By Topic

Engineering of Complex Computer Systems, 1999. ICECCS '99. Fifth IEEE International Conference on

18-21 Oct. 1999

Filter Results

Displaying Results 1 - 18 of 18
  • Proceedings Fifth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'99) (Cat. No.PR00434)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s): 185
    Request permission for commercial reuse | PDF file iconPDF (4 KB)
    Freely Available from IEEE
  • A CORBA-based architecture for integrating distributed and heterogeneous databases

    Publication Year: 1999, Page(s):143 - 152
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    During an industrial research project of Deutsche Telekom, we designed and developed the VHDBS system, a federated database system for integrating information from pre-existing and legacy database systems in a distributed and heterogeneous environment. VHDBS is based on the OMG/CORBA 2.0 that provides an interoperability infrastructure. In this paper we present some main design aspects of the arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons learned from wrapping systems

    Publication Year: 1999, Page(s):132 - 142
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    This paper describes lessons we have learned over the last ten years from our “wrapping” approach to large-scale system development. Our research program in integration for constructed complex systems has led to several results with system engineering applications: the wrapping expression notation wrex for communication among distributed entities, the problem posing interpretation that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Criteria for generating specification-based tests

    Publication Year: 1999, Page(s):119 - 129
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    This paper presents general criteria for generating test inputs from state-based specifications. Software testing can only be formalized and quantified when a solid basis for test generation can be defined. Formal specifications of complex systems represent a significant opportunity for testing because they precisely describe what functions the software is supposed to provide in a form that can ea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of traffic networks based on Stochastic Timed Petri Net models

    Publication Year: 1999, Page(s):77 - 85
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    A compositional method for modeling and evaluation of performance indices of traffic control systems based on Stochastic Timed Petri Nets (STPN) is presented. We use STPN to specify traffic and traffic control at an intersection and use a random distribution model to model the motion of vehicles in a road segment between any two consecutive intersections. The traffic control system is thus modeled... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing more reliable software faster and cheaper

    Publication Year: 1999, Page(s):162 - 176
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    This paper outlines the nature of the standard, proven, widespread best practice of software reliability engineering (SRE). It is widely applicable, low in cost, and its implementation has virtually no schedule impact. SRE helps one develop and test more reliable software faster and cheaper. We show how it does this, and present some resources that will help one learn more about it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for analyzing configurations of deployable software systems

    Publication Year: 1999, Page(s):32 - 42
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Configuring and deploying a large software system is complicated when the system is composed of components and when there are numerous possible configurations for the system. In such a scenario, it is difficult for end users to specify and install an appropriate configuration for their specific environment. Defining all valid configurations of a software system is challenging, and can be addressed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A realistic architecture for timed testing

    Publication Year: 1999, Page(s):109 - 118
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    The aim of this paper is to present a convenient test architecture for the purpose of testing timed systems. A timed system is described as a timed automaton which is expressed as a region graph. This latter is then translated into a flattened automaton. Test sequences are derived from the flattened automaton. In order to check the conformity of a real life implementation, we detail the test archi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general purpose virtual collaboration room

    Publication Year: 1999, Page(s):21 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    The general purpose virtual collaboration room (VCR) is an Internet based desktop groupware system that enables a group of remote individuals to flexibly and naturally conduct their collaborative teaching/learning/working without constraints on collaboration types, working styles, group scales, and system platforms. To cope with the complexity, a room metaphor, i.e., emulating a physical room and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating a flexible architecture for distributed control

    Publication Year: 1999, Page(s):66 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Along production pipelines in manufacturing industries, several elaboration phases in which the movement of interpolated axes are present. These activities have to be synchronized with several other simpler activities along the pipeline. Computerized numerical controls for such systems have to be flexible and strongly expandable and reusable since pipelines are frequently reconfigured to realize d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CSCW framework for the flexible coupling of groupware widgets

    Publication Year: 1999, Page(s):9 - 20
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    Modern CSCW (computer supported cooperative work) applications are driven by intensive graphical user interfaces. Groupware widgets such as shared scrollbars and text editors are common in these applications to facilitate synchronization of shared information across a user group. These widgets differ from their single-user counterparts in that they must coordinate and consistently reflect changes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical considerations in protocol verification: the E-2C case study

    Publication Year: 1999, Page(s):153 - 160
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    We report on our efforts to formally specify and verify a new protocol of the E-2C Hawkeye Early Warning Aircraft. The protocol, which is currently in test at Northrop Grumman, supports communication between a mission computer (MC) and three or more tactical workstations (TWSs), connected by a single-segment LAN. We modeled the protocol in the PROMELA specification language of the SPIN verificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On cost function synthesis for multi-objective design decisions in complex real-time systems

    Publication Year: 1999, Page(s):86 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Engineering of modern complex real time systems is driven by a host of design objectives, often differing not only in nature, importance, and form, but also in dimensional units and range, and themselves interacting in complex ways. These objectives influence design decisions throughout the entire system life cycle. We consider the problem of formulating the cost of a design decision driven by mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UML+ROOM as a standard ADL?

    Publication Year: 1999, Page(s):43 - 53
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Designing a software system's architecture properly is one of the most important tasks of any software engineering project. Nevertheless there exists no common definition of the term “software architecture” and no standard software architecture description language (ADL). The paper discusses whether the standard OO modeling language UML is a standard ADL, explains some deficiencies if ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal development and validation of Java dependable distributed systems

    Publication Year: 1999, Page(s):98 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The rapid expansion of Java programs into the software market is often not supported by a proper development methodology. We present a formal development methodology, well suited for Java dependable distributed applications. It is based on the stepwise refinement of model oriented formal specifications, and enables validation of the obtained system wrt the client's requirements. Three refinement s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrating approach for developing distributed software systems-combining formal methods, software reuse, and the experience base

    Publication Year: 1999, Page(s):54 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    The development of complex software systems is driven by many diverse and sometimes contradictory requirements such as correctness and maintainability of resulting products, development costs, and time-to-market. To alleviate these difficulties, we propose a development method for distributed systems that integrates different basic approaches. First, it combines the use of the formal description t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Internet sessions with Sorbet

    Publication Year: 1999, Page(s):2 - 8
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    More and more organizations are using intranets and even the Internet as the communications media for important data. However, such communications media are inherently insecure and subject to hijacking. To secure these connections, mechanisms must be built on top of the underlying communications facilities. We discuss one such security mechanism and describe an implementation using common object r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.