SlideShare a Scribd company logo
Advanced Design Approaches to Emerging Software
Systems Principles Methodologies and Tools
Premier Reference Source 1st Edition Xiaodong
Liu pdf download
https://ebookfinal.com/download/advanced-design-approaches-to-
emerging-software-systems-principles-methodologies-and-tools-
premier-reference-source-1st-edition-xiaodong-liu/
Explore and download more ebooks or textbooks
at ebookfinal.com
Here are some recommended products for you. Click the link to
download, or explore more at ebookfinal
Machine Audition Principles Algorithms and Systems Premier
Reference Source 1st Edition Wenwu Wang
https://ebookfinal.com/download/machine-audition-principles-
algorithms-and-systems-premier-reference-source-1st-edition-wenwu-
wang/
Crisis Response and Management and Emerging Information
Systems Critical Applications Premier Reference Source 1st
Edition Murray E. Jennex
https://ebookfinal.com/download/crisis-response-and-management-and-
emerging-information-systems-critical-applications-premier-reference-
source-1st-edition-murray-e-jennex/
Model Driven Software Development Integrating Quality
Assurance Premier Reference Source 1st Edition Jorg Rech
https://ebookfinal.com/download/model-driven-software-development-
integrating-quality-assurance-premier-reference-source-1st-edition-
jorg-rech/
Innovation in Power Control and Optimization Emerging
Energy Technologies Premier Reference Source 1st Edition
Pandian Vasant
https://ebookfinal.com/download/innovation-in-power-control-and-
optimization-emerging-energy-technologies-premier-reference-
source-1st-edition-pandian-vasant/
Dynamic and Advanced Data Mining for Progressing
Technological Development Innovations and Systemic
Approaches Premier Reference Source 1st Edition A. B. M.
Shawkat Ali
https://ebookfinal.com/download/dynamic-and-advanced-data-mining-for-
progressing-technological-development-innovations-and-systemic-
approaches-premier-reference-source-1st-edition-a-b-m-shawkat-ali/
Instructional Design Frameworks and Intercultural Models
Premier Reference Source 1st Edition Patricia A. Young
https://ebookfinal.com/download/instructional-design-frameworks-and-
intercultural-models-premier-reference-source-1st-edition-patricia-a-
young/
Knowledge Management for Process Organizational and
Marketing Innovation Tools and Methods Premier Reference
Source 1st Edition Emma O'Brien
https://ebookfinal.com/download/knowledge-management-for-process-
organizational-and-marketing-innovation-tools-and-methods-premier-
reference-source-1st-edition-emma-obrien/
Temporal Structures in Individual Time Management
Practices to Enhance Calendar Tool Design Premier
Reference Source 1st Edition Dezhi Wu
https://ebookfinal.com/download/temporal-structures-in-individual-
time-management-practices-to-enhance-calendar-tool-design-premier-
reference-source-1st-edition-dezhi-wu/
Information Systems and New Applications in the Service
Sector Models and Methods Premier Reference Source 1st
Edition John Wang
https://ebookfinal.com/download/information-systems-and-new-
applications-in-the-service-sector-models-and-methods-premier-
reference-source-1st-edition-john-wang/
Advanced Design Approaches to Emerging Software Systems Principles Methodologies and Tools Premier Reference Source 1st Edition Xiaodong Liu
Advanced Design Approaches to Emerging Software
Systems Principles Methodologies and Tools Premier
Reference Source 1st Edition Xiaodong Liu Digital
Instant Download
Author(s): Xiaodong Liu, Yang Li
ISBN(s): 9781609607364, 1609607368
Edition: 1
File Details: PDF, 9.76 MB
Year: 2011
Language: english
Advanced Design Approaches to Emerging Software Systems Principles Methodologies and Tools Premier Reference Source 1st Edition Xiaodong Liu
Xiaodong Liu
Edinburgh Napier University, UK
Yang Li
British Telecom, UK
Advanced Design
Approaches to Emerging
Software Systems:
Principles, Methodologies
and Tools
Advanced design approaches to emerging software systems : principles,
methodologies, and tools / Xiaodong Liu and Yang Li, editors.
p. cm.
Includes bibliographical references and index.
Summary: “This book provides relevant theoretical frameworks and the latest
empirical research findings in the area, clarifying the present chaotic and
confusing literature of the current state of the art and knowledge in the
areas of the design and engineering of the many emerging software systems”--
Provided by publisher.
ISBN 978-1-60960-735-7 (hardcover) -- ISBN 978-1-60960-736-4 (ebook) -- ISBN
978-1-60960-737-1 (print & perpetual access) 1. Systems software. 2.
Application software--Development. 3. Computer networks--Design and
construction. I. Liu, Xiaodong, 1966 Oct. 8- II. Li, Yang, 1973-
QA76.76.S95A38 2012
004.6--dc23
2011021481
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
Senior Editorial Director:		 Kristin Klinger
Director of Book Publications: 		 Julia Mosemann
Editorial Director:			 Lindsay Johnston
Acquisitions Editor:		 Erika Carter
Development Editor:		 Michael Killian
Production Editor:			 Sean Woznicki
Typesetters: 			 Natalie Pronio, Jennifer Romanchak, Milan Vracarich, Jr.
Print Coordinator:			 Jamie Snavely
Cover Design:			 Nick Newcomer
Published in the United States of America by
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com
Copyright © 2012 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or
companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
			 Library of Congress Cataloging-in-Publication Data
Editorial Advisory Board
José Barata, Universidade Nova de Lisboa, Portugal
Jian Chen, Tsinghua University, China
Shu-Ching Chen, Florida International University, USA
Katsaros Dimitrios, University of Thessaly, Greece
Joshua Huang, Shenzhen Institute of Advanced Technology, China
Sandeep Karamongikar, Infosys Technologies, India
Xiaodong Liu, Edinburgh Napier University, UK
Claus Pahl, Dublin City University, Ireland
Jeremy Ruston, BT & OSMOSOFT, UK
Michiaki Tatsubori, IBM Research, Japan
Li Yang, British Telecom, UK
Liping Zhao, Manchester University, UK
Chen Zhong, Peking University, China
Frank Zhu, University of Alabama in Huntsville, USA
List of Reviewers
José Barata, Universidade Nova de Lisboa, Portugal
Shu-Ching Chen, Florida International University, USA
Jian Chen, Tsinghua University, China
Katsaros Dimitrios, University of Thessaly, Greece
Joshua Huang, Shenzhen Institute of Advanced Technology, China
Sandeep Karamongikar, Infosys Technologies, India
Yang Li, British Telecom, UK
Xiaodong Liu, Edinburgh Napier University, UK
Claus Pahl, Dublin City University, Ireland
Jeremy Ruston, BT & OSMOSOFT, UK
Michiaki Tatsubori, IBM Research – Tokyo, Japan
Liping Zhao, Manchester University, UK
Frank Zhu, University of Alabama in Huntsville, USA
Table of Contents
Preface...................................................................................................................................................xii
Section 1
Service-Based System
Chapter 1
Service Elicitation Method Using Applied Qualitative Research Procedures......................................... 1
Ville Alkkiomäki, Lappeenranta University of Technology, Finland
Kari Smolander, Lappeenranta University of Technology, Finland
Chapter 2
The Design Principles and Practices of Interoperable Smart Spaces.................................................... 18
Eila Ovaska, VTT Technical Research Centre of Finland, Finland
Tullio Salmon Cinotti, Università di Bologna, Italy
Alessandra Toninelli, INRIA, France
Chapter 3
Principle for Engineering Service Based System by Swirl Computing.
................................................ 48
Shigeki Sugiyama, University of Gifu, Japan
Lowry Burgess, Carnegie Mellon University, USA
Chapter 4
A Service Component Model and Implementation for Institutional Repositories.
................................ 61
Yong Zhang, Tsinghua University, China
Quansong Deng, Tsinghua University, China
Chunxiao Xing, Tsinghua University, China
Yigang Sun, National Library of China, China
Michael Whitney, University of North Carolina Charlotte, USA
Section 2
Pervasive Services and Internet of Things
Chapter 5
Service Discovery Architecture and Protocol Design for Pervasive Computing.................................. 83
Feng Zhu, University of Alabama in Huntsville, USA
Wei Zhu, Intergraph Co, USA
Matt W. Mutka, Michigan State University, USA
Lionel M. Ni, Hong Kong University of Science and Technology, China
Chapter 6
A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive
Environments....................................................................................................................................... 102
Zakwan Jaroucheh, Edinburgh Napier University, UK
Xiaodong Liu, Edinburgh Napier University, UK
Sally Smith, Edinburgh Napier University, UK
Chapter 7
High Level Definition of Event-Based Applications for Pervasive Systems.
...................................... 128
Steffen Ortmann, IHP Microelectronics, Germany
Michael Maaser, IHP Microelectronics, Germany
Peter Langendoerfer, IHP Microelectronics, Germany
Chapter 8
A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile
Convergence Systems.......................................................................................................................... 173
Jaemin Park, Convergence WIBRO BU, KT (Korea Telecom), Republic of Korea
Chapter 9
Community Computing: Multi-Agent Based Computing Paradigm for
Cooperative Pervasive System.
............................................................................................................ 195
Youna Jung, University of Pittsburgh, USA
Minsoo Kim, University of Pittsburgh, USA
Section 3
Clouds and Services
Chapter 10
How to Choose the Right Cloud.......................................................................................................... 219
Stamatia Bibi, Aristotle University of Thessaloniki, Greece
Dimitrios Katsaros, University of Thessaly, Greece
Panayiotis Bozanis, University of Thessaly, Greece
Chapter 11
Cloud as a Computer.
........................................................................................................................... 241
Vishnu S. Pendyala, Santa Clara University, USA
JoAnne Holliday, Santa Clara University, USA
Chapter 12
Principles, Methodology and Tools for Engineering Cloud Computing Systems............................... 250
Luis M. Vaquero, Telefónica Investigación y Desarrollo, Spain
Luis Rodero-Merino, INRIA, France
Juan Cáceres, Telefónica Investigación y Desarrollo, Spain
Clovis Chapman, University College London, UK
Maik Lindner, SAP Research, UK
Fermín Galán, Telefónica Investigación y Desarrollo, Spain
Chapter 13
QoS-Oriented Service Computing: Bringing SOA into Cloud Environment...................................... 274
Xiaoyu Yang, University of Southampton, UK
Compilation of References................................................................................................................ 297
About the Contributors..................................................................................................................... 312
Index.................................................................................................................................................... 319
Preface...................................................................................................................................................xii
Section 1
Service-Based System
Chapter 1
Service Elicitation Method Using Applied Qualitative Research Procedures......................................... 1
Ville Alkkiomäki, Lappeenranta University of Technology, Finland
Kari Smolander, Lappeenranta University of Technology, Finland
This chapter introduces QSE, the Qualitative Service Elicitation method. It applies qualitative research
procedures in service elicitation. Service engineering practice lacks lightweight methods to identify
service candidates in projects with tight schedules. QSE provides a systematic method to analyze require-
ment material in service-oriented systems development with a feasible effort. QSE uses the procedures
of the grounded theory research method to elicit service candidates from business process descriptions
and business use case descriptions. Chapter one describes the method with examples and a case study.
Chapter 2
The Design Principles and Practices of Interoperable Smart Spaces.................................................... 18
Eila Ovaska, VTT Technical Research Centre of Finland, Finland
Tullio Salmon Cinotti, Università di Bologna, Italy
Alessandra Toninelli, INRIA, France
Smart spaces provide information about physical environments, shared with inherently dynamic appli-
cations. This chapter introduces a novel development approach with its focus on two key properties of
smart space applications: the ability to interoperate and behave in a situation-sensitive manner. Sixteen
principles are defined in order to guide the development of an interoperability platform for smart spaces
and on how to create applications on top of it.
Chapter 3
Principle for Engineering Service Based System by Swirl Computing.
................................................ 48
Shigeki Sugiyama, University of Gifu, Japan
Lowry Burgess, Carnegie Mellon University, USA
Detailed Table of Contents
When we look at the living creatures in the world, most of them have the communication methods in
order to recognize within same species each other for protection, getting food, being multiplied, or see-
ing the world, etc. And they mostly use the five senses as the basic mechanisms for the communication
among them in a quite natural way with a seamless manner without any difficult manipulation. These
five senses in those behaviour look like being swirled around their bodies.
Chapter 4
A Service Component Model and Implementation for Institutional Repositories.
................................ 61
Yong Zhang, Tsinghua University, China
Quansong Deng, Tsinghua University, China
Chunxiao Xing, Tsinghua University, China
Yigang Sun, National Library of China, China
Michael Whitney, University of North Carolina Charlotte, USA
With the boom of digital resources, there are urgent requirements to set up and manage Institutional
Repositories (IRs) for companies and/or organizations. Cloud computing opens a new paradigm to build
IRs by providing diverse services. The authors of chapter four apply cloud services in the building of
IRs and present a new model, which is based on digital object model and Service Component Architec-
ture, and consists of five service components, namely ID, metadata, content, log, and annotation service
component.
Section 2
Pervasive Services and Internet of Things
Chapter 5
Service Discovery Architecture and Protocol Design for Pervasive Computing.................................. 83
Feng Zhu, University of Alabama in Huntsville, USA
Wei Zhu, Intergraph Co, USA
Matt W. Mutka, Michigan State University, USA
Lionel M. Ni, Hong Kong University of Science and Technology, China
Service discovery is an essential task in pervasive computing environments. Simple and efficient ser-
vice discovery enables heterogeneous and pervasive computing devices and services to be easier to use.
In this chapter, we discuss the key issues and solutions for service discovery architecture and protocol
design for pervasive computing environments.
Chapter 6
A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive
Environments....................................................................................................................................... 102
Zakwan Jaroucheh, Edinburgh Napier University, UK
Xiaodong Liu, Edinburgh Napier University, UK
Sally Smith, Edinburgh Napier University, UK
The separation of concerns is a promising approach in the design of the context-aware adaptive processes
(CAAPs) where the core logic is designed and implemented separately from the context handling and
adaptation logics. In this respect, this chapter presents a conceptual framework for developing CAAPs
and software infrastructure for efficient context management that together address the known software
engineering challenges and facilitate the design and implementation tasks associated with such context-
aware applications.
Chapter 7
High Level Definition of Event-Based Applications for Pervasive Systems.
...................................... 128
Steffen Ortmann, IHP Microelectronics, Germany
Michael Maaser, IHP Microelectronics, Germany
Peter Langendoerfer, IHP Microelectronics, Germany
Automatic event configuration is accomplished by using a flexible Event Specification Language (ESL)
and Event Decision Trees (EDTs) for distributed detection and determination of real world phenomena.
