By Topic

Engineering of Computer Based Systems, 2009. ECBS 2009. 16th Annual IEEE International Conference and Workshop on the

Date 14-16 April 2009

Filter Results

Displaying Results 1 - 25 of 49
  • [Front cover]

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (145 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (144 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (261 KB)  
    Freely Available from IEEE
  • Foreword

    Publication Year: 2009 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2009 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2009 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Using Integrative Models in an Advanced Heterogeneous System Simulation

    Publication Year: 2009 , Page(s): 3 - 10
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (551 KB) |  | HTML iconHTML  

    This paper is an academic experience report describing the use by researchers at the University of Arizona of a domain-specific language developed by the Institute for Software Integrated Systems (at Vanderbilt University). The domain in question is heterogeneous, distributed simulation of quad-rotor unmanned aerial vehicles (UAVs) as they respond to command and control requests from a human operator. We describe in detail how our individual designs of the controller and guidance laws for the UAV, its rendering and position updates, on-board sensors, and the various commands to delegate mission-critical behaviors, all interact using the ISIS-developed modeling language. We then discuss the outlook for this domain (heterogeneous system simulation and integration) for domain-specific languages and models, specifically for unmanned vehicle control and interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CQML: Aspect-Oriented Modeling for Modularizing and Weaving QoS Concerns in Component-Based Systems

    Publication Year: 2009 , Page(s): 11 - 20
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (541 KB) |  | HTML iconHTML  

    Current domain-specific modeling (DSM) frameworks for designing component-based systems often consider the system's structural and behavioral concerns as the two dominant concerns of decomposition while treating nonfunctional or quality of service (QoS) concerns as an after thought. Such frameworks lack a strong decoupling between the modeling of the system's structural composition and their QoS requirements. This lack of QoS modularization limits (1) reusability of such frameworks, (2) ease of maintenance when new non-functional characteristics are added, and (3) independent evolution of the modeling frameworks along both the structural and non-functional dimensions. This paper describes component QoS modeling language (CQML), which is a reusable, extensible, and aspect-oriented modeling approach that provides strong separation between the structural and non-functional dimensions. CQML supports independent evolution of structural as well as QoS metamodel of composition modeling languages. The join point model of CQML enables declarative QoS aspect modeling and supports automatic weaving of structural changes effected by QoS requirements. We evaluate the capabilities of CQML for a variety of structural modeling languages and provide quantitative results indicating the modeling effort saved in automating the weaving of QoS concerns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Capturing and Performance Estimation in an Holistic Design Environment

    Publication Year: 2009 , Page(s): 21 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (380 KB) |  | HTML iconHTML  

    The objective of the hArtes (holistic approach to reconfigurable real time embedded systems) is to provide a tool set that facilitates the management of entire design flow. Despite of its improved design productivity, the two bottleneck are: (1) capturing initial application specifications in the specified graphical tool and (2) Cycle accurate performance estimation in design space exploration. We propose: (1) a transformation methodology for converting reference sequential C code to data-flow specifications and (2) a design space exploration framework based on cycle accurate performance estimation. The proposed transformation methodology is based on functions reorganization and variables definitions. The proposed design space exploration framework consists of two design loops: computational architecture selection loop and communication architecture selection loop. Before entering into these loops, it is critical to estimate the performance of application function blocks. We propose a performance estimation methodology by performing simulations at CABA (cycle accurate bit accurate) level. Instead of simulating the entire application, each function block is instrumented and executed on the target simulation platform and the resulting information is stored in a performance estimation library. Experimentation with H.264 video encoding application proves the viability of the proposed transformation methodology. Validation and performance evaluations for performance estimation technique are done by extending the SoCLib library of simulation models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Raising the Abstraction of Domain-Specific Model Translator Development

    Publication Year: 2009 , Page(s): 31 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    Model-based development methodologies are gaining ground as software applications are getting more and more complex while the pressure to decrease time-to-market continually increase. Domain-specific modeling tools that support system analysis, simulation, and automatic code generation can increase productivity. However, most domain-specific model translators are still manually written. This paper presents a technique that automatically generates a domain-specific application programming interface from the same metamodels that are used to define the domain-specific modeling language itself. This facilitates the creation of domain-specific model translators by providing a high-level abstraction hiding all the cumbersome modeling tool-specific implementation details from the developer. The approach is illustrated using the generic modeling environment and the Microsoft .NET C# language. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Task Tree Executor: New Runtime for Parallelized Legacy Software

    Publication Year: 2009 , Page(s): 41 - 47
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (380 KB) |  | HTML iconHTML  

