Proceedings Sixth IEEE International Conference on Engineering of Complex Computer Systems. ICECCS 2000

14-14 Sept. 2000

Filter Results

Displaying Results 1 - 25 of 29
  • Sixth IEEE International Conference On Engineering Of Complex Computer Systems

    Publication Year: 2000, Page(s):iii - viii
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • Proceedings 2000 International Conference on Parallel Processing

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (777 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 240
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • A test class framework for generating test cases from Z specifications

    Publication Year: 2000, Page(s):164 - 171
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    This paper introduces test classes and a test class framework for generating test cases from Z specifications. We define a test class using object-oriented concept in test framework instead of Phil Stock's test template. Our test framework for Z specifications uniformly defines the test data and oracles in a test class that also contains the information of before states and after states for an ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamically detecting relevant program invariants

    Publication Year: 2000, Page(s): 162
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent programming made easy

    Publication Year: 2000, Page(s):151 - 160
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    The task of programming concurrent systems is substantially more difficult than the task of programming sequential systems with respect to both correctness and efficiency. In this paper we describe a constraint-based methodology for writing concurrent applications. A system is modeled as: (a) a set of processes containing a sequence of “markers” denoting the processes points of interes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification criteria for a compositional model for reactive systems

    Publication Year: 2000, Page(s):25 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    System composition/decomposition has to be analyzed in terms of temporal constraints associated with the components' external interface. The analysis is focused on the propagation of temporal constraints along the structural hierarchy, thus showing that in many cases missing temporal constraints can be evaluated on the basis of the temporal constraints known. A set of criteria for the verification... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable data mining with log based consistency DSM for high performance distributed computing

    Publication Year: 2000, Page(s):143 - 150
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    Mining the large Web based online distributed databases to discover new knowledge and financial gain is an important research problem. These computations require high performance distributed and parallel computing environments. Traditional data mining techniques such as classification, association, clustering can be extended to find new efficient solutions. The paper presents the scalable data min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated result verification with AWK

    Publication Year: 2000, Page(s):188 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    The goal of result-verification is to prove that one execution run of a program satisfies its specification. Compared with implementation-verification, result-verification has a larger scope for applications in practice, gives more opportunities for automation and, based on the execution record not the implementation, is particularly suitable for complex systems. This paper proposes a technical fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing complexity in real-time reactive systems

    Publication Year: 2000, Page(s):12 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB)

    The paper discusses complexity categories associated with the phases of a process model that is followed in a rigorous development of real time reactive systems. We describe the complexity that is inherent in each phase and give measures to quantify it and methods to contain it. One of the goals of the work is to automate the measurement methods and integrate them into TROMLAB, a rigorous framewor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Definitions of equivalence for transformational synthesis of embedded systems

    Publication Year: 2000, Page(s):134 - 142
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    Design of embedded systems is a complex task that requires design cycles founded upon formal notation, so that the synthesis from specification to implementation can be carried out systematically. The authors present a computational model for embedded systems based on Petri nets called PRES+. It includes an explicit notion of time and allows a concise formulation of models. Tokens, in our notation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile IP route optimization method for a carrier-scale IP network

    Publication Year: 2000, Page(s):120 - 121
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    The current mobile IP specification forces all packets forwarded to a mobile terminal (MT) to be routed via that terminal's home agent (HA), which often leads to triangular routing, which in turn causes data transmission delay and wastes network resources. IETF (Internet Engineering Task Force) is studying a solution that can optimize the route length, but this solution requires the implementation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of three specification-based testing criteria

    Publication Year: 2000, Page(s):179 - 187
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    This paper compares three specification-based testing criteria using Mathur and Wong's PROBSUBSUMES measure. The three criteria are specification-mutation coverage, full predicate coverage, and transition-pair coverage. A novel aspect of the work is that each criterion is encoded in a model checker, and the model checker is used first to generate test sets for each criterion and then to evaluate t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity: concept, causes and control

