Sixth IEEE International Symposium on High Assurance Systems Engineering

Size: px
Start display at page:

Download "Sixth IEEE International Symposium on High Assurance Systems Engineering"

Transcription

1 Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical Committee on Distributed Processing Los Alamitos, California Washington Brussels Tokyo iii

2 Copyright 2001 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number PR01275 ISBN ISBN (microfiche) ISSN Additional copies may be ordered from: IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., P.O. Box 3014 Piscataway, NJ Minami-Aoyama Los Alamitos, CA Tel: Minato-ku, Tokyo Tel: Fax: JAPAN Fax: Tel: customer-service@ieee.org Fax: csbooks@computer.org tokyo.ofc@computer.org Editorial production by Anne Jacobs Cover art production by Joe Daigle/Studio Productions Printed in the United States of America by The Printing House iv

3 HASE 2001 Table of Contents HASE 2001 Organizing Committees...ix Keynotes Erroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their Reduction... 3 John Knight Arnold W. Pittler... 4 Why Testing under Expected Operational Scenarios is Not Sufficient... 5 Jeff Voas Panel Software Dependability in Distributed and Mobile Computing Environments... 7 Moderator: R. Paul Panelists: A. Nikora R. R. Some J. Voas V. Winter J. Xu Formal Methods A Formal Testing Framework for UML Statechart Diagrams Behaviours: From Theory to Automatic Verification D. Latella and M. Massink Test-Sequence Generation from Formal Requirement Models S. Rayadurgam and M. P. E. Heimdahl Model-Checking for Validation of a Fault Protection System M. S. Feather, S. Fickas, and N.-A. Razermera-Mamy Finite-State Analysis of the CAN Bus Protocol M. van Osch and S. A. Smolka v

4 Transportation A Survey: Applying Formal Methods to a Software Intensive System A. de Groot, J. Hooman, F. Kordon, E. Paviot-Adet, I. Mounier, M. Lemoine, G. Gaudiere, V. L. Winter, and D. Kapur Highly Reliable Relational Control Programs for Robust Rapid Transit Systems F. B. Bastani, I-L. Yen, and S. Kim Mechanisms for a Reliable Cooperation of Vehicles E. Nett, M. Gergeleit, and M. Mock Verification of Assurance of Space On-Board Distributed Computer System H. Yashiro, Y. Takahashi, and T. Fujiwara Testing Framework for Testing the Fault-Tolerance of Systems Including OS and Network Aspects K. Buchacker and V. Sieh A Test Management and Software Visualization Framework for Heterogeneous Distributed Applications S. Ghosh, N. Bawa, G. Craig, and K. Kalgaonkar Automating Techniques for Inspecting High Assurance Systems M. S. Fisher and B. Cukic Genetic Programming Model for Software Quality Classification Y. Liu and T. M. Khoshgoftaar Security An Unavailability Analysis of Firewall Sandwich Configurations S. Goddard, R. Kieckhafer, and Y. Zhang Analyzing Internet Security Protocols A. Yasinsac and J. Childs Systems The SASHA Architecture for Network-Clustered Web Servers S. Goddard and T. Schroeder On Simplifying Modular Specification and Verification of Distributed Protocols P. Sinha and N. Suri vi

5 Explicit Representation of Exception Handling in the Development of Dependable Component-Based Systems G. R. M. Ferreira, C. M. F. Rubira, and R. de Lemos Systems Engineering of Communication Protocols for Command and Control Systems D. J. Thuente and J. K. Whiteman Railway Systems (Experience Reports) Integrating Automatic Verification of Safety Requirements in Railway Interlocking System Design G. Dipoppa, G. D'Alessandro, R. Semprini, and E. Tronci High Assurance Technologies for Autonomous Decentralized Train Control System M. Matsumoto, S. Kitamura, and M. Sato Adaptive Step-by-Step Construction Technique Achieving High Assurance for Tokyo Metropolitan Railway Network K. Kera, K. Bekki, K. Kamijyo, and K. Mori Fast Abstracts Research Issues in Assurance of Software Dependability E. B. Allen Are Measures and Metrics for Trusted Information Systems Possible? R. B. Vaughn and R. Henning Generating Test Plans for Distributed Systems with Stochastic Decision Models S. Dalibor and M. Dal Cin A Novel Adaptive Neural Network Based Technique to Enhance Software System Assurance for Regression Testing Z. Xu and N. D. Samaan Application of Software for High Consequences Systems J. M. Covan and J. A. Cooper Fault-Tolerant Cell Location Counter Strategy in Wireless Mobile Environment Y. An Software IV&V Strategy for Small Projects R. M. Chapman vii

