance. We also present results of simulation studies that examine the scalability and performance of the service.
Ciancarini P, Wolf A, 2003, Issues in Coordination Languages and Architectures - Preface, SCIENCE OF COMPUTER PROGRAMMING, Vol: 46, Pages: 1-3, ISSN: 0167-6423
van der Hoek A, Wolf AL, 2003, Software release management for component-based software, SOFTWARE-PRACTICE & EXPERIENCE, Vol: 33, Pages: 77-98, ISSN: 0038-0644
- Author Web Link
- Cite
- Citations: 27
This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.