Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems

8-11 April 2002

Filter Results

Displaying Results 1 - 25 of 36
  • Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (300 KB)
    Freely Available from IEEE
  • Conference session and workshop on performance, interoperability, and applications of mobile agent systems

    Publication Year: 2002, Page(s):226 - 227
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Recent years have seen the development of a number of mobile agent systems which present new challenges along with increased functionality compared to traditional distributed systems. We are especially interested in the use of sound engineering practices in design and architecture for this class of systems as well as frameworks for quality of migration and interoperability between different system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s): 277
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Optimization of a retargetable functional simulator for embedded processors

    Publication Year: 2002, Page(s):203 - 210
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    The objective of this research is to develop tools and methods for system-level optimization of embedded software that is executed on system-on-chip platforms. In particular, this paper proposes a new instruction-set simulator's tool flow which has been extended with some retargetability features and multiple program representations. We propose an innovative way to improve the simulation speed, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated framework for sensor-based embedded systems

    Publication Year: 2002, Page(s):195 - 202
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1194 KB) | HTML iconHTML

    This paper presents an application of networked sensors that offers a design pattern for a class of sensor-based embedded systems. It deals with an integrated framework based on smart transducer interface standard (IEEE 1451), on messaging architecture (Compaq-Intel-Microsoft's Virtual Interface Architecture), and on IP multicast communication, mediating an efficient and unified access from Intern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using category theory to model software component dependencies

    Publication Year: 2002, Page(s):185 - 192
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    As the size and complexity of software systems grow, the identification and proper management of interconnection dependencies among various pieces of a system have become responsible for an increasingly important part of the development effort. In today's large systems, the variety of encountered interconnection relationships (such as implements, uses, and extends) is very large, while the complex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systematic method of reusing objects extracted from legacy systems

    Publication Year: 2002, Page(s):177 - 184
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Billions of dollars are spent each year on computer software. Much of this effort is spent on creating and testing new source code. In order to save money, increase productivity, and improve reliability, academic and industrial institutions have put forth a lot of effort on software reuse. Identifying, extracting and reengineering software components that implement abstractions within existing sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VSPEC and its integrated tool suite

    Publication Year: 2002, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    In this paper, we describe an integrated tool suite for VSPEC specifications that addresses systems level correctness. The functional correctness of a design is analyzed using the proof obligation generator. The proof obligation generator identifies various properties that must hold for a design to be correct. It then creates a model of the system in the PVS theorem proving language and also gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving quality attributes of a complex system through architectural analysis-a case study

    Publication Year: 2002, Page(s):167 - 174
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1287 KB) | HTML iconHTML

    The Software Architecture Analysis Method (SAAM) is a method for analyzing architectural designs, providing support in the design process by comparing different architectures and drawing attention to how a system's quality attributes are affected by its architecture. We used SAAM to analyze the architecture of a nuclear simulation system, and found the method to be of great help when selecting the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering for time-to-market projects

    Publication Year: 2002, Page(s):17 - 24
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    This paper identifies the essential components of a requirements engineering (RE) process and provides alternatives to the requirements analyst when deciding on a particular set of RE methods. Existing methods of choosing RE techniques are discussed, and a new technique is proposed specifically for choosing RE techniques for projects with critical time-to-market projects. The components of the ess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refinement of model specifications in embedded systems design

    Publication Year: 2002, Page(s):159 - 166
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Most current codesign approaches leverage from a complete specification of an application design at the implementation level. We pursue here an implementation independent system level design specification for realtime embedded systems using modular executable discrete event models. This paper introduces a formal abstraction for the specification of such design models. In addition, it defines a set... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing complex temporal requirements in real-time control systems

    Publication Year: 2002, Page(s):103 - 109
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Design and implementation of motion control applications includes the transition from control design to real-time system implementation. To make this transition smooth, the specification model for the real-time system should allow also for temporal requirements other than deadlines, e.g., deviation from nominal period time of an activity, end-to-end timing constraints, temporal correlation between... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards recyclable system requirements

    Publication Year: 2002, Page(s):9 - 16
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    With the increasing importance and complexity of software systems in cars, car manufacturers are faced with new challenges: very large specification documents with a fast growing portion concerning software must be handled by engineers without dedicated backgrounds in computer science. The development must be accompanied by completely new processes. All this is under the pressure to reduce time-to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Petri Nets for modelling mobile agent enabled interorganizational workflows

