Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings Seventh IEEE International Conference on Engineering of Complex Computer Systems

11-13 June 2001

Filter Results

Displaying Results 1 - 25 of 31
  • Proceedings Seventh IEEE International Conference on Engineering of Complex Computer Systems

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (233 KB)
    Freely Available from IEEE
  • The problem of platform complexity

    Publication Year: 2001, Page(s): 168
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (57 KB)

    Summary form only given, as follows. Today's computer systems contain significant unnecessary complexity. The unnecessary complexity is due to two factors. Firstly, 'Yeature-itis' (too much functionality), and secondly, the level-wise mapping of application functions - via programming languages, operating systems, protocols and middleware onto poor or inappropriate platforms. The unnecessary compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's index

    Publication Year: 2001, Page(s): 281
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • A framework for analyzing and organizing complex systems

    Publication Year: 2001, Page(s):155 - 165
    Cited by:  Papers (9)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (948 KB) | HTML iconHTML

    The paper discusses a framework and technologies enabling the quantitative analysis, organization and optimization of large-scale, globally distributed enterprise and e-services systems. The goal is to organize complex systems in such ways that traffic can be better explained, predicted and controlled at application and service layers rather than at the network layers. Our work approaches higher s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing distributed component-based systems with DCL

    Publication Year: 2001, Page(s):144 - 154
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB) | HTML iconHTML

    Up to now, distribution is barely considered during the design phase. This complicates finding a reasonable trade off between `availability' and `load balance' in a distributed component based system. Therefore, the Distribution Constraint Language `DCL' is introduced for expressing distribution requirements during design. This visual language facilitates designing, running and maintaining a distr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-line scheduling of real-time distributed computers with complex communication constraints

    Publication Year: 2001, Page(s):26 - 34
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    We consider the scheduling of periodic tasks running on distributed computers. Every execution of a task must meet its deadline. Response time analysis of the tasks is used to prove the schedulability of hard real-time distributed systems according to the on-line priority rules that schedule the processors and the network. Its main advantage is to take into account the precedence dependencies of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent agent-based software architecture for combat performance under overwhelming information inflow and uncertainty

    Publication Year: 2001, Page(s):200 - 210
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB) | HTML iconHTML

    In the highly dynamic and information rich environment of military submarine operations, the Commanding Officer must make split second decisions that could ultimately result in the destruction or survival of Ownship or the accomplishment of its designated mission. Despite extensive training and expertise, the fog of war often shadows real world encounters. Pieces of the tactical puzzle may be scat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling free flight with collision avoidance

    Publication Year: 2001, Page(s):270 - 279
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Free flight has been proposed as a future alternative to the current policy in air traffic management (ATM) where aircraft follow predefined corridors. In free flight pilots can choose their own optimal routes, altitudes and velocities but are also responsible for the safe and fair resolution of trajectory conflicts. This would require a safe distributed control system were the trajectories that a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motivating the corrective maintenance maturity model (CM3)

    Publication Year: 2001, Page(s):112 - 117
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    Many process models have been hitherto suggested. Very few of them, however, deal with the most utilised process today: the maintenance process. The article presents and motivates the “Corrective Maintenance Maturity Model” (CM3), a process model entirely dedicated to only software maintenance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of hybrid systems: formalization and proof rules in PVS

    Publication Year: 2001, Page(s):48 - 57
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    Combining discrete state-machines with continuous behavior, hybrid systems are a well-established mathematical model for discrete systems acting in a continuous environment. As a priori infinite state systems, their computational properties are undecidable in the general model and the main line of research concentrates on model checking of finite abstractions of restricted subclasses of the genera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for testing component-based software

    Publication Year: 2001, Page(s):222 - 232
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    Component-based software engineering is increasingly being adopted for software development. Although much work has been proposed for building component-based-systems, techniques for testing component-based systems have not been well developed. We present a test model that depicts a generic infrastructure of component-based systems and suggests key test elements. The test model is realized using a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design method for conceptual design of by-wire control: two case studies

    Publication Year: 2001, Page(s):133 - 143
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    Safety critical mass produced products are today being implemented without mechanical backup. Most of these will have distributed real time computer networks, which mast be ultra-dependable. A development method for future control-by-wire systems is presented. By using a scalable software architecture and the systems' intrinsic redundancy, it is possible to achieve dependability requirements cost-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TILCO-X, an extension of TILCO temporal logic

    Publication Year: 2001, Page(s):15 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB) | HTML iconHTML

