By Topic

Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop on the

Date 24-27 May 2004

Filter Results

Displaying Results 1 - 25 of 79
  • A service-oriented software architecture for mobile agent toolkits

    Publication Year: 2004, Page(s):550 - 556
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    In this paper we propose a new software architecture for mobile agent toolkits. Agent toolkits mainly consist of a software system that forms an agency, which is responsible to host mobile and stationary software agents. In contrast to most architectures developed so far, which already define a large set of high-level services for agent migration and communication, we propose to employ a kernel-ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural description with integrated data consistency models

    Publication Year: 2004, Page(s):178 - 185
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The focus of typical architectural models is the description of large systems. Even though these systems are usually distributed, aspects of distributed systems are only addressed in a rudimentary way. While typical approaches pay attention to technical issues like deployment, data consistency problems are mostly ignored. We present a modeling approach which integrates assumptions about data consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation of self-protected mobile agents

    Publication Year: 2004, Page(s):544 - 549
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Traditional approaches to mobile agent code protection rely on platform-based cryptographic services, often based on PKI solutions. In this paper, we discuss some of their shortcomings, and propose a new architecture for secure mobile agents that addresses two outstanding issues: inter-platform portability and agent code protection. Existing solutions often introduce heavyweight frameworks, requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-functional refinement of computer based systems architecture

    Publication Year: 2004, Page(s):168 - 177
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Architecture based refinement is an important technique for ensuring efficiency, effectiveness and correctness in the practical design of complex computer based systems. With a few exceptions, current methods of architectural refinement focus on functional behaviour and fail to address nonfunctional requirements throughout the refinement process. A best practices approach to refinement would addre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications for mobile agents in peer-to-peer-networks

    Publication Year: 2004, Page(s):523 - 529
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Peer-to-peer-networking has lately become one of the most popular applications used in the Internet. Today's applications allow users to share files, offer processing power to other entities and do collaboration by using software which is relatively easy to use. This paper studies possible applications of mobile agents within peer-to-peer-networks to provide the user with more and/or better functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal approach for interoperability between mobile agent systems and component based architectures

    Publication Year: 2004, Page(s):536 - 542
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    We present an algorithm that allows to cut a component from a component based system and transplant it into a mobile agent system. We refer to this process as grafting. The overall goal is to run grafted components in a new execution environment. The approach is generic as it brings the target system into a position to execute any instance of the grafted component type. Moreover it applies for any... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of reactive embedded systems against temporal requirements

    Publication Year: 2004, Page(s):152 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    Efficient methods of automatic generation of test scenarios to validate a system against functional requirements have already been developed. However, there are no such satisfactory methods as far as temporal requirements are concerned. A method of automatic generation of test scenarios for verification of time constraints for reactive embedded systems is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for the verification of UML models using B

    Publication Year: 2004, Page(s):195 - 202
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    We describe the formal verification of UML models using B abstract machines and a support tool (AtelierB). We transform the UML metamodel to B and automatically check proof obligations generated by using the B proven The correctness of the properties of UML models is ensured by the well-formedness rules in the UML semantics which are transformed to B as the invariants of abstract machines. We addr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal autonomic computing self-healing tool

    Publication Year: 2004, Page(s):513 - 520
    Cited by:  Papers (11)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    The objective of the research reported in this paper was to develop a proof of concept self-healing tool for the personal computing environment operating in a peer-to-peer mode and consisting of a pulse monitor and a vital signs health monitor. The prototype developed in Java, JNI and C utilising UDP to communicate to its peers proved the feasibility of the pulse and vital signs concepts and their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Particle rendering engine in DSP and FPGA

    Publication Year: 2004, Page(s):361 - 368
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2557 KB) | HTML iconHTML

    We present an algorithm for rendering 3D point-clouds, which exploits an FPGA chip coupled with a DSP processor on an experimental board. Point-clouds are sets of graphical data in 3D space, which seem to be more suitable for potentially many purposes than the most frequently, used triangle meshes. The actual experimental implementation, which verifies the concept and reports promising results, is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-adaptive and self-healing message passing strategies for process-oriented integration infrastructures

    Publication Year: 2004, Page(s):506 - 512
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    We present a set of adaptive methods and rules for routing messages in an EAI infrastructure that yields a form of autonomic behavior, namely the ability to dynamically optimize the flow of messages in order to respect SLA according to business priorities. EAI (enterprise application integration) infrastructures may be seen as component systems that exchange asynchronous messages over an applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contracts and games in controller synthesis for discrete systems

    Publication Year: 2004, Page(s):307 - 314
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    This study proposes a method for constructing reliable controllers for arbitrarily large discrete systems. The controller is synthesized by finding a winning strategy for specific games defined by contracts. The discrete system model is an action system, and the requirement is a temporal property. We use the extended action system notation that allows both angelic and demonic nondeterminism, such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying model checking to workflow verification

