You are hereProgram / Agenda
Agenda
Wednesday 14.9.2011 | Thursday 15.9.2011 | Friday 16.9.2011 | |||||||
8:00 | Registration Opens | 8:00 | |||||||
8:30-9:30 | Keynote Auditorium |
Keynote Auditorium |
Keynote Auditorium |
8:30-9:30 | |||||
9:30-10:00 | Coffee Break (Auditorium Hall) | 9:30-10:00 | |||||||
10:00-12:00 | WEWST'11 Room 402 |
Mashups 2011 Room 351 |
QASBA 2011 Room 321 |
Session 1 Auditorium |
Tutorial Room 351 |
Session 4 Auditorium |
Industry Track Papers Room 402 |
PhD Symposium Room 351 |
10:00-12:00 |
12:00-13:15 | Lunch | 12:00-13:15 | |||||||
13:15-15:15 | DATAVIEW'11 Room 402 |
Mashups 2011 Room 351 |
QASBA 2011 Room 321 |
Session 2 Auditorium |
Tutorial Room 351 |
Keynote Auditorium |
13:15-14:15 | ||
Invited Presentations Auditorium |
PhD Symposium Room 351 |
14:15-15:15 | |||||||
15:15-15:45 | Coffee Break (Auditorium Hall) | 15:15-15:45 | |||||||
15:45-17:15 | Mashups 2011 Room 351 |
QASBA 2011 Room 321 |
Session 3 Auditorium |
Tutorial Room 351 |
Session 5 Auditorium |
Invited Presentations Room 402 |
PhD Symposium Room 351 |
15:45-17:15 | |
Closing (Auditorium) | 17:15-17:30 | ||||||||
Welcome Reception | Banquet |
The Fading Boundary between Development Time and Run Time
by Prof. Carlo Ghezzi, Politecnico di Milano, Italy
Modern software applications are often embedded in highly dynamic contexts. Changes may occur in the requirements, in the behavior of the environment in which the application is embedded, in the usage profiles that characterize interactive aspects. Changes are difficult to predict and anticipate, and are out of control of the application. Their occurrence, however, may be disruptive, and therefore the software must also change accordingly. In many cases, changes to the software cannot be handled off-line, but require the software to self-react by adapting its behavior dynamically, in order to continue to ensure the required quality of service. The big challenge in front of us is how to achieve the necessary degrees of flexibility and dynamism required in this setting without compromising dependability of the applications.
Read more...