Authors: M. Derdour, Ghoualmi Zine, P. Roose, M. Dalmau, A. Alti
Addresses: Computing Department, University of Badji Mokhtar, B.P.12, 23000 – Annaba, Algeria. ' Computing Department, University of Badji Mokhtar, B.P.12, 23000 – Annaba, Algeria. ' Computing Department, LIUPPA – IUT of Bayonne, Pays Basque – 2 Allee du Parc de Montaury, 64600 – Anglet, France. ' Computing Department, LIUPPA – IUT of Bayonne, Pays Basque – 2 Allee du Parc de Montaury, 64600 – Anglet, France. ' Computing Department, University of Ferhat Abbas, 19000 – Setif, Algeria
Abstract: Multimedia technology is increasingly being used to create reliable and effective communication environments. However, the design of multimedia applications is currently driven more by intuition than by empirically or theoretically derived design guidelines. In a multimedia application, the software architecture is defined as a set of components manipulating various multimedia data types with specific constraints that we must take into consideration at the architectural design. For instance, the problem of heterogeneity related to the exchanged of multimedia data flows. In the absence of prescriptive architectural design principles, meta-model for multimedia software architecture (MMSA) enables the description of software architectures expressing a multimedia software system as a collection of components which handle various types and formats of multimedia data, and interacts between them via adaptation connectors. This paper proposes a modelling of architectural elements such as: multimedia, application components, communication, etc. and an UML profile for verification and validation of MMSA architectures and detection of heterogeneities between components communicating with multimedia flows.
Keywords: adaptation; application components; connectors; Unified Modeling Language; UML; heterogeneity; multimedia software architectures; transformation; communication; metamodelling; modelling; MMSA verification; MMSA validation; multimedia flows; data flows.
International Journal of Multimedia Intelligence and Security, 2010 Vol.1 No.3, pp.209 - 231
Published online: 15 Dec 2010 *Full-text access for editors Access for subscribers Purchase this article Comment on this article