Proceedings. Fifth IEEE International Symposium on High Assurance Systems Engineering (HASE 2000)

17-17 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 47
  • Proceedings. Fifth IEEE International Symposium on High Assurance Systems Engineering (HASE 2000)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 331
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Disappearing formal methods*

    Publication Year: 2000, Page(s):95 - 96
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety validation of embedded control software using Z animation

    Publication Year: 2000, Page(s):228 - 237
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Describes a rigorous approach to safety validation of embedded control software by specification animation. The software control logic is specified in Z and systematically animated together with a model of the equipment under control. All reachable equipment states under software control are systematically identified and compared with known hazardous states in normal operation and under dominant f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements formalization and validation for a telecommunication equipment protection switcher

    Publication Year: 2000, Page(s):169 - 176
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Using formal methods, namely model checking, we can automatically verify a formal model of the requirements against given properties. This allows us to detect errors early in the design process, thus decreasing development cost and time to market. However, to modify a well established design process to introduce formal methods is not easy. We present a case study exploring the possibility of repla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative analysis of dependability critical systems based on UML statechart models

    Publication Year: 2000, Page(s):83 - 92
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    The paper introduces a method which allows quantitative performance and dependability analysis of systems modeled by using UML statechart diagrams. The analysis is performed by transforming the UML model to Stochastic Reward Nets (SRN). A large subset of statechart model elements is supported including event processing, state hierarchy and transition priorities. The transformation is presented by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured language for specifications of quantitative requirements

    Publication Year: 2000, Page(s):221 - 227
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Requirements for dependable systems need to be understandable and, at the same time, have to satisfy consistency and non-ambiguity properties. We provide a means to specify nonfunctional requirements in terms of structured English sentences. We define their syntax by a clear and consistent notation. For verification, these sentences have to be transformed into a notation that can be interpreted by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High assurance software testing in business and DoD

    Publication Year: 2000, Page(s):207 - 211
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    This paper argues that software testing can be less thorough yet more efficient if applied in a well-managed, empirical manner across the entire software development life cycle (SDLC). To ensure success, testing must be planned and executed within an earned value management (EVM) paradigm. A specific example of empirical software testing is given: the Empirical Bayesian Stopping Rule (EBSR). The S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety analysis of an evolving software architecture

    Publication Year: 2000, Page(s):159 - 168
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    The safety analysis of an evolving software system has to consider the impact that changes might have on the software components, and to provide confidence that the risk is acceptable. If the impact of a change is not thoroughly analysed, accidents can occur as a result of faulty interactions between components, for example. However, the process of safety analysis can be enhanced if appropriate ab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-assurance measurement repository system

    Publication Year: 2000, Page(s):265 - 272
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    High-quality measurement data are very useful for assessing the efficacy of high-assurance system engineering techniques and tools. Given the rapidly evolving suite of modern tools and techniques, it is helpful to have a large repository of up-to-date measurement data that can be used to quantitatively assess the impact of state-of-the-art techniques on the quality of the resulting systems. For ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The DADSim air defense simulation environment

    Publication Year: 2000, Page(s):75 - 82
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    DADSim is a distributed air defense simulation environment, being made compliant with the High Level Architecture (HLA) (http://www.hla.dmso.mil) runtime, a distributed environment used for defense simulations. DADSim simulates modern day combat dynamics of air defense engagements involving multiple targets and multiple platforms enforced using a multi-tier command and control structure. DADSim co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing convincing evidence of safety in X-by-wire automotive systems

    Publication Year: 2000, Page(s):189 - 192
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A new generation of automotive systems, such as brake-, steer-, throttle-by-wire, and combinations of these by-wire systems, offer the promise of improved vehicle performance and safety. However, these by-wire systems represent a major technology change, and as a result, merit higher levels of analysis, design, and verification. Like other safety-critical systems, the case for safety should be car... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First principles applied to software safety - the novel use of silicon machinery

    Publication Year: 2000, Page(s):216 - 218
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Presents a methodology that may provide a radical new way of assuring the safety of software-based systems through a novel application of first principles enabled by micro-electromechanical systems (MEMS) technology, i.e. silicon machinery. `First principles' is defined as theory that is defensible through fundamental laws of nature in the chemical, physical or mechanical structure of materials or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing guaranteed assurance to connection-oriented group communications using disjoint routing