    Publication Year: 2000, Page(s):2 - 9
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Complexity arises from many sources: both within and outside the system. Internal sources include modern hardware, e.g. super-scalar processors, and external sources include the requirements for evolving already successful systems. Complexity is inescapable unless we are willing to reduce our dependence on computers, and to forgo the benefits they bring us. This raises the issue of how we control,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overcoming software complexity by constructing abstraction hierarchies: the principles and applications

    Publication Year: 2000, Page(s):126 - 130
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Ever increasing software complexity requires serious consideration to make software as a whole into sustainable social infrastructure. Abstraction hierarchies realized as incrementally modular hierarchies of software are shown to be the strong candidates to reduce software complexity. The program construct of Java is used as a test case to demonstrate the power of cellular modeling and we show how... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interworking among intelligent networks and different networks: service control interfaces and their applications

    Publication Year: 2000, Page(s):118 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    A service control interface is proposed that can be used for telephony services provided by interworking among intelligent networks (INs), computer telephony (CT), and voice over IP (VoIP) systems. The IN Application Protocol (INAP) is mapped to a CORBA (Common Object Request Broker Architecture) interface, based on a proposed rule that achieves lightweight implementation. The proposed interface w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of the domain modeling method for families of systems with the SOFL formal specification language

    Publication Year: 2000, Page(s):61 - 71
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    An application domain is defined as a family of systems that have some features in common and others that differentiate them. A domain model is a multiple view object oriented analysis model for the application domain that reflects the common aspects and variations among the members of the family of systems that constitute the domain. The paper describes the integration of the domain modeling meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent-agent based decision support system for a complex command and control application

    Publication Year: 2000, Page(s):94 - 104
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    The authors present an architectural overview of an agent based decision support environment. We have selected the domain of AWACS Command and Control, in which human controllers need to make critical decisions under strict timing constraints in a dynamically changing environment. The decision support training environment is based on distributed simulation, tightly coupled with an intelligent agen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis tool for coupling-based integration testing

    Publication Year: 2000, Page(s):172 - 178
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    This research is part of a project to develop practical, effective, formalizable, automatable techniques for integration testing. Integration testing is an important part of the testing process, but few integration testing techniques have been systematically studied or defined. This paper discusses the design and implementation of an analysis tool for measuring the amount of coverage achieved by a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability engineering of complex computing systems

    Publication Year: 2000, Page(s):36 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (948 KB)

    The paper presents a development model focused on the production of dependable systems. Three classes of processes are distinguished: 1) the system creation process which builds on the classical development steps (requirements, design, realization, integration); 2) dependability processes (i.e., fault prevention, fault tolerance, fault removal and fault forecasting); and 3) other supporting proces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Principles and mechanisms for evolving software systems

    Publication Year: 2000, Page(s): 200
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple backup virtual paths reservation problem and its solution

    Publication Year: 2000, Page(s):122 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    A method of preparing a backup virtual path (VP) for each primary VP is popular for establishing a reliable computer network. In the case of multiple failures, however, it is possible that multiple failures happen on both a primary VP and a pairwise backup VP. In order to solve the above problem, the paper proposes a new multiagent based method where more than one backup VP is prepared for each pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience using formal methods for specifying a multi-agent system

    Publication Year: 2000, Page(s):72 - 80
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The process and results of using formal methods to specify the Lights Out Ground Operations System (LOGOS) are presented. LOGOS is a prototype multi agent system developed to demonstrate the feasibility of providing autonomy to satellite ground operations functions at NASA Goddard Space Flight Center (GSFC). Following the initial implementation of LOGOS, the development team decided to use formal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the right tool for the job

    Publication Year: 2000, Page(s):105 - 115
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    The development of complex systems often requires that components and modules are developed individually, then assembled in the later integration phases of the overall effort. In spite of the modular approach taken in the specification and design of these components, developers all too often dogmatically use one particular development technique, while shunning others. The authors show this to be a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain modeling of software process models

    Publication Year: 2000, Page(s):50 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    The paper presents a novel application involving two important software engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process model, which, depending on the specific risks associated with a given project, may be tailored to create a project-specific process model. The software reuse area is that of domain modeling of families of systems, which c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.