Proceedings. Fifth IEEE International Symposium on High Assurance Systems Engineering (HASE 2000)

17-17 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 47
  • Proceedings. Fifth IEEE International Symposium on High Assurance Systems Engineering (HASE 2000)

    Publication Year: 2000
    Request permission for reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Engineering ethics: principles and practical maxims*

    Publication Year: 2000, Page(s):3 - 4
    Request permission for reuse | PDF file iconPDF (94 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructions of behaviour observation schemes in software testing

    Publication Year: 2000, Page(s):7 - 16
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (946 KB)

    Software testing is a process in which a software system's dynamic behaviours are observed and analysed so that the system's properties can be inferred from the information revealed by test executions. While the existing theories of software testing might be adequate in describing the testing of sequential systems, they are not capable to describe the testing of concurrent systems that can exhibit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining the expected time to unsafe failure

    Publication Year: 2000, Page(s):17 - 24
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (658 KB)

    The number of applications requiring highly reliable and/or safety-critical computing is increasing. One emerging safety metric is the Mean Time To Unsafe Failure (MTTUF). This paper summarizes a novel technique for determining the MTTUF for a given architecture. The first step in determining the MTTUF for a system is to estimate system Mean Time To Failure (MTTF) and system fault coverage. Once t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of software cost models with rejuvenation

    Publication Year: 2000, Page(s):25 - 34
    Cited by:  Papers (35)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (822 KB)

    Software rejuvenation is a preventive maintenance technique that has been extensively studied in the recent literature. In this paper we extend the classical result by Huang et al. (1995), and in addition propose a modified stochastic model to generate the software rejuvenation schedule. More precisely, the software rejuvenation models are formulated via the semi-Markov process, and the optimal so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of system dependability and software reliability growth models for e-commerce systems

    Publication Year: 2000, Page(s):35 - 42
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (575 KB)

    This paper describes how MEADEP (http//:www.sohar.com/meadep) a system level dependability prediction tool, and SMERFS (Farr and Smith, 1993), a software reliability growth prediction tool can be used together to predict system reliability, availability growth for complex systems. The Littlewood/Verrall model is used to predict reliability growth from software test data. This prediction is integra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How can symposia be structured to benefit both industry and academia?

    Publication Year: 2000, Page(s):45 - 46
    Request permission for reuse | PDF file iconPDF (185 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues concerning the future of computer science

    Publication Year: 2000, Page(s):47 - 48
    Request permission for reuse | PDF file iconPDF (159 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Four areas of overlapping interest

    Publication Year: 2000, Page(s):49 - 50
    Request permission for reuse | PDF file iconPDF (92 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On how symposia can be structured to benefit academia and industry*

    Publication Year: 2000, Page(s):51 - 52
    Request permission for reuse | PDF file iconPDF (115 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stochastic extension of a behavioural subset of UML statechart diagrams

    Publication Year: 2000, Page(s):55 - 64
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    We present a stochastically timed extension of UML statechart diagrams. The extension is rather simple both from a notational point of view and from a semantics point of view. In particular we enrich a state/transition formal operational semantics we proposed in (Latella et al., 1999) with random clocks for expressing time values. We do this in an orthogonal way, which means that the enriched sema... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing an application's temporal properties with UML for Real-Time

    Publication Year: 2000, Page(s):65 - 74
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (900 KB)

    The Unified Modeling Language (UML) is commonly used in the development of non-real-time systems and is gaining popularity in the object-oriented real-time community as well. Recently, Rational Software Corporation teamed with ObjecTime, Ltd to develop UML for Real-Time (UML-RT). UML-RT uses the extensibility mechanisms of UML to incorporate concepts from ROOM (Real-time Object-Oriented Modeling L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The DADSim air defense simulation environment

    Publication Year: 2000, Page(s):75 - 82
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (779 KB)

    DADSim is a distributed air defense simulation environment, being made compliant with the High Level Architecture (HLA) (http://www.hla.dmso.mil) runtime, a distributed environment used for defense simulations. DADSim simulates modern day combat dynamics of air defense engagements involving multiple targets and multiple platforms enforced using a multi-tier command and control structure. DADSim co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative analysis of dependability critical systems based on UML statechart models