    Temporal logics are typically used for the specification of real-time systems since they are capable of describing temporal constraints among events and actions: properties of invariance, precedence, periodicity, repeated occurrences, liveness and safety conditions, etc. This paper describes an evolution of the Temporal Interval Logic called TILCO. TILCO is based on time intervals and can concisel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Independent proprietorship and competition in distributed Web search architectures

    Publication Year: 2001, Page(s):191 - 199
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB) | HTML iconHTML

    The predominant Web search model attempts to use multiple computers under centralised management to act as one search engine for the entire Web. As the quantity of online information increases, systems based on this model become prohibitively expensive for all but the largest organisations. We advocate the use of distributed search architectures where multiple independently owned and managed searc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent agent-based decision-support systems for complex C2 applications

    Publication Year: 2001, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing feature interactions in telecommunications systems by temporal colored Petri nets

    Publication Year: 2001, Page(s):260 - 269
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    This paper presents an approach for detecting and resolving feature interactions (FI) in telephone systems. In this approach, the basic telephone system (POTS) and the features are each represented as a temporal colored Petri net (TCP-net). When the POTS is enhanced with some features, their TCP-nets are integrated. The functionality of a feature is represented as a temporal formula and the behavi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can we learn anything from hardware preventive maintenance?

    Publication Year: 2001, Page(s):106 - 111
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    Close scrutiny of software preventive maintenance has revealed that this domain is not unanimously and objectively understood. Confusion predominates with respect to its definition, scope and meaning. The author presents the current state of software preventive maintenance and delineates the disorder reigning in this area. A survey is also given of hardware preventive maintenance in search of issu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a framework for architecting mechatronics software systems

    Publication Year: 2001, Page(s):170 - 179
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB) | HTML iconHTML

    As mechatronics software systems become larger and more complex, the need to ensure system consistency and completeness with respect to the requirements and to manage system complexity becomes more important. From a system point of view, complexity depends on the number and the multiplicity of system constituent units and their relationships. In this paper, the initial results from our efforts to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for verifying real-time properties of Ada programs

    Publication Year: 2001, Page(s):35 - 43
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    This paper describes a method for transforming concurrent Ada programs by way of abstractions into input for the UPPAAL model checker for the purpose of analyzing the real-time properties of programs. The method depends on being able to compute the best and worst case execution times of procedures called by the various tasks in a concurrent program. It employs abstractions of actions to simplify t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a model checker to test safety properties

    Publication Year: 2001, Page(s):212 - 221
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    In addition to providing a sound basis for analysis, formal methods can support other development activities; in our case the target is specification-based testing at the system level. We use the formal method of model checking to either generate new test sets or analyze existing test sets with respect to safety properties expressed in a temporal logic. We consider two types of tests: failing test... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented analysis and design approach for safe object sharing

    Publication Year: 2001, Page(s):122 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    The author proposes a novel object oriented analysis and design (OOAD) approach to protect shared objects in complex systems from undesirable access. Recently, shared object protection is paid more attention to and several approaches are proposed. They give us good solutions to implement protection domains for shared objects. However, these approaches are applicable only when protection domains ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Action refinement for true concurrent real time

    Publication Year: 2001, Page(s):58 - 68
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB) | HTML iconHTML

    Action refinement is an essential operation in the design of concurrent systems, real-time or not. In this paper, we develop an action refinement technique in a real-time non-interleaving causality-based setting, a timed extension of bundle event structures that allows for urgent interactions to model time-out. A syntactic action refinement operation is presented in a timed process algebra based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Module testing embedded software-an industrial pilot project

    Publication Year: 2001, Page(s):233 - 238
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    This paper reports on an industrial pilot project that introduces systematic, automated module testing for embedded software in distributed, real-time, control systems. The systems are used in safety-related applications, are complex in nature, and hence have strong requirements for test coverage, auditability and repeatability. This paper explores issues of isolating modules from the run-time env... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communicating TILCO: a model for real-time system specification

    Publication Year: 2001, Page(s):4 - 14
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB) | HTML iconHTML

    Formal techniques for the specification of real-time systems must be capable of describing a set of relationships expressing the temporal constraints among events and actions: properties of invariance, precedence, periodicity, liveness and safety conditions, etc. This paper describes CTILCO, an extension of TILCO (Temporal Interval Logic with Compositional Operators). CTILCO introduces the communi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-oriented specification architectures for distributed real-time systems

    Publication Year: 2001, Page(s):180 - 190
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    When specifying distributed real-time systems, decomposition and composition are the primary methods for coping with complexity. Typically, decomposition can be done in two orthogonal dimensions. First, the system is decomposed in the vertical dimension by partitioning the distributed system into loosely-coupled subsystems with well-defined interfaces. Each subsystem is then decomposed further in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.