{"title":"Applying model checking to workflow verification","authors":"J. Pfeiffer, W. Rossak, A. Speck","doi":"10.1109/ECBS.2004.1316693","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316693","url":null,"abstract":"Model checking is a technique for the verification of temporal logic specifications in state-transition systems. It can be applied to software, at design stages as well as at source code level. The latter in particular is constricted by the large space requirements of model checking. However, model checking is a promising technique for the improvement of software quality. We examined the applicability of existing model checking methods and tools to software in general and with a focus on e-commerce software systems developed at Intershop. Although model checking is currently not applicable to all domains, it is useful for certain restricted fields of application. One of these domains are Intershop's e-commerce systems, consisting of so called pipelines. We show the source code related verification concept for these pipelines and is part of an overall concept for the verification and quality assurance of Intershop's products.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116468541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roy Sterritt, Darren Gunning, Alan Meban, Phillip Henning
{"title":"Exploring autonomic options in an unified fault management architecture through reflex reactions via pulse monitoring","authors":"Roy Sterritt, Darren Gunning, Alan Meban, Phillip Henning","doi":"10.1109/ECBS.2004.1316731","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316731","url":null,"abstract":"This paper investigates the potential of adding autonomic capabilities to the telecommunications fault management architecture and highlights the importance of a reflex-healing dual strategy to facilitate this advanced automation. The reflex reaction is facilitated through the concept of a pulse monitor - essentially the extension of the fault tolerant heartbeat monitor mechanism to incorporate reflex urgency levels and health check summary information.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Closing the gap between software modelling and code","authors":"F. Wagner, T. Wagner, P. Wolstenholme","doi":"10.1109/ECBS.2004.1316682","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316682","url":null,"abstract":"If a software implementation is to be generated fully automatically from a model, then the model must be detailed and totally complete. For the definition of software implementing system behaviour, through finite state machines, we propose a well-proven method for the creation of such models and an associated XML expression of them.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116042725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using feature modeling for program comprehension and software architecture recovery","authors":"I. Pashov, Matthias Riebisch","doi":"10.1109/ECBS.2004.1316725","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316725","url":null,"abstract":"The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's documentation is poor and outdated. One may argue that the most reliable resource of information is the system's source code. Nevertheless a significant knowledge about the problem domain is required in order to facilitate the extraction of the system's useful architectural information. In this approach feature modeling is introduced as an additional step in a system's architectural recovery process. Feature modeling structures the system's functionality and supports reverse engineering by detecting the relations between source code elements and requirements. Tracing these relations may lead to a better understanding of the program's behavior and the recovery of various architectural elements. In this way, by providing a mapping between source code and features, the system's feature model supports program comprehension and architectural recovery. The approach is developed as first part of a migration methodology towards a component-based architecture of legacy systems. Recovered information about features and architecture is collected in a repository to enable a refactoring as next step. The approach is currently applied in a large project for reengineering of an industrial image processing system.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COTS (commercial off the shelf) distributed system for critical application","authors":"V. Oplustil, L. Gáspár, D. Svacina, S. Szabó","doi":"10.1109/ECBS.2004.1316734","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316734","url":null,"abstract":"This paper deals with the distributed controller area network (CAN) based control system design for experimental autonomous locomotion robot (ALR) VUTBOT-2. It also features a system of aviation modules (SAM) description for airborne applications. Distributed control system of the ALR is generated by microprocessor units, which are linked by the CAN. As a higher layer protocol (HLP) the CANAerospace protocol was chosen. CANAerospace is an extremely lightweight protocol/data format definition, which was designed for highly reliable communication with microprocessor-based systems in airborne applications via CAN. It is successfully implemented with the SAM.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115709830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and effective simulation of memory maps for system-on-chip","authors":"G. Luculli","doi":"10.1109/ECBS.2004.1316705","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316705","url":null,"abstract":"The design of complex system-on-chip (SOC) requires new methods and tools for the optimization of embedded software which is executed on ever more complex hardware architectures. The tuning of the memory subsystem is particularly difficult due to the many design parameters which are involved and the long time which is required to simulate different design configurations. We propose a very effective mechanism for the simulation of generic memory maps on architectures with instruction and/or data cache memory. An important characteristic of our implementation is its large flexibility: any memory map and any cache configuration can be simulated without the need to modify or to recompile the application code. We implemented such mechanism in our ISA retargetable environment and we showed that it loosely impacts the simulation performance.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WICCAP: from semi-structured data to structured data","authors":"Zhao Li, W. Ng","doi":"10.1109/ECBS.2004.1316686","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316686","url":null,"abstract":"Web data extraction is a technique for extracting and integrating data from Web based semistructured data. Wrappers function like the kernel of Web data extraction systems providing information mediator between users and a large number of heterogeneous data sources. Typically, they process semistructured documents generated from structured databases based on rules that are usually hidden to users. Much research has been done to use various methods to represent the knowledge of hidden rules and exploit techniques such as grammar induction, inductive logic programming, etc., to discover these rules that can be used by wrappers to extract data. An important property of semistructured data is its hierarchical structure. Intuitively, we can devise a method that can use this structure information to generate wrappers. We describe a Web data extraction system - WICCAP and its internal Web Data Extraction Language (WDEL) that provides unified view of Web data resources and extracted data. We describe some rule generation features of WICCAP and provide detailed description of the internal language and its implementation. We have conducted experiments to show the ease on generating wrappers with this approach.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126722982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ADC position-sense interface","authors":"J. Haze, R. Vrba","doi":"10.1109/ECBS.2004.1316728","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316728","url":null,"abstract":"The paper describes the ADC position-sense interface (PSI) for measuring response in proof mass on input acceleration. The explanation of the PSI function, describing advantages and disadvantages of this approach and the simulation results was the basic purpose of this work. The cancellation of the offset, parasitics and common-mode input voltage are depicted as well. The simulation results were taken by CADENCE design tool.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-adaptive and self-healing message passing strategies for process-oriented integration infrastructures","authors":"Y. Caseau","doi":"10.1109/ECBS.2004.1316740","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316740","url":null,"abstract":"We present a set of adaptive methods and rules for routing messages in an EAI infrastructure that yields a form of autonomic behavior, namely the ability to dynamically optimize the flow of messages in order to respect SLA according to business priorities. EAI (enterprise application integration) infrastructures may be seen as component systems that exchange asynchronous messages over an application bus, under the supervision of a processflow engine that orchestrates the messages. The QoS (quality of service) of the global IT system is defined and monitored with SLA (service level agreements) that applies to each business process. The goal of this paper is to propose routing strategies for message handling that maximize the ability of the EAI system to meet these requirements, in a self-adaptive and self-healing manner, which is the ability to cope with sudden variations of the event flow or temporary failures of a component system.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133280223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Features with fuzzy probability","authors":"A. Pieczynski, S. Robak, A. Walaszek-Babiszewska","doi":"10.1109/ECBS.2004.1316715","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316715","url":null,"abstract":"This paper proposes an expert system description based on a feature diagram tree, annotated with weighted variant features in the software family context. The principle of how some variant features may be described on the basis of fuzzy logic is presented and fuzzy probability of market conditions is introduced. The proposed description integrates the external cross-tree constraints, and the resulting homogeneity of the logic then allows its usage to further applications, e.g., generators, or to the purposes of constraint based reasoning itself. The appliance of the proposed approach is demonstrated by the example of a mobile phone tariff description. In the example descriptions of the decision tree for customers have been prepared.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132066392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}