By Topic

Engineering of Computer Based Systems (ECBS), 2010 17th IEEE International Conference and Workshops on

Date 22-26 March 2010

Filter Results

Displaying Results 1 - 25 of 66
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Request Permissions | PDF file iconPDF (15 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - ix
    Request Permissions | PDF file iconPDF (145 KB)  
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010 , Page(s): x
    Request Permissions | PDF file iconPDF (60 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organization and Program Committee

    Publication Year: 2010 , Page(s): xi - xiii
    Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010 , Page(s): xiv
    Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Technology and Conferences Board

    Publication Year: 2010 , Page(s): xv
    Request Permissions | PDF file iconPDF (100 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Wireless Sensor Networking: The Pleasure and the Pain

    Publication Year: 2010 , Page(s): 3
    Request Permissions | Click to expandAbstract | PDF file iconPDF (112 KB) |  | HTML iconHTML  

    The demand for highly lightweight decentralised self-management of Wireless Sensor Networks (WSNs) has lead to the pursuit of emergent and bio-inspired solutions. I will introduce the WSN field briefly and highlight the aspects that differentiate it from 'normal' computing. I then present some of the research we have been doing in this field for decentralised network control and emergent systems m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving Critical Systems

    Publication Year: 2010 , Page(s): 4
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (127 KB)  

    Increasingly software can be considered to be critical, due to the business or other functionality which it supports. Upgrades or changes to such software are expensive and risky, primarily because the software has not been designed and built for ease of change. Expertise, tools and methodologies which support the design and implementation of software systems that evolve without risk (of failure o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering Self-Service Correctional Facility Biometric Computer-Based Systems

    Publication Year: 2010 , Page(s): 5
    Request Permissions | Click to expandAbstract | PDF file iconPDF (148 KB) |  | HTML iconHTML  

    Faced with rising costs and rampant overcrowding, correctional facilities are turning to computer-based systems for help. More than 2.3 million people currently live in US prisons or jails-25 percent of the world's total inmate population-a comparatively much higher rate than in other Western countries. Denmark only incarcerates 66 of every 100,000 citizens, compared to 760 in the US. This situati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UAV Search: Maximizing Target Acquisition

    Publication Year: 2010 , Page(s): 9 - 18
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (921 KB) |  | HTML iconHTML  

    In situations where a human operator is unable to perform tactical control of an unmanned aerial vehicle (UAV), it may be necessary to have the UAV make or suggest tactical decisions. The interaction of the UAV computers with those of the human decision makers requires that choices for the human decision maker be easy to interpret and intuitive to implement or approve. This paper provides closed-f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do Sensornet Protocol Variants Yield Real Benefits?

    Publication Year: 2010 , Page(s): 19 - 28
    Request Permissions | Click to expandAbstract | PDF file iconPDF (233 KB) |  | HTML iconHTML  

    Simple, stateless networking protocols provide a low-cost and predictable foundation upon which to build decentralised applications. Sensornets are complex, containing emergent behaviour; identifying protocols offering appropriate behaviour may be difficult. In this paper we evaluate the relative performance of gossiping protocol variants in non-ideal sensornets. We examine the extent to which a "... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Run-Time Correlation Engine for Monitoring in a Cloud Computing Environment

    Publication Year: 2010 , Page(s): 29 - 38
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    Monitoring the status of running applications is a real life requirement and important research area. In particular log analysis is often required to understand how the system is behaving during execution. For example it is common for system administrators to collect and view logs from different hardware and software components to gain an understanding into system behavior, especially during activ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Based Regression Testing Approach for Evolving Software Systems with Flexible Tool Support

    Publication Year: 2010 , Page(s): 41 - 49
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (373 KB) |  | HTML iconHTML  

    Model-based selective regression testing promises reduction in cost and labour by selecting a subset of the test suite corresponding to the modifications after system evolution. However, identification of modifications in the systems and selection of corresponding test cases is challenging due to interdependencies among models. State-based testing is an important approach to test the system behavi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using UML Models and Formal Verification in Model-Based Testing

