By Topic

12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05)

Date 4-7 April 2005

Filter Results

Displaying Results 1 - 25 of 75
  • 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Proceedings. 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems - Table of contents

    Publication Year: 2005, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (21 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Model integrated computing: foundations and applications

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (23 KB) | HTML iconHTML

    Summary form only given. The goal of this article is to describe our approach to model-based design, which is based on an integrated framework called model-integrated computing (MIC). MIC includes theoretical foundations for specifying the syntax and semantics of domain-specific modeling languages (DSML), and provides a meta-programmable tool suite for modeling, model transformation, code generati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic component framework for high performance locally concurrent computing based on UML 2.0 activities

    Publication Year: 2005, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Software support for multiple hardware threads like the Pentium 4's hyperthreading technology or the upcoming multi-core desktop processors is required even for traditional single processor domains like home and office systems. Although the modeling of concurrent systems is already quite advanced, the current engineering practice usually does not yield highly concurrent applications without signif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Using connectors to integrate software components

    Publication Year: 2005, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles

    "Using Connectors to Integrate Software Components"
    by Jiang Guo, Yuehong Liao, Jeff Gray, and Barrett Bryant
    in Proceedings of 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05)

    After careful and considered review of the content and authorship of this paper by a duly constit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Components and contracts for embedded software

    Publication Year: 2005, Page(s):19 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    Component-based development is a key technology in the development of software for modern embedded systems. However, components can be difficult to deploy in embedded systems because of unclear description. This paper presents an approach to building software for embedded systems, based on the use of component in combination with contracts. The contracts specify both the functional properties and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel and reliable execution of a WDR algorithm in high speed networks

    Publication Year: 2005, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    This paper presents an idea for a parallel version of the WDR (wavelet difference reduction) compression algorithm. An implementation of the idea is applied to the Nguyen-Chen-Walker's WDR codec and related analysis are demonstrated. The parallel WDR codec (PWDR) reaches up to 50 percent speedup compared to the original sequential implementation for some images. A reliable extension of the paralle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified formal specification for a multi-consistency replication system for DHTs

    Publication Year: 2005, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    In the modern Internet, scalable and reliable storage mechanisms have become a requirement. Distributed hash tables provide scalable management of storage, but don't support consistency of replicated mutable data. In this paper, we argue that replication is an intrinsic building block of computer-based systems and we present a formal model for specifying replication services that provide support f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependency algebra: a theoretical framework for dependency management in real-time control systems

    Publication Year: 2005, Page(s):41 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    The large and complex dependency relationship between software components is at the root of system instability. A seemingly minor fault can propagate along dependency chains and bring down the system. Therefore, the first step in the development of a robust system is the management and control of dependency relations between software components. The two contributions of this paper are: 1) a refine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrative architecture elicitation for large computer based systems

    Publication Year: 2005, Page(s):51 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    This paper presents concepts and abstractions for integrative modeling, based on the fundamental modeling concepts. The approach reflects experiences from many architecture elicitation projects. It provides the necessary abstractions to combine the information about the different system components, including third-party products and hardware, into one integrated architecture model. It covers model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The ABACUS architectural approach to computer-based system and enterprise evolution

    Publication Year: 2005, Page(s):62 - 69
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The enterprise computer-based systems employed by the organisations of today can be extremely complex. Not only do they consist of countless hardware and software products from many varied sources, but they often span continents, piggybacking on public networks. These systems are essential for undertaking business and general operations in the modern environment, and yet the ability of organisatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic-based architecture generation for complex computer system optimisation

    Publication Year: 2005, Page(s):70 - 78
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Having come of age in the last decade, the use of architecture to describe complex systems, especially in software, is now maturing. With our current ability to describe, represent, analyse and evaluate architectures comes the next logical step in our application of architecture to system design and optimisation. Driven by the increasing scale and complexity of modern systems, the designers have b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded system engineering using C/C++ based design methodologies

    Publication Year: 2005, Page(s):81 - 88
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    This paper analyzes and compares the effectiveness of various system level design methodologies in assessing performance of embedded computing systems from the earliest stages of the design flow. The different methodologies are illustrated and evaluated by applying them to the design of an aircraft pressurization system (APS). The APS is mapped on a heterogeneous hardware/software platform consist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the power consumption of FPGAs through retiming

    Publication Year: 2005, Page(s):89 - 94
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    High power dissipation is one of the major disadvantages of FPGAs. A main part of the power consumed is caused by glitches. This paper analyzes the effect of retiming to reduce the power dissipation of a Xilinx Virtex-II FPGA. The authors introduce a method to insert staging registers into large designs, that are constructed from a high abstraction level language algorithmic description. Results o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical multiple associative mapping in cache memories

    Publication Year: 2005, Page(s):95 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    In this paper, a new cache placement scheme is proposed to achieve higher hit ratios with respect to the two conventional schemes namely set-associative and direct mapping. Similar to set-associative, in this scheme, cache space is divided into sets of different sizes. Hence, the length of tag fields associated to each set is also variable and depends on the partition it is in. The proposed mappin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining requirements engineering techniques - theory and case study

    Publication Year: 2005, Page(s):105 - 112
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    The selection of requirements engineering (RE) techniques during software project development is a challenge for most developers. One of the reasons is that there is a great lack of requirements engineering education in most academic programs, so software developers have to learn requirements engineering practices on the job. This can easily result in the selection of techniques that are ill-suite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traceability-driven model refinement for test case generation

    Publication Year: 2005, Page(s):113 - 120
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Testing complex computer-based systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support during the generation of test cases can considerably reduce the effort and the risk of errors of this task. While model the understanding of model transformation got better in the past, the analysis of the input - requireme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT asset management of industrial automation systems

    Publication Year: 2005, Page(s):123 - 128
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    The installation and administration of large heterogeneous IT infrastructures, for enterprises as well as industrial automation systems, are becoming more and more complex and time consuming. Industrial automation systems, such as those delivered by ABB Inc., present an additional challenge, in that these control and supervise mission critical production sites. Nevertheless, it is common practice ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-based Web service composition framework and strategy

    Publication Year: 2005, Page(s):129 - 134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Web services provided a new solution for reusing and assembling Web software or components under the distributed service-oriented architecture and across-platform environment with a series of XML-based protocols. An architecture-based service composition model based on the architecture life-cycle is proposed, which provide a mechanism for dynamic service management and deployment. It also guarante... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture rationalization: a methodology for architecture verifiability, traceability and completeness

    Publication Year: 2005, Page(s):135 - 144
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Architecture modeling is practiced extensively in the software industry but there is little attention paid to the traceability, verifiability and completeness of architecture designs. Deficiencies in any of these three areas in an architecture model can be costly and risky to projects. We propose the architecture rationalization method (ARM), which is based on architecture rationale, to overcome t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metric evaluation of embedded Java-based proxies on handheld devices in cluster-based ad-hoc routing

    Publication Year: 2005, Page(s):147 - 154
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is no possibly of creating a network backbone, and in emergency situations. They may also lead to more flexible networks, which require reduced configuration, and allow for optimised routes. There is thus a requirement to use mob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.