By Topic

11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)

Date 15-17 Aug. 2006

Filter Results

Displaying Results 1 - 25 of 36
  • 11th IEEE International Conference on Engineering of Complex Computer Systems

    Publication Year: 2006
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • 11th IEEE International Conference on Engineering of Complex Computer Systems - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • 11th IEEE International Conference on Engineering of Complex Computer Systems - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 11th IEEE International Conference on Engineering of Complex Computer Systems - Table of contents

    Publication Year: 2006, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (35 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Physiological vs. social complexity in software design

    Publication Year: 2006, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB) | HTML iconHTML

    Summary form only given, as follows. "Complexity" and "crisis" have become synonyms in the (brief) history of software engineering. The terms "component," "decomposition," "structure" and "architecture" have been associated with methods and techniques proposed over the years to defeat the crisis, from structured programming to object/component-based programming and, more recently, serviceoriented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient dynamic multikeys in Enterprise JavaBeans

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    The J2EE platform allows the rapid development of a large class of complex and robust server-side applications. However, some J2EE constraints pose serious challenges to the development of J2EE applications that interact with legacy systems outside the originally targeted J2EE domain. One such constraint is the static nature of identities of entity Enterprise JavaBeans (EJBs). We present a case st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case history of International Space Station requirement faults

    Publication Year: 2006
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    There is never enough time or money to perform verification and validation (V&V) or independent verification and validation (IV&V) on all aspects of a software development project, particularity for complex computer systems. We have only high-level knowledge of how the potential existence of specific requirements faults increases project risks, and of how specific V&V techniques (requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reactive component based service-oriented design - a case study

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Service-oriented design (SOD) is a software development paradigm that utilizes services as fundamental elements for developing applications/solutions. Recently, service orientation is becoming a mainstream approach for building large scale software systems. However, current software models do not take services as fundamental elements and it is very difficult for people to model from services. We c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the complexity of design in imaging software

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Recent evidence raised the possibility that algorithm rich software, such as in imaging processing, is more complex than other kinds (Sangwan, 2005). To further investigate this contention a set of complexity metrics were computed for two sets of open source Java software systems. The results suggest that there is little or no difference in software complexity between an imaging application, and "... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inference of design pattern instances in UML models via logic programming

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    This paper formalizes the notion of a design model structurally conforming to a design pattern by representing the model as a logic program whilst the pattern as a query. The conformance of a model to a design pattern is equivalent to the satisfaction of the query by the logic program. Harnessing logic inference capability of logic programming languages, we obtain an automated method that infers a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating functional and security requirements with use case decomposition

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Misuse case modeling is a viable option to depict the security requirements together with functional requirements. To investigate the interplay between functional and security requirements, this paper presents an approach to decomposing use cases, misuse cases, and mitigation use cases. We identify relationships among decomposed cases for each case type (use, misuse, mitigation use) and ensure con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A characterization of UML diagrams and their consistency

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    In this paper, we focus on giving a formal semantics of sequence diagram of UML2.0. A model of a system comprises a set of program variables, a class diagram, a family of normal sequence diagrams, a family of normal state diagrams, and a state constraint. We then define their static and dynamic consistency supported by the formal semantics View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A UML profile utilizing enterprise information system configuration

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    Enterprise information system configuration is a complex process dealing with interrelated issues. A four-stage methodology has been proposed in order to effectively explore configuration issues. The main advantage of the proposed methodology is the adoption of a common meta-model for the representation of systems throughout all configuration stages, ensuring interoperability and model consistency... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering emergence

    Publication Year: 2006
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    We explore various definitions and characteristics of emergence, how we might recognise and measure emergence, and how we might engineer emergent systems. We discuss the TUNA (Theory Underpinning Nanotech Assemblers) project, which is investigating emergent engineering in the context of molecular nanotechnology, and use the TUNA case study to explore an architecture suitable for emergent complex s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A layered behavioural model of platelets

    Publication Year: 2006
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    There is great interest in the application of nanotechnology to medicine, but concerns for safety are paramount. We present a modelling technique based on CSP and B as a starting point for simulation of networks of nano-robots. The model and the simulations are central features of our proposed approach to the construction of safety cases for nanomedicine applications, and complex networks of coope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communicating complex systems

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    This paper presents efficient mechanisms for the direct implementation of formal models of highly concurrent dynamic systems. The formalisms captured are CSP (for concurrency) and B (for state transformation). The technology is driving the development of occam-pi, a multiprocessing language based on a careful combination of ideas from Hoare's CSP (giving compositional semantics, refinement and saf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool-supported review approach to detecting structural consistency violations

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    The application of specification-based program verification techniques (e.g., testing, review, and proof) faces strong challenges in practice when the gap between the structure of a specification and that of its program is large. In this paper, we describe a tool-supported review approach to detecting structural consistency violations by introducing the review method, discussing the design and imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating timed automata into tabu algorithm for HW-SW partitioning

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Hardware/software (HW-SW) partitioning is a key problem in codesign of embedded systems, studied extensively in the past. This paper describes a new approach to hardware/software partitioning for synchronous model. We formalize the partitioning problem using timed automata, which captures the key elements of the partitioning. Then the tabu algorithm is applied to timed automata model to search for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From algebraic semantics to denotational semantics for Verilog

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    This paper considers how the algebraic semantics for Verilog relates with its denotational semantics. Our approach is to derive the denotational semantics from the algebraic semantics. We first present the algebraic laws for Verilog. Every program can be expressed as a guarded choice that can model the execution of a program. In order to investigate the parallel expansion laws, a sequence is intro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal specification-based online monitoring

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    With current trends towards more complex software system and use of higher level languages, a monitoring technique is of increasing importance for the areas such as performance enhancement, dependability, correctness checking and so on. In this paper, we present a formal specification-based online monitoring technique. The key idea of our technique is to build a linking system, which connects a sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biologically-inspired concepts for self-management of complexity

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Inherent complexity in large-scale applications may be impossible to eliminate or even ameliorate despite a number of promising advances. In such cases, the complexity must be tolerated and managed. Such management may be beyond the abilities of humans, or require such overhead as to make management by humans unrealistic. A number of initiatives inspired by concepts in biology have arisen for self... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based design of distributed collaborative bioinformatics processes in the jABC

    Publication Year: 2006
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Our approach to the model-driven collaborative design of workflows for bioinformatic applications uses the jABC for model driven mediation and choreography to complement a Web service-based elementary service provision. jABC is a framework for service development based on lightweight process coordination. Users (product developers and system/software designers) develop services and applications by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling bacterial growth patterns in the presence of antibiotic

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    With recent growth in systems biology research there has been a significant increase in complex systems modeling research relating to biological systems. Multi-drug resistant (MDR) organisms are a threat not only as hospital-acquired infections, but also now as community-acquired infections. Multilocus sequence typing (MLST) can genetically characterize clones of several bacterial pathogens, allow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.