Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ljerka Beus-Dukic is active.

Publication


Featured researches published by Ljerka Beus-Dukic.


Lecture Notes in Computer Science | 2003

COTS Software Quality Evaluation

Ljerka Beus-Dukic; Jørgen Bøegh

Assessment and evaluation of COTS software products has become a compulsory and crucial part of any COTS-based software system lifecycle. A risk of selecting a product with unknown quality properties is no longer acceptable. This paper presents a framework for quality evaluation process of COTS software products. Our approach, based on the latest international standards for software product quality and evaluation, provides acquirers of COTS software with a method to select software products with identified and measured quality characteristics.


real time systems symposium | 1998

Real-time scheduling in a generic fault-tolerant architecture

Andy J. Wellings; Ljerka Beus-Dukic; David Powell

Previous ultra-dependable real-time computing architectures have been specialised to meet the requirements of a particular application domain. Over the last two years, a consortium of European companies and academic institutions has been investigating the design and development of a Generic Upgradable Architecture for Real-time Dependable Systems (GUARDS). The architecture aims to be tolerant of permanent and temporary, internal and external, physical faults and should provide confinement or tolerance of software design faults. GUARDS critical applications are intended to be replicated across the channels which provide the primary hardware fault containment regions. In this paper, we present our approach to real-time scheduling of the GUARDS architecture. We use an extended response-time analysis to predict the timing properties of replicated real-time transactions. Consideration is also given to the scheduling of the inter-channel communications network.


Fifth International Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems (ICCBSS'05) | 2006

Semantic component selection - SemaCS

Maxym Sjachyn; Ljerka Beus-Dukic

In component based software development, project success or failure largely depends on correct software component evaluation. All available evaluation methods require time to analyse components. Due to the black box nature of components, preliminary judgments are made based on vendor descriptions. As there is no standard way of describing components, descriptions have to be interpreted using semantics and domain knowledge. This paper presents a semi-automated generic method for component identification and classification based on generic domain taxonomy and user generated semantic input. Every query is semantically tailored to what is being looked for, arriving at better results then it is currently possible using available automated categorisation systems.


2008 Requirements Engineering Education and Training | 2008

Learning How To Discover Requirements

Ljerka Beus-Dukic; Ian F. Alexander

Requirements engineering (RE) is traditionally taught in academia using an RE process which starts from a well-defined problem. Our approach focuses on the early stages of requirements discovery where students have to learn both about the application domain and about what stakeholders feel is the problem. The approach comprises all the basic elements of requirements, and ways to discover them using many small discovery cycles. In this position paper we outline the rationale for our approach and reflect on our initial experiences with teaching undergraduate RE module using this approach.


A generic fault-tolerant architecture for real-time dependable systems | 2001

Multilevel integrity mechanisms

Eric Totel; Ljerka Beus-Dukic; Jean-Paul Blanquart; Yves Deswarte; Vincent Nicomette; David Powell; Andy J. Wellings

The purpose of the multilevel integrity mechanisms of the GUARDS architecture is to protect critical components from the propagation of errors due to residual design faults in less-critical components. The notions of multiple integrity levels and multiple criticality levels are very tightly linked, but there is an important distinction. Integrity levels are associated with an integrity policy that defines what is allowed in terms of data flow between levels and resource utilisation by the components at different levels [Totel 1998]. Criticality levels are defined in terms of the potential consequences of failures of components at each level.


european conference on software architecture | 2015

Teaching Requirements Engineering: EUROWEB experience

Snezana Scepanovic; Ljerka Beus-Dukic

In this paper, we describe the results of cooperation between University of Westminster (UK) and Mediterranean University (Montenegro) in the development of a curriculum for teaching Requirements Engineering (RE). RE is traditionally taught in academia using an RE process which starts from a well-defined problem. Our approach focuses on the early stages of requirements discovery, where students have to learn both about the application domain and about what stakeholders think is the problem. We share our experiences gained through teaching RE to several student cohorts in both institutions and discuss some of the advantages and disadvantages of our approach.


ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems | 2005

COTS components and DB interoperability

Radmila Juric; Ljerka Beus-Dukic

The paper addresses the specific issue of interoperability in heterogeneous databases (DBs) and the possible use of COTS components that may alleviate the DB interoperability problem. A component-based software Architectural Style (AS) for interoperable DBs has been used, and an example of its application given, to identify which role the COTS components may play when populating the architecture. We discuss the characteristics of such COTS components and advocate that such COTS components should be developed with a specific component platform in mind, interoperate within a certain context, and adhere to constraints of our AS.


mediterranean conference on embedded computing | 2014

Specifying timing requirements in domain specific languages for modeling

Damjan Temelkovski; Ljerka Beus-Dukic

Complex Real-Time Embedded Systems (RTESs) can be developed using model-based engineering. The problem is choosing a modeling language that has capabilities to model the most important characteristic of RTESs: timing. This paper shows an analysis of the most popular modeling languages and their capabilities to model timing constraints in RTESs. It includes UML, SysML, AADL, MARTE and EAST-ADL. A brief comparison between MARTE and EAST-ADL, based on the case study from the automotive industry, is also included.


2016 Wireless Days (WD) | 2016

LEACH-reformed clusters: A novel cluster formation algorithm in LEACH protocol

Vesna Glavonjic; Aleksandar Neskovic; Ljerka Beus-Dukic

The energy in wireless sensor networks is a restrictive resource which primarily affects the life of nodes. Many routing protocols use clustering mechanism to optimize the network lifetime. A problem can occur if the allocation of cluster members is not uniformly distributed. In case of LEACH protocol there are great differences in cluster sizes. Consequently, the energy load of such network becomes disproportional which brings to faster dying of cluster heads that have more members. This paper discusses a novel approach to LEACH algorithm that takes into consideration the number of existing members in each cluster. The proposed algorithm significantly prolongs the period before the first node dies, hence providing better reliability of the clustering process. The results of simulations also revealed considerably less variations of cluster sizes, which is crucial for energy load to be spread more equally.


research challenges in information science | 2010

Semantic distance acquisition in SemaCS

Maxym Sjachyn; Ljerka Beus-Dukic

Search functionality and technology is a growing area of research. However, simple search approaches are still frequently used. A simple keyword or thesauri-based search is efficient and can be easily scaled. However, keyword-based search cannot be used to infer what may or may not be relevant to the user and thesauri, or any other expert generated model, is expensive to produce and tends to be of limited applicability. Semantic Component Selection (SemaCS) approach is not tied to any specific domain and does not rely on expert input. SemaCS is based on actual data and statistical semantic distances between words. Information on semantic distances is used for searching and for automated generation of domain model taxonomy. This paper presents SemaCSs means of acquiring these semantic distances - mNGD (2) - and its initial evaluation.

Collaboration


Dive into the Ljerka Beus-Dukic's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sasikumar Punnekkat

Mälardalen University College

View shared research outputs
Top Co-Authors

Avatar

Maxym Sjachyn

University of Westminster

View shared research outputs
Top Co-Authors

Avatar

David Powell

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Ivica Crnkovic

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Colin Myers

University of Westminster

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge