By Topic

Application-Specific Software Engineering Technology, 1998. ASSET-98. Proceedings. 1998 IEEE Workshop on

Date 28-28 March 1998

Filter Results

Displaying Results 1 - 25 of 32
  • Proceedings. 1998 IEEE Workshop on Application-Specific Software Engineering and Technology. ASSET-98 (Cat. No.98EX183)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • Panel discussion: Lucrative wireless telecom applications: five years from now - have not even been invented

    Publication Year: 1998, Page(s):174 - 176
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s): 176
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • An object-oriented framework for feedback control applications

    Publication Year: 1998, Page(s):134 - 139
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    We propose a reusable framework for a known engineering problem: feedback control systems. Feedback systems are commonly described in terms of block diagrams and have different implementations according to the software system designer. The proposed framework is constructed using software design patterns as its building blocks. The Unified Modeling Language (UML) notation is used for specifying the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability prediction of a trajectory verification system

    Publication Year: 1998, Page(s):63 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    The existence of software faults in safety-critical systems is not tolerable. Goals of software reliability assessment are estimating the failure probability of the program, θ, and gaining statistical confidence that θ is realistic. The paper presents practical problems and challenges encountered in an ongoing effort to assess and quantify software reliability of NASA's Day-of-Launch I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced authentication protocol for personal communication systems

    Publication Year: 1998, Page(s):128 - 132
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The mutual authentication protocols of GSM and IS-41 are computationally efficient and thwart masquerading and eavesdropping. However, these protocols do not support non-repudiation of service. We propose a simple authentication protocol for personal communication systems emphasizing non-repudiation and play back attack prevention. We extend the core authentication functions of GSM to include a on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of integrity techniques and risk assessment in system design

    Publication Year: 1998, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB)

    This paper focuses on developing a formal understanding of “failure” with respect to system implementations. Furthermore, we would like the system design process to be able to leverage off of this understanding. Our approach is restricted to the class of systems that can be modelled by HFSMs as described in Winter (1998). The purpose of this paper is to lay out a classification process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability analysis of three successive generations of a telecommunications system

    Publication Year: 1998, Page(s):122 - 127
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Analyzes the data (failure and correction reports) collected on the software of three successive generations of the Brazilian switching system TROPICO-R, during validation and operation. A comparative analysis of the three products is done and the main results are outlined. Emphasis is placed on the evolution of the software and the corresponding failures and corrected faults. The analysis address... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statecharts supervision models for soft real-time systems

    Publication Year: 1998, Page(s):54 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Developing a reliable software system is a major requirement today as it is mainly used for critical applications. Applications such as automatic flight control, banking, and telephone switching demand safety and real-time features. In such an environment, the occurrence of a failure may result in damage to the company's reputation, and even catastrophic economic consequences. Another issue that m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time computing: meeting the client's demand for data access via the Internet

    Publication Year: 1998, Page(s):14 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    With the tremendous growth of the Internet, many companies are feeling pressure from their clients to provide realtime access to data. A flashy, static web site is no longer enough to satisfy those who demand 24-hour access to dynamic data including billing, personal profiles, and financial statements. We give an overview of the process for putting data online from analyzing existing shortcomings ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A protocol architecture for multimedia document retrieval over high speed LANs

    Publication Year: 1998, Page(s):116 - 121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    The emergence of gigabit local area networks (G-LANs) has spurred a tremendous interest in supporting networked multimedia applications over a LAN. Such LANs do not support the notion of QoS required by multimedia documents due to their asynchronous media access protocol. In this paper, we propose a dynamic bandwidth management scheme that uses the concept of time division multiple access (TDMA). ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring system and software reliability in safety-critical systems

    Publication Year: 1998, Page(s):48 - 53
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Reliability growth models, formal specifications, testing, safety analysis have been proposed to address system and software reliability. This paper presents a technique, called ripple effect analysis, which is well known in software maintenance, for system and software reliability. This technique is useful to ensure that all the changes that need to be done are indeed changed after a software mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunication software validation using a synchronous approach

    Publication Year: 1998, Page(s):98 - 101
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Telephone services and features provide a challenging application domain for the development and the validation of real-time software. This paper reviews our experiment on incremental validation of services and features which has been carried out in collaboration with CNET-France Telecom. Because of the well-known “feature interaction problem”, telephone software can be considered as s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptable software for communications in video conferencing

    Publication Year: 1998, Page(s):8 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Video conferencing systems (VCS) have become practical in commercial and research institutions because the advances of technologies in networking and multimedia applications. A video conferencing session involves multiple parties, possibly geographically interspersed, which exchange real-time video data. How anomalies such as site failure and network partitioning affect the effectiveness and utili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The TMO structuring approach and its potential for telecommunication applications

    Publication Year: 1998, Page(s):108 - 115
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The TMO (Time-triggered, Message-triggered Object) structuring scheme has the goal of improving productivity in the design of complex real-time computer systems (RTCSs). The TMO scheme facilitates a new paradigm in designing RTCSs called the GG (General-form, timeliness-Guaranteed) design paradigm. Its essence is to realize real-time computing with a common and general design style, not alienating... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Early prediction of project schedule slippage

    Publication Year: 1998, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Schedule slippage can be avoided if timely preventive measures are adopted. The most common solution involves deploying additional manpower to boost productivity. But increasing the manpower deployed can hasten product development only to a certain point. Staffing beyond this elusive optimum can actually delay the ultimate completion of a project. To complicate the issue, optimal staffing for mini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of architecture configuration on software reliability and performance estimation

    Publication Year: 1998, Page(s):90 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Presents a case study that enables the early prediction of software reliability and performance at the architecture design stage. Software architecture design is a crucial stage in the software development process, especially in developing large-scale software. Early prediction of the reliability and performance of the software can be used as a basis for making design decisions. We have studied se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COTS software failures: can anything be done?

    Publication Year: 1998, Page(s):140 - 144
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Software development is quickly becoming more of a process of acquiring software components and composing them than building systems from scratch. From a time-to-market perspective, this is ideal, but from a quality perspective, this is worrisome. This paper addresses steps that component integrators should follow before relying on someone else's software libraries and components View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-board maintenance for long-life systems

    Publication Year: 1998, Page(s):69 - 74
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    Due to the low power, low cost, high reliability and high performance goals, the traditional approaches to fault-tolerant, ultra-reliable systems that rely on custom-built hardware and extensive component/subsystem replication will not be feasible for the new-generation spaceborne computing systems. In this paper, we present a new concept called “on-board maintenance”. We classify on-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building business processes using a state transition model on World Wide Web

    Publication Year: 1998, Page(s):2 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Describes a state transition model to build a business process using the World Wide Web (WWW) as the user interface. A process is modeled as a collection of states, with each task represented by one state and several types of transition between states. The workflow model proposed in this paper allows the user to execute tasks concurrently, thus reducing the overall execution time. The design of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model validation using simulated data

    Publication Year: 1998, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Effective and accurate reliability modeling requires the collection of comprehensive, homogeneous, and consistent data sets. Failure data required for software reliability modeling is difficult to collect, and even the available data tends to be noisy, distorted and unpredictable. Also, the complexity of the real world data might obscure the properties of the reliability models which are based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concepts for a network maturity model

    Publication Year: 1998, Page(s):102 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Introduces the concept of a process model for network engineering and operation, which addresses the quality, process and maturity of the network engineering process. Currently, the state of the art in network engineering may be classified as less than formal. The need for a well planned and exercised network engineering process model is essential for the proper growth of network engineering pract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Return on investment of software quality predictions

    Publication Year: 1998, Page(s):145 - 150
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    Software quality classification models can be used to target reliability enhancement efforts toward high risk modules. We summarize a generalized classification rule which we have proposed. Cost aspects of a software quality classification model are discussed. The contribution of this paper is a demonstration of how to assess the return on investment of model accuracy, in the context of a software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying a modified EQL optimization method to MRL rule-based programs

    Publication Year: 1998, Page(s):75 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    We modify our previously developed (Blaz Zupan et al., IEEE Trans. on Knowledge and Data Eng., April 1997) optimization method for EQL (EQuational rule-based Language) systems to optimize MRL (Macro Rule-based Language) systems. In particular, we show how the EQL optimization method can be applied to an MRL system after its corresponding state-space graphs have been constructed. Since the time and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STAR: a CASE tool for requirement engineering

    Publication Year: 1998, Page(s):28 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Requirement analysis is one of the most critical and time-consuming steps in the software development process. Requirements are usually vague and imprecise in nature. They often conflict with each other and many conflicts are implicit and difficult to identify. Moreover accessing the customer's trade-off preferences among the conflicting requirements is challenging. A CASE tool that assists the so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.