By Topic

28th Annual NASA Goddard Software Engineering Workshop, 2003. Proceedings.

3-4 Dec. 2003

Filter Results

Displaying Results 1 - 25 of 30
  • A metrics based approach for identifying requirements risks

    Publication Year: 2003, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    The NASA Independent Verification & Validation (IV&V) Facility's metrics data program (MDP) has been tasked with collecting data in the form of metrics on software products from various NASA Projects. The goals of the program include: improve the effectiveness of software assurance, evaluate the effectiveness of current metrics, identify and include new metrics, improve the effectiveness of softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instrumentation of intermediate code for runtime verification

    Publication Year: 2003, Page(s):66 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Runtime monitoring is aimed at ensuring correct runtime behavior with respect to specified constraints. It provides assurance that properties are maintained during a given program execution. The dynamic monitoring with integrity constraints (DynaMICs) approach is a runtime monitoring system under development at the University of Texas at El Paso. The focus of the paper is on the identification of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying run-time monitoring to the Deep-Impact fault protection engine

    Publication Year: 2003, Page(s):127 - 133
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Run-time monitoring is a lightweight verification method whereby the correctness of a programs' execution is verified at run-time using executable specifications. This paper describes the verification of the fault protection engine of the Deep-Impact spacecraft flight software using a temporal logic based run-time monitoring tool. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Establishing a generic and multidimensional measurement repository in CMMI context

    Publication Year: 2003, Page(s):12 - 20
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2624 KB) | HTML iconHTML

    We propose a measurement repository for collecting, storing, analyzing and reporting measurement data based on the requirements of the capability maturity model integrated (CMMI). Our repository is generic, flexible and integrated, supporting a dynamic measurement system. It was originally designed to support Ericsson Research Canada's business information needs. Our multidimensional repository ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the run-time verification of autonomy software

    Publication Year: 2003, Page(s):58 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (721 KB) | HTML iconHTML

    The mission-critical and dependability aspects of autonomous systems demand formal level of assurance in ascertaining their mission-survivability capabilities. The complete understanding of system autonomy and its verification and validation (V&V) continue to pose technical challenges. In recent years, formal methods have shown considerable promise in the area of V&V of autonomous systems. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software dynamics: a new measure of performance for real-time software

    Publication Year: 2003, Page(s):120 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (625 KB) | HTML iconHTML

    This paper presents an approach to use concepts from continuous dynamical systems to describe behavior of real-time software. The idea is applicable to nearly all real-time software architectures. It relies on changing deadlines and taking quantitative measurements how many deadlines are missed or what is the total time of missed deadlines. A resulting graph can be approximated by a straight line ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adopting a software component model in real-time systems development

    Publication Year: 2003, Page(s):114 - 119
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Component-based software engineering (CBSE) and the use of (de-facto) standard component models have gained popularity in recent years, particularly in the development of desktop and server-side software. This paper presents a motivation for applying CBSE to realtime systems and discusses the consequences of adopting a software component model in the development of such systems. Specifically, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal approaches to intelligent swarms

    Publication Year: 2003, Page(s):51 - 57
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Autonomous intelligent swarms of satellites are being proposed for future space missions. These types of missions provide greater flexibility and the chance to perform more and different kinds of science than traditional single satellite/vehicle missions, but also have complex interactions and behaviors. The emergent properties of swarms make these missions powerful, but at the same time are more ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing IV & V benefits using simulation

    Publication Year: 2003, Page(s):97 - 101
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    There is a critical need for cost effective independent verification and validation (IV & V). The goal of this research is to create a flexible tool that NASA IV & V can use to quantitatively assess the economic benefit of performing IV & V on NASA software development projects and to optimize that benefit across alternative IV & V plans. The tool is based on extensive research into software proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining verification test consistency between executable specifications and embedded software in a virtual system integration laboratory environment

    Publication Year: 2003, Page(s):221 - 228
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    The root causes of the majority of software defects discovered during the integration test phase of an embedded system development project have been attributed to errors in understanding and implementing requirements. The independence that typically exits between the system and software development processes provides ample opportunity for the introduction of these types of faults. This paper shows... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RGML: a markup language for characterizing requirements generation processes

    Publication Year: 2003, Page(s):29 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    In this paper we present the Requirements Generation Markup Language (RGML). The RGML provides a formal specification mechanism for characterizing the structure, process flow and activities inherent to the requirements generation process. Within activities, the RGML supports the characterization of application instantiation, the use of templates and the production of artifacts. The RGML can also d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design tool assessment for safety-critical software development

    Publication Year: 2003, Page(s):105 - 113
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4245 KB)

    The paper presents taxonomy of criteria and procedures for evaluating software development tools used in safety-critical real-time systems. The ultimate purpose of the research is to provide a base for creation of guidelines for the tool certification process. The specific application area is airborne software and appropriate references are made to the accepted RTCA DO-178B guidelines. The softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensitivity of software usage to changes in the operational profile