EDTs autonomously adapt to heterogeneous availability of sensing capabilities by pruning and subscrip-
tion to other nodes for missing information. We present one of numerous simulated scenarios proving
the robustness and energy efficiency with regard to the required network communications. From these,
we learned how to deduce appropriate bounds for configuration of collaboration region and leasing time
by asking for expected properties of the phenomena to be detected.
Chapter 8
A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile
Convergence Systems.......................................................................................................................... 173
Jaemin Park, Convergence WIBRO BU, KT (Korea Telecom), Republic of Korea
This chapter presents the fundamental and security characteristics of UICC and current practices of
UICC-based security services (e.g. banking, stock, network authentication, etc.) in pervasive FMC
systems. Moreover, the author of this chapter proposes a novel UICC-based service security framework
(USF), which implements the essential security functionalities used for FMC services, to provide the
integrated security infrastructure and secure FMC services.
Chapter 9
Community Computing: Multi-Agent Based Computing Paradigm for
Cooperative Pervasive System.
............................................................................................................ 195
Youna Jung, University of Pittsburgh, USA
Minsoo Kim, University of Pittsburgh, USA
In this chapter, the authors’ contribution is to organize previous work related to cooperation and then
clearly present the position of community computing in comparison. In addition, they refine the proposed
two models including all their intermediate models in the development process, such as CCM (Com-
munity Computing Model), CIM-PI (Platform Independent Community Computing Implementation
Model), and CIM-PS (Platform Specific Community Computing Implementation Model).
Section 3
Clouds and Services
Chapter 10
How to Choose the Right Cloud.......................................................................................................... 219
Stamatia Bibi, Aristotle University of Thessaloniki, Greece
Dimitrios Katsaros, University of Thessaly, Greece
Panayiotis Bozanis, University of Thessaly, Greece
Thischapterpresentsastudyofthebasicparametersforestimatingthepotentialinfrastructureandsoftware
costs deriving from building and deploying applications on cloud and on-premise assets. Estimated user
demand and desired quality attributes related to an application are also addressed in this chapter as they
are aspects of the decision problem that also influence the choice between cloud and in-house solutions.
Chapter 11
Cloud as a Computer.
........................................................................................................................... 241
Vishnu S. Pendyala, Santa Clara University, USA
JoAnne Holliday, Santa Clara University, USA
This chapter explores the various aspects of Cloud Computing and makes predictions as to the future
directions for research in this area. Some of the issues facing the paradigm shift that Cloud Computing
represents are discussed and possible solutions presented.
Chapter 12
Principles, Methodology and Tools for Engineering Cloud Computing Systems............................... 250
Luis M. Vaquero, Telefónica Investigación y Desarrollo, Spain
Luis Rodero-Merino, INRIA, France
Juan Cáceres, Telefónica Investigación y Desarrollo, Spain
Clovis Chapman, University College London, UK
Maik Lindner, SAP Research, UK
Fermín Galán, Telefónica Investigación y Desarrollo, Spain
Cloud computing has emerged as a paradigm to provide every networked resource as a service. The
Cloud has also introduced a new way to control cloud services (mainly due to the illusion of infinite
resources and its on-demand and pay-per-use nature). Here, we present this lifecycle and highlight re-
cent research initiatives that serve as a support for appropriately engineering Cloud systems during the
different stages of its lifecycle.
Chapter 13
QoS-Oriented Service Computing: Bringing SOA into Cloud Environment...................................... 274
Xiaoyu Yang, University of Southampton, UK
Theideaofcloudcomputingalignswithnewdimensionemerginginservice-orientedinfrastructurewhere
service provider does not own physical infrastructure but instead outsources to dedicated infrastructure
providers. Cloud computing has now become a new computing paradigm as it can provide scalable IT
infrastructure, QoS-assured services, and customizable computing environment.
Compilation of References................................................................................................................ 297
About the Contributors..................................................................................................................... 312
Index.................................................................................................................................................... 319
xii
Preface
Recently, the rapid and fundamental advances in computing technologies have been driving the role and
scope of software systems to a new level. A number of new types of software systems are emerging,
among which service based systems, cloud computing, pervasive computing, and Internet of Things are
eminent examples. For these systems, availability of sound software engineering principles, methodol-
ogy and tool support is mission-critical. However, traditional software engineering approaches are not
fully appropriate for their development and evolution. The limitations of traditional methods in the
context of these emerging software systems have led to many advances of software engineering as a
specialist discipline, but research and development in this context is still immature and many open issues
remain. There is an urgent need for research community and industry practitioners to develop compre-
hensive engineering principles, methodologies, and tool support for the entire software development
lifecycle of these emerging software systems.
Service-Oriented Computing is a computing paradigm that exploits both web services and Service-
Oriented Architecture (SOA) as fundamental elements for developing software systems. This paradigm
changesthewaysoftwaresystemsaredesigned,architected,deliveredandconsumed.Theservice-oriented
paradigm is emerging as a new way to engineer systems that are composed of and exposed as services
for use through standardized protocols.
Cloud Computing is rapidly emerging as the new computing paradigm of the coming decade. The
idea of virtualizing not just hardware but software resources as well has attracted the attention of aca-
demicians as well as the industry. Cloud computing not only offers a viable solution to the problem of
addressing scalability and availability concerns for large-scale applications but also displays the promise
of sharing resources to reduce cost of ownership. The concept has evolved over the years starting from
data centers to present day infrastructure virtualization.
Pervasive and ubiquitous computing are recently emerging paradigms that allow computer sciences
and telecommunication techniques to converge towards ambient intelligence. Here we will focus on
software engineering as a complete and rational production process. We are interested in theoretical
foundations, methodologies, new programming paradigms, solid architectures and middleware, new
technical solutions for the development of user interfaces, and new modalities of interaction.
The “Internet of Things” (IoT) has added a new dimension to the world of information and commu-
nication technologies: next to any-place connectivity for anyone, we will have connectivity to anything.
“Things” are potentially all objects we encounter in our everyday lives. The IoT connects “Things” and
devices to large databases and networks. “Things” carry embedded intelligence, using for example RFID
(Radio Frequency IDentification) as identification system and sensor technologies to detect changes in
their physical status and environment. Future success of the IoT depends not only on technical innova-
xiii
tions in the underlying hardware (wireless sensors, nanotechnology, low power devices, RFIDs), but
also on appropriate software methodologies, technologies, and tools in fields such as operating systems,
middleware, and ubiquitous and pervasive computing technology.
This book of research aims to be the first book that systematically collects the above new approaches
and resultant tools. The book will promote the acceptance and foster further developments of these new
approaches and tools; it will meanwhile speed up the process of commercialization, i.e., pushing the
approaches and tool to industry and market.
The book is helpful to clarify the present chaotic literature of the current state of art and knowledge
in the areas of the design and engineering of those emerging software systems. The book will facilitate
the exchange and evolution of the above software engineering advances among multiple disciplines,
research,industry,andusercommunities.Thebookwillsystematicallyexpandtheknowledgeoftheread-
ers with novel approaches and tools on the engineering of the four types of emerging software systems,
their best application practice and future trends. It will trigger further ideas on research, development,
and commercialization.
The book targets a spectrum of readers, including researchers, practitioners, educators and students
and even part of the end users in software engineering, computing, networks and distributed systems,
and information systems.
Xiaodong Liu
Edinburgh Napier University, UK
Yang Li
British Telecom, UK
Section 1
Service-Based System
1
Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 1
DOI: 10.4018/978-1-60960-735-7.ch001
INTRODUCTION
For enterprises, the promise of service-oriented
computing is to rapidly create low-cost applica-
tions out of reusable and loosely coupled services
(Cherbakov, Galambos, Harishankar, Kalyana,
& Rackham, 2005). This promise is tempting,
as the radical business process redesign projects
are risky and expensive (Jarvenpaa & Stoddard,
1998;Sarker&Lee,1999).Service-orientedcom-
puting can provide a way to make great changes
in smaller portions by componentizing both the
business and the IT and by incrementally build-
ing on top of existing assets (Bieberstein, Bose,
Fiammante, Jones, & Shah, 2006; Cherbakov
et al., 2005). Transforming an enterprise into a
service-orientedoneisacomplextaskandtherole
of IT is no longer supportive, but has often a key
role in the change. Alignment between the busi-
ness and IT is the key towards a service-oriented
Ville Alkkiomäki
Lappeenranta University of Technology, Finland
Kari Smolander
Lappeenranta University of Technology, Finland
Service Elicitation Method
Using Applied Qualitative
Research Procedures
ABSTRACT
This chapter introduces QSE, the Qualitative Service Elicitation method. It applies qualitative research
procedures in service elicitation. Service engineering practice lacks lightweight methods to identify
service candidates in projects with tight schedules. QSE provides a systematic method to analyze require-
ment material in service-oriented systems development with a feasible effort. QSE uses the procedures
of the grounded theory research method to elicit service candidates from business process descriptions
and business use case descriptions. The chapter describes the method with examples and a case study.
2
Service Elicitation Method Using Applied Qualitative Research Procedures
enterprise,andtheimplementationoftheservices
should be prioritized to support the incremental
transformation of the enterprise. (Bieberstein et
al., 2006; Cherbakov et al., 2005)
Inthischapter,weproposeQualitativeService
Elicitation, QSE, a new systematic method to be
usedinserviceelicitation.QSEprovidespractical
means to prioritize and identify reusable service
candidates in an enterprise context. The method
is presented with an example of how to apply it
in a sample project. The method is also tested in a
real world project, and a case study of the project
is provided.
THE CHALLENGE OF
SERVICE ELICITATION
The service oriented approach differs funda-
mentally from the conventional development
paradigms in the key concept of dynamically
accessible services. The scope and performance
of services are under constant development to
support an increasing number of consumers.
Components and objects do not provide this
kind of run-time flexibility. Likewise, traditional
requirement engineering practices do not support
service composition nor do they encourage the
identification of reusable services. (Papazoglou,
Traverso, Dustdar, Leymann, & Kramer, 2006;
VanNuffel,2007;Zimmermann,Schlimm,Waller,
& Pestel, 2005)
Papazoglou et al. (2006) have listed the main
challengesoftheservice-orientedengineeringdo-
mainintheirresearchroadmap.Novelapproaches
are required in service engineering to address the
current challenges and to provide sound methods
thatallowenterprisestodesignanddeployservices
more efficiently while adapting to the changes
matching the rate and pace of the business.
The QSE approach addresses some of the
challengesidentifiedbyPapazoglouetal.(2006).
For example, QSE supports the refinement of
service compositions and links the compositions
to service candidates identified in the projects.
Similarly, QSE provides practical means to build
anenterpriselevelservicecatalogue,whichcanbe
used in gap analysis. Additionally, the catalogue
providesagroundforrefiningtherightgranularity
oftheservices.Themethoditselfdoesnotprovide
automationintheanalysis,butprovidessystematic
proceduresfortheanalysis,thushelpingtoreduce
human errors. To enable systematic analysis, we
have taken ingredients from research methodol-
ogy.Webelieveserviceelicitationbynaturemuch
resembles qualitative research.
Theidentificationofserviceshasbeenstudied
for some time and various methods already exist,
but they focus on specific areas and the elicitation
of specific types of services.Asurvey by Ramol-
lari et al. (2007) lists ten different methods with
varying coverage of the SOA project life cycle.
Arsanjani (2005) classifies the SOA approaches
into six categories: business process driven, tool-
basedMDA,wraplegacy,componentizedlegacy,
data driven and message driven approaches.
The existing approaches can be used to elicit
certain types of services, but fail to provide a
generic solution. SOMA combines features also
from other disciplines, but it can be seen more
as a collection of methods than a single method
(Arsanjani et al., 2008). QSE borrows elements
suitable for top-down analysis from several of the
approaches above. QSE is a top-down analysis
method, which starts from business process de-
scriptions and digs down to the essentials of the
service candidates with the help of business use
cases. Elements from the existing process driven,
data driven and message driven methods have
been included in QSE.
QSE is meant only to analyze business pro-
cesses, not to design them. Completely different
approaches, such as The MIT Process Handbook
(Walker,2006),areneededfordesigningbusiness
processes.
3
Service Elicitation Method Using Applied Qualitative Research Procedures
Process Driven Services
Process driven SOA is a popular approach, and
business processes can be seen as an ideal source
for reusable services (Papazoglou et al., 2006;
Van Nuffel, 2007). Various methods have been
proposed to map and align services with business
processes, but the field is somewhat dispersed
with various engineering approaches and a vast
numberofdifferentbusinessprocessandworkflow
modeling languages.
The survey conducted by Papazoglou et al.
(2004) identified two basic classes for complex
web services: programmatic and interactive web
services. Programmatic services encapsulate
atomic business logic functionality to be used by
other applications to build new applications. In-
teractive services include the logic for interacting
with a user through the presentation service of a
web application. The logic can contain the multi-
step behavior of an interactive business process.
Patterns can be used to identify services in
generic problem areas as long as they fit into the
pre-definedscenarios.Differentlevelsofpatterns
have been proposed in the area. For example
Endrei at al. (2004) propose business patterns to
be used to identify services in common business
scenarios, while Zdyn et al. (2007) use more
primitive software patterns to build processes out
of building blocks.
SOMA(service-oriented modeling and archi-
tecture) is a software development method for
SOA-based solutions containing a set of methods
to support all phases of the SOAdevelopment (A.
Arsanjani et al., 2008). SOMA provides several
complementary methods to identify flows by
analyzing business goals, business processes, as
well as existing IT assets. However, details of the
method have not been published.
Lo et al. (2008) propose a reference catalogue
approach, which consists of two parts: a set of
reference business models and a set of business
service patterns. The needed business services
are cataloged and used to identify services to be
implemented.
There are also several methods using ele-
ments from product line engineering to manage
the service specifications and production of new
servicevariantsbasedonanalyzedneeds.Inthese
approaches, the services are seen as reusable ap-
plication elements, which can be used to build
new applications. (Adam & Doerr, 2008; Moon,
Hong, & Yeom, 2008)
Overall, the methods above try to identify
common process elements within the enterprise,
some utilizing also familiar patterns from other
enterprises to support the work.
Data Driven Services
The basic idea behind the data driven SOA or
“Information as a Service” (IaaS) approach (Dan,
Johnson, & Arsanjani, 2007) is to decouple the
data and the business logic allowing systems to
sharethesamedataanddataaccesslogic.Thisap-
proachhasgainedagreatdealofinterestlately,and
also the market for IaaS tools is growing rapidly.
ForresterpredictsthemarkettoexceedEnterprise
InformationIntegration(EII),EnterpriseApplica-
tion Integration (EAI) and replication markets in
size in the future (Forrester, 2008).
AsurveybyPapazgolouetal.(2004)liststhree
types of informational services: content services,
information aggregation services and third-party
information syndication services.
SOMA also provides several complementary
methods to analyze information, a method called
“domain decomposition” being the most interest-
ingfromourpointofview(Arsanjanietal.,2008).
