Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems

11-13 April 2012

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Keynote

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity of a Special Deobfuscation Problem

    Publication Year: 2012, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    This paper considers process of obfuscation as adding additional (redundant) entities to the program at intermediate representation that would complicate the understanding of entangled code. The presented mathematical apparatus discusses introductory terms, definitions, and operations and formulates a theorem about NP-completeness of such deobfuscation problem. We show that the problem of determin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Template Metaprogramming to Enhance Reuse in Visitor-Based Model Interpreters

    Publication Year: 2012, Page(s):5 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    This paper discusses an approach called Metapro-grammable Interpreters for Model-driven Engineering (MIME), which integrates C++ meta-programming techniques into model interpreters for domain-specific modeling languages (DSMLs). The goal of MIME is to reduce reinvention of core model interpretation logic across model interpreters that use the Visitor software design pattern. Experience from applyi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Software Generation and Hardware Coprocessor Synthesis for Data-Adaptable Reconfigurable Systems

    Publication Year: 2012, Page(s):15 - 23
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1042 KB) | HTML iconHTML

    We present an overview of a data-adaptable reconfigurable embedded systems design methodology. The paper presents a novel paradigm for hardware/software code sign and reconfigurable computing driven by data-adaptability. The data-adaptable approach allows designers to directly model the data configurability of the target application, thereby enabling a solution that permits dynamic reconfiguration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Verifying the Ariadne Protocol Using CSP

    Publication Year: 2012, Page(s):24 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always an essential part. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking Goal-Oriented Requirements for Self-Adaptive Systems

    Publication Year: 2012, Page(s):33 - 42
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1356 KB) | HTML iconHTML

    To deal with the increasing complexity and uncertainty of software systems, novel software engineering models and tools are required to make such systems self-adaptive. As part of ongoing research, we investigate various models, schemes and mechanisms to model and engineer self-adaptation in complex software systems. To this end, we have defined SOTA (State of the Affairs) as a general goal-orient... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Parameterized Attributes to Improve Testing Capabilities with Domain-Specific Modeling Languages

    Publication Year: 2012, Page(s):43 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1540 KB) | HTML iconHTML

    Domain-specific modeling languages (DSMLs) show promise in improving model-based testing and experimentation (T&E) capabilities for software systems. This is because its intuitive graphical languages reduce complexities associated with error-prone, tedious, and time-consuming tasks. Despite the benefits of using DSMLs to facilitate model-based T&E, it is hard for testers to capture m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Touch-Screen Stimulation for Automated Verification of Touchscreen-Based Devices

    Publication Year: 2012, Page(s):52 - 55
    Cited by:  Papers (2)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    This paper presents an approach to stimulation of the touch-screen as part of the automated system for smart phone and tablet verification. Stimulation is performed in two ways: by touching the screen with the long conductor connected to the ground and by stimulating the screen with orthogonal conductive lines. The conductor is disconnected from the screen electrically, with the use of a transisto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simultaneous Functionality Verification System of Multiple Set-Top Boxes

    Publication Year: 2012, Page(s):56 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1178 KB) | HTML iconHTML

    Set-Top Box device functionalities have been advancing fast during the last decade. This has been mainly triggered by appearance of new multimedia services and applications. Given the high complexity of the STB and large amount of services to be supported, the STB functional verification has become highly challenging task, from both the testing time and testing reliability perspective. High compet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Set-Top Box Menu Navigation Scheme for STB Menu Functional Verification

    Publication Year: 2012, Page(s):60 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    An increased complexity of current Set-Top Box (STB) solutions is accompanied by more difficult verification of wide range of supporting functionalities. Due to large number of the STB functionalities the menu of the STB, which is considered as the main tool for the STB control, is of more complex structure. The complexity of the STB menu structure makes both manual and automatic control of the ST... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analytical Review of Process-Centered Software Engineering Environments

    Publication Year: 2012, Page(s):64 - 73
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    Process-centered Software Engineering Environments, or PSEEs, are intended for the definition, modification, and enactment of software process models, they thus bring software development processes into effect. Even though research efforts in process-centered software engineering abound, PSEE technology has not received the attention that it deserves. In order to create a concise but effective and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Way towards Efficiency of SCADA Infrastructure

    Publication Year: 2012, Page(s):74 - 81
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1469 KB) | HTML iconHTML

    Traditional SCADA solutions are currently under strong pressure by market, to shift their focus from process control of a limited set of industrial plants, to the control of a whole large-scale system. Usually this whole system is only partially covered by SCADA IO signals, therefore complex simulation model is required not only to give decision support, but also to replace all missing measurement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architecture for Safe and Secure Automation System Devices and Maintenance Process

    Publication Year: 2012, Page(s):82 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (783 KB) | HTML iconHTML

    This paper describes a generic high-level security architecture for safety critical automation system devices and a secure solution for device maintenance. The main focus lies on security measures which can be implemented by the automation device manufacturer. Common threats and attack vectors for automation systems are identified and classified regarding their criticality. Based on those threats ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond Mainstream Adoption: From Agile Software Development to Agile Organizational Change

    Publication Year: 2012, Page(s):90 - 97
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    The agile paradigm is now a mainstream approach to software development, with Scrum emerging as the dominant methodology in the field. The rapid diffusion of the approach is an indicator of its current value to organizations but further gains seem possible. One major step would be the use of the agile approach in all organizational activity. This opportunity has always been part of the Scrum philo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Taxonomy of Change Types and Its Application in Software Evolution

    Publication Year: 2012, Page(s):98 - 107
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB) | HTML iconHTML

    Changes play a central role in software evolution, where the types of changes are as multifarious as their consequences. When changing software, impact analysis and regression testing are required to preserve the quality of the system. However, without a consistent classification of types of change operations, a well-founded impact analysis methodology cannot be developed. Existing works which ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.