    Publication Year: 2003, Page(s):157 - 164
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    In this paper we present a methodology for uncertainty analysis of the software operational profile suitable for large complex component-based applications and applicable throughout the software life cycle. Within this methodology, we develop a method for studying the sensitivity of software usage to changes in the operational profile based on perturbation theory. This method is then illustrated o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stress-point resolution system based on module signatures

    Publication Year: 2003, Page(s):193 - 198
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    This paper introduces a framework to provide design and testing guidance through a stress-point resolution system based on a module signature for module categorization. A stress-point resolution system includes stress-point identification and the selection of appropriate mitigation activities for those identified stress-points. Progress has been made in identifying stress-point to target the most ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software verification and validation within the (rational) unified process

    Publication Year: 2003, Page(s):216 - 220
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    We discuss the integration of software verification and validation activities (as defined by the IEEE Std. 1012) within the unified process. We compare and contrast these two process frameworks, and identify the aspects of verification and validation that are directly supported, partially supported or not supported by the unified process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A component-based model for building reliable multi-agent systems

    Publication Year: 2003, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4668 KB)

    In this article, we describe a specification model that seeks to couple formal specification methods and agent-oriented software engineering techniques. The objective is to allow faster formal development of flexible and reusable multiagent systems (MAS) with strict requirements of quality and reliability. The specification model is specifically tailored to support highly dynamic and evolutive cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the advantages of approximate vs. complete verification: bigger models, faster, less memory, usually accurate

    Publication Year: 2003, Page(s):75 - 81
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    We have been exploring LURCH, an approximate (not necessarily complete) alternative to traditional model checking based on a randomized search algorithm. Randomized algorithms like LURCH have been known to outperform their deterministic counterparts for search problems representing a wide range of applications. The cost of an approximate strategy is the potential for inaccuracy. If complete algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software impact analysis in a virtual environment

    Publication Year: 2003, Page(s):143 - 151
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    With the relentless growth in software, automated support for visualizing and navigating software artifacts is no longer a luxury. As packaged software components and middleware occupy more and more of the software landscape, interoperability relationships point to increasingly relevant software change impacts. Packaged software now represents over thirty-two percent of the software portfolio in m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagnosing architectural degeneration

    Publication Year: 2003, Page(s):137 - 142
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Software systems evolve over time and undergo changes that can lead to a degeneration of the systems' architecture. Degeneration may eventually reach a level where a complete redesign of the software system is necessary, which is a task that requires significant effort. In this paper, we start by presenting examples of such degeneration and continue with an analysis of technologies that can be use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating MC/DC adequate test sequences through model checking

    Publication Year: 2003, Page(s):91 - 96
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    We present a method for automatically generating test sequences to satisfy MC/DC like structural coverage criteria of software behavioral models specified in state-based formalisms. The use of temporal logic for characterizing test criteria and the application of model-checking techniques for generating test sequences to those criteria have been of interest in software verification research for so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and analysing fault propagation in safety-related systems

    Publication Year: 2003, Page(s):167 - 174
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    A formal specification for analysing and implementing multiple fault diagnosis software is proposed in this paper. The specification computes all potential fault sources that correspond to a set of triggered alarms for a safety-related system, or part of a system. The detection of faults occurring in a safety-related system is a fundamental function that needs to be addressed efficiently. Safety m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of object oriented software design with fault tree analysis

    Publication Year: 2003, Page(s):209 - 215
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Software plays an increasing role in the safety critical systems. Increasing the quality and reliability of the software has become the major objective of software development industry. Researchers and industry practitioners, look for innovative techniques and methodologies that could be used to increase their confidence in the software reliability. Fault tree analysis (FTA) is one method under st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision support for using software inspections

    Publication Year: 2003, Page(s):3 - 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    In support of decision-making for planning the effort to be allocated to inspections in different software development phases, we propose combining empirical studies with process modeling and simulation. We present the simulator developed for answering questions and running "what-if" scenarios specific to NASA software development projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based software testing via incremental treatment learning

    Publication Year: 2003, Page(s):82 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1261 KB) | HTML iconHTML

    Model-based software has become quite popular in recent years, making its way into a broad range of areas, including the aerospace industry. The models provide an easy graphical interface to develop systems, which can generate the sometimes tedious code that follows. While there are many tools available to assess standard procedural code, there are limits to the testing of model-based systems. A m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tailorable architecture methods

    Publication Year: 2003, Page(s):152 - 156
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    In this paper we discuss a set of architecture-based methods for architecture design and analysis that have been developed over the past 10 years at the Software Engineering Institute. We then discuss the need for integrating these architecture-based methods, both with each other and into an organization's system development life cycle, based on experience with NASA's EOSDIS project. We discuss th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.