In this method, the enterprise is first partitioned
into functional areas, and then, business entities
areidentifiedwithintheareas.Differentvariations
of the business entities are identified to ensure the
reusability of the service design.
Data warehousing is another approach where
data is gathered across the enterprise into a cen-
tralized database from where it can be read for
4
Service Elicitation Method Using Applied Qualitative Research Procedures
business intelligent purposes. Having a unified
view to the enterprise data can be very beneficial
fortheenterprise,andvirtuallyalllargeenterprises
are using this technique (Watson, Goodhue, &
Wixom,2002).Forreportingneeds,itissufficient
tohaveread-onlyaccesstothemasterdata,making
it possible to use a replica of the data instead of
providingfullmasterdatafunctionalities(Walker).
Messaging Based Approach
and Business-to-Business
Communication
The message-driven approach to SOA focuses
on the messages being transmitted between the
systems (Arsanjani, 2005). This approach is well
supported by many current BPM platforms, as
they rely on messaging technologies to facilitate
interactionsbetweenorganizationsrunningpoten-
tially heterogeneous systems (Sadiq, Orlowska,
& Sadiq, 2005).
The message-based approach is popular in
Business-to-Business (B2B) communication,
where several standardization organizations are
developing domain specific message standards.
B2Bcommunicationconsistsofpublicandprivate
processesandtheconnectionsbetweenthesetwo.
PublicprocessescanutilizeB2Bstandards,which
consistnotonlyofthemessageformat,butalsoof
the process of how these messages can be used in
inter-enterprise communication. (Bussler, 2001)
True B2B collaboration requires more so-
phisticated logic than a simple request-response
approach provided by web services, and B2B
communicationisoftenbasedonabusinessagree-
ment between the parties. Models for B2B com-
munication typically require specified sequences
of peer-to-peer message exchanges between the
parties following stateful and long lasting busi-
ness protocol used to orchestrate the underlying
business process. These protocols define the
messages as well as the behavior of the parties
without revealing their internal implementation.
(Bussler, 2001; Papazoglou & Dubray, 2004).
Messaging can also be used to implement
private processes within an enterprise (Bussler,
2001;Sadiqetal.,2005).Servicesandwebservice
technology can also be used to provide access to
theexistingmessaginginfrastructurebyreplacing
the messaging adapters with web service wrap-
pers (Harikumar, Lee, Hae Sool, Haeng-Kon, &
Byeongdo, 2005).
QSE ANALYSIS
QSE is based on two principles. Firstly, it uses
procedures from qualitative research to concep-
tualize and to categorize the service candidates.
Secondly,itusesknowncharacteristicsofreusable
services and the Zachman Framework (1987) as
core categories for the analysis.
Thegroundedtheorywasoriginallyintroduced
by Glaser and Strauss in 1967 and is now widely
usedinqualitativeresearch(Robson,2002;Strauss
& Corbin, 1998). Grounded theory has been pro-
posed to be used in the requirement engineering
practice in earlier studies (Galal & Paul, 1999).
Theuseofpredefinedcorecategoriesisagainstthe
principles of the original grounded theory, but is
necessary to reuse the knowledge of known char-
acteristics of enterprises and services. Therefore,
QSE relies on the assumption that the enterprise
fits into the Zachman Framework (1987) and that
thereusableservicesintheenterprisehavesimilar
characteristics as identified in earlier research.
The QSE analysis consists of three phases:
• Conceptual analysis of the business pro-
cess descriptions
• Conceptual analysis of the project business
use cases
• Identification and prioritization of the ser-
vice candidates using the outcomes of the
analyses
5
Service Elicitation Method Using Applied Qualitative Research Procedures
Core Categories
The Zachman Framework is used as a basis to
discover all of the important aspects of an en-
terprise. John Zachman (1987) developed the
framework in the 1980’s and it “represents the
logical structure for identifying and organizing
the descriptive representations that are important
in the management of the enterprises and to the
development of systems”.
The columns defined in the Zachman Frame-
work(1987)actascorecategoriesinQSEanalysis.
Relevant elements from the service elicitation
point of view should fall into these categories.
The core categories are further divided into
sub-categories based on the service candidate
type characteristics derived from the existing
approaches discussed above. The predefined
categories are merged in Figure 1, and the service
candidatetypesandcharacteristicsusedarelisted
in Table 1.
QSE Process Phases
Developmentprojectsimplementservices,andthe
identification of the services is often based on the
analysis for that particular project only.This does
not enforce that the services created are reusable
in following projects. To provide a wider context
for the service candidates, QSE analysis (Figure
2)startswithaconceptualanalysisofthebusiness
process descriptions, creating a skeleton for the
service categories of the enterprise.
In the next phase, this skeleton is comple-
mented with details from the project material
describing the use cases being implemented in
the actual project.
In the final phase, the service candidates are
prioritizedbasedonhowoftensimilarneedswere
identified at the business process level and how
likelytheyaretobere-usedlater.Bothconceptual
analysis phases are conducted by applying the
basic procedures of the grounded theory (Strauss
& Corbin, 1998) to elicit the basic concepts of
Figure 1. Core categories for an enterprise in service elicitation
Discovering Diverse Content Through
Random Scribd Documents
174
Diagonally across the deck from the stairhead aft of the
ship’s second funnel was a small superstructure, the
little wireless house. Light shone through the open
window at the forward end of the structure. Charlie,
who had never seen an Indian travel over an open
space when the red man didn’t wish to be seen, was
surprised to see Bill and Osceola move forward flat on
their stomachs. With the sinuous, wriggling motion of
snakes, the two slid across the starlit deck. In a few
moments he lost sight of them in the shadow of the
ship’s great funnel.
“Gee,” he thought. “That sure is some stunt. Some day
I’ve got to get one of those guys to show me how they
do it.”
In the obscurity of deep shadow, the two plotters got to
their feet and adjusted their masks.
“Can you see all right?” whispered Bill. “I wasn’t sure
about the eyeholes.”
“I can see. What next?”
“Get that lad in the wireless house from the window. I’ll
take the door.”
“Okay. Good luck!”
“Good luck to you. I’ll wait until I hear you speak.”
“I get you.”
Keeping always within the shadow cast by the big stack,
and careful to avoid the broad ray of light from the open
window, Osceola glided swiftly toward his goal.
175
176
The blond young man who sat at the open window,
dozing, with a magazine in his lap, awoke with a start.
“Stick up your hands and keep them there!” muttered a
low voice.
Just outside the window, the dazed operator saw a
white-faced blur in the darkness. The grim figure behind
the mask held a black object pointed directly at his
head.
Like most North Germans, the wireless expert was a
sensible young man. He held up his hands.
177
Chapter XIII
RESULTS
The Amtonia’s wireless operator heard the door at his
back open and shut.
“Stand up!” ordered a harsh voice.
The man obeyed immediately, his magazine slipping to
the floor. He did not turn to look at this second speaker.
The shiny black object in the hand of the ominous figure
outside the window held his eyes like an electric
magnet.
The chair in which he had been dozing was whisked
away. Strong hands gripped his wrists, brought his arms
downward. With a speed and thoroughness that
bespoke nautical experience, a rope lashed his arms
behind his back, first at the elbows and then at the
wrists.
Next, a cloth was bound over his eyes. A gag, made of a
rolled-up handkerchief was stuffed in his mouth and
fastened by a band of cloth tied at the back of his head.
He felt wads of cotton being placed in his ears and his
ankles were then strapped together. He was grasped by
the shoulders, caught round the knees and lifted to a
narrow couch where a cushion was slipped under his
178
179
head. Deaf, dumb and blind, he nevertheless knew that
he lay on the locker which ran along the farther side of
the room. He also knew that locker to be little more
than a narrow shelf, and at least four feet from the floor.
If he moved an inch, he’d get a tumble. He therefore lay
still and tried to imagine which of the passengers he
had to thank for his present predicament.
“I reckon he’ll do,” said Osceola, studying the bound
figure on the locker. “It’s lucky he didn’t try to put up a
fight. Things might have got messy.”
“Would you have, in his place?” Bill was taking in the
details of the room and spoke rather absently.
“No—can’t say I would. The poor beggar was scared
stiff. That wrench stunt was a happy thought. In the
darkness, I guess it passed darned well for an
automatic!”
“Say, look at the map on the wall over there. These lads
certainly have a system!”
“What are those colored pins stuck all over it supposed
to be—ships?”
“Yes. Ships within a radius of several hundred miles that
have been sending out radio messages.”
“But how does he do it?”
“Oh, I guess our little operator is clever all right. I’m no
wireless expert and there are a lot of gadgets in here
that I don’t understand. Undoubtedly they’re delicate
instruments by which the operator is able to determine
the approximate distance and direction of any ship
sending out messages. You see, he keeps this map
180
constantly before him, charted with the probable
positions of ships. He changes the pins when his new
readings seem to be in error. This is how the noble
Baron knows exactly what is going on in his
neighborhood. Just as if he were looking down on the
sea from the moon with a telescope!”
“That list up there beside the chart is the key to the
colored pins, I suppose.”
“Sure. There’s the Stamford.” Bill pointed to a gray pin.
“Well, here’s where I get busy. The sooner that cruiser
is put wise to our position, the better.”
“But how did you find out where we are?” Osceola
looked his surprise. “When have you had a chance to
shoot the sun? Do you keep a pocket sextant up your
sleeve? Or are you just guessing?”
“Nothing like that. A sight must be taken when the sun
reaches it’s highest point. I got the dope tonight from
Schneider. While you were asleep, I went on the bridge
and got him to give me our position this noon.”
“But that’s more than twelve hours ago!”
“Certainly. But I also found out the speed and direction
we’ve been steaming this afternoon and evening. Where
we are now is a simple sum in arithmetic.”
“I know, but—”
“Gee, fella, when we’re out of this mess, I’ll take a week
or two off and go into detail. But right now, I’ve got to
raise the Stamford!”
181
He sat down in the chair before the sending apparatus
and adjusted the earphones. Then his left hand sought
the sending key and the room was filled with the crash
and snap of electric discharges.
Osceola took up a pencil and pad from the table. For a
moment he scribbled, then placed the written sheet in
front of Bill.
“Go easy!” the message read. “You’ll wake up the whole
ship!”
Bill smiled and shook his head. He was sending call after
call out for the Stamford. In his right hand he held a
pencil. Presently Osceola’s note was passed back with a
few lines scrawled below his own.
“Don’t worry. These fellows are continually sending out
fake messages in order to gain information from other
ships. I’ve heard them. If nothing was sent during this
watch, somebody on the bridge would be sure to smell
a rat.”
Osceola drew up a chair and sat down. Fascinated, he
watched Bill’s left hand pressing the sending key, calling
—calling—calling. The young Seminole’s education had
been academic, not scientific, and his knowledge of
radio was only rudimentary. Although the International
Morse Code of dash-dot letters was as much of a
mystery to him as it is to the average layman, he soon
realized that his friend was sending out the same short
message over and over again.
Suddenly Bill lifted his hand from the key. He smiled at
Osceola, nodded and commenced to write hurriedly on
the pad before him. The Seminole leaned over and
watched intently.
182
183
“This is the Stamford. Who calls?” he read.
Again Bill’s supple fingers pressed out an answer—a
long one this time. And for the next fifteen minutes the
crash and crackle of an electric storm reverberated
through the room.
Presently he stopped.
“You raised the cruiser, I take it.” Osceola only half
stifled a yawn.
“I did that, old sport!” Bill was delighted with his
success. “Got all the dope over in great style. Told the
operator aboard her who I was and a short story of our
capture. Dad probably thinks we were both lost at sea,
you know. The Stamford, will relay a message, assuring
him of our safety. Then I tapped out details of this ship,
the Flying Fish, their crews and armament. Last of all I
gave our position, course and speed. By this time, she
and some other craft of Uncle Sam’s are making tracks
for us.”
“You’re sure a right smart feller, Bill.”
Bill laughed. “I agree with you, Big Chief.”
“About when do you reckon they’ll catch up with us?”
“Sometime tomorrow—or, rather, this afternoon. And
then—boy, oh, boy! There will be one sweet little rough
house!”
“There’ll probably be one aboard this sweet little packet
as you call her, before that,” prophesied the Seminole.
“How come?”
184
185
“The Herr Baron is sure to raise an awful stink when he
finds that lad on the locker!”
“We should fret over that. We’ll both be sleeping the
sleep of the just long before that time!”
“Well, I vote we get out of here and right now. This ain’t
a healthy place for either you or me. And say, I’m dead
enough to go to sleep under an ice-cold shower!”
“Wait a minute. We don’t want to leave any clues. Grab
that paper I was writing on, will you?”
As he talked. Bill was busily engaged in undoing nuts
and screws which he stuffed in his pockets, snapping
wires and playing general havoc with the radio
apparatus.
“Smash that line of glass jars on the shelf with your
wrench,” he added, bringing his own down on the
sending key with a crash. “There isn’t going to be any
radio business aboard the Amtonia when our friends
arrive, if I can help it!”
“What’s to stop the Flying Fish getting wise with their
wireless?” inquired Osceola, who was systematically
wrecking everything within reach.
“Oh, they haven’t much of a wireless outfit aboard the
sub. This bunch of junk in here was the one that
counted.”
“Bunch of junk is right—” Osceola stopped short.
He stood facing a small mirror that hung on the wall
above the wet cells he had just destroyed. Reflected in
186
the small oblong he saw the door to the deck open
slowly—and Baron von Hiemskirk walked into the room.
“So!” he exclaimed harshly. “Passengers—mutiny!”
He got no further. As Osceola jumped for the switch to
snap off the light, Bill dived through the air, tackling the
commander just above his knees. There came a crash
as the Baron’s head hit the deck—then darkness.
Osceola ran to the doorway. The Baron lay prone. Bill
was bending over him.
“Nine—ten—out!” said that young gentleman rather
breathlessly. “Grab his legs, big boy. We’ll move him
inside. It’s a little too public out here for comfort.”
Together they carried the big man into the wireless
house and deposited him on the floor.
“Here’s a bight of rope,” said Bill, switching on the light
again. “Tie up his ankles—I’ll attend to his wrists.”
“Shall we gag him?”
“No, he’s breathing pretty hard. Slight concussion,
probably. The back of his head hit the decking an awful
crack. I don’t want him to choke to death.”
Osceola finished lashing the Baron’s legs together and
stood up. “He’s a right powerful brute. Got a pair of legs
like tree-trunks. Say,” he began to laugh, “I didn’t think
our job would be done up as brown as all this tonight!
That was a swell tackle of yours. The longer he’s out the
better pleased I’ll be. That guy has never made a hit
with me. I’m only sorry I didn’t get a crack at him. If
you’ve got an extra wipe, pass it over. A blindfold won’t
187
188
stop his breathing, and there’s no need for him to know
where he is when he wakes up.”