6 Characterization of Dynamic Behavior of Executable Software Objects to Optimize Test Case Selection for Regression N. Samaan and A. Ibrahim A Case Study of IV&V Return on Investment (ROI) R. Rogers, D. McCaugherty, and F. Martin Integrating Software into PRA: A Taxonomy of Software Related Failures B. Li, M. Li, and C. Smidts Software Reliability Analysis for Regression Testing N. Samaan and Z. Tan Assurance Analysis by Scenario-based UML Modeling K. Kosmidis and M. Sand Web-Based Prototype of Real-Time Concurrent Systems by a Specification Technique with Safety and Liveness Properties K.-Y. Sung Dynamic Fault-Tolerance Routing in 2-D Meshes Z. Jiang and J. Wu Architecting ebanking High Assurance Security Solutions S. Soundararajan and D. Dey Theorem-Proving Approach to Generating State Machine Test Sequences R. Busser, M. Boughdadi, M. Blackburn, and A. Naumann Author Index viii

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,

More information

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

Software Reliability Engineering

Software Reliability Engineering Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,

More information

Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)

Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce

More information

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003

More information

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS

More information

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002 Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i [blank page] ii Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 16-18 December

More information

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored

More information

2017 International Conference on Communication Technologies (ComTech 2017)

2017 International Conference on Communication Technologies (ComTech 2017) 2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute

More information

th International Conference on Telecommunications (ICT 2017)

th International Conference on Telecommunications (ICT 2017) 2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical

More information

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels

More information

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001 Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing 17-1 9 December

More information

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) 2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

Multi-Core Programming

Multi-Core Programming Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part

More information

(ASE 2001) Proceedings. Conference on. 16th Annual International CGIPUTER. Los Alamitos, California Washington Brussels Tokyo November 2001

(ASE 2001) Proceedings. Conference on. 16th Annual International CGIPUTER. Los Alamitos, California Washington Brussels Tokyo November 2001 Proceedings 16th Annual International Conference on n Automated Software Engineering (ASE 2001) 26-29 November 2001 Loew s Coronado Bay Resort Coronado Island San Diego, California Sponsored by IEEE Computer

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

More information

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

AWS QC14:2009. Specification for the Certification of Welding Sales Representatives

AWS QC14:2009. Specification for the Certification of Welding Sales Representatives Specification for the Certification of Welding Sales Representatives Specification for the Certification of Welding Sales Representatives 1st Edition Prepared by the American Welding Society (AWS) Subcommittee

More information

INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach

INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach Library of Congress Cataloging-in-Publication ISBN 978-1-4613-5091-0 ISBN 978-1-4615-0467-2 (ebook) DOI 10.1007/978-1-4615-0467-2

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

Algorithms and Parallel Computing

Algorithms and Parallel Computing Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

8.3 Mandatory Flow Control Models

8.3 Mandatory Flow Control Models 8.3 Mandatory Flow Control Models Mingsen Xu Advanced Operating System 2011-10-26 Outline Mandatory Flow Control Models - Information Flow Control - Lattice Model - Multilevel Security Model - Bell-Lapadula

More information

Proceedings of The Second International Conference on Web Information Systems Engineering

Proceedings of The Second International Conference on Web Information Systems Engineering Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun

More information

Modeling and Verification of RBC Handover Protocol

Modeling and Verification of RBC Handover Protocol Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 309 (2014) 51 62 www.elsevier.com/locate/entcs Modeling and Verification of RBC Handover Protocol Kai Yang 1,2

More information

Clustering and Information Retrieval

Clustering and Information Retrieval Clustering and Information Retrieval Network Theory and Applications Volume 11 Managing Editors: Ding-ZhuDu University o/minnesota, U.S.A. Cauligi Raghavendra University 0/ Southern Califorina, U.S.A.