    Publication Year: 2004, Page(s):144 - 151
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Model checking is a technique for the verification of temporal logic specifications in state-transition systems. It can be applied to software, at design stages as well as at source code level. The latter in particular is constricted by the large space requirements of model checking. However, model checking is a promising technique for the improvement of software quality. We examined the applicabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network virtual laboratory for external devices programming

    Publication Year: 2004, Page(s):293 - 298
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    The paper describes an approach to replace traditional computer laboratories by Internet virtual ones. The purpose of this laboratory is to make available advanced learning contents in a network environment. Devices available for students are fully simulated by computers. Furthermore, remote access to programming environment is implemented, which gives the user an ability to write programs control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and simulation of stability and support operations (SASO)

    Publication Year: 2004, Page(s):21 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1754 KB) | HTML iconHTML

    Stability and support operations (SASO) are becoming increasingly important in modern military operations. Conflicts are no longer comprised solely of two opposing sides engaged in combat on an open battlefield. Instead, they are more likely to involve groups sharing various alliances and relationships each pursuing a range of different goals. The Sheherazade SASO wargaming engine presented here: ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theory and applications of evolvable embedded systems

    Publication Year: 2004, Page(s):186 - 193
    Cited by:  Papers (2)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    We represent the first attempt to formulate a concept of the evolvable embedded system as a specialized kind of evolvable (hardware) systems. We define the class of evolvable embedded systems, describes a general framework for their modeling, introduces theoretical models, and reviews possible implementations and applications. As a typical example, evolutionary functional recovery of damaged media... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model-based self-adaptive approach to image processing

    Publication Year: 2004, Page(s):456 - 461
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Implementing image-processing systems can require significant effort and resources due to information volume and algorithm complexity. Model integrated computing (MIC) based image processing systems show promise in supporting solutions of these complex problems. While MIC has contributed to the advancement of performing complex image processing tasks on parallel-embedded systems, it has not addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some autonomic properties of two legacy multi-agent systems - LOGOS and ACT

    Publication Year: 2004, Page(s):490 - 498
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    To reduce the cost of future space flight missions and to perform new science, NASA has been investigating autonomous ground and space flight systems. These goals of cost reduction have been further complicated by NASA's plans to use constellations and swarms of nanosatellites for future science data-gathering which may entail large communications delays and loss of contact with ground control for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient implementation of the 1D DCT using FPGA technology

    Publication Year: 2004, Page(s):356 - 360
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    This paper describes and represents different algorithms and efficient implementation of one-dimensional 8 point discrete cosine transform on field programmable gate arrays. One of the main objectives is to minimize the complexity of operations as much as possible while maintaining low delays and high-speed throughput. Distributed arithmetic is a powerful technique that has been used for fast and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a model-driven architecture for autonomic systems

    Publication Year: 2004, Page(s):500 - 505
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Agent based systems and architectures provide a firm foundation for design and development of an autonomic system. The key challenge is the selection and efficient use of effective agent architecture. A model-driven approach accommodates the underlying architecture to automate, as much as possible, the development process. The Cognitive Agent Architecture (COUGAAR) is a distributed agent architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements trade-offs during UML design

    Publication Year: 2004, Page(s):282 - 291
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Designs almost always require trade-offs between competing design choices to meet pervasive system dependability requirements (e.g., security, performance and fault tolerance system goals). In some cases, dependability requirements are realized by functionality that cross-cuts designs. Aspect-oriented modeling (AOM) methods allow developers to localize such cross-cutting functionality in design mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient SOAP processing in embedded systems

    Publication Year: 2004, Page(s):128 - 134
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    The aim is to describe the technique that uses XML-based RPC communication with tiny servers, e.g. sensors and actuators in control systems, or controllers of advanced appliances. This form of communication uses textual messages that respect SOAP (Simple Object Access Protocol). The interface of the service can be described in WSDL (Web Service Description Language) and published on independent UD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal specification of shared variables using CSP

    Publication Year: 2004, Page(s):211 - 216
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    The algebra of communicating sequential processes provides a facility to formal specify systems by describing their behavior. To be able do denote these systems more precisely it is useful to introduce state variables. Because the CSP algebra deals with concurrent processes, the state variables are shared between those processes. This contribution describes techniques how to represent shared varia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation and verification tool for hierarchical real-time systems

    Publication Year: 2004, Page(s):255 - 261
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The computerized tool for statecharts based modeling and simulation of reactive systems with timing constraints is described in the paper. GUI enables to draw and edit the statecharts, and to specify the required behavior of the system. Useful types of properties, such as state reachability, safety, and response, can be specified and verified. The model-checking algorithm for statecharts verificat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative analysis of object-oriented and other methods for modeling computer based systems

    Publication Year: 2004, Page(s):13 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Methods for modeling computer based systems are evaluated against a common generic model. A formal entity-relationship (ER) model is used to compare the expressive power of methods. Expressive power is important as statements that cannot be expressed in a model is omitted from the analysis and resulting specification. Methods are also analyzed to determine whether they are based on a partial order... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.