2010
DOI: 10.1007/978-3-642-11266-9_44
|View full text |Cite
|
Sign up to set email alerts
|

How to Complete an Interactive Configuration Process?

Abstract: When configuring customizable software, it is useful to provide interactive tool-support that ensures that the configuration does not breach given constraints. But, when is a configuration complete and how can the tool help the user to complete it? We formalize this problem and relate it to concepts from non-monotonic reasoning well researched in Artificial Intelligence. The results are interesting for both practitioners and theoreticians. Practitioners will find a technique facilitating an interactive configu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…It also allows users to remove unnecessary features of the original firmware by selecting individual patches. 4. http://os.inf.tu-dresden.de/drops/overview.html 3.1.9 ToyBox ToyBox is our smallest subject.…”
Section: Freetzmentioning
confidence: 99%
See 2 more Smart Citations
“…It also allows users to remove unnecessary features of the original firmware by selecting individual patches. 4. http://os.inf.tu-dresden.de/drops/overview.html 3.1.9 ToyBox ToyBox is our smallest subject.…”
Section: Freetzmentioning
confidence: 99%
“…Fig. 7 shows the eCos-i386 model with links from the groups to the architectural concern for whose configuration Math library (19) POSIX file I/O compatibility layer (18) uITRON compatibility layer (65) Watchdog IO device (12) Wallclock device (20) Basic networking framework (175) DNS client (13) Flash device drivers (44) RAM filesystem (15) Simple Network Time Protocol (6) ROM filesystem (4) JFFS2 filesystem (17) FAT filesystem (10) Linux compatibility layer (1) VNC server (25) Zlib compress and decompress (10) Disk device drivers (5) Hardware Abstraction Layer (99) Exceptions Virtual Vectors Interrupts (6) Kernel (107) Libraries (143) Math (19) C (124) Compatibility (135) POSIX (49) uTron ( Ethernet (32) Serial (84) Flash (44) File System (46) Web Server (25) Fig. 7.…”
Section: Ecos-i386mentioning
confidence: 99%
See 1 more Smart Citation
“…In this way, no error can be introduced. Janota et al [23] propose an approach to complete a partial configuration by automatically setting the unknown options in a safe way. However, both approaches require that the configuration starts with variables in the unknown state.…”
Section: Related Workmentioning
confidence: 99%
“…Benavides et al [89] presented a structured literature review of the existing proposals for the automated analysis of feature models. Example analyses include consistency check or dead feature detections [90], interactive guidance during configuration [91,92], or fixing models and configurations [93][94][95]. It should be noted that most of the reasoning operations (e.g., satisfiability) are difficult computational problem and are NP-complete [36].…”
Section: Automated Analysis Of Feature Modelsmentioning
confidence: 99%