Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)

21-22 Oct. 1996

Filter Results

Displaying Results 1 - 25 of 38
  • Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)

    Publication Year: 1996
    Request permission for reuse | PDF file iconPDF (233 KB)
    Freely Available from IEEE
  • Mk48 ADCAP torpedo high-assurance testing

    Publication Year: 1996, Page(s):8 - 15
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (665 KB)

    The Mk48 ADCAP torpedo is the US Navy's premier heavyweight submarine-launched torpedo and is widely recognized as the world's most capable anti-submarine weapon. ADCAP is a wire-guided, thermal torpedo launched through the full submarine's depth and speed profile. Following ADCAP's initial fleet introduction in 1988, software upgrades were begun to improve torpedo performance in the presence of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time specification environment based on Z and graphical object-oriented modeling techniques

    Publication Year: 1996, Page(s):16 - 23
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (658 KB)

    The critical and complex nature of most real-time systems necessitates the use of rigorous techniques in their development. Formal specification techniques (FSTs) offer a foundation for rigorous design of complex systems. Though developers are aware of the benefits FSTs can bring to the software development effort, they often cite the difficulty of applying the techniques to their problems as a re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying fault tolerance in mission critical systems

    Publication Year: 1996, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (794 KB)

    Dependability is a central concern in the design of mission critical systems. A major design constraint is that the system cannot be brought down for repair during mission times. A number of alternate designs are possible for a given specification. Alternate designs necessitate evaluation. This requires capturing the system specifications and designs in the same formalism. We propose an extended I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying timing constraints in real-time object-oriented systems

    Publication Year: 1996, Page(s):32 - 39
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (909 KB)

    Modeling object interactions is an important aspect of object-oriented (OO) system design and development. We propose a specification technique, Guarded Method Sequence Specification (GMtSS), for modeling such interactions in real-time OO systems. GMtSS extends another specification technique, MtSS, by adding guard constructs that can be used to specify timing constraints in conjunction with seque... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A technique for validating Booch object-oriented designs from extensions to the Descartes specification language

    Publication Year: 1996, Page(s):40 - 47
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (683 KB)

    Software validation is the process of checking whether the software performs as required. Validation assumes much importance in the case of high assurance (real time, reliable, safety critical, and secure) systems, us even a slight deviation from the desired behavior is unacceptable. Descartes is an executable specification language. Specifications in Descartes are validated through rapid prototyp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High assurance engineering: the good, the bad, and the ugly

    Publication Year: 1996, Page(s):50 - 51
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (210 KB)

    Over the past two decades, substantial research efforts have been devoted to the design and development of high assurance systems, including general approaches and specific systems. Researchers in fault tolerant systems have developed effective approaches to handle hardware and software failures and provide high system reliability and availability. Techniques for developing high assurance systems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer security: the good, the bad and the ugly

    Publication Year: 1996, Page(s):52 - 54
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (302 KB)

    We discuss and characterize different types of solutions to computer security problems in terms of bad (theoretically sound, but expensive and impractical), ugly (practical, but messy and of doubtful assurance), and good (theoretically sound and practical). We also attempt to characterize the different approaches and problems in computer security that would lead to these different types of solutio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ten practical techniques for high assurance systems engineering

    Publication Year: 1996, Page(s):55 - 56
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    This paper presents ten practical techniques that help engineer complex systems that have stringent dependability and real-time requirements. The techniques described are software centric but in most cases they apply to systems as a whole. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software on the edge

    Publication Year: 1996, Page(s):57 - 58
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (129 KB)

    As our society becomes more technologically complex, computers (and the software that they run) are being used in a potentially alarming number of high consequence safety-critical applications. When these systems fail, the outcome can be devastating. Formal methods provide what, by a growing number of experts, is considered to be the best approach to making the software construction process more r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring quality in distributed multimedia systems

    Publication Year: 1996, Page(s):60 - 67
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (810 KB)

    The use of multimedia technology can provide cost effective methods for management and dissemination of information, and thus increase economic efficiency. Distributed, networked multimedia information systems will be a critical component of technology-based information infrastructures in the future. Several ground breaking applications have already appeared, and more are expected to follow. Innov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proving refinement transformations for deriving high-assurance software

    Publication Year: 1996, Page(s):68 - 77
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (890 KB)

    The construction of a high-assurance system requires some evidence, ideally a proof, that the system as implemented will behave as required. Direct proofs of implementations do not scale up well as systems become more complex and therefore are of limited value. In recent years, refinement-based approaches have been investigated as a means to manage the complexity inherent in the verification proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating rare-event failure tolerance: reductions in future uncertainty

    Publication Year: 1996, Page(s):78 - 85
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    At the 1995 Computer Assurance (COMPASS) conference, Voas and Miller (1995) presented a technique for assessing the failure tolerance of a program when the program was executing in unlikely modes (with respect to the expected operational profile). In that paper, several preliminary algorithms were presented for inverting operational profiles to more easily distinguish the unlikely modes of operati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD)