“Okay. I’ve unhooked the collar of his blouse,” Bill said,
surveying their captive critically. “He’ll do. Give me a
hand with the other guy, now. I’m going to take out his
gag and give him a drink.”
“Going to leave it out?”
“Sure, I’m no inquisitor!”
“But how about it when the pair of them start yelling for
help?”
“With the door and window shut, this place is pretty
well soundproof. Anyway, the Baron isn’t likely to kick
up much of a row—not for a couple of days yet, if I
know the signs. The operator couldn’t hear him if he
did. I’m leaving the cotton in his ears. Make it snappy—I
want to beat it while the going’s good.”
A few minutes later, two dark figures crossed the boat
deck to the stairhead, ran lightly down and after
climbing into their cabin by way of the open port,
hurriedly undressed in the dark.
“By Jove!” Osceola paused in the act of removing a
shoe. “I wonder what became of Charlie?”
“Oh, I guess he’s all right. I told him to vamoose if it
looked like he’d get caught. He’s probably sound asleep
in his bunk by this time.”
“Hope so. He’s a sassy brat, but I wouldn’t want him to
get into trouble with the lads who run this ship. They’re
189
likely to turn nasty when they find their beloved Baron
has cracked his nut.”
“Charlie,” said Bill, “is quite capable of taking care of
himself. Put away those clothes you were wearing. If
anybody comes snooping round here looking for clues,
those civvies would give us away. I’m pretty sure His
Nibs didn’t recognize us. I ducked my head and the
brim of my hat threw my face in shadow. You had your
back turned. Too bad, though, we’d pocketed our masks
—”
“Confound!” Osceola sprang for the door. “I’ve got to go
up there again!”
“But what on earth for? Leave well enough alone, guy.”
“I’ve got to—it’s those handkerchiefs of yours, Bill.”
“The ones we used as blindfolds? By gosh, you’re right.”
“Of course I am. And we were idiots not to remember
that all your wipes are initialled! Well, that was a
bloomer we both made.”
Bill crawled into bed, and pulled up the sheet.
“Oh, no, we didn’t,” he retorted sleepily.
“How come?”
“Har-har! Had you goin’, didn’t I? Why, I changed the
one on the wireless lad—found two in the Baron’s
pockets, y’ see. The one you used on him was his own
—the other’s on his little roommate!”
190
“Well, I’m a son-of-a-seacook! That’s a good one. I
wonder if the rest of the bunch will figure that ‘they
done it all themselves’? Smart work, Bill. You’re as full of
ideas as Martinengo’s ship’s biscuit was of weevils!”
“Right the first and last time. Now shut up! I’m asleep.”
Bill turned over, his back to the room, and buried his
face in his pillow.
191
Chapter XIV
TROUBLE AHEAD
“Isn’t that someone pounding the door?”
“You tell ’em!” sleepily suggested the chief, covering his
face with a pajamaed arm to shut out the morning light.
“Oh, Lord!” Bill groaned and crawled out of bed. He
glanced at his wrist watch. It was exactly seven-thirty.
He unlocked the door and a steward clicked his heels
together and stood at attention.
“Well?” growled Bill.
“Commander Geibel’s compliments, sir—and will the
gentlemen be good enough to meet him at half past
eight in the executive office for officers’ conference.”
“Right-o. Give Commander Geibel our compliments—and
say we’ll be there.”
“Thank you, sir.”
Bill shut the door, and looked over at Osceola. The chief
was fast asleep again. Bill went into the bathroom,
where an ice-cold shower worked wonders. When he
192
returned to the cabin after a strenuous rub with a rough
towel, he carried a dripping sponge with which he
scientifically massaged Osceola’s face.
“Hey there! Cut it out!” The chief sprang from his bed as
though he had had an electric shock.
“What’s the huge idea?” he stormed.
“The Exec.” said Bill, “wants to see us at eight-thirty
sharp. It is now seven-forty-four. And we both want
breakfast, I expect. Get under a shower and you won’t
feel so crabby.”
“Um!” Osceola was considerably subdued by this news.
“Think he smells a rat?”
“Oh, not a chance, so far as we’re concerned. We’d be
in the brig by this time if he did!”
“Good enough!” yawned Osceola, scowling furiously as
he stretched the kinks out of his powerful arms.
“Hop to it, then. I’m nearly dressed—and I’m hungry
enough to eat shoe-leather.”
“All right, all right—don’t lose your shirt over it. I’ll be
with you in a jiffy.” The bathroom door slammed and
again came the sound of rushing water as the shower
was turned on.
At eight-thirty sharp the two lads found Commander
Geibel seated at his desk in the Executive Office, and
took their places among the other ship’s officers. There
was none of the joviality which usually preambled these
meetings. The Amtonia’s commissioned personnel
seemed utterly mute this morning. Instead of the
193
194
accustomed good-natured chaff, the various officers
merely nodded to each other as they took their places
and sat down. Bill noticed that all wore expressions of
deep solemnity, yet the atmosphere of the cabin was
charged with a current of tense excitement.
The nautical clock on the wall struck one bell.
Commander Geibel, who had been studying papers on
his desk blotter, came to life.
“Gentlemen—” he leaned forward, one hand on the
papers before him, “I have here the report of first
assistant wireless operator, Miller. Had I not seen Miller
when he was first found with our beloved captain, I
could not have believed this outrage possible. We, who
have prided ourselves on the most efficient and strict
discipline maintained on this ship, can no longer be
proud. As a number of you gentlemen already know, at
about one o’clock this morning, two passengers who
were masked overpowered Miller in the wireless room
and wrecked the premises. While these vandals were at
work, the Herr Captain, Baron von Hiemskirk, entered
the room, where these ruffians surprised him.”
“Pardon, sir,” interrupted the ship’s first lieutenant,
Lieutenant-Commander Beerman. “It is rumored that
the Herr Baron is seriously injured. Will you be good
enough to ease our minds concerning the Herr Baron’s
condition? I understand that he was knocked
unconscious.”
“That is so, Herr Beerman. I regret to tell you
gentlemen that he is still unconscious, and may
continue in that state for a day or two. Doctor
Thierfelder diagnoses his condition as concussion—a
slight concussion only, I am thankful to say. The Herr
195
Doctor, who is with him now, believes that Baron von
Hiemskirk received a blow from a blunt instrument.
Luckily, his service cap partially protected his head. With
care, and no complications, our Captain will probably be
able to get about again within a week.”
“May I ask,” inquired Bill, “what punishment has been
meted out to the perpetrators of this dastardly crime?”
“I am sorry to say that they have not been
apprehended, Lieutenant.”
“But I thought you spoke of two passengers, Herr
Commander?”
“Miller states that the two men were dressed in civilian
clothes. One of them at least had a revolver with which
he menaced the operator, while the other bound him. As
you know, every passenger, upon boarding this ship,
was searched and his luggage thoroughly inspected for
arms. Another search of their cabins has been made this
morning. No weapons of any description have been
found.”
Lieutenant Schneider caught the Commander’s
attention. “I was on the bridge while this crime was
being committed. During that time, I am certain that
messages were radioed from the wireless room.”
“A very important fact, Herr Schneider, and one
confirmed by Miller. Due to the cotton that had been
placed in his ears, he was unable to decipher anything,
but he is convinced that one or more messages were
sent.”
“Could we not ascertain who among the passengers is
capable of sending such messages?” It was the Chief
196
197
Engineer who spoke.
The Executive Officer shook his head.
“Of course all possible suspects will be questioned,” he
said. “I doubt, however, if we can learn much. Fifteen of
our passengers are yacht owners. Three more are high
executives of broadcasting corporations. Any of these
men may understand wireless. On the other hand, all of
them will probably deny it. But this is not so important.
Outside of broadcasting a description of this ship, they
can have sent little or no information, as they have no
possible means of ascertaining the ship’s position. I
must urge you all, nevertheless, to be more than ever
on the alert. Now, one thing more, and we may go to
our various duties.”
The Executive Officer cleared his throat and proceeded.
“Baron von Hiemskirk keeps muttering over and over in
his delirium, ‘Er ist einer Footballer’—‘He is a football
player—.’ These words may mean nothing; on the other
hand, they may be the means of identifying his
assailants. Until our beloved Captain regains his reason,
nothing can be done about it. Thank you, gentlemen,
for your interest and attention. I bid you all
goodmorning.”
The meeting dispersed, the officers going their several
ways. Bill and Osceola, having no duties to perform,
strolled around the promenade deck.
“It is to be hoped that our beloved Captain does not
regain his reason until this ship has been captured by
the battleships on her trail,” muttered Osceola to Bill,
mimicking the Executive Officer’s formal manner of
address.
198
Bill nodded thoughtfully. “You said a mouthful, boy. I’m
afraid you and I will be in for it good and plenty if he
wakes up beforehand. That bunch we just left are a
dumb crew. But there are no flies on the skipper. He
had our histories down pat from the newspapers when
we met him on the Merrymaid. He’s sure to know you
play on Carlisle and that I’m on the Navy eleven. What
with our previous record, so to speak, in the way of
cleaning up dirty messes, that guy won’t miss any bets.
We’ll be judged on suspicion if nothing else.”
“I wonder why Charlie didn’t warn us that the Baron
was making for the wireless house?”
“Probably didn’t get a chance. If the kid had been
caught, we’d have heard of it before this. Schneider told
me that all passengers are being confined to their
cabins, so we won’t see him today. Charlie and his
doings don’t worry me just now—but the weather
does!”
“What’s the matter with the weather?”
“See that haze over there to the northward? We’re
steaming into fog.”
“You think that even if the Stamford catches up to
within firing distance we might be able to elude her
after all?”
“That’s the big idea. In about half an hour we won’t be
able to see ten feet over the side.”
“Well, maybe we’ll run through it by this afternoon. The
Stamford won’t catch up to us for some hours yet.”
199
200
“Maybe so,” replied Bill. “We’ve done all we could,
anyway. From now on, the job’s up to the Navy.”
“Hello!” cried Osceola, as they swung round the end of
the superstructure and into the long stretch of deck on
the port side. “Look off yonder! What do you make that
out to be?”
Bill shaded his eyes. The glare of the smooth ocean was
dazzling in the sun. Away to the northeast a ship was
nosing out of fog banks that lined the northern horizon.
“That looks to me mighty like a warship!” said the chief
excitedly. “She certainly is humping it, brother. But I
thought the Stamford was to the south of us—and when
she came, she’d come from behind!”
“You’ve certainly got a pair of eyes—and she certainly is
a warship. I can’t make her out very well at that
distance, but she looks to me like a first class cruiser of
the Plymouth type. Dollars to ditchwater the Stamford
wirelessed her! She’s heading for us all right, all right.
Oh, boy—there’s going to be something doing aboard
this packet in two shakes of a lamb’s tail!”
“Thar she blows!” sang out the chief, as the gong and
bugle sounded for action.
“And it’s quite time you and I beat it for our battle
stations. Everything is being made ready for attack. If
we’re late, it won’t look so good.”
Osceola stopped and stared at Bill. “Don’t tell me that
you, a midshipman of the United States Navy, are going
to help these bum pirates fight one of your own
battleships!”
201
202
Bill looked at him and laughed. “Some patriotic little
flagwaver, aren’t you,” he jeered. “No, Herr Junior
Lieutenant, I do not intend to shoot at the Plymouth or
the Reading, or whatever’s the name of that cruiser.
Have you never played hare and hounds, Big Chief?
Well, this time, you and I and everybody on board are
hares. Those two 117-mm. guns forward, and the two
on the poop are all right for scaring passenger liners
and bringing unarmed merchant-men to haul down their
colors. But they haven’t the caliber or the range of
three-quarters of the guns aboard that cruiser. This is
going to be a race—not a battle! Beat it!”
203
Chapter XV
THE CHASE
By the time Bill reached his station on the poop, the
quiet routine aboard the liner had given way to activity.
The Amtonia was awake to the heat and fever of
desperate life.
Lieutenant Schneider, who was in command of the gun,
seized Bill’s arm. “Bolton!” he cried, “look there—she’s
changed her course! She’s going to head us off!”
Shading his eyes with his hand, Bill strained them
toward the northern horizon. The great molten surface
of the sun was already half obliterated by the spreading
bank of fog that turned the sea to dull amethyst.
“I doubt it,” he replied. “If that fog keeps increasing, the
visibility will soon be too poor for the cruiser to get our
range.”
“There is Commander Geibel on the bridge. The ship is
in good hands—that is a blessing!” Lieutenant
Schneider’s tone betrayed his excitement.
“We’re sheering off to starboard—” said Bill. “That’s
good news. It’s going to be a close thing, just the
same.”
204
Schneider jumped on the rail and leaned outward in
order to get a better view of the forward end of the
ship.
“The Exec. has left the bridge!” he cried. “What’s
happened now?”
“Calm down! He’s probably run down the steps and
crossed that gangway to the foremast. Yes, there he is!
See him? He’s climbed up to the lookout. Gosh, that
lad’s got a voice. You can hear him bellowing orders all
over the ship, I’ll bet.”
“He’s a good officer,” admitted the Lieutenant, getting
off the rail. “Too bad the Herr Baron is not able to take
command. He would use the Flying Fish to get us out of
this mess.” He pointed to the submarine racing along off
their starboard quarter. “Donner und Blitzen! I believe
she is going to submerge!”
“The very best thing she could do, under the
circumstances,” Bill asserted. “What would you have her
do—head over yonder and let go a torpedo?”
“Wasn’t she built for that kind of thing?” Lieutenant
Schneider’s tone was still nettled.
“Perhaps she was, but not in a position of this kind.
That cruiser would blow her out of the water before she
got near enough to make a torpedo effective!”
“If that’s the case, why don’t you go aboard her and get
busy with her in the air?”
“And stop both the Flying Fish and ourselves while a
boat is being lowered and I am ferried over to her?
Even if the Amtonia was able to get away, the Flying
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookfinal.com

More Related Content

PDF
Advanced Design Approaches To Emerging Software Systems Principles Methodolog...
PDF
Applications and approaches_to_object_or
PDF
Innovations In Softwaredefined Networking And Network Functions Virtualizatio...
PDF
Emerging Systems Approaches In Information Technologies Concepts Theories And...
PDF
Innovative Information Systems Modelling Techniques Edited By Christos Kallon...
PDF
Resource management of mobile cloud computing networks and environments 1st E...
PDF
Networking And Paralleldistributed Computing Systems Volume 18 Roger Lee
PDF
Ambient Intelligence Wireless Networking And Ubiquitous Computing Mobile Comm...
Advanced Design Approaches To Emerging Software Systems Principles Methodolog...
Applications and approaches_to_object_or
Innovations In Softwaredefined Networking And Network Functions Virtualizatio...
Emerging Systems Approaches In Information Technologies Concepts Theories And...
Innovative Information Systems Modelling Techniques Edited By Christos Kallon...
Resource management of mobile cloud computing networks and environments 1st E...
