Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings.

25-26 March 2004

Filter Results

Displaying Results 1 - 25 of 59
  • Proceedings. Eighth IEEE International Symposium on High Assurance Systems Engineering

    Publication Year: 2004
    Request permission for reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2004, Page(s): ii
    Request permission for reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Proceedings Eighth IEEE International Symposium on High Assurance Systems Engineering

    Publication Year: 2004, Page(s): iii
    Request permission for reuse | PDF file iconPDF (1098 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2004, Page(s): iv
    Request permission for reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Table of Contents [Eighth IEEE International Symposium on High Assurance Systems Engineering]

    Publication Year: 2004, Page(s):v - viii
    Request permission for reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2004, Page(s): ix
    Request permission for reuse | PDF file iconPDF (157 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the PC chairs

    Publication Year: 2004, Page(s): x
    Request permission for reuse | PDF file iconPDF (157 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing committee

    Publication Year: 2004, Page(s): xi
    Request permission for reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2004, Page(s): xii
    Request permission for reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2004, Page(s):xiii - xiv
    Request permission for reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Decomposition of fairness and performance aspects for high assurance continuous process-control systems

    Publication Year: 2004, Page(s):3 - 11
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    There are many applications that can be modeled as evolutions of continuous state spaces, such as real-time embedded systems, etc. For such applications, the divide-and-conquer method is usually used to achieve high quality software development. Instead of decomposing the state space based on phases, objects, etc., we decompose the state space based on aspects. Typically, there are four kinds of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software fault tree analysis for product lines

    Publication Year: 2004, Page(s):12 - 21
    Cited by:  Papers (18)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    The current development of high-integrity product lines threatens to outstrip existing tools for product-line verification. Software Fault Tree Analysis (SFTA) is a technique that has been used successfully to investigate contributing causes to potential hazards in safety-critical applications. This paper adapts SFTA to product lines of systems. The contribution is to define: (1) the technique to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible design of complex high-integrity systems using trade offs

    Publication Year: 2004, Page(s):22 - 31
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Large-scale complex embedded systems pose unique problems. To reduce overall development times, there is a need to develop the system in a concurrent fashion, involving the development and verification of software at the same time as designing, building and verifying the hardware. This requires a two-phase trade-off analysis approach to the hardware software co-design problem. The first phase is p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-view modeling and analysis of embedded real-time software with meta-modeling and model transformation

    Publication Year: 2004, Page(s):32 - 41
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    We present an end-to-end tool-chain for model-based design and analysis of component-based embedded real-time software, with Avionics Mission Computing as an application domain. The tool-chain covers the entire system development life-cycle including modeling, analysis, code generation, and runtime instrumentation. Emphasis is placed on integration of tools developed by multiple institutions via s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-centric and language independent framework for safety analysis tools

    Publication Year: 2004, Page(s):45 - 55
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    This paper presents a knowledge-centric and language independent framework and its application to develop safety analysis tools for avionics systems. A knowledge-centric approach is important to address domain-specific needs, with respect to the types of problems the tools detect and the strategies used to analyze and adapt the code. The knowledge is captured by formally specified patterns used to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing overfitting in genetic programming models for software quality classification

    Publication Year: 2004, Page(s):56 - 65
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1009 KB) | HTML iconHTML

    A high-assurance system is largely dependent on the quality of its underlying software. Software quality models can provide timely estimations of software quality, allowing the detection and correction of faults prior to operations. A software metrics-based quality prediction model may depict overfitting, which occurs when a prediction model has good accuracy on the training data but relatively po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for designing and assessing detectors for dependable component-based systems

    Publication Year: 2004, Page(s):69 - 78
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1061 KB) | HTML iconHTML

    In this paper, we present an approach that helps in the design and assessment of detectors. A detector is a program component that asserts the validity of a predicate in a given program state. We first develop a theory of error detection, and identify two main properties of detectors, namely completeness and accuracy. Given the complexity of designing efficient detectors, we introduce two metrics,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decentralized workload management for assurance according to heterogeneous service levels

    Publication Year: 2004, Page(s):79 - 88
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Due to the advent of electronic commerce, the service provider can offer the customer a Service Level Agreement (SLA) to distinguish itself in today's competitive market. Different users require different levels of service in terms of information consumption or response time, appearing a need of a system able to assure the heterogeneous service levels of the users in such a mission-critical enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural analysis of explicit fault-tolerant programs

    Publication Year: 2004, Page(s):89 - 96
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Explicit fault tolerant programs are characterized by proactive efforts to ensure robustness and ability of fault correction. A fault tolerant application is usually realized conforming to one of a collection of standard techniques. Graph based methods can be used to examine existing applications to derive a control flow abstraction with respect to the fault-tolerance architecture. This abstractio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-function system testing: composition of test sets

    Publication Year: 2004, Page(s):99 - 108
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    This paper focuses on the following aspects of multi-function system testing: analysis of system requirements and revelation of atomic system functions and their relationships, analysis of input/output variables, analysis of system function groups (clusters), composition of the test sets for each group of atomic system functions. Related problems associated with these aspects are briefly described... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing large scale streaming Internet applications over wireless LANs

    Publication Year: 2004, Page(s):109 - 115
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    The amount of real-time traffic over the Internet as well as most corporate, government and academic IP networks is growing. Streaming applications are moving from purely entertainment to being essential for daily business and strategic operations. Examples include instructional training, telemedicine, unmanned vehicles, and remote security monitoring with both fixed and mobile cameras. At the sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management for computational intelligence systems

    Publication Year: 2004, Page(s):116 - 125
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Computer systems do not learn from previous experiences unless they are designed for this purpose. Computational intelligence systems (CIS) are inherently capable of dealing with imprecise contexts, creating a new solution in each new execution. Therefore, every execution of a CIS is valuable to be learned. We describe an architecture for designing CIS that includes a knowledge management (KM) fra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How good is your blind spot sampling policy

    Publication Year: 2004, Page(s):129 - 138
    Cited by:  Papers (15)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    Assessing software costs money and better assessment costs exponentially more money. Given finite budgets, assessment resources are typically skewed towards areas that are believed to be mission critical. This leaves blind spots: portions of the system that may contain defects which may be missed. Therefore, in addition to rigorously assessing mission critical areas, a parallel activity should sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing reliability risk using fault correction profiles

    Publication Year: 2004, Page(s):139 - 148
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Building on the concept of the fault correction profile - a set of functions that predict fault correction events as a function of failure detection events - introduced in previous research, we define and apply reliability risk metrics that are derived from the fault correction profile. These metrics assess the threat to reliability of an unstable fault correction process. The fault correction pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unsupervised learning for expert-based software quality estimation

    Publication Year: 2004, Page(s):149 - 155
    Cited by:  Papers (19)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (742 KB) | HTML iconHTML

    Current software quality estimation models often involve using supervised learning methods to train a software quality classifier or a software fault prediction model. In such models, the dependent variable is a software quality measurement indicating the quality of a software module by either a risk-based class membership (e.g., whether it is fault-prone or not fault-prone) or the number of fault... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.