    Publication Year: 2000, Page(s):83 - 92
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (971 KB)

    The paper introduces a method which allows quantitative performance and dependability analysis of systems modeled by using UML statechart diagrams. The analysis is performed by transforming the UML model to Stochastic Reward Nets (SRN). A large subset of statechart model elements is supported including event processing, state hierarchy and transition priorities. The transformation is presented by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disappearing formal methods*

    Publication Year: 2000, Page(s):95 - 96
    Cited by:  Papers (6)
    Request permission for reuse | PDF file iconPDF (189 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible real-time architecture

    Publication Year: 2000, Page(s):99 - 106
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (937 KB)

    Assuring hard real-time characteristics of I/O associated with embedded software is often a difficult task. Input-Output related statements are often intermixed with the computational code, resulting in I/O timing that is dependent on the execution path and computational load. One way to mitigate this problem is through the use of interrupts. However, the non-determinism that is introduced by inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded system for safe, secure and reliable execution of high consequence software

    Publication Year: 2000, Page(s):107 - 114
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1001 KB)

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an ultra-reliable execution environment. The selection of an embedded processor and its development environment has the most far-reaching effects on the production of the system than any other element in the design. This choice ripples through the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of the B formal method to the proof of a type verification algorithm

    Publication Year: 2000, Page(s):115 - 124
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    Smart cards are credit-card sized devices embedding a microprocessor. They are typically used to provide security to an information system. Open cards are smart cards able to download code after their issuance. The card security is usually ensured by a third party that sends a cryptographic certificate with the code to authenticate it. On-card code verification could be a solution for improving ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating evidence for certification of modern processors for use in safety-critical systems

    Publication Year: 2000, Page(s):125 - 134
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (721 KB)

    This paper investigates the implications of using a modern super-scalar processor in the safety-critical domain. Firstly, a description of current certification practice and devices is given as background. This is followed by an assessment of how the certification argument and its supporting evidence are affected by the use of a super-scalar processor. Two types of modern processor are considered,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do formal methods really belong in the toolbox of the practicing engineer?

    Publication Year: 2000, Page(s):137 - 139
    Request permission for reuse | PDF file iconPDF (208 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable software construction: a logic programming based methodology

    Publication Year: 2000, Page(s):140 - 141
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (211 KB)

    In this position paper we investigate how logic programming technology can aid software development. The overall goal is to provide a framework for specification and verification that is "computational" in nature rather than being based on traditional, more complex formalisms such as theorem proving and term rewriting. Two approaches are discussed. In the first approach, given a program written in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of formal methods in hardware and software cannot be abandoned

    Publication Year: 2000, Page(s):142 - 143
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (221 KB)

    The title of this paper provides an answer to the question posed by Larry King in his panel paper titled "Do formal methods really belong in the toolbox of the practicing engineer?" Yes, formal methods do indeed belong to the toolbox of the practicing engineer. The capabilities of today's computers are truly impressive and as a result have opened door to the design and development of increasingly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic abstractions of real-time specifications

    Publication Year: 2000, Page(s):147 - 158
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (971 KB)

    This paper explores the automatic generation of abstractions of real-time specifications. Abstractions of formal specifications hide certain details while preserving other essential aspects of system behavior. Abstractions are useful in the context of model-checking because the state-space explosion problem often prohibits model-checking of the full specification. Abstractions are commonly used to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety analysis of an evolving software architecture

    Publication Year: 2000, Page(s):159 - 168
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (830 KB)

    The safety analysis of an evolving software system has to consider the impact that changes might have on the software components, and to provide confidence that the risk is acceptable. If the impact of a change is not thoroughly analysed, accidents can occur as a result of faulty interactions between components, for example. However, the process of safety analysis can be enhanced if appropriate ab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements formalization and validation for a telecommunication equipment protection switcher

    Publication Year: 2000, Page(s):169 - 176
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (726 KB)

    Using formal methods, namely model checking, we can automatically verify a formal model of the requirements against given properties. This allows us to detect errors early in the design process, thus decreasing development cost and time to market. However, to modify a well established design process to introduce formal methods is not easy. We present a case study exploring the possibility of repla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.