More information

ISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation

ISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation INTERNATIONAL STANDARD ISO/IEC 15909-1 First edition 2004-12-01 Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation Ingénierie du logiciel et du système

More information

DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo

DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo DepCoS-RELCOMEX 2006 Los Alamitos, California Washington Tokyo Copyright 2006 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permissions: Abstracting

More information

Study on a Sensor Network System with a Self-Maintenance Function for Plant Monitoring System

Study on a Sensor Network System with a Self-Maintenance Function for Plant Monitoring System Joint International Workshop: Nuclear Technology and Society Needs for Next Generation Study on a Sensor Network System with a Self-Maintenance Function for Plant Monitoring System Takeshi Fujiwara and

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Issues in Testing Electronic Commerce Systems

Issues in Testing Electronic Commerce Systems Issues in Testing Electronic Commerce Systems Kassem Saleh 1 and Robert Probert University of Ottawa, School of Information Technology and Engineering (SITE) P.O.Box 450, Stn A, Ottawa, Ontario, Canada

More information

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards

More information

ISO INTERNATIONAL STANDARD. Road vehicles FlexRay communications system Part 1: General information and use case definition

ISO INTERNATIONAL STANDARD. Road vehicles FlexRay communications system Part 1: General information and use case definition INTERNATIONAL STANDARD ISO 17458-1 First edition 2013-02-01 Road vehicles FlexRay communications system Part 1: General information and use case definition Véhicules routiers Système de communications

More information

is easing the creation of new ontologies by promoting the reuse of existing ones and automating, as much as possible, the entire ontology

is easing the creation of new ontologies by promoting the reuse of existing ones and automating, as much as possible, the entire ontology Preface The idea of improving software quality through reuse is not new. After all, if software works and is needed, just reuse it. What is new and evolving is the idea of relative validation through testing

More information

KeyNote: Trust Management for Public-Key. 180 Park Avenue. Florham Park, NJ USA.

KeyNote: Trust Management for Public-Key. 180 Park Avenue. Florham Park, NJ USA. KeyNote: Trust Management for Public-Key Infrastructures Matt Blaze 1 Joan Feigenbaum 1 Angelos D. Keromytis 2 1 AT&T Labs { Research 180 Park Avenue Florham Park, NJ 07932 USA fmab,jfg@research.att.com

More information

Home Inspection 2014

Home Inspection 2014 Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section

More information

MONIKA HEINER.

MONIKA HEINER. LESSON 1 testing, intro 1 / 25 SOFTWARE TESTING - STATE OF THE ART, METHODS, AND LIMITATIONS MONIKA HEINER monika.heiner@b-tu.de http://www.informatik.tu-cottbus.de PRELIMINARIES testing, intro 2 / 25

More information

Part 16: Air Interface for Fixed Broadband Wireless Access Systems

Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Amendment for Improved Coexistence Mechanisms for License-Exempt Operation

More information

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide AN INTRODUCTION TO FUZZY SETS Analysis and Design Witold Pedrycz and Fernando Gomide A Bradford Book The MIT Press Cambridge, Massachusetts London, England Foreword - Preface Introduction xiii xxv xxi

More information

Practical Database Programming with Visual Basic.NET

Practical Database Programming with Visual Basic.NET Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson

More information

Microprocessor Theory

Microprocessor Theory Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A

More information

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 62243 First edition 2005-07 IEEE 1232 Artificial intelligence exchange and service tie to all test environments (AI-ESTATE) IEEE 2005 Copyright - all rights reserved IEEE is

More information

Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48)

Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48) Course Title: Software Engineering Course No. : ICT Ed 528 Nature of course: Theoretical + Practical Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48) 1. Course Description The

More information

Modeling Architecture for COBIT

Modeling Architecture for COBIT Volume 3, July 2011 Modeling Architecture for COBIT By Reinhold Thurner, Ph.D. Models and frameworks are used as a means to describe the structure and properties of processes and to provide guidelines

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD IEC 62032 INTERNATIONAL STANDARD Edition 2.0 2012-06 IEEE Std C57.135 Guide for the Application, Specification, and Testing of Phase-Shifting Transformers (E) IEEE Std. C57.135:2011 THIS PUBLICATION IS

More information

Scalable Middleware Environment for Agent-Based Internet Applications]

Scalable Middleware Environment for Agent-Based Internet Applications] Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081

More information

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize

More information

Modern Experimental Design

Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

L3/L4 Multiple Level Cache concept using ADS

L3/L4 Multiple Level Cache concept using ADS L3/L4 Multiple Level Cache concept using ADS Hironao Takahashi 1,2, Hafiz Farooq Ahmad 2,3, Kinji Mori 1 1 Department of Computer Science, Tokyo Institute of Technology 2-12-1 Ookayama Meguro, Tokyo, 152-8522,

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEEE 11073-10406 First edition 2012-12-01 Health informatics Personal health device communication Part 10406: Device specialization Basic electrocardiograph (ECG) (1- to 3-lead

More information

Concrete Abstractions

Concrete Abstractions Concrete Abstractions Concrete Abstractions An Introduction to Computer Science Using Scheme Max Hailperin Gustavus Adolphus College Barbara Kaiser Gustavus Adolphus College Karl Knight Gustavus Adolphus

More information

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of

More information

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li Learning to Match Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li 1. Introduction The main tasks in many applications can be formalized as matching between heterogeneous objects, including search, recommendation,

More information

Arnold N. Alderman Founder & President of Anagenesis, Inc. a technical marketing company

Arnold N. Alderman Founder & President of Anagenesis, Inc. a technical marketing company Arnold N. Alderman Founder & President of Anagenesis, Inc. a technical marketing company Mr. Alderman is a well known industry expert in the marketing of high technology products and is author of many

More information

TIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems

TIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems TIME-CONSTRAINED TRANSACTION MANAGEMENT Real-Time Constraints in Database Transaction Systems The Kluwer International Series on ADV ANCES IN DATABASE SYSTEMS Other books in the Series: Series Editor Ahmed

More information

A Framework for the Formal Verification of Time-Triggered Systems

A Framework for the Formal Verification of Time-Triggered Systems A Framework for the Formal Verification of Time-Triggered Systems Lee Pike leepike@galois.com Indiana University, Bloomington Department of Computer Science Advisor: Prof. Steven D. Johnson December 12,

More information

Encyclopedia of Information Science and Technology

Encyclopedia of Information Science and Technology Encyclopedia of Information Science and Technology Second Edition Mehdi Khosrow-Pour Information Resources Management Association, USA Volume IV G-Internet INFORMATION SCIENCE REFERENCE Hershey New York

More information

ISO/IEEE INTERNATIONAL STANDARD. Health informatics Personal health device communication Part 10404: Device specialization Pulse oximeter

ISO/IEEE INTERNATIONAL STANDARD. Health informatics Personal health device communication Part 10404: Device specialization Pulse oximeter INTERNATIONAL STANDARD ISO/IEEE 11073-10404 First edition 2010-05-01 Health informatics Personal health device communication Part 10404: Device specialization Pulse oximeter Informatique de santé Communication

More information

A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES

A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES Deepali Diwase Pune Institute of Computer Technology, Pune University Pune, Maharashtra, India deepali.diwase@gmail.com

More information

Automatic Modularization of ANNs Using Adaptive Critic Method

Automatic Modularization of ANNs Using Adaptive Critic Method Automatic Modularization of ANNs Using Adaptive Critic Method RUDOLF JAKŠA Kyushu Institute of Design 4-9-1 Shiobaru, Minami-ku, Fukuoka, 815-8540 JAPAN Abstract: - We propose automatic modularization

More information

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy. DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY

More information

COMMUNICATION PROTOCOL ENGINEERING

COMMUNICATION PROTOCOL ENGINEERING COMMUNICATION PROTOCOL ENGINEERING COMMUNICATION PROTOCOL ENGINEERING SECOND EDITION PALLAPA VENKATARAM Professor Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Honorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore

Honorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore COMPUTER ORGANIZATION AND ARCHITECTURE V. Rajaraman Honorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore T. Radhakrishnan Professor of Computer Science

More information

Parallel Model Checking of ω-automata

Parallel Model Checking of ω-automata Parallel Model Checking of ω-automata Vincent Bloemen Formal Methods and Tools, University of Twente v.bloemen@utwente.nl Abstract. Specifications for non-terminating reactive systems are described by

More information

Implementing Security and Tokens: Current Standards, Tools, and Practices

Implementing  Security and Tokens: Current Standards, Tools, and Practices Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices

More information

Software Engineering of Robots

Software Engineering of Robots Software Engineering of Robots Ana Cavalcanti Jon Timmis, Jim Woodcock Wei Li, Alvaro Miyazawa, Pedro Ribeiro University of York December 2015 Overview One of UK eight great technologies: robotics and

More information

Fundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall

Fundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall Fundamentals of Mobile Computing Second Edition Prasant Kumar Pattnaik Rajib Mall FUNDAMENTALS OF MOBILE COMPUTING SECOND EDITION PRASANT KUMAR PATTNAIK Professor School of Computer Engineering KIIT University

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 60488-2 First edition 2004-05 IEEE 488.2 Standard digital interface for programmable instrumentation Part 2: Codes, formats, protocols and common commands IEEE 2004 Copyright

More information

Fault, Error, and Failure

Fault, Error, and Failure Fault, Error, and Failure Testing, Quality Assurance, and Maintenance Winter 2018 Prof. Arie Gurfinkel based on slides by Prof. Lin Tan and others Terminology, IEEE 610.12-1990 Fault -- often referred

More information

Self-Stabilizing Distributed Algorithms for Graph Alliances

Self-Stabilizing Distributed Algorithms for Graph Alliances Self-Stabilizing Distributed Algorithms for Graph Alliances Zhenyu Xu and Pradip K Srimani Department of Computer Science, Clemson University, Clemson, SC 29634-0974 Abstract Graph alliances are recently

More information

Car Information Systems for ITS

Car Information Systems for ITS Car Information Systems for ITS 102 Car Information Systems for ITS Kozo Nakamura Ichiro Hondo Nobuo Hataoka, Ph.D. Shiro Horii OVERVIEW: For ITS (intelligent transport systems) car information systems,

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 24744 Second edition 2014-11-15 Software engineering Metamodel for development methodologies Ingénierie du logiciel Métamodèle pour les méthodologies de développement Reference

More information

POLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES

POLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES POLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES Umalusi Umalusi House 37 General van Ryneveld Street Persequor Technopark Pretoria PO Box 151 Persequor Technopark Pretoria 0020 South Africa Tel: +27 12

More information

Multi-hop Wireless Network and Its Applications

Multi-hop Wireless Network and Its Applications Multi-hop Wireless Network and Its Applications Junhee Lee Network Systems Lab. EECS, KAIST junhee@netsys.kaist.ac.kr Korea Advanced Institute of Science and Technology, Network Systems Lab. -1- Wireless

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 17458-2 First edition 2013-02-01 Road vehicles FlexRay communications system Part 2: Data link layer specification Véhicules routiers Système de communications FlexRay Partie

More information

A Model-Based Reference Workflow for the Development of Safety-Related Software

A Model-Based Reference Workflow for the Development of Safety-Related Software A Model-Based Reference Workflow for the Development of Safety-Related Software 2010-01-2338 Published 10/19/2010 Michael Beine dspace GmbH Dirk Fleischer dspace Inc. Copyright 2010 SAE International ABSTRACT

More information

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Md. Imrul Hassan ihassan@swin.edu.au Centre for Advanced Internet Architecture (CAIA) Swinburne University of Technology

More information

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our

More information

Reflective Design Patterns to Implement Fault Tolerance

Reflective Design Patterns to Implement Fault Tolerance Reflective Design Patterns to Implement Fault Tolerance Luciane Lamour Ferreira Cecília Mary Fischer Rubira Institute of Computing - IC State University of Campinas UNICAMP P.O. Box 676, Campinas, SP 3083-970

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

A Reliability Model Based on Heterogeneous Software Architecture

A Reliability Model Based on Heterogeneous Software Architecture A Reliability Model Based on Heterogeneous Software Architecture Chang Liu, Bin Liu, Lian Ruan Department of System Engineering of Engineering Technology Beihang University Beijing, China liuchang@dse.buaa.edu.cn

More information

Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance 1

Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance 1 The Second International Conference on Secure System Integration and Reliability Improvement Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance 1 Doron Drusinsky

More information

ISO/IEC/ IEEE

ISO/IEC/ IEEE INTERNATIONAL STANDARD ISO/IEC/ IEEE 31320-1 First edition 2012-09-15 Information technology Modeling Languages Part 1: Syntax and Semantics for IDEF0 Technologies de l'information Langages de modélisation

More information

Semantics-Based Integration of Embedded Systems Models

Semantics-Based Integration of Embedded Systems Models Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE

More information

SELECTED TOPICS in APPLIED COMPUTER SCIENCE

SELECTED TOPICS in APPLIED COMPUTER SCIENCE A Tool for Detecting Detects on Class Implementation in Object Oriented Program on the Basis of the Law of Demeter: Focusing on Dependency between Packages RYOTA CHIBA, HIROAKI HASHIURA and SEIICHI KOMIYA

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD IEC 62439-1 Edition 1.0 2010-02 colour inside Industrial communication networks High availability automation networks Part 1: General concepts and calculation methods IEC 62439-1:2010(E)

More information

Advanced Data Mining Techniques

Advanced Data Mining Techniques Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu

More information

Clearguard ACM 100 axle counting system. Smart track vacancy detection for cost-effective rail services. siemens.com / mobility

Clearguard ACM 100 axle counting system. Smart track vacancy detection for cost-effective rail services. siemens.com / mobility Clearguard ACM 100 axle counting system Smart track vacancy detection for cost-effective rail services siemens.com / mobility The launch of smart track vacancy detection The Clearguard ACM 100 axle counting

More information