    Building a very large-scale distributed system, such as a power distribution system, was always regarded as a highly demanding undertaking in the area of engineering of computer based systems. Such systems nowadays are managing tens of millions of input variables using rather complex mathematical calculations. Traditionally, these calculations are implemented as sequential software, e.g. in FORTRAN. Under the current circumstances, when the processors are facing the well-known frequency wall, the research community started exploring new technology opportunities brought by the modern symmetric multiprocessors and multicores. One of the most challenging tasks in building modern very large-scale systems is the parallelization of legacy software. This paper contributes to the overall research effort in the area by proposing an original approach to parallelization of legacy sequential software. In the paper we introduce the concept of parallelization based on data slicing and construction of the corresponding task tree. Then we present the new runtime engine referred to as the task tree executor. Finally, we present the results of the performance evaluation based on a series of experiments made on the dual-core symmetric multiprocessor. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantically Enhanced Containers for Concurrent Real-Time Systems

    Publication Year: 2009 , Page(s): 48 - 57
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (407 KB) |  | HTML iconHTML  

    Future space missions, such as Mars Science Laboratory, are built upon computing platforms providing a high degree of autonomy and diverse functionality. The increased sophistication of robotic spacecraft has skyrocketed the complexity and cost of its software development and validation. The engineering of autonomous spacecraft software relies on the availability and application of advanced methods and tools that deliver safe concurrent synchronization as well as enable the validation of domain-specific semantic invariants. The software design and certification methodologies applied at NASA do not reach the level of detail of providing guidelines for the development of reliable concurrent software. To achieve effective and safe concurrent interactions as well as guarantee critical domain-specific properties in code, we introduce the notion of a Semantically Enhanced Container (SEC). A SEC is a data structure engineered to deliver the flexibility and usability of the popular ISO C++ Standard Template Library containers, while at the same time it is hand-crafted to guarantee domain-specific policies. We demonstrate the SEC proof-of-concept by presenting a shared nonblocking SEC vector. To eliminate the hazards of the ABA problem (a fundamental problem in lock-free programming), we introduce an innovative library for querying C++ semantic information. Our SEC design aims at providing an effective model for shared data access within the JPL's Mission Data System. Our test results show that the SEC vector delivers significant performance gains (a factor of 3 or more) in contrast to the application of nonblocking synchronization amended with the traditional ABA avoidance scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Systematic Process for Implementing Gateways for Test Tools

    Publication Year: 2009 , Page(s): 58 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (827 KB) |  | HTML iconHTML  

    Test automation is facing a new challenge because tools, as well as having to provide conventional test functionalities, must be capable to interact with ever more heterogeneous complex systems under test (SUT). The number of existing software interfaces to access these systems is also a growing number. The problem cannot be analyzed only from a technical or engineering perspective; the economic perspective is as important. This paper presents a process to systematically implement gateways which support the communication between test tools and SUTs with a reduced cost. The proposed solution does not preclude any interface protocol at the SUT side. This process is supported using a generic architecture of a gateway defined on top of OSGi. Any test tool can communicate with the gateway through a unique defined interface. To communicate the gateway and the SUT, basically, the driver corresponding to the SUT software interface has to be loaded. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Analysis of Probabilistic Timed Systems

    Publication Year: 2009 , Page(s): 69 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1553 KB) |  | HTML iconHTML  

    Probabilistic models are useful for analyzing systems which operate under the presence of uncertainty. In this paper, we present a technique for verifying safety and liveness properties for probabilistic timed automata. The proposed technique is an extension of a technique used to verify stochastic hybrid automata using an approximation with Markov Decision Processes. A case study for CSMA/CD protocol has been used to show case the methodology used in our technique. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using CSP to Model and Analyze TinyOS Applications

    Publication Year: 2009 , Page(s): 79 - 88
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (317 KB) |  | HTML iconHTML  

    The TinyOS concurrency model, although easier to reason about than shared-state threads, may still produce undesirable behavior as a result of unexpected interleaving of concurrent activities. This is problematic, since TinyOS applications are typically intended to run unattended for long periods of time, and must be reliable. In this paper, we describe a technique for modeling the interactions between TinyOS application components, and between an application and the TinyOS scheduling and preemption mechanisms, using the process algebra CSP. Analysis of the resulting process models can help TinyOS application developers to discover and diagnose concurrency-related errors in their designs that might otherwise go undetected until deployment of the application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed BMC: A Depth-First Approach to Explore Clause Symmetry

    Publication Year: 2009 , Page(s): 89 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (573 KB) |  | HTML iconHTML  

