Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Proceedings. 1998 IEEE Workshop on Application-Specific Software Engineering and Technology. ASSET-98 (Cat. No.98EX183)

28-28 March 1998

Filter Results

Displaying Results 1 - 25 of 32
  • Proceedings. 1998 IEEE Workshop on Application-Specific Software Engineering and Technology. ASSET-98 (Cat. No.98EX183)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • Panel discussion: Lucrative wireless telecom applications: five years from now - have not even been invented

    Publication Year: 1998, Page(s):174 - 176
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s): 176
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Statecharts supervision models for soft real-time systems

    Publication Year: 1998, Page(s):54 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Developing a reliable software system is a major requirement today as it is mainly used for critical applications. Applications such as automatic flight control, banking, and telephone switching demand safety and real-time features. In such an environment, the occurrence of a failure may result in damage to the company's reputation, and even catastrophic economic consequences. Another issue that m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring system and software reliability in safety-critical systems

    Publication Year: 1998, Page(s):48 - 53
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Reliability growth models, formal specifications, testing, safety analysis have been proposed to address system and software reliability. This paper presents a technique, called ripple effect analysis, which is well known in software maintenance, for system and software reliability. This technique is useful to ensure that all the changes that need to be done are indeed changed after a software mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Early prediction of project schedule slippage

    Publication Year: 1998, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Schedule slippage can be avoided if timely preventive measures are adopted. The most common solution involves deploying additional manpower to boost productivity. But increasing the manpower deployed can hasten product development only to a certain point. Staffing beyond this elusive optimum can actually delay the ultimate completion of a project. To complicate the issue, optimal staffing for mini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of architecture configuration on software reliability and performance estimation

    Publication Year: 1998, Page(s):90 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Presents a case study that enables the early prediction of software reliability and performance at the architecture design stage. Software architecture design is a crucial stage in the software development process, especially in developing large-scale software. Early prediction of the reliability and performance of the software can be used as a basis for making design decisions. We have studied se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change analysis and management: a process model and its application within a commercial setting

    Publication Year: 1998, Page(s):34 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    This paper discusses the need for systematic and methodical approaches to Change Analysis and Management (CHAM) on software projects. Our main contribution is a framework for CHAM, called the Change-Cycle, which is concerned with identifying and formalising reusable change knowledge. We review current methods and techniques for handling change and discuss the desirable features of a change process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying a modified EQL optimization method to MRL rule-based programs

    Publication Year: 1998, Page(s):75 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    We modify our previously developed (Blaz Zupan et al., IEEE Trans. on Knowledge and Data Eng., April 1997) optimization method for EQL (EQuational rule-based Language) systems to optimize MRL (Macro Rule-based Language) systems. In particular, we show how the EQL optimization method can be applied to an MRL system after its corresponding state-space graphs have been constructed. Since the time and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependency characterization in path-based approaches to architecture-based software reliability prediction

    Publication Year: 1998, Page(s):86 - 89
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Prevalent black-box based approaches to software reliability modeling are inappropriate to model the failure behavior of modern, component-based heterogeneous systems. Reliability prediction of applications taking into account their architecture is absolutely essential. The path-based approaches to architecture-based software reliability prediction rely on a fundamental assumption that the success... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STAR: a CASE tool for requirement engineering

    Publication Year: 1998, Page(s):28 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Requirement analysis is one of the most critical and time-consuming steps in the software development process. Requirements are usually vague and imprecise in nature. They often conflict with each other and many conflicts are implicit and difficult to identify. Moreover accessing the customer's trade-off preferences among the conflicting requirements is challenging. A CASE tool that assists the so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability analysis of three successive generations of a telecommunications system

    Publication Year: 1998, Page(s):122 - 127
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Analyzes the data (failure and correction reports) collected on the software of three successive generations of the Brazilian switching system TROPICO-R, during validation and operation. A comparative analysis of the three products is done and the main results are outlined. Emphasis is placed on the evolution of the software and the corresponding failures and corrected faults. The analysis address... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-board maintenance for long-life systems

    Publication Year: 1998, Page(s):69 - 74
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    Due to the low power, low cost, high reliability and high performance goals, the traditional approaches to fault-tolerant, ultra-reliable systems that rely on custom-built hardware and extensive component/subsystem replication will not be feasible for the new-generation spaceborne computing systems. In this paper, we present a new concept called “on-board maintenance”. We classify on-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time computing: meeting the client's demand for data access via the Internet

