By Topic

Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop on the

Date 24-27 May 2004

Filter Results

Displaying Results 1 - 25 of 79
  • Role-playing, group work and other ambitious teaching methods in a large requirements engineering course

    Publication Year: 2004 , Page(s): 299 - 306
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    Requirements engineering is offered to students at the faculty of information technology in the University of Technology, Sydney. It is a core subject in the Graduate Certificate in Information Technology and Graduate Diploma. This paper outlines the subject's objectives, the topics discussed. Details of the lecturing methods used are also presented, namely: role-playing and peer-assessment within... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Induction in time-varying domains: motivation, origins, and encouragements

    Publication Year: 2004 , Page(s): 316 - 321
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (265 KB) |  | HTML iconHTML  

    Automated acquisition of knowledge and skills by way of machine-learning techniques is a new promising technology for embedded systems. The paper briefly summarizes the ambitions of this technology, and then discusses in some detail the work that has been done in one of its subfields: induction in time-varying domains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal abstract architecture for use case specifications

    Publication Year: 2004 , Page(s): 203 - 210
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (457 KB) |  | HTML iconHTML  

    Originally, use cases were informal modeling artifacts serving for specifying the requirements of computer-based systems in the early development phase. Last decade emphasizes the need for rigorous definition of semantics for use cases since discovering their impact during the whole development process. In this contribution, the semantics of use cases is directly obtained as a consequence of forma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain independent generative modeling

    Publication Year: 2004 , Page(s): 29 - 34
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (260 KB) |  | HTML iconHTML  

    Model integrated computing employs domain-specific modeling languages for the design of computer based systems and automatically generates their implementation. These system models are declarative in nature. However, for complex systems with regular structure, as well as for adaptive systems, a more algorithmic approach is better suited. Generative modeling employs architectural parameters and gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology for requirements engineering process development

    Publication Year: 2004 , Page(s): 263 - 272
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    Adoption of the most suitable requirements engineering (RE) process and selection of the most appropriate RE techniques for a given project is a common challenge faced by industry. This paper presents a methodology for RE process development for a given project. The novelty of this work is four-fold. First, a RE process knowledge base (REPKB) is established and it helps during RE process developme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model based self adaptive behavior language for large scale real time embedded systems

    Publication Year: 2004 , Page(s): 478 - 483
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (479 KB) |  | HTML iconHTML  

    At Fermi lab, high energy physics experiments require very large number of real time computations. With thousands of processors (around ∼1000 FPGA's, ∼2500 embedded processors, ∼2500 PC's and ∼25,000,000 detector channels) involved in performing event filtering on a trigger farm, there is likely to be a large number of failures within the software and hardware systems. Historically... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ADC position-sense interface

    Publication Year: 2004 , Page(s): 429 - 434
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    The paper describes the ADC position-sense interface (PSI) for measuring response in proof mass on input acceleration. The explanation of the PSI function, describing advantages and disadvantages of this approach and the simulation results was the basic purpose of this work. The cancellation of the offset, parasitics and common-mode input voltage are depicted as well. The simulation results were t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The networked photo-enforcement and traffic monitoring system Unicam

    Publication Year: 2004 , Page(s): 423 - 428
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    The presented system (Unicam) offers a complex state-of-the-art machine vision equipment and technology to provide automated video image vehicle detection devices dedicated for traffic monitoring applications. The system provides real time video image capturing, digital signal processing, compression, storage, and transmission over communication interfaces. It uses proprietary artificial intellige... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modular approach to systemC-based codesign promoting reuse of high-level legacy C-models

    Publication Year: 2004 , Page(s): 435 - 440
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3754 KB) |  | HTML iconHTML  

    Today's systems-on-chip have reached a complexity that demands high-level modelling for both design and verification. By raising the level of abstraction and supporting seamlessness in the methodology new design flows increases the productivity. High level models described on the basis of the C/C++ language family are widely used. Introducing a new flow based on the SDL SystemC allows reuse of suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal specification of shared variables using CSP

    Publication Year: 2004 , Page(s): 211 - 216
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    The algebra of communicating sequential processes provides a facility to formal specify systems by describing their behavior. To be able do denote these systems more precisely it is useful to introduce state variables. Because the CSP algebra deals with concurrent processes, the state variables are shared between those processes. This contribution describes techniques how to represent shared varia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network virtual laboratory for external devices programming

    Publication Year: 2004 , Page(s): 293 - 298
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (501 KB) |  | HTML iconHTML  

    The paper describes an approach to replace traditional computer laboratories by Internet virtual ones. The purpose of this laboratory is to make available advanced learning contents in a network environment. Devices available for students are fully simulated by computers. Furthermore, remote access to programming environment is implemented, which gives the user an ability to write programs control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving CBS tool development with technological spaces

    Publication Year: 2004 , Page(s): 218 - 224
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    The complexity of computer based systems (CBSs) requires that multiple levels of abstraction be available to a designer in order to facilitate their formal specification. Generating final executable code from the model of the system is preferred to hand-coding the implementation, but this is seldom done in one step-usually there are several cascading transformations that eventually result in the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal autonomic computing self-healing tool

    Publication Year: 2004 , Page(s): 513 - 520
    Cited by:  Papers (10)  |  Patents (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (326 KB) |  | HTML iconHTML  