Networking And Paralleldistributed Computing Systems Volume 18 Roger Lee
Ambient Intelligence Wireless Networking And Ubiquitous Computing Mobile Comm...

Similar to Advanced Design Approaches to Emerging Software Systems Principles Methodologies and Tools Premier Reference Source 1st Edition Xiaodong Liu (20)

PDF
Software Engineering Research, Management and Applications Roger Lee
PDF
Resource management of mobile cloud computing networks and environments 1st E...
PDF
Software Engineering Research, Management and Applications Roger Lee
PDF
Crowdsourcing And Probabilistic Decisionmaking In Software Engineering Emergi...
PDF
Handbook of Research on Mobility and Computing Evolving Technologies and Ubiq...
PDF
Aligning Enterprise System And Software Architectures Ivan Mistrik
PDF
Neuromorphic Computing Systems For Industry 40 22th Edition Dhanasekar S
PDF
X Machines for Agent Based Modeling FLAME Perspectives 1st Edition Mariam Kiran
PDF
Handbook of Research on Geoinformatics 1st Edition Hassan A. Karimi
PDF
Advances and applications in model driven engineering 1st Edition García Díaz
PDF
epdf.pub_real-time-systems-design-and-analysis.pdf
PDF
Strategic Pervasive Computing Applications Emerging Trends 1st Edition Varuna...
PDF
Secure Java For Web Application Development
PDF
Intelligent Methods Systems And Applications In Computing Communications And ...
PDF
Intelligent Methods Systems And Applications In Computing Communications And ...
PDF
Computer And Information Science Roger Lee
PDF
Computer And Information Science Roger Lee
PDF
Information Technology and Systems Proceedings of ICITS 2019 Álvaro Rocha
PDF
A Survey of Building Robust Business Models in Pervasive Computing
PDF
New Trends In Networking Computing Elearning Systems Sciences And Engineering...
Software Engineering Research, Management and Applications Roger Lee
Resource management of mobile cloud computing networks and environments 1st E...
Software Engineering Research, Management and Applications Roger Lee
Crowdsourcing And Probabilistic Decisionmaking In Software Engineering Emergi...
Handbook of Research on Mobility and Computing Evolving Technologies and Ubiq...
Aligning Enterprise System And Software Architectures Ivan Mistrik
Neuromorphic Computing Systems For Industry 40 22th Edition Dhanasekar S
X Machines for Agent Based Modeling FLAME Perspectives 1st Edition Mariam Kiran
Handbook of Research on Geoinformatics 1st Edition Hassan A. Karimi
Advances and applications in model driven engineering 1st Edition García Díaz
epdf.pub_real-time-systems-design-and-analysis.pdf
Strategic Pervasive Computing Applications Emerging Trends 1st Edition Varuna...
Secure Java For Web Application Development
Intelligent Methods Systems And Applications In Computing Communications And ...
Intelligent Methods Systems And Applications In Computing Communications And ...
Computer And Information Science Roger Lee
Computer And Information Science Roger Lee
Information Technology and Systems Proceedings of ICITS 2019 Álvaro Rocha
A Survey of Building Robust Business Models in Pervasive Computing
New Trends In Networking Computing Elearning Systems Sciences And Engineering...
Ad

Recently uploaded (20)

PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
01-Introduction-to-Information-Management.pdf
PDF
Business Ethics Teaching Materials for college
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
VCE English Exam - Section C Student Revision Booklet
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
STATICS OF THE RIGID BODIES Hibbelers.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
Microbial diseases, their pathogenesis and prophylaxis
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Basic Mud Logging Guide for educational purpose
01-Introduction-to-Information-Management.pdf
Business Ethics Teaching Materials for college
102 student loan defaulters named and shamed – Is someone you know on the list?
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
Supply Chain Operations Speaking Notes -ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Ad

Advanced Design Approaches to Emerging Software Systems Principles Methodologies and Tools Premier Reference Source 1st Edition Xiaodong Liu

  • 1. Advanced Design Approaches to Emerging Software Systems Principles Methodologies and Tools Premier Reference Source 1st Edition Xiaodong Liu pdf download https://ebookfinal.com/download/advanced-design-approaches-to- emerging-software-systems-principles-methodologies-and-tools- premier-reference-source-1st-edition-xiaodong-liu/ Explore and download more ebooks or textbooks at ebookfinal.com
  • 2. Here are some recommended products for you. Click the link to download, or explore more at ebookfinal Machine Audition Principles Algorithms and Systems Premier Reference Source 1st Edition Wenwu Wang https://ebookfinal.com/download/machine-audition-principles- algorithms-and-systems-premier-reference-source-1st-edition-wenwu- wang/ Crisis Response and Management and Emerging Information Systems Critical Applications Premier Reference Source 1st Edition Murray E. Jennex https://ebookfinal.com/download/crisis-response-and-management-and- emerging-information-systems-critical-applications-premier-reference- source-1st-edition-murray-e-jennex/ Model Driven Software Development Integrating Quality Assurance Premier Reference Source 1st Edition Jorg Rech https://ebookfinal.com/download/model-driven-software-development- integrating-quality-assurance-premier-reference-source-1st-edition- jorg-rech/ Innovation in Power Control and Optimization Emerging Energy Technologies Premier Reference Source 1st Edition Pandian Vasant https://ebookfinal.com/download/innovation-in-power-control-and- optimization-emerging-energy-technologies-premier-reference- source-1st-edition-pandian-vasant/
  • 3. Dynamic and Advanced Data Mining for Progressing Technological Development Innovations and Systemic Approaches Premier Reference Source 1st Edition A. B. M. Shawkat Ali https://ebookfinal.com/download/dynamic-and-advanced-data-mining-for- progressing-technological-development-innovations-and-systemic- approaches-premier-reference-source-1st-edition-a-b-m-shawkat-ali/ Instructional Design Frameworks and Intercultural Models Premier Reference Source 1st Edition Patricia A. Young https://ebookfinal.com/download/instructional-design-frameworks-and- intercultural-models-premier-reference-source-1st-edition-patricia-a- young/ Knowledge Management for Process Organizational and Marketing Innovation Tools and Methods Premier Reference Source 1st Edition Emma O'Brien https://ebookfinal.com/download/knowledge-management-for-process- organizational-and-marketing-innovation-tools-and-methods-premier- reference-source-1st-edition-emma-obrien/ Temporal Structures in Individual Time Management Practices to Enhance Calendar Tool Design Premier Reference Source 1st Edition Dezhi Wu https://ebookfinal.com/download/temporal-structures-in-individual- time-management-practices-to-enhance-calendar-tool-design-premier- reference-source-1st-edition-dezhi-wu/ Information Systems and New Applications in the Service Sector Models and Methods Premier Reference Source 1st Edition John Wang https://ebookfinal.com/download/information-systems-and-new- applications-in-the-service-sector-models-and-methods-premier- reference-source-1st-edition-john-wang/
  • 5. Advanced Design Approaches to Emerging Software Systems Principles Methodologies and Tools Premier Reference Source 1st Edition Xiaodong Liu Digital Instant Download Author(s): Xiaodong Liu, Yang Li ISBN(s): 9781609607364, 1609607368 Edition: 1 File Details: PDF, 9.76 MB Year: 2011 Language: english
  • 7. Xiaodong Liu Edinburgh Napier University, UK Yang Li British Telecom, UK Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools
  • 8. Advanced design approaches to emerging software systems : principles, methodologies, and tools / Xiaodong Liu and Yang Li, editors. p. cm. Includes bibliographical references and index. Summary: “This book provides relevant theoretical frameworks and the latest empirical research findings in the area, clarifying the present chaotic and confusing literature of the current state of the art and knowledge in the areas of the design and engineering of the many emerging software systems”-- Provided by publisher. ISBN 978-1-60960-735-7 (hardcover) -- ISBN 978-1-60960-736-4 (ebook) -- ISBN 978-1-60960-737-1 (print & perpetual access) 1. Systems software. 2. Application software--Development. 3. Computer networks--Design and construction. I. Liu, Xiaodong, 1966 Oct. 8- II. Li, Yang, 1973- QA76.76.S95A38 2012 004.6--dc23 2011021481 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. Senior Editorial Director: Kristin Klinger Director of Book Publications: Julia Mosemann Editorial Director: Lindsay Johnston Acquisitions Editor: Erika Carter Development Editor: Michael Killian Production Editor: Sean Woznicki Typesetters: Natalie Pronio, Jennifer Romanchak, Milan Vracarich, Jr. Print Coordinator: Jamie Snavely Cover Design: Nick Newcomer Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com Copyright © 2012 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data
  • 9. Editorial Advisory Board José Barata, Universidade Nova de Lisboa, Portugal Jian Chen, Tsinghua University, China Shu-Ching Chen, Florida International University, USA Katsaros Dimitrios, University of Thessaly, Greece Joshua Huang, Shenzhen Institute of Advanced Technology, China Sandeep Karamongikar, Infosys Technologies, India Xiaodong Liu, Edinburgh Napier University, UK Claus Pahl, Dublin City University, Ireland Jeremy Ruston, BT & OSMOSOFT, UK Michiaki Tatsubori, IBM Research, Japan Li Yang, British Telecom, UK Liping Zhao, Manchester University, UK Chen Zhong, Peking University, China Frank Zhu, University of Alabama in Huntsville, USA List of Reviewers José Barata, Universidade Nova de Lisboa, Portugal Shu-Ching Chen, Florida International University, USA Jian Chen, Tsinghua University, China Katsaros Dimitrios, University of Thessaly, Greece Joshua Huang, Shenzhen Institute of Advanced Technology, China Sandeep Karamongikar, Infosys Technologies, India Yang Li, British Telecom, UK Xiaodong Liu, Edinburgh Napier University, UK Claus Pahl, Dublin City University, Ireland Jeremy Ruston, BT & OSMOSOFT, UK Michiaki Tatsubori, IBM Research – Tokyo, Japan Liping Zhao, Manchester University, UK Frank Zhu, University of Alabama in Huntsville, USA
  • 10. Table of Contents Preface...................................................................................................................................................xii Section 1 Service-Based System Chapter 1 Service Elicitation Method Using Applied Qualitative Research Procedures......................................... 1 Ville Alkkiomäki, Lappeenranta University of Technology, Finland Kari Smolander, Lappeenranta University of Technology, Finland Chapter 2 The Design Principles and Practices of Interoperable Smart Spaces.................................................... 18 Eila Ovaska, VTT Technical Research Centre of Finland, Finland Tullio Salmon Cinotti, Università di Bologna, Italy Alessandra Toninelli, INRIA, France Chapter 3 Principle for Engineering Service Based System by Swirl Computing. ................................................ 48 Shigeki Sugiyama, University of Gifu, Japan Lowry Burgess, Carnegie Mellon University, USA Chapter 4 A Service Component Model and Implementation for Institutional Repositories. ................................ 61 Yong Zhang, Tsinghua University, China Quansong Deng, Tsinghua University, China Chunxiao Xing, Tsinghua University, China Yigang Sun, National Library of China, China Michael Whitney, University of North Carolina Charlotte, USA
  • 11. Section 2 Pervasive Services and Internet of Things Chapter 5 Service Discovery Architecture and Protocol Design for Pervasive Computing.................................. 83 Feng Zhu, University of Alabama in Huntsville, USA Wei Zhu, Intergraph Co, USA Matt W. Mutka, Michigan State University, USA Lionel M. Ni, Hong Kong University of Science and Technology, China Chapter 6 A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments....................................................................................................................................... 102 Zakwan Jaroucheh, Edinburgh Napier University, UK Xiaodong Liu, Edinburgh Napier University, UK Sally Smith, Edinburgh Napier University, UK Chapter 7 High Level Definition of Event-Based Applications for Pervasive Systems. ...................................... 128 Steffen Ortmann, IHP Microelectronics, Germany Michael Maaser, IHP Microelectronics, Germany Peter Langendoerfer, IHP Microelectronics, Germany Chapter 8 A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile Convergence Systems.......................................................................................................................... 173 Jaemin Park, Convergence WIBRO BU, KT (Korea Telecom), Republic of Korea Chapter 9 Community Computing: Multi-Agent Based Computing Paradigm for Cooperative Pervasive System. ............................................................................................................ 195 Youna Jung, University of Pittsburgh, USA Minsoo Kim, University of Pittsburgh, USA Section 3 Clouds and Services Chapter 10 How to Choose the Right Cloud.......................................................................................................... 219 Stamatia Bibi, Aristotle University of Thessaloniki, Greece Dimitrios Katsaros, University of Thessaly, Greece Panayiotis Bozanis, University of Thessaly, Greece
  • 12. Chapter 11 Cloud as a Computer. ........................................................................................................................... 241 Vishnu S. Pendyala, Santa Clara University, USA JoAnne Holliday, Santa Clara University, USA Chapter 12 Principles, Methodology and Tools for Engineering Cloud Computing Systems............................... 250 Luis M. Vaquero, Telefónica Investigación y Desarrollo, Spain Luis Rodero-Merino, INRIA, France Juan Cáceres, Telefónica Investigación y Desarrollo, Spain Clovis Chapman, University College London, UK Maik Lindner, SAP Research, UK Fermín Galán, Telefónica Investigación y Desarrollo, Spain Chapter 13 QoS-Oriented Service Computing: Bringing SOA into Cloud Environment...................................... 274 Xiaoyu Yang, University of Southampton, UK Compilation of References................................................................................................................ 297 About the Contributors..................................................................................................................... 312 Index.................................................................................................................................................... 319
  • 13. Preface...................................................................................................................................................xii Section 1 Service-Based System Chapter 1 Service Elicitation Method Using Applied Qualitative Research Procedures......................................... 1 Ville Alkkiomäki, Lappeenranta University of Technology, Finland Kari Smolander, Lappeenranta University of Technology, Finland This chapter introduces QSE, the Qualitative Service Elicitation method. It applies qualitative research procedures in service elicitation. Service engineering practice lacks lightweight methods to identify service candidates in projects with tight schedules. QSE provides a systematic method to analyze require- ment material in service-oriented systems development with a feasible effort. QSE uses the procedures of the grounded theory research method to elicit service candidates from business process descriptions and business use case descriptions. Chapter one describes the method with examples and a case study. Chapter 2 The Design Principles and Practices of Interoperable Smart Spaces.................................................... 18 Eila Ovaska, VTT Technical Research Centre of Finland, Finland Tullio Salmon Cinotti, Università di Bologna, Italy Alessandra Toninelli, INRIA, France Smart spaces provide information about physical environments, shared with inherently dynamic appli- cations. This chapter introduces a novel development approach with its focus on two key properties of smart space applications: the ability to interoperate and behave in a situation-sensitive manner. Sixteen principles are defined in order to guide the development of an interoperability platform for smart spaces and on how to create applications on top of it. Chapter 3 Principle for Engineering Service Based System by Swirl Computing. ................................................ 48 Shigeki Sugiyama, University of Gifu, Japan Lowry Burgess, Carnegie Mellon University, USA Detailed Table of Contents
  • 14. When we look at the living creatures in the world, most of them have the communication methods in order to recognize within same species each other for protection, getting food, being multiplied, or see- ing the world, etc. And they mostly use the five senses as the basic mechanisms for the communication among them in a quite natural way with a seamless manner without any difficult manipulation. These five senses in those behaviour look like being swirled around their bodies. Chapter 4 A Service Component Model and Implementation for Institutional Repositories. ................................ 61 Yong Zhang, Tsinghua University, China Quansong Deng, Tsinghua University, China Chunxiao Xing, Tsinghua University, China Yigang Sun, National Library of China, China Michael Whitney, University of North Carolina Charlotte, USA With the boom of digital resources, there are urgent requirements to set up and manage Institutional Repositories (IRs) for companies and/or organizations. Cloud computing opens a new paradigm to build IRs by providing diverse services. The authors of chapter four apply cloud services in the building of IRs and present a new model, which is based on digital object model and Service Component Architec- ture, and consists of five service components, namely ID, metadata, content, log, and annotation service component. Section 2 Pervasive Services and Internet of Things Chapter 5 Service Discovery Architecture and Protocol Design for Pervasive Computing.................................. 83 Feng Zhu, University of Alabama in Huntsville, USA Wei Zhu, Intergraph Co, USA Matt W. Mutka, Michigan State University, USA Lionel M. Ni, Hong Kong University of Science and Technology, China Service discovery is an essential task in pervasive computing environments. Simple and efficient ser- vice discovery enables heterogeneous and pervasive computing devices and services to be easier to use. In this chapter, we discuss the key issues and solutions for service discovery architecture and protocol design for pervasive computing environments. Chapter 6 A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments....................................................................................................................................... 102 Zakwan Jaroucheh, Edinburgh Napier University, UK Xiaodong Liu, Edinburgh Napier University, UK Sally Smith, Edinburgh Napier University, UK
  • 15. The separation of concerns is a promising approach in the design of the context-aware adaptive processes (CAAPs) where the core logic is designed and implemented separately from the context handling and adaptation logics. In this respect, this chapter presents a conceptual framework for developing CAAPs and software infrastructure for efficient context management that together address the known software engineering challenges and facilitate the design and implementation tasks associated with such context- aware applications. Chapter 7 High Level Definition of Event-Based Applications for Pervasive Systems. ...................................... 128 Steffen Ortmann, IHP Microelectronics, Germany Michael Maaser, IHP Microelectronics, Germany Peter Langendoerfer, IHP Microelectronics, Germany Automatic event configuration is accomplished by using a flexible Event Specification Language (ESL) and Event Decision Trees (EDTs) for distributed detection and determination of real world phenomena. EDTs autonomously adapt to heterogeneous availability of sensing capabilities by pruning and subscrip- tion to other nodes for missing information. We present one of numerous simulated scenarios proving the robustness and energy efficiency with regard to the required network communications. From these, we learned how to deduce appropriate bounds for configuration of collaboration region and leasing time by asking for expected properties of the phenomena to be detected. Chapter 8 A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile Convergence Systems.......................................................................................................................... 173 Jaemin Park, Convergence WIBRO BU, KT (Korea Telecom), Republic of Korea This chapter presents the fundamental and security characteristics of UICC and current practices of UICC-based security services (e.g. banking, stock, network authentication, etc.) in pervasive FMC systems. Moreover, the author of this chapter proposes a novel UICC-based service security framework (USF), which implements the essential security functionalities used for FMC services, to provide the integrated security infrastructure and secure FMC services. Chapter 9 Community Computing: Multi-Agent Based Computing Paradigm for Cooperative Pervasive System. ............................................................................................................ 195 Youna Jung, University of Pittsburgh, USA Minsoo Kim, University of Pittsburgh, USA In this chapter, the authors’ contribution is to organize previous work related to cooperation and then clearly present the position of community computing in comparison. In addition, they refine the proposed two models including all their intermediate models in the development process, such as CCM (Com- munity Computing Model), CIM-PI (Platform Independent Community Computing Implementation Model), and CIM-PS (Platform Specific Community Computing Implementation Model).