    Publication Year: 1998, Page(s):14 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    With the tremendous growth of the Internet, many companies are feeling pressure from their clients to provide realtime access to data. A flashy, static web site is no longer enough to satisfy those who demand 24-hour access to dynamic data including billing, personal profiles, and financial statements. We give an overview of the process for putting data online from analyzing existing shortcomings ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The TMO structuring approach and its potential for telecommunication applications

    Publication Year: 1998, Page(s):108 - 115
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The TMO (Time-triggered, Message-triggered Object) structuring scheme has the goal of improving productivity in the design of complex real-time computer systems (RTCSs). The TMO scheme facilitates a new paradigm in designing RTCSs called the GG (General-form, timeliness-Guaranteed) design paradigm. Its essence is to realize real-time computing with a common and general design style, not alienating... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of integrity techniques and risk assessment in system design

    Publication Year: 1998, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB)

    This paper focuses on developing a formal understanding of “failure” with respect to system implementations. Furthermore, we would like the system design process to be able to leverage off of this understanding. Our approach is restricted to the class of systems that can be modelled by HFSMs as described in Winter (1998). The purpose of this paper is to lay out a classification process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building business processes using a state transition model on World Wide Web

    Publication Year: 1998, Page(s):2 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Describes a state transition model to build a business process using the World Wide Web (WWW) as the user interface. A process is modeled as a collection of states, with each task represented by one state and several types of transition between states. The workflow model proposed in this paper allows the user to execute tasks concurrently, thus reducing the overall execution time. The design of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunication software validation using a synchronous approach

    Publication Year: 1998, Page(s):98 - 101
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Telephone services and features provide a challenging application domain for the development and the validation of real-time software. This paper reviews our experiment on incremental validation of services and features which has been carried out in collaboration with CNET-France Telecom. Because of the well-known “feature interaction problem”, telephone software can be considered as s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Observation inaccuracy in conformance testing with multiple testers

    Publication Year: 1998, Page(s):80 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    In the conformance testing of a software system, independent multiple testers (or observers) are often used, each providing input messages to and receiving output messages from the software system. For an execution of the software system, if all testers have observed correct results, the intuitive conclusion is that this execution is correct. However, this conclusion may be wrong, and this problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced authentication protocol for personal communication systems

    Publication Year: 1998, Page(s):128 - 132
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The mutual authentication protocols of GSM and IS-41 are computationally efficient and thwart masquerading and eavesdropping. However, these protocols do not support non-repudiation of service. We propose a simple authentication protocol for personal communication systems emphasizing non-repudiation and play back attack prevention. We extend the core authentication functions of GSM to include a on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model validation using simulated data

    Publication Year: 1998, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Effective and accurate reliability modeling requires the collection of comprehensive, homogeneous, and consistent data sets. Failure data required for software reliability modeling is difficult to collect, and even the available data tends to be noisy, distorted and unpredictable. Also, the complexity of the real world data might obscure the properties of the reliability models which are based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A protocol architecture for multimedia document retrieval over high speed LANs

    Publication Year: 1998, Page(s):116 - 121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    The emergence of gigabit local area networks (G-LANs) has spurred a tremendous interest in supporting networked multimedia applications over a LAN. Such LANs do not support the notion of QoS required by multimedia documents due to their asynchronous media access protocol. In this paper, we propose a dynamic bandwidth management scheme that uses the concept of time division multiple access (TDMA). ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability prediction of a trajectory verification system

    Publication Year: 1998, Page(s):63 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    The existence of software faults in safety-critical systems is not tolerable. Goals of software reliability assessment are estimating the failure probability of the program, θ, and gaining statistical confidence that θ is realistic. The paper presents practical problems and challenges encountered in an ongoing effort to assess and quantify software reliability of NASA's Day-of-Launch I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptable software for communications in video conferencing

    Publication Year: 1998, Page(s):8 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Video conferencing systems (VCS) have become practical in commercial and research institutions because the advances of technologies in networking and multimedia applications. A video conferencing session involves multiple parties, possibly geographically interspersed, which exchange real-time video data. How anomalies such as site failure and network partitioning affect the effectiveness and utili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concepts for a network maturity model

    Publication Year: 1998, Page(s):102 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Introduces the concept of a process model for network engineering and operation, which addresses the quality, process and maturity of the network engineering process. Currently, the state of the art in network engineering may be classified as less than formal. The need for a well planned and exercised network engineering process model is essential for the proper growth of network engineering pract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.