By Topic

Proceedings Ninth International Workshop on Software Specification and Design

16-18 April 1998

Filter Results

Displaying Results 1 - 25 of 25
  • Proceedings Ninth International Workshop on Software Specification and Design

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • A coordination model to specify systems including mobile agents

    Publication Year: 1998, Page(s):96 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB)

    A coordination model provides a formal framework in which the interaction of active entities that we call agents can be expressed. A coordination model deals with the creation and destruction of agents, their communication activities, their distribution and mobility in space, as well as the synchronization and distribution of their actions over time. We show how a coordination model called PoliS o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a software architecture: a case study

    Publication Year: 1998, Page(s):116 - 125
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB)

    In this paper we investigate on the performance of a Teleservices and Remote Medical Care System (TRMCS). We use a method which automatically derives a performance evaluation model, based on a Queueing Network Model, from a Software Architecture specification formally described in CHAM (CHemical Abstract Machine). The goal of this analysis is to provide a set of measures to analyse the system perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the consequences of acting in the presence of inconsistency

    Publication Year: 1998, Page(s):156 - 158
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (29 KB)

    Managing inconsistency in specifications covers a range of activities from consistency checking and inconsistency analysis to inconsistency handling through action. We argue that inconsistency analysis is insufficient to determine the choice of actions to take in the presence of inconsistency. Rather, we propose that some form of 'hypothetical reasoning' is needed in order to determine the consequ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1998, Page(s): 165
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • V&V through inconsistency tracking and analysis

    Publication Year: 1998, Page(s):43 - 49
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    In this paper we describe a research agenda for a study into the use of inconsistency analysis as a tool for software V&V and in particular, the use of category theory as a basis for modeling consistency relationships between the various artifacts of software development, including specifications, design, test cases, etc. Our expectation is that inconsistency analysis is fundamental to much of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From early to late formal requirements: a process-control case study

    Publication Year: 1998, Page(s):34 - 42
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    In this paper we consider three distinct and connected modelling activities at the Requirements Engineering (RE) level. Within the context of reactive systems, we suggest how these three activities can be supported by the use of appropriate formal languages, namely Kaos, AlbertII and Timed Automata. The i* framework is used for linking the various formal models and for providing a “high leve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An exercise in formal reasoning about mobile communications

    Publication Year: 1998, Page(s):25 - 33
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    With recent advances in wireless communication and the ubiquity of laptops, mobile computing has become an important research area. An essential problem in mobile computing is the delivery of a message from a source (stationary or mobile) to a desired mobile unit. Standard solutions used in Mobile IP and cellular phones rely on tracking the mobile unit. Tracking solutions scale badly when mobile u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety through security

    Publication Year: 1998, Page(s):18 - 24
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    This paper illustrates that the concept of noninterference, used in theories of security, may also be used to reason about safety. It presents a technique for modelling safety properties in terms of communicating processes, and develops a practical theory of system protection from failures. A simple example is presented to illustrate the application of this technique to different classes of safety... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a software engineering approach to Web site development

    Publication Year: 1998, Page(s):8 - 17
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    The World Wide Web (WWW) has become “the” global infrastructure for delivering information and services. The demands and expectations of information providers and consumers are pushing WWW technology towards higher-level quality of presentation, including active contents and improved usability of the hypermedia distributed infrastructure. This technological evolution, however, is not s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why IDLs are not ideal

    Publication Year: 1998, Page(s):2 - 7
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    The dominant approach to addressing heterogeneity, interoperability and legacy software components at present is based on the use of interface description languages (IDLs) such as the OMG/CORBA IDL. We believe that this approach has serious drawbacks. In this paper we outline our objections to the IDL-based approach, then describe ongoing research directed toward producing a superior alternative, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture directed behaviour analysis

    Publication Year: 1998, Page(s):144 - 146
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    A Software Architecture is the overall structure of a system in terms of its constituent components and their interconnections. In this paper, we discuss an approach to using architectural description for the behavioural analysis of distributed software systems and some of the issues which arise in providing tool support. The approach is based on the use of finite state automata to specify behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DESCARTES: an automatic programming system for algorithmically simple programs

    Publication Year: 1998, Page(s):106 - 115
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Most research work in the field of automatic programming has been focused on conceptually complex problems. However, although most of the programs we are generally faced with may be very big and manage large volumes of data, they are conceptually simple. Starting from this consideration, we have developed, since 1992, a system called DESCARTES which, fully automatically, generates programs written... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconciling system requirements and runtime behavior