  • 16. Section 3 Clouds and Services Chapter 10 How to Choose the Right Cloud.......................................................................................................... 219 Stamatia Bibi, Aristotle University of Thessaloniki, Greece Dimitrios Katsaros, University of Thessaly, Greece Panayiotis Bozanis, University of Thessaly, Greece Thischapterpresentsastudyofthebasicparametersforestimatingthepotentialinfrastructureandsoftware costs deriving from building and deploying applications on cloud and on-premise assets. Estimated user demand and desired quality attributes related to an application are also addressed in this chapter as they are aspects of the decision problem that also influence the choice between cloud and in-house solutions. Chapter 11 Cloud as a Computer. ........................................................................................................................... 241 Vishnu S. Pendyala, Santa Clara University, USA JoAnne Holliday, Santa Clara University, USA This chapter explores the various aspects of Cloud Computing and makes predictions as to the future directions for research in this area. Some of the issues facing the paradigm shift that Cloud Computing represents are discussed and possible solutions presented. Chapter 12 Principles, Methodology and Tools for Engineering Cloud Computing Systems............................... 250 Luis M. Vaquero, Telefónica Investigación y Desarrollo, Spain Luis Rodero-Merino, INRIA, France Juan Cáceres, Telefónica Investigación y Desarrollo, Spain Clovis Chapman, University College London, UK Maik Lindner, SAP Research, UK Fermín Galán, Telefónica Investigación y Desarrollo, Spain Cloud computing has emerged as a paradigm to provide every networked resource as a service. The Cloud has also introduced a new way to control cloud services (mainly due to the illusion of infinite resources and its on-demand and pay-per-use nature). Here, we present this lifecycle and highlight re- cent research initiatives that serve as a support for appropriately engineering Cloud systems during the different stages of its lifecycle. Chapter 13 QoS-Oriented Service Computing: Bringing SOA into Cloud Environment...................................... 274 Xiaoyu Yang, University of Southampton, UK Theideaofcloudcomputingalignswithnewdimensionemerginginservice-orientedinfrastructurewhere service provider does not own physical infrastructure but instead outsources to dedicated infrastructure
  • 17. providers. Cloud computing has now become a new computing paradigm as it can provide scalable IT infrastructure, QoS-assured services, and customizable computing environment. Compilation of References................................................................................................................ 297 About the Contributors..................................................................................................................... 312 Index.................................................................................................................................................... 319
  • 18. xii Preface Recently, the rapid and fundamental advances in computing technologies have been driving the role and scope of software systems to a new level. A number of new types of software systems are emerging, among which service based systems, cloud computing, pervasive computing, and Internet of Things are eminent examples. For these systems, availability of sound software engineering principles, methodol- ogy and tool support is mission-critical. However, traditional software engineering approaches are not fully appropriate for their development and evolution. The limitations of traditional methods in the context of these emerging software systems have led to many advances of software engineering as a specialist discipline, but research and development in this context is still immature and many open issues remain. There is an urgent need for research community and industry practitioners to develop compre- hensive engineering principles, methodologies, and tool support for the entire software development lifecycle of these emerging software systems. Service-Oriented Computing is a computing paradigm that exploits both web services and Service- Oriented Architecture (SOA) as fundamental elements for developing software systems. This paradigm changesthewaysoftwaresystemsaredesigned,architected,deliveredandconsumed.Theservice-oriented paradigm is emerging as a new way to engineer systems that are composed of and exposed as services for use through standardized protocols. Cloud Computing is rapidly emerging as the new computing paradigm of the coming decade. The idea of virtualizing not just hardware but software resources as well has attracted the attention of aca- demicians as well as the industry. Cloud computing not only offers a viable solution to the problem of addressing scalability and availability concerns for large-scale applications but also displays the promise of sharing resources to reduce cost of ownership. The concept has evolved over the years starting from data centers to present day infrastructure virtualization. Pervasive and ubiquitous computing are recently emerging paradigms that allow computer sciences and telecommunication techniques to converge towards ambient intelligence. Here we will focus on software engineering as a complete and rational production process. We are interested in theoretical foundations, methodologies, new programming paradigms, solid architectures and middleware, new technical solutions for the development of user interfaces, and new modalities of interaction. The “Internet of Things” (IoT) has added a new dimension to the world of information and commu- nication technologies: next to any-place connectivity for anyone, we will have connectivity to anything. “Things” are potentially all objects we encounter in our everyday lives. The IoT connects “Things” and devices to large databases and networks. “Things” carry embedded intelligence, using for example RFID (Radio Frequency IDentification) as identification system and sensor technologies to detect changes in their physical status and environment. Future success of the IoT depends not only on technical innova-
  • 19. xiii tions in the underlying hardware (wireless sensors, nanotechnology, low power devices, RFIDs), but also on appropriate software methodologies, technologies, and tools in fields such as operating systems, middleware, and ubiquitous and pervasive computing technology. This book of research aims to be the first book that systematically collects the above new approaches and resultant tools. The book will promote the acceptance and foster further developments of these new approaches and tools; it will meanwhile speed up the process of commercialization, i.e., pushing the approaches and tool to industry and market. The book is helpful to clarify the present chaotic literature of the current state of art and knowledge in the areas of the design and engineering of those emerging software systems. The book will facilitate the exchange and evolution of the above software engineering advances among multiple disciplines, research,industry,andusercommunities.Thebookwillsystematicallyexpandtheknowledgeoftheread- ers with novel approaches and tools on the engineering of the four types of emerging software systems, their best application practice and future trends. It will trigger further ideas on research, development, and commercialization. The book targets a spectrum of readers, including researchers, practitioners, educators and students and even part of the end users in software engineering, computing, networks and distributed systems, and information systems. Xiaodong Liu Edinburgh Napier University, UK Yang Li British Telecom, UK
  • 21. 1 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 1 DOI: 10.4018/978-1-60960-735-7.ch001 INTRODUCTION For enterprises, the promise of service-oriented computing is to rapidly create low-cost applica- tions out of reusable and loosely coupled services (Cherbakov, Galambos, Harishankar, Kalyana, & Rackham, 2005). This promise is tempting, as the radical business process redesign projects are risky and expensive (Jarvenpaa & Stoddard, 1998;Sarker&Lee,1999).Service-orientedcom- puting can provide a way to make great changes in smaller portions by componentizing both the business and the IT and by incrementally build- ing on top of existing assets (Bieberstein, Bose, Fiammante, Jones, & Shah, 2006; Cherbakov et al., 2005). Transforming an enterprise into a service-orientedoneisacomplextaskandtherole of IT is no longer supportive, but has often a key role in the change. Alignment between the busi- ness and IT is the key towards a service-oriented Ville Alkkiomäki Lappeenranta University of Technology, Finland Kari Smolander Lappeenranta University of Technology, Finland Service Elicitation Method Using Applied Qualitative Research Procedures ABSTRACT This chapter introduces QSE, the Qualitative Service Elicitation method. It applies qualitative research procedures in service elicitation. Service engineering practice lacks lightweight methods to identify service candidates in projects with tight schedules. QSE provides a systematic method to analyze require- ment material in service-oriented systems development with a feasible effort. QSE uses the procedures of the grounded theory research method to elicit service candidates from business process descriptions and business use case descriptions. The chapter describes the method with examples and a case study.
  • 22. 2 Service Elicitation Method Using Applied Qualitative Research Procedures enterprise,andtheimplementationoftheservices should be prioritized to support the incremental transformation of the enterprise. (Bieberstein et al., 2006; Cherbakov et al., 2005) Inthischapter,weproposeQualitativeService Elicitation, QSE, a new systematic method to be usedinserviceelicitation.QSEprovidespractical means to prioritize and identify reusable service candidates in an enterprise context. The method is presented with an example of how to apply it in a sample project. The method is also tested in a real world project, and a case study of the project is provided. THE CHALLENGE OF SERVICE ELICITATION The service oriented approach differs funda- mentally from the conventional development paradigms in the key concept of dynamically accessible services. The scope and performance of services are under constant development to support an increasing number of consumers. Components and objects do not provide this kind of run-time flexibility. Likewise, traditional requirement engineering practices do not support service composition nor do they encourage the identification of reusable services. (Papazoglou, Traverso, Dustdar, Leymann, & Kramer, 2006; VanNuffel,2007;Zimmermann,Schlimm,Waller, & Pestel, 2005) Papazoglou et al. (2006) have listed the main challengesoftheservice-orientedengineeringdo- mainintheirresearchroadmap.Novelapproaches are required in service engineering to address the current challenges and to provide sound methods thatallowenterprisestodesignanddeployservices more efficiently while adapting to the changes matching the rate and pace of the business. The QSE approach addresses some of the challengesidentifiedbyPapazoglouetal.(2006). For example, QSE supports the refinement of service compositions and links the compositions to service candidates identified in the projects. Similarly, QSE provides practical means to build anenterpriselevelservicecatalogue,whichcanbe used in gap analysis. Additionally, the catalogue providesagroundforrefiningtherightgranularity oftheservices.Themethoditselfdoesnotprovide automationintheanalysis,butprovidessystematic proceduresfortheanalysis,thushelpingtoreduce human errors. To enable systematic analysis, we have taken ingredients from research methodol- ogy.Webelieveserviceelicitationbynaturemuch resembles qualitative research. Theidentificationofserviceshasbeenstudied for some time and various methods already exist, but they focus on specific areas and the elicitation of specific types of services.Asurvey by Ramol- lari et al. (2007) lists ten different methods with varying coverage of the SOA project life cycle. Arsanjani (2005) classifies the SOA approaches into six categories: business process driven, tool- basedMDA,wraplegacy,componentizedlegacy, data driven and message driven approaches. The existing approaches can be used to elicit certain types of services, but fail to provide a generic solution. SOMA combines features also from other disciplines, but it can be seen more as a collection of methods than a single method (Arsanjani et al., 2008). QSE borrows elements suitable for top-down analysis from several of the approaches above. QSE is a top-down analysis method, which starts from business process de- scriptions and digs down to the essentials of the service candidates with the help of business use cases. Elements from the existing process driven, data driven and message driven methods have been included in QSE. QSE is meant only to analyze business pro- cesses, not to design them. Completely different approaches, such as The MIT Process Handbook (Walker,2006),areneededfordesigningbusiness processes.
