V. Balashov, A. G. Bakhmurov, M. V. Chistolinov, R. Smeliansky, D. Volkanov, Nikita V. Youshchenko
{"title":"A Hardware-in-the-Loop Simulation Environment for Real-Time Systems Development and Architecture Evaluation","authors":"V. Balashov, A. G. Bakhmurov, M. V. Chistolinov, R. Smeliansky, D. Volkanov, Nikita V. Youshchenko","doi":"10.1504/IJCCBS.2010.031706","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031706","url":null,"abstract":"In this paper we present a technology for integration of distributed real-time embedded systems (RTES) based on hardware-in-the loop simulation. The environment to support this technology is described. This environment also enables simulation-based evaluation of RTES architecture on early stages of RTES development.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conjugated Graph Grammars as a Mean to Assure Consistency of Systems of Conjugated Graphs","authors":"L. Kotulski, Lukasz Fryz","doi":"10.1109/DepCoS-RELCOMEX.2008.59","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.59","url":null,"abstract":"Using graph grammars as a formal tool that supports the distributed system description necessitates a solution to both the problem of assurance of cohesion distributed subgraphs describing the system and making possible cooperation of (different) graph grammars (that will modify these graphs). The definition of conjugated graph grammars, introduced in the paper, seems to be a possible solution of the above problem. Moreover, for some subclass of these grammars - the strictly conjugated graph grammar - it can be proven that consistency of conjugated graphs system will not be violated by productions of this kind of grammars. An example application SCG grammar limitation to the algebraic DPO approach is finally presented.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116598913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tool-Supported Advanced Mutation Approach for Verification of C# Programs","authors":"A. Derezińska, Anna Szustek","doi":"10.1109/DepCoS-RELCOMEX.2008.51","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.51","url":null,"abstract":"Mutation testing is a fault-based testing technique used to inject faults into an existing program and see if its test suite is sensitive enough to detect common faults. We are interested in using the mutation analysis to evaluate, compare and improve quality assurance techniques for testing object-oriented mechanisms and other advanced features of C# programs. This paper provides an overview of a current version of the CREAM system (creator of mutants), and reports on its use in experimental research. We apply advanced, object-oriented mutation operators to testing of open-source C# programs and discuss the results.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application","authors":"Lukasz Cyra, J. Górski","doi":"10.1109/DepCoS-RELCOMEX.2008.38","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.38","url":null,"abstract":"Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, standards conformity framework (SCF) containing methods and tools which provide support for application of standards was proposed. The framework is based on trust case methodology being used to provide arguments demonstrating properties of IT systems. The article describes SCF and shows how it fits into the processes of achieving and assessing conformity. It identifies other methods and tools supporting standards application and compares them with the framework.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology of the Wireless Networks Planning in Mesh Topology","authors":"G. Debita, K. Staniec","doi":"10.1109/DepCoS-RELCOMEX.2008.61","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.61","url":null,"abstract":"The aim of the paper is to present an algorithm for the planning of wireless networks in mesh topology. According to the authors' assumptions, the algorithm should optimally span the mesh network of minimal incidence between its nodes. A second aim of the paper is to calculate an optimal flow for the designed network as regards its offered services. The authors' intention is to prove that the wireless mesh networks belong to the group of \"survivable networks\" by means of introducing appropriate mechanisms associated with an optimal dynamic routing that is dependent on the bandwidth available for these services.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problems of Parallel Realization of Algorithms Calculation of Electronic Structure of Large Molecules","authors":"A. Chernetsov, Olga Shamayeva","doi":"10.1109/DepCoS-RELCOMEX.2008.24","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.24","url":null,"abstract":"The problem of the organization of effective computations for the calculation of electronic structure of large molecules using self-consistent neglect differential overlap purification method is described. A mathematical model of problem is presented. Semiempirical method of canonical purification for sparse molecules is examined. A parallel implementation algorithms of calculation in the case of block-tridiagonal matrixes using MPI and Fortran95 is analyzed.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Network Cluster Reliability Evolution","authors":"V. Klimanov, A. Yermakov","doi":"10.1109/DepCoS-RELCOMEX.2008.25","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.25","url":null,"abstract":"The new multi-purposed reliability model of information system (IS) is described in this paper. The model can be used to evaluate the reliability of both IS parts (hardware and software) and to simulate reliability changes during the long period of time.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification and Implementation of Dependable Controllers","authors":"K. Sacha","doi":"10.1109/DepCoS-RELCOMEX.2008.30","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.30","url":null,"abstract":"A method is described for modeling, verification and automatic generation of code for PLC controllers. The modeling of requirements and the implementation of code are based on a definition of a finite state time machine. The verification process uses UPPAAL, a model checking tool for the networks of timed automata. A conversion between both models is done automatically. The method starts from modeling the desired behavior of the controller by means of an UML- based state machine diagram, and ends-up with a complete program in one of the IEC 1131 languages.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Tolerant Algorithm for Functional and Data Flow Parallel Programs Performance on Clusters","authors":"S. Bazhanov, S. Bogdanets, V. P. Kutepov","doi":"10.1109/DepCoS-RELCOMEX.2008.62","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.62","url":null,"abstract":"An approach and algorithm providing fault tolerant performance of functional and data flow parallel processes on clusters is presented in the paper. Main accent in the paper is on decentralized solution supporting of the fault tolerant computations and minimization of time and resources of the recovery process.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126836493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of Telematic Services in Transport","authors":"M. Siergiejczyk","doi":"10.1109/DepCoS-RELCOMEX.2008.40","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.40","url":null,"abstract":"The paper presents problems of quantification for quality of services with respect to telematic systems that are applicable to transportation. The author give an outline of quality evaluation methods which are used in telecommunication, this paper describes one of the evaluation systems currently used, which has the advantage that can be incorporated into existing transport telematics services. The numerical parameters related to network reliability and its transmission performance were considered as the most representative ones. Finally, it was concluded that the suggested quantificational parameters are well-suited for assessment of the operational properties of telematic systems in terms of their applicability to practical purposes.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115271191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}