    Publication Year: 1998, Page(s):50 - 59
    Cited by:  Papers (69)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper considers the problem of system deviations from requirements specifications. Such deviations may arise from lack of anticipation of possible behaviors of environment agents at specification time, or from evoking conditions in this environment. We discuss an architecture and a development process for monitoring system requirements at runtime to reconcile the requirements and the system's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The safety requirements engineering dilemma

    Publication Year: 1998, Page(s):147 - 149
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB)

    A key idea followed in the software and system safety community is that an identified hazard is best dealt with by changing the requirements of the system so that the hazard does not even occur. This modus operandi creates a serious dilemma. The hazard identification, that is needed in order to know what hazards to avoid, is best done after the code has been written, because only then are the pote... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Putting non-functional requirements into software architecture

    Publication Year: 1998, Page(s):60 - 67
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper presents an approach for incorporating non-functional information of software system into software architectures. To do so, components present two distinguished slots: their non-functional specification, where non-functional requirements on components are placed, and their non-functional behaviour with respect to these requirements. Also, connector protocols may describe which non-funct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modal logic as a design notation

    Publication Year: 1998, Page(s):150 - 152
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    A notation to describe software system designs is given, together with the means to verify properties over them. Designs are considered as models of a modal logic. The procedure to derive the modal model associated to a design, the algorithm to check properties over a model, the method to define new relations and the method of model filtration are presented. The proposed logic (KPI, a poly-modal l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental software development method based on abstract interpretation

    Publication Year: 1998, Page(s):126 - 134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    Stepwise Refinement is a well-known effective method for developing a large and complex software product. In traditional methods, a program is refined with respect to its function and the method is only applied in its design phase. In consequence, data defined at each step is too abstract to allow its execution and it is hard to find design errors by executing design artifacts. In this paper, we p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business rules as organizational policies

    Publication Year: 1998, Page(s):68 - 76
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Business rules are an important concept in the requirements definition process of computer based information systems. They have been used by information technology professionals and by database modeling, but few researchers in requirements engineering are studying them. From our point of view, business rules must be seen as very generic statements about the organization. As such, we have made the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodological support for requirements elicitation and formal specification

    Publication Year: 1998, Page(s):153 - 155
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    We propose a method for the elicitation and the expression of requirements. The requirements can then be transformed in a systematic way into a formal specification that is a suitable basis for design and implementation of a software system. The approach-which distinguishes between requirements and specifications-gives methodological support for requirements elicitation and specification developme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an algebra of architectural connectors: a case study on synchronization for mobility

    Publication Year: 1998, Page(s):135 - 142
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    To cope with the flexibility and extensibility needed for the specification of the architecture of evolving software systems, it is useful to have a set of primitive connectors from which new ones can be created in a systematic way as needs arise and to connect components only when they are required to interact. This could be achieved with a connector algebra whose constants are given primitive co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and implementation of a distributed planning and information system for courses based on story driven modelling

    Publication Year: 1998, Page(s):77 - 86
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Current object-oriented modelling methods focus on the specification of the static structure of software objects and their interaction at runtime. A major deficiency of these methods is that they do not provide means to specify the dynamic evolution of object structures. In this paper we propose a novel method called Story Driven Modelling (SDM) as a complementation to existing OO approaches. SDM ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traceability and modularity in software design

    Publication Year: 1998, Page(s):87 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    A software design specification consists of a number of documents that describe various aspect of the design at different levels of detail, that are lined in many ways. This paper shows how different designs may use different modularization criteria, and how documents describing these designs may be linked in a coherent way, even if the designs use techniques borrowed from structured as well as ob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing design methods to support real design processes

    Publication Year: 1998, Page(s):159 - 161
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Software design methods typically focus on the activities that individual designers should perform under ideal circumstances. They rarely, if ever, address the activities that should be performed when things do not go according to plan, such as when a customer requests changes to the specification, or when early design decisions must be changed. They also rarely address issues involving coordinati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature engineering [software development]

    Publication Year: 1998, Page(s):162 - 164
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The notion of feature is widely used to denote the functional structure and visible properties of a software system. More specifically, features are meant to represent a user centric organization of a software system's functionality. Yet, other than during requirements analysis, features are seldom treated explicitly by most existing tools and methods. The paper argues that a feature orientation c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.