  • 23. 3 Service Elicitation Method Using Applied Qualitative Research Procedures Process Driven Services Process driven SOA is a popular approach, and business processes can be seen as an ideal source for reusable services (Papazoglou et al., 2006; Van Nuffel, 2007). Various methods have been proposed to map and align services with business processes, but the field is somewhat dispersed with various engineering approaches and a vast numberofdifferentbusinessprocessandworkflow modeling languages. The survey conducted by Papazoglou et al. (2004) identified two basic classes for complex web services: programmatic and interactive web services. Programmatic services encapsulate atomic business logic functionality to be used by other applications to build new applications. In- teractive services include the logic for interacting with a user through the presentation service of a web application. The logic can contain the multi- step behavior of an interactive business process. Patterns can be used to identify services in generic problem areas as long as they fit into the pre-definedscenarios.Differentlevelsofpatterns have been proposed in the area. For example Endrei at al. (2004) propose business patterns to be used to identify services in common business scenarios, while Zdyn et al. (2007) use more primitive software patterns to build processes out of building blocks. SOMA(service-oriented modeling and archi- tecture) is a software development method for SOA-based solutions containing a set of methods to support all phases of the SOAdevelopment (A. Arsanjani et al., 2008). SOMA provides several complementary methods to identify flows by analyzing business goals, business processes, as well as existing IT assets. However, details of the method have not been published. Lo et al. (2008) propose a reference catalogue approach, which consists of two parts: a set of reference business models and a set of business service patterns. The needed business services are cataloged and used to identify services to be implemented. There are also several methods using ele- ments from product line engineering to manage the service specifications and production of new servicevariantsbasedonanalyzedneeds.Inthese approaches, the services are seen as reusable ap- plication elements, which can be used to build new applications. (Adam & Doerr, 2008; Moon, Hong, & Yeom, 2008) Overall, the methods above try to identify common process elements within the enterprise, some utilizing also familiar patterns from other enterprises to support the work. Data Driven Services The basic idea behind the data driven SOA or “Information as a Service” (IaaS) approach (Dan, Johnson, & Arsanjani, 2007) is to decouple the data and the business logic allowing systems to sharethesamedataanddataaccesslogic.Thisap- proachhasgainedagreatdealofinterestlately,and also the market for IaaS tools is growing rapidly. ForresterpredictsthemarkettoexceedEnterprise InformationIntegration(EII),EnterpriseApplica- tion Integration (EAI) and replication markets in size in the future (Forrester, 2008). AsurveybyPapazgolouetal.(2004)liststhree types of informational services: content services, information aggregation services and third-party information syndication services. SOMA also provides several complementary methods to analyze information, a method called “domain decomposition” being the most interest- ingfromourpointofview(Arsanjanietal.,2008). In this method, the enterprise is first partitioned into functional areas, and then, business entities areidentifiedwithintheareas.Differentvariations of the business entities are identified to ensure the reusability of the service design. Data warehousing is another approach where data is gathered across the enterprise into a cen- tralized database from where it can be read for
  • 24. 4 Service Elicitation Method Using Applied Qualitative Research Procedures business intelligent purposes. Having a unified view to the enterprise data can be very beneficial fortheenterprise,andvirtuallyalllargeenterprises are using this technique (Watson, Goodhue, & Wixom,2002).Forreportingneeds,itissufficient tohaveread-onlyaccesstothemasterdata,making it possible to use a replica of the data instead of providingfullmasterdatafunctionalities(Walker). Messaging Based Approach and Business-to-Business Communication The message-driven approach to SOA focuses on the messages being transmitted between the systems (Arsanjani, 2005). This approach is well supported by many current BPM platforms, as they rely on messaging technologies to facilitate interactionsbetweenorganizationsrunningpoten- tially heterogeneous systems (Sadiq, Orlowska, & Sadiq, 2005). The message-based approach is popular in Business-to-Business (B2B) communication, where several standardization organizations are developing domain specific message standards. B2Bcommunicationconsistsofpublicandprivate processesandtheconnectionsbetweenthesetwo. PublicprocessescanutilizeB2Bstandards,which consistnotonlyofthemessageformat,butalsoof the process of how these messages can be used in inter-enterprise communication. (Bussler, 2001) True B2B collaboration requires more so- phisticated logic than a simple request-response approach provided by web services, and B2B communicationisoftenbasedonabusinessagree- ment between the parties. Models for B2B com- munication typically require specified sequences of peer-to-peer message exchanges between the parties following stateful and long lasting busi- ness protocol used to orchestrate the underlying business process. These protocols define the messages as well as the behavior of the parties without revealing their internal implementation. (Bussler, 2001; Papazoglou & Dubray, 2004). Messaging can also be used to implement private processes within an enterprise (Bussler, 2001;Sadiqetal.,2005).Servicesandwebservice technology can also be used to provide access to theexistingmessaginginfrastructurebyreplacing the messaging adapters with web service wrap- pers (Harikumar, Lee, Hae Sool, Haeng-Kon, & Byeongdo, 2005). QSE ANALYSIS QSE is based on two principles. Firstly, it uses procedures from qualitative research to concep- tualize and to categorize the service candidates. Secondly,itusesknowncharacteristicsofreusable services and the Zachman Framework (1987) as core categories for the analysis. Thegroundedtheorywasoriginallyintroduced by Glaser and Strauss in 1967 and is now widely usedinqualitativeresearch(Robson,2002;Strauss & Corbin, 1998). Grounded theory has been pro- posed to be used in the requirement engineering practice in earlier studies (Galal & Paul, 1999). Theuseofpredefinedcorecategoriesisagainstthe principles of the original grounded theory, but is necessary to reuse the knowledge of known char- acteristics of enterprises and services. Therefore, QSE relies on the assumption that the enterprise fits into the Zachman Framework (1987) and that thereusableservicesintheenterprisehavesimilar characteristics as identified in earlier research. The QSE analysis consists of three phases: • Conceptual analysis of the business pro- cess descriptions • Conceptual analysis of the project business use cases • Identification and prioritization of the ser- vice candidates using the outcomes of the analyses
  • 25. 5 Service Elicitation Method Using Applied Qualitative Research Procedures Core Categories The Zachman Framework is used as a basis to discover all of the important aspects of an en- terprise. John Zachman (1987) developed the framework in the 1980’s and it “represents the logical structure for identifying and organizing the descriptive representations that are important in the management of the enterprises and to the development of systems”. The columns defined in the Zachman Frame- work(1987)actascorecategoriesinQSEanalysis. Relevant elements from the service elicitation point of view should fall into these categories. The core categories are further divided into sub-categories based on the service candidate type characteristics derived from the existing approaches discussed above. The predefined categories are merged in Figure 1, and the service candidatetypesandcharacteristicsusedarelisted in Table 1. QSE Process Phases Developmentprojectsimplementservices,andthe identification of the services is often based on the analysis for that particular project only.This does not enforce that the services created are reusable in following projects. To provide a wider context for the service candidates, QSE analysis (Figure 2)startswithaconceptualanalysisofthebusiness process descriptions, creating a skeleton for the service categories of the enterprise. In the next phase, this skeleton is comple- mented with details from the project material describing the use cases being implemented in the actual project. In the final phase, the service candidates are prioritizedbasedonhowoftensimilarneedswere identified at the business process level and how likelytheyaretobere-usedlater.Bothconceptual analysis phases are conducted by applying the basic procedures of the grounded theory (Strauss & Corbin, 1998) to elicit the basic concepts of Figure 1. Core categories for an enterprise in service elicitation
  • 26. Discovering Diverse Content Through Random Scribd Documents
  • 27. 174 Diagonally across the deck from the stairhead aft of the ship’s second funnel was a small superstructure, the little wireless house. Light shone through the open window at the forward end of the structure. Charlie, who had never seen an Indian travel over an open space when the red man didn’t wish to be seen, was surprised to see Bill and Osceola move forward flat on their stomachs. With the sinuous, wriggling motion of snakes, the two slid across the starlit deck. In a few moments he lost sight of them in the shadow of the ship’s great funnel. “Gee,” he thought. “That sure is some stunt. Some day I’ve got to get one of those guys to show me how they do it.” In the obscurity of deep shadow, the two plotters got to their feet and adjusted their masks. “Can you see all right?” whispered Bill. “I wasn’t sure about the eyeholes.” “I can see. What next?” “Get that lad in the wireless house from the window. I’ll take the door.” “Okay. Good luck!” “Good luck to you. I’ll wait until I hear you speak.” “I get you.” Keeping always within the shadow cast by the big stack, and careful to avoid the broad ray of light from the open window, Osceola glided swiftly toward his goal.
  • 28. 175 176 The blond young man who sat at the open window, dozing, with a magazine in his lap, awoke with a start. “Stick up your hands and keep them there!” muttered a low voice. Just outside the window, the dazed operator saw a white-faced blur in the darkness. The grim figure behind the mask held a black object pointed directly at his head. Like most North Germans, the wireless expert was a sensible young man. He held up his hands.
  • 29. 177 Chapter XIII RESULTS The Amtonia’s wireless operator heard the door at his back open and shut. “Stand up!” ordered a harsh voice. The man obeyed immediately, his magazine slipping to the floor. He did not turn to look at this second speaker. The shiny black object in the hand of the ominous figure outside the window held his eyes like an electric magnet. The chair in which he had been dozing was whisked away. Strong hands gripped his wrists, brought his arms downward. With a speed and thoroughness that bespoke nautical experience, a rope lashed his arms behind his back, first at the elbows and then at the wrists. Next, a cloth was bound over his eyes. A gag, made of a rolled-up handkerchief was stuffed in his mouth and fastened by a band of cloth tied at the back of his head. He felt wads of cotton being placed in his ears and his ankles were then strapped together. He was grasped by the shoulders, caught round the knees and lifted to a narrow couch where a cushion was slipped under his
  • 30. 178 179 head. Deaf, dumb and blind, he nevertheless knew that he lay on the locker which ran along the farther side of the room. He also knew that locker to be little more than a narrow shelf, and at least four feet from the floor. If he moved an inch, he’d get a tumble. He therefore lay still and tried to imagine which of the passengers he had to thank for his present predicament. “I reckon he’ll do,” said Osceola, studying the bound figure on the locker. “It’s lucky he didn’t try to put up a fight. Things might have got messy.” “Would you have, in his place?” Bill was taking in the details of the room and spoke rather absently. “No—can’t say I would. The poor beggar was scared stiff. That wrench stunt was a happy thought. In the darkness, I guess it passed darned well for an automatic!” “Say, look at the map on the wall over there. These lads certainly have a system!” “What are those colored pins stuck all over it supposed to be—ships?” “Yes. Ships within a radius of several hundred miles that have been sending out radio messages.” “But how does he do it?” “Oh, I guess our little operator is clever all right. I’m no wireless expert and there are a lot of gadgets in here that I don’t understand. Undoubtedly they’re delicate instruments by which the operator is able to determine the approximate distance and direction of any ship sending out messages. You see, he keeps this map
  • 31. 180 constantly before him, charted with the probable positions of ships. He changes the pins when his new readings seem to be in error. This is how the noble Baron knows exactly what is going on in his neighborhood. Just as if he were looking down on the sea from the moon with a telescope!” “That list up there beside the chart is the key to the colored pins, I suppose.” “Sure. There’s the Stamford.” Bill pointed to a gray pin. “Well, here’s where I get busy. The sooner that cruiser is put wise to our position, the better.” “But how did you find out where we are?” Osceola looked his surprise. “When have you had a chance to shoot the sun? Do you keep a pocket sextant up your sleeve? Or are you just guessing?” “Nothing like that. A sight must be taken when the sun reaches it’s highest point. I got the dope tonight from Schneider. While you were asleep, I went on the bridge and got him to give me our position this noon.” “But that’s more than twelve hours ago!” “Certainly. But I also found out the speed and direction we’ve been steaming this afternoon and evening. Where we are now is a simple sum in arithmetic.” “I know, but—” “Gee, fella, when we’re out of this mess, I’ll take a week or two off and go into detail. But right now, I’ve got to raise the Stamford!”
  • 32. 181 He sat down in the chair before the sending apparatus and adjusted the earphones. Then his left hand sought the sending key and the room was filled with the crash and snap of electric discharges. Osceola took up a pencil and pad from the table. For a moment he scribbled, then placed the written sheet in front of Bill. “Go easy!” the message read. “You’ll wake up the whole ship!” Bill smiled and shook his head. He was sending call after call out for the Stamford. In his right hand he held a pencil. Presently Osceola’s note was passed back with a few lines scrawled below his own. “Don’t worry. These fellows are continually sending out fake messages in order to gain information from other ships. I’ve heard them. If nothing was sent during this watch, somebody on the bridge would be sure to smell a rat.” Osceola drew up a chair and sat down. Fascinated, he watched Bill’s left hand pressing the sending key, calling —calling—calling. The young Seminole’s education had been academic, not scientific, and his knowledge of radio was only rudimentary. Although the International Morse Code of dash-dot letters was as much of a mystery to him as it is to the average layman, he soon realized that his friend was sending out the same short message over and over again. Suddenly Bill lifted his hand from the key. He smiled at Osceola, nodded and commenced to write hurriedly on the pad before him. The Seminole leaned over and watched intently.
  • 33. 182 183 “This is the Stamford. Who calls?” he read. Again Bill’s supple fingers pressed out an answer—a long one this time. And for the next fifteen minutes the crash and crackle of an electric storm reverberated through the room. Presently he stopped. “You raised the cruiser, I take it.” Osceola only half stifled a yawn. “I did that, old sport!” Bill was delighted with his success. “Got all the dope over in great style. Told the operator aboard her who I was and a short story of our capture. Dad probably thinks we were both lost at sea, you know. The Stamford, will relay a message, assuring him of our safety. Then I tapped out details of this ship, the Flying Fish, their crews and armament. Last of all I gave our position, course and speed. By this time, she and some other craft of Uncle Sam’s are making tracks for us.” “You’re sure a right smart feller, Bill.” Bill laughed. “I agree with you, Big Chief.” “About when do you reckon they’ll catch up with us?” “Sometime tomorrow—or, rather, this afternoon. And then—boy, oh, boy! There will be one sweet little rough house!” “There’ll probably be one aboard this sweet little packet as you call her, before that,” prophesied the Seminole. “How come?”