    The objective of the research reported in this paper was to develop a proof of concept self-healing tool for the personal computing environment operating in a peer-to-peer mode and consisting of a pulse monitor and a vital signs health monitor. The prototype developed in Java, JNI and C utilising UDP to communicate to its peers proved the feasibility of the pulse and vital signs concepts and their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A foundation for tool-supported critical systems development with UML

    Publication Year: 2004 , Page(s): 398 - 405
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (353 KB) |  | HTML iconHTML  

    High quality development of critical systems poses serious challenges. Formal methods have been proposed to address them, but their use in industry is not as wide-spread as originally hoped. We thus propose to use the Unified Modeling Language (UML), the defacto industry standard specification language, as a notation together with a formally based tool-support for critical systems development. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring autonomic options in an unified fault management architecture through reflex reactions via pulse monitoring

    Publication Year: 2004 , Page(s): 449 - 455
    Cited by:  Papers (7)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (585 KB) |  | HTML iconHTML  

    This paper investigates the potential of adding autonomic capabilities to the telecommunications fault management architecture and highlights the importance of a reflex-healing dual strategy to facilitate this advanced automation. The reflex reaction is facilitated through the concept of a pulse monitor - essentially the extension of the fault tolerant heartbeat monitor mechanism to incorporate re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements trade-offs during UML design

    Publication Year: 2004 , Page(s): 282 - 291
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (325 KB) |  | HTML iconHTML  

    Designs almost always require trade-offs between competing design choices to meet pervasive system dependability requirements (e.g., security, performance and fault tolerance system goals). In some cases, dependability requirements are realized by functionality that cross-cuts designs. Aspect-oriented modeling (AOM) methods allow developers to localize such cross-cutting functionality in design mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A concept of an integrated development environment for reactive systems

    Publication Year: 2004 , Page(s): 233 - 240
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    One of the main application areas of modern engineering in computer based systems is development, production, deployment and maintenance of reactive systems. Today, the majority of functions in such systems are implemented in software, and modeled as a group of finite state machines (automata). The past decade has seen many R&D efforts in development of tool sets that support software production p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model-based self-adaptive approach to image processing

    Publication Year: 2004 , Page(s): 456 - 461
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (425 KB) |  | HTML iconHTML  

    Implementing image-processing systems can require significant effort and resources due to information volume and algorithm complexity. Model integrated computing (MIC) based image processing systems show promise in supporting solutions of these complex problems. While MIC has contributed to the advancement of performing complex image processing tasks on parallel-embedded systems, it has not addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic model checking of UML statechart diagrams with an integrated approach

    Publication Year: 2004 , Page(s): 337 - 346
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    This paper puts forward a new approach for the specification and verification of finite state systems. The design of a system is first specified in UML statechart diagrams, then formalized in the πcalculus and finally verified automatically by NuSMV. We demonstrate an application of the proposed approach using the SET/A protocol as an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation approach to embedded system programming and testing

    Publication Year: 2004 , Page(s): 248 - 254
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    We describe how simulation using production code can help in achieving higher quality software while reducing the effort associated with embedded application development. The recommended steps in developing embedded safety-critical software are outlined, and the issues of proper verification of the simulation models are discussed in detail. The feasibility of the approach is shown on a case study ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DVTG and Test Harnessing using Rosetta specifications

    Publication Year: 2004 , Page(s): 136 - 143
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (302 KB) |  | HTML iconHTML  

    Specification-based verification is increasingly being used when designing systems. In verification, the program under test is executed repeatedly and the obtained outputs and/or other parameters are compared against the expected values. This ensures that the implementation satisfies its specified functionality. We present a tool, DVTG [K. Ranganathan, (2001)], for automatically generating test ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications for mobile agents in peer-to-peer-networks

    Publication Year: 2004 , Page(s): 523 - 529
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    Peer-to-peer-networking has lately become one of the most popular applications used in the Internet. Today's applications allow users to share files, offer processing power to other entities and do collaboration by using software which is relatively easy to use. This paper studies possible applications of mobile agents within peer-to-peer-networks to provide the user with more and/or better functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a model-driven architecture for autonomic systems

    Publication Year: 2004 , Page(s): 500 - 505
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (405 KB) |  | HTML iconHTML  

    Agent based systems and architectures provide a firm foundation for design and development of an autonomic system. The key challenge is the selection and efficient use of effective agent architecture. A model-driven approach accommodates the underlying architecture to automate, as much as possible, the development process. The Cognitive Agent Architecture (COUGAAR) is a distributed agent architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting evolutionary development by feature models and traceability links

    Publication Year: 2004 , Page(s): 370 - 377
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (338 KB) |  | HTML iconHTML  

    During their usage, software systems have to be changed constantly. If such changes are implemented in an incomplete or inconsistent way a loss of architectural quality will occur, i.e. in terms of maintainability and understandability. The lack of traceability of the impact of changed requirements in the software enhances this effect. Traceability links have been proposed as a link between the re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theory and applications of evolvable embedded systems

    Publication Year: 2004 , Page(s): 186 - 193
    Cited by:  Papers (2)  |  Patents (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    We represent the first attempt to formulate a concept of the evolvable embedded system as a specialized kind of evolvable (hardware) systems. We define the class of evolvable embedded systems, describes a general framework for their modeling, introduces theoretical models, and reviews possible implementations and applications. As a typical example, evolutionary functional recovery of damaged media... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.