    Publication Year: 2000, Page(s):197 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    We compare different approaches which provide guaranteed assurance to connection-oriented group communications based on the use of working and backup disjoint route sets. Specifically, we present experimental results showing the effect of disjoint backup route sets on mesh/tree/ring feasibility and cost View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal specification techniques as a catalyst in validation

    Publication Year: 2000, Page(s):203 - 206
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    The American Heritage Dictionary defines a catalyst as a substance, usually present in small amounts relative to the reactants, that modifies and especially increases the rate of a chemical reaction without being consumed in the process. This article reports on the experience gained in an industrial project that formal specification techniques form such a catalyst in the validation of complex syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic abstractions of real-time specifications

    Publication Year: 2000, Page(s):147 - 158
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    This paper explores the automatic generation of abstractions of real-time specifications. Abstractions of formal specifications hide certain details while preserving other essential aspects of system behavior. Abstractions are useful in the context of model-checking because the state-space explosion problem often prohibits model-checking of the full specification. Abstractions are commonly used to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable software construction: a logic programming based methodology

    Publication Year: 2000, Page(s):140 - 141
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    In this position paper we investigate how logic programming technology can aid software development. The overall goal is to provide a framework for specification and verification that is “computational” in nature rather than being based on traditional, more complex formalisms such as theorem proving and term rewriting. Two approaches are discussed. In the first approach, given a progra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring and assessing software test processes using test data

    Publication Year: 2000, Page(s):259 - 264
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Testing of large-scale software systems is a complex and expensive process that involves both technical and managerial issues. To improve its cost-effectiveness, the process should be continuously monitored, consistently measured and carefully assessed. This paper proposes an assessment methodology in this direction, called process-oriented metrics-based assessment (POMBA). Novel concepts include ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the sensitivity of NMR unreliability to non-exponential repair distributions

    Publication Year: 2000, Page(s):293 - 300
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The failure and repair of modules in an N-modular redundant (NMR) system are governed by a failure time distribution and a repair time distribution, respectively. It is generally reasonable to assume that a module's failure time distribution is a simple exponential distribution. However, it is not reasonable to assume that the repair time distribution is also exponential. Reliability models with n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How can symposia be structured to benefit both industry and academia?

    Publication Year: 2000, Page(s):45 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating evidence for certification of modern processors for use in safety-critical systems

    Publication Year: 2000, Page(s):125 - 134
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    This paper investigates the implications of using a modern super-scalar processor in the safety-critical domain. Firstly, a description of current certification practice and devices is given as background. This is followed by an assessment of how the certification argument and its supporting evidence are affected by the use of a super-scalar processor. Two types of modern processor are considered,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining the expected time to unsafe failure

    Publication Year: 2000, Page(s):17 - 24
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The number of applications requiring highly reliable and/or safety-critical computing is increasing. One emerging safety metric is the Mean Time To Unsafe Failure (MTTUF). This paper summarizes a novel technique for determining the MTTUF for a given architecture. The first step in determining the MTTUF for a system is to estimate system Mean Time To Failure (MTTF) and system fault coverage. Once t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing an application's temporal properties with UML for Real-Time

    Publication Year: 2000, Page(s):65 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    The Unified Modeling Language (UML) is commonly used in the development of non-real-time systems and is gaining popularity in the object-oriented real-time community as well. Recently, Rational Software Corporation teamed with ObjecTime, Ltd to develop UML for Real-Time (UML-RT). UML-RT uses the extensibility mechanisms of UML to incorporate concepts from ROOM (Real-time Object-Oriented Modeling L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible real-time architecture

    Publication Year: 2000, Page(s):99 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Assuring hard real-time characteristics of I/O associated with embedded software is often a difficult task. Input-Output related statements are often intermixed with the computational code, resulting in I/O timing that is dependent on the execution path and computational load. One way to mitigate this problem is through the use of interrupts. However, the non-determinism that is introduced by inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling with extended fault trees

    Publication Year: 2000, Page(s):238 - 246
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    In the areas of both safety and reliability analysis, the precise modeling of complex technical systems during their development and for evaluation purposes is of great importance. Traditionally, fault tree models have been used to accomplish this, and, more recently, stochastic Petri-net models have begun to be employed. To provide engineers with an intuitive high-level modeling interface to Petr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.