From a data-model to generated access-and store-patterns

T.A. Tesfay, Technische Universiteit Eindhoven (TUE). Stan Ackermans Instituut. Software Technology (ST)

    Research output: ThesisEngD Thesis

    482 Downloads (Pure)

    Abstract

    This report describes the design and implementation of a repository generation tool that is used to generate repositories from domain models of the ASML TWINSCAN system. The TWINSCAN system handles a huge volume of data. In the current TWINSCAN SW Architecture, data transfer is combined with control flow. Data transfer to a component that is not under the sender’s control must be performed through a common parent in the hierarchy. There are several problems with this approach with respect to execution, encapsulation, and locality of change. These problems drive the need to separate data, control, and algorithms of the scanner’s software architecture. To tackle these problems, the main objective of this project was to design and implement a repository generation tool for generating data repositories from domain models. The structure of this data is defined by a domain model in an implementation independent formalism. The tool supports several flavors of repositories. As a result of the flexibility of the architecture, it is possible to switch between technologies and implementation patterns without touching domain models. The repository generation tool is tested through continues architecture and design reviews by supervisors, unit tests, and tests by stakeholders in the real environment. The results obtained in this project are being used in an active ASML project within the Metrology group. The results have improved productivity and increased efficiency.
    Original languageEnglish
    Awarding Institution
    Award date25 Sept 2015
    Place of PublicationEindhoven
    Publisher
    Print ISBNs978-90-444-1382-3
    Publication statusPublished - 25 Sept 2015

    Bibliographical note

    Eindverslag

    Fingerprint

    Dive into the research topics of 'From a data-model to generated access-and store-patterns'. Together they form a unique fingerprint.

    Cite this