    In recent years new and efficient symbolic model checking algorithms have been developed. One technique, bounded model checking or BMC, has been particularly promising. BMC models the system being verified as a boolean formula whose satisfying assignments provide counterexamples for properties verified. BMC unrolls the system in its multiple iterations. Because of this the structure of the formula representing the system is very symmetric, since all iterations are similar in structure. This work explores this symmetry in a distributed algorithm by postponing the unrolling of the formulas until they are used. This minimizes communication among processors since the formulas transmitted are shorter. Moreover, avoiding the unrolling of conflict clauses has a more pronounced effect, because due to the symmetric nature of the formula, a conflict clause for one instant in the execution can be applied to time multiple instants. As a consequence, short conflict clauses can be unrolled into much more effective clauses, cutting back on the search space significantly. In our experiments we have obtained gains of up to 35% in verification time in some examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Meaning of SysML Activity Diagrams

    Publication Year: 2009 , Page(s): 95 - 105
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    In this paper, we aim to ascribe a meaning to SysML activity diagrams. To this end, we propose a dedicated algebraic-like language, namely activity calculus, and an operational semantics that provides a rigorous and intuitive operational understanding of the behavior captured by the diagram. The semantics covers advanced control flows such as unstructured loops and concurrent control flows. Further more, our approach allows non well-formed control flows, with mixed and nested forks and joins. The probabilistic behaviors as specified in SysML are also considered. This formalization allows us to build a sound framework for the verification and validation of systems design expressed in SysML activity diagrams. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Architectural Design Meets Security Engineering

    Publication Year: 2009 , Page(s): 109 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well as software engineering provide methods to deal with such requirements. However, there is still a critical gap concerning the integration of the methods of these separate fields. In this paper we close this gap with respect to security requirements by proposing a method that combines software engineering approaches with state-of-the-art security engineering principles. This method establishes an explicit alignment between the non-functional goal, the principles in the field of security engineering, and the implementation of a security architecture. The method aims at designing a system's security architecture based on a small, precisely defined, and application-specific trusted computing base. We illustrate this method by means of a case study which describes distributed enterprise resource planning systems using web services to implement business processes across company boundaries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tradeoff and Sensitivity Analysis of a Hybrid Model for Ranking Commercial Off-the-Shelf Products

    Publication Year: 2009 , Page(s): 119 - 127
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (485 KB) |  | HTML iconHTML  

    Despite its popularity, The COTS-based development still faces some challenges, in particular the evaluation and selection process in which uncertainty plays a major role. A hybrid model, composed of the analytic hierarchy process (AHP) and Bayesian belief network (BBN), is proposed to evaluate and rank various COTS candidates while explicitly considering uncertainty. Several input parameters such as weights assigned to evaluation criteria, relative scores for various COTS candidates, and prior belief about the satisfaction of various attributes associated with the evaluation criteria need to be estimated. The estimation process of these input parameters is subject to uncertainty that limits the applicability of the modelpsilas results. In this paper, we apply sensitivity analysis to check the validity and robustness of the model. Further, we apply tradeoff analysis to explore the impact of relaxing one criterion in order to achieve an increase in another criterion that is considered as more desirable in a particular project context. A digital library system is used as a case study to illustrate how the proposed tradeoff and sensitivity analysis was performed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Penny Saved is a Penny Earned: Applying Optimization Techniques to Power Management

    Publication Year: 2009 , Page(s): 128 - 137
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    Shortage of electricity is a major problem in many developing countries. Unfortunately, for some of these countries the only solution to this problem is to shut down complete electricity supply to a few neighborhoods to make up for the gap between demand and supply. To this end, we have developed a self-optimization approach to reduce the gap between demand and supply through remotely controlling high powered electric devices such as air conditioners. In this approach we have used mathematical optimization techniques such as linear programming to intelligently manage the electricity distribution. Not only through this approach we have been able to provide service-level guarantees to the consumers but we have also shown that our approach is fast, scalable and has the ability to handle unscheduled spikes in the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validating and Dynamically Adapting and Composing Features in Concurrent Product-Lines Applications

    Publication Year: 2009 , Page(s): 138 - 146
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    With the pressing in-time-market towards customized services, software product lines (SPL) are increasingly characterizing most of software landscape. SPL are mainly structured through offered features, where consistent composition and dynamic variability are the driving forces. We contribute to these two challenging problems when distribution and correctness are at stake. First, we soundly specify and validate any feature-oriented requirements using a component-based Petri nets framework referred to as co-nets. For rapid-prototyping, we semantically interpret in true-concurrent rewriting logic. For consistently composing features, a flexible feature-algebra is proposed. Finally, for runtime adaptability and integration of features, we leverage co-nets with an explicit aspectual-level, where features can be dynamically (un)woven on running components. The approach is thoroughly explained using a feature-intensive multi-lift system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.