Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07)

26-29 March 2007

Filter Results

Displaying Results 1 - 25 of 78
  • 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems - TOC

    Publication Year: 2007, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2007, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Composition of Cyber-Physical Systems

    Publication Year: 2007, Page(s):3 - 6
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Cyber physical systems (CPS) is emerging as a new research discipline at the intersection of physical, biological, engineering and information sciences. Information technology, once a provider of tools for sciences and engineering, has become an interdisciplinary field at the center of scientific and industrial innovation. This talk addresses some of the basic challenges of CPS and its relationshi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of Related Performance Simulation Models at an Early Stage in the Design Cycle

    Publication Year: 2007, Page(s):7 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    In the early development stages of embedded systems, fundamental decisions concerning the system architecture and a proper hardware/software partition must be made. The choices determine, e.g. power consumption, performance, and other system features. For this reason, a method plus supporting tools for the fast, efficient, and automated evaluation of system design alternatives is required. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Architecture Transformation Using Heuristics

    Publication Year: 2007, Page(s):15 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Heuristics have long been a popular and effective mechanism for capturing the knowledge of experts. In recent times, however, the more common use of heuristics has been as a means for communicating ideas at an abstract level, with little consideration to their potential as a structured approach to design improvement. With this paper we present the issues surrounding, and a structured method for, f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study: Applying Lyra in Modeling S60 Camera Functionality

    Publication Year: 2007, Page(s):25 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    We present an application of a modeling method for distributed systems to a case study of mobile phone camera functionality based on an existing implementation. The modeling method, Lyra, utilizes formal definitions, in this case UML2 state machines, for behavior We observe the industrial application of the models, for instance modeling conventions and tool support needed to enable it, and the app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Bayesian Networks to Architectural Optimisation

    Publication Year: 2007, Page(s):37 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    The field of optimisation covers a great multitude of principles, methods and frameworks aimed at maximisation of an objective under constraints. However, the classical optimisation can not be easily applied in the context of computer-based systems architecture as there is not enough knowledge concerning the dependencies between non-functional qualities of the system. Out approach is based on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanding the View on Complexity within the Architecture Trade-off Analysis Method

    Publication Year: 2007, Page(s):45 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    The following paper presents the learning outcomes from an investigation into the aspects of complexity involved in architecture-based analysis. Using a framework of situational complexity as provocation, the manifestations of complexity observed in the architecture tradeoff analysis method (ATAM) process are presented in terms of a people and systems dimension. These aspects of complexity are sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation

    Publication Year: 2007, Page(s):55 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    In today's computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defense and security. To protect computers from the ever-increasing threat of intrusion, we propose an event-driven architecture that provides fine grained intrusion detection and decision support capability. Within this archit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I

    Publication Year: 2007, Page(s):63 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    In this paper we propose the application of weak bisimulation for enterprise application integration verification. Formal verification is carried out by taking the system specification and design models of an integrated system and converting them into value passing CCS (calculus of communicating systems) processes. If a weak bisimulation relation is found between the two models, then it could be c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Description of a Classification System Framework for Easier Reuse

    Publication Year: 2007, Page(s):71 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    Frameworks are an important technology to reduce software development costs and shorten the time-to-market. However, framework complexity presents reuse problems that limit its success as an application development alternative. It has been widely recognized that is necessary to effectively communicate frameworks and provide appropriate tool support, but we argue that difficulties are also related ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patterns for Integrating and Exploiting Some Non-Functional Properties in Hierarchical Software Components

    Publication Year: 2007, Page(s):83 - 92
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Providing powerful and fine-grained capabilities for the analysis and management of non-functional properties is a major challenge for component-based software systems. In this paper, we propose integration patterns for nonfunctional properties of hierarchical software components. These patterns are based on a classification of low-level non-functional properties, which takes into account their na... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component-Based System Integration via (Meta)Model Composition

    Publication Year: 2007, Page(s):93 - 102
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    This paper provides three contributions to the study of functional integration of distributed enterprise systems. First, we describe the challenges associated with functionally integrating the software of these systems. Second, we describe how the composition of domain-specific modeling languages (DSMLs) can simplify the functional integration of enterprise distributed systems by enabling the comb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COTS Selection: Past, Present, and Future

    Publication Year: 2007, Page(s):103 - 114
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Commercial off-the-shelf (COTS) products are increasingly being used in software development. In COTS-based development, selecting appropriate COTS is the most crucial phase. This paper explores the evolution of COTS selection practices, and surveys eighteen of the most significant COTS selection approaches. The paper traces how each approach contributed to the improvement of current COTS selectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modern Distributed Data Acquisition and Control Systems Based on OPC Techniques

    Publication Year: 2007, Page(s):115 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Web technologies are gaining increased importance in automation control systems, especially in slow control systems. Alternatively, the requirements to exchange the complex data between the cooperating applications and the applications-based non-Microsoft Platforms are widely increasing in the industrial systems. The applications-based OPC (OLE for Process Control) technique to exchange data betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node-Oriented Modeling and Simulation of IP Networks

    Publication Year: 2007, Page(s):123 - 132
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (469 KB) | HTML iconHTML

    IP networks consist of autonomous nodes that perform routers' and hosts' functionalities. Based on this fact, this paper proposes a node-oriented IP network model and a new packet-level and stochastic discrete event-driven simulator - Visualized IP Network Simulator. The XML is used to encode node and network topology for scenario. Each individual node is completely autonomous and has its own buil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transformation of Existing Programs into Autonomic and Self-healing Entities

    Publication Year: 2007, Page(s):133 - 144
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Autonomic computing is a grand challenge in computing, which aims to produce software that has the properties of self-configuration, self-healing, self-optimization and self-protection. Adding such autonomic properties into existing applications is immensely useful for redeploying them in an environment other than they were developed for. Such transformed applications can be redeployed in differen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods of Sensors Localization in Wireless Sensor Networks

    Publication Year: 2007, Page(s):145 - 152
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    In recent years there has been a growing interest in wireless sensor networks (WSN) applications. Such sensor networks can be used to control temperature, humidity, contamination, pollution etc. Self-organization and routing algorithms dedicated to wireless sensor networks usually assume that sensors absolute positions are unknown and all decisions are based on sensor's own local information. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.