12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007)

11-14 July 2007

Filter Results

Displaying Results 1 - 25 of 47
  • 12th IEEE International Conference on Engineering Complex Computer Systems-Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • 12th IEEE International Conference on Engineering Complex Computer Systems-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • 12th IEEE International Conference on Engineering Complex Computer Systems-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • 12th IEEE International Conference on Engineering Complex Computer Systems - TOC

    Publication Year: 2007, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • POSIX file store in Z/Eves: an experiment in the verified software repository

    Publication Year: 2007, Page(s):3 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    We present results from the second pilot project in the international Verification Grand Challenge: a formally verified specification of a POSIX-compliant file store using the Z/Eves theorem prover. The project's overall objective is to build a verified file store for space-flight missions. Our specification of the file store is based on Morgan & Sufrin's specification of the UNIX filing syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Just-in-Time Certification

    Publication Year: 2007, Page(s):15 - 24
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper is a call and a manifesto for new approaches to certification. We start by advocating a goal-based approach in which unconditional claims delivered by formal methods are combined with other evidence in multi-legged cases ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular Synthesis of Discrete Controllers

    Publication Year: 2007, Page(s):25 - 34
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    This paper presents supervisory control theory in a process-algebraic setting, and proposes a way of synthesising modular supervisors that guarantee nonblocking. The framework used includes the possibility of hiding actions which results in nondeterminism. As modularity crucially depends on the process equivalence used, the paper studies possible equivalences and points out that, in order to be co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving Discrete Relative Timing with Untimed Process Algebra

    Publication Year: 2007, Page(s):35 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    For many systems, timing aspects are essential. Therefore, when modelling these systems, time should somehow be represented. In the past, many timed process algebras have been developed, using untimed process algebras as initial inspiration. In this paper, we take another approach, considering the possibility to model timing aspects with an untimed process algebra. The advantage is that the algebr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking-based Verification of Web Application

    Publication Year: 2007, Page(s):47 - 55
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    This paper focuses on automated verification to check whether the behavior of a Web application conforms to its design. The Object Relation Diagram as design model and the Kripke structure as implementation model are employed to describe the object structure and the external observable behavior of a Web application respectively. We propose an approach to automatically generating from the design mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A light-weight static approach to analyzing UML behavioral properties

    Publication Year: 2007, Page(s):56 - 63
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Identifying and resolving design problems in the early design phase can help ensure software quality and save costs. There are currently few tools for analyzing designs expressed using the Unified Modeling Language (UML). Tools such as OCLE and USE support analysis of static structural properties. These tools provide mechanisms for checking instance models against invariant properties expressed us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Model for Compensable Transactions

    Publication Year: 2007, Page(s):64 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    Different from traditional transactions, a compensable transaction relies on compensations to amend partial execution whenever an error occurs. The compensation is preserved on successful completion of its forward transaction for possibly later use. In this paper, we pay attention to the compositional structure of compensable transactions. Except for sequential and parallel compositions, other use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Semantic Model of the Semantic Web Service Ontology (WSMO)

    Publication Year: 2007, Page(s):74 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Semantic Web services, one of the most significant research areas within the semantic Web vision, has attracted increasing attention from both the research community and industry. The Web service modelling ontology (WSMO) has recently been proposed as an enabling framework for the total/partial automation of the tasks (e.g., discovery, selection, composition, mediation, execution, monitoring, etc.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting V&V Technology Combinations: How to Pick a Winner?

    Publication Year: 2007, Page(s):87 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Numerous software verification and validation (V&V) techniques and tools exist to analyse requirements, designs and implementations of software systems. These V&V technologies range from relatively lightweight ones, such as inspection and testing, to more heavyweight technologies based on formal methods and theorem proving. For complex systems, a significant part of the cost and effort for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach to the Detection of Cheating in Multiplayer Online Games

    Publication Year: 2007, Page(s):97 - 106
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2504 KB) | HTML iconHTML

    Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commercial pressures. Under these conditions, security breaches allowing clients to employ illegal behaviours have become common; current commercial approaches have limited capabilities for reacting rapidly to such threats. This pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reasoning about Nonblocking Concurrency using Reduction

    Publication Year: 2007, Page(s):107 - 116
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Reduction methods developed by Lipton, Lamport, Cohen, and others, allow one to reason about concurrent programs at various levels of atomicity. An action which is considered to be atomic at one level may be implemented by more complex code at the next level. We can show that certain properties of the program are preserved by first showing that the property holds when the expanded code is executed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combined Approach for Information Flow Analysis in Fault Tolerant Hardware

    Publication Year: 2007, Page(s):117 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    Fault tolerance in information security devices is difficult to establish due to the large number of possible interactions in the device (e. g. embedded code, boolean logic, electromagnetic interference, etc.) In previous work we examined information flow as a graph problem by composing orthogonal views of the device under analysis. In other work we used fault-tree analysis to reason about informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Registry for Sensor Network Discovery

    Publication Year: 2007, Page(s):129 - 137
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    The sensor network service has emerged as a new technical research area. The sensor network service provides useful functions to the user by sensing the condition of physical entities. One important issue that is rarely addressed by current studies on the sensor network service is that they only use sensor-derived data to achieve local service goals. However, once external users can discover globa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent based approach to examining shared situation awareness

    Publication Year: 2007, Page(s):138 - 147
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    With the increased interest in multi-user systems with distributed decision making tasks, such as network centric warfare and free-flight air traffic control, the concept of shared situation awareness (SSA) has become more important. SSA relates to the awareness that different operators have of the system state and the information needs of their team-mates, in order to coordinate their actions eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product Line Enabled Intelligent Mobile Middleware

    Publication Year: 2007, Page(s):148 - 160
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Current mobile middleware is designed according to a 'one-size-fits-all' paradigm, which lacks the flexibility for customization and adaptation to different situations, and does not support user-centered application scenarios well. In this paper we describe an ongoing intelligent mobile middleware research project called PLIMM that focuses on user-centered application scenarios. PLIMM is designed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pex--An Intelligent Assistant for Rigorous Developer Testing

    Publication Year: 2007, Page(s): 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Summary form only given. Pex takes test-driven development to the next level. Pex analyzes .NET applications. From a parameterized unit test, which serves as a specification, it automatically produces traditional unit tests cases with high code coverage. Moreover, when a generated test fails, Pex can often suggest a bug fix. To do so Pex performs a systematic program analysis (similar to path boun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Belief-augmented OWL (BOWL) Engineering the SemanticWeb with Beliefs

    Publication Year: 2007, Page(s):165 - 174
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6702 KB) | HTML iconHTML

    As the semantic web is an open, complex and constantly evolving medium, it is the norm, but not exception that information at different sites is incomplete/inconsistent. This poses challenges for the engineering and development of agent systems on the semantic web since autonomous software agents need to understand, process and aggregate this information. Ontology language OWL provides core langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Contract Language for Plugin-based Software Engineering

    Publication Year: 2007, Page(s):175 - 184
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Plugin-based application design has become increasingly popular in recent years, and has contributed to the success of a range of very different applications including Mozilla Firefox and the Eclipse development environment. Using plugins is a promising approach to build complex systems that have to be reconfigured at runtime, and several plugin based general purpose runtime environments are curre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking Object-Z with Spec#

    Publication Year: 2007, Page(s):185 - 196
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Formal specifications have been a focus of software engineering research for many years and have been applied in a wide variety of settings. Their use in software engineering not only promotes high-level verification via theorem proving or model checking, but also inspires the "correct-by- construction" approach to software development via formal refinement. Although this correct-by-construction m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.