    Publication Year: 2002, Page(s):245 - 252
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Mobile agents are a powerful abstraction for conceptualizing flexible large scale distributed workflows. Practically, we can use mobile agents to synchronize workflows of different organizations resulting in an interorganizational workflow. This paper discusses how mobile agent enabled interorganizational workflows can be usefully modelled using advanced Petri Net techniques such as Interorganizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Top-down composition of software architectures

    Publication Year: 2002, Page(s):147 - 156
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    This paper discusses an approach for top-down composition of software architectures. First, an architecture is derived that addresses functional requirements only. This architecture contains a number of variability, points which are next filled in to address quality concerns. The quality requirements and associated architectural solution fragments are captured in a so-called Feature-Solution (FS) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent agent security intrusion system

    Publication Year: 2002, Page(s):94 - 99
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI model. At the physical layer, they can be protected by lock-and-key, and at the data link, they can be protected within VLANS (virtual LANs). With the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On some key requirements of mobile application software

    Publication Year: 2002, Page(s):3 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    This paper first introduces and discusses a few considerations on some key requirements of mobile computing services. In particular, the relevance of both dependability and adaptability to an effective distribution of the service is investigated. Next, the paper discusses a novel structuring technique for the application layer of mobile software, as an example of an existing tool fulfilling those ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop on component-based software engineering: composing systems from components

    Publication Year: 2002, Page(s): 223
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding software processes through system dynamics simulation: a case study

    Publication Year: 2002, Page(s):41 - 48
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    This paper presents a study with the intent to examine the opportunities provided by creating and using simulation models of software development processes. A model of one software development project was created through means of system dynamics, with data collected from documents, interviews and observations. The model was simulated in a commercial simulation tool. The simulation runs indicate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative evaluation of mobile agent performance for network management

    Publication Year: 2002, Page(s):258 - 267
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Despite the strategic and software engineering benefits mobile agents (MAs) brings to network management, their performance is still a controversial issue. A number of quantitative analyses and experiments on mobile agent performance have been reported in the last few years. Among the claims in these studies, there are some obvious controversies. In an effort to determine the existence of contradi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agent interoperability patterns and practice

    Publication Year: 2002, Page(s):238 - 244
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    A major setback for mobile agent technology is a lack of interoperability between systems for mobile agents which prevents them from reaching "critical mass". In this paper, we analyze the requirements for interoperability, and present design patterns which support interoperability between systems for mobile agents. We tested our patterns by adding support for Jade agents as well as for Tracy agen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-based visualisation of computer based systems

    Publication Year: 2002, Page(s):139 - 146
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Architecture is a central concept in the engineering of computer based systems. Given a standard architectural representation, the architecture of systems can be discussed, drawn, reasoned about and classified. Complex architectures may benefit from visualisation. Currently, tools that visualise architectures do so in two-dimensions. Above and beyond visualising the form (or structure) of the arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible development of dependability services: an experience derived from energy automation systems

    Publication Year: 2002, Page(s):86 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    This paper describes an approach for the flexible development of dependable automation services starting from their requirements. The approach is presented through the use of a case study in the field of energy automation systems. The approach is based on the use of a custom compositional recovery language that allows one to achieve, in software, a flexible and dependable solution for the specifie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging the educational gap in embedded systems curricula: developing an e-commerce audio streaming system

    Publication Year: 2002, Page(s):211 - 220
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    In this paper, a design seminar on embedded systems is described for fourth year students in the multimedia and signal processing option at our electrical engineering department. The aim of the seminar is to ease up the adaptation of the universitary curriculum to what is expected by industry of a high level engineer. The main purpose of the seminar is to provide the students with a real life prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Who does what in a multi-agent system for emergent process management

    Publication Year: 2002, Page(s):35 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Emergent processes are high-level business processes; they are opportunistic in nature whereas production workflows are routine. Emergent processes may not be managed; they may contain goal-driven sub-processes that can be managed. A multi-agent system supports emergent processes. Each player is assisted by an agent. The system manages goal-driven sub-processes and manages the commitments that pla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.