    Publication Year: 2010 , Page(s): 50 - 56
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (555 KB) |  | HTML iconHTML  

    In this paper we present a model-based testing approach where we integrate UML, UML-B and the Qtronic test generator tool, with the purpose of increasing the quality of models used for test generation via formal verification. The architectural and behavioral models of the system under test (SUT) are specified in UML and UML-B, respectively. UMLB provides UML-like visualization with precise mathema... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Test Plans for Acceptance Tests from UML Activity Diagrams

    Publication Year: 2010 , Page(s): 57 - 66
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (435 KB) |  | HTML iconHTML  

    The Unified Modeling Language (UML) is the standard to specify the structure and behaviour of software systems. The created models are a constitutive part of the software specification that serves as guideline for the implementation and the test of software systems. In order to verify the functionality which is defined within the specification documents, the domain experts need to perform an accep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guiding Architectural Restructuring through Architectural Styles

    Publication Year: 2010 , Page(s): 69 - 78
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (859 KB) |  | HTML iconHTML  

    Software architectures constitute one of the main artefacts of software-intensive system development. They outline the essential components and interconnections of a software system at a high level of abstraction, ignoring unnecessary details. How to address the evolution of software architectures, however, is still an important topic of current research. In this article, we use UML 2 as architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CPASA: Continuous Performance Assessment of Software Architecture

    Publication Year: 2010 , Page(s): 79 - 87
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (409 KB) |  | HTML iconHTML  

    Software architecture is a very important factor when it comes to performance measurements. A large percentage of projects failing their potential performance characterisation was caused by badly configured architectures. Performance assessment of software architectures proved to be a successful way of preventing this risk. Non-functional requirements verification is still an uncharted area in agi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Range Queries Based on a Structured Segment Tree in P2P Systems

    Publication Year: 2010 , Page(s): 91 - 99
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    Range queries will find any data item whose value within the range. The Distributed Segment Tree method (DST) is a famous method for range queries in P2P systems. It uses a segment tree to preserve the local continuity of the range data at each node based on the Distributed Hash Table (DHT) logic. It can be applied in any DHT-based P2P system. However, data distribution of the DST method may cause... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Warehouse Model for Integrating Fuzzy Concepts in Meta Table Structures

    Publication Year: 2010 , Page(s): 100 - 109
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (560 KB) |  | HTML iconHTML  

    In classical data warehouses (DWH), classification of values takes place in a sharp manner, because of this true values cannot be measured and smooth transition between classes does not occur. In this paper, a fuzzy data warehouse (FDWH) modeling approach, which allows integration of fuzzy concepts without affecting the core of a DWH is presented. This is accomplished through the addition of a met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Management Driven Design with Safety and Security Requirements

    Publication Year: 2010 , Page(s): 113 - 120
    Request Permissions | Click to expandAbstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    This paper exemplifies principles of embedded system design that props safety and security using operational errors management in frame of a dedicated Computer-Based System architecture. After reviewing basic principles of Cyber-Physical Systems as a novel slant (or marker?) to modeling and design in this domain, attention is focused on a real-world solution of a safety and security critical embed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Automata Model for Component-Based Real-Time Systems

    Publication Year: 2010 , Page(s): 121 - 130
    Request Permissions | Click to expandAbstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    One of the key challenges in modern real-time embedded systems is safe composition of different software components. Formal verification techniques provide the means for design-time analysis of these systems. This paper introduces an approach based on timed automata for analysis of such component-based real-time embedded systems. The goal of our research is to provide a method for treating the sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power and Area Efficient Design of Network-on-Chip Router through Utilization of Idle Buffers

    Publication Year: 2010 , Page(s): 131 - 138
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (646 KB) |  | HTML iconHTML  

    Network-on-Chip (NoC) is the interconnection platform that answers the requirements of the modern on-Chip design. Small optimizations in NoC router architecture can show a significant improvement in the overall performance of NoC based systems. Power consumption, area overhead and the entire NoC performance is influenced by the router buffers. Resource sharing for on-chip network is critical to re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.