By Topic

Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05)

Date 12-14 Oct. 2005

Filter Results

Displaying Results 1 - 25 of 27
  • Ninth IEEE International Symposium on High-Assurance Systems Engineering

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (1162 KB)
    Freely Available from IEEE
  • Ninth IEEE International Symposium on High-Assurance Systems Engineering - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Ninth IEEE International Symposium on High-Assurance Systems Engineering - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Ninth IEEE International Symposium on High-Assurance Systems Engineering - Table of contents

    Publication Year: 2005, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2005, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (19 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2005, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (19 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization

    Publication Year: 2005, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2005, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • A panacea or academic poppycock: formal methods revisited

    Publication Year: 2005, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB) | HTML iconHTML

    Many formal methods have been proposed to improve software quality. These include new specification and modeling languages as well as formal verification techniques, such as model checking and theorem proving. This paper describes several ways in which tools supporting formal methods can help improve the quality of both software code as well as software specifications and models. However, while pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The future EU R&D on security and dependability: moving towards resilience and plasticity

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (37 KB) | HTML iconHTML

    The IST programme has started consulting the European research constituency on what would be the challenges and priorities for the strategic R&D on security and dependability in the future ICT theme of the Framework Programme 7th. The notion of resilience and plasticity would be presented together with the rationale and the initial findings of this consultation process. The paper also h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tomorrow's needs - yesterday's technology: DoD's architectural dilemma & plan for resolution

    Publication Year: 2005, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (67 KB) | HTML iconHTML

    As department of defense (DoD) is moving rapidly towards service-oriented computing (SOC), new challenges arise. SOC represents a new and emerging paradigm of computing. The new paradigm would affect every phase of system development and operation. This paper presents the impact of SOC on software architecture, specification languages, and engineering techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of fault tolerant architectures by model weaving

    Publication Year: 2005, Page(s):15 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Aspect-oriented modeling is proposed to design the architecture of fault tolerant systems. Notations are introduced that support the separate and modularized design of functional and dependability aspects in UML class diagrams. This notation designates sensitive parts of the architecture and selected architecture patterns that implement common redundancy techniques. A model weaver is presented tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safe allocation of avionics shared resources

    Publication Year: 2005, Page(s):25 - 33
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    We propose an approach to analyse the safety of avionic systems that takes into account the impact of computation and communication resource sharing. The approach is made of three main steps: use a formal notation to describe how failures propagate in the system under study, use model-checking tools to verify safety requirements and to derive allocation constraints, use a constraint solver to gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The reliable platform service: a property-based fault tolerant service architecture

    Publication Year: 2005, Page(s):34 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    The reliable platform is a fault tolerant architecture designed to provide a structured but flexible framework for the delivery of dependable services for highly critical applications such as X-by-wire systems. The approach is based on defining a structured hierarchy of critical fault tolerant services with corresponding properties that can be explicitly specified and verified. The architecture al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting component and architectural re-usage by detection and tolerance of integration faults

    Publication Year: 2005, Page(s):47 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    We present an extended interface description language supporting the avoidance and the automatic-detection and tolerance of inconsistency classes likely to occur when integrating pre-developed components. In particular, the approach developed allows the automatic generation of component wrapping mechanisms aimed at handling the occurrence of local and global inconsistencies during runtime. On the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for simplifying the development of kernel schedulers: design and performance evaluation

    Publication Year: 2005, Page(s):56 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Writing a new scheduler and integrating it into an existing OS is a daunting task, requiring the understanding of multiple low-level kernel mechanisms. Indeed, implementing a new scheduler is outside the expertise of application programmers, even though they are the ones who understand best the scheduling needs of their applications. To address these problems, we present the design of Bossa, a lan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel framework for non-deterministic testing of message-passing programs

    Publication Year: 2005, Page(s):66 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Message-passing programs are difficult to test because of their non-deterministic behavior. One approach, called non-deterministic testing, involves executing a message-passing program with the same input many times in hope that faults would be exposed by one of these executions. Non-deterministic testing has been widely used in practice, but unfortunately, in an ad-hoc manner. In this paper, we p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safe composition of real time software

    Publication Year: 2005, Page(s):79 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    There is an increasing move towards the use of modular approaches to software design and implementation in the development of critical systems. The reason is the approaches have a number of benefits including providing support for concurrent development and helping to simplify software maintenance. However, there is little guidance on how to perform a modular safety process for the certification o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing software quality with limited fault-proneness defect data

    Publication Year: 2005, Page(s):89 - 98
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1472 KB) | HTML iconHTML

    Assuring whether the desired software quality and reliability is met for a project is as important as delivering it within scheduled budget and time. This is especially vital for high-assurance software systems where software failures can have severe consequences. To achieve the desired software quality, practitioners utilize software quality models to identify high-risk program modules: e.g., sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured assurance cases: three common standards

    Publication Year: 2005, Page(s):99 - 108
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    For safety-, mission-, or security-critical systems, there are typically regulations or acquisition guidelines requiring a documented body of evidence to provide a compelling justification that the system satisfies specified critical properties. Current frameworks suggest the detailed outline of the final product but leave the truly meaningful and challenging aspects of arguing assurance to the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of executable assertions for runtime checking temporal requirements

    Publication Year: 2005, Page(s):111 - 120
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Checking various temporal requirements is a key dependability concern in safety-critical systems. As model-checking approaches do not scale well to systems of high complexity the runtime verification of temporal requirements has received a growing attention recently. This paper presents a code-generation based method for runtime evaluation of linear temporal logic formulae over program execution t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View graphs for analysis and testing of programs at different abstraction levels

    Publication Year: 2005, Page(s):121 - 130
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    This paper introduces view graphs, which allow representation of source code for program analysis and testing at different levels of abstraction. At a low level of abstraction, view graphs can be used for white-box analysis and testing, and at a high level of abstraction, they can be used for black-box analysis and testing. View graphs are thus an approach to integrate black-box and white-box tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The simulation of anomalies in the functional testing of the ERTMS/ETCS trackside system

    Publication Year: 2005, Page(s):131 - 139
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    ERTMS/ETCS is going to become the reference standard for modern railway signalling. To develop a safe and reliable automatic train protection system (ATPS) based on ERTMS/ETCS, a detailed functional testing phase is needed, meeting the requirements of international railway safety standards. In this paper we deal with the functional validation of the trackside part of an ERTMS/ETCS compliant system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian perspective of optimal checkpoint placement

    Publication Year: 2005, Page(s):143 - 152
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Checkpointing and rollback recovery is a commonly used technique to save the information on the main memory in file systems to a safe secondary medium. In this paper we develop fully Bayesian learning algorithms to place the checkpoint adoptively. Based on two kinds of prior distributions for the Weibull system failure time distribution, we give semi-parametric estimation methods of the optimal ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear randomized voting algorithm for fault tolerant sensor fusion and the corresponding reliability model

    Publication Year: 2005, Page(s):153 - 162
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Sensor failures in process control programs can be tolerated through application of well known modular redundancy schemes. The reliability of a specific modular redundancy scheme depends on the predefined number of sensors that may fail, f, out of the total number of sensors available, n. Some recent sensor fusion algorithms offer the benefit of tolerating a more significant number of sensor failu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.