By Topic

Engineering of Complex Computer Systems (ICECCS), 2012 17th International Conference on

Date 18-20 July 2012

Filter Results

Displaying Results 1 - 25 of 49
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1431 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (1431 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (123 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Co-chairs

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Non-intrusive Repair of Reactive Programs

    Publication Year: 2012, Page(s):3 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    We show how, under certain conditions, programs written in the behavioral programming approach can be modified (e.g., as result of new requirements or discovered bugs) using automatically-generated code modules. Given a trace of undesired behavior, one can generate a relatively small piece of code, whose execution is interwoven at run time with the rest of the system and brings about the desired c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging the Gap between User Requirements and Configuration Requirements

    Publication Year: 2012, Page(s):13 - 22
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    The Service Availability Forum supports the realization of Highly Available systems by means of standards like the Availability Management Framework (AMF), a middleware service that manages the high availability of services provided by applications through the coordination of their redundant components. AMF configurations for applications, capable of providing and protecting services, can be gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Experimental Study on Collaborative Filtering for Requirements Engineering

    Publication Year: 2012, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Requirements elicitation and management are fundamental phases in every project, but difficulties in the interactions between the stakeholders can make them hard. Techniques which can reduce information and communication overloading could help to avoid misunderstandings. Recent works underline that Recommender Systems represent a useful technology that can ease the Requirements Engineering activit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Use Case Requirements Using SFTA and SFMEA Techniques

    Publication Year: 2012, Page(s):29 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Software Fault Tree Analysis (SFTA) and Software Failure Modes and Effects Analysis (SFMEA) are the techniques used to improve the reliability of software systems. SFTA is a top down deductive approach while SFMEA is a bottom up inductive approach to do risk analysis. In this paper, we present a formal approach to analyze and validate the functional requirements using SFTA and to identify the vuln... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control Systems: Phenomena and Structuring Functional Requirement Documents

    Publication Year: 2012, Page(s):39 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    Influenced by the Parnas and Madey's four-variable model and the concept of phenomena in problem frames, we desire to provide guidelines to facilitate refinement-based formal modelling. These guidelines are based on monitored, controlled, mode and commanded (MCMC) phenomena of a control system. Commanded phenomena reflect the role that an operator plays in system control. The mode phenomenon captu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Hardware Reuse through XML-based Interface Encapsulation

    Publication Year: 2012, Page(s):49 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    This work proposes an encapsulation scheme aimed at simplifying the reuse process of hardware cores. This hardware encapsulation approach has been conceived with a twofold objective. First, we look for the improvement of the reuse interface associated with the hardware core description. This is carried out in a first encapsulation level by improving the limited types and configuration options avai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models and Methodology for Automated Business Continuity Analysis

    Publication Year: 2012, Page(s):57 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Businesses and enterprises depend more than ever on IT service systems. Business processes are vulnerable to disruptions caused by failures in IT systems. Business Continuity Management addresses this problem and tries to identify and determine strategies and responses to overcome or mitigate possible business disruptions. In this paper we introduce a novel Business Continuity Model for IT systems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Patterns for Rule-Based Refinement of Safety Critical Embedded Systems Models

    Publication Year: 2012, Page(s):67 - 76
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (962 KB) | HTML iconHTML

    Safety critical embedded systems must be verified and optimized. Their production process, which includes both automatic code generation and middleware implementation, depends on the the target execution platform and must be adapted accordingly. In such a context, Model Driven Architecture provides several approaches to transform user models into programming code but these solutions lack of flexib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Merging UML2 Composite Structures of Software Product Lines

    Publication Year: 2012, Page(s):77 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    The software product line (SPL) engineering aims at producing reusable software-intensive systems at lower cost, in shorter time and with high quality. Modeling SPLs is a key concept for reuse: It allows stakeholders to describe commonalities and differences within a family of products. However modeling large-scale SPLs is complex and tedious. Therefore we advocate distributing the modeling task a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic Scenario-Based Analysis of UML Design Class Models

    Publication Year: 2012, Page(s):86 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Scenario-based UML Design Analysis (SUDA) is a lightweight technique for analyzing behavior specified in UML design class models. A person (verifier) charged with verifying a design class model developed by an independent group of modelers can use SUDA to analyze the design class model against a set of scenarios manually created by the verifier. In this paper we describe an extension of SUDA that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Data Gathering Protocol Using PRISM

    Publication Year: 2012, Page(s):96 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Recent developments in processor, memory and radio technologies have made it possible to apply Wireless Sensor Network (WSN), which consists of nodes with limited computing capability and energy, to gather various information, for instance, to gather water consumption data from residential area. However, due to the limited energy of the working nodes, energy efficient data gathering protocol shoul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interaction-Driven Approach to Identifying Functional Behaviors of Service Robot Systems

    Publication Year: 2012, Page(s):109 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    The service robot domain has gained increasing attention for its significant impact on human society. By its nature, the service robot domain is component-based and distributed and comprising components are usually developed by third parties as black-box. In general, very limited information is available even in execution logs. This makes it difficult for the system integrator to understand and ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Majority-Based Re-routing for Differentiated Reliability in Wireless Sensor Networks

    Publication Year: 2012, Page(s):119 - 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (985 KB) | HTML iconHTML

    A good deal of research and development has been carried out in architecture and protocol design, energy saving and location, but only a few studies have been done on network performance in WSN (Quality of Service-QoS). The commonly accepted QoS metrics include bandwidth, delay, delay jitter and reliability. Whereas the majority of developed applications for WSNs are event-critical applications, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dhara: A Service Abstraction-Based OS Kernel Design Model

    Publication Year: 2012, Page(s):127 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    Traditional procedural operating system (OS) kernels sacrifice maintainability and understandability for optimum performance. Though object oriented (OO) kernels can address these problems up to a certain extent, they lack the layered approach of services and service compositions. We present a new kernel design model Dhara, that raises the level of abstraction from objects and procedures to servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatio-temporal UML Statechart for Cyber-Physical Systems

    Publication Year: 2012, Page(s):137 - 146
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    Cyber-Physical Systems (CPSs) integrate computing, communication and control processes. Therefore, both time and space information are required in the design and modeling of CPS systems. CPS also requires demanding real time property. However, unified modeling of continuous and discrete variables is still an unsolved problem in the CPS development. In this paper we propose an extended UML state ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.