Sixth IEEE International Symposium on High Assurance Systems Engineering
|
|
- Adam Small
- 6 years ago
- Views:
Transcription
1 Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical Committee on Distributed Processing Los Alamitos, California Washington Brussels Tokyo iii
2 Copyright 2001 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number PR01275 ISBN ISBN (microfiche) ISSN Additional copies may be ordered from: IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., P.O. Box 3014 Piscataway, NJ Minami-Aoyama Los Alamitos, CA Tel: Minato-ku, Tokyo Tel: Fax: JAPAN Fax: Tel: customer-service@ieee.org Fax: csbooks@computer.org tokyo.ofc@computer.org Editorial production by Anne Jacobs Cover art production by Joe Daigle/Studio Productions Printed in the United States of America by The Printing House iv
3 HASE 2001 Table of Contents HASE 2001 Organizing Committees...ix Keynotes Erroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their Reduction... 3 John Knight Arnold W. Pittler... 4 Why Testing under Expected Operational Scenarios is Not Sufficient... 5 Jeff Voas Panel Software Dependability in Distributed and Mobile Computing Environments... 7 Moderator: R. Paul Panelists: A. Nikora R. R. Some J. Voas V. Winter J. Xu Formal Methods A Formal Testing Framework for UML Statechart Diagrams Behaviours: From Theory to Automatic Verification D. Latella and M. Massink Test-Sequence Generation from Formal Requirement Models S. Rayadurgam and M. P. E. Heimdahl Model-Checking for Validation of a Fault Protection System M. S. Feather, S. Fickas, and N.-A. Razermera-Mamy Finite-State Analysis of the CAN Bus Protocol M. van Osch and S. A. Smolka v
4 Transportation A Survey: Applying Formal Methods to a Software Intensive System A. de Groot, J. Hooman, F. Kordon, E. Paviot-Adet, I. Mounier, M. Lemoine, G. Gaudiere, V. L. Winter, and D. Kapur Highly Reliable Relational Control Programs for Robust Rapid Transit Systems F. B. Bastani, I-L. Yen, and S. Kim Mechanisms for a Reliable Cooperation of Vehicles E. Nett, M. Gergeleit, and M. Mock Verification of Assurance of Space On-Board Distributed Computer System H. Yashiro, Y. Takahashi, and T. Fujiwara Testing Framework for Testing the Fault-Tolerance of Systems Including OS and Network Aspects K. Buchacker and V. Sieh A Test Management and Software Visualization Framework for Heterogeneous Distributed Applications S. Ghosh, N. Bawa, G. Craig, and K. Kalgaonkar Automating Techniques for Inspecting High Assurance Systems M. S. Fisher and B. Cukic Genetic Programming Model for Software Quality Classification Y. Liu and T. M. Khoshgoftaar Security An Unavailability Analysis of Firewall Sandwich Configurations S. Goddard, R. Kieckhafer, and Y. Zhang Analyzing Internet Security Protocols A. Yasinsac and J. Childs Systems The SASHA Architecture for Network-Clustered Web Servers S. Goddard and T. Schroeder On Simplifying Modular Specification and Verification of Distributed Protocols P. Sinha and N. Suri vi
5 Explicit Representation of Exception Handling in the Development of Dependable Component-Based Systems G. R. M. Ferreira, C. M. F. Rubira, and R. de Lemos Systems Engineering of Communication Protocols for Command and Control Systems D. J. Thuente and J. K. Whiteman Railway Systems (Experience Reports) Integrating Automatic Verification of Safety Requirements in Railway Interlocking System Design G. Dipoppa, G. D'Alessandro, R. Semprini, and E. Tronci High Assurance Technologies for Autonomous Decentralized Train Control System M. Matsumoto, S. Kitamura, and M. Sato Adaptive Step-by-Step Construction Technique Achieving High Assurance for Tokyo Metropolitan Railway Network K. Kera, K. Bekki, K. Kamijyo, and K. Mori Fast Abstracts Research Issues in Assurance of Software Dependability E. B. Allen Are Measures and Metrics for Trusted Information Systems Possible? R. B. Vaughn and R. Henning Generating Test Plans for Distributed Systems with Stochastic Decision Models S. Dalibor and M. Dal Cin A Novel Adaptive Neural Network Based Technique to Enhance Software System Assurance for Regression Testing Z. Xu and N. D. Samaan Application of Software for High Consequences Systems J. M. Covan and J. A. Cooper Fault-Tolerant Cell Location Counter Strategy in Wireless Mobile Environment Y. An Software IV&V Strategy for Small Projects R. M. Chapman vii
6 Characterization of Dynamic Behavior of Executable Software Objects to Optimize Test Case Selection for Regression N. Samaan and A. Ibrahim A Case Study of IV&V Return on Investment (ROI) R. Rogers, D. McCaugherty, and F. Martin Integrating Software into PRA: A Taxonomy of Software Related Failures B. Li, M. Li, and C. Smidts Software Reliability Analysis for Regression Testing N. Samaan and Z. Tan Assurance Analysis by Scenario-based UML Modeling K. Kosmidis and M. Sand Web-Based Prototype of Real-Time Concurrent Systems by a Specification Technique with Safety and Liveness Properties K.-Y. Sung Dynamic Fault-Tolerance Routing in 2-D Meshes Z. Jiang and J. Wu Architecting ebanking High Assurance Security Solutions S. Soundararajan and D. Dey Theorem-Proving Approach to Generating State Machine Test Sequences R. Busser, M. Boughdadi, M. Blackburn, and A. Naumann Author Index viii
Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation
Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,
More informationIEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003
IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical
More informationFuture Trends of Distributed Computing Systems
Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationSoftware Reliability Engineering
Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,
More informationProceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)
Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce
More informationProceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003
Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003
More informationCOMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)
PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS
More informationProceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002
Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i [blank page] ii Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 16-18 December
More informationProceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
More informationFuture Trends of Distributed Computing Systems
Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationProceedings. Ninth International Conference on. Network Protocols ICNP 2001
Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored
More information2017 International Conference on Communication Technologies (ComTech 2017)
2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute
More informationth International Conference on Telecommunications (ICT 2017)
2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical
More informationProceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California
Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels
More informationProceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001
Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing 17-1 9 December
More information2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)
2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More informationMulti-Core Programming
Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part
More information(ASE 2001) Proceedings. Conference on. 16th Annual International CGIPUTER. Los Alamitos, California Washington Brussels Tokyo November 2001
Proceedings 16th Annual International Conference on n Automated Software Engineering (ASE 2001) 26-29 November 2001 Loew s Coronado Bay Resort Coronado Island San Diego, California Sponsored by IEEE Computer
More informationReal-Time Optimization by Extremum-Seeking Control
Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley
More informationHASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
More informationTHE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING
FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationAWS QC14:2009. Specification for the Certification of Welding Sales Representatives
Specification for the Certification of Welding Sales Representatives Specification for the Certification of Welding Sales Representatives 1st Edition Prepared by the American Welding Society (AWS) Subcommittee
More informationINTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach Library of Congress Cataloging-in-Publication ISBN 978-1-4613-5091-0 ISBN 978-1-4615-0467-2 (ebook) DOI 10.1007/978-1-4615-0467-2
More informationCOMPONENT-ORIENTED PROGRAMMING
COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More information8.3 Mandatory Flow Control Models
8.3 Mandatory Flow Control Models Mingsen Xu Advanced Operating System 2011-10-26 Outline Mandatory Flow Control Models - Information Flow Control - Lattice Model - Multilevel Security Model - Bell-Lapadula
More informationProceedings of The Second International Conference on Web Information Systems Engineering
Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun
More informationModeling and Verification of RBC Handover Protocol
Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 309 (2014) 51 62 www.elsevier.com/locate/entcs Modeling and Verification of RBC Handover Protocol Kai Yang 1,2
More informationClustering and Information Retrieval
Clustering and Information Retrieval Network Theory and Applications Volume 11 Managing Editors: Ding-ZhuDu University o/minnesota, U.S.A. Cauligi Raghavendra University 0/ Southern Califorina, U.S.A.
More informationISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation
INTERNATIONAL STANDARD ISO/IEC 15909-1 First edition 2004-12-01 Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation Ingénierie du logiciel et du système
More informationDepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo
DepCoS-RELCOMEX 2006 Los Alamitos, California Washington Tokyo Copyright 2006 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permissions: Abstracting
More informationStudy on a Sensor Network System with a Self-Maintenance Function for Plant Monitoring System
Joint International Workshop: Nuclear Technology and Society Needs for Next Generation Study on a Sensor Network System with a Self-Maintenance Function for Plant Monitoring System Takeshi Fujiwara and
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationIssues in Testing Electronic Commerce Systems
Issues in Testing Electronic Commerce Systems Kassem Saleh 1 and Robert Probert University of Ottawa, School of Information Technology and Engineering (SITE) P.O.Box 450, Stn A, Ottawa, Ontario, Canada
More informationHistorical Reliability Data for IEEE 3006 Standards: Power Systems Reliability
IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards
More informationISO INTERNATIONAL STANDARD. Road vehicles FlexRay communications system Part 1: General information and use case definition
INTERNATIONAL STANDARD ISO 17458-1 First edition 2013-02-01 Road vehicles FlexRay communications system Part 1: General information and use case definition Véhicules routiers Système de communications
More informationis easing the creation of new ontologies by promoting the reuse of existing ones and automating, as much as possible, the entire ontology
Preface The idea of improving software quality through reuse is not new. After all, if software works and is needed, just reuse it. What is new and evolving is the idea of relative validation through testing
More informationKeyNote: Trust Management for Public-Key. 180 Park Avenue. Florham Park, NJ USA.
KeyNote: Trust Management for Public-Key Infrastructures Matt Blaze 1 Joan Feigenbaum 1 Angelos D. Keromytis 2 1 AT&T Labs { Research 180 Park Avenue Florham Park, NJ 07932 USA fmab,jfg@research.att.com
More informationHome Inspection 2014
Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section
More informationMONIKA HEINER.
LESSON 1 testing, intro 1 / 25 SOFTWARE TESTING - STATE OF THE ART, METHODS, AND LIMITATIONS MONIKA HEINER monika.heiner@b-tu.de http://www.informatik.tu-cottbus.de PRELIMINARIES testing, intro 2 / 25
More informationPart 16: Air Interface for Fixed Broadband Wireless Access Systems
Draft IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Amendment for Improved Coexistence Mechanisms for License-Exempt Operation
More informationAN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide
AN INTRODUCTION TO FUZZY SETS Analysis and Design Witold Pedrycz and Fernando Gomide A Bradford Book The MIT Press Cambridge, Massachusetts London, England Foreword - Preface Introduction xiii xxv xxi
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationDIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING
DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 62243 First edition 2005-07 IEEE 1232 Artificial intelligence exchange and service tie to all test environments (AI-ESTATE) IEEE 2005 Copyright - all rights reserved IEEE is
More informationLevel: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48)
Course Title: Software Engineering Course No. : ICT Ed 528 Nature of course: Theoretical + Practical Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48) 1. Course Description The
More informationModeling Architecture for COBIT
Volume 3, July 2011 Modeling Architecture for COBIT By Reinhold Thurner, Ph.D. Models and frameworks are used as a means to describe the structure and properties of processes and to provide guidelines
More informationINTERNATIONAL STANDARD
IEC 62032 INTERNATIONAL STANDARD Edition 2.0 2012-06 IEEE Std C57.135 Guide for the Application, Specification, and Testing of Phase-Shifting Transformers (E) IEEE Std. C57.135:2011 THIS PUBLICATION IS
More informationScalable Middleware Environment for Agent-Based Internet Applications]
Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081
More informationINTRUSION DETECTION AND CORRELATION. Challenges and Solutions
INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA
More information7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak
Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More informationPUBLICATIONS. Journal Papers
PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.