  • 34. 184 185 “The Herr Baron is sure to raise an awful stink when he finds that lad on the locker!” “We should fret over that. We’ll both be sleeping the sleep of the just long before that time!” “Well, I vote we get out of here and right now. This ain’t a healthy place for either you or me. And say, I’m dead enough to go to sleep under an ice-cold shower!” “Wait a minute. We don’t want to leave any clues. Grab that paper I was writing on, will you?” As he talked. Bill was busily engaged in undoing nuts and screws which he stuffed in his pockets, snapping wires and playing general havoc with the radio apparatus. “Smash that line of glass jars on the shelf with your wrench,” he added, bringing his own down on the sending key with a crash. “There isn’t going to be any radio business aboard the Amtonia when our friends arrive, if I can help it!” “What’s to stop the Flying Fish getting wise with their wireless?” inquired Osceola, who was systematically wrecking everything within reach. “Oh, they haven’t much of a wireless outfit aboard the sub. This bunch of junk in here was the one that counted.” “Bunch of junk is right—” Osceola stopped short. He stood facing a small mirror that hung on the wall above the wet cells he had just destroyed. Reflected in
  • 35. 186 the small oblong he saw the door to the deck open slowly—and Baron von Hiemskirk walked into the room. “So!” he exclaimed harshly. “Passengers—mutiny!” He got no further. As Osceola jumped for the switch to snap off the light, Bill dived through the air, tackling the commander just above his knees. There came a crash as the Baron’s head hit the deck—then darkness. Osceola ran to the doorway. The Baron lay prone. Bill was bending over him. “Nine—ten—out!” said that young gentleman rather breathlessly. “Grab his legs, big boy. We’ll move him inside. It’s a little too public out here for comfort.” Together they carried the big man into the wireless house and deposited him on the floor. “Here’s a bight of rope,” said Bill, switching on the light again. “Tie up his ankles—I’ll attend to his wrists.” “Shall we gag him?” “No, he’s breathing pretty hard. Slight concussion, probably. The back of his head hit the decking an awful crack. I don’t want him to choke to death.” Osceola finished lashing the Baron’s legs together and stood up. “He’s a right powerful brute. Got a pair of legs like tree-trunks. Say,” he began to laugh, “I didn’t think our job would be done up as brown as all this tonight! That was a swell tackle of yours. The longer he’s out the better pleased I’ll be. That guy has never made a hit with me. I’m only sorry I didn’t get a crack at him. If you’ve got an extra wipe, pass it over. A blindfold won’t
  • 36. 187 188 stop his breathing, and there’s no need for him to know where he is when he wakes up.” “Okay. I’ve unhooked the collar of his blouse,” Bill said, surveying their captive critically. “He’ll do. Give me a hand with the other guy, now. I’m going to take out his gag and give him a drink.” “Going to leave it out?” “Sure, I’m no inquisitor!” “But how about it when the pair of them start yelling for help?” “With the door and window shut, this place is pretty well soundproof. Anyway, the Baron isn’t likely to kick up much of a row—not for a couple of days yet, if I know the signs. The operator couldn’t hear him if he did. I’m leaving the cotton in his ears. Make it snappy—I want to beat it while the going’s good.” A few minutes later, two dark figures crossed the boat deck to the stairhead, ran lightly down and after climbing into their cabin by way of the open port, hurriedly undressed in the dark. “By Jove!” Osceola paused in the act of removing a shoe. “I wonder what became of Charlie?” “Oh, I guess he’s all right. I told him to vamoose if it looked like he’d get caught. He’s probably sound asleep in his bunk by this time.” “Hope so. He’s a sassy brat, but I wouldn’t want him to get into trouble with the lads who run this ship. They’re
  • 37. 189 likely to turn nasty when they find their beloved Baron has cracked his nut.” “Charlie,” said Bill, “is quite capable of taking care of himself. Put away those clothes you were wearing. If anybody comes snooping round here looking for clues, those civvies would give us away. I’m pretty sure His Nibs didn’t recognize us. I ducked my head and the brim of my hat threw my face in shadow. You had your back turned. Too bad, though, we’d pocketed our masks —” “Confound!” Osceola sprang for the door. “I’ve got to go up there again!” “But what on earth for? Leave well enough alone, guy.” “I’ve got to—it’s those handkerchiefs of yours, Bill.” “The ones we used as blindfolds? By gosh, you’re right.” “Of course I am. And we were idiots not to remember that all your wipes are initialled! Well, that was a bloomer we both made.” Bill crawled into bed, and pulled up the sheet. “Oh, no, we didn’t,” he retorted sleepily. “How come?” “Har-har! Had you goin’, didn’t I? Why, I changed the one on the wireless lad—found two in the Baron’s pockets, y’ see. The one you used on him was his own —the other’s on his little roommate!”
  • 38. 190 “Well, I’m a son-of-a-seacook! That’s a good one. I wonder if the rest of the bunch will figure that ‘they done it all themselves’? Smart work, Bill. You’re as full of ideas as Martinengo’s ship’s biscuit was of weevils!” “Right the first and last time. Now shut up! I’m asleep.” Bill turned over, his back to the room, and buried his face in his pillow.
  • 39. 191 Chapter XIV TROUBLE AHEAD “Isn’t that someone pounding the door?” “You tell ’em!” sleepily suggested the chief, covering his face with a pajamaed arm to shut out the morning light. “Oh, Lord!” Bill groaned and crawled out of bed. He glanced at his wrist watch. It was exactly seven-thirty. He unlocked the door and a steward clicked his heels together and stood at attention. “Well?” growled Bill. “Commander Geibel’s compliments, sir—and will the gentlemen be good enough to meet him at half past eight in the executive office for officers’ conference.” “Right-o. Give Commander Geibel our compliments—and say we’ll be there.” “Thank you, sir.” Bill shut the door, and looked over at Osceola. The chief was fast asleep again. Bill went into the bathroom, where an ice-cold shower worked wonders. When he
  • 40. 192 returned to the cabin after a strenuous rub with a rough towel, he carried a dripping sponge with which he scientifically massaged Osceola’s face. “Hey there! Cut it out!” The chief sprang from his bed as though he had had an electric shock. “What’s the huge idea?” he stormed. “The Exec.” said Bill, “wants to see us at eight-thirty sharp. It is now seven-forty-four. And we both want breakfast, I expect. Get under a shower and you won’t feel so crabby.” “Um!” Osceola was considerably subdued by this news. “Think he smells a rat?” “Oh, not a chance, so far as we’re concerned. We’d be in the brig by this time if he did!” “Good enough!” yawned Osceola, scowling furiously as he stretched the kinks out of his powerful arms. “Hop to it, then. I’m nearly dressed—and I’m hungry enough to eat shoe-leather.” “All right, all right—don’t lose your shirt over it. I’ll be with you in a jiffy.” The bathroom door slammed and again came the sound of rushing water as the shower was turned on. At eight-thirty sharp the two lads found Commander Geibel seated at his desk in the Executive Office, and took their places among the other ship’s officers. There was none of the joviality which usually preambled these meetings. The Amtonia’s commissioned personnel seemed utterly mute this morning. Instead of the
  • 41. 193 194 accustomed good-natured chaff, the various officers merely nodded to each other as they took their places and sat down. Bill noticed that all wore expressions of deep solemnity, yet the atmosphere of the cabin was charged with a current of tense excitement. The nautical clock on the wall struck one bell. Commander Geibel, who had been studying papers on his desk blotter, came to life. “Gentlemen—” he leaned forward, one hand on the papers before him, “I have here the report of first assistant wireless operator, Miller. Had I not seen Miller when he was first found with our beloved captain, I could not have believed this outrage possible. We, who have prided ourselves on the most efficient and strict discipline maintained on this ship, can no longer be proud. As a number of you gentlemen already know, at about one o’clock this morning, two passengers who were masked overpowered Miller in the wireless room and wrecked the premises. While these vandals were at work, the Herr Captain, Baron von Hiemskirk, entered the room, where these ruffians surprised him.” “Pardon, sir,” interrupted the ship’s first lieutenant, Lieutenant-Commander Beerman. “It is rumored that the Herr Baron is seriously injured. Will you be good enough to ease our minds concerning the Herr Baron’s condition? I understand that he was knocked unconscious.” “That is so, Herr Beerman. I regret to tell you gentlemen that he is still unconscious, and may continue in that state for a day or two. Doctor Thierfelder diagnoses his condition as concussion—a slight concussion only, I am thankful to say. The Herr
  • 42. 195 Doctor, who is with him now, believes that Baron von Hiemskirk received a blow from a blunt instrument. Luckily, his service cap partially protected his head. With care, and no complications, our Captain will probably be able to get about again within a week.” “May I ask,” inquired Bill, “what punishment has been meted out to the perpetrators of this dastardly crime?” “I am sorry to say that they have not been apprehended, Lieutenant.” “But I thought you spoke of two passengers, Herr Commander?” “Miller states that the two men were dressed in civilian clothes. One of them at least had a revolver with which he menaced the operator, while the other bound him. As you know, every passenger, upon boarding this ship, was searched and his luggage thoroughly inspected for arms. Another search of their cabins has been made this morning. No weapons of any description have been found.” Lieutenant Schneider caught the Commander’s attention. “I was on the bridge while this crime was being committed. During that time, I am certain that messages were radioed from the wireless room.” “A very important fact, Herr Schneider, and one confirmed by Miller. Due to the cotton that had been placed in his ears, he was unable to decipher anything, but he is convinced that one or more messages were sent.” “Could we not ascertain who among the passengers is capable of sending such messages?” It was the Chief
  • 43. 196 197 Engineer who spoke. The Executive Officer shook his head. “Of course all possible suspects will be questioned,” he said. “I doubt, however, if we can learn much. Fifteen of our passengers are yacht owners. Three more are high executives of broadcasting corporations. Any of these men may understand wireless. On the other hand, all of them will probably deny it. But this is not so important. Outside of broadcasting a description of this ship, they can have sent little or no information, as they have no possible means of ascertaining the ship’s position. I must urge you all, nevertheless, to be more than ever on the alert. Now, one thing more, and we may go to our various duties.” The Executive Officer cleared his throat and proceeded. “Baron von Hiemskirk keeps muttering over and over in his delirium, ‘Er ist einer Footballer’—‘He is a football player—.’ These words may mean nothing; on the other hand, they may be the means of identifying his assailants. Until our beloved Captain regains his reason, nothing can be done about it. Thank you, gentlemen, for your interest and attention. I bid you all goodmorning.” The meeting dispersed, the officers going their several ways. Bill and Osceola, having no duties to perform, strolled around the promenade deck. “It is to be hoped that our beloved Captain does not regain his reason until this ship has been captured by the battleships on her trail,” muttered Osceola to Bill, mimicking the Executive Officer’s formal manner of address.
  • 44. 198 Bill nodded thoughtfully. “You said a mouthful, boy. I’m afraid you and I will be in for it good and plenty if he wakes up beforehand. That bunch we just left are a dumb crew. But there are no flies on the skipper. He had our histories down pat from the newspapers when we met him on the Merrymaid. He’s sure to know you play on Carlisle and that I’m on the Navy eleven. What with our previous record, so to speak, in the way of cleaning up dirty messes, that guy won’t miss any bets. We’ll be judged on suspicion if nothing else.” “I wonder why Charlie didn’t warn us that the Baron was making for the wireless house?” “Probably didn’t get a chance. If the kid had been caught, we’d have heard of it before this. Schneider told me that all passengers are being confined to their cabins, so we won’t see him today. Charlie and his doings don’t worry me just now—but the weather does!” “What’s the matter with the weather?” “See that haze over there to the northward? We’re steaming into fog.” “You think that even if the Stamford catches up to within firing distance we might be able to elude her after all?” “That’s the big idea. In about half an hour we won’t be able to see ten feet over the side.” “Well, maybe we’ll run through it by this afternoon. The Stamford won’t catch up to us for some hours yet.”
  • 45. 199 200 “Maybe so,” replied Bill. “We’ve done all we could, anyway. From now on, the job’s up to the Navy.” “Hello!” cried Osceola, as they swung round the end of the superstructure and into the long stretch of deck on the port side. “Look off yonder! What do you make that out to be?” Bill shaded his eyes. The glare of the smooth ocean was dazzling in the sun. Away to the northeast a ship was nosing out of fog banks that lined the northern horizon. “That looks to me mighty like a warship!” said the chief excitedly. “She certainly is humping it, brother. But I thought the Stamford was to the south of us—and when she came, she’d come from behind!” “You’ve certainly got a pair of eyes—and she certainly is a warship. I can’t make her out very well at that distance, but she looks to me like a first class cruiser of the Plymouth type. Dollars to ditchwater the Stamford wirelessed her! She’s heading for us all right, all right. Oh, boy—there’s going to be something doing aboard this packet in two shakes of a lamb’s tail!” “Thar she blows!” sang out the chief, as the gong and bugle sounded for action. “And it’s quite time you and I beat it for our battle stations. Everything is being made ready for attack. If we’re late, it won’t look so good.” Osceola stopped and stared at Bill. “Don’t tell me that you, a midshipman of the United States Navy, are going to help these bum pirates fight one of your own battleships!”
  • 46. 201 202 Bill looked at him and laughed. “Some patriotic little flagwaver, aren’t you,” he jeered. “No, Herr Junior Lieutenant, I do not intend to shoot at the Plymouth or the Reading, or whatever’s the name of that cruiser. Have you never played hare and hounds, Big Chief? Well, this time, you and I and everybody on board are hares. Those two 117-mm. guns forward, and the two on the poop are all right for scaring passenger liners and bringing unarmed merchant-men to haul down their colors. But they haven’t the caliber or the range of three-quarters of the guns aboard that cruiser. This is going to be a race—not a battle! Beat it!”
  • 47. 203 Chapter XV THE CHASE By the time Bill reached his station on the poop, the quiet routine aboard the liner had given way to activity. The Amtonia was awake to the heat and fever of desperate life. Lieutenant Schneider, who was in command of the gun, seized Bill’s arm. “Bolton!” he cried, “look there—she’s changed her course! She’s going to head us off!” Shading his eyes with his hand, Bill strained them toward the northern horizon. The great molten surface of the sun was already half obliterated by the spreading bank of fog that turned the sea to dull amethyst. “I doubt it,” he replied. “If that fog keeps increasing, the visibility will soon be too poor for the cruiser to get our range.” “There is Commander Geibel on the bridge. The ship is in good hands—that is a blessing!” Lieutenant Schneider’s tone betrayed his excitement. “We’re sheering off to starboard—” said Bill. “That’s good news. It’s going to be a close thing, just the same.”
  • 48. 204 Schneider jumped on the rail and leaned outward in order to get a better view of the forward end of the ship. “The Exec. has left the bridge!” he cried. “What’s happened now?” “Calm down! He’s probably run down the steps and crossed that gangway to the foremast. Yes, there he is! See him? He’s climbed up to the lookout. Gosh, that lad’s got a voice. You can hear him bellowing orders all over the ship, I’ll bet.” “He’s a good officer,” admitted the Lieutenant, getting off the rail. “Too bad the Herr Baron is not able to take command. He would use the Flying Fish to get us out of this mess.” He pointed to the submarine racing along off their starboard quarter. “Donner und Blitzen! I believe she is going to submerge!” “The very best thing she could do, under the circumstances,” Bill asserted. “What would you have her do—head over yonder and let go a torpedo?” “Wasn’t she built for that kind of thing?” Lieutenant Schneider’s tone was still nettled. “Perhaps she was, but not in a position of this kind. That cruiser would blow her out of the water before she got near enough to make a torpedo effective!” “If that’s the case, why don’t you go aboard her and get busy with her in the air?” “And stop both the Flying Fish and ourselves while a boat is being lowered and I am ferried over to her? Even if the Amtonia was able to get away, the Flying
  • 49. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookfinal.com