    Publication Year: 1996, Page(s):86 - 92
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    This paper addresses opportunities to apply the ECBS discipline and reuse technology in the DoD information systems development environment and identifies relevant on-going initiatives. The application of ECBS principles, in concert with the reuse of processes, architectures, information, methods, and tools within DoD application domains or product lines, has the potential to significantly reduce ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Writing a user functional description for an Army software metrics support tool

    Publication Year: 1996, Page(s):93 - 101
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    This paper describes the experience of building a users functional description (UFD) document for an Army metrics support tool. The purpose of the UFD is to capture the users' domain knowledge, but the users are often not in a position to write the UFD. As a contractor, the author wrote the UFD and struggled to reflect the users' viewpoint. This report reflects the lessons learned in trying to wri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new compositional method for condensed state-space verification

    Publication Year: 1996, Page(s):104 - 111
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (865 KB)

    The dynamic behavior of concurrent systems can be modeled and analyzed using Petri nets. Many approaches have been proposed to analyze the properties of Petri nets. Among them, reachability analysis is a fundamental method for studying the dynamic properties of Petri nets. However, state space explosion has obstructed its applicability for analyzing large-scale systems. This paper presents a new m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting and mapping test sequences from formal specifications of concurrent programs

    Publication Year: 1996, Page(s):112 - 119
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (762 KB)

    Specification-based testing of concurrent programs requires that test sequences be selected from the specification and mapped to the implementation. Test sequences can be selected incrementally. During incremental testing, the specification is partitioned into two or more components that are each tested separately. In this paper, we show how guidance for the partitioning can be provided by a const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PSRR: a scheme for time-bounded fault tolerance in distributed object-based systems

    Publication Year: 1996, Page(s):120 - 128
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1027 KB)

    An extension of the conventional object structuring approach, called the RTO.k object structuring approach, has been established as a unified scheme for object-oriented structuring of both real-time applications and non-real-time applications while enabling the system designer to provide design-time guarantees of timely service capabilities of the objects designed. In another area, the DRB/PSP sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive recovery for mobile environments

    Publication Year: 1996, Page(s):134 - 141
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (890 KB)

    Mobile computing allows ubiquitous and continuous access to computing resources while the users travel or work at a client's site. The flexibility introduced by mobile computing brings new challenges to the area of fault tolerance. Failures that were rare with fixed hosts become common, and host disconnection makes fault detection and message coordination difficult. This paper describes a new chec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault injection experiments on real-time protocols using ORCHESTRA

    Publication Year: 1996, Page(s):142 - 149
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (996 KB)

    The paper presents a set of experiments on real time protocols using the ORCHESTRA software fault injection environment. The paper first describes a specific implementation of ORCHESTRA for testing applications that use Unix sockets for communication. A novel feature of this tool is that it utilizes operating system support provided by Real Time Mach to quantify and compensate for the intrusivenes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-independent real-time operating system mechanisms for timing error detection, handling and monitoring

    Publication Year: 1996, Page(s):150 - 157
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (982 KB)

    Most research focusing on timing errors deals with scheduling policies that avoid the errors. Since many of the policies are based on estimated worst case execution times for each task, reliability is a function of the accuracy of the estimates. As a result, many hard real time systems are implemented with the dangerous assumption that due to correct design and testing, a missed deadline will neve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid parallel evaluation model for logic-based intelligent systems

    Publication Year: 1996, Page(s):158 - 165
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (859 KB)

    We present a hybrid model to speed up the evaluation of a logic based intelligent system. A logic based system is first applied by a data dependency analysis technique which can find all the mode combinations that exist within clauses of a knowledge base. The mode information is used to support a novel hybrid parallel evaluation model, which combines both top down and bottom up evaluation strategi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transaction integration for reusable hard real-time components

    Publication Year: 1996, Page(s):166 - 175
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    The paper presents a strategy for the composition of components to meet 'end to end' timing requirements. This is a framework based approach known as transaction integration. A framework is constructed through the use of transactions. A transaction represents a control and data flow path across a set of component interfaces, or placeholders, that must be completed by a specific deadline. Reusable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow analysis for concurrent, reactive, real-time systems

    Publication Year: 1996, Page(s):176 - 183
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (802 KB)

    One of the widely used techniques in software safety analysis is fault tree analysis. The paper discusses the use of flow analysis techniques for supporting fault tree generation from software specifications. Earlier work on flow analysis techniques has focused on sequential systems. We discuss how system characteristics such as concurrency and real time reactive features impact the flow analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time multicast connection establishment over ATM networks

    Publication Year: 1996, Page(s):184 - 191
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (675 KB)

    Applications requiring the multicast capability are emerging rapidly and becoming widely available. This multicast capability is required to be supported in ATM networks. One of the key characteristics of the ATM is the use of locally unique connection, identifiers like virtual path identifiers/virtual channel identifiers (VPIs/VCIs). A fast multicast connection establishment protocol which takes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.