More informationL3/L4 Multiple Level Cache concept using ADS
L3/L4 Multiple Level Cache concept using ADS Hironao Takahashi 1,2, Hafiz Farooq Ahmad 2,3, Kinji Mori 1 1 Department of Computer Science, Tokyo Institute of Technology 2-12-1 Ookayama Meguro, Tokyo, 152-8522,
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEEE 11073-10406 First edition 2012-12-01 Health informatics Personal health device communication Part 10406: Device specialization Basic electrocardiograph (ECG) (1- to 3-lead
More informationConcrete Abstractions
Concrete Abstractions Concrete Abstractions An Introduction to Computer Science Using Scheme Max Hailperin Gustavus Adolphus College Barbara Kaiser Gustavus Adolphus College Karl Knight Gustavus Adolphus
More informationSoftware Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics
Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of
More informationLearning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li
Learning to Match Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li 1. Introduction The main tasks in many applications can be formalized as matching between heterogeneous objects, including search, recommendation,
More informationArnold N. Alderman Founder & President of Anagenesis, Inc. a technical marketing company
Arnold N. Alderman Founder & President of Anagenesis, Inc. a technical marketing company Mr. Alderman is a well known industry expert in the marketing of high technology products and is author of many
More informationTIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems
TIME-CONSTRAINED TRANSACTION MANAGEMENT Real-Time Constraints in Database Transaction Systems The Kluwer International Series on ADV ANCES IN DATABASE SYSTEMS Other books in the Series: Series Editor Ahmed
More informationA Framework for the Formal Verification of Time-Triggered Systems
A Framework for the Formal Verification of Time-Triggered Systems Lee Pike leepike@galois.com Indiana University, Bloomington Department of Computer Science Advisor: Prof. Steven D. Johnson December 12,
More informationEncyclopedia of Information Science and Technology
Encyclopedia of Information Science and Technology Second Edition Mehdi Khosrow-Pour Information Resources Management Association, USA Volume IV G-Internet INFORMATION SCIENCE REFERENCE Hershey New York
More informationISO/IEEE INTERNATIONAL STANDARD. Health informatics Personal health device communication Part 10404: Device specialization Pulse oximeter
INTERNATIONAL STANDARD ISO/IEEE 11073-10404 First edition 2010-05-01 Health informatics Personal health device communication Part 10404: Device specialization Pulse oximeter Informatique de santé Communication
More informationA TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES
A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES Deepali Diwase Pune Institute of Computer Technology, Pune University Pune, Maharashtra, India deepali.diwase@gmail.com
More informationAutomatic Modularization of ANNs Using Adaptive Critic Method
Automatic Modularization of ANNs Using Adaptive Critic Method RUDOLF JAKŠA Kyushu Institute of Design 4-9-1 Shiobaru, Minami-ku, Fukuoka, 815-8540 JAPAN Abstract: - We propose automatic modularization
More informationDEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.
DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY
More informationCOMMUNICATION PROTOCOL ENGINEERING
COMMUNICATION PROTOCOL ENGINEERING COMMUNICATION PROTOCOL ENGINEERING SECOND EDITION PALLAPA VENKATARAM Professor Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationHonorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore
COMPUTER ORGANIZATION AND ARCHITECTURE V. Rajaraman Honorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore T. Radhakrishnan Professor of Computer Science
More informationParallel Model Checking of ω-automata
Parallel Model Checking of ω-automata Vincent Bloemen Formal Methods and Tools, University of Twente v.bloemen@utwente.nl Abstract. Specifications for non-terminating reactive systems are described by
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationSoftware Engineering of Robots
Software Engineering of Robots Ana Cavalcanti Jon Timmis, Jim Woodcock Wei Li, Alvaro Miyazawa, Pedro Ribeiro University of York December 2015 Overview One of UK eight great technologies: robotics and
More informationFundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall
Fundamentals of Mobile Computing Second Edition Prasant Kumar Pattnaik Rajib Mall FUNDAMENTALS OF MOBILE COMPUTING SECOND EDITION PRASANT KUMAR PATTNAIK Professor School of Computer Engineering KIIT University
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 60488-2 First edition 2004-05 IEEE 488.2 Standard digital interface for programmable instrumentation Part 2: Codes, formats, protocols and common commands IEEE 2004 Copyright
More informationFault, Error, and Failure
Fault, Error, and Failure Testing, Quality Assurance, and Maintenance Winter 2018 Prof. Arie Gurfinkel based on slides by Prof. Lin Tan and others Terminology, IEEE 610.12-1990 Fault -- often referred
More informationSelf-Stabilizing Distributed Algorithms for Graph Alliances
Self-Stabilizing Distributed Algorithms for Graph Alliances Zhenyu Xu and Pradip K Srimani Department of Computer Science, Clemson University, Clemson, SC 29634-0974 Abstract Graph alliances are recently
More informationCar Information Systems for ITS
Car Information Systems for ITS 102 Car Information Systems for ITS Kozo Nakamura Ichiro Hondo Nobuo Hataoka, Ph.D. Shiro Horii OVERVIEW: For ITS (intelligent transport systems) car information systems,
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 24744 Second edition 2014-11-15 Software engineering Metamodel for development methodologies Ingénierie du logiciel Métamodèle pour les méthodologies de développement Reference
More informationPOLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES
POLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES Umalusi Umalusi House 37 General van Ryneveld Street Persequor Technopark Pretoria PO Box 151 Persequor Technopark Pretoria 0020 South Africa Tel: +27 12
More informationMulti-hop Wireless Network and Its Applications
Multi-hop Wireless Network and Its Applications Junhee Lee Network Systems Lab. EECS, KAIST junhee@netsys.kaist.ac.kr Korea Advanced Institute of Science and Technology, Network Systems Lab. -1- Wireless
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO 17458-2 First edition 2013-02-01 Road vehicles FlexRay communications system Part 2: Data link layer specification Véhicules routiers Système de communications FlexRay Partie
More informationA Model-Based Reference Workflow for the Development of Safety-Related Software
A Model-Based Reference Workflow for the Development of Safety-Related Software 2010-01-2338 Published 10/19/2010 Michael Beine dspace GmbH Dirk Fleischer dspace Inc. Copyright 2010 SAE International ABSTRACT
More informationMedium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks
Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Md. Imrul Hassan ihassan@swin.edu.au Centre for Advanced Internet Architecture (CAIA) Swinburne University of Technology
More informationJoin the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle
Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our
More informationReflective Design Patterns to Implement Fault Tolerance
Reflective Design Patterns to Implement Fault Tolerance Luciane Lamour Ferreira Cecília Mary Fischer Rubira Institute of Computing - IC State University of Campinas UNICAMP P.O. Box 676, Campinas, SP 3083-970
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationA Reliability Model Based on Heterogeneous Software Architecture
A Reliability Model Based on Heterogeneous Software Architecture Chang Liu, Bin Liu, Lian Ruan Department of System Engineering of Engineering Technology Beihang University Beijing, China liuchang@dse.buaa.edu.cn
More informationValidating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance 1
The Second International Conference on Secure System Integration and Reliability Improvement Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance 1 Doron Drusinsky
More informationISO/IEC/ IEEE
INTERNATIONAL STANDARD ISO/IEC/ IEEE 31320-1 First edition 2012-09-15 Information technology Modeling Languages Part 1: Syntax and Semantics for IDEF0 Technologies de l'information Langages de modélisation
More informationSemantics-Based Integration of Embedded Systems Models
Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE
More informationSELECTED TOPICS in APPLIED COMPUTER SCIENCE
A Tool for Detecting Detects on Class Implementation in Object Oriented Program on the Basis of the Law of Demeter: Focusing on Dependency between Packages RYOTA CHIBA, HIROAKI HASHIURA and SEIICHI KOMIYA
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD IEC 62439-1 Edition 1.0 2010-02 colour inside Industrial communication networks High availability automation networks Part 1: General concepts and calculation methods IEC 62439-1:2010(E)
More informationAdvanced Data Mining Techniques
Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu
More informationClearguard ACM 100 axle counting system. Smart track vacancy detection for cost-effective rail services. siemens.com / mobility
Clearguard ACM 100 axle counting system Smart track vacancy detection for cost-effective rail services siemens.com / mobility The launch of smart track vacancy detection The Clearguard